Skip to content

Add OIDC config#11566

Draft
sk593 wants to merge 5 commits intomainfrom
add-oidc-config
Draft

Add OIDC config#11566
sk593 wants to merge 5 commits intomainfrom
add-oidc-config

Conversation

@sk593
Copy link
Copy Markdown
Contributor

@sk593 sk593 commented Apr 6, 2026

Description

Please explain the changes you've made.

Type of change

  • This pull request fixes a bug in Radius and has an approved issue (issue link required).
  • This pull request adds or changes features of Radius and has an approved issue (issue link required).
  • This pull request is a minor refactor, code cleanup, test improvement, or other maintenance task and doesn't change the functionality of Radius (issue link optional).

Fixes: #issue_number

Contributor checklist

Please verify that the PR meets the following requirements, where applicable:

  • An overview of proposed schema changes is included in a linked GitHub issue.
    • Yes
    • Not applicable
  • A design document PR is created in the design-notes repository, if new APIs are being introduced.
    • Yes
    • Not applicable
  • The design document has been reviewed and approved by Radius maintainers/approvers.
    • Yes
    • Not applicable
  • A PR for the samples repository is created, if existing samples are affected by the changes in this PR.
    • Yes
    • Not applicable
  • A PR for the documentation repository is created, if the changes in this PR affect the documentation or any user facing updates are made.
    • Yes
    • Not applicable
  • A PR for the recipes repository is created, if existing recipes are affected by the changes in this PR.
    • Yes
    • Not applicable

sk593 and others added 4 commits March 20, 2026 11:54
Signed-off-by: sk593 <shruthikumar@microsoft.com>
Signed-off-by: sk593 <shruthikumar@microsoft.com>
Signed-off-by: sk593 <shruthikumar@microsoft.com>
@sk593 sk593 requested a deployment to external-contributor-approval April 6, 2026 17:12 — with GitHub Actions Waiting
@sk593 sk593 requested a deployment to external-contributor-approval April 6, 2026 17:13 — with GitHub Actions Waiting
echo "AZURE_SUBSCRIPTION_ID is set: ${{ vars.AZURE_SUBSCRIPTION_ID != '' }}"

- name: Azure Login via OIDC
uses: azure/login@v2
@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 6, 2026

Unit Tests

    1 files   -   1    336 suites   - 79   6m 35s ⏱️ -3s
4 901 tests + 29  4 898 ✅ + 28  2 💤 ±0  1 ❌ +1 
4 900 runs   - 874  4 897 ✅  - 875  2 💤 ±0  1 ❌ +1 

For more details on these failures, see this check.

Results for commit 1735c4f. ± Comparison against base commit 2ea450a.

This pull request removes 6 and adds 35 tests. Note that renamed tests count towards both.
github.com/radius-project/radius/cmd/rad/cmd ‑ Test_HandlePanic
github.com/radius-project/radius/cmd/rad/cmd ‑ Test_prettyPrintJSON
github.com/radius-project/radius/cmd/rad/cmd ‑ Test_prettyPrintJSON/formats_JSON_correctly
github.com/radius-project/radius/cmd/rad/cmd ‑ Test_prettyPrintJSON/formats_complex_objects
github.com/radius-project/radius/cmd/rad/cmd ‑ Test_prettyPrintJSON/handles_invalid_JSON
github.com/radius-project/radius/cmd/rad/cmd ‑ Test_prettyPrintRPError
TestMain
github.com/radius-project/radius/pkg/github/auth ‑ TestGenerateJWT
github.com/radius-project/radius/pkg/github/auth ‑ TestGenerateState
github.com/radius-project/radius/pkg/github/auth ‑ TestGetInstallationToken
github.com/radius-project/radius/pkg/github/auth ‑ TestGetInstallationToken_Error
github.com/radius-project/radius/pkg/github/auth ‑ TestOAuthConfig_AuthorizationURL
github.com/radius-project/radius/pkg/github/auth ‑ TestParsePrivateKey
github.com/radius-project/radius/pkg/github/auth ‑ TestParsePrivateKey_Invalid
github.com/radius-project/radius/pkg/github/auth ‑ TestRequireAuth_BearerToken
github.com/radius-project/radius/pkg/github/auth ‑ TestRequireAuth_Cookie
…

req.Header.Set("Content-Type", "application/json")
}

resp, err := v.httpClient.Do(req)
req.Header.Set("Content-Type", "application/json")
}

return c.httpClient.Do(req)
writeError(w, http.StatusBadRequest, "missing OAuth state cookie")
return
}
if r.URL.Query().Get("state") != stateCookie.Value {
Comment on lines +307 to +312
http.SetCookie(w, &http.Cookie{
Name: "oauth_state",
Value: "",
Path: "/",
MaxAge: -1,
})
Comment on lines +307 to +312
http.SetCookie(w, &http.Cookie{
Name: "oauth_state",
Value: "",
Path: "/",
MaxAge: -1,
})
if config.AuthType != AuthTypeWorkloadIdentity && config.AuthType != AuthTypeServicePrincipal {
return nil, fmt.Errorf("auth type must be %q or %q", AuthTypeWorkloadIdentity, AuthTypeServicePrincipal)
}
if config.AuthType == AuthTypeServicePrincipal && config.ClientSecret == "" {
}

// 3. For Service Principal, store the client secret as a GitHub Environment secret.
if config.AuthType == AuthTypeServicePrincipal {
@willdavsmith willdavsmith requested a review from sylvainsf April 6, 2026 18:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants