-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add support for application credentials #300
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FYI: When you're specifying application credentials, especially by id and a password, there is no need to request domain/project/username. application credentials are project scoped by default. You need only the keystone auth URL, credentials ID and credentials password.
username="{{ .Values.username }}" | ||
password="{{ .Values.password }}" | ||
{{- end }} | ||
{{- if .Values.applicationCredentialID }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did you omit the applicationCredentialName
by purpose to avoid end user confusion?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wanted to keep it simple. Especially if we want to support adding secrets in the Gardener dashboard, this can become quite cumbersome. It also produces additional test effort.
Is there any good reason to use applicationCredentialName
(together with userName
or a user id) instead of applicationCredentialID
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any good reason to use...
applicationCredentialName
may contain a hint for its purpose, but it adds additional complexity for providing a proper username and domain name, or just a userid.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
applicationCredentialName
is supported now, too.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@MartinWeindel I'd revert the applicationCredentialName
support for now, because this may add extra confusion on the user end. See the detailed explanation of 3 auth cases: gophercloud/gophercloud#1365 (comment)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
P.S. I'm not against the applicationCredentialName
, but in order to speed-up the appCreds implementation I'd focus on appID only. The appName support can be added later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As new releases are needed for both the Openstack provider and the machine-controller-provider-openstack, I don't think it will be faster to remove the appName support now as it has already been tested.
@dkistner WDYT?
e5b315f
to
9adf589
Compare
@MartinWeindel You have pull request review with status CHANGES_REQUESTED, please check |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good to me.
/hold
Until we have a mcm openstack provider with gardener/machine-controller-manager-provider-openstack#26
4a52a3a
to
d14b8f7
Compare
d14b8f7
to
8bcec89
Compare
e5d8ee4
to
8bcec89
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
How to categorize this PR?
/area control-plane
/area security
/kind enhancement
/platform openstack
What this PR does / why we need it:
The provider secret for Openstack can contain the keys
applicationCredentialID
andapplicationCredentialSecret
as alternative to authentication with username/passwordWhich issue(s) this PR fixes:
Fixes #4
Special notes for your reviewer:
This PR is depending on a new release of the machine-controller-manager-provider-openstack which includes PR gardener/machine-controller-manager-provider-openstack#26
Release note: