-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extend Kyma Provisioning Parameters to allow multiple OIDC definitions #423
Comments
Looks that Provisioner exposes APIs with pods and services CIDRs. We need to test it. |
As a first step we could enable that only for DEV landscape on a dedicated plan (
|
Proposed based on last planning: To preserve backward compatibility we would like to define a new parameter (e.g. "Additional OIDC") defined in the schema as a list. Old parameter will be functional and extended with requiredClaims. If user defined additional OIDC in the list and at the same time provides backward compatible one then we want to merge both. |
blocked by KIM. Kim must be released on prod first |
See what we need to do taking into account the migration: |
Here Information what KEB must support, kyma-project/kyma#18305 (comment) Design API and present to me. We need to keep backward compatibility. That means our current oidc attribute could be a single object or array. |
We would like to provide the user with only the OIDC array list schema in the cockpit, but we still need to accept the OIDC object type for backward compatibility.
Check if the schema supports loading the default OIDC as the first element of the array so that the default is defined explicitly. Below scenarios should be supported:
The update schema should also only list additionalOIDC array list. |
Description
Adjust set of input parameters of Kyma Service Instance Provisioning so that user can provide multiple OIDC configs (design
oidc
paramater so that in accepts a single config (for backwards compatibility) or an array).Extend the OIDC schema so that user could also define requiedClaims (key-value pairs) that are essential for secure GH workflow access.
AC
Phase 1: migration - Size/M
Phase 2: feature implementation - Size/L
Reasons
It is required to configure access to freshly created clusters via additional "workflow" OIDC
kyma-project/kyma#18305
Attachments
Progress:
The text was updated successfully, but these errors were encountered: