-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Adding support for OpenID-Connect #251
Conversation
marking as WIP.
|
/cc @jvlcek |
Requires: ManageIQ/container-httpd#33 |
templates/miq-template-ext-db.yaml
Outdated
OIDCClientID ${HTTPD_AUTH_OIDC_CLIENT_ID} | ||
OIDCClientSecret ${HTTPD_AUTH_OIDC_CLIENT_SECRET} | ||
|
||
OIDCRedirectURI https://%{REQUEST_HOST}/oidc_login/redirect_uri |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is problematic, REQUEST_HOST is not defined at apache config file load time. investigating alternative.
Ran test with an auth configmap without the new parameters and the Pod fails to start
Hopefully there's a way to handle this in the template and if not possible document the update/migration of auth configmaps to newer pods. |
looks like adding:
might work for us. |
991937f
to
e380b76
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Near line 51 we need to add the RewriteCond for openid-connect
manageiq-redirects-ui:RewriteCond %{REQUEST_URI} !^/openid-connect
- auth-type: openid-connect - new auth config parameters: o HTTPD_AUTH_OIDC_PROVIDER_METADATA_URL oidc-provider-metadata-url o HTTPD_AUTH_OIDC_CLIENT_ID oidc-client-id o HTTPD_AUTH_OIDC_CLIENT_SECRET oidc-client-secret
the RedirectURI for OpenID-Connect.
so that the OIDCRedirectURI is quoted, otherwise the ${APPLICATION_DOMAIN} portion is substituted when viewing/editing the configmap.
optional so older httpd auth-configmaps will still work with the newer pods supporting OpenID-Connect.
do not send to back-end pods.
e380b76
to
85fa9de
Compare
LGTM 👍 Thank you @abellotti |
@abellotti The updates to the README can be pulled from my closed PR |
Checked commits abellotti/manageiq-pods@fdd60b0~...109fa75 with ruby 2.3.3, rubocop 0.52.1, haml-lint 0.20.0, and yamllint 1.10.0 **
|
This looks good to me. @jvlcek Merging this before ManageIQ/httpd_configmap_generator#33 won't cause any issues right? |
Thank you @carbonin and correct, merging this before ManageIQ/httpd_configmap_generator#33 won't cause any issues. |
Adding support for OpenID-Connect (cherry picked from commit 72dfee6)
Hammer backport details:
|
Adding support for OpenID-Connect
o HTTPD_AUTH_OIDC_PROVIDER_METADATA_URL oidc-provider-metadata-url
o HTTPD_AUTH_OIDC_CLIENT_ID oidc-client-id
o HTTPD_AUTH_OIDC_CLIENT_SECRET oidc-client-secret