-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EPIC] Support external oauth2 token endpoint to allow oauth2client
removal
#16803
Comments
Options for OAuth2Clients:
|
Existing APIRule created by EC╰─ k get apirules -n tunas-testing webhook-xt2qf -o yaml | yh
apiVersion: gateway.kyma-project.io/v1beta1
kind: APIRule
metadata:
creationTimestamp: "2023-02-13T15:23:09Z"
finalizers:
- gateway.kyma-project.io/subresources
generateName: webhook-
generation: 1
labels:
beb: webhook
service: test
name: webhook-xt2qf
namespace: tunas-testing
ownerReferences:
- apiVersion: eventing.kyma-project.io/v1alpha2
blockOwnerDeletion: true
kind: Subscription
name: test-noapp
uid: 9866eadc-cc1c-41f9-a9e6-0efecf8dd9b4
resourceVersion: "292584"
uid: 6382b29f-ac0e-4b33-8a4a-c547d920ad21
spec:
gateway: kyma-gateway.kyma-system.svc.cluster.local
host: web-d685nq2yhv.fzn-s1.kymatunas.shoot.canary.k8s-hana.ondemand.com
rules:
- accessStrategies:
- handler: oauth2_introspection
methods:
- POST
- OPTIONS
path: /
service:
external: true
name: test
port: 80
service:
external: true
name: test
port: 80
status:
APIRuleStatus:
code: OK
accessRuleStatus:
code: OK
lastProcessedTime: "2023-02-13T15:23:10Z"
observedGeneration: 1
virtualServiceStatus:
code: OK In New APIRule, the difference will be: - accessStrategies:
- config:
jwks_urls:
- https://kymagoattest.accounts400.ondemand.com/oauth2/certs
handler: jwt |
How to allow users to specify custom oauth2client credentials?Option 1: Use the existing secret which we use to switch backend to EventmeshapiVersion: v1
kind: Secret
metadata:
labels:
kyma-project.io/eventing-backend: beb
name: eventing-backend
namespace: default
type: Opaque
data:
management: WyAghYjEwMTAiLCAgICAgIHM6Ly90dW5hcyhbmQuY29tIiAgIH0gXQ==
messaging: WyAgIHsgICAgICJiiTTZfRVJ2a04wMnNBWE1W50aWNhdGlvbi5zYXAkZW1hbmQuY29tIiAgIH0gXQ==
namespace: ZGVmYXVsddsadsadsadsaS90dW5hcy1kZXZlbG9w
serviceinstanceid: MWI1ODhjZdsadsadsadsadsadDktMjA5NWUxYWIwNjJl
xsappname: ZGVmYXVsdsadsadsadasdsadsadsaddahYjMzNjk4fHhiZW0tc2VydmljZS1icm9rZXItIWIxMDEw
oauth2_client_id: OGIwOTRlMzgdasd5Ni00ZTM4LWFmNTUtNzI4NGIyYmYxNWQ3 ### <<<<- New config
oauth2_client_secret: Xzg1eFhWeFdsadsa2X1BKUjRmN3g1Tl9TdVk= ### <<<<- New config
oauth2_auth_url: https://example.com ### <<<<- New config Pros:
Cons:
Option 2: Create and define a new secret
|
Blocked until we know that whether the OAuth2 client credentials will be provided in the Kyma cluster or will the user have to provide the credentials. |
|
With XSUAA:
|
Questions:
|
here is the documentation for the PUT request to update the credentials on eventmesh: https://api.sap.com/api/SAPEventMeshDefaultCredentialsAPIs/path/put_webhook_credentials__credential_name_ |
Synchronize with: kyma-project/eventing-auth-manager#2 |
oauth2client
removaloauth2client
removal
Description
Allow the customer to specify a custom token endpoint with matching client credentials to support eventmesh after removal of the
oauth2client
cr.Background
The
oauth2client
CR will be removed from kyma in the near future. As the eventmesh backend requires a client_credential flow to be able to access the webhook endpoint we need to allow replacing this kyma internal token-enpoint with a customer provided external solution.Tasks
true
to use the secret created by the auth manager #18010a working apirule for IAS:
https://www.ory.sh/docs/oathkeeper/pipeline/authn
The text was updated successfully, but these errors were encountered: