Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support user scoped token for API authorization #9

Merged
merged 1 commit into from
Feb 20, 2019
Merged

Support user scoped token for API authorization #9

merged 1 commit into from
Feb 20, 2019

Conversation

srust
Copy link
Contributor

@srust srust commented Feb 20, 2019

Bump version to version 4.3.

Allow specifying the BLOCKBRIDGE_API_KEY as a user-scoped token, that
does not require system global access. If the token specified is
a global "system" token, then specify BLOCKBRIDGE_GLOBAL_TOKEN="1" to
change the mode of operation.

With a user scoped token, no "user" is required when creating a volume
or a profile. All volumes are and state are kept per-user. To use
different users, use different volume plugins.

Includes the following changes:

  • provision with "user" api token by default
  • rev version to v4.3
  • volume_user not required for user_access_token
  • Create new scoped authorizations only if specified token allows it
  • cache lookup vol info respects when no "user" is specified
  • don't lookup or use "user" in api or profile if user_access_token
  • conditionally prefix log messages with a timestamp

Bump version to version 4.3.

Allow specifying the BLOCKBRIDGE_API_KEY as a user-scoped token, that
does not require system global access. If the token specified *is*
a global "system" token, then specify BLOCKBRIDGE_GLOBAL_TOKEN="1" to
change the mode of operation.

With a user scoped token, no "user" is required when creating a volume
or a profile. All volumes are and state are kept per-user. To use
different users, use different volume plugins.

Includes the following changes:

* provision with "user" api token by default
* rev version to v4.3
* volume_user not required for user_access_token
* Create new scoped authorizations only if specified token allows it
* cache lookup vol info respects when no "user" is specified
* don't lookup or use "user" in api or profile if user_access_token
* conditionally prefix log messages with a timestamp
@srust srust merged commit 960303f into master Feb 20, 2019
@srust srust deleted the v4.3 branch February 20, 2019 19:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant