...
Apologies
Agenda | Presenter | Duration | Discussion |
Manage Access Authorization to BB APIs | 30 minutes |
From Technical Committee Meeting: BBs should not own RBAC - the calling applications are responsible for it. Are we using token based authorization within the request to BB? How to get candidates bypass its own RBAC?
| |
Sandbox/Kubernetes/IM | 30 minutes | Vasil: In order to make deployments cloud agnostic, Sandbox is using Kubernetes. BBs are deployable images that can run in the Kubernetes cluster. Applications are packaged and run in the same way. What if an BB requires multiple images? Taylor: A BB should just expose a set of services. And it may require other applications/services behind the scenes. If the APIs/services are spread across multiple instances/containers, an adaptor should be used to mediate the different API calls. Every BB should expose 1 single service for its various APIs. The containers/services that it relies can be in the same environment/sandbox but don’t have to be. Wes: This type of implementation may not be needed in the sandbox (with full isolation, etc). Sandbox should be a simpler demonstration of implementing use cases using GovStack-compliant building blocks. We need clear guidance like the above on how a real GovStack implementation should work, and also a path forward for getting the sandbox up and running quickly - and define the requirements (ie. multi-tenancy not necessary)Act Action items:
| |
Technical Reviews of BB specs | 5 minutes | Arch team to review UI/UX work: https://app.gitbook.com/o/pxmRWOPoaU8fUAbbcrus/s/Xygp83qW0E147CCaqsI0/ | |
GERA Update | 15 minutes | Update on changes to GERA document and progress/next steps | |
Next steps/AOB | 5 minutes | What should we prioritize?
|
...