-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow to enable security for the Management interface without enabling basic authentication and document support for other mechanisms #44554
Conversation
🙈 The PR is closed and the preview is expired. |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! That's awesome!
@michalvavrik Indeed, looks good. |
I actually tested it because I didn't trust that config expression is expanded in
I don't think that is the case because there are other mechanisms like SR JWT? I think that mechanism is not a bulletproof, but I know what you mean. If you want, I can re-check that. |
Thanks,
May be we should treat Basic authentication on the management router similarly to the way it is treated on the main router ? Or will it be too confusing ? |
There you added OIDC extension. If you add an extension that provides that mechanism, it's a good signal you want to use it. But basic auth is builtin and always present, so we can't guess if you want it or not.
I agree, but this is not the only mechanism in the IT/Management interface auth module.
I'll add another test to make sure this works as it does on the main router later today. I think it should work completely same because there, basic auth is also not implicitly enabled if other mechanisms are present. |
101671d
to
dd0133a
Compare
@sberyozkin quick update as I had a look:
|
dd0133a
to
57bf2f8
Compare
Status for workflow
|
I believe native failure is not related:
|
We use same HTTP authenticator for both main router and management interface, therefore same HTTP auth mechanisms can be supported. Difference is mainly that secuirty is not enabled by default when the Quarkus Security is present. Reason for this is backwards compatibility, users can use management interface on ports exposed only inside cluster etc. where external requests are not allowed. But still require authentication for the main router. The other difference is that only supported authorization method are HTTP perms. Using security annotations on custom health check beans etc. is possible, but less advisable as we cannot perform this eagerly.
This PR:
I really wonder if we should not enable security by default. Thoughts about that?
Existing Management interface auth tests before this PR:
integration-tests/management-interface-auth