-
Notifications
You must be signed in to change notification settings - Fork 880
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: upgrade oidc-authservice #2150
feat: upgrade oidc-authservice #2150
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). For more information, open the CLA check for this pull request. |
Hi @ittus. Thanks for your PR. I'm waiting for a kubeflow member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
aa561e6
to
ed63abb
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/ok-to-test
@ittus could you elaborate a bit more on the changes?
|
Hi @juliusvonkohout , Currently, it's only available with session authentication In the new version of oidc-authservice, it has 3 authentications: sessions, idtoken, and k8sauthentication. I checked with KFServing, ServiceAccount token and IdToken can be used to call serving API along with session |
Can we use it then to authenticate from outside AND inside of the cluster with an extracted serviceaccounttoken from default-editor? I need something like this to trigger pipelines automatically without manual login. |
Currently, I'm using it to invoke KFServing outside of cluster. Not test with pipeline yet. |
@ittus Thank you very much, then this is a very important feature. @kimwnasptd is this possible for 1.5 ? @davidspek this feature might also be interesting for you. |
@ittus Do you have an example implementation of how you are using either the ID token or service account to call KFserving API ? |
@snmohan83 I implemented this in a private project. |
@ittus I would like to use API calls similar to the example used here: https://github.com/kserve/kserve/tree/master/docs/samples/istio-dex#run-a-prediction where a session_token can be obtained that can be used in the application. |
@ittus maybe you have a similar example to share. Are you also using it with other dex authentication providers like keycloak and gitlab? |
8b20726
to
3c94d21
Compare
@kimwnasptd Can we get this into Kubeflow 1.6? |
Updating the oidc-authservice was also discussed for the release of Kubeflow 1.3 but could not be included because it would break the logout button of the centraldashboard. Is this still an issue? #1714 (comment) |
It will also be interesting to see how it works with the new DEX version 2.31.2 #2243 (comment) |
Logout button is still an issue. |
Is that also the case for the new DEX version 2.31.2 in Kubeflow 1.6 #2243 (comment) ? |
Hi Team, did you have a chance to test this upgrade? |
I opened a PR to make the logout button work with the updated version of the authservice, feel free to review and provide feedback |
@kimwnasptd any hope that it goes into 1.6 with the fixes from @alembiewski ? |
We also had to diverge from the upstream manifests since they're using an outdated version of oidc-authservice that doesn't support opaque tokens. The opaque token pattern lets us use the KFP SDK from outside of the cluster by consuming the auth tokens in our kubeconfig. |
+1 I would also like this to be implemented in 1.6 |
/ok-to-test @manolis-andr @athamark could you help with this review to update the AuthService manifests? Let's also have a follow up PR afterwards to have an OWNERS file in that component. |
Hello everyone, sorry for the delay. I am picking this up. In the comments below I will try address the following topics:
|
1. What does the proposed
|
2. Review the proposed changes of this PR.All the changes proposed for the:
make sense. I do not see anything that needs to be corrected. Good job @ittus! Just one minor comment regarding the Since this behavior was part of the |
3. What else do we need for this effort to conclude?As mentioned above in this conversation, we can not merge this effort without updating the CentralDashboard. See here:
I tested the For this, I am in sync with @kimwnasptd and we will comment on the respective effort to highlight minor fixes that we should make. |
4. A brief overview of new features that AuthService offers but this image does not include.Later
|
Thanks for the thorough review and context @athamark! I'll move on and merge this PR. The follow up step is to work on kubeflow/kubeflow#6609 and ensure it can use a dynamic link for the logout URL. So the first RC will have a bug with the logout but we'll fix it during feature freeze. I'll open an issue so that we can track this. Thank you for the work @ittus! /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ittus, kimwnasptd The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
* feat: upgrade oidc-authservice * Update common/oidc-authservice/base/params.env
Which issue is resolved by this Pull Request:
Upgrade oidc-authservice to gcr.io/arrikto/kubeflow/oidc-authservice:e236439
Description of your changes:
Additional information