-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWT API #103
Conversation
@atye: Thank you for submitting your pull request! Please make sure you have followed our contributing guidelines. We will review it as soon as possible. We want your feedback! If you have any questions or suggestions regarding our contributing process/workflow, please reach out to us at karavi@dell.com. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Other than the IP and the typo LGTM
We need to add the readme changes to the diagram to be more generically applicable to every Dell EMC storage system/starting guide changes for OpenShift version support
Doc updates handled in #104. |
Description
This PR resolves a security vulnerability with the https://github.com/dgrijalva/jwt-go library, https://access.redhat.com/security/cve/cve-2020-26160, by using a different library for JWT operations: https://github.com/lestrrat-go/jwx.
JWT operations are now abstracted to allow for various implementations without the need to refactor the services and handlers. To update the proxy-server and the tenatsvc with a TokenManager implemenation, you only need to update the associated main.go files.
The JWT interface defines a Token and a TokenManager:
The JWT interface defines a TokenManager with these operations:
Issues
List the issues impacted by this PR:
Checklist:
PowerFlex e2e:
PowerMax e2e: