-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ROX-17335: Reconcile auth provider + groups declaratively. #1156
Conversation
Skipping CI for Draft Pull Request. |
/test |
@dhaus67: No presubmit jobs available for stackrox/acs-fleet-manager@yann/ROX-16734-fleetshard_configure_audit_log_notifier In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
return false, false, err | ||
} | ||
|
||
centralClient := centralClientPkg.NewCentralClientNoAuth(*central, address) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: is it possible to change signatures so we would pass just central
here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's worthwhile changing the signature, but not for NewCentralClient..
but rather isCentralDeploymentReady
, getServiceAddress
, and authProviderName
. They don't require a pointer being passed.
209ba3f
to
ff9029c
Compare
6ecf340
to
dd864ab
Compare
Current dependencies on/for this PR: This comment was auto-generated by Graphite. |
5145a83
to
d83d095
Compare
Description
This PR adds the capability to reconcile auth provider configuration declaratively instead of imperatively as done previously via separate API calls to Central.
In essence, the declarative config secret will now include an additional key of
default-sso-auth-provider
which contains all previously existing configuration in the form of declarative configuration.Additionally, the previously used code was deleted which was now rendered unused after the refactoring.
One caveat exists within the PR:
For a limited time (namely until ROX-17336 has landed), we will have auth providers created in two different ways: the "legacy" way via API calls, as well as the "new" way via declarative config.
During that period, in case we reconcile Central with the "legacy" auth provider, we will create declarative configs for the auth providers, but the configuration will fail to be applied due to a name uniqueness violation.
This isn't as bad though, since we ensure that these errors will not be highlighted to the customer, and once we migrate we can do so with virtually no downtime for existing clients.
Checklist (Definition of Done)
Test manual
- [ ] Documentation added if necessary (i.e. changes to dev setup, test execution, ...)ROX-12345: ...
- [ ] Discussed security and business related topics privately. Will move any security and business related topics that arise to private communication channel.- [ ] Add secret to app-interface Vault or Secrets Manager if necessary- [ ] RDS changes were e2e tested manually- [ ] Check AWS limits are reasonable for changes provisioning new resourcesTest manual