This repository was archived by the owner on Oct 26, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 47
Option to expose auth bundle to kernel gateway #168
Comments
Related to some of the comments in jupyter/dashboards#13. We've got some of the security licked already. This issue is about sharing of creds between frontend login and backend kernel. /cc @lmeyerov |
parente
added a commit
to parente/dashboards_server
that referenced
this issue
Apr 7, 2016
Fixes jupyter#168 (c) Copyright IBM Corp. 2016
parente
added a commit
to parente/dashboards_server
that referenced
this issue
Apr 7, 2016
Fixes jupyter#168 (c) Copyright IBM Corp. 2016
parente
added a commit
to parente/dashboards_server
that referenced
this issue
Apr 12, 2016
* Don't pass all request headers to /api/kernels to avoid ping-ponging requests when Host/Origin are unexpected * Fix random test failures by stubbing request.Request so that async callbacks we don't care about never happen * Fix integration test breakage: integration-test requires etc/notebooks for the docker build so we can't ignore it (c) Copyright IBM Corp. 2016
jameslmartin
pushed a commit
to jameslmartin/dashboards_server
that referenced
this issue
Apr 20, 2016
Fixes jupyter#168 (c) Copyright IBM Corp. 2016
jameslmartin
pushed a commit
to jameslmartin/dashboards_server
that referenced
this issue
Apr 20, 2016
* Don't pass all request headers to /api/kernels to avoid ping-ponging requests when Host/Origin are unexpected * Fix random test failures by stubbing request.Request so that async callbacks we don't care about never happen * Fix integration test breakage: integration-test requires etc/notebooks for the docker build so we can't ignore it (c) Copyright IBM Corp. 2016
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
The auth passportjs strategies currently store arbitrary metadata in the express session. In some use cases, the kernel may need information from this bundle in order to act on behalf of the authenticated user. For example, if Dropbox is the configured OAuth dashboard provider, and a dashboard / notebook wants to read/write data from the authenticated dashboard user's Dropbox account, the scoped Dropbox access token granted privileges by the user at login needs to be shared with the kernel.
The kernel gateway has the ability to receive environment variables prefixed with
KERNEL_
on aPOST /api/kernels
request and set these in the environment of a newly launched kernel. An option here in the dashboard server can take advantage of this to:user
object from the passport strategydone(null, user)
call.KERNEL_USER_AUTH
env var in the POST request.The option on the dashboard server in
config.json
can be:The text was updated successfully, but these errors were encountered: