Sorry for taking so long to reply.
The trouble in this case is that given a user's email address, if the user has never logged in we don't know what their identity will be.
I'll share the tricky case below, so you're aware of how things can go wrong, and then we can think about appropriate workarounds.
But we can't do it until then, so for many use cases it doesn't solve things.
IMO, this means that a good solution to your problem will have to force the user to log in somewhere.
There's another nasty wrinkle lurking.
In practice, this almost never happens, but it is important to note. I'll mention it again later on, below.
If you know that the username matches the email address, you could pre-provision the identity
You mentioned this in your mail, so I take it you know about it. But for the listhost, a quick rundown...
This is somewhat "risky", because if you're wrong, you end up with an ACL for "
lu...@example.edu" which does nothing and may confuse people.
But it is supported for the case where you really know.
Another thing you can do is to run your own web application where users log in and which handles "post login sharing".
(I know you said you're doing everything with the CLI, but I think it's just not going to cut it in this case.)
I don't want to understate how much work it is to run your own app for this integration, especially if you need it to be available 24x365.
I hesitate to even recommend it unless you plan to process a very large number of users through this flow.
But with the Globus SDK, it is quite doable and the logic is pretty simple, so I'd like to at least share how it's done.
Here's what I have in mind:
- Register a client with credentials
- Make the client identity an access manager on your endpoint so it can create ACLs using its own identity
- You will need to request scopes: "openid email profile urn:globus:auth:scope:auth.globus.org:view_identity_set"
- Setup a simple mapping of email addresses to desired ACLs. e.g. map "
lu...@example.edu" to "rw, <endpoint-id>, /some/path", in config or a small DB
- Whenever a user logs in, your application will do these steps
2. Look for the email addresses not only in the effective identity, but in all identities in the "identity_set" field
It might be best for you to just try the call and look at the response payload -- make sure it has the "identity_set" field, which it only gets from the "view_identity_set" scope above.
3. Map all of the user's email addresses to any "prepared ACLs" in your config store
4. Have the *application act as itself* and create any "prepared ACLs"
- For this you need to use client credentials to get a token. We want a Transfer token which can act as your app, not the user who is logging in.
5. (Optional) Redirect the user to the Globus WebApp
I'm not sure if this is behavior will be stable and supported long-term, but today you can even specify an endpoint and path for the user, as in
so it's possible to send the user to an endpoint+path where data was just shared.
Even without having built or tested such a solution, I'm 99.9% confident that it works and solves your use-case.
The only wrinkle is the case where two identities have the same email address -- either they both could get ACLs added, or it's first-come-first-served.
The downside, of course, is that someone has to go build it.
I think you should weigh it against your current workaround of having the users tell you their usernames, and decide whether or not it will save effort.
(Also, obviously once you write it, you could reuse the code for other things.)
I really wish I could present you with a simpler workaround or solution.
Ideally just "here's 60 lines of inscrutable bash which does what you want with the CLI" :-)
Sadly, the situation with email addresses is nefarious.
Properly handling them requires that you "store and defer" activities which relate to the user in question, and then trigger those activities only once the user has logged in.
In this particular case, it's reasonable to say "couldn't Globus just do this for us?"
However, in the general case, we're talking about storing and deferring an arbitrary action -- not just sharing -- and things get difficult quickly.
We also have to contend with the "two identities share an email" case I mentioned before.
While an application could easily make a decision for a specific use-case, deciding on a globally applicable behavior or even just a good default for a configurable behavior is hard.
It's likely that there's another workaround that I haven't thought of.
If you come up with one, or if you have questions about the proposed solution above, or even if you decide that it's not worth the time sink to build an app for this, please give us a shout.
I'd love to hear your feedback on this and whether or not it's viable for you.
Best,
-Stephen