Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Temporarily disable configuring auth with secrets #329

Merged
merged 1 commit into from
Jun 30, 2023

Conversation

jastang
Copy link
Contributor

@jastang jastang commented Jun 30, 2023

Description of your changes

Remove the auth source of "Secret" to temporarily disable storing user credentials as Kubernetes secrets as we harden our security posture for the console.

I have:

  • Run make reviewable test to ensure this PR is ready for review.

How has this code been tested

Local build and deploy to control plane: https://console.upbound.io/upbound/controlPlanes/upbound:gcp-no-secrets. Tested create, edit, and delete functionality.

Note that there is no longer a dropdown to select the source as there is only one option (Upbound OIDC).

Signed-off-by: Jason Tang <jason@upbound.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants