Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove OIDC service account, when OIDC feature is disabled again #7459

Closed
creydr opened this issue Nov 20, 2023 · 5 comments · Fixed by #7570
Closed

Remove OIDC service account, when OIDC feature is disabled again #7459

creydr opened this issue Nov 20, 2023 · 5 comments · Fixed by #7570
Assignees
Labels
help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. kind/bug Categorizes issue or PR as related to a bug. triage/accepted Issues which should be fixed (post-triage)

Comments

@creydr
Copy link
Member

creydr commented Nov 20, 2023

Currently the OIDC service accounts are not removed, when the authentication-oidc feature is disabled again. This should be changed, so that the OIDC related service accounts do only exist, when the feature is enabled.

The following resources are affected:

@creydr creydr added kind/bug Categorizes issue or PR as related to a bug. help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. labels Nov 20, 2023
@xiangpingjiang
Copy link
Contributor

/assign

@Cali0707 Cali0707 added the triage/accepted Issues which should be fixed (post-triage) label Dec 5, 2023
@Leo6Leo
Copy link
Member

Leo6Leo commented Jan 5, 2024

@xiangpingjiang Happy new year pingjiang! Do you need any help on this issue?

@pawarpranav83
Copy link
Contributor

pawarpranav83 commented Jan 9, 2024

Hey! Can I work on this issue? @Leo6Leo

Approach - we create a function that checks whether the service account exists or not, if it does, we call the kubeclient.CoreV1().ServiceAccounts(...).Delete(...). And this function is then called in the else block of - SetupOIDCServiceAccount() in which we already check for the flag and is used by the above components.
And add a test for this situation.

} else {
setAuthStatus(nil)
marker.MarkOIDCIdentityCreatedSucceededWithReason(fmt.Sprintf("%s feature disabled", feature.OIDCAuthentication), "")
}

@Leo6Leo
Copy link
Member

Leo6Leo commented Jan 9, 2024

Hi @xiangpingjiang

I hope you're doing well! We've noticed that there hasn't been much activity on this issue recently and we've missed your input. We just wanted to check in and see if everything is okay!

I understand that life gets busy and priorities can shift. If you have already starting tackling this issue, that's great! Please let us know if you need any support. However, if you're tied up with other commitments, no worries at all - just give us a heads-up so we can reassign the issue to another volunteer @pawarpranav83 who's eager to contribute!

Please let me know by commenting here within next 24 hours, otherwise I will be assigning this issue to @pawarpranav83 !

@Leo6Leo
Copy link
Member

Leo6Leo commented Jan 10, 2024

Hey @xiangpingjiang ! As I didn't hear back from you in the past 24 hour, I will un-assign this issue from you for now to leave the opportunity open for other contributors! There are other issues still available in the repo, feel free to take a look at here for more information!

Hey @pawarpranav83 , thanks for offering help on this issue! I will assign this issue to you, and feel free to let us know if have any questions, we are here to help :))
/assign @pawarpranav83

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. kind/bug Categorizes issue or PR as related to a bug. triage/accepted Issues which should be fixed (post-triage)
Projects
Status: ✅ Done
Development

Successfully merging a pull request may close this issue.

5 participants