feat: support token auth for ManagedControlPlaneV2 #168
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What this PR does / why we need it:
Previously it was only possible to configure a ManagedControlPlaneV2 IAM with OIDC.
This PR introduces a static token configuration for the IAM.
A user can provide a list of named static token configurations. For each configuration, the openmcp-operator will create a AccessRequest and writes the kubeconfig secret to ManagedControlPlaneV2 access map.
In the access map all tokens will be prefixed with
token:
and all oidc configs will be prefixed withoidc:
to prevent name clashes.In order to make it easier for the user to identify what field does what, the oidc configuration has been restureuctured.
The default providers role bindings are now under
.spec.iam.oidc.defaultProvider
.Addition user specified OIDC providers are now specified under
.spec.iam.oidc.extraProviders
.Which issue(s) this PR fixes:
Fixes #260
Special notes for your reviewer:
Release note: