forked from kubeflow/manifests
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Krzysztof Romanowski <krzysztof.romanowski.kr3@roche.com>
- Loading branch information
1 parent
5835025
commit 8c616f0
Showing
28 changed files
with
250 additions
and
133 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Empty file.
5 changes: 5 additions & 0 deletions
5
common/oidc-client/components/central-dashboard/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
apiVersion: kustomize.config.k8s.io/v1alpha1 | ||
kind: Component | ||
|
||
patchesStrategicMerge: | ||
- patches/deployment.logout-url.yaml |
19 changes: 19 additions & 0 deletions
19
common/oidc-client/components/central-dashboard/patches/deployment.logout-url.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
apiVersion: apps/v1 | ||
kind: Deployment | ||
metadata: | ||
name: centraldashboard | ||
namespace: kubeflow | ||
spec: | ||
template: | ||
spec: | ||
containers: | ||
- name: centraldashboard | ||
env: | ||
# This successfully logs out the user but the user is not redirected to | ||
# the home page. This is because of custom integration with | ||
# oidc-authservice which will provide response with 'afterLogoutURL'. | ||
# https://github.com/arrikto/oidc-authservice/blob/0c4ea9a/server.go#L509 | ||
# https://github.com/kubeflow/kubeflow/blob/c6c4492/components/centraldashboard/public/components/logout-button.js#L50 | ||
# Please refresh the page after logging out. | ||
- name: LOGOUT_URL | ||
value: /oauth2/sign_out |
Empty file.
23 changes: 23 additions & 0 deletions
23
.../istio-oauth2-proxy/authorizationpolicy.oauth2-proxy-istio-ingressgateway-cloudflare.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
apiVersion: security.istio.io/v1beta1 | ||
kind: AuthorizationPolicy | ||
metadata: | ||
name: oauth2-proxy-istio-ingressgateway | ||
namespace: istio-system | ||
spec: | ||
action: CUSTOM | ||
provider: | ||
name: oauth2-proxy | ||
selector: | ||
matchLabels: | ||
app: istio-ingressgateway | ||
rules: | ||
- to: | ||
- operation: | ||
notPaths: | ||
- /favicon* | ||
- /webcomponentsjs* | ||
- /vendor.bundle.js | ||
- /app.bundle.js | ||
- /dashboard_lib.bundle.js | ||
- /assets* | ||
- /app.css |
14 changes: 14 additions & 0 deletions
14
.../components/istio-oauth2-proxy/authorizationpolicy.oauth2-proxy-istio-ingressgateway.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
apiVersion: security.istio.io/v1beta1 | ||
kind: AuthorizationPolicy | ||
metadata: | ||
name: oauth2-proxy-istio-ingressgateway | ||
namespace: istio-system | ||
spec: | ||
action: CUSTOM | ||
provider: | ||
name: oauth2-proxy | ||
selector: | ||
matchLabels: | ||
app: istio-ingressgateway | ||
rules: | ||
- {} |
25 changes: 25 additions & 0 deletions
25
common/oidc-client/components/istio-oauth2-proxy/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
apiVersion: kustomize.config.k8s.io/v1alpha1 | ||
kind: Component | ||
|
||
resources: | ||
- authorizationpolicy.oauth2-proxy-istio-ingressgateway.yaml | ||
- requestauthentication.dex-jwt.yaml | ||
|
||
# If you're running Kubeflow behind CloudFlare, use | ||
# authorizationpolicy.oauth2-proxy-istio-ingressgateway-cloudflare.yaml | ||
# instead of | ||
# authorizationpolicy.oauth2-proxy-istio-ingressgateway.yaml | ||
|
||
patchesStrategicMerge: | ||
- patches/cm.enable-oauth2-proxy.yaml | ||
- patches/deployment.jwt-refresh-interval.yaml | ||
|
||
# patches: | ||
|
||
# patchesJson6902: | ||
# - target: | ||
# group: apps | ||
# version: v1 | ||
# kind: Deployment | ||
# name: example | ||
# path: patches/cm.enable-oauth2-proxy.yaml |
Empty file.
Empty file.
37 changes: 37 additions & 0 deletions
37
common/oidc-client/components/istio-oauth2-proxy/patches/cm.enable-oauth2-proxy.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
apiVersion: v1 | ||
kind: ConfigMap | ||
metadata: | ||
name: istio | ||
namespace: istio-system | ||
data: | ||
meshNetworks: 'networks: {}' | ||
mesh: |- | ||
accessLogFile: /dev/stdout | ||
defaultConfig: | ||
discoveryAddress: istiod.istio-system.svc:15012 | ||
proxyMetadata: {} | ||
tracing: {} | ||
enablePrometheusMerge: true | ||
rootNamespace: istio-system | ||
tcpKeepalive: | ||
interval: 5s | ||
probes: 3 | ||
time: 10s | ||
trustDomain: cluster.local | ||
extensionProviders: | ||
- envoyExtAuthzHttp: | ||
headersToDownstreamOnDeny: | ||
- content-type | ||
- set-cookie | ||
headersToUpstreamOnAllow: | ||
- authorization | ||
- path | ||
- x-auth-request-email | ||
- x-auth-request-groups | ||
- x-auth-request-user | ||
includeRequestHeadersInCheck: | ||
- authorization | ||
- cookie | ||
service: oauth2-proxy.oauth2-proxy.svc.cluster.local | ||
port: 80 | ||
name: oauth2-proxy |
13 changes: 13 additions & 0 deletions
13
...on/oidc-client/components/istio-oauth2-proxy/patches/deployment.jwt-refresh-interval.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
apiVersion: apps/v1 | ||
kind: Deployment | ||
metadata: | ||
name: istiod | ||
namespace: istio-system | ||
spec: | ||
template: | ||
spec: | ||
containers: | ||
- name: discovery | ||
env: | ||
- name: PILOT_JWT_PUB_KEY_REFRESH_INTERVAL | ||
value: "1m" |
14 changes: 14 additions & 0 deletions
14
common/oidc-client/components/istio-oauth2-proxy/requestauthentication.dex-jwt.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
apiVersion: security.istio.io/v1beta1 | ||
kind: RequestAuthentication | ||
metadata: | ||
name: dex-jwt | ||
namespace: istio-system | ||
spec: | ||
jwtRules: | ||
- forwardOriginalToken: true | ||
issuer: http://dex.auth.svc.cluster.local:5556/dex | ||
outputClaimToHeaders: | ||
- header: kubeflow-userid | ||
claim: email | ||
- header: kubeflow-groups | ||
claim: groups |
Empty file.
Empty file.
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,3 @@ | ||
approvers: | ||
- axel7083 | ||
- axel7083 | ||
- kromanow94 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
* This deployment of oauth2-proxy doesn't support OpenShift. To enable | ||
integration with OpenShift, use openshift distribution of oauth2-proxy | ||
available here: https://github.com/openshift/oauth-proxy | ||
* also enable RBAC for token reviews: | ||
```yaml | ||
|
||
``` | ||
|
||
* Login routine will use /oauth2 to manage actions | ||
* When oauth2-proxy detects need to will redirect to dex and provide | ||
* oidc client id | ||
* redirect url to kubeflow with path to `/oauth2/callback` | ||
* Login starts with /oauth2/callback | ||
* if using oauth2-proxy for multiple domains, must ensure path based routing to `/oauth2` routes to oauth2-proxy...??? | ||
* Include VirtualService for logging out (did axel already do that?) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
apiVersion: v1 | ||
kind: Namespace | ||
metadata: | ||
name: oauth2-proxy |
Oops, something went wrong.