Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature/Identity] AccessTokenManager stubs #4612

Merged

Conversation

peternied
Copy link
Member

Description

AccessTokenManager stubs

Issues Resolved

[List any issues this PR will resolve]

Check List

  • New functionality includes testing.
    • All tests pass
  • New functionality has been documented.
    • New functionality has javadoc added
  • Commits are signed per the DCO using --signoff
  • Commit changes are listed out in CHANGELOG.md file (See: Changelog)

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

Signed-off-by: Peter Nied <petern@amazon.com>
@peternied peternied requested review from a team and reta as code owners September 27, 2022 22:09
@peternied
Copy link
Member Author

FYI @cwperks @DarshitChanpura

@github-actions
Copy link
Contributor

Gradle Check (Jenkins) Run Completed with:

@cwperks
Copy link
Member

cwperks commented Sep 28, 2022

@peternied You may want to add [Feature/Identity] to the name of this PR so anyone browsing the open PRs knows its for identity branch

@peternied peternied changed the title AccessTokenManager stubs [Feature/Identity] AccessTokenManager stubs Sep 28, 2022
Signed-off-by: Peter Nied <petern@amazon.com>
@github-actions
Copy link
Contributor

Gradle Check (Jenkins) Run Completed with:

Signed-off-by: Peter Nied <petern@amazon.com>
@github-actions
Copy link
Contributor

Gradle Check (Jenkins) Run Completed with:

Copy link
Member

@DarshitChanpura DarshitChanpura left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ty Peter, added a few comments

* @opensearch.experimental
*/
public interface AuthenticationToken {

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we comment, as a guideline, what formats should this support? or will that be taken into account once we finalize the implementation?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was loosely basing this on AuthenticationToken.java, but the aspect of having a principal I think we might want to consider before we jump into it


@Override
public void expireAllTokens() {
// Tokens cannot be expired
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we add one more line explaining "why"?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

NoopAccessTokenManager and all members of the Noop package does not allow for any auth failures/rejections of any kind (at least at this stage). We can certainly revisit as implementations start coming into place.

@peternied peternied merged commit ff22dc7 into opensearch-project:feature/identity Sep 29, 2022
@peternied peternied deleted the feature/identity branch September 29, 2022 19:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants