Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[v2] Produce Network Observer Static Manifest YAML with Openshift Auth #1969

Open
c-kruse opened this issue Feb 20, 2025 · 0 comments
Open
Assignees

Comments

@c-kruse
Copy link
Contributor

c-kruse commented Feb 20, 2025

The skupper network-observer helm chart supports OpenShift authentication by way of introducing the oauth-proxy container in front of the observer deployment. Presently this is accomplished by generating the required cookie secret using a helm template on install here:

- --cookie-secret={{ (randAlphaNum 32 | nospace) }}

In order to produce a secure static yaml manifest file with this configuration enabled, it would require a new Job and associated RBAC resources in addition to the regular network observer deployment resources.

The purpose of this new Job would be only to generate a suitable cookie secret for the oauth-proxy to use.

Proposed solution

  • Add a new subcommand to either the network-observer, the skupper CLI or even the kube-adaptor that will ensure a suitable cookie-secret is present in a kubernetes secret.
  • Add a new Job resource (as a helm pre-install hook?) and associated RBAC resources to the network-observer chart that invokes that new command to generate the secret.
  • Update the chart to mount that secret to the proxy container and update the proxy command to pull that secret from a file instead of *argv.
@c-kruse c-kruse self-assigned this Feb 20, 2025
@c-kruse c-kruse changed the title [v2] Network Console Openshift Auth from Manifest YAML [v2] Produce Network Observer Static Manifest YAML with Openshift Auth Feb 20, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant