-
Notifications
You must be signed in to change notification settings - Fork 370
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove OIDC from code #5233
Remove OIDC from code #5233
Conversation
pkg/api/auth_middleware.go
Outdated
@@ -2,10 +2,8 @@ package api | |||
|
|||
import ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not compiling unused resources
Note to releaser:Breaking change, requires minor version bump! |
oidc_auth: | ||
type: apiKey | ||
in: cookie | ||
name: oidc_auth_session |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we need this, that's the cookie that is verified by lakeFS.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Restored!
pkg/api/auth_middleware.go
Outdated
@@ -117,13 +112,7 @@ func checkSecurityRequirements(r *http.Request, | |||
continue | |||
} | |||
user, err = userByToken(ctx, logger, authService, token) | |||
case "oidc_auth": |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we need this + userFromOIDC
@arielshaqed I'll go over it later today, we need someone from VE to be on the reviewers list too (we had a decision back then that shared-ownership repositories changes should be reviewed by at least 1 participant from each team) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
overall looks good, I have nothing to add on top of what @Isan-Rivkin commented.
I do think we should test a built image using this feature branch with our common use-cases and cloud operation.
a1f4014
to
4c99834
Compare
Restored the missing code, thanks! A private image works on a manually-hacked cloud dev-env. I tested explicit logout as well as deleted OIDC auth cookie. PTAL. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
PTAL...
oidc_auth: | ||
type: apiKey | ||
in: cookie | ||
name: oidc_auth_session |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Restored!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@arielshaqed Looking good!
Please don't forget that this release dependent on a new helm/lakefs release so that the configurations will not break :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! don't forgot to run go tidy to remove the oidc depends.
Out of scope.
Interpret OIDC claims that an _external_ auth service may set on the browser.
4c99834
to
2a39ca5
Compare
Rebased on trunk; will auto-merge once tests pass. |
Should have done it on #5233, doing it now. Sorry. But just as well, some of these changes are _not_ due to that PR :-/
Should have done it on #5233, doing it now. Sorry. But just as well, some of these changes are _not_ due to that PR :-/
Was deprecated... and it's gone!