-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
api: apply new ACL check for wildcard namespace #13608
Conversation
Label: "all namespaces with insufficient token", | ||
Namespace: "*", | ||
Allocs: []*structs.Allocation{}, | ||
Token: ns1tokenInsufficient.SecretID, | ||
Error: true, | ||
Message: structs.ErrPermissionDenied.Error(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was the only test the failed after the refactoring, but I think returning a 403
is the correct result in this case since the test token doesn't have the read-job
capability?
Looking through the documentation I couldn't find any expected output.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
In #13606 the ACL check was refactored to better support the all namespaces wildcard (`*`). This commit applies the changes to the jobs and alloc list endpoints.
54f3d21
to
98d8fee
Compare
I'm going to lock this pull request because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active contributions. |
In #13606 the ACL check was refactored to better support the all
namespaces wildcard (
*
). This commit applies the changes to the jobsand alloc list endpoints.