-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Use secured hydra endpoints for PTs #26948
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use secured hydra endpoints for PTs #26948
Conversation
Reviewer's GuideAll Hydra endpoints in product tests now use secure HTTPS; insecure HTTP settings and flags have been removed to enforce secure communications. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey there - I've reviewed your changes - here's some feedback:
- Consider centralizing the Hydra base URL in a shared variable or template to avoid repeating the protocol change across all config files.
- Verify that the Hydra container is actually serving TLS—add the appropriate --tls-cert and --tls-key flags to the
serve allcommand instead of relying on defaults. - Update the wait strategy in HydraIdentityProvider to expect the TLS startup log message rather than the HTTP-only log entry.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- Consider centralizing the Hydra base URL in a shared variable or template to avoid repeating the protocol change across all config files.
- Verify that the Hydra container is actually serving TLS—add the appropriate --tls-cert and --tls-key flags to the `serve all` command instead of relying on defaults.
- Update the wait strategy in HydraIdentityProvider to expect the TLS startup log message rather than the HTTP-only log entry.Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
|
How does it work? Where is hydra getting a certificate from that Trino nodes trust? |
|
I think they get the certificate from |
|
Additionally in |
|
@Praveen2112 merge? |
Description
Additional context and related issues
Release notes
(x) This is not user-visible or is docs only, and no release notes are required.
( ) Release notes are required. Please propose a release note for me.
( ) Release notes are required, with the following suggested text:
Summary by Sourcery
Use secure HTTPS endpoints for Hydra in product tests and remove insecure HTTP settings.
Enhancements:
Summary by Sourcery
Enforce HTTPS for Hydra OAuth2 endpoints across product-test environments and containers
Enhancements: