-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support For External IDP and External User Pool Provider In data.all #897
Conversation
Changes from Open Source
Merged From Open source
Todo -
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am reviewing in parts. At the moment I am reviewing the deployment part
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some more comments. I still need to review the custom resources in the deployment
I am testing in AWS in a deployment with default parameters. (Cognito Auth)
|
from dataall.base.api import gql | ||
from dataall.core.groups.api.resolvers import get_group, list_groups, get_groups_for_user | ||
|
||
getGroup = gql.QueryField( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is getGroup
used anywhere other than tests?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, atleast from what I searched . It just seems to have been used in tests.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@noah-paige is there any clean-up issue that is already filed ? This can be added into it
…d alb frontend changes as per custom auth
…naming conventiosn and added guardrails
Testing in AWS in a deployment with VPC Facing Cognito Auth (with ReAuth enforced on CreateDataset and ListOrg APIs):
|
Testing Custom Auth + VPC Facing (updating as I test):
|
Testing in AWS internet-facing no custom-auth:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good to merge!
…nd (#913) …nd stack ### Feature or Bugfix <!-- please choose --> - Bugfix ### Detail - Config Role used to read SSM parameters in deployment account assumed by tooling account needs to be created in the BackendStack so it can be used in the pre CodeBuild commands of the ALBFront Stack - Applies for VPC Facing Deployments ### Relates - #897 ### Security Please answer the questions below briefly where applicable, or write `N/A`. Based on [OWASP 10](https://owasp.org/Top10/en/). - Does this PR introduce or modify any input fields or queries - this includes fetching data from storage outside the application (e.g. a database, an S3 bucket)? - Is the input sanitized? - What precautions are you taking before deserializing the data you consume? - Is injection prevented by parametrizing queries? - Have you ensured no `eval` or similar functions are used? - Does this PR introduce any functionality or component that requires authorization? - How have you ensured it respects the existing AuthN/AuthZ mechanisms? - Are you logging failed auth attempts? - Are you using or adding any cryptographic features? - Do you use a standard proven implementations? - Are the used keys controlled by the customer? Where are they stored? - Are you introducing any new policies/roles/users? - Have you used the least-privilege principle? How? By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
Feature or Bugfix
Detail
Currently data.all uses Cognito for user login and also maintains the user pool for teams/groups in data.all.
This feature adds support to add any external OIDC based IdP. Apart from that , any external service provider can be used for maintaining teams/groups information.
This PR contains both backend and frontend changes for External IDP.
Note - When deploying with External IDP the user guide won't be setup as a part of deployment. Created following github issue to track this incremental change - #898
Testing
make test
- Unit TestsRelates
Github Issue - #872
Credits - This code change was build on top of work done by @blitzmohit
Security
Please answer the questions below briefly where applicable, or write
N/A
. Based onOWASP 10.
fetching data from storage outside the application (e.g. a database, an S3 bucket)? Yes
eval
or similar functions are used? N/ABy submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.