-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added KeyIdentity to replace KeyTriple #500
Added KeyIdentity to replace KeyTriple #500
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the massive change! 💪🏻 I left a bunch of comments below, apologies if some of them seem to contradict each other - I went on a journey of self-discovery myself, reading through this.
8e1a595
to
75241ff
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Another few comments, should've noticed the pub
fields yesterday :(
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the changes. Sorry for the big amount of review comments adding up to what you already got 😛
It is good though since this is a big and important change!
21b263e
to
3620599
Compare
Currently admin operations such as
Currently the admin can delete both Edit: I have implemented the scoped version of this, rather than the "global" version of this. This is as we can always revert to a more lenient/less-restrictive set of permissions if we wish to. |
3620599
to
bfea080
Compare
KeyIdentity contains a ApplicationIdentity, ProviderIdentity and a key_name. KeyTriple still exists but solely for the use by the on_disk_manager KIM. This is preliminary work towards the new SQLite KIM as part of parallaxsecond#486 Closes parallaxsecond#488 Signed-off-by: Matt Davis <[email protected]>
bfea080
to
201e7c7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mainly fine for me. I think I should not block the implementation for too long since this is hard to work little by little here. And it's all OK since you are on your own branch.
Do we want an administrator authenticated with authenticator B to be scoped only to actions on authenticator B resources, or do we want them to have "global" admin privileges where they can perform admin actions on any resource regardless of authenticator?
I think the scoped version is the one that we want. Having the new KIM in mind we wrote in the book:
Only the clients using the same authentication method as this request will be deleted. It has no impact currently as only one authentication method in the service is supported but might do if the service supports multiple.
KeyIdentity
contains anApplicationIdentity
,ProviderIdentity
and akey_name
.KeyTriple
still exists but solely for the use by theOnDiskKeyInfoManager
.This is preliminary work towards the new
SQLiteKeyInfoManager
as part of #486Apologies for the large pr... 👨🏼💻
There may be some incorrect variable naming in places regarding
key_triple
where it should bekey_identity
instead. I will address this in a future PR as this will be a ~200 loc by itself.Closes #488
Signed-off-by: Matt Davis [email protected]