Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update KEYCLOAK_BASE_URL secret handling #1731

Merged
merged 1 commit into from
Oct 7, 2024

Conversation

gustavolira
Copy link
Contributor

The KEYCLOAK_BASE_URL is now fetched from a file instead of being hard-coded. This change enhances security by avoiding the storage of sensitive URLs directly in the configuration files. Additionally, the corresponding base64 value in the secrets YAML has been updated to a placeholder.

Description

Please explain the changes you made here.

Which issue(s) does this PR fix

  • Fixes #?

PR acceptance criteria

Please make sure that the following steps are complete:

  • GitHub Actions are completed and successful
  • Unit Tests are updated and passing
  • E2E Tests are updated and passing
  • Documentation is updated if necessary (requirement for new features)
  • Add a screenshot if the change is UX/UI related

How to test changes / Special notes to the reviewer

The KEYCLOAK_BASE_URL is now fetched from a file instead of being hard-coded. This change enhances security by avoiding the storage of sensitive URLs directly in the configuration files. Additionally, the corresponding base64 value in the secrets YAML has been updated to a placeholder.

Signed-off-by: Gustavo Lira <guga.java@gmail.com>
@gustavolira gustavolira requested a review from a team as a code owner October 6, 2024 19:13
Copy link

sonarcloud bot commented Oct 6, 2024

Copy link
Contributor

github-actions bot commented Oct 6, 2024

The image is available at: quay.io/janus-idp/backstage-showcase:pr-1731!

@subhashkhileri
Copy link
Member

/lgtm

Copy link

openshift-ci bot commented Oct 7, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: subhashkhileri

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved label Oct 7, 2024
@openshift-merge-bot openshift-merge-bot bot merged commit 5e49845 into janus-idp:main Oct 7, 2024
8 checks passed
Copy link
Member

@josephca josephca left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@subhashkhileri
Copy link
Member

/cherry-pick release-1.3

@openshift-cherrypick-robot

@subhashkhileri: new pull request created: #1744

In response to this:

/cherry-pick release-1.3

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@subhashkhileri
Copy link
Member

/cherry-pick 1.2.x

@openshift-cherrypick-robot

@subhashkhileri: new pull request created: #1745

In response to this:

/cherry-pick 1.2.x

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

zdrapela pushed a commit to zdrapela/backstage-showcase that referenced this pull request Oct 8, 2024
The KEYCLOAK_BASE_URL is now fetched from a file instead of being hard-coded. This change enhances security by avoiding the storage of sensitive URLs directly in the configuration files. Additionally, the corresponding base64 value in the secrets YAML has been updated to a placeholder.

Signed-off-by: Gustavo Lira <guga.java@gmail.com>
zdrapela pushed a commit to zdrapela/backstage-showcase that referenced this pull request Oct 8, 2024
The KEYCLOAK_BASE_URL is now fetched from a file instead of being hard-coded. This change enhances security by avoiding the storage of sensitive URLs directly in the configuration files. Additionally, the corresponding base64 value in the secrets YAML has been updated to a placeholder.

Signed-off-by: Gustavo Lira <guga.java@gmail.com>
openshift-merge-bot bot pushed a commit that referenced this pull request Oct 8, 2024
* Fix `droute` limiting attachment size (#1741)

* Update KEYCLOAK_BASE_URL secret handling (#1731)

The KEYCLOAK_BASE_URL is now fetched from a file instead of being hard-coded. This change enhances security by avoiding the storage of sensitive URLs directly in the configuration files. Additionally, the corresponding base64 value in the secrets YAML has been updated to a placeholder.

Signed-off-by: Gustavo Lira <guga.java@gmail.com>

---------

Signed-off-by: Gustavo Lira <guga.java@gmail.com>
Co-authored-by: Gustavo Lira e Silva <guga.java@gmail.com>
openshift-merge-bot bot pushed a commit that referenced this pull request Oct 8, 2024
* Update KEYCLOAK_BASE_URL secret handling (#1731)

The KEYCLOAK_BASE_URL is now fetched from a file instead of being hard-coded. This change enhances security by avoiding the storage of sensitive URLs directly in the configuration files. Additionally, the corresponding base64 value in the secrets YAML has been updated to a placeholder.

Signed-off-by: Gustavo Lira <guga.java@gmail.com>

* Fix `droute` limiting attachment size (#1741)

---------

Signed-off-by: Gustavo Lira <guga.java@gmail.com>
Co-authored-by: Gustavo Lira e Silva <guga.java@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants