Skip to content

Conversation

devguyio
Copy link
Contributor

@devguyio devguyio commented Oct 2, 2025

Note

The PR #1041 was introduced to fix a bug in client secret lookup in OIDC case, however it was reverted as it uncovered another bug that cause a release-blocking regression.

This PR is an attempt to fix both, the original bug and the uncovered bug that cause the regression.

Description

  1. Fixed OIDC client secret lookup in oidcsetup controller to use the correct informer, namespace (openshift-config) and dynamic secret name from the Authentication CR, instead of hardcoded values.

  2. Added condition cleanup in sync_v400 to properly clear the OIDCProviderTrustedAuthorityConfigGet degraded condition when authentication type changes from OIDC to non-OIDC (e.g., IntegratedOAuth). This prevents the Console Operator from remaining in a Degraded state indefinitely during rollback scenarios.

Copy link
Contributor

openshift-ci bot commented Oct 2, 2025

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Oct 2, 2025
@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Oct 2, 2025
@openshift-ci-robot
Copy link
Contributor

@devguyio: This pull request references Jira Issue OCPBUGS-61432, which is invalid:

  • expected the bug to be in one of the following states: NEW, ASSIGNED, POST, but it is MODIFIED instead

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

[!NOTE]
The PR #1041 was introduced to fix a bug in client secret lookup in OIDC case, however it was reverted as it uncovered another bug that cause a release-blocking regression.

This PR is an attempt to fix both, the original bug and the uncovered bug that cause the regression.

Description

  1. Fixed OIDC client secret lookup in oidcsetup controller to use the correct namespace (openshift-config) and dynamic secret name from the Authentication CR, instead of hardcoded values.

  2. Added condition cleanup in sync_v400 to properly clear the OIDCProviderTrustedAuthorityConfigGet degraded condition when authentication type changes from OIDC to non-OIDC (e.g., IntegratedOAuth). This prevents the Console Operator from remaining in a Degraded state indefinitely during rollback scenarios.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. label Oct 2, 2025
Copy link
Contributor

openshift-ci bot commented Oct 2, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: devguyio
Once this PR has been reviewed and has the lgtm label, please assign therealjon for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@devguyio
Copy link
Contributor Author

devguyio commented Oct 3, 2025

/pj-rehearse

@devguyio
Copy link
Contributor Author

devguyio commented Oct 6, 2025

/payload-job e2e-aws-sno-external-oidc-configure

Copy link
Contributor

openshift-ci bot commented Oct 6, 2025

@devguyio: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • e2e-aws-sno-external-oidc-configure

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/b2a25b10-a2aa-11f0-9448-1ccf889bda9e-0

This commit addresses two issues related to OIDC authentication:

1. Fixed OIDC client secret lookup in oidcsetup controller to use
   the correct informer, namespace (openshift-config) and dynamic
   secret name from the Authentication CR, instead of hardcoded values.

2. Added condition cleanup in sync_v400 to properly clear the
   OIDCProviderTrustedAuthorityConfigGet degraded condition when
   authentication type changes from OIDC to non-OIDC (e.g.,
   IntegratedOAuth). This prevents the Console Operator
   from remaining in a Degraded state indefinitely during rollback
   scenarios.

The second fix follows the same pattern used in the oidcsetup
controller for clearing conditions when auth type is not OIDC.

Assisted-by: Claude Code 2.0.5, claude-sonnet-4-5@20250929
Signed-off-by: Ahmed Abdalla <[email protected]>
@devguyio devguyio force-pushed the cntrlplane-980-idp-status branch from 212fbfd to a63d396 Compare October 6, 2025 22:30
@devguyio
Copy link
Contributor Author

devguyio commented Oct 6, 2025

/payload-job e2e-aws-sno-external-oidc-configure

Copy link
Contributor

openshift-ci bot commented Oct 6, 2025

@devguyio: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • e2e-aws-sno-external-oidc-configure

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/648bde10-a304-11f0-9066-110d95fceb73-0

@devguyio devguyio marked this pull request as ready for review October 7, 2025 08:43
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Oct 7, 2025
@openshift-ci openshift-ci bot requested review from spadgett and TheRealJon October 7, 2025 08:44
Comment on lines +121 to +122
// Clear OIDC-related conditions when auth type is not OIDC
statusHandler.AddConditions(status.HandleProgressingOrDegraded("OIDCProviderTrustedAuthorityConfigGet", "", nil))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this the only external OIDC related status condition we need to clean up? Anything else that would make sense to clean up?

@everettraven
Copy link
Contributor

/payload-job e2e-aws-sno-external-oidc-revertoauth

Copy link
Contributor

openshift-ci bot commented Oct 7, 2025

@everettraven: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • e2e-aws-sno-external-oidc-revertoauth

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/ac25eb40-a376-11f0-9784-9932bfb8aff4-0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants