Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Preliminary support for account security in nats internal server #243

Merged
merged 31 commits into from
Jun 5, 2024

Conversation

autodidaddict
Copy link
Contributor

@autodidaddict autodidaddict commented May 24, 2024

This set of changes will make the internal NATS server multi-tenant safe by provisioning a user/account for each workload, and keeping the workload binary cache in a separate object store (one in each user account).

@autodidaddict autodidaddict requested a review from a team as a code owner May 24, 2024 14:07
@autodidaddict autodidaddict marked this pull request as draft May 24, 2024 14:08
@autodidaddict
Copy link
Contributor Author

Currently in draft. The new internal server struct exists and has tests to verify that it works. Forthcoming commits will have this integrated with the rest of the code.

@autodidaddict autodidaddict marked this pull request as ready for review May 24, 2024 16:13
@autodidaddict autodidaddict force-pushed the feat/internalnatssecurity branch 2 times, most recently from d6d8636 to 58f4227 Compare May 31, 2024 14:48
@kthomas kthomas force-pushed the feat/internalnatssecurity branch 2 times, most recently from c54af1a to d09d26b Compare June 3, 2024 17:12
@kthomas kthomas force-pushed the feat/internalnatssecurity branch from 42a45f8 to bd40b3e Compare June 5, 2024 07:29
@kthomas kthomas merged commit 69da829 into main Jun 5, 2024
4 checks passed
@kthomas kthomas deleted the feat/internalnatssecurity branch June 5, 2024 18:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants