zuul/zuul/cmd
Matthieu Huin b599c7249d authentication config: add optional max_validity_time, skew
The Zuul admin can configure authenticators with an optional
"max_validity_time" field, which is the maximum age in seconds
for a valid authentication token. By default there is no
maximum age set for tokens, except the one deduced from
the token's "exp" claim.
If "max_validity" is set, tokens without an "iat" claim will
be rejected.

This is meant as an extra security to avoid accidentally issueing
very long lived tokens through the CLI.

The "skew" field can be used to mitigate clocks discrepancies
between Zuul and a JWT emitter.

Change-Id: I9351ca016b60050b5f3b3950b840d5f719e919ce
2019-12-10 16:39:29 +01:00
..
__init__.py Revert "Revert "Add the process environment to zuul.conf parser"" 2019-11-02 09:10:18 +09:00
client.py authentication config: add optional max_validity_time, skew 2019-12-10 16:39:29 +01:00
executor.py Change default job_dir location 2019-06-13 13:43:16 -07:00
fingergw.py Remove default user for fingergw 2019-02-07 12:33:25 -08:00
manage_ansible.py Improve functionality and docs around ansible installation 2019-11-25 17:05:58 -08:00
merger.py Import Zuul modules at top of files 2018-03-05 11:23:32 +01:00
migrate.py dict_object.keys() is not required for *in* operator 2018-12-03 12:04:55 +05:30
scheduler.py Add caching of autohold requests 2019-09-16 10:46:36 -04:00
web.py Web: plug the authorization engine 2019-07-30 15:32:31 +00:00