Support portable authentication tokens with backward compatibility#189
Support portable authentication tokens with backward compatibility#189
Conversation
WalkthroughThe changes simplify Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes
Possibly related PRs
Poem
Pre-merge checks and finishing touches✅ Passed checks (3 passed)
✨ Finishing touches
🧪 Generate unit tests (beta)
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (2)
🧰 Additional context used🧬 Code graph analysis (1)api/v1alpha1/client_helpers.go (1)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (7)
🔇 Additional comments (4)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Enable Client/Exporter migration across clusters by using name-only authentication tokens. Usernames() now returns both portable format (new) and namespace/UUID format (legacy) to maintain compatibility with existing tokens. This allows copying objects and their token secrets between clusters without token regeneration or without setting a migrated-uuid annotation.
e326f8e to
bbbf9ed
Compare
|
This was handled with #190 |
Enable Client/Exporter migration across clusters by using name-only authentication tokens. Usernames() now returns both portable format (new) and namespace/UUID format (legacy) to maintain compatibility with existing tokens.
This allows copying objects and their token secrets between clusters without token regeneration or without setting a migrated-uid annotation.
This will only work for newly generated tokens, but does not work to migrate existing tokens.
Related-Issue: jumpstarter-dev/jumpstarter#25 188
Summary by CodeRabbit