Add Map/unmap agent actions to Agent auth UI
Issue: FE: Allow users to map an available agent to a ... (#444857 - closed)
What does this MR do and why?
NOTICE This feature is behind the remote_development_namespace_agent_authorization
feature flag.
It implements the actions of allowing or blocking a cluster agent in the Agent Authorization UI. From an implementation perspective, these actions invoke two GraphQL mutations that map or unmap a cluster agent to a group.
Previous MRs in this series
- Expose required parameters in Agent Authorizati... (!154341 - merged)
- Display unmapped agents in Agent authorization UI (!153254 - merged)
- Display mapped agents in Workspaces settings (!152216 - merged)
Upcoming issues
- FE: Add "Remote Development" option to Group Se... (#444836 - closed)
- FE: Display agent details in a popover (#444859 - closed)
MR acceptance checklist
Please evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.
Screenshots or screen recordings
Screenshots are required for UI changes, and strongly recommended for all other merge requests.
Description | Screenshot or recording |
---|---|
The following demo demonstrates how the block or unblock operations work | agent_mapping_actions_demo.mov |
How to set up and validate locally
Numbered steps to set up and validate the change are strongly suggested.
-
Enable the
remote_development_namespace_agent_authorization
feature flag:rails c && Feature.enable(:remote_development_namespace_agent_authorization)
-
Follow these instructions to register two cluster agents in the
gitlab-org
group:- Create a project in the group
gitlab-org
namedworkspaces-agents-config
. - Create two directories in the project's repository:
.gitlab/agents/remote-dev
.gitlab/agents/remote-dev-two
- Create a project in the group
-
In each directory, create a file named
config.yaml
with the following contentremote_development: enabled: true dns_zone: workspaces.localdev.me # below configuration is optional # they override the default values network_policy: enabled: true # if your GDK is configured on a public IP, you don't need to set the `egress` key in this section. egress: - allow: '0.0.0.0/0' except: - '10.0.0.0/8' - '172.16.0.0/12' - '192.168.0.0/16' # if your GDK is configured on a different private IP, use that in the line below. - allow: '172.16.123.1/32' # for debugging locally to increase log verbosity observability: logging: level: debug grpc_level: warn
-
To connect the cluster agents:
- In the
workspaces-agent-config
project, navigate to Operate -> Kubernetes Clusters. - Click the button "Connect to cluster" and select the "remote-dev" agent. Connect the cluster and close the modal dialog. It doesn't matter if the cluster is not connected.
- Repeat step 2 for the "remote-dev-two" agent.
- In the
-
Open the URL http://gdk.test:3000/groups/gitlab-org/-/settings/workspaces
-
You should see the table populated with one allowed agent and two agents in the "All agents tab"
-
Click the "Allow" button. The button will transition to a loading state and the agent will become "Allowed". The button label will change to "Block"
-
Click the "Block" button. A modal dialog will appear confirming if you want to block the agent. If you click the "Block agent" button, the operation in Step 7 will be reverted.