-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add simple provider #97
Conversation
|
||
func usesRedirectURI(connectorType string) bool { | ||
switch connectorType { | ||
case "ldap", "authproxy", "atlassian-crowd", "keystone": |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These types do not use callback so it would cause an error to inject redirectURI.
@@ -197,6 +198,16 @@ func getProvidersFromConfig(credentials Config, include string, log logr.Logger) | |||
return providers, nil | |||
} | |||
|
|||
func includeProvider(include string, provider string) bool { | |||
if provider == simpleprovider.ProviderName { | |||
return false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The simple type does not allow access to the idp and therefore can not create a new credential. It needs to be set up manually.
When updating credentials however, the old one will be kept.
I'm fine with the code, but it would be good to add some documentation. You forgot to add "if one credential leaks then all clusters are compromised" to the list of benefits :P |
@kopiczko I added some documentation with stronger mention of the implications. |
Towards giantswarm/roadmap#2988
This adds the simple provider to dex operator.
The provider works by simply copying existing connector data to dex-apps across an MC and injecting the callback URIs.
It has the following benefits