-
Notifications
You must be signed in to change notification settings - Fork 12
feat: Add stac-auth-proxy. #358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
f463b6b to
650a01e
Compare
10cb103 to
f76cfa7
Compare
f76cfa7 to
0abcf57
Compare
0abcf57 to
2a43c59
Compare
2a43c59 to
f13e4f3
Compare
This could be useful when the auth server is deployed with stac-auth-proxy and we need to wait. At least in eoAPI would be good for testing (developmentseed/eoapi-k8s#358). --------- Co-authored-by: Anthony Lukach <[email protected]>
e15f7de to
d82dcfd
Compare
38a30e1 to
94ff7d1
Compare
94ff7d1 to
feb8792
Compare
| - it: should not create stac routes when stac is disabled | ||
| set: | ||
| ingress.enabled: true | ||
| stac.enabled: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it ever valid to have stac disabled but stac-auth-proxy enabled? Should that rather be a validation check that stac-auth-proxy cannot be enabled is stac.enabled is set to false ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, indeed stac-auth-proxy without stac doesn't make sense. Will adjust in a bit.
On a side note: does anybody deploy eoAPI without the stac service at all?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
On a side note: does anybody deploy eoAPI without the stac service at all?
Not that I know of. But it seems like it makes sense to leave the option in there for consistency? I think it can sometimes be convenient if one wants to temporarily remove a service or so.
batpad
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pantierra this looks really good to me! 👏
Left one minor comment - feel free to ignore if it seems like I misunderstood.
5296712 to
bf1c0e1
Compare
bf1c0e1 to
fab55d0
Compare
Closes #222
Integrates stac-auth-proxy as an optional authentication/authorization layer for the STAC API service. When enabled, all STAC API requests are routed through the auth proxy, which validates tokens against an OIDC provider before forwarding to the upstream STAC service.
ghcr.io/developmentseed/stac-auth-proxy/charts(version 0.1.1)OIDC_DISCOVERY_URLis set whenstac-auth-proxyis enabledstac-auth-proxywhen enabled, falls back to direct STAC service when disabled.DEFAULT_PUBLIC=trueto protect the sensible defaults bystac-auth-proxywhich STAC API endpoints to protect.