Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disregard rules when set on a management token #5261

Merged
merged 2 commits into from
Jan 23, 2019

Conversation

mkeeler
Copy link
Member

@mkeeler mkeeler commented Jan 23, 2019

Legacy management tokens were expected not to have associated rules but apparently we never prevented this from happening. They would previously have been ignored. In 1.4.0 the place where we handle embedded policies treated having any rules as a client token and would ignore the token type. This PR flips the precedence around so that management type tokens always use the embedded global management policy rule set.

@mkeeler mkeeler added this to the 1.4.1 milestone Jan 23, 2019
@rboyer
Copy link
Member

rboyer commented Jan 23, 2019

Add a test?

Copy link
Contributor

@pearkes pearkes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Makes sense, agree a test would be great if easy.

Copy link
Contributor

@pearkes pearkes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Was going to suggest documenting the overwrite of rules behavior but realized we didn't instruct or expect people to set rules here and they are getting more permissive so I can't see a potential disruption from the change.

@mkeeler mkeeler merged commit d5a3ba6 into master Jan 23, 2019
@mkeeler mkeeler deleted the bugfix/acl-mgmt-with-rules branch March 4, 2019 18:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants