Skip to content
This repository was archived by the owner on Aug 28, 2019. It is now read-only.

Commit 4312387

Browse files
committed
Regenerated library to pick up latest schema changes
1 parent 8afa797 commit 4312387

File tree

2 files changed

+0
-20
lines changed

2 files changed

+0
-20
lines changed

codegenerator/model/model-data.txt

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,6 @@ calling TaskCluster APIs.
2020

2121
The client's scopes control the client's access to TaskCluster resources.
2222
The scopes are *expanded* by substituting roles, as defined below.
23-
Every client has an implicit scope named `assume:client-id:<clientId>`,
24-
allowing additional access to be granted to the client without directly
25-
editing the client's scopes.
2623

2724
### Roles
2825
A _role_ consists of a `roleId`, a set of scopes and a description.
@@ -36,13 +33,6 @@ located at the end of a `roleId`. If you have a role with the following
3633
`roleId`: `my-prefix*`, then any client which has a scope staring with
3734
`assume:my-prefix` will be allowed to assume the role.
3835

39-
As previously mentioned each client gets the scope:
40-
`assume:client-id:<clientId>`, it trivially follows that you can create a
41-
role with the `roleId`: `client-id:<clientId>` to assign additional
42-
scopes to a client. You can also create a role `client-id:user-*`
43-
if you wish to assign a set of scopes to all clients whose `clientId`
44-
starts with `user-`.
45-
4636
### Guarded Services
4737
The authentication service also has API end-points for delegating access
4838
to some guarded service such as AWS S3, or Azure Table Storage.

src/main/java/org/mozilla/taskcluster/client/auth/Auth.java

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@
2626
*
2727
* The client's scopes control the client's access to TaskCluster resources.
2828
* The scopes are *expanded* by substituting roles, as defined below.
29-
* Every client has an implicit scope named `assume:client-id:<clientId>`,
30-
* allowing additional access to be granted to the client without directly
31-
* editing the client's scopes.
3229
*
3330
* ### Roles
3431
* A _role_ consists of a `roleId`, a set of scopes and a description.
@@ -42,13 +39,6 @@
4239
* `roleId`: `my-prefix*`, then any client which has a scope staring with
4340
* `assume:my-prefix` will be allowed to assume the role.
4441
*
45-
* As previously mentioned each client gets the scope:
46-
* `assume:client-id:<clientId>`, it trivially follows that you can create a
47-
* role with the `roleId`: `client-id:<clientId>` to assign additional
48-
* scopes to a client. You can also create a role `client-id:user-*`
49-
* if you wish to assign a set of scopes to all clients whose `clientId`
50-
* starts with `user-`.
51-
*
5242
* ### Guarded Services
5343
* The authentication service also has API end-points for delegating access
5444
* to some guarded service such as AWS S3, or Azure Table Storage.

0 commit comments

Comments
 (0)