-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
make configure awsoidc-idp
transparent
#46747
make configure awsoidc-idp
transparent
#46747
Conversation
2d7cf2b
to
da5197f
Compare
configure awsoidc-idp
transparent
96ae986
to
40f9a01
Compare
40f9a01
to
dd4ca5e
Compare
@webvictim @stevenGravy let us know what you think about the updated output. thanks! |
Adding links to the actual resource might be useful as well. |
you mean the |
lib/integrations/awsoidc/testdata/TestConfigureIdPIAMOutput.golden
Outdated
Show resolved
Hide resolved
Not only the OIDC IdP issuer's url but all the resources.
Extracting the important parts on the log lines is not easy if we don't add an extra visual artifacts. |
I like the new output! @marcoandredinis I don't think adding full URLs and/or emojis to lines is necessary unless we require the user to click on them. It will just confuse people otherwise. |
lib/integrations/awsoidc/testdata/TestConfigureIdPIAMOutput.golden
Outdated
Show resolved
Hide resolved
Oh, I see you mean linking to every created resource. Since it's all tagged and we show the tags I think the resources are at least easy enough to track down by tag anyway, so let's at least limit scope for now and not link all resources. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Though I personally would vote for the detailed confirmation as an "opt-in" behavior rather than default.
keep in mind that people will be running this command with Roman suggested an interactive menu to show/hide details, but I'd like to defer on that for now. |
Applies to the integration command that the web UI discover flows tell users to run in AWS CloudShell to setup the AWS OIDC identity provider: teleport integration configure awsoidc-idp The command describes itself, its actions, and the desired state after it runs. It then prompts the user (by default) to confirm the action plan before proceeding. The confirmation prompt can be overridden with cli flag --confirm if desired. The IAM role it configures is no longer required to have the "ownership" tags that teleport applies if it's created by teleport, since the user is now prompted for confirmation before making changes. This allows a user to configure an existing IAM role without tagging the role for configuration by teleport. The command will still attempt to ensure the IAM role it configures has teleport tags, but failing to do so is only a warning.
0067358
to
7b8be35
Compare
@GavinFrazar See the table below for backport results.
|
Related issues:
Applies to the integration command that the web UI discover flows tell users to run in AWS CloudShell to setup the AWS OIDC identity provider:
The command describes itself, its actions, and the desired state after it runs.
It then prompts the user (by default) to confirm the action plan before proceeding.
The confirmation prompt can be overridden with cli flag
--confirm
if desired.The IAM role it configures is no longer required to have the "ownership" tags that teleport applies if it's created by teleport, since the user is now prompted for confirmation before making changes.
This allows a user to configure an existing IAM role without tagging the role for configuration by teleport.
The command will still attempt to ensure the IAM role it configures has teleport tags, but failing to do so is only a warning.
An example of the output is available as a golden test, but I'll provide a real one here as well:
Updated:
TODO
I'll update the other integration commands that users run as part of the flow in followup PRs.
I decided not to include those changes in this PR because the change diff was quite large.