-
Notifications
You must be signed in to change notification settings - Fork 887
feat: accept provisioner keys for provisioner auth #13972
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
a53ffdb
to
e374c42
Compare
948c470
to
32ff000
Compare
if req.ProvisionerKey != "" { | ||
headers.Set(ProvisionerDaemonKey, req.ProvisionerKey) | ||
} | ||
if req.PreSharedKey != "" { | ||
headers.Set(ProvisionerDaemonPSK, req.PreSharedKey) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should these be mutually exclusive?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wanted it to fail at the API layer instead of silently taking one or the other. I could do a client error but thought it was cleaner to just have the server handle it.
What this changes:
Provisioner rbac subject will now have org scoped permissions when authenticating with a provisioner keySite org permissions are removed in this process