Bug 1501864
Summary: | Add generated HMAC token in header for webhook calls | ||
---|---|---|---|
Product: | [Community] GlusterFS | Reporter: | Aravinda VK <avishwan> |
Component: | eventsapi | Assignee: | Aravinda VK <avishwan> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.12 | CC: | rhs-bugs, sabose, sanandpa, sheggodu |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | glusterfs-glusterfs-3.12.3 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | 1496363 | Environment: | |
Last Closed: | 2017-11-29 05:52:17 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1466129, 1496363, 1568820 | ||
Bug Blocks: |
Description
Aravinda VK
2017-10-13 11:18:32 UTC
REVIEW: https://review.gluster.org/18519 (eventsapi: Add JWT signing support) posted (#1) for review on release-3.12 by Aravinda VK (avishwan) COMMIT: https://review.gluster.org/18519 committed in release-3.12 by jiffin tony Thottan (jthottan) ------ commit 9d39bd926006d1b6b4850e8d07f9cc340baa9ed5 Author: Aravinda VK <avishwan> Date: Mon Sep 18 14:34:54 2017 +0530 eventsapi: Add JWT signing support New argument added to accept secret to generate JWT token. This patch does not affect the backward compatibility. Usage: gluster-eventsapi webhook-add <url> [-t <TOKEN>] \ [-s SECRET] With `--token` argument, Token header will be added as is. Authorization: Bearer <TOKEN> In case of shared secret, Gluster will generate JWT token using the secret and then add it to Authorization header. Authorization: Bearer <GENERATED_TOKEN> Secret/Token can be updated using `webhook-mod` command. Generated token will include the following payload, { "iss": "gluster", "exp": EXPIRY_TIME, "sub": EVENT_TYPE, "iat": EVENT_TIME } Where: iss - Issuer, exp - Expiry Time, sub - Event Type used as Subject, iat - Event Time used as Issue Time BUG: 1501864 Change-Id: Ib6b6fab23fb212d7f5e9bbc9e1416a9e9813ab1b Signed-off-by: Aravinda VK <avishwan> (cherry picked from commit add7116efa1f31e86f9c00c72c71872b1161370f) This bug is getting closed because a release has been made available that should address the reported issue. In case the problem is still not fixed with glusterfs-glusterfs-3.12.3, please open a new bug report. glusterfs-glusterfs-3.12.3 has been announced on the Gluster mailinglists [1], packages for several distributions should become available in the near future. Keep an eye on the Gluster Users mailinglist [2] and the update infrastructure for your distribution. [1] http://lists.gluster.org/pipermail/gluster-devel/2017-November/053983.html [2] https://www.gluster.org/pipermail/gluster-users/ |