New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AUTH-373: add audit-ID headers to TokenReview and SAR requests #252
Conversation
once we show this installing, @dgoodwin could you/forrest kick the correct /payload job for 4.14 to see these lines appear? |
/payload 4.14 ci blocking |
@dgoodwin: trigger 4 job(s) of type blocking for the ci release of OCP 4.14
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/a316e6d0-c3fe-11ed-98bd-4daf04ae1e93-0 |
something broke during the bump, let me try to fix that |
/payload 4.14 ci blocking |
@stlaz: trigger 4 job(s) of type blocking for the ci release of OCP 4.14
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/626ad490-c4b0-11ed-9e55-a48e9f12e7ac-0 |
/test e2e-component |
/test e2e-component |
1 similar comment
/test e2e-component |
/test e2e-component |
/test e2e-component |
func auditIDRountripper(rt http.RoundTripper) http.RoundTripper { | ||
return roundTripFunc(func(r *http.Request) (*http.Response, error) { | ||
auditID := uuid.New().String() | ||
r.Header.Add("Audit-ID", auditID) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We don't need to check if the header is already set, right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that might actually be useful, good point
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ibihim, stlaz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest-required |
@stlaz: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
@stlaz: This pull request references AUTH-373 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/payload 4.14 ci blocking |
@neisw: trigger 4 job(s) of type blocking for the ci release of OCP 4.14
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/da175e30-ff04-11ed-91a1-88921c6eba1f-0 |
/payload 4.14 ci blocking |
@neisw: trigger 4 job(s) of type blocking for the ci release of OCP 4.14
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/f5e7b7e0-ff4a-11ed-81b3-9a0cfb6ec350-0 |
/label jira/valid-bug |
Adds an Audit-ID header to help troubleshoot TokenReview and SAR issues.
Also PR bumps the golang build image, kube and lib-go.
/cc @deads2k @ibihim