Good point. Vinod was working on the endpoints script right next to me, but I guess he did his pre-release run before I committed Alexander's change. We'll have to do another run before rc2.
On Mon, Jun 6, 2016 at 5:36 AM, Neil Conway <neil.con...@gmail.com> wrote: > FYI, this commit should have included the changes produced by > re-running the `generate-endpoint.py` script. > > Neil > > On Wed, Jun 1, 2016 at 8:26 AM, <m...@apache.org> wrote: > > Repository: mesos > > Updated Branches: > > refs/heads/master 5263a6211 -> 53b5164bb > > > > > > Added documentation for access_sandboxes and access_mesos_logs acls. > > > > Modifies the file `acls.proto` to take into consideration the added > > authorization actions `access_sandboxes` and `access_mesos_logs`. > > > > Review: https://reviews.apache.org/r/48048/ > > > > > > Project: http://git-wip-us.apache.org/repos/asf/mesos/repo > > Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/53b5164b > > Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/53b5164b > > Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/53b5164b > > > > Branch: refs/heads/master > > Commit: 53b5164bb51ebe850dec5ab19b8382f5c4a59391 > > Parents: 5263a62 > > Author: Alexander Rojas <alexan...@mesosphere.io> > > Authored: Tue May 31 23:20:50 2016 -0700 > > Committer: Adam B <a...@mesosphere.io> > > Committed: Tue May 31 23:24:55 2016 -0700 > > > > ---------------------------------------------------------------------- > > docs/authorization.md | 2 ++ > > src/files/files.cpp | 34 +++++++++++++++++++++++++++++++--- > > 2 files changed, 33 insertions(+), 3 deletions(-) > > ---------------------------------------------------------------------- > > > > > > > http://git-wip-us.apache.org/repos/asf/mesos/blob/53b5164b/docs/authorization.md > > ---------------------------------------------------------------------- > > diff --git a/docs/authorization.md b/docs/authorization.md > > index 0e58b9b..189b70d 100644 > > --- a/docs/authorization.md > > +++ b/docs/authorization.md > > @@ -131,6 +131,8 @@ entries, each representing an authorizable action: > > |`view_framework`|UNIX user of whom executors can be > viewed.|`Framework_Info` which can be viewed.|Filtering http endpoints.| > > |`view_executor`|UNIX user of whom executors can be > viewed.|`Executor_Info` and `Framework_Info` which can be viewed.|Filtering > http endpoints.| > > |`view_task`|UNIX user of whom tasks can be viewed.|(`Task` or > `Task_Info`) and `Framework_Info` which can be viewed.|Filtering http > endpoints.| > > +|`access_sandboxes`|Operator username.|Operating system user whose > executor/task sandboxes can be accessed.|Access task sandboxes.| > > +|`access_mesos_logs`|Operator username.|Implicitly given. A user should > only use types ANY and NONE to allow/deny access to the log.|Access Mesos > logs.| > > > > ### Examples > > > > > > > http://git-wip-us.apache.org/repos/asf/mesos/blob/53b5164b/src/files/files.cpp > > ---------------------------------------------------------------------- > > diff --git a/src/files/files.cpp b/src/files/files.cpp > > index 873664d..094a00c 100644 > > --- a/src/files/files.cpp > > +++ b/src/files/files.cpp > > @@ -57,6 +57,7 @@ > > using namespace process; > > > > using process::AUTHENTICATION; > > +using process::AUTHORIZATION; > > using process::DESCRIPTION; > > using process::HELP; > > using process::TLDR; > > @@ -295,7 +296,16 @@ const string FilesProcess::BROWSE_HELP = HELP( > > "Query parameters:", > > "", > > "> path=VALUE The path of directory to > browse."), > > - AUTHENTICATION(true)); > > + AUTHENTICATION(true), > > + AUTHORIZATION( > > + "Browsing files requires that the request principal is ", > > + "authorized to do so for the target virtual file path.", > > + "", > > + "Authorizers may categorize different virtual paths into", > > + "different ACLs, e.g. logs in one and task sandboxes in", > > + "another.", > > + "", > > + "See authorization documentation for details.")); > > > > > > Future<bool> FilesProcess::authorize( > > @@ -409,7 +419,16 @@ const string FilesProcess::READ_HELP = HELP( > > "> offset=VALUE Value added to base address to > obtain " > > "a second address", > > "> length=VALUE Length of file to read."), > > - AUTHENTICATION(true)); > > + AUTHENTICATION(true), > > + AUTHORIZATION( > > + "Reading files requires that the request principal is ", > > + "authorized to do so for the target virtual file path.", > > + "", > > + "Authorizers may categorize different virtual paths into", > > + "different ACLs, e.g. logs in one and task sandboxes in", > > + "another.", > > + "", > > + "See authorization documentation for details.")); > > > > > > Future<Response> FilesProcess::read( > > @@ -585,7 +604,16 @@ const string FilesProcess::DOWNLOAD_HELP = HELP( > > "Query parameters:", > > "", > > "> path=VALUE The path of directory to > browse."), > > - AUTHENTICATION(true)); > > + AUTHENTICATION(true), > > + AUTHORIZATION( > > + "Downloading files requires that the request principal is ", > > + "authorized to do so for the target virtual file path.", > > + "", > > + "Authorizers may categorize different virtual paths into", > > + "different ACLs, e.g. logs in one and task sandboxes in", > > + "another.", > > + "", > > + "See authorization documentation for details.")); > > > > > > Future<Response> FilesProcess::download( > > >