-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Notebook server login is failing after login in with a not allowed user #109
Comments
The issue still persists after updating the version to 4.10. Related PR for the oauth upgrade: red-hat-data-services/odh-manifests#395 It seems that we need to dive deeper and conduct a more thorough investigation in order to identify the root cause of the problem. |
Moved this to next sprint 1.31. |
Regarding the unauthorized user, to grant permissions, use the following command: oc -n rhods-notebooks adm policy add-role-to-user view ldap-user2 It appears that when the oauth-proxy encounters the 403 Permission denied screen, it does not redirect to the correct path for the login screen. The 'Health' path should look like this:
However, the path that is being redirected by the 403 Permission denied screen seems to be incorrect, causing a login/logout loop. The incorrect path is:
As you can see, the last part of the URL is missing the resource type, namespace, and the service account notebook%2Frhods-notebooks%2Fjupyter-nb-ldap-2dadmin1 at the end. A workaround for this issue is to close that tab and try accessing it with user2 via the notebook launcher page. |
After conducting further investigation into this issue, it has come to light that the notebook-controller is redirecting to the wrong login URL due to the OAuth providing all the parameters. For a clearer understanding, please refer to the screenshots and the URLs provided below. This is the URL before we provide a non-auth user which eventually will direct to the 403 screen. If you see carefully the oauth provides all the info that is needed (Brake it down for better understanding)
Now, when you provide the non-auth user, we get the 403 screen (Which is expected) As you can see on the mouse hover the redirect URL points to the endpoint: If you change this path You can log in on the notebook So, the missing point here is how the notebook-controler manages the received responses from the oauth-proxy. |
@VaishnaviHire, your support is vital in this issue. Can you please review the investigation that has been conducted so far and provide insight into how the notebook-controller handles responses from the oauth-proxy? It appears that there might be an issue with redirects, as they seem to be directed to the wrong API endpoint. |
/needs-info |
Re-Opening this issue, the change injected by odh-notebook-controller to the Notebook CR, would We would like to implement this by checking if the changes would impact long-running notebooks. reverting the changes from: |
Adding here the blocker issue Long Running Notebook Testing Support. There is also a relation to this -> #150) |
Description of problem:
Notebook server login is failing after login in with a not allowed user
Prerequisites (if any, like setup, operators/versions):
1.28
Steps to Reproduce
Login in Red Hat OpenShift Data Science with ldap-admin2
Start a notebook server
pen in a new tab
Login with ldap-user2
The message: 403 Permission Denied
Hit login link
Login with OpenShift
Login with ldap-admin2
Actual results:
It is returning to the login page
Expected results:
Logged in with ldap-admin2
Reproducibility (Always/Intermittent/Only Once):
Always
Build Details:
1.28
Workaround:
Close the tab.
In Red Hat OpenShift Data Science, hit "Access notebook server"
Login with ldap-admin2
Additional info:
JIRA: https://issues.redhat.com/browse/RHODS-9425
The text was updated successfully, but these errors were encountered: