Skip to content

chore(charts)!: remove spanner support from Helm charts #10071

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Nov 7, 2024

Conversation

iromli
Copy link
Contributor

@iromli iromli commented Nov 6, 2024

Prepare


Description

Target issue

closes #10061

Implementation Details


Test and Document the changes

  • Static code analysis has been run locally and issues have been fixed
  • Relevant unit and integration tests have been added/updated
  • Relevant documentation has been updated if any (i.e. user guides, installation and configuration guides, technical design docs etc)

Please check the below before submitting your PR. The PR will not be merged if there are no commits that start with docs: to indicate documentation changes or if the below checklist is not selected.

  • I confirm that there is no impact on the docs due to the code changes in this PR.

Signed-off-by: iromli <isman.firmansyah@gmail.com>
@iromli iromli self-assigned this Nov 6, 2024
@iromli iromli requested a review from moabu as a code owner November 6, 2024 18:02
Copy link

dryrunsecurity bot commented Nov 6, 2024

DryRun Security Summary

The pull request simplifies the configuration and deployment options for the Janssen application, a Kubernetes-based OpenID Connect Provider and UMA Authorization Server, by removing support for Google Cloud Spanner, simplifying the persistence configuration, and improving the management of sensitive configuration and secrets, which can help improve the overall security posture of the application.

Expand for full summary

Summary:

The code changes in this pull request are primarily focused on simplifying the configuration and deployment options for the Janssen application, a Kubernetes-based OpenID Connect Provider and UMA Authorization Server. The key changes include the removal of support for Google Cloud Spanner as a persistence backend, simplification of the persistence configuration options, and improvements to the management of sensitive configuration and secrets.

From an application security perspective, these changes are generally positive, as they reduce the complexity of the application and its infrastructure, which can help improve the overall security posture. The removal of Spanner support and the focus on more widely-used persistence options, such as Couchbase and SQL databases, can help reduce the attack surface and make the application easier to secure.

Additionally, the improvements to secret management, including the use of Google Secret Manager, AWS Secrets Manager, and Hashicorp Vault, are a step in the right direction, as they provide secure and centralized solutions for storing and managing sensitive configuration data. However, it's important to ensure that the appropriate access controls and permissions are in place to restrict access to these secrets.

Overall, the changes in this pull request appear to be focused on improving the maintainability and security of the Janssen application, while reducing complexity and attack surface. As an application security engineer, I would recommend thoroughly reviewing the final configuration, testing the security of the application, and ensuring that all best practices are followed to mitigate potential security risks.

Files Changed:

  1. charts/janssen-all-in-one/templates/secret.yaml: The changes simplify the logic for including sensitive Google credentials in the Kubernetes Secret, which can help improve the maintainability and readability of the code.
  2. charts/janssen-all-in-one/values.yaml: The changes remove the dependency on Google Spanner and focus on SQL-based persistence backends, which can have a positive impact on the application's security posture.
  3. charts/janssen-all-in-one/README.md: The changes reflect the removal of Spanner support and the simplification of the persistence configuration options, which can help improve the security and maintainability of the application.
  4. charts/janssen-all-in-one/templates/configmap.yaml: The changes remove the environment variables related to Google Spanner and focus on the use of various secret management solutions, such as Google Secret Manager, AWS Secrets Manager, and Hashicorp Vault.
  5. charts/janssen/charts/config/README.md: The changes remove support for Google Spanner as a persistence backend and simplify the configuration options, which can help improve the security and maintainability of the application.
  6. charts/janssen/README.md: The changes reflect the removal of Spanner support and the simplification of the persistence configuration options, which can have a positive impact on the application's security.
  7. charts/janssen/charts/config/templates/configmaps.yaml: The changes remove the environment variables related to Google Spanner and focus on the use of various secret management solutions, which can help improve the security of the application.
  8. charts/janssen/charts/config/templates/secrets.yaml: The changes simplify the logic for including sensitive Google credentials in the Kubernetes Secret, which can help improve the maintainability and readability of the code.
  9. charts/janssen/values.schema.json: The changes reflect the removal of Spanner support and the simplification of the persistence configuration options, which can help improve the security and maintainability of the application.
  10. charts/janssen/charts/config/values.yaml: The changes include options for using secure secret management solutions, such as Google Secret Manager, AWS Secrets Manager, and Hashicorp Vault, which can help improve the security of the application.
  11. charts/janssen/values.yaml: The changes remove the environment variables related to Google Spanner and simplify the persistence configuration options, which can have a positive impact on the application's security.

Code Analysis

We ran 9 analyzers against 11 files and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

🟢 Risk threshold not exceeded.

View PR in the DryRun Dashboard.

@mo-auto mo-auto added area-documentation Documentation needs to change as part of issue or PR comp-charts-jans kind-dependencies Pull requests that update a dependency file labels Nov 6, 2024
@iromli iromli requested a review from misba7 November 6, 2024 18:03
@moabu moabu merged commit 26001ea into main Nov 7, 2024
10 of 11 checks passed
@moabu moabu deleted the cn-charts-del-spanner branch November 7, 2024 03:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area-documentation Documentation needs to change as part of issue or PR comp-charts-jans kind-dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

chore(charts)!: remove spanner support from Helm charts
3 participants