Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP: Make the console display an informative page when no auth source is configured #13802

Closed
wants to merge 6 commits into from

Conversation

stlaz
Copy link
Member

@stlaz stlaz commented Apr 29, 2024

This is a different take on #13713.

The PR splits CSRF identification from authentication as these are generally two separate concepts.
There are generalization fixes that leverage the ability of static user authentication to be used as yet another authenticator.

The k8s-auth flag is deprecated and setting it no longer does anything. This removes a single use-case of a development pod running inside of the cluster with k8s-auth being set to "service-account". This behavior can be emulated by using the SA token directly. As an alternative, we could add a "k8s-auth-bearer-token-file" option. This would've likely been a better idea than having the token be pasted in options as we do nowadays.

/assign @jhadvig

…ays contains the header

This wasn't the case previously where the static user handling
improperly didn't add the Authorization header.
This removes a possible use-cases of
`--k8s-mode=in-cluster --k8s-auth=service-account`. In order to be able
to use that, you should paste the SA account into the `--k8s-auth-bearer-token`
flag.

It might make sense to add a `--k8s-auth-bearer-token-file` option but
we're sticking to the original implementation for now.
@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 29, 2024
@openshift-ci openshift-ci bot requested review from florkbr and jhadvig April 29, 2024 13:29
@openshift-ci openshift-ci bot added the component/backend Related to backend label Apr 29, 2024
Copy link
Contributor

openshift-ci bot commented Apr 29, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: stlaz
Once this PR has been reviewed and has the lgtm label, please assign florkbr for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Contributor

openshift-ci bot commented Apr 29, 2024

@stlaz: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@stlaz
Copy link
Member Author

stlaz commented May 17, 2024

/close
superseded by #13713

@openshift-ci openshift-ci bot closed this May 17, 2024
Copy link
Contributor

openshift-ci bot commented May 17, 2024

@stlaz: Closed this PR.

In response to this:

/close
superseded by #13713

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
component/backend Related to backend do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants