Protects the system at the application levels via Authentication
Description
Activity

Avik Ganguly July 21, 2023 at 2:32 PM
Integration tests should still run on every PR in CI even though security is disabled by default (Which helm chart to test non-defaults with?)

Danish Jamal July 19, 2023 at 7:39 AM
and
The solution for 5th point is to keep oidc plugin global flag as false, and enable it only for specific route.
cors and request-transformer global flag can be set to true.

Avik Ganguly July 10, 2023 at 10:30 AMEdited
# Kong ingress annotation should forward user ID to BP and CC services so that zeebeClient can publish it as zeebe variable. API Key should be common for Bulk Processor and Channel Connector. - Not Done (Moved out of must have priority as there are other must have stories to be completed in PI)
BP needs config for Channel Connector Client Key & Client Secret as K8s secret. (Use service names for interservice communication instead of hostnames/ingress as contact points. - Somanath)
(assumption)link Keycloak user (human) to Kong Consumer/API Key (bot) - Theory needs to be validated. Removing Keycloak parts from integration test.
DB migration script should be ran automatically (map concept to hooks/post init script) - Should Have
Bulk Processor needs config for Channel Connector API Key. Ops Web would also need configuration for Bulk Processor. - Reducing the scope from MVP to PoC

Danish Jamal July 10, 2023 at 10:02 AMEdited
Error ReportingTitle: Kong is applying oidc plugin to each of the URL, causing the discovery url of keycloak to be accessible without auth.Pre-requisite:
Kong deployed with db enabled.
Enabled plugin oidc, request-transformer and cors using CRDs.
Keycloak deployed and accessible using port-forward localhost. (username: admin, password: password/admin)
Keycloak ingress annotation should not contain any kong plugin.
Expected Behaviour:
Hit keycloak url
Admin console login prompt should come up.
Enter admin and password.
Should login into admin console.
Actual Behaviour
Kong Error(http status code I dont remember)
Kong proxy log

Avik Ganguly July 10, 2023 at 10:02 AM
Regression issue on Kong plugins described in Payments channel on 10th July.
Details
Assignee
Danish JamalDanish JamalReporter
David HigginsDavid HigginsImplementation Priority
MustStory Points
11.5Time remaining
0mParent
Sprint
None
Details
Details
Assignee

Reporter

Protects the system at the application levels via Authentication
Design is similar to how we are doing auth-n for Ops App. The key difference is than in Ops App every user is an individual whereas in Channel every user is a system user. We can have a common breakdown of [ ] and [ ].
Application or event logs will capture events that each component performs and should contain at least the following information: ● application / user ID Linked to [ ]
Bulk Processor - Protecting by API Key using Key Auth Kong Plugin (Register the services in Kong in automated way or just document the automation steps - refer how Ops Web is the only part added to Kong / Keycloak realm) - Plugin annotations in respective ingresses - Done
Postman Collection env variable for API Key and Integration Tests config. - Done
Creating a (System) User in Keycloak (UI step - capture network log) (and perhaps linking with Kong consumer) - Done
Creating the API key using user specific admin API in Kong or Konga UI - Done
Kong has to work with DB here for Consumers to be handled as runtime configuration. - Done (Regression effort - OIDC, Request Transformer, CORS - Done) - Estimate: 2.5
Integration Test: Setup steps - Create consumer via Kong API, enable keyAuth plugin, enabling keyAuth plugin for BP service (set API key config). Teardown - removing keyAuth plugin linkage for BP service. TC - call BP API, assert 200/202 or 401 response. - Estimate: 2 - Done
Assumption: Different Source BBs are being treated as different tenants for data scoping. From Kong event stream, putting client correlation ID and consumer/user ID into ES is out of scope.
Linked to [ ]
Design Document-
Revised Approach
Enable db setup for exsiting kong setup.
Search for relevant article/blog/community conversation with api-key, clientId and secret setup.
Think from the requirement perspective and not techStack prospective.
Defaults :
security - disabled