mirror of
https://github.com/paralus/paralus.git
synced 2026-03-04 18:10:21 +00:00
8990aa89425f551156ec84bdbc6579b20944074b
* Move oidc provider model * Change apiVersion of Idp and Oidc provider to 'system.k8smgmt.io/v3' * Change IdP Get, Udpate, Delete to name instead of an Id * Change Oidc Provider Get, Update, Delete to name instead of an Id * Deprecated AcsURL from Idp db table AcsURL is generated dynamically per request. This change is made particularly considering case where application host is changed after adding IdP. Storing AcsURL in table will create hard coupling between application host and Idp configuration. OIDC provider service is following same approach for callback url. * Idp: Load application HTTP Url in main.go * OIDC Provider: Reuse Kratos Url from main.go
rcloud-base
rcloud-base
Setting up the database
Create the initial db/user
Example for admindb:
create database admindb;
create user admindbuser;
Now in the newly created db:
CREATE EXTENSION IF NOT EXISTS "uuid-ossp";
grant execute on function uuid_generate_v4() to admindbuser;
This will grant the necessary permission to the newly created user to run uuid_generate_v4()
Run application migrations
We use golang-migrate to perform migrations.
Install golang-migrate
go install -tags 'postgres' github.com/golang-migrate/migrate/v4/cmd/migrate@latest
-tags 'postgres' is important as otherwise it compiles without postgres support
You can refer to the guide for full details.
Run migrations
Example for admindb:
export POSTGRESQL_URL='postgres://<user>:<pass>@<host>:<port>/admindb?sslmode=disable'
migrate -path ./persistence/migrations/admindb -database "$POSTGRESQL_URL" up
See cli-usage for more info.
Description
All-in-one Kubernetes access manager. User-level credentials, RBAC, SSO, audit logs.
access-managementcloud-securityhacktoberfesthacktoberfest2022k8s-access-managementkubernetes-securityzero-trust-securityztka
Readme
Apache-2.0
20 MiB
Languages
Go
99.2%
Jsonnet
0.5%
PLpgSQL
0.1%