-
Notifications
You must be signed in to change notification settings - Fork 6.5k
feat: Add generic JWT auth #20928
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add generic JWT auth #20928
Conversation
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
❗ Preview Environment undeploy from Bunnyshell failedSee: Environment Details | Pipeline Logs Available commands (reply to this comment):
|
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #20928 +/- ##
==========================================
- Coverage 55.19% 53.25% -1.95%
==========================================
Files 337 337
Lines 57058 57177 +119
==========================================
- Hits 31496 30451 -1045
- Misses 22863 24049 +1186
+ Partials 2699 2677 -22 ☔ View full report in Codecov by Sentry. |
Signed-off-by: Wes Medford <[email protected]>
|
That's cool, but shouldn't we at least verify a configurable |
Good call, and completely agree. Will add that as a config option. |
…e audiences Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Added! |
Signed-off-by: Wes Medford <[email protected]>
|
Any update on this PR? Would love to see it merged. |
I should be able to circle back around to this later this week. Sorry for the delay! |
Signed-off-by: Wes <[email protected]>
|
Converting to draft while I go through upgrade to v5. Will set as ready once it's ready. |
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
|
I'm not entirely sure if those e2e tests are related to these changes. Still looking into it, but if they aren't, this is ready for review. |
Signed-off-by: Wes Medford <[email protected]>
Signed-off-by: Wes Medford <[email protected]>
|
Any update on this PR? I have a few projects that would benefit from this. Happy to help out if needed |
I've been having some health issues recently, and I think this is mostly ready to go. Just needs some last mile work done (and I think those tests that are failing might need to be altered to account for this new setup). I'm hoping to get back on this, but having to prioritize the job that gives me health insurance right now :) |
|
Sorry to hear, wish you all the best with those issues. I will see if I can help out on those tests |
|
@jsoref @andrii-korotkov-verkada @wrmedford I just created a new PR (#22901) with the merge conflicts resolved and this new PR passes all checks now |
|
Thank you @alexander-applyinnovations ! I'll close this one once that's accepted |
|
Thank you both for collaborating on this :) I will close this one so we focus the review and final changes on a single PR |
Closes #14250
This allows for generic JWTs to be used for authentication that are minted outside of Argo. Argo currently mints its own JWTs for auth outside of Dex, and this extends its capabilities to utilize JWTs that originate from Identity Aware Proxies.
Checklist: