Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NETOBSERV-489: Use authorize feature from console plugin API #175

Merged

Conversation

OlivierCazade
Copy link
Contributor

This PR enable the new option from the console from this PR:

netobserv/network-observability-console-plugin#198

//+kubebuilder:default:=false
// sendAuthToken is a flag to enable or disable forwarind auth token
// if enabled, this overide loki.sendAuthToken
ForwardUserAuthToken bool `json:"forwardUserAuthToken,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Following the API recommendations, discouraging the use of bools, maybe I'd move this to a string property. Something like: userAuthToken: {BLOCK | FORWARD}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe we should merge with FlowCollectorLoki.SendAuthToken to a single enum then ? 🤔

Copy link
Contributor Author

@OlivierCazade OlivierCazade Oct 4, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I changed the value to an enum.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe we should merge with FlowCollectorLoki.SendAuthToken to a single enum then ? thinking

FlowCollectorLoki.SendAuthToken apply to both FLP and Console plugin while this new value only apply to the Console Plugin.

Also FlowCollectorLoki.SendAuthToken is still required for FLP when the user token forwarding is enabled.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. My thinking was about having FlowCollectorLoki.SendAuthToken as:

enum:
  - IGNORE
  - SERVICE_ACCOUNTS
  - MIXED
  type: string

With proper documentation to explain MIXED behavior

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

@Amoghrd
Copy link
Contributor

Amoghrd commented Oct 3, 2022

/ok-to-test

@openshift-ci openshift-ci bot added the ok-to-test To set manually when a PR is safe to test. Triggers image build on PR. label Oct 3, 2022
@github-actions
Copy link

github-actions bot commented Oct 3, 2022

New image: ["quay.io/netobserv/network-observability-operator:15353db"]. It will expire after two weeks.

@github-actions github-actions bot removed the ok-to-test To set manually when a PR is safe to test. Triggers image build on PR. label Oct 4, 2022
@Amoghrd
Copy link
Contributor

Amoghrd commented Oct 4, 2022

/ok-to-test

@openshift-ci openshift-ci bot added the ok-to-test To set manually when a PR is safe to test. Triggers image build on PR. label Oct 4, 2022
@github-actions
Copy link

github-actions bot commented Oct 4, 2022

New image: ["quay.io/netobserv/network-observability-operator:df99708"]. It will expire after two weeks.

Copy link
Contributor

@mariomac mariomac left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. I haven't tested it.

@OlivierCazade
Copy link
Contributor Author

/approve

@openshift-ci
Copy link

openshift-ci bot commented Oct 5, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: OlivierCazade

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved label Oct 5, 2022
@openshift-merge-robot openshift-merge-robot merged commit 3717cbc into netobserv:main Oct 5, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved lgtm ok-to-test To set manually when a PR is safe to test. Triggers image build on PR.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants