[arvados] updated: 2.6.0-535-gafac7abd6f

git repository hosting git at public.arvados.org
Thu Aug 24 19:12:12 UTC 2023


Summary of changes:
 doc/admin/upgrading.html.textile.liquid | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

       via  afac7abd6f7ee614cd1bbe7413d196f7c149387e (commit)
      from  9717f88d29310067fa70e19fb9afb3679c036bc4 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.


commit afac7abd6f7ee614cd1bbe7413d196f7c149387e
Author: Brett Smith <brett.smith at curii.com>
Date:   Thu Aug 24 15:11:32 2023 -0400

    20750: Fix documentation link typo
    
    Arvados-DCO-1.1-Signed-off-by: Brett Smith <brett.smith at curii.com>

diff --git a/doc/admin/upgrading.html.textile.liquid b/doc/admin/upgrading.html.textile.liquid
index 7c521a24ba..5aec1cbb6d 100644
--- a/doc/admin/upgrading.html.textile.liquid
+++ b/doc/admin/upgrading.html.textile.liquid
@@ -50,7 +50,7 @@ The defaults for all of these options match the previous behavior of @arvados-lo
 
 h3. API clients can always retrieve their current token, regardless of scopes
 
-We have introduced a small exception to the previous behavior of "Arvados API token scopes":{{ site.baseurl }}:/admin/scoped-tokens.html in this release. A valid token is now always allowed to issue a request to "@GET /arvados/v1/api_client_authorizations/current@":{{ site.baseurl }}/api/methods/api_client_authorizations.html#current regardless of its scopes. This allows clients to reliably determine whether a request failed because a token is invalid, or because the token is not permitted to perform a particular request. The API server itself needs to be able to do this to validate tokens issued by other clusters in a federation.
+We have introduced a small exception to the previous behavior of "Arvados API token scopes":{{ site.baseurl }}/admin/scoped-tokens.html in this release. A valid token is now always allowed to issue a request to "@GET /arvados/v1/api_client_authorizations/current@":{{ site.baseurl }}/api/methods/api_client_authorizations.html#current regardless of its scopes. This allows clients to reliably determine whether a request failed because a token is invalid, or because the token is not permitted to perform a particular request. The API server itself needs to be able to do this to validate tokens issued by other clusters in a federation.
 
 h3. UseAWSS3v2Driver option removed
 

-----------------------------------------------------------------------


hooks/post-receive
-- 




More information about the arvados-commits mailing list