Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add generic JWT auth #20928

Open
wants to merge 11 commits into
base: master
Choose a base branch
from
Open

feat: Add generic JWT auth #20928

wants to merge 11 commits into from

Conversation

wrmedford
Copy link

@wrmedford wrmedford commented Nov 25, 2024

Closes #14250

This allows for generic JWTs to be used for authentication that are minted outside of Argo. Argo currently mints its own JWTs for auth outside of Dex, and this extends its capabilities to utilize JWTs that originate from Identity Aware Proxies.

Checklist:

  • Either (a) I've created an enhancement proposal and discussed it with the community, (b) this is a bug fix, or (c) this does not need to be in the release notes.
  • The title of the PR states what changed and the related issues number (used for the release note).
  • The title of the PR conforms to the Toolchain Guide
  • I've included "Closes [ISSUE #]" or "Fixes [ISSUE #]" in the description to automatically close the associated issue.
  • I've updated both the CLI and UI to expose my feature, or I plan to submit a second PR with them.
  • Does this PR require documentation updates?
  • I've updated documentation as required by this PR.
  • I have signed off all my commits as required by DCO
  • I have written unit and/or e2e tests for my change. PRs without these are unlikely to be merged.
  • My build is green (troubleshooting builds).
  • My new feature complies with the feature status guidelines.
  • I have added a brief description of why this PR is necessary and/or what this PR solves.
  • Optional. My organization is added to USERS.md.
  • Optional. For bug fixes, I've indicated what older releases this fix should be cherry-picked into (this may or may not happen depending on risk/complexity).

Copy link

bunnyshell bot commented Nov 25, 2024

✅ Preview Environment deployed on Bunnyshell

Component Endpoints
argocd https://argocd-327urm.bunnyenv.com/
argocd-ttyd https://argocd-web-cli-327urm.bunnyenv.com/

See: Environment Details | Pipeline Logs

Available commands (reply to this comment):

  • 🔴 /bns:stop to stop the environment
  • 🚀 /bns:deploy to redeploy the environment
  • /bns:delete to remove the environment

Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Copy link

codecov bot commented Nov 25, 2024

Codecov Report

Attention: Patch coverage is 36.53846% with 66 lines in your changes missing coverage. Please review.

Project coverage is 54.97%. Comparing base (e8d5265) to head (a463c2b).
Report is 5 commits behind head on master.

Files with missing lines Patch % Lines
util/oidc/provider.go 45.45% 28 Missing and 14 partials ⚠️
util/session/sessionmanager.go 5.88% 13 Missing and 3 partials ⚠️
util/settings/settings.go 20.00% 7 Missing and 1 partial ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master   #20928      +/-   ##
==========================================
- Coverage   55.02%   54.97%   -0.05%     
==========================================
  Files         324      324              
  Lines       55456    55560     +104     
==========================================
+ Hits        30512    30546      +34     
- Misses      22323    22367      +44     
- Partials     2621     2647      +26     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@wrmedford wrmedford marked this pull request as ready for review November 25, 2024 15:12
@wrmedford wrmedford requested a review from a team as a code owner November 25, 2024 15:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Configure ArgoCD to accept a JWT token provided in the HTTP header
1 participant