-
Notifications
You must be signed in to change notification settings - Fork 97
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Filter environments by user access #2940
base: main
Are you sure you want to change the base?
Conversation
if groups is not None: | ||
for group in groups: | ||
group = group.replace("/", "") | ||
role_bindings["role_bindings"][f"{group}/*"] = ["viewer"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is a pretty big assumption here, that the keycloak groups map directly to the conda-store namespaces. Is that true for nebari?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is no direct way to create a new namespace through the ui, and group names do match namespaces, though there is also a namespace per user that matches their user name.
That being said, it is possible to create a new namespace and give permissions to use it with an arbitrary name using the conda-store api.
Additionally, some groups, like admins, have access to more namespaces than just their own.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a doc (or piece of existing code) that describes the relationship between keycloak permissions/groups/etc and conda-store privileges? I want to be able to ensure the user is able to see all the namespaces+environments it has access to.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is custom auth logic at
Line 105 in ac88391
class KeyCloakCondaStoreRoleScopes: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hmmm, I see that's not quite what I'm looking for. The user_info
dict provided ultimately comes from the jupyter api /users
endpoint https://jupyterhub.readthedocs.io/en/5.2.1/reference/rest-api.html#operation/get-user which provides the users roles and groups. Here is an example of the output
{
"name": "string",
"admin": true,
"roles": [
"string"
],
"groups": [
"string"
],
"server": "string",
"pending": "spawn",
"last_activity": "2019-08-24T14:15:22Z",
"servers": {
},
"auth_state": {}
}
Is there some piece of code or docs that describe the relationship between hub users and keycloak users or conda store permissions?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@viniciusdc do you have any insight here for @soapy1?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
relationship between hub users and keycloak users
Chiming in as I worked on this - both groups and roles are taken from Keycloak since:
- Get JupyterHub
groups
from Keycloak, supportoauthenticator
16.3+ #2361 - Fetch JupyterHub roles from Keycloak #2447
@viniciusdc can confirm if anything changed since as I was not reviewing PRs that followed, but I suspect this is still the case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @krassowski those links were very helpful in piecing together a model of what is going on here. This part of the authenticator is also notable https://github.com/nebari-dev/nebari/blob/main/src/_nebari/stages/kubernetes_services/template/modules/kubernetes/services/conda-store/config/conda_store_config.py#L415.
I think this implementation where the permissions are constructed based on the group
provided by the Jupyter user object should be correct. I added a few extra comments to explain the motivation.
This was pretty convoluted to piece together. I think it would be good if at least one other person also went thru the exercise of following the permissions flow from keycloak thru Jupyter and conda-store to double check that this approach is valid.
It would be nice if there was some kind of document that outlined the intended design of how permissions work in nebari. Maybe as part of the tasks in this issue #2304?
f5f3382
to
8fd1157
Compare
a8a4d83
to
aee3dff
Compare
f4d13ba
to
9e71468
Compare
This PR updates the
get_conda_environments
function called by jhub apps so that only the environments the user has access to are shown. This is achieved by generating a token for permissions that match the jupyterhub users' conda-store permissions.Reference Issues or PRs
#2193
What does this implement/fix?
Put a
x
in the boxes that applyTesting
How to test this PR?
a. an installation of Nebari with jhub apps enabled
b. at least 2 users with some conda environments