New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move security protocol #759
Conversation
@miq-bot add_label euwe/no |
Know other provider maintainers who could take a look at this? |
Thanks for thorough screenshots :-) LGTM 👍. cc @Ladas @blomquisg |
@miq-bot add-labels compute/infrastructure, middleware |
This pull request is not mergeable. Please rebase and repush. |
@miq-bot assign @israel-hdez |
@josejulio please rebase |
@abonas rebasing seems to be a bit tricky. |
@jhernand can you take a look? |
@tzumainn can you into this PR to do the same for OpenStack.. protocol first then port |
It turns out it wasn't that tricky thanks to this: cff36d4...6653e31#diff-f5d9ed4e8acd0a9cb7e661a8571697f1 |
Port value is affected by Security Protocol, when one protocol is selected it sets the default port value (on some providers) of the protocol.
6e646ff
to
81b93e2
Compare
Checked commits josejulio/manageiq-ui-classic@6ee34bd~...81b93e2 with ruby 2.2.6, rubocop 0.47.1, and haml-lint 0.20.0 |
@Loicavenel @tzumainn this PR already affects Openstack (see screenshots). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Tried it. Works fine when adding a new middleware provider. In other affected places, the form is being displayed correctly, but cannot confirm if submitting the form still works (although I don't see anything that could break the other forms)
Looks good to me. In oVirt there is no way to select the security protocol, as it is mandatory to use TLS, so this shouldn't affect. @josejulio would be nice if you can add an screen shot showing the result of New infrastructure provider but selecting Red Hat Virtualization, just to make sure that it still looks correct. |
@jhernand Sure, I just updated the screenshots to include that one. |
Thanks @josejulio, that looks correct. |
@josejulio very thorough, kudos! |
Thanks! |
@AparnaKarve please review/merge, it has been acked by multiple reviewers |
LGTM. |
@miq-bot add_label enhancement |
As pointed by @abonas on #460 (comment) it would be better to have
security protocol
beforeport
.@Loicavenel commented that we should at least reverse
port
andsecurity protocol
(#460 (comment)).@cben proposed to mimic the URI structure (protocol://hostname:port) (#460 (comment)) which is included on this PR.
Since this fields are shared among other providers I'm doing this change in a separate PR expecting other provider maintainers who use these two fields would comment / review that it indeed won't break anything for them or at least notify them of this change.
If needed I could move
security protocol
beforeport
.Additionally I'm fixing ham-lint warnings on that file.
Here are some screenshots of providers that i saw are using the
Security Protocol
.Containers provider
Infrastructure provider
Cloud provider
Middleware provider
@cben could you please take a look?