-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ensure augmented SecurityIdentity is used in SecurityEvents and move configuration-based roles-mapping to authentication phase #39688
Conversation
This comment has been minimized.
This comment has been minimized.
...rtx-http/runtime/src/main/java/io/quarkus/vertx/http/runtime/security/HttpAuthenticator.java
Show resolved
Hide resolved
...src/main/java/io/quarkus/resteasy/reactive/server/runtime/security/EagerSecurityContext.java
Outdated
Show resolved
Hide resolved
b6c55c2
to
1b38aaa
Compare
I have rebased this PR on current main and resolved merge conflicts. No additional changes. |
This comment has been minimized.
This comment has been minimized.
@michalvavrik You mention this PR is a prep for #39563, it does like another well done PR. What I'm not sure about is that the augmentation events will be sen after HTTP policy related augmentations (HttpSecurityPolicy is mainly about authorization checks and not the augmentation) and there could be a few of these ones. But there will be nothing related to the augmentation reported when one or more So I have a few questions, these are only meant to discuss things further before finalizing this PR:
Thoughts ? Thanks |
I appreciate your time.
No. There is alternative way that I didn't mention before because I did not anticipate resistance. I simply belived that I am was adding a useful information. What can be done is to update Span on every single authorization event as long the Full disclosure: by correct
This PR adds one property into the events that are going to be fired anyway. I suppose that users can do what I will do and just compare previous and current state if they have a similar use case as I do. I can drop it as explained before. Apologies I did not mention it before (for reasons also explained above).
@sberyozkin I propose I will drop
Is that acceptable, please? |
1b38aaa
to
da7969d
Compare
I went ahead and just dropped the attribute. |
This comment has been minimized.
This comment has been minimized.
@michalvavrik Thanks, for the update,
It is not a resistance, just an attempt to make sense of it as a reviewer, and see if something can be made more consistent, etc. Let me have a look at your recent updates shortly |
@michalvavrik The PR in the current form looks much more straightforward and easier to understand,
Yes, IMHO, users won't be particularly interested to trace every incremental identity update but the end result - if the final security identity is authorized. I may prove to be wrong but then we can start fine-tuning it if some real demand arises for it. Thanks |
@michalvavrik Can you please rebase this PR, as the last build run 2 weeks back ? |
No complains from my side Sergey. Thank you for the review. |
da7969d
to
fe4f864
Compare
I've rebased the PR and re-checked all the changes (as I was bit short on details now), and changes still lgtm. Let's see how CI goes. Thanks |
Status for workflow
|
#39563 pre-step. Changes also make sense standalone.
SecurityIdentity
changesquarkus.http.auth.roles-mapping
part of the authentication process, so that when the authenticatione event is fired, the identity is already augmentedsynchronized
method and reduce (runtime) logic inside authentication handler