-
Notifications
You must be signed in to change notification settings - Fork 434
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document existing CF credential_client_id bind ressource #704
Document existing CF credential_client_id bind ressource #704
Conversation
credential_client_id is provided by cloudfoundry cloudcontroller in the binding resource since late 2017. See https://www.pivotaltracker.com/n/projects/966314/stories/151111701
Thanks for adding this to the spec @gberche-orange ! There seem to be some legitimate travis failures to investigate when you have the change: https://travis-ci.org/github/openservicebrokerapi/servicebroker/builds/661911797?utm_source=github_status&utm_medium=notification |
Fix formatting violation detected in travis build https://travis-ci.org/github/openservicebrokerapi/servicebroker/builds/661911797
Fix formating violations reported in travis build https://travis-ci.org/github/openservicebrokerapi/servicebroker/builds/663827743
thanks @mattmcneeney for your review and heads up on failed test. I've fixed the formatting violations reported by the build.
|
Yep you’re right. I’ve opened a PR to fix that so once that’s merged I’ll retrigger this build! |
@gberche-orange the PR makes sense, a quick question how would the broker discover the url of the credhub its supposed to put credentials in. OR that does not come thru the spec, its configured on the broker |
…cepts This is necessary to explain present of `credential_client_id` key
@tinygrasshopper thanks for the heads up. My reverse engineering of the presence of this field was incomplete (I haven't yet used this credhub ref feature but I'm keen to have it documented in the spec as I'm still observing it in OSB payloads my service brokers receive). Following a deeper read of https://www.pivotaltracker.com/n/projects/966314/stories/151111701 and credhub documentation, I've updated the PR to introduce the CloudFoundry service binding, service key and credhub reference concepts, and make it clear that the provisioning of credhub url and authN/authZ to Service Brokers is performed out of band. It might make sense to add to the specs the credential format when using credhub reference, likely in #683 or #116 |
@gberche-orange The way I read this change now is that Service Brokers may return a credhub reference for a 'service key' request, but not for a normal 'service binding'. Is that the correct reading or am I missing something? |
No, credhub references can be returned in both SB and SK, but the client_id is included in the bind resource only for SK. For a service binding, service brokers should grant the bound app (through its provided appguid) permission to read the CredHub reference For a service key, it is instead assumed that the credential will be looked up by the cloudcontroller (or another credhub client), and therefore the specified credhub client id should be granted permission to read the CredHub reference See
Does it make sense ? Maybe @zrob which contributed this feature back in 2017 can provide more background if necessary |
Sorry,credhub references can be returned in both SB and SK, but the client_id is included in the bind resource for SK. I've corrected #704 (comment). I'll double check the wording |
Double reading the proposed changed, I did not spot where there could have an ambiguity about service binding responses not supporting credhub references. Can you please use github review feature to point the specific line and if possible suggest a better wording ? |
I mistook the |
Trying to retrigger Travis |
@tinygrasshopper / @rsampaio if one of you can approve this one before Friday we can try to include it in the release! |
What is the problem this PR solves?
credential_client_id is provided by cloudfoundry cloudcontroller in the binding resource since late 2017. See background at https://www.pivotaltracker.com/n/projects/966314/stories/151111701
Checklist: