-
Notifications
You must be signed in to change notification settings - Fork 888
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oauth2-proxy with istio mesh config and m2m bearer tokens #2544
oauth2-proxy with istio mesh config and m2m bearer tokens #2544
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
@kromanow, i can take a look at this next week. Please sign the CLA as well. |
@juliusvonkohout I signed the CLA. |
/lgtm |
I think wemight be missing tests. For example https://github.com/kubeflow/manifests/blob/master/tests/gh-actions/install_knative-cni.sh and https://github.com/kubeflow/manifests/blob/master/tests/gh-actions/install_istio-cni.sh could be extended with oauth 2. Maybe - ../../../../oidc-client/oauth2-proxy/components/istio-external-auth is already enough, but i have to check again. |
@juliusvonkohout thanks for the review! About the tests - good point. I'm not sure about the "could be extended with oauth2" part. You mean not to create new tests for oauth2-proxy but just extend the ones for knative and istio-cni? I think until there is support for oidc-authservice, I'd suggest having those as a separate tests. But, if you think extending the current ones is good enough - that's fine with me. |
For the time being extending them might be enough. @kimwnasptd what do you think? |
common/oidc-client/oauth2-proxy/components/allow-unauthenticated-issuer-discovery/README.md
Outdated
Show resolved
Hide resolved
...n/oidc-client/oauth2-proxy/components/configure-self-signed-kubernetes-oidc-issuer/README.md
Outdated
Show resolved
Hide resolved
...ent/oauth2-proxy/components/istio-external-auth/patches/deployment.jwt-refresh-interval.yaml
Show resolved
Hide resolved
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
use latest in deployment spec Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
…unt token Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
c9c29cd
to
b21902c
Compare
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
From my perspective all that we've agreed on having in this PR is ready. |
Amazing improvement |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: juliusvonkohout, kromanow94 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
Hurray! Many thanks for all the support! ❤️🍀 |
which kubeflow version will have this change included? |
@deepakdeore2004 officially it will be included in the next release. |
Which issue is resolved by this Pull Request:
Resolves #2516, #2517
Description of your changes:
Changes are based on discussion and description available here:
TL;DR:
envoyExtAuthzHttp
instead of EnvoyFilterTesting setup:
In
common/oidc-client/oauth2-proxy/README.md
are instructions on how to enable usage ofoauth2-proxy
. This covers the example scenario with Kubeflow deployed on kind, which enables configuration for in-cluster OIDC behind self-signed certificates.To verify if oauth2-proxy is working for standard user login and m2m tokens:
user@example.com
oauth2_proxy_kubeflow
in your browsercurl
image and try callingistio-ingressgateway
with Authorization Bearer Token from Service Account:Comments:
@axel7083 , I'd appreciate your feedback and it would be great if you could test this setup
@juliusvonkohout , I know the file structure looks a little bit different but I thought it makes a little bit more sense. That said, I'm open for discussion and we can change the file structure.
From implementation perspective everything is in place. The only missing parts are adding some more README, probably doing some clean up and addressing feedback.
I'd appreciate review.
Discovered missing points