Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(gcs): exclude deleted principals #364

Merged
merged 2 commits into from
Feb 17, 2023
Merged

fix(gcs): exclude deleted principals #364

merged 2 commits into from
Feb 17, 2023

Conversation

rahmatrhd
Copy link
Member

fix the following error when parsing principal identifier from gcs iamPolicy

failed to import access: fetching access from provider: invalid bucket access member signature "deleted:user:[email protected]?uid=123456"

@coveralls
Copy link

Pull Request Test Coverage Report for Build 4200713484

  • 0 of 3 (0.0%) changed or added relevant lines in 1 file are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage decreased (-0.01%) to 75.112%

Changes Missing Coverage Covered Lines Changed/Added Lines %
plugins/providers/gcs/client.go 0 3 0.0%
Totals Coverage Status
Change from base Build 4190730860: -0.01%
Covered Lines: 7714
Relevant Lines: 10270

💛 - Coveralls

@rahmatrhd rahmatrhd merged commit f2e2739 into 0.6.x Feb 17, 2023
@rahmatrhd rahmatrhd deleted the gcs-import-grants branch February 17, 2023 07:20
@rahmatrhd rahmatrhd mentioned this pull request Feb 20, 2023
rahmatrhd added a commit that referenced this pull request Feb 20, 2023
* feat(idtoken-auth): add auth validator using google idtoken (#349)

* docs: add idtoken validation on sample config.yaml

* feat: add auth config to replace idtoken validator config, and refactor default auth header key

* refactor: move auth interceptor to pkg/auth

* chore: delete idtoken validator mock

* feat: keep config.AuthenticatedUserHeaderKey for backward-compatibility

* chore: re-order import

* refactor: change sample config.yaml for auth config

* chore: make auth user header key sample and default config consistent

* chore: re-order import on oidc test

* fix: change oidc initialism

* fix: oidc validator mocks renaming

* fix: avoid using params with pointer, as it will lead to panic if params is nil

* fix: detect old auth user header key using empty string instead of default tag

* refactor: move OIDCAuth to pkg/auth

* refactor: move oidc validator mocks into pkg/auth/mocks

* chore: add deprecation notes on AuthenticatedUserHeaderKey

* refactor: make default auth email context key back to unexported, use different context key for oidc email

* refactor: do not use default header key on oidc auth, use its own header (it's only used for logrus)

* refactor: move logrus context custom fields to new interceptor and retrieve its value from context

* refactor: auth email context key mapping for default and oidc used for grpc server

* test: change ways of getting user email from request header to context

* refactor: use auth.OIDCAuth instead of OIDCValidatorParams

* feat(gcs): support import grants for gcs provider (#360)

* feat(gcs): support import grants for gcs provider

* refactor(gcs): use projectID value from struct field and remove from GetBuckets' param

* refactor(gcs): refactor repeated logic to retrieve gcs client

* refactor(gcs): improve code readability

* fix(gcs): exclude deleted principals (#364)

* refactor(gcs): use account type whitelisting

* fix(gcs): exclude deleted principals

* fix(gcs): fix timeout by running getPolicy in parallel (#365)

---------

Co-authored-by: Pulung Ragil <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants