Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add capability to select a specific user when connecting to Geode #44

Closed
sboorlagadda opened this issue Aug 12, 2019 · 2 comments

Comments

@sboorlagadda
Copy link

commented Aug 12, 2019

PCC is process of enabling instance sharing on PCF, using which one app could gain access to a shared cluster from another org and space. A new user role readonly is introduced with this new feature so that when instances are shared to APPS of other org only read-only access is granted.

We need a way to let SBDG apps to work with readonly credentials, this means that the APPS cannot push configuration etc.

In the current state the service key will only have readonly user and not other users in the service binding, so rather than asking user to configure which role to pick up it may be as simple as just use existing user from the binding.

@jxblum jxblum changed the title Ability to select a specific user while connecting to Geode. Add capability to select a specific user when connecting to Geode. Aug 12, 2019
@pulkitpivotal

This comment has been minimized.

Copy link

commented Aug 16, 2019

@jxblum Any idea which release this would be included?

@jxblum

This comment has been minimized.

Copy link
Member

commented Aug 21, 2019

@pulkitpivotal - I will include this in SBDG 1.1.1.RELEASE (the first "service release" for 1.1) as well as SBDG 1.2 M2.

@jxblum jxblum added the enhancement label Aug 21, 2019
@jxblum jxblum self-assigned this Aug 21, 2019
@jxblum jxblum added this to the 1.2.0.M2 milestone Aug 21, 2019
@jxblum jxblum changed the title Add capability to select a specific user when connecting to Geode. Add capability to select a specific user when connecting to Geode Aug 31, 2019
@jxblum jxblum added the in-progress label Sep 6, 2019
jxblum added a commit to jxblum/spring-boot-data-geode that referenced this issue Sep 11, 2019
…e the runtime user of their Spring Boot applications running in Pivotal CloudFoundray (PCF) when using Pivotal Cloud Cache (PCC).

Note: configuring the runtime user of a Spring Boot app outside of CloudFoundry is already supported.  Simply set the 'spring.data.gemfire.security.username' and 'spring.data.gemfire.security.password' properties.

Resolves spring-projectsgh-44.
jxblum added a commit to jxblum/spring-boot-data-geode that referenced this issue Sep 11, 2019
@jxblum jxblum closed this in 69250d1 Sep 11, 2019
@jxblum jxblum added complete and removed in-progress labels Sep 11, 2019
jxblum added a commit to jxblum/spring-boot-data-geode that referenced this issue Sep 11, 2019
jxblum added a commit to jxblum/spring-boot-data-geode that referenced this issue Sep 11, 2019
…e the runtime user of their Spring Boot applications running in Pivotal CloudFoundray (PCF) when using Pivotal Cloud Cache (PCC).

Note: configuring the runtime user of a Spring Boot app outside of CloudFoundry is already supported.  Simply set the 'spring.data.gemfire.security.username' and 'spring.data.gemfire.security.password' properties.

Resolves spring-projectsgh-44.
jxblum added a commit to jxblum/spring-boot-data-geode that referenced this issue Sep 11, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
3 participants
You can’t perform that action at this time.