@@ -26,15 +26,15 @@ type TokenIssuer struct {
26
26
Tenant string
27
27
}
28
28
29
- func (issuer * TokenIssuer ) GenerateUserToken (groups []string , username string , email string , hasAdminAccess bool , hasApplicationAccess bool , hasOpsAccess bool , beta bool ) (* string , error ) {
29
+ func (issuer * TokenIssuer ) GenerateUserToken (groups []string , username string , email string , hasAdminAccess bool , hasApplicationAccess bool , hasOpsAccess bool ) (* string , error ) {
30
30
31
31
var auths = GetUserNamespaces (groups )
32
32
33
33
duration , err := time .ParseDuration (issuer .TokenDuration )
34
34
current := time .Now ().Add (duration )
35
35
url , _ := url .Parse (issuer .PublicApiServerURL )
36
36
37
- if beta && ( hasAdminAccess || hasApplicationAccess || hasOpsAccess ) {
37
+ if hasAdminAccess || hasApplicationAccess || hasOpsAccess {
38
38
utils .Log .Info ().Msgf ("The user %s will have transversal access ( admin: %v, application: %v, ops: %v )" , username , hasAdminAccess , hasApplicationAccess , hasOpsAccess )
39
39
auths = []* types.Project {}
40
40
}
@@ -65,7 +65,7 @@ func (issuer *TokenIssuer) GenerateUserToken(groups []string, username string, e
65
65
return & signedToken , err
66
66
}
67
67
68
- func (issuer * TokenIssuer ) baseGenerateToken (auth types.Auth , beta bool ) (* string , error ) {
68
+ func (issuer * TokenIssuer ) baseGenerateToken (auth types.Auth ) (* string , error ) {
69
69
70
70
userDN , mail , err := ldap .AuthenticateUser (auth .Username , auth .Password )
71
71
if err != nil {
@@ -77,7 +77,7 @@ func (issuer *TokenIssuer) baseGenerateToken(auth types.Auth, beta bool) (*strin
77
77
utils .TokenCounter .WithLabelValues ("token_error" ).Inc ()
78
78
return nil , err
79
79
}
80
- token , err := issuer .GenerateUserToken (groups , auth .Username , * mail , ldap .HasAdminAccess (* userDN ), ldap .HasApplicationAccess (* userDN ), ldap .HasOpsAccess (* userDN ), beta )
80
+ token , err := issuer .GenerateUserToken (groups , auth .Username , * mail , ldap .HasAdminAccess (* userDN ), ldap .HasApplicationAccess (* userDN ), ldap .HasOpsAccess (* userDN ))
81
81
82
82
if err != nil {
83
83
utils .TokenCounter .WithLabelValues ("token_error" ).Inc ()
@@ -95,12 +95,7 @@ func (issuer *TokenIssuer) GenerateJWT(w http.ResponseWriter, r *http.Request) {
95
95
io .WriteString (w , "Basic Auth: Invalid credentials" )
96
96
}
97
97
98
- betaMode := false
99
- if r .Header .Get ("X-API-MODE" ) == "beta" {
100
- betaMode = true
101
- }
102
-
103
- token , err := issuer .baseGenerateToken (* auth , betaMode )
98
+ token , err := issuer .baseGenerateToken (* auth )
104
99
if err == nil {
105
100
utils .Log .Info ().Msgf ("Granting token for user %v" , auth .Username )
106
101
w .WriteHeader (http .StatusCreated )
@@ -117,11 +112,6 @@ func (issuer *TokenIssuer) GenerateJWT(w http.ResponseWriter, r *http.Request) {
117
112
func (issuer * TokenIssuer ) GenerateConfig (w http.ResponseWriter , r * http.Request ) {
118
113
err , auth := issuer .basicAuth (r )
119
114
120
- betaMode := false
121
- if r .Header .Get ("X-API-MODE" ) == "beta" {
122
- betaMode = true
123
- }
124
-
125
115
if err != nil {
126
116
utils .Log .Info ().Err (err )
127
117
utils .Log .Info ().Msg (err .Error ())
@@ -130,7 +120,7 @@ func (issuer *TokenIssuer) GenerateConfig(w http.ResponseWriter, r *http.Request
130
120
131
121
}
132
122
133
- token , err := issuer .baseGenerateToken (* auth , betaMode )
123
+ token , err := issuer .baseGenerateToken (* auth )
134
124
if err == nil {
135
125
utils .Log .Info ().Msgf ("Granting token for user %v" , auth .Username )
136
126
} else {
0 commit comments