Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use user token in external enforcement if not configured #116

Merged
merged 2 commits into from
Jul 23, 2024

Conversation

Mark-Powers
Copy link

@Mark-Powers Mark-Powers commented Jul 23, 2024

In xena, we had this conditional code to fetch a user token https://github.com/ChameleonCloud/blazar/blob/chameleoncloud/xena/blazar/enforcement/filters/external_service_filter.py#L85-L86

This also gets the external identity endpoint, which is required because our "external service" is not in openstack.

Note: This breaks tests, as it tries to now reach out to keystone to get a token.

@Mark-Powers Mark-Powers requested a review from msherman64 July 23, 2024 17:20
Copy link

@msherman64 msherman64 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me.
Calling out that the purpose of the "token" in this case is that the external enforcement service will use that token to authenticate to keystone.

So this token MUST be sent securely, and currently is the same token as blazar uses to authenticate to keystone.

@Mark-Powers Mark-Powers merged commit f29ab3d into chameleoncloud/2023.1 Jul 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants