- Notifications
You must be signed in to change notification settings - Fork923
feat: accept provisioner keys for provisioner auth#13972
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Conversation
a53ffdb
toe374c42
Compare948c470
to32ff000
CompareUh oh!
There was an error while loading.Please reload this page.
if req.ProvisionerKey != "" { | ||
headers.Set(ProvisionerDaemonKey, req.ProvisionerKey) | ||
} | ||
if req.PreSharedKey != "" { | ||
headers.Set(ProvisionerDaemonPSK, req.PreSharedKey) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Should these be mutually exclusive?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
I wanted it to fail at the API layer instead of silently taking one or the other. I could do a client error but thought it was cleaner to just have the server handle it.
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
ca83017
intomainUh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
What this changes:
Provisioner rbac subject will now have org scoped permissions when authenticating with a provisioner keySite org permissions are removed in this process