Closed
Bug 1439647
Opened 7 years ago
Closed 7 years ago
Define "loginIdentity" and make it available to other views and components
Categories
(Taskcluster :: UI, enhancement)
Taskcluster
UI
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: pmoore, Unassigned)
Details
Going to https://tools.taskcluster.net/credentials, we see something like:
Credential Information
Signed In As: mozilla-ldap/pmoore@mozilla.com/dev
ClientId : mozilla-ldap/pmoore@mozilla.com/dev
Type permanent
Expires in 999 years
Scopes
assume:*
auth:*
aws-provisioner:*
docker-worker:*
ec2-manager:*
generic-worker:*
github:*
hooks:*
index:*
notify:*
project:*
pulse:*
purge-cache:*
queue:*
scheduler:*
secrets:*
My login identity is mozilla-ldap/pmoore@mozilla.com. This is included in my clientId, but my clientId has /dev suffix, so the login identity is not explicitly mentioned.
Since I have queue:* scopes, we also can't extract it from
queue:create-artifact:login-identity/<loginIdentity>/* scope, since this isn't listed.
We should include "login identity" in the list of properties shown, so that it can be distinguished from clientId etc. This will help avoid some confusion about what the login identity is, since some scopes refer to it.
| Reporter | ||
Updated•7 years ago
|
Mentor: pmoore
Keywords: good-first-bug
Comment 1•7 years ago
|
||
Actually, you don't have a login id, because you haven't logged in -- rather, you are signed in using a permacred ("Sign In Manually"). That's a pretty unusual circumstance -- that feature is really only for unusual debugging purposes.
For everyone else, the login identity and the clientId are the same. For example, if I sign in as djmitche@gmail.com (an LDAP account), I get
---
Signed In As: Dustin Mitchell
ClientId: mozilla-ldap/djmitche@gmail.com
Scopes:
...
assume:login-identity:mozilla-ldap/djmitche@gmail.com
...
---
We have a few areas of the tools site that need to know the login identity of the user, as defined by the login service. Specifically, the client creator and the client manager. So I think we could get away with adding some code to the AuthController or UserSession that will calculate and verify the login identity and make that available to other code. The result could also be displayed here.
I think the steps to determining the login identity are:
- If the user's scopes satisfy `assume:login-identity:<clientId>`, then the login identity is the clientId
- Otherwise, there is no login identity
Note that this won't work for the case of permacreds with `assume:*` (it will give a login identity, even though the credentials aren't from a login). I think that's OK, but it might be possible to only allow login identities for some login methods (so, if you "Sign In With Auth0" you get a login identity, and if you "Sign In Manually", you don't).
Updated•7 years ago
|
Summary: Add login identity to https://tools.taskcluster.net/credentials → Define "loginIdentity" and make it available to other views and components
| Reporter | ||
Comment 2•7 years ago
|
||
Maybe if we "pass along" the login identity when credentials are created from other credentials, permacreds could still have a login identity. Whether it is permacreds created from temp creds, or temp creds from temp creds - eventually if we follow the chain, we should reach the originating credentials that were given by the login service, that have a particular login identity, shouldn't we?
I think if the generated credentials could inherit the login identity property, we'd have a more uniform way to present the information. Or is this a silly idea? :-)
Comment 3•7 years ago
|
||
Permacreds aren't the result of a login, so by definition they don't have a login identity. Login identity just means the identifier that the login service associates with the person's user account.
Comment 4•7 years ago
|
||
Also, I think we've made enough of a mess of this bug that it's no longer a good mentored bug! Maybe we should just close it?
Mentor: pmoore
Keywords: good-first-bug
Comment 5•7 years ago
|
||
Agreed. We can revisit or reopen if this becomes a priority.
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
| Assignee | ||
Updated•6 years ago
|
Component: Tools → UI and Tools
You need to log in
before you can comment on or make changes to this bug.
Description
•