Actions
Story #8075
closedAs as admin, when i change default policy, token logic reflects the changes
Start date:
Due date:
% Done:
100%
Estimated time:
Platform Release:
Groomed:
No
Sprint Candidate:
No
Tags:
Sprint:
Sprint 89
Quarter:
Description
We have some hardcoded permissions in the token auth logic. If admin would change the default policy token would not reflect it.
Updated by ipanova@redhat.com almost 4 years ago
- Sprint/Milestone changed from 2.3.0 to 2.4.0
Updated by ipanova@redhat.com almost 4 years ago
- Sprint/Milestone changed from 2.4.0 to 2.3.0
Updated by mdellweg almost 4 years ago
- Status changed from NEW to ASSIGNED
- Assignee set to mdellweg
Updated by pulpbot almost 4 years ago
- Status changed from ASSIGNED to POST
Added by mdellweg almost 4 years ago
Updated by mdellweg almost 4 years ago
- Status changed from POST to MODIFIED
- % Done changed from 0 to 100
Applied in changeset c280781fccb98729b1c4582256cf3e4b74ae46bd.
Added by mdellweg almost 4 years ago
Revision 32df55fc | View on GitHub
Use access policy to permit registry operations
Added by mdellweg almost 4 years ago
Revision e6cce8c8 | View on GitHub
Use access policy to permit registry operations
Added by mdellweg almost 4 years ago
Revision e6cce8c8 | View on GitHub
Use access policy to permit registry operations
Updated by pulpbot almost 4 years ago
- Status changed from MODIFIED to CLOSED - CURRENTRELEASE
Actions
Use access policy to permit registry operations
fixes #8075 https://pulp.plan.io/issues/8075