Conversation
|
Important Review skippedAuto reviews are disabled on this repository. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
Tip 💬 Introducing Slack Agent: The best way for teams to turn conversations into code.Slack Agent is built on CodeRabbit's deep understanding of your code, so your team can collaborate across the entire SDLC without losing context.
Built for teams:
One agent for your entire SDLC. Right inside Slack. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
3d3b97d to
6482646
Compare
|
Question: if we are moving client_id to be configured per trust, what do we do with client_secret when this authentication method is used? It should correspond to client_id |
I don't have an answer for this. With mTLS it is easy because there is one certificate, which is to be allowed in N identity providers. With client secret its tough, because N identity providers define N client secrets. For now the restriction seems to be, that all identity providers have to use the same client secret. |
@alienvspredator we could define a "credential resolver" interface, which receives the credentialResolver:
default:
secretRef: # https://github.com/openkcm/common-sdk/blob/main/pkg/commoncfg/config.go#L191
named:
- name: <client_id>
secretRef: ... |
Move the
client_idfrom the config into the database trust table.Deprecate the
client_idin the config, but leave it there to enable the data migration.