Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use reva's Authenticate method instead of spawning token managers #2528

Merged
merged 4 commits into from
Sep 22, 2021

Conversation

ishank011
Copy link
Contributor

@ishank011 ishank011 commented Sep 21, 2021

When using the CS3 proxy backend, we previously obtained the user from reva's userprovider service and minted the token ourselves. This required maintaining a shared JWT secret between ocis and reva, as well duplication of logic. This PR delegates this logic by using the Authenticate method provided by the reva gateway service to obtain this token, making it an arbitrary, indestructible entry. Currently, the changes have been made to the proxy service but will be extended to others as well.

Closes #2525

@ownclouders
Copy link
Contributor

💥 Acceptance tests localApiTests-apiAccountsHashDifficulty-ocis failed. The build is cancelled...

@ownclouders
Copy link
Contributor

💥 Acceptance tests Core-API-Tests-ocis-storage-4 failed. The build is cancelled...

@ownclouders
Copy link
Contributor

💥 Acceptance tests localApiTests-apiAccountsHashDifficulty-ocis failed. The build is cancelled...

@ownclouders
Copy link
Contributor

💥 Acceptance tests Core-API-Tests-ocis-storage-7 failed. The build is cancelled...

@ownclouders
Copy link
Contributor

💥 Acceptance tests settingsUITests failed. The build is cancelled...

@ishank011 ishank011 marked this pull request as ready for review September 22, 2021 14:48
@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

12.2% 12.2% Coverage
19.7% 19.7% Duplication

Copy link
Contributor

@C0rby C0rby left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ishank011, I was working on this too but you were faster. ;)

Looks good to me. I'll change the other services in another PR.

@C0rby C0rby merged commit 80f8724 into owncloud:master Sep 22, 2021
ownclouders pushed a commit that referenced this pull request Sep 22, 2021
Merge: ed6ed61 fd2bf9c
Author: David Christofas <[email protected]>
Date:   Wed Sep 22 12:20:29 2021 -0400

    Merge pull request #2528 from ishank011/reva-auth-tokens

    Use reva's Authenticate method instead of spawning token managers
@ishank011
Copy link
Contributor Author

Thanks a lot @C0rby!

@ishank011 ishank011 deleted the reva-auth-tokens branch September 23, 2021 07:07
rhafer added a commit to rhafer/ocis that referenced this pull request Feb 2, 2022
This we use reva to mint tokes for users when using the CS3 backend
(owncloud#2528) the user's roles are no
longer part of the token.

This adds a workaround to the RequireSelfOrAdmin middleware to Request
the user's role id on demand from the settings service.

Partial Fix for owncloud#2646
rhafer added a commit to rhafer/ocis that referenced this pull request Feb 2, 2022
This we use reva to mint tokes for users when using the CS3 backend
(owncloud#2528) the user's roles are no
longer part of the token.

This adds a workaround to the RequireSelfOrAdmin middleware to Request
the user's role id on demand from the settings service.

Partial Fix for owncloud#2646
rhafer added a commit to rhafer/ocis that referenced this pull request Feb 2, 2022
This we use reva to mint tokes for users when using the CS3 backend
(owncloud#2528) the user's roles are no
longer part of the token.

This adds a workaround to the RequireSelfOrAdmin middleware to Request
the user's role id on demand from the settings service.

Partial Fix for owncloud#2646
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Generate and validate Reva tokens from Reva
3 participants