Control Model Access by IDP 'groups' #8164
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
docs(token_auth.md): clarify title
refactor(handle_jwt.py): add jwt auth manager + refactor to handle groups
allows user to call model if user belongs to group with model access
refactor(handle_jwt.py): refactor to first check if service call then check user call
feat(handle_jwt.py): new
enforce_team_access
paramonly allows user to call model if a team they belong to has model access
allows controlling user model access by team
fix(handle_jwt.py): fix error string, remove unecessary param
docs(token_auth.md): add controlling model access for jwt tokens via teams to docs
test: fix tests post refactor
fix: fix linting errors
fix: fix linting error
test: fix import error