Skip to content

Align OIDC repo config error expectations#4

Closed
jfw-ppi wants to merge 1 commit intomasterfrom
codex/fix-issue-5676
Closed

Align OIDC repo config error expectations#4
jfw-ppi wants to merge 1 commit intomasterfrom
codex/fix-issue-5676

Conversation

@jfw-ppi
Copy link
Owner

@jfw-ppi jfw-ppi commented Dec 28, 2025

Summary

  • update OIDC repo config negative tests to expect missing OIDC secrets in both service and client configurations

Testing

  • make test (fails: controller-gen download hit 502 from sum.golang.org)

Codex Task

@jfw-ppi jfw-ppi closed this Dec 28, 2025
@jfw-ppi jfw-ppi deleted the codex/fix-issue-5676 branch December 28, 2025 22:17
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +105 to 109
oidcParameters := map[string]interface{}{}
for _, oidcProperty := range OidcProperties {
if val, exists := propertiesMap[string(oidcProperty)]; exists {
oidcParameters[string(oidcProperty)] = val
} else {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Avoid copying client OIDC creds into service config

The service repo config now iterates over OidcProperties (which includes client_secret, username, password), so those client-only credentials are embedded into the service feature_store.yaml that gets injected into server pods (via TMP_FEATURE_STORE_YAML in the operator). This unnecessarily broadens exposure of end-user credentials and allows any server container/process to read them, even though the server side only needs client_id and auth_discovery_url (per the OIDC server config). Consider keeping the service config limited to OidcServerProperties so client credentials stay out of server pod env/config.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant