-
Notifications
You must be signed in to change notification settings - Fork 100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding support for OpenID-Connect #251
Conversation
marking as WIP.
|
/cc @jvlcek |
Requires: ManageIQ/container-httpd#33 |
templates/miq-template-ext-db.yaml
Outdated
OIDCClientID ${HTTPD_AUTH_OIDC_CLIENT_ID} | ||
OIDCClientSecret ${HTTPD_AUTH_OIDC_CLIENT_SECRET} | ||
|
||
OIDCRedirectURI https://%{REQUEST_HOST}/oidc_login/redirect_uri |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is problematic, REQUEST_HOST is not defined at apache config file load time. investigating alternative.
Ran test with an auth configmap without the new parameters and the Pod fails to start
Hopefully there's a way to handle this in the template and if not possible document the update/migration of auth configmaps to newer pods. |
looks like adding:
might work for us. |
991937f
to
e380b76
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Near line 51 we need to add the RewriteCond for openid-connect
manageiq-redirects-ui:RewriteCond %{REQUEST_URI} !^/openid-connect
- auth-type: openid-connect - new auth config parameters: o HTTPD_AUTH_OIDC_PROVIDER_METADATA_URL oidc-provider-metadata-url o HTTPD_AUTH_OIDC_CLIENT_ID oidc-client-id o HTTPD_AUTH_OIDC_CLIENT_SECRET oidc-client-secret
the RedirectURI for OpenID-Connect.
so that the OIDCRedirectURI is quoted, otherwise the ${APPLICATION_DOMAIN} portion is substituted when viewing/editing the configmap.
optional so older httpd auth-configmaps will still work with the newer pods supporting OpenID-Connect.
do not send to back-end pods.
e380b76
to
85fa9de
Compare
LGTM 👍 Thank you @abellotti |
@abellotti The updates to the README can be pulled from my closed PR |
Checked commits abellotti/manageiq-pods@fdd60b0~...109fa75 with ruby 2.3.3, rubocop 0.52.1, haml-lint 0.20.0, and yamllint 1.10.0 **
|
This looks good to me. @jvlcek Merging this before ManageIQ/httpd_configmap_generator#33 won't cause any issues right? |
Thank you @carbonin and correct, merging this before ManageIQ/httpd_configmap_generator#33 won't cause any issues. |
Adding support for OpenID-Connect (cherry picked from commit 72dfee6)
Hammer backport details:
|
Adding support for OpenID-Connect
o HTTPD_AUTH_OIDC_PROVIDER_METADATA_URL oidc-provider-metadata-url
o HTTPD_AUTH_OIDC_CLIENT_ID oidc-client-id
o HTTPD_AUTH_OIDC_CLIENT_SECRET oidc-client-secret