-
Notifications
You must be signed in to change notification settings - Fork 135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fine grained access permissions #55
Comments
I think it would be great to have the ability to restrict access to only allowed users (list of allowed emails? allowed domains wildcard?), so you can have public facing but still secure unpub. And also hide frontend behind login. Did your idea include something like this? If yes, I'm 100% interested. I was also thinking about an option to use custom OAuth2 server instead of Google. What do you think about this? It would mainly cut the need of using Google account, but also allowed "IdP level access restriction" (when used with e.g. self hosted IdP). |
I've had a look at this and my schedule and its going to be a large chunk of work which I can't commit to at the moment. So sorry I'm going to have to step out of this one. |
Support for custom oauth2 servers is planned for unpub soon. When deploying the unpub service, pass in the OAuth2 configuration and use the unpub_auth tool to guide users finish the authentication process. |
@talisk Thanks for the info! And their idea for this is to have web UI with login where users can generate their tokens. I don't know if you are planning something like this or how much temporary is the Quote:
Also here is an example how it works on GitLab. And side note: unpub now isn't even checking the token audience, so any random Google token would also work on any random unpub instance. I've been playing with this for a few afternoons, but unfortunately this is going to be rather big update which sadly I don't have time to finish, I wanted to add just simple auth middleware but I already ended up with twice as much code than I started with, haha Next thing that should be done is to "convert" uploaders from email to user ID, because while on Google you cannot change your email, with other OAuth2 providers you can, so the only reliable identifier will be the ID. I can however give you my unfinished code, if you want. My latest working version had auth middleware with OAuth2 token checking (Google, custom JWT and introspected opaque). I can however share my unfinished code. I don't know how far you are with it already, but you can use anything you want from there, if you like something from there; you don't have to, if you don't :) I didn't want to publish half baked temporary solutions, that's why I didn't PR the first OAuth2 working thing. |
For now is there any way to make unpub hosted repo private? (private in sense that unauthorized user can't access). I didn't find any documentation about this. |
the 2.15 changes got me thinking about fine grain access control.
How would we feel about passing a user identifier to each of the meta and file store api calls?
The email addresses obtained from the access token probably makes sense.
If there is interest I might be able to find time to contribute the change.
Thoughts?
The text was updated successfully, but these errors were encountered: