KES Auth Path Status
Token Acquisition Method
The canonical repo auth fixture remains the existing dev impersonation flow:
Resolving locale, route permissions, and workspace projection.
النطاق الحالي: ضيف
الفئة: 10_normative | الإصدار: v1.0.0
المالك: DOCUMENT_CUSTODIAN | دورة المراجعة: 90 يومًا
جهة الاعتماد: GOVERNANCE_ADMIN
بوابة الوثائق للقراءة فقط. نقاط نهاية التعديل والتغيير معطلة.
منصة Kvary أُنشئت أصلًا باللغة الجورجية. وحيثما تتوفر نسخة جورجية، تبقى الجورجية هي اللغة المعتمدة لواجهة المنصة والوثائق والتفسير القانوني.
تُوفَّر الترجمات إلى اللغات الأخرى لسهولة الاستخدام فقط. وقد تنشأ بعض السجلات بلغات أخرى وتحمل لغة مصدر أو لغة قانونية خاصة بذلك المسار، ولكن حيثما تتوفر نسخة جورجية تكون الأولوية للنسخة الجورجية في صياغة المنصة وتفسيرها.
البيانات الوصفية غير مكتملة: Document ID, Version, Status, Owner Role, Last Review Date, Next Review Date, Change Log
The canonical repo auth fixture remains the existing dev impersonation flow:
POST /auth/dev/impersonatePOST /api/v1/auth/dev/impersonateThis sprint confirmed that this is still the intended token-acquisition method for dev happy-path checks.
In this Docker rehearsal environment, full svc-auth could not be used because it still fails to boot cleanly with the pre-existing native sharp linux runtime mismatch. Because of that, the working parity check used a contract-compatible access token fixture:
JWT_SECRETGateway behavior is unchanged.
requireGatewayAuth(...) in middleware.ts:
/auth/meConfirmed outcomes:
401 missing_bearer_token401 invalid_access_tokenKES host behavior is unchanged.
buildRequireServiceAuth(...) in auth.ts:
/auth/meThis sprint clarified the earlier failure stage:
401 invalid_access_token happened before /auth/meIn the isolated rehearsal stack, /auth/me was provided by the already-running contract-compatible auth stub from Sprint 93 because full svc-auth remained unavailable in this container environment.
Correct direct service mutation path:
/kes-orchestrator/process-mapCorrect gateway mutation path:
/api/v1/kes/orchestrator/process-mapThe earlier temporary API 404 is now classified precisely:
/api/v1KES mutation auth path is working for the checked first-cut runtime surface.
Confirmed with authenticated happy-path checks:
svc-kes hostNo KES-specific HTTP auth-path blocker remains for the checked routes.
The remaining auth caveat is environmental:
svc-auth was still unavailable in this Docker setup because of the existing native sharp runtime mismatchThat caveat does not look like a KES runtime drift issue.