Skip to content

Conversation

@matt-codecov
Copy link
Contributor

@matt-codecov matt-codecov commented Dec 16, 2025

we will mount k8s secrets as files. our config schema must therefore be updated to take key files rather than key material.

additionally, a PublicKeyDirectory struct is now created on service initialization which pre-reads the key files and pre-parses them into DecodingKeys.

related to https://github.com/getsentry/ops/pull/18477

Ref FS-160
Ref FS-161

@linear
Copy link

linear bot commented Dec 16, 2025

@jan-auer jan-auer enabled auto-merge (squash) December 17, 2025 20:35
@jan-auer jan-auer merged commit e6dd4ea into main Dec 17, 2025
19 checks passed
@jan-auer jan-auer deleted the matt/auth-key-files branch December 17, 2025 20:36
matt-codecov added a commit that referenced this pull request Dec 18, 2025
depends on:
- #240
- #237
- #243

rust and python e2e tests now have authorization checks enabled. i added
new test cases to ensure requests fail when the token has the wrong
scope or wrong permissions, but currently the server throws 500 for any
issue so the tests can't actually assert 403 like they should

i am told the `.secret_scan_ignore` file should prevent our scanners
from yelling about the checked-in test keys. the format with escaped
slashes is strange but that's what was on the doc i was sent ¯\_(ツ)_/¯

Ref FS-202
jan-auer added a commit that referenced this pull request Dec 18, 2025
* main:
  tests(client): enable authorization tokens in e2e client tests (#231)
  feat(auth): python client support for bearer auth (#240)
  ref(auth): read public keys from files on init (#243)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants