OIDC App Up Versioning
Upversioned the oidc-auth-apps to latest stable versions to pick up the latest CVE fixes. Images From To ------------- ------- ------- helm-charts/dex 0.18.0 0.20.0 dex v2.40.0 v2.41.1 curl 8.8.0 8.11.1 stx-oidc-client stx.9.0-v1.0.7 stx.11.0-v1.0.8 CVE report comparison CVEs CVEs Images Before Up Version After Up Version ------------------ ----------------- ---------------- ghcr.io/dexidp/dex 23 11 curl 14 0 stx-oidc-client 49 2 Test Plan: PASS: Build an master ISO without the the changes. PASS: Build an master ISO with the the changes. PASS: Deploy a SX and a DX system. PASS: The test plan was performed for all kubernetes version available into the image: 1.24.4, 1.25.3, 1.26.1, 1.27.5, 1.28.4, 1.29.2(Default), 1.30.6 PASS: Apply & Test procedure: - Apply oidc-auth-apps acording 'Set up OIDC Auth Applications' guide. The oidc-auth-apps should be applied successfully. - Once oidc-auth-apps in applied status, perform oidc-auth-apps test by creating a user, apply rolebiding and authenticate it using oidc-auth command, check if the new user can send k8s commands based on its roles. - Authenticate using the Remote CLI method, should work. - Authenticate using the WEB Method by accessing the url https://<OAM_IP>:30555, you should be served with a webpage and be able to authenticate through oidc as well. PASS: Update test: - Do the test case 'Apply & Test procedure' to the previous oidc-auth-apps version. - Build oidc-auth-apps tarball with the changes. - Consindering the old oidc-auth-apps in apply state. update the current oidc-auth-apps using the command: system application-update oidc-auth-apps-<version>.tgz. The oidc-auth-apps should be applied automatically. PASS: Installation from scratch: - Remove & delete the oidc-auth-apps with the command: system application-remove oidc-auth-apps and system application-delete oidc-auth-apps - Install from scratch oidc-auth-apps-<version>.tgz using the command: system application-upload oidc-auth-apps-<version>.tgz - Redo the test case 'Apply & Test procedure'. PASS: Full deploy test: - Build an ISO with the changes. - Deploy a system. - Do the test case 'Apply & Test procedure'. The new oidc-auth-apps should be applied successfully. PASS: The app 'intel-device-plugins-operator' also share the same secret-observer helm chart, It is important to build, upload and apply this app to check if there are no impacts: - Build the intel-device-plugins-operator with this change - system application-upload intel-device-plugins-operator.tgz - apply first the app node-feature-discovery with is required by the intel-device-plugins-operator - check the helm-override-list and make sure secret-observer helm is there, command: system helm-override-list intel-device-plugins-operator --long - apply the app: system application-apply intel-device-plugins-operator, the app should be applied successfuly. - check the intel-device-plugins-operator pods: kubectl get pods -A Story: 2011328 Task: 51669 Change-Id: I8020e7b9283b67e8f66a47a2e31836e1596145b5 Signed-off-by: Joaci Morais <joaci.demorais@windriver.com>
This commit is contained in:
parent
5f44337342
commit
67e3bcc864
@ -1,11 +1,11 @@
|
||||
#
|
||||
# Copyright (c) 2021-2024 Wind River Systems, Inc.
|
||||
# Copyright (c) 2021-2025 Wind River Systems, Inc.
|
||||
#
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
#
|
||||
|
||||
image: docker.io/curlimages/curl
|
||||
imageTag: 8.8.0
|
||||
imageTag: 8.11.1
|
||||
namespace: default
|
||||
|
||||
RoleBinding:
|
||||
|
Loading…
x
Reference in New Issue
Block a user