-
Notifications
You must be signed in to change notification settings - Fork 803
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expected behavior with org_whitelist ? #687
Comments
Specifically, are you concerned that the message is asking it to be able to modify organization data, as opposed to being read-only? |
I'm concerned that is involves getting a manager of the organization involved to approve, even though they've been whitelisted, but I guess there is no way around that if their group setting is set to private? |
From the list of scopes it is also not quite clear to me why this happens. After staring at the available scopes a bit (and their ambiguous descriptions) I wonder if |
@betatim, interesting! I'll try that out and report back. |
It's related to the permissions set on the GitHub organisation. Under |
So it sounds like this is something that needs configuring at the organization level within github as opposed to within jupyterhub? |
Thanks @manics! I didn't know those restrictions were there, and I'm guessing those are the defaults when you setup an org. When I remove those restrictions, folks seeking access don't get stopped by the "request approval anymore". Alternatively, if you don't have access to the org settings, I was able to verify that adding |
Is this something we can/should document in the "User management" section? |
GitHub OAuth scopes are just very confusing! I thought I understood them but after changing my JupyterHub config a couple weeks ago and running into this problem (and also a problem with private org memberships, not sure if this is a bug that somehow crept in) I'm now pretty lost. It would be good to test and document exactly what works. I think there are at least three factors which contribute to the confusion:
I'm willing to help figure this out and update the docs when I get time, but due to the number of factors any help would be appreciated |
@manics if you'd like to, just give a shot with each one and write down the general results of each test, and I am happy to put together a docs PR explaining it in more verbose detail etc. Would that work? |
@choldgraf It's the testing that's complicated, once the results are known updating the doc is easy :-). I'm wondering whether we could simplify things- instead of covering all combinations thoroughly test and document just two configs:
And for everything else link to this issue or a community wiki? |
I think that's fair: if |
How does this sound? #704 |
Actually, from my tests we need both both user and org scopes set for this to work, e.g:
I just reconfirmed that setting
|
ah - I thought somebody had tested this out with only |
I tested it with only |
@choldgraf I'm pretty busy over the next couple weeks, but I'll try and draw up a "test plan". In the meantime could you reopen this issue as a reminder? |
Cool - done! |
I just went through a bunch of tests with a member in a whitelisted organization whose organization visibility is set to private. If the whitelisted organization has the "Third-party application access policy" set to "access restricted", and the JupyterHub application is owned by another organization, I now think there is no With "access restricted", Github says "Only approved applications can access data in this organization. Applications owned by this organization always have access." So I now think setting "scopes" to either
Previously I thought adding Sorry for all the confusion. I guess it would be good to have someone else verify this, considering my shaky track record on this issue thus far... |
I can confirm that using both scopes fixed my case. I was setting this up the same way according to the docs, and I just got 403 access denied everytime. Setting both scopes ( |
Can confirm i needed both as well. Not sure I understand..., but perhaps custom auth docs need changing? |
With
jupyter-config.yaml
auth set up as:I find that members of the above organizations, unless they are public, get challenged with:
Is that expected, even though
auth.scopes
isread:org
?The text was updated successfully, but these errors were encountered: