Files
Joaci Morais 8c5834e718 Update old stx-oidc-client dependencies.
As part of oidc-auth-apps upversion, and to keep the oidc-auth-apps
updated and get the latest CVE fixes, I've updated the golang
dependencies for the stx-oidc-client images

Image Tag        | Total CVEs
-----------------|-----------
stx.11.0-v1.0.8	 | 6
new-stx.TBD-vTBD | 0

Even if we have this change merged, it has no effect in our latest
oidc-auth-apps application, the lastest OIDC version will still using
the old stx.11.0-v1.0.8 until we finish the validation of this new
image with the next oidc-auth-apps up versioned. This is a low risk
change and is part of the next up version task for OIDC, once we have
a fully oidc-auth-apps up versioned and tested, a new public tag for
the stx-oidc-client image will be requested.

Test Plan:

PASS: Build a local docker stx-oidc-client image.
PASS: Load this new image into a sx
PASS: Modify the oidc-auth-apps helm-charts to use this image instead
and rebuild the oidc-auth-apps.
PASS: Upload and apply oidc-auth-apps. oidc should be applied
successfully.
PASS: Check if the stx-oidc-client deployment is using the new
created image with the command: kubectl -n kube-system get deployment
stx-oidc-client -o yaml
PASS: Once oidc-auth-apps in applied status, perform oidc-auth-apps
      test by creating a user, apply rolebiding and authenticate it
      using oidc-auth command, check if the new user can send k8s
      commands based on its roles.
PASS: Try to authenticate using the Remote CLI method, should work
PASS: Try to authenticate using the WEB Method by accessing the url
https://<OAM_IP>:30555, you should be served with a webpage and be
able to authenticate through oidc as well.

Change-Id: I5f9f5e35c28b295107d02d9e29351edfae16369b
Signed-off-by: Joaci Morais <Joaci.deMorais@windriver.com>
2025-05-30 21:14:13 -03:00
..