Sorry guys, that was an oversight. I added reviews:

https://reviews.apache.org/r/48310/ <https://reviews.apache.org/r/48310/> - 
Fixes some endpoint spaces in docs.
https://reviews.apache.org/r/48311/ <https://reviews.apache.org/r/48311/> - 
Result of running the script.

> On 06 Jun 2016, at 23:54, Adam Bordelon <a...@mesosphere.io> wrote:
> 
> Good point. Vinod was working on the endpoints script right next to me, but
> I guess he did his pre-release run before I committed Alexander's change.
> We'll have to do another run before rc2.
> 
> On Mon, Jun 6, 2016 at 5:36 AM, Neil Conway <neil.con...@gmail.com> wrote:
> 
>> FYI, this commit should have included the changes produced by
>> re-running the `generate-endpoint.py` script.
>> 
>> Neil
>> 
>> On Wed, Jun 1, 2016 at 8:26 AM,  <m...@apache.org> wrote:
>>> Repository: mesos
>>> Updated Branches:
>>>  refs/heads/master 5263a6211 -> 53b5164bb
>>> 
>>> 
>>> Added documentation for access_sandboxes and access_mesos_logs acls.
>>> 
>>> Modifies the file `acls.proto` to take into consideration the added
>>> authorization actions `access_sandboxes` and `access_mesos_logs`.
>>> 
>>> Review: https://reviews.apache.org/r/48048/
>>> 
>>> 
>>> Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
>>> Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/53b5164b
>>> Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/53b5164b
>>> Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/53b5164b
>>> 
>>> Branch: refs/heads/master
>>> Commit: 53b5164bb51ebe850dec5ab19b8382f5c4a59391
>>> Parents: 5263a62
>>> Author: Alexander Rojas <alexan...@mesosphere.io>
>>> Authored: Tue May 31 23:20:50 2016 -0700
>>> Committer: Adam B <a...@mesosphere.io>
>>> Committed: Tue May 31 23:24:55 2016 -0700
>>> 
>>> ----------------------------------------------------------------------
>>> docs/authorization.md |  2 ++
>>> src/files/files.cpp   | 34 +++++++++++++++++++++++++++++++---
>>> 2 files changed, 33 insertions(+), 3 deletions(-)
>>> ----------------------------------------------------------------------
>>> 
>>> 
>>> 
>> http://git-wip-us.apache.org/repos/asf/mesos/blob/53b5164b/docs/authorization.md
>>> ----------------------------------------------------------------------
>>> diff --git a/docs/authorization.md b/docs/authorization.md
>>> index 0e58b9b..189b70d 100644
>>> --- a/docs/authorization.md
>>> +++ b/docs/authorization.md
>>> @@ -131,6 +131,8 @@ entries, each representing an authorizable action:
>>> |`view_framework`|UNIX user of whom executors can be
>> viewed.|`Framework_Info` which can be viewed.|Filtering http endpoints.|
>>> |`view_executor`|UNIX user of whom executors can be
>> viewed.|`Executor_Info` and `Framework_Info` which can be viewed.|Filtering
>> http endpoints.|
>>> |`view_task`|UNIX user of whom tasks can be viewed.|(`Task` or
>> `Task_Info`) and `Framework_Info` which can be viewed.|Filtering http
>> endpoints.|
>>> +|`access_sandboxes`|Operator username.|Operating system user whose
>> executor/task sandboxes can be accessed.|Access task sandboxes.|
>>> +|`access_mesos_logs`|Operator username.|Implicitly given. A user should
>> only use types ANY and NONE to allow/deny access to the log.|Access Mesos
>> logs.|
>>> 
>>> ### Examples
>>> 
>>> 
>>> 
>> http://git-wip-us.apache.org/repos/asf/mesos/blob/53b5164b/src/files/files.cpp
>>> ----------------------------------------------------------------------
>>> diff --git a/src/files/files.cpp b/src/files/files.cpp
>>> index 873664d..094a00c 100644
>>> --- a/src/files/files.cpp
>>> +++ b/src/files/files.cpp
>>> @@ -57,6 +57,7 @@
>>> using namespace process;
>>> 
>>> using process::AUTHENTICATION;
>>> +using process::AUTHORIZATION;
>>> using process::DESCRIPTION;
>>> using process::HELP;
>>> using process::TLDR;
>>> @@ -295,7 +296,16 @@ const string FilesProcess::BROWSE_HELP = HELP(
>>>         "Query parameters:",
>>>         "",
>>>         ">        path=VALUE          The path of directory to
>> browse."),
>>> -    AUTHENTICATION(true));
>>> +    AUTHENTICATION(true),
>>> +    AUTHORIZATION(
>>> +        "Browsing files requires that the request principal is ",
>>> +        "authorized to do so for the target virtual file path.",
>>> +        "",
>>> +        "Authorizers may categorize different virtual paths into",
>>> +        "different ACLs, e.g. logs in one and task sandboxes in",
>>> +        "another.",
>>> +        "",
>>> +        "See authorization documentation for details."));
>>> 
>>> 
>>> Future<bool> FilesProcess::authorize(
>>> @@ -409,7 +419,16 @@ const string FilesProcess::READ_HELP = HELP(
>>>         ">        offset=VALUE        Value added to base address to
>> obtain "
>>>         "a second address",
>>>         ">        length=VALUE        Length of file to read."),
>>> -    AUTHENTICATION(true));
>>> +    AUTHENTICATION(true),
>>> +    AUTHORIZATION(
>>> +        "Reading files requires that the request principal is ",
>>> +        "authorized to do so for the target virtual file path.",
>>> +        "",
>>> +        "Authorizers may categorize different virtual paths into",
>>> +        "different ACLs, e.g. logs in one and task sandboxes in",
>>> +        "another.",
>>> +        "",
>>> +        "See authorization documentation for details."));
>>> 
>>> 
>>> Future<Response> FilesProcess::read(
>>> @@ -585,7 +604,16 @@ const string FilesProcess::DOWNLOAD_HELP = HELP(
>>>         "Query parameters:",
>>>         "",
>>>         ">        path=VALUE          The path of directory to
>> browse."),
>>> -    AUTHENTICATION(true));
>>> +    AUTHENTICATION(true),
>>> +    AUTHORIZATION(
>>> +        "Downloading files requires that the request principal is ",
>>> +        "authorized to do so for the target virtual file path.",
>>> +        "",
>>> +        "Authorizers may categorize different virtual paths into",
>>> +        "different ACLs, e.g. logs in one and task sandboxes in",
>>> +        "another.",
>>> +        "",
>>> +        "See authorization documentation for details."));
>>> 
>>> 
>>> Future<Response> FilesProcess::download(
>>> 
>> 

Reply via email to