Skip to content

feat: account signing keys in account status claims#164

Merged
choufraise merged 3 commits intomainfrom
feat/status-claims-signing-keys
Mar 18, 2026
Merged

feat: account signing keys in account status claims#164
choufraise merged 3 commits intomainfrom
feat/status-claims-signing-keys

Conversation

@choufraise
Copy link
Collaborator

@choufraise choufraise commented Mar 17, 2026

  • feat: remove unused status.signingKey from Account CRD
  • test: fix e2e kuttl test assertions
  • feat: account signing keys in account status claims

feat: account signing keys in account status claims

To ensure full transparency between Account JWT stored in NATS cluster and the Account CR, we should include the claimed signing keys in the Account.status.claims struct.

The optional (user) scope of signing keys are actively ignored until fully supported (via e.g. #140). TODOs added for this in the right places.

Closes: #162


test: fix e2e kuttl test assertions

The currently used kuttl version 0.15.0 does not support resourceRefs nor assertAll in TestAssert CRD, hence bumping to (fixed) v0.24.0.

kuttl only supports one TestAssert resource per assertion file, hence merging duplicates to ensure all assertions are being validated.

Using mise to install kuttl in github action e2e test workflow to ensure same version is being used in workflow as when running mise nauth:e2e-test locally.


feat: remove unused status.signingKey from Account CRD

The status signing key struct has not been populated since an unknown version of nAuth. Since we are planning on supporting multiple signing keys, including optional scope, this single signing key struct is no longer needed. Removing it.

Fixes: #163

The status signing key struct has not been populated since an unknown version of nAuth. Since we are planning on supporting multiple signing keys, including optional scope, this single signing key struct is no longer needed. Removing it.

Fixes: #163
Signed-off-by: Thobias Karlsson <thobias.karlsson@gmail.com>
The currently used kuttl version 0.15.0 does not support `resourceRefs` nor `assertAll` in `TestAssert` CRD, hence bumping to (fixed) v0.24.0.

kuttl only supports _one_ `TestAssert` resource per assertion file, hence merging duplicates to ensure all assertions are being validated.

Using mise to install kuttl in github action e2e test workflow to ensure same version is being used in workflow as when running `mise nauth:e2e-test` locally.

Signed-off-by: Thobias Karlsson <thobias.karlsson@gmail.com>
@choufraise choufraise requested a review from a team as a code owner March 17, 2026 21:30
To ensure full transparency between Account JWT stored in NATS cluster and the Account CR, we should include the claimed signing keys in the `Account.status.claims` struct.

The optional (user) scope of signing keys are actively ignored until fully supported (via e.g. #140). TODOs added for this in the right places.

Closes: #162
Signed-off-by: Thobias Karlsson <thobias.karlsson@gmail.com>
@choufraise choufraise force-pushed the feat/status-claims-signing-keys branch from 4e67b92 to 4fb27af Compare March 17, 2026 21:33
@choufraise choufraise added the go label Mar 17, 2026
Copy link
Contributor

@henriropp henriropp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, just one question ...

@choufraise choufraise merged commit 4fb27af into main Mar 18, 2026
7 checks passed
@choufraise choufraise deleted the feat/status-claims-signing-keys branch March 18, 2026 07:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Account Status SigningKey field no longer populated/udpated Include Account SigningKeys in Status Claims

2 participants