Skip to content

Restrict JupyterHub login access only to group/project members

Problem to solve

Currently, JupyterHub's k8s deployment allow users to sign-in with GitLab using OAuth, however, it does not restrict access only to members of the project/group where the app was deployed (via k8s integration)

Further details

(Include use cases, benefits, and/or goals)

Proposal

There is support within JupyterHub today to restrict logins to just a specific group when using GitLab OAuth. We should look into how to do this, so it is less risky to hook up to GitLab.com

We should be able to configure this with:

hub:
  extraConfig:
    myConfigAddition:
      c.GitLabOAuthenticator.gitlab_group_whitelist = {"<group_name>"}

We could then add this to https://gitlab.com/gitlab-org/gitlab-ce/blob/master/app/models/clusters/applications/jupyter.rb#L56-83

What does success look like, and how can we measure that?

Login to a JupyterHub instance is only permitted to members the group/project.

Links / references

This page may contain information related to upcoming products, features and functionality. It is important to note that the information presented is for informational purposes only, so please do not rely on the information for purchasing or planning purposes. Just like with all projects, the items mentioned on the page are subject to change or delay, and the development, release, and timing of any products, features, or functionality remain at the sole discretion of GitLab Inc.

Edited by 🤖 GitLab Bot 🤖