Closed pavolloffay closed 2 months ago
oh wait. what if the serviceaccount token changes, then all the cookies will be invalidated because the secret changed?
I'm assuming yes, how frecuent does the token changes?
oh wait. what if the serviceaccount token changes, then all the cookies will be invalidated because the secret changed?
I would expect this to happen.
I'm assuming yes, how frecuent does the token changes?
Since we are not setting expirationSeconds
... I think the token will not expire. If the token changes is because the service account changed and it will be removed or something. In that case, that is not usual, I think it should be ok to just log out all the users.
What do you think @rubenvp8510 @andreasgerstmayr? If you agree, please, merge the PR. Thanks!
oh wait. what if the serviceaccount token changes, then all the cookies will be invalidated because the secret changed?
I would expect this to happen.
I'm assuming yes, how frecuent does the token changes?
Since we are not setting
expirationSeconds
... I think the token will not expire. If the token changes is because the service account changed and it will be removed or something. In that case, that is not usual, I think it should be ok to just log out all the users.What do you think @rubenvp8510 @andreasgerstmayr? If you agree, please, merge the PR. Thanks!
If that is the case (the token doesn't expire and change only if the service account is updated), I think is an acceptable behavior. On the other side, if the token is expiring for example each 60 seconds or so, then it will be really annoying for the users to have to login again.
@pavolloffay I tested the fix and it is working fine. I didn't see any reconciliation loop, the UI is not logging out and there are no significant increase in the metrics controller_runtime_reconcile_time_seconds_count{controller="tempostack"} controller_runtime_reconcile_time_seconds_count{controller="tempomonolithic"} I'll keep an eye during the release testing if I run into any issues.
All modified and coverable lines are covered by tests :white_check_mark:
Project coverage is 72.94%. Comparing base (
dd28af7
) to head (731c4c7
).
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.
Resolves #1018
See https://github.com/openshift/oauth-proxy?tab=readme-ov-file#other-configuration-flags
Tested with