-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automate Infra Views [read-only] #1544
Labels
Comments
It might make more sense for these to be on an endpoint with |
2 tasks
4 tasks
This was referenced Feb 25, 2020
4 tasks
4 tasks
This was referenced Mar 24, 2020
4 tasks
5 tasks
This was referenced Apr 28, 2020
This EPIC and all the issues are addressed in the build 20210217163248 |
This was shipped long, closing this epic. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Automate Infra Views
(Chef Manage in Automate)
Automate is the observability platform for Chef Infra, but only provides the outcome of Chef Infra client runs. If there was a failure, I currently need to leave Automate and use other tools to find the contents of the Policy to understand the failure.
To be able to retrieve Policy information, Automate will need to know address information and credentials for one or more Chef Infra Servers. By creating an API that proxies to Chef Infra servers, we can separate the different Chef Infra Server authn/authz design from the Automate authn/authz design. We also retain the option to allow Automate to control the API going forward.
Motivation
Specification
This initiative covers read-only access and views to the Chef Infra Server only, and excepts for later a few cases such as viewing nodes, policyfile information, and users.
chef-infra-proxy component
/infra/servers
get - returns list of known Chef Infra servers
post - add a Chef Infra server record
patch - update a Chef Infra server record
delete - remove a Chef Infra server record
fields: ID, name, fqdn/ip
/infra/servers/ID/orgs
get - returns list of configured organizations
post - configure an organization
patch - update an organization
delete - remove an organization
fields: id, name, admin_user, admin_key (secrets-service)
/infra/servers/ID/api
proxies requests to the identified server using the stored credentials for the organization
e.g. /infra/servers/ID/api/organizations/ORG_ID/cookbooks
Automate Infra Server Views (UI)
Pages
APIs
IAM
Note in both cases the relevant information should not be viewable in the UI if you lack permissions. For example, a normal user could see the list of Chef Servers, but the "Add Chef Server" button would not be visible.
UI Mock Ups
[FEB 27 2020 ] https://chef.invisionapp.com/share/EYW6R099CGH#/401258846_V0_-_Client_Runs_-_Cookbooks_-_Details_-_Description
Aha! Link: https://chef.aha.io/epics/SH-E-746
The text was updated successfully, but these errors were encountered: