-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support OAuthenticator for our hubs #625
Comments
Changelog for v1.1.3 of z2jh merged and tag release made jupyterhub/zero-to-jupyterhub-k8s#2361 |
Opened #635 to bump the version of z2jh we're using |
Next steps
|
I have a HackMD with the design proposal here: https://hackmd.io/@sgibson91/S1CWEnemY Feedback appreciated! |
Hey @sgibson91 - I will take a closer look this week! But I had two really quick top-level questions:
|
I left a couple comments in the hackmd, @sgibson91. But overall +1 from me. To get this to work with auth0, I think we'll need to add functionality that so that somehow when auth0 is authenticating with GitHub, it fetches information about 'groups' from GitHub, populates it into auth0, and then uses that for login authorization. I think auth0 has RBAC functionality (https://auth0.com/docs/authorization/rbac/) that can be used to do this and more. The question is how to get info from GitHub in auth0, and I haven't played around with it. I feel like it should be possible, since it is such an obvious use case. However, the path forward that @sgibson91 has outlined here with |
Thanks for the comments @yuvipanda! I would have to do some further digging into the Auth0 use case. It's definitely a valid use case but, thinking in terms of our Right to Replicate, is authenticating with GitHub Teams via Auth0 something that a community would want to do? I understand we're doing it as it saves us the toil of manually creating client IDs and secrets for every auth connection. Are there benefits for a single hub community for taking this approach? I might recommend opening a longer term issue for investing GitHub Teams with Auth0 and come back to it if we find this is an overwhelmingly popular option and we can't keep up with the toil - if people are +1?
There are a couple of reasons that make me want to push-back against this:
|
Sounds good to me! Do we already have one? |
None that I'm aware of. Will open one soon. |
|
Issue opened here #698 |
I have a first pass at this here: #706 |
Reopening as merging #706 caused some validation errors that I'm going to look into with fresh eyes. I reverted the change in #721. CI isn't green across the board, but the errors are mostly timeout related I think due to hitting various APIs with a lot of traffic in a short amount of time. I re-ran once and got a different set of hubs failing with timeout errors so I think they're all up to date with post-721 merge, just being flakey |
Sigh, broken again. See #728 which is actually not a complete bugfix. |
Description
Right now, we only support using Auth0 for our hub authentication. Individual hubs should be able to opt-in to using OAuthenticator for specific features, rather than being forced to just use Auth0.
Benefit
While our Auth0 setup allows us to create arbitrary new hubs without needing to provision external auth credentials (like GitHub OAuth secrets, Google OAuth secrets, etc), it doesn't allow us to use provider specific features present in the JupyterHub OAuthenticator - such as allowing users with a GitHub org or team to login (#598).
Many communities may want to use these features, particularly the more advanced ones. Most importantly, this would allow us to mirror Pangeo's authentication setup.
Implementation
Tasks to complete
Updates
Auth0
.The text was updated successfully, but these errors were encountered: