Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(gcs): support import grants for gcs provider #360

Merged
merged 4 commits into from
Feb 16, 2023
Merged

Conversation

rahmatrhd
Copy link
Member

No description provided.

@mabdh
Copy link
Member

mabdh commented Feb 15, 2023

@rahmatrhd looks like there is a flaky test there

@coveralls
Copy link

coveralls commented Feb 15, 2023

Pull Request Test Coverage Report for Build 4190432758

  • 16 of 59 (27.12%) changed or added relevant lines in 2 files are covered.
  • 2 unchanged lines in 1 file lost coverage.
  • Overall coverage decreased (-0.2%) to 75.127%

Changes Missing Coverage Covered Lines Changed/Added Lines %
plugins/providers/gcs/provider.go 16 18 88.89%
plugins/providers/gcs/client.go 0 41 0.0%
Files with Coverage Reduction New Missed Lines %
api/handler/v1beta1/grpc.go 2 90.91%
Totals Coverage Status
Change from base Build 4180688987: -0.2%
Covered Lines: 7714
Relevant Lines: 10268

💛 - Coveralls

plugins/providers/gcs/client.go Outdated Show resolved Hide resolved
plugins/providers/gcs/client.go Outdated Show resolved Hide resolved
plugins/providers/gcs/provider_test.go Outdated Show resolved Hide resolved
plugins/providers/gcs/provider_test.go Outdated Show resolved Hide resolved
@rahmatrhd rahmatrhd requested review from mabdh and haveiss February 16, 2023 03:33
@rahmatrhd rahmatrhd merged commit 3a88ce9 into 0.6.x Feb 16, 2023
@rahmatrhd rahmatrhd deleted the gcs-import-grants branch February 16, 2023 04:35
@rahmatrhd rahmatrhd added this to the v0.6.0 milestone Feb 20, 2023
@rahmatrhd rahmatrhd mentioned this pull request Feb 20, 2023
rahmatrhd added a commit that referenced this pull request Feb 20, 2023
* feat(idtoken-auth): add auth validator using google idtoken (#349)

* docs: add idtoken validation on sample config.yaml

* feat: add auth config to replace idtoken validator config, and refactor default auth header key

* refactor: move auth interceptor to pkg/auth

* chore: delete idtoken validator mock

* feat: keep config.AuthenticatedUserHeaderKey for backward-compatibility

* chore: re-order import

* refactor: change sample config.yaml for auth config

* chore: make auth user header key sample and default config consistent

* chore: re-order import on oidc test

* fix: change oidc initialism

* fix: oidc validator mocks renaming

* fix: avoid using params with pointer, as it will lead to panic if params is nil

* fix: detect old auth user header key using empty string instead of default tag

* refactor: move OIDCAuth to pkg/auth

* refactor: move oidc validator mocks into pkg/auth/mocks

* chore: add deprecation notes on AuthenticatedUserHeaderKey

* refactor: make default auth email context key back to unexported, use different context key for oidc email

* refactor: do not use default header key on oidc auth, use its own header (it's only used for logrus)

* refactor: move logrus context custom fields to new interceptor and retrieve its value from context

* refactor: auth email context key mapping for default and oidc used for grpc server

* test: change ways of getting user email from request header to context

* refactor: use auth.OIDCAuth instead of OIDCValidatorParams

* feat(gcs): support import grants for gcs provider (#360)

* feat(gcs): support import grants for gcs provider

* refactor(gcs): use projectID value from struct field and remove from GetBuckets' param

* refactor(gcs): refactor repeated logic to retrieve gcs client

* refactor(gcs): improve code readability

* fix(gcs): exclude deleted principals (#364)

* refactor(gcs): use account type whitelisting

* fix(gcs): exclude deleted principals

* fix(gcs): fix timeout by running getPolicy in parallel (#365)

---------

Co-authored-by: Pulung Ragil <swallowstalker@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants