[wip] support JupyterHub access scopes #863
Draft
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Draft because I'm not sure what the defaults/backward-compatiibility should be
Most details can be found in #829 but this would allow standard and more fine-grained control of access to the gateway service for tokens. The default is currently unchanged, for maximum compatibility.
To enable this with users being able to access this service by default from their server (minimal change from current default capabilities), a deployment needs to:
dask-gateway
)access:services!service=dask-gateway
scope via the defaultuser
role (or a different role, if it should be less than all users, which is part of the point)Spawner.server_token_scopes
(or theserver
role, prior to JupyterHub 4.0)The main idea of this is it enables both:
since as it is now, JupyterHubAuth grants any token provided to any jupyterhub service full access to the dask gateway.
TODO:
closes #829