Paulo Barros activity https://gitlab.com/paulobarros 2026-03-18T19:37:47Z tag:gitlab.com,2026-03-18:5219227736 Paulo Barros commented on issue #594044 at GitLab.org / GitLab 2026-03-18T19:37:47Z paulobarros Paulo Barros

FYI @m_frankiewicz @dzubova

tag:gitlab.com,2026-03-18:5219214759 Paulo Barros opened issue #594044: [Feature flag] Cleanup bso_minimal_access_fallback at GitLab.org / GitLab 2026-03-18T19:33:06Z paulobarros Paulo Barros

Summary

This issue is to cleanup the bso_minimal_access_fallback feature flag, after the feature flag has been enabled by default for an appropriate amount of time in production.

The feature controls the behavior of falling back to Minimal Access when provisioning users through SAML, SCIM, or LDAP when Block Seat Overages (BSO) is enabled and no seats are available. The flag was enabled by default in 18.10 (!225777).

Related:

Owners

  • Team: Seat Management
  • Most appropriate slack channel to reach out to: #g_seat_management
  • Best individual to reach out to: @paulobarros
  • PM: @m_frankiewicz

Stakeholders

  • Support Team (may receive tickets about unexpected role assignments)

Expectations

What might happen if this goes wrong?

The cleanup MR itself should be low-risk since the flag is already enabled by default. Removing the flag makes the behavior permanent. If an issue is discovered post-cleanup, the fix would require reverting the cleanup MR to re-introduce the flag.

Cleaning up the feature flag

  • Specify in the issue description if this feature will be removed completely or will be productized as part of the Feature Flag cleanup
  • Verify that external API consumers (e.g., IDE extensions, CLI tools) that may check this feature flag have been updated or can gracefully handle its removal.
  • Create a merge request to remove bso_minimal_access_fallback feature flag. Ask for review and merge it.
    • Remove all references to the feature flag from the codebase.
    • Remove the YAML definitions for the feature from the repository.
    • Create a changelog entry.
  • Ensure that the cleanup MR has been deployed to both production and canary. If the merge request was deployed before the code cutoff, the feature can be officially announced in a release blog post.
    • /chatops run auto_deploy status <merge-commit-of-cleanup-mr>
  • Close the feature issue to indicate the feature will be released in the current milestone.
  • If not already done, clean up the feature flag from all environments by running these chatops command in #production channel: /chatops run feature delete bso_minimal_access_fallback --dev --pre --staging --staging-ref --production
  • Close the rollout issue.
tag:gitlab.com,2026-03-17:5214976334 Paulo Barros commented on issue #589462 at GitLab.org / GitLab 2026-03-17T22:13:48Z paulobarros Paulo Barros

@dzubova I had a look at the code and given the context shared by Vij and Aish above, I'd estimate this as a weight 3. The main investigation is whether there's been a regression in the members added event, or if seat assignment records are missing for another reason (e.g. members provisioned via SAML/SCIM perhaps? 🤔). WDYT?

tag:gitlab.com,2026-03-17:5214729782 Paulo Barros commented on merge request !226913 at GitLab.org / GitLab 2026-03-17T21:01:15Z paulobarros Paulo Barros

@kategrechishkina Good news: the fix was merged yesterday and it seems it will be included in 18.10!

image

Be aware that the customer will have to enable the ldap_raise_on_search_error feature flag to use the improved logic.

tag:gitlab.com,2026-03-17:5214715345 Paulo Barros commented on merge request !227546 at GitLab.org / GitLab 2026-03-17T20:56:06Z paulobarros Paulo Barros

Hey @karichards, could you review this follow-up?

tag:gitlab.com,2026-03-17:5214616774 Paulo Barros pushed to project branch pb/6054/ldap-search-error-handling-improvements at GitLab.org / GitLab 2026-03-17T20:23:25Z paulobarros Paulo Barros

Paulo Barros (cbc6b593) at 17 Mar 20:23

Improve LDAP search error logging and clean up response codes

tag:gitlab.com,2026-03-16:5210357728 Paulo Barros commented on epic #12452 at GitLab.org 2026-03-16T23:11:37Z paulobarros Paulo Barros

Status update as of 2026-03-16

Summary

  1. % Complete: 81%
  2. Status: Needs attention

Results

bso_minimal_access_fallback feature flag was enabled by default. BSO warnings for existing and new LDAP/SAML/SCIM configurations are now complete.

Progress

workflowcomplete

workflowin review

workflowready for development

workflowrefinement

FYI @m_frankiewicz @dzubova @lwanko @karichards

tag:gitlab.com,2026-03-16:5209814982 Paulo Barros opened merge request !227546: Improve LDAP search error logging and clean up response codes at GitLab.org / GitLab 2026-03-16T19:28:12Z paulobarros Paulo Barros

Follow-up to !226913.

What does this MR do and why?

  1. Fixes a logging gap where non-error LDAP response codes (10, 32) were silently returned without logging. All non-zero codes now log a warning before the allowlist check.

  2. Removes codes 3 (TIMELIMIT_EXCEEDED) and 4 (SIZELIMIT_EXCEEDED) from NON_ERROR_LDAP_RESPONSE_CODES. These codes are already handled by net-ldap as successful searches and never reach check_empty_response_code.

References

MR acceptance checklist

Evaluate this MR against the MR acceptance checklist.

tag:gitlab.com,2026-03-16:5209812762 Paulo Barros pushed new project branch pb/6054/ldap-search-error-handling-improvements at GitLab.org / GitLab 2026-03-16T19:27:24Z paulobarros Paulo Barros

Paulo Barros (8373165a) at 16 Mar 19:27

Improve LDAP search error logging and clean up response codes

tag:gitlab.com,2026-03-16:5209187179 Paulo Barros commented on merge request !226913 at GitLab.org / GitLab 2026-03-16T16:24:05Z paulobarros Paulo Barros

@kategrechishkina Right, codes 3/4 are in net-ldap's ResultCodesSearchSuccess so they return results directly, not nil. If an admin wants to retry on those they can use retry_empty_result_with_codes. On the logging gap, agreed, I'll track that in the follow-up issue.

However, despite all the efforts I'm afraid it's unlikely that this fix will be merged on time for 18.10.

cc @m_frankiewicz @dzubova

tag:gitlab.com,2026-03-16:5208409880 Paulo Barros commented on issue #589462 at GitLab.org / GitLab 2026-03-16T13:41:38Z paulobarros Paulo Barros

Apologies @dzubova, I was supposed to have a look at this but got sidetracked. I will do it later today. Thanks for the patience.

tag:gitlab.com,2026-03-16:5208335019 Paulo Barros commented on merge request !226913 at GitLab.org / GitLab 2026-03-16T13:27:00Z paulobarros Paulo Barros

@lwanko @sgarg_gitlab Good call on the naming, renamed the FF to ldap_raise_on_search_error. On codes 3/4, net-ldap treats those as successful searches and returns results directly, so they wouldn't normally hit check_empty_response_code. Code 32 was a deliberate choice since it covers legitimate cases like a deleted LDAP group. These could use a closer look though, I'll create a follow-up issue for it.