Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: OAuth2 callback with self-signed Root CA. Fixes #6793 #6978

Merged
merged 1 commit into from
Oct 20, 2021
Merged

fix: OAuth2 callback with self-signed Root CA. Fixes #6793 #6978

merged 1 commit into from
Oct 20, 2021

Conversation

NextNiclas
Copy link
Contributor

Signed-off-by: Niclas Schnickmann niclas.schnickmann@nextstep-services.de

Looks like #6961 did not fix #6793 completely as I missed to add an http.Client to the oauth Exchange call.

This one was tested on my staging cluster and works fine with Keycloak (internal CA/self-signed).

Signed-off-by: Niclas Schnickmann <niclas.schnickmann@nextstep-services.de>
@codecov
Copy link

codecov bot commented Oct 19, 2021

Codecov Report

Merging #6978 (90ae380) into master (6384e5f) will decrease coverage by 0.01%.
The diff coverage is 55.55%.

❗ Current head 90ae380 differs from pull request most recent head ba6d657. Consider uploading reports for the commit ba6d657 to get more accurate results
Impacted file tree graph

@@            Coverage Diff             @@
##           master    #6978      +/-   ##
==========================================
- Coverage   48.52%   48.50%   -0.02%     
==========================================
  Files         265      265              
  Lines       19272    19273       +1     
==========================================
- Hits         9352     9349       -3     
- Misses       8867     8868       +1     
- Partials     1053     1056       +3     
Impacted Files Coverage Δ
server/auth/sso/sso.go 27.27% <55.55%> (+0.87%) ⬆️
cmd/argoexec/commands/emissary.go 50.35% <0.00%> (-1.44%) ⬇️
workflow/controller/workflowpod.go 73.89% <0.00%> (-0.52%) ⬇️
cmd/argo/commands/get.go 59.18% <0.00%> (+0.29%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 6384e5f...ba6d657. Read the comment docs.

@alexec alexec merged commit 2a15853 into argoproj:master Oct 20, 2021
@alexec
Copy link
Contributor

alexec commented Oct 20, 2021

Please comment if your changes are in v3.2 and we need to backport this.

@NextNiclas
Copy link
Contributor Author

Thanks for merging. If I get you correctly (just let me know if not) then no. The branch containing my changes was based on master branch and not release-3.2.

@sarabala1979 sarabala1979 mentioned this pull request Oct 21, 2021
24 tasks
kriti-sc pushed a commit to kriti-sc/argo-workflows that referenced this pull request Oct 24, 2021
…rgoproj#6978)

Signed-off-by: Niclas Schnickmann <niclas.schnickmann@nextstep-services.de>
Signed-off-by: kriti-sc <kathuriakriti1@gmail.com>
@thesuperzapper
Copy link
Contributor

@NextNiclas @alexec I think we should also add a config to specify a custom root CA, (rather than encouraging users to blindly trust all certs).

Here is an example config:

apiVersion: v1
kind: ConfigMap
metadata:
  name: workflow-controller-configmap
  namespace: argo
data:
  sso: |
    ...
    ## `rootCaFile` is just an example name
    rootCaFile: "/etc/oauth2-proxy/certs/ca.crt"

@thesuperzapper
Copy link
Contributor

I have raised issue #7198 based on my proposal in: #6978 (comment)

alexec pushed a commit that referenced this pull request Nov 17, 2021
Signed-off-by: Niclas Schnickmann <niclas.schnickmann@nextstep-services.de>
@sarabala1979 sarabala1979 mentioned this pull request Dec 15, 2021
73 tasks
sarabala1979 pushed a commit that referenced this pull request Dec 15, 2021
Signed-off-by: Niclas Schnickmann <niclas.schnickmann@nextstep-services.de>
@sarabala1979 sarabala1979 mentioned this pull request Mar 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

How to allow unsigned CA with SSO enabled
3 participants