-
Notifications
You must be signed in to change notification settings - Fork 39
fix: use real ServiceAccount tokens for local minikube auth #506
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
DISABLE_AUTH was removed from backend in PR ambient-code#460 (Dec 2025) as a security fix, but minikube manifests were never updated. This caused all API requests to fail with 401/500 errors because frontend sent mock tokens that backend no longer accepted. Changes: - Makefile: Add _setup-local-dev-auth target to create local-dev-token secret - Frontend: Use OC_TOKEN from local-dev-token secret instead of DISABLE_AUTH - Backend: Remove DISABLE_AUTH environment variable - Grant cluster-admin to local-dev-user for local development Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
Claude Code ReviewSummaryThis PR fixes a critical authentication regression introduced when DISABLE_AUTH was removed in PR #460 (Dec 2025). The minikube manifests were not updated, causing all API requests to fail with 401/500 errors. The fix properly implements ServiceAccount-based authentication for local development using real Kubernetes tokens. Overall Assessment: Approve with minor recommendations The changes correctly address the authentication issue and follow established security patterns. The implementation is clean, well-integrated into the Makefile workflow, and aligns with the project security-first approach. Issues by SeverityBlocker IssuesNone - No blocking issues found. Critical IssuesNone - No critical issues found. Major Issues
Location: Makefile:709-711 Granting cluster-admin to local-dev-user contradicts the existing RBAC philosophy in local-dev-rbac.yaml:85-87 which states local-dev-user should have NO ClusterRole bindings. Impact:
Recommendation: Minor Issues
Positive Highlights
RecommendationsPriority 1 (Before Merge)
Priority 2 (Follow-up PR or Issue)
Validation ChecklistBased on loaded memory files and project standards:
ConclusionThis PR successfully fixes the authentication regression and modernizes the local development authentication flow. Recommendation: Approve after addressing the cluster-admin RBAC concern (Priority 1). This can be done by either:
The minor issues can be addressed in follow-up work. Review completed by Claude Code 🔍 View AI decision process (logs available for 90 days) 📋 View memory system files loaded (click to expand)What Amber Loaded for Code ReviewAmber automatically loaded these repository standards from the memory system:
Impact: This review used your repository's specific code quality standards, security patterns, and best practices from the memory system (PRs #359, #360) - not just generic code review guidelines. |
DISABLE_AUTH was removed from backend in PR #460 (Dec 2025) as a security fix, but minikube manifests were never updated. This caused all API requests to fail with 401/500 errors because frontend sent mock tokens that backend no longer accepted.
I tested this locally on minikube and it worked fine.
Changes: