-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
salt,ui: Prefix OIDC claims with oidc:
#3054
Conversation
Hello alexandre-allard-scality,My role is to assist you with the merge of this Status report is not available. |
Waiting for approvalThe following approvals are needed before I can proceed with the merge:
Peer approvals must include at least 1 approval from the following list: |
@@ -13,7 +13,7 @@ export function initialize(apiUrl) { | |||
export function authenticate(user) { | |||
var payload = { | |||
eauth: 'kubernetes_rbac', | |||
username: user.profile.email, | |||
username: `oidc:${user.profile.email}`, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't this be done on the Salt eauth side instead?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No because Salt eauth module can also authenticate other types of users (especially thinking about the storage-operator ServiceAccount). The UI knows that this user is coming from OIDC, so it seems reasonable to handle it like this.
2617414
to
2f851c6
Compare
Branches have divergedThis pull request's source branch To avoid any integration risks, please re-synchronize them using one of the
Note: If you choose to rebase, you may have to ask me to rebuild |
This warrants a changelog entry, and a documentation update for how to create (Cluster)RoleBindings. |
2f851c6
to
5968792
Compare
Waiting for approvalThe following approvals are needed before I can proceed with the merge:
Peer approvals must include at least 1 approval from the following list: |
This is needed to avoid name collision between different authentication plugins. Refs: #3051
5968792
to
b014b24
Compare
/approve |
Waiting for approvalThe following approvals are needed before I can proceed with the merge:
Peer approvals must include at least 1 approval from the following list:
The following options are set: approve |
In the queueThe changeset has received all authorizations and has been added to the The changeset will be merged in:
The following branches will NOT be impacted:
There is no action required on your side. You will be notified here once IMPORTANT Please do not attempt to modify this pull request.
If you need this pull request to be removed from the queue, please contact a The following options are set: approve |
I have successfully merged the changeset of this pull request
The following branches have NOT changed:
Please check the status of the associated issue None. Goodbye alexandre-allard-scality. |
Component: salt, ui
Context:
Summary:
Acceptance criteria:
Closes: #3051