Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP: proof-of-concept merge #513

Closed
wants to merge 31 commits into from
Closed

WIP: proof-of-concept merge #513

wants to merge 31 commits into from

Conversation

illume
Copy link
Contributor

@illume illume commented Nov 17, 2021

I reduced the proof-of-concept down to 7 commits without the meta data stuff. I left the proof-of-concept branch there, and made a new proof-of-concept2 branch.

Four groups of commits

  • backend: Add OIDC Login Token auth endpoint

  • Makefile: Run codegen in backend target

  • frontend: Allow to change and show application.product_id
  • backend: Validate apps' product-id format before setting the app
  • backend: Use a cache for quickly getting the apps' IDs
  • backend: Add human-readable applications.product_id

  • backend: Replace gin with oapi-codegen and echo

Testing done

Had CI run on each commit, so each commit passes all checks.

@illume illume force-pushed the proof-of-concept2 branch 3 times, most recently from ef66d21 to aff0a2d Compare November 17, 2021 09:19
Previously we used gin server, this is replaced
with oapi-codegen and echo to generate client
and server stubs. This introduces a documentation
first approach for new endpoints.

Signed-off-by: Santhosh Nagaraj S <santhosh@kinvolk.io>
joaquimrocha and others added 5 commits November 17, 2021 16:22
A human readable product_id (app name) including a reverse domain is
allowed since omaha version 3. This human-readable name is much
easier to use compared to the long UUID id.

Now either product_id or id can be used to identify applications.
So we're sure to have updated files when touching the backend. It's also
better for CI since it may detect outdated generated files.
Adds a Login Token endpoint which authenticates the user
against the OIDC provider without the need for browser flow.

This endpoint can be used to authenticate programmatically.

Signed-off-by: Santhosh Nagaraj S <santhosh@kinvolk.io>
backend/pkg/api/groups.go Outdated Show resolved Hide resolved
backend/pkg/handler/app.go Outdated Show resolved Hide resolved
backend/api/spec.yaml Outdated Show resolved Hide resolved
@illume
Copy link
Contributor Author

illume commented Jan 3, 2022

I'm making a new squashed/rebased branch proof-of-concept3, and leaving this one around for history.

There's still a number of open conversations on here that I'll move into issues.

@illume
Copy link
Contributor Author

illume commented Jan 3, 2022

New PR is here (commits squashed and rebased against main) #546
I added issues for all the open conversations.

Closing this one now.

@illume illume closed this Jan 3, 2022
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants