-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: implements aws oidc backendSecurityPolicy API #306
Conversation
I think you are missing two things (not serious):
otherwise, looking good |
One scenario I realize that needs to be address is:
We may need to cache the oidc credentials and aws specific fields to compare. Else users will have to wait til expiration time (ie 1 hour for AWS or however long for OIDC) |
} | ||
|
||
// OIDCMetadata represents the OpenID Connect provider metadata | ||
type OIDCMetadata struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can use this type from go-oidc
https://github.com/coreos/go-oidc/blob/v3/oidc/oidc.go#L181
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Missing the field ScopesSupported
- will see how we can include it
10553c4
to
1eab805
Compare
Thought I had enough test coverage - will bump that up |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good job! i am still half way through it but left some comments!
secret := &corev1.Secret{} | ||
if err := k8sClient.Get(ctx, client.ObjectKey{ | ||
Namespace: namespace, | ||
Name: name, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you add a prefix like ai-eg-bsp-
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Initially it was used to create any secrets but I've modified it to be bsp specific. Added a prefix. Kept LookUpSecret without prefix because it's being used to get more than bsp secrets (primarily in testing).
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Dan Sun <[email protected]>
Signed-off-by: Dan Sun <[email protected]>
Signed-off-by: Dan Sun <[email protected]>
e963652
to
dc5f31c
Compare
@mathetake this is ready for final review |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor comments but good to go!
Co-authored-by: Takeshi Yoneda <[email protected]> Signed-off-by: Aaron Choo <[email protected]>
Co-authored-by: Takeshi Yoneda <[email protected]> Signed-off-by: Aaron Choo <[email protected]>
Co-authored-by: Takeshi Yoneda <[email protected]> Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
Signed-off-by: Aaron Choo <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍
**Commit Message** The PR implements the backendSecurityPolicy API for AWS's OIDC credentials. **Related Issues/PRs (if applicable)** **Special notes for reviewers (if applicable)** I've tested the implementation with our SSO (oauth2), and was able to query bedrock. --------- Signed-off-by: Aaron Choo <[email protected]> Co-authored-by: Dan Sun <[email protected]> Co-authored-by: Takeshi Yoneda <[email protected]> Signed-off-by: Loong <[email protected]>
Commit Message
The PR implements the backendSecurityPolicy API for AWS's OIDC credentials.
Related Issues/PRs (if applicable)
Special notes for reviewers (if applicable)
I've tested the implementation with our SSO (oauth2), and was able to query bedrock.