Skip to content

Conversation

@Goutham024
Copy link

@Goutham024 Goutham024 commented Oct 28, 2025

Description

Linked to #4365

Type of change

  • feat: New feature (non-breaking change which adds functionality)

Checklist:

  • My code follows the style guidelines of this project
  • PR title conforms to commit message guideline ## Commit Message Structure Guideline
  • I have commented my code, particularly in hard-to-understand areas. In JS I did provide JSDoc
  • I have made corresponding changes to the documentation
  • My changes generate no new warnings
  • I have added tests that prove my fix is effective or that my feature works
  • New and existing unit tests pass locally with my changes
  • The java tests in the area I was working on leverage @nested annotations
  • Any dependent changes have been merged and published in downstream modules

@havenkat
Copy link

This is corresponding to the issue : #4365

@pablocarle
Copy link
Contributor

Hi, we currently have a gateway/api/v1/auth/ticket endpoint that can create a passticket for a given user, I believe it is protected by client certificate authentication (i.e. service to service)
Could this be an enhancement on that existing endpoint? Am I missing something?

@pablocarle pablocarle changed the title Passticket delegations feat: Passticket delegations Oct 29, 2025
@pablocarle
Copy link
Contributor

Also, please make sure you commit signed-off commits only, you can find a git command to fix the current ones if you click on the DCO item from the workflow list

@EvaJavornicka EvaJavornicka moved this from New to In Progress in API Mediation Layer Backlog Management Oct 29, 2025
@balhar-jakub
Copy link
Member

Would you be able to join us on the API ML Squad call to discuss the integration and the implementation?

@havenkat
Copy link

@pablocarle @balhar-jakub appreciate your help and review.

  • I had reviewed /auth/ticket api, and understood that it is generating the passticket for the currently logged-in user, that is user in the jwt token.

My requirement is : service generates a passticket for a user, and we have only emailid of that user at this time.

Yes, I would like to join the call, also @Joe-Winchester is part of that call to discuss the same.

Goutham024 and others added 16 commits October 29, 2025 19:17
… an existing authentication

Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Pablo Carle <[email protected]>
Co-authored-by: Pablo Carle <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Renovate Bot <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Pablo Carle <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Co-authored-by: Pablo Carle <[email protected]>
Co-authored-by: ac892247 <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Richard Salac <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Renovate Bot <[email protected]>
Co-authored-by: Renovate Bot <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Pablo Carle <[email protected]>
Co-authored-by: Pablo Carle <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
achmelo and others added 27 commits October 29, 2025 19:17
Signed-off-by: ac892247 <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Pablo Carle <[email protected]>
Co-authored-by: Pablo Carle <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Co-authored-by: Pablo Carle <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
…ed & add AT-TLS support to DC (zowe#4347)

Signed-off-by: Pavel Jareš <[email protected]>
Signed-off-by: Andrea Tabone <[email protected]>
Co-authored-by: Pavel Jareš <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Signed-off-by: achmelo <[email protected]>
Co-authored-by: Pavel Jareš <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Co-authored-by: Zowe Robot <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: ac892247 <[email protected]>
Co-authored-by: Zowe Robot <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
Signed-off-by: Gowtham Selvaraj <[email protected]>
@pablocarle
Copy link
Contributor

@pablocarle @balhar-jakub appreciate your help and review.

* I had reviewed /auth/ticket api, and understood that it is generating the passticket for the currently logged-in user, that is user in the jwt token.

My requirement is : service generates a passticket for a user, and we have only emailid of that user at this time.

Yes, I would like to join the call, also @Joe-Winchester is part of that call to discuss the same.

Got it, yes, and the lack of user credentials to create a PassTicket for a user is a conflicting topic, it probably can't go out without restrictions as it opens the door to create any PassTicket for any user and ApplId without properly verifying credentials.
We can have a discussion in the Squad call, would you be able to join next one next Wednesday?

@Goutham024
Copy link
Author

@pablocarle @balhar-jakub I encountered multiple merge conflicts while rebasing for the DCO fix, as the branch was behind 155 commits with v3.x.x. After trying to sync with the latest changes, the conflicts became quite extensive and time-consuming to resolve. To simplify the process, I’ve created a new PR instead. Please review the PR linked below going forward.

#4368

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

Status: In Progress

Development

Successfully merging this pull request may close these issues.