-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue 479: Addressing Security vulnerabilities with authentication #488
Changes from all commits
7d5e702
4755baa
df6da84
aed02aa
7725877
81906e5
fe86d8d
4333ee9
f72f419
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -290,6 +290,12 @@ type AuthenticationParameters struct { | |
// name of Secret containing Password based Authentication Parameters like username, password and acl | ||
// optional - used only by PasswordAuthHandler for authentication | ||
PasswordAuthSecret string `json:"passwordAuthSecret,omitempty"` | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. For integration purposes, there needs to be a clear description of how to create the two secrets. It won't be obvious to the common dweller though. :) Having clear couple kubectl commands in the README that show exactly how to generate these 2 secrets is crucial so integrators know how to leverage this welcome enhancement. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thanks @sarlaccpit, I have added documentation in the auth section of our documentation. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thanks, the auth.md is very useful and detailed. It will be crucial information. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thanks @sarlaccpit . |
||
//name of secret containg TokenSigningKey | ||
ControllerTokenSecret string `json:"controllerTokenSecret,omitempty"` | ||
|
||
//name of secret containg TokenSigningKey and AuthToken | ||
SegmentStoreTokenSecret string `json:"segmentStoreTokenSecret,omitempty"` | ||
} | ||
|
||
func (ap *AuthenticationParameters) IsEnabled() bool { | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a nit but I'm not getting what the "basis" suffix means?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pravega uses this suffix so I tried keeping it the same. In any case this is just a key in a secret so if pravega changes the name for this parameter we can always have the name of the key different.