-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No more auth0 #2277
No more auth0 #2277
Conversation
4e19c28
to
f02d9ee
Compare
This comment was marked as resolved.
This comment was marked as resolved.
Looks like I've hit a max number of OAuth apps that ca be created, which is 50. |
Do you foresee needing more in the short future? Btw, the request was fulfilled pretty quickly, IIRC, so it should not be a problem to ask for more, WDYT? |
|
b47832a
to
985241c
Compare
This should be ready for review now. Sorry for the PR size :/ Note, that merging this PR, will redeploy most of the hubs. This shouldn't be disruptive, as the hub usernames would remain the same, and the same providers will be used. The only notable difference for the users would be that instead of choosing their authorization provider from an Auth0 login screen, they will be presented with the CILogon one. Things will break only if there are OAuthenticator miscofigurations (hopefully I didn't miss anything 🤞🏼 ) |
Let's discuss quickly in the sprint planning how/when we operationally deploy this one! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wieee thanks for your thorough work on this!
This PR now switches from Auth0 to CILogon consistently, also when GitHubOAuthenticator could have been used. Do you suggest new hubs should go for CILogonOAuthenticator -> GitHub Auth, and/or migrating existing setups etc?
I think for now, this is a step in the right direction no matter what - so let's not think of that question as a blocker!
This LGTM but I made some comments that could be relevant to consider.
add3827
to
bdb6d66
Compare
Thank you very much for reviewing and approving this @consideRatio ❤️
@consideRatio, I believe we should go for CILogonOAuthenticator by default, as it was the case for Auth0. And one of the strong points in favour of CILogon vs using OAuth specific authenticators (apart from being able to support loging in with multiple providers on the same hub) is that we can create and manage the oidc client apps programatically. This is not the case with GitHub for example, where we create the OAuth apps from the UI :/
@damianavila, I agree 👍🏼 I'll also share what I have in mind async to help me have the ideas in line: Because our health check only checks spawning and not authentication, testing must happen manually I believe. If everything works, I go for a merge. |
|
2d97076
to
e3e6ec6
Compare
Thanks for the heads up @consideRatio! Now that the PRs you linked are merged, I believe this should be good to go, right?
This actually got posed to investigate #2302, but I'll start the manual deploy and testing today. |
Absolutely! |
…sername claim from GitHub
Co-authored-by: Erik Sundell <[email protected]>
7a88951
to
e2d98fe
Compare
Manually deployed all hubs that had transitioned from auth0 to cilogon and verified that I can login and that I am an admin. Everything was fine 🎉 Will go for a merge. |
🎉🎉🎉🎉 Monitor the deployment of the hubs here 👉 https://github.com/2i2c-org/infrastructure/actions/runs/4479186946 |
@GeorgianaElena wieeee nice work!!!!!! |
Closes #1304
Straightforward changes:
oauthenticator
[CILogonOAuthenticator] Add profile to default scope, fix detail following recent refactoring jupyterhub/oauthenticator#575Worth some more 👀 on it:
Updated the
cilogon_app.py
to:enc-{hub_name}.secret.values.yaml
) can only contain cilogon specific configurationenc-{hub_name}.secret.values.yaml
file that's either empty or has prior existing config.Turned existing auth0 client management into a deployer subcommand in case we want to use it still in exceptional cases [Question] Should we turn the existing Auth0 OAuth client management code into a deployer subcommand #2328
Todo:
profile
to the defaultscope
list and we don't need to be explicit about it anymore. Open an issue to track the cleanup of our config.