-
Notifications
You must be signed in to change notification settings - Fork 362
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: saas authz changes for rbac #9657
Conversation
✅ Deploy Preview for determined-ui ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
eee7b2a
to
8441204
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #9657 +/- ##
==========================================
- Coverage 53.56% 53.53% -0.03%
==========================================
Files 1255 1256 +1
Lines 152701 152742 +41
Branches 3292 3293 +1
==========================================
- Hits 81788 81778 -10
- Misses 70763 70814 +51
Partials 150 150
Flags with carried forward coverage won't be shown. Click here to find out more.
|
3334702
to
9b438d1
Compare
@@ -34,7 +34,7 @@ func AddSCIMUser(ctx context.Context, suser *model.SCIMUser) (*model.SCIMUser, e | |||
userID, err := AddUserTx(ctx, tx, &model.User{ | |||
Username: suser.Username, | |||
DisplayName: suser.DisplayName, | |||
Active: true, | |||
Active: suser.Active, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
^
@@ -187,6 +187,7 @@ func (s *service) PostUser(c echo.Context) (interface{}, error) { | |||
return nil, errors.WithStack(err) | |||
} | |||
|
|||
u.Active = true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this change is to preserve the existing behavior of this code path in light of the following change:
https://github.com/determined-ai/determined/pull/9657/files#r1687035860
if a.m.config.InternalConfig.ExternalSessions.Enabled() { | ||
return nil, errExternalSessions | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks like this was missed last time. we have this check on PatchUser
but not on PatchUsers
if a.m.config.InternalConfig.ExternalSessions.Enabled() { | ||
return nil, errExternalSessions | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this check is erroneous, user settings are not a user management feature, they are a part of how the web stores user preferences
9b438d1
to
d8b88eb
Compare
Ticket
https://hpe-aiatscale.atlassian.net/browse/DET-10315
Description
Provisions RBAC user with role assignments to their personal group based on the
defaultClusterRole
in the token.Also, since it's no longer feasible to update role assignments based on changes from saas, we are allowing for the updating of a user's active status via token.
Test Plan
Checklist
docs/release-notes/
See Release Note for details.