Skip to content

Chart 1.5.0- Fluffy EOL #343

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 26 commits into from
Jul 13, 2025
Merged

Chart 1.5.0- Fluffy EOL #343

merged 26 commits into from
Jul 13, 2025

Conversation

idanovo
Copy link
Contributor

@idanovo idanovo commented Jun 29, 2025

What I checked:

  • Installing the new chart as it is (default values).
  • Installing a chart with .Values.fluffy returns an error.
  • OIDC.
  • STS
  • SAML.
  • LDAP.
  • External Auth.
  • Migration from the current chart with fluffy to the new one without fluffy for each of the providers above.
  • Migration from fluffy guide.

@idanovo idanovo requested a review from Isan-Rivkin June 29, 2025 11:23
@idanovo idanovo changed the title WIP Fluffy EOL- part 1 (service and configuration removal) Jun 29, 2025
@idanovo idanovo requested a review from Isan-Rivkin June 29, 2025 13:29
Copy link
Contributor

@Isan-Rivkin Isan-Rivkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@idanovo idanovo requested a review from Isan-Rivkin June 29, 2025 13:45
@idanovo idanovo requested a review from Isan-Rivkin June 29, 2025 15:29
Copy link
Contributor

@Isan-Rivkin Isan-Rivkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, that's a lot of stuff, looks good small comments!
Also plz attach examples of values to use :)

@idanovo idanovo changed the title Fluffy EOL- part 1 (service and configuration removal) Fluffy EOL Jul 3, 2025
@idanovo idanovo requested a review from Isan-Rivkin July 6, 2025 10:45
Copy link
Contributor

@Isan-Rivkin Isan-Rivkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! We're getting there!
Left small comments + whatever unresolved

apiVersion: v1
kind: Secret
metadata:
name: ldap-secret
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No need in additional secret just add that to the lakefs-secret

Copy link
Contributor Author

@idanovo idanovo Jul 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't want to use the lakefs-secret because it depends on .Values.secrets .Values.existingSecret, which complicates things and makes it harder for the user to configure

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's continue discussion in the OIDC duplicated comment

apiVersion: v1
kind: Secret
metadata:
name: oidc-client-secret
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No need in additional secret just add that to the lakefs-secret

Copy link
Contributor Author

@idanovo idanovo Jul 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't want to use the lakefs-secret because it depends on .Values.secrets .Values.existingSecret, which complicates things and makes it harder for the user to configure

Copy link
Contributor

@Isan-Rivkin Isan-Rivkin Jul 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But that's the whole point, all the idea is if that we either create a secret or allow using an existing secret, meaning they created themselves outside of the chart.

If you notice that's the pattern of this chart (and in many other charts, including our own cloud chart).
Both in OSS and in Fluffy previously, single secrets.
Now it can be unified which makes it even simpler.

Multiple secrets == More Complexity!
You only do that when you must, for example dockerRegistry and saml ceritficates are 2 common things that are cluster wide and shared so they are separate.

P.S, going on a per "value" secret does not make sense keeping the original secret holding the db and encryption key already, so if we change the pattern it should be modified. (I vote 👎 for this approach)

@idanovo idanovo requested a review from Isan-Rivkin July 7, 2025 07:42
Copy link
Contributor

@Isan-Rivkin Isan-Rivkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! see unresolved comments

- returnTo
- https://<lakefs.ingress.domain>/oidc/login

useDevPostgres: true
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why in all the examples useDevPostgres is true?
If for some reason it's needed then let's revert the decision on making the default false otherwise, remove.

@idanovo idanovo requested a review from Isan-Rivkin July 7, 2025 09:36
Comment on lines 17 to 20
{{- if (((.Values.enterprise).auth).oidc).enabled }}
{{- if (((.Values.enterprise).auth).oidc).clientSecret }}
# LDAP bind password secret, used for LDAP authentication
ldap_bind_password: {{ .Values.enterprise.auth.ldap.bindPassword | b64enc }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Notice anything strange between the if condition and the secret value? 🙃

@idanovo idanovo requested a review from Isan-Rivkin July 7, 2025 10:37
Copy link
Contributor

@Isan-Rivkin Isan-Rivkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 💃
Let's get to docs! :)

@idanovo
Copy link
Contributor Author

idanovo commented Jul 8, 2025

Blocked by: #345

@idanovo idanovo linked an issue Jul 8, 2025 that may be closed by this pull request
@idanovo idanovo changed the base branch from fluffy-eol to master July 13, 2025 07:35
@idanovo idanovo changed the title Fluffy EOL Chart 1.5.0- Fluffy EOL Jul 13, 2025
CHANGELOG.md Outdated
# 1.5.0

### Important
The lakeFS Helm chart now uses lakeFS Enterprise with integrated authentication, removing the need for the separate Fluffy service.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Additionally please be explicit about:

  1. fluffy is not longer supported in the chart
  2. lakeFS-Enterprise image is now the default for this to work for enterprise if you previously used different image must change upgrade to target version

@idanovo idanovo requested a review from Isan-Rivkin July 13, 2025 13:47
Copy link
Contributor

@Isan-Rivkin Isan-Rivkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏
👏🐶👏👏👏👏👏👏👏🐶🐶🐶🐶👏👏🐶🐶🐶🐶🐶👏👏🐶👏👏👏🐶👏
👏🐶👏👏👏👏👏👏🐶👏👏👏👏👏👏👏👏🐶👏👏👏👏🐶🐶👏🐶🐶👏
👏🐶👏👏👏👏👏👏🐶👏👏🐶🐶👏👏👏👏🐶👏👏👏👏🐶👏🐶👏🐶👏
👏🐶👏👏👏👏👏👏🐶👏👏👏🐶👏👏👏👏🐶👏👏👏👏🐶👏🐶👏🐶👏
👏🐶🐶🐶🐶🐶👏👏👏🐶🐶🐶🐶👏👏👏👏🐶👏👏👏👏🐶👏👏👏🐶👏
👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏👏

@idanovo idanovo merged commit e0cb6fd into master Jul 13, 2025
3 checks passed
@idanovo idanovo deleted the fluffy-eol-0 branch July 13, 2025 13:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update chart to not use fluffy (enterprise)
2 participants