-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an auth runner #33296
Add an auth runner #33296
Conversation
@cachedout, @thatch45: This is a tad sensitive. Anything about this rub you the wrong way? Primary use-case is to be able to create long-lived Salt tokens tied to an eauth user that can be used in scripts and API calls. One option is to let the caller specify the expiration time when calling mk_token (as done in this PR; is config-gated). Another option would be to leave mk_token alone and make a separate method that does most of what mk_token does. |
Hrmm. I don't like the fact that this user override is global. I can see the case for having a privileged user that's allowed to do that but this doesn't feel nearly granular enough to me. Thoughts? |
Do agree. I've been puzzling over ways to differentiate "privileged" or not. We could check the calling user as root/sudo vs via eauth. Other thoughts? |
@whiteinge Yeah, that's kind of what I'm thinking. What do you think, @thatch45 ? |
I am going to agree with @cachedout but I think that the user granular setting could be an additional feature to this PR |
Good suggestions. Added per-user whitelist. |
very nice |
ping @Lothiraldan |
Go Go Jenkins! |
Well something went sideways in the test suite here. @whiteinge do you have a moment to take a look? |
Yay, tests. <3 |
What does this PR do?
Add a new 'auth' runner for creating, deleting, and managing eauth tokens.
What issues does this PR fix or reference?
#20363
Tests written?
No