-
Notifications
You must be signed in to change notification settings - Fork 90
chore(charts)!: remove spanner support from Helm charts #10071
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: iromli <isman.firmansyah@gmail.com>
DryRun Security SummaryThe pull request simplifies the configuration and deployment options for the Janssen application, a Kubernetes-based OpenID Connect Provider and UMA Authorization Server, by removing support for Google Cloud Spanner, simplifying the persistence configuration, and improving the management of sensitive configuration and secrets, which can help improve the overall security posture of the application. Expand for full summarySummary: The code changes in this pull request are primarily focused on simplifying the configuration and deployment options for the Janssen application, a Kubernetes-based OpenID Connect Provider and UMA Authorization Server. The key changes include the removal of support for Google Cloud Spanner as a persistence backend, simplification of the persistence configuration options, and improvements to the management of sensitive configuration and secrets. From an application security perspective, these changes are generally positive, as they reduce the complexity of the application and its infrastructure, which can help improve the overall security posture. The removal of Spanner support and the focus on more widely-used persistence options, such as Couchbase and SQL databases, can help reduce the attack surface and make the application easier to secure. Additionally, the improvements to secret management, including the use of Google Secret Manager, AWS Secrets Manager, and Hashicorp Vault, are a step in the right direction, as they provide secure and centralized solutions for storing and managing sensitive configuration data. However, it's important to ensure that the appropriate access controls and permissions are in place to restrict access to these secrets. Overall, the changes in this pull request appear to be focused on improving the maintainability and security of the Janssen application, while reducing complexity and attack surface. As an application security engineer, I would recommend thoroughly reviewing the final configuration, testing the security of the application, and ensuring that all best practices are followed to mitigate potential security risks. Files Changed:
Code AnalysisWe ran Riskiness🟢 Risk threshold not exceeded. |
Prepare
Description
Target issue
closes #10061
Implementation Details
Test and Document the changes
Please check the below before submitting your PR. The PR will not be merged if there are no commits that start with
docs:
to indicate documentation changes or if the below checklist is not selected.