-
Notifications
You must be signed in to change notification settings - Fork 3.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Update collection arguments #15627
base: devel
Are you sure you want to change the base?
Conversation
Consistency is the most important thing for this. What other content is using these connection parameters? This? https://galaxy.ansible.com/ui/repo/published/infra/aap_configuration/docs/ |
This is the primary thing using it at the moment, and the installer using it as well, it was more Some Variables should be exposed to playbooks for use, lets set a standard. |
Looking good 👍 I got some more background on this initiative. It looks like you've already taken the lead in proposing these changes elsewhere. I fully support this, but want to wait a few days to assure we've solidified consensus. |
I'm actually not convinced this will work anymore. I expect that if the collection receives I could test this manually to clarify specifically how it's not working, but there's no automated tests we can rely on right now. |
The PR you created here is for the collection. There may be a needed change to eda-server as well. This is probably more consequential, since this is a credential type used in-app, most similar to the awx_plugins change you are making. At some point we hope to essentially merge the 2 CredentialType models, but we are not there yet, so the controller type is more-or-less duplicated in both places. |
It may be needed, didn't know it was there will look and add that to the list
|
ea83b58
to
83713ac
Compare
Quality Gate passedIssues Measures |
collection_name: 'awx.awx' | ||
version: '4.0.0' | ||
why: Collection name change | ||
alternatives: 'TOWER_OAUTH_TOKEN, AAP_TOKEN' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same with this. Not sure how to handle this so it is clear that OAUTH is coming from the Resource Server but is not available in Controller
Here is a patch to hopefully fix the sanity failures. Checks do have trouble running on forks, so we may not get meaningful output from that until merged here. I guess I can test separately... #15729 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I need to formally document the situation with tokens here. These lines of code were removed in recent changes:
3ba6e2e#diff-87795928c0b98b89601c8cc0bb837dd70788e1a0c7c5803a6bf7a695bc02984dL505-L507
if self.oauth_token:
# If we have a oauth token, we just use a bearer header
headers['Authorization'] = 'Bearer {0}'.format(self.oauth_token)
Changing how we parse the token argument is ignoring the problem. With no code that constructs the headers to use a token, you can't make requests using a token.
For now, I would say kick the token out of scope of this, and an issue can be filed for that. Current reading is that all params related to OAuth2 tokens here are non-functional and that's the blocker. So the simple change I'm asking for is to remove the token params.
For sanity test failures, I've now realized (after banging my head on my desk for a bit) that the following failure is introduced by this PR.
The patch I linked (my PR in your fork) is still valid. This is yet another fix that's needed for sanity to pass. |
For yet another request here, it was agreed that we need some measure of testing of the new params. This is my proposed solution. It can be expanded to some other params, but cannot be expanded realistically to test env vars (maybe? you could try) I think that will pass, so this (along with my other PR 60) should hopefully be easy inclusions without breaking checks. To recap the full work list here:
And I hope all that should cover it to get this ready to merged and moved along. |
SUMMARY
Update the injectors for the AAP credential type to work across collections
ISSUE TYPE
COMPONENT NAME
AWX VERSION
ADDITIONAL INFORMATION
Related PR's: