stackabletech / airflow-operator

Stackable Operator for Apache Airflow
Other
22 stars 2 forks source link

OpenID Connect Support #524

Closed Maleware closed 5 days ago

Maleware commented 1 week ago

Description

closes https://github.com/stackabletech/airflow-operator/issues/337

Definition of Done Checklist

# Author
- [x] Changes are OpenShift compatible
- [x] CRD changes approved
- [x] CRD documentation for all fields, following the [style guide](https://docs.stackable.tech/home/nightly/contributor/docs/style-guide).
- [x] Helm chart can be installed and deployed operator works
- [x] Integration tests passed (for non trivial changes)
- [x] Changes need to be "offline" compatible
# Reviewer
- [x] Code contains useful comments
- [ ] Code contains useful logging statements
- [x] (Integration-)Test cases added
- [x] Documentation added or updated. Follows the [style guide](https://docs.stackable.tech/home/nightly/contributor/docs/style-guide).
- [x] Changelog updated
- [x] Cargo.toml only contains references to git tags (not specific commits or branches)
# Acceptance
- [ ] Feature Tracker has been updated
- [ ] Proper release label has been added
- [ ] [Roadmap](https://github.com/orgs/stackabletech/projects/25/views/1) has been updated
Maleware commented 1 week ago
=== NAME  kuttl
    harness.go:407: run tests finished
    harness.go:515: cleaning up
    harness.go:572: removing temp folder: ""
--- PASS: kuttl (169.74s)
    --- PASS: kuttl/harness (0.00s)
        --- PASS: kuttl/harness/oidc_airflow-2.9.3_openshift-false (169.70s)
PASS
Maleware commented 1 week ago
=== NAME  kuttl
    harness.go:407: run tests finished
    harness.go:515: cleaning up
    harness.go:572: removing temp folder: ""
--- PASS: kuttl (184.54s)
    --- PASS: kuttl/harness (0.00s)
        --- PASS: kuttl/harness/oidc_airflow-2.9.3_openshift-false (184.50s)
PASS
adwk67 commented 5 days ago

Suggested comment for the release notes:

OpenID Connect is now supported by the airflow operator: this means that the necessary Flask dependencies have been added to the product image and that the operator can process OIDC authentication classes. It will still be necessary, however, for users to configure their own webserver configuration themselves, if they want to be directly redirected to the authentication authority.