feat(clusterkubeconfigs): enable organization and cluster level overrides with labels#1448
feat(clusterkubeconfigs): enable organization and cluster level overrides with labels#1448onuryilmaz merged 12 commits intomainfrom
Conversation
IvoGoman
left a comment
There was a problem hiding this comment.
client id & secret are essentially like username and password. We should not store them in resource metadata.
How about using the organisation's to store the override configuration.
e.g.
- cluster: "*" # all clusters
clientID:
secretRef: {}
clientSecret:
secretRef: {}
- cluster: "my-cluster" # only the "my-cluster"
clientID:
secretRef: {}
clientSecret:
secretRef: {}Then the controller get's the configuration from there and the values are kept hidden. Endusers might still get to see these, but only if they have permissions to retrieve the ClusterKubeConfigs. So we can still control who can/cannot access them.
Do you mean extending Organization API spec with something similar to: |
|
After discussing with @IvoGoman , the following approach should cover it best: Annotate the (Cluster-) Secrets with: greenhouse.sap/oidc-override: {
"clientIDReference" : {
"key": <secret-key>
"name": <secret-name>
}
"clientSecretReference": {
"key": <secret-key>
"name": <secret-name>
}
}This
WDYT? |
This approach sounds good, I will update this PR accordingly 👍 |
|
@uwe-mayer @IvoGoman annotation based overrides are implemented in this PR |
Description
This PR enables overriding client-id and client-secret values of
ClusterKubeconfigresources based on the labels assigned toOrganizationandClusterresources:What type of PR is this? (check all applicable)
Related Tickets & Documents
Closes #1402
Added tests?
Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration
Added to documentation?
Checklist