-
Notifications
You must be signed in to change notification settings - Fork 118
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
operator-route-playbook: add check for auth.strategey if running on openshift (OSSM8665) #859
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
auth.strategy
does not matter when determining is_openshift. The internal setting is_openshift is ONLY ever determined by what cluster it is. We never look at auth.strategy anywhere to determine if is_openshift is true. So this is an invalid PR change.
Can you explain more what you mean "does not honor custom route"? |
The reason why I say this is invalid is because we still need If you, for example, set auth.strategy to anonymous, and this PR is in effect, you will get invalid ConsoleLinks created (and most likely get an operator abort since |
@jmazzitelli setting auth.strategy to According to the documentation and when setting |
Ah!! That's the missing piece! OK. I see now. This isn't directly related to the strategy, but if ingress is disabled, we need to:
I created a github issue for this: kiali/kiali#8023 |
This is what we need (this isn't everything - I need to figure out the best way to skip creating the clusterrole/bindings for the OAuthClient - probably just need to add it to "Process OpenShift OAuth client" task) |
@michaelalang I'm going to close this PR in lieu of this PR: #860 In that new PR, I think I have this fixed, along with added molecule test code to make sure it doesn't break anything else. I'm still testing, but I think that PR has everything covered. |
The Kiali operator does not honor a custom route even when
with reconciliation errors
Reason for that is the playbook only checks for is_openshift but does not account for a different auth strategy.