-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleanup & Refactor #3
base: main
Are you sure you want to change the base?
Conversation
This reverts commit 2a6bea2.
); | ||
|
||
-- create web user w/ read only auth | ||
create role web_anon nologin; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
as we plan to discontinue sending a customized, pre-baked JWT with the claim "role": "event_logger"
, I would expect we need to bless the web_anon role with grants like those given to event_logger
below?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we need to bless the web_anon role with grants like those given to
event_logger
Thanks for the reminder! I hadn't tested writing values into logserver (only viewing existing data). I'll make sure to test that the web_anon
role can write events without authentication
NB: the diff for this PR is very messy. LMK if it's an issue, more than happy to re-write history so the PR diff is more readable
References
Errors Middleware cannot be used without an insecure workaround
oauth2-proxy traefik example
jonananas/traefik-oauth2-proxy