-
Feature
-
Resolution: Unresolved
-
Critical
-
None
-
None
Overview
For XCMSTRAT-574, to support external auth IdP to be created
asynchronous in ARO-HCP, the external auth IdP needs to support the following status: pending, installing, ready, error
pending - the external IdP config POST request is received by Cluster Service and persisted in the DB
installing - a worker updates the manifestwork with the external auth IdP config in the HostedCluster resource
ready - the external auth IdP config is applied by the control plane operator, the client secret has been created on the guest cluster, and the api-server pods rolled-over
error - the external auth IdP config failed to apply, with an error message indicating the failure, and whenever the error is recoverable
To support this feature, one or more status conditions on the HostedCluster resource are required to allow CS to show that the external auth IdP config provided by the customer is ready, or failed to apply due to error(s).
ARO-HCP also supports patching the external auth IdP. The status condition should reset when the external auth IdP is updated in the hosted cluster.
When the external auth IdP information is removed from the hosted cluster, the status condition should indicate if the updated configuration applied successfully or failed.
Updates 26.06.2025
- This feature will focus on delivering a condition reflecting the existence of the day-2 client secret(s) only as part of 4.20.
- Reflecting the health status of OIDC Client is a more involved work that will be done on a later feature.
- The acceptance criteria below is updated to reflect that
Acceptance Criteria
- When creating/updating the oidc provider configuration in the HostedCluster resource (day-1)
- The HostedCluster exposes a status condition reflecting that the client secret(s) don't exist.
- When the end-user creates all client secrets on the hosted cluster (day-2)
- The exposed HostedCluster status condition will change to reflect that all client secret(s) exist.
- If one or more client secrets don't exist on the hosted cluster
- The exposed HostedCluster status condition will still reflect that client secret(s) don't exist.
- It should be possible to identify, through the exposed condition, which client secrets are still missing.
- is blocked by
-
OCPBUGS-61432 No oidcClient conditions are set when OIDC client secret is missing
-
- ON_QA
-
-
OCPSTRAT-2173 Allow hosted cluster that uses external OIDC providers to be created with empty client secret
-
- Release Pending
-
- links to