Skip to content
This repository was archived by the owner on Oct 11, 2024. It is now read-only.

Conversation

@gdbelvin
Copy link
Contributor

@gdbelvin gdbelvin commented May 13, 2018

The previous few PRs (#974 #973 ) migrated authentication and authorization from /core to implementation specific grpc interceptors.

This PR refactors the PerRPCCredentials creation out of /core/client into implementation specific /cmd/keytransparency-client. The CallOptions even has the flexibility to not return any options for situations where an implementation has chosen to not implement authorization controls.

/core can't reference anything in /impl.
@codecov-io
Copy link

codecov-io commented May 13, 2018

Codecov Report

Merging #975 into master will decrease coverage by 0.04%.
The diff coverage is 0%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master     #975      +/-   ##
==========================================
- Coverage   49.77%   49.73%   -0.05%     
==========================================
  Files          29       29              
  Lines        2043     2043              
==========================================
- Hits         1017     1016       -1     
- Misses        846      847       +1     
  Partials      180      180
Impacted Files Coverage Δ
core/client/client.go 27.48% <0%> (-0.59%) ⬇️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 95c3074...ca85b1c. Read the comment docs.

@gdbelvin gdbelvin requested a review from pav-kv May 14, 2018 10:33
@gdbelvin gdbelvin merged commit 496de4e into google:master May 15, 2018
gdbelvin added a commit to gdbelvin/keytransparency that referenced this pull request Jul 23, 2018
Fixes a bug where the client was not sending oauth user credentials.

Post google#975, client creds do not need to be passed with each RPC, and as
such, an authenticated, yet anonymous mode of authentication is no
longer needed, we can just use unauthenticated calls for the public api.

If we need to bring this back at a later point for spam reasons, we can.
In the meantime, deleted code is best code.
@gdbelvin gdbelvin mentioned this pull request Jul 23, 2018
gdbelvin added a commit that referenced this pull request Jul 23, 2018
* Remove service-key

Fixes a bug where the client was not sending oauth user credentials.

Post #975, client creds do not need to be passed with each RPC, and as
such, an authenticated, yet anonymous mode of authentication is no
longer needed, we can just use unauthenticated calls for the public api.

If we need to bring this back at a later point for spam reasons, we can.
In the meantime, deleted code is best code.
@gdbelvin gdbelvin deleted the f/auth/hammer branch January 9, 2019 18:08
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants