8000 [ENHANCEMENT] Update configuration md file also oauth helper by Labiote · Pull Request #2329 · perses/perses · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

[ENHANCEMENT] Update configuration md file also oauth helper #2329

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 2 commits into from

Conversation

Labiote
Copy link
@Labiote Labiote commented Oct 11, 2024

Description

Pull request for : #2322

Updating configuration.md to have correct parameters names. Also updating oauth-configuration-helpers.md to have an example of keycloak authentication with no tls. Also updating TLSConfig builder to use MinVersion and MaxVersion parameters instead of default ones.

Screenshots

Checklist

  • Pull request has a descriptive title and context useful to a reviewer.
  • Pull request title follows the [<catalog_entry>] <commit message> naming convention using one of the
    following catalog_entry values: FEATURE, ENHANCEMENT, BUGFIX, BREAKINGCHANGE, DOC,IGNORE.
  • All commits have DCO signoffs.

UI Changes

  • Changes that impact the UI include screenshots and/or screencasts of the relevant changes.
  • Code follows the UI guidelines.
  • Visual tests are stable and unlikely to be flaky.
    See Storybook
    and e2e docs for more details. Common issues
    include:
    • Is the data inconsistent? You need to mock API requests.
    • Does the time change? You need to use consistent time values or mock time utilities.
    • Does it have loading states? You need to wait for loading to complete.

Signed-off-by: Buatois Florian <buatois.florian@gmail.com>
perses#2322)

Signed-off-by: Buatois Florian <buatois.florian@gmail.com>
```yaml
authentication:
providers:
oauth:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did you try with oidc? I believe that if oidc works, giving just the issuer URL would be simpler than all the URLs one by one

@@ -84,4 +84,8 @@ type TLSConfig struct {
ServerName string `yaml:"serverName,omitempty" json:"serverName,omitempty"`
// Disable target certificate validation.
InsecureSkipVerify bool `yaml:"insecureSkipVerify" json:"insecureSkipVerify"`
// Minimum acceptable TLS version.
MinVersion string `yaml:"minVersion" json:"minVersion" default:"TLS12"`
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

😲 is that default really working? I'd doubt that the config library take it into account. Specially if you use env variable to configure as lamenv library doesn't support it for sure.
We always use the verify method to setup defaults. I think for the env var and for consistency, we should use the same here.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

default doesn't work. I just tried with go playground.

If we want to define a default value we will have to override the method Unmarshal of the yaml and json package + define the Verify the method for the Perses config

@Nexucis
Copy link
Member
Nexucis commented Nov 25, 2024

@Labiote would you like to finish this PR ?

@Nexucis
Copy link
Member
Nexucis commented Jan 25, 2025

@Labiote any chance you would like to update this PR ? It's been a while I know and documentations has changed since, but these changes are still accurate I believe.

@Nexucis
Copy link
Member
Nexucis commented Feb 10, 2025

closing this PR in favor of #2619. Thank you for proposing these changes @Labiote.

@Nexucis Nexucis closed this Feb 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0