-
Notifications
You must be signed in to change notification settings - Fork 63
sync up various TODOs with issues #2417
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -1788,7 +1788,6 @@ CREATE TABLE omicron.public.device_auth_request ( | |
| ); | ||
|
|
||
| -- Access tokens granted in response to successful device authorization flows. | ||
| -- TODO-security: expire tokens. | ||
|
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Covered by #2302 |
||
| CREATE TABLE omicron.public.device_access_token ( | ||
| token STRING(40) PRIMARY KEY, | ||
| client_id UUID NOT NULL, | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -75,7 +75,6 @@ fn generate_token() -> String { | |
| /// suggested in RFC 8628 §6.1 (User Code Recommendations); q.v. also for | ||
| /// a discussion of entropy requirements. On input, use codes should be | ||
| /// uppercased, and characters not in this alphabet should be stripped. | ||
| // TODO-security: user code tries should be rate-limited | ||
|
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Covered by #2184 |
||
| const USER_CODE_ALPHABET: [char; 20] = [ | ||
| 'B', 'C', 'D', 'F', 'G', 'H', 'J', 'K', 'L', 'M', 'N', 'P', 'Q', 'R', 'S', | ||
| 'T', 'V', 'W', 'X', 'Z', | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -118,7 +118,6 @@ impl super::Nexus { | |
| message: "device authorization request expired".to_string(), | ||
| }) | ||
| } else { | ||
| // TODO-security: set an expiration time for the valid token. | ||
|
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Covered by #2302 |
||
| self.db_datastore | ||
| .device_access_token_create( | ||
| opctx, | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -5,13 +5,10 @@ | |
| //! Executable program to run Nexus, the heart of the control plane | ||
| // TODO | ||
| // - TCP and HTTP KeepAlive parameters | ||
| // - Server hostname | ||
| // - Disable signals? | ||
| // - Analogs for actix client_timeout (request timeout), client_shutdown (client | ||
| // shutdown timeout), server backlog, number of workers, max connections per | ||
| // worker, max connect-in-progress sockets, shutdown_timeout (server shutdown | ||
| // timeout) | ||
|
Comment on lines
-8
to
-14
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
| // - General networking and runtime tuning for availability and security: see | ||
| // omicron#2184, omicron#2414. | ||
|
|
||
| use clap::Parser; | ||
| use omicron_common::cmd::fatal; | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -236,8 +236,6 @@ impl DataStore { | |
| where | ||
| T: authz::ApiResourceWithRolesType + AuthorizedResource + Clone, | ||
| { | ||
| // TODO-security We should carefully review what permissions are | ||
|
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Covered by #2303 |
||
| // required for modifying the policy of a resource. | ||
| opctx.authorize(authz::Action::ModifyPolicy, authz_resource).await?; | ||
|
|
||
| let authz_resource = authz_resource.clone(); | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -416,7 +416,6 @@ pub struct DeviceAuthResponse { | |
| } | ||
|
|
||
| /// Successful access token grant. See RFC 6749 §5.1. | ||
| /// TODO-security: `expires_in`, `refresh_token`, etc. | ||
|
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
| #[derive(Clone, Debug, Deserialize, Serialize, JsonSchema)] | ||
| pub struct DeviceAccessTokenGrant { | ||
| /// The access token issued to the client. | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Covered by #2415.