This commit introduces a more secure method for verifying user access to the internal launchpad by hashing email addresses. - Replaces the plain-text email list with SHA-256 hashes. - Adds a script to generate these hashes from `iap-users.txt`. - Updates the launchpad HTML to hash the input email and compare it against the `allowed-hashes.json` file. - Updates Makefile to generate hashes before deploy and serve. - Adds .keep file for krow_client folder.
15 lines
422 B
Plaintext
15 lines
422 B
Plaintext
# List of authorized users for the Krow DevOps Launchpad
|
|
# Format: one email per line, lines starting with # are comments
|
|
#
|
|
# Users must be listed here to access the Launchpad via Firebase Auth.
|
|
# Both internal (@krowwithus.com) and external emails are supported.
|
|
|
|
user:admin@krowwithus.com
|
|
|
|
# External users - Oloodi employees
|
|
user:boris@oloodi.com
|
|
user:achintha.isuru@oloodi.com
|
|
|
|
# External users - Legendary employees
|
|
|