-
Notifications
You must be signed in to change notification settings - Fork 346
feat(iam): support an alternative env to decide if mtls should be enabled #1945
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Summary of ChangesHello @amtk3, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request enhances the IAM authentication logic by incorporating an additional environment variable to control the enablement of client certificates for mutual TLS. This change ensures broader compatibility with Gcloud CLI configurations for certificate-based access, offering more flexibility in how mTLS is activated within the system. Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request adds support for the CLOUDSDK_CONTEXT_AWARE_USE_CLIENT_CERTIFICATE environment variable to enable mTLS, which is a good addition. My review includes a suggestion to refactor the logic for checking environment variables to improve readability and maintainability.
A few additional points for consideration:
- It would be best to define
CLOUDSDK_CONTEXT_AWARE_USE_CLIENT_CERTIFICATEas a constant ingoogle/auth/environment_vars.pyand import it to avoid using a magic string and maintain consistency with other environment variables. - While the changed code is marked with
pragma: NO COVER, consider adding a test case for this fallback logic to prevent future regressions. This would likely involve mockinghasattr(mtls, 'should_use_client_cert')to returnFalseand then testing the behavior with different environment variable settings.
|
@amtk3 Thanks for submitting this PR. As I grow more familiar with this codebase and some of the capabilities it provides... I have several concerns with how the code has evolved/is evolving.
The purpose of
I feel like we should only really have that logic in one place. I am leaning toward in In addition to the above, we need to add the environmental variable to And we have existing testing in our test suite to ensure that logic related these checks (using CONTEXT: For context for anyone else reading this PR, this environmental variable is apparently used with NOTE: including @gemini-code-assist to see what it says. |
|
As a related matter. IF this is not a high priority problem, I would recommend:
|
|
Please examine the content in this comment and provide your thoughts: |
|
Thank you for tagging me, @chalmerlowe. I've reviewed your detailed comments regarding the current pull request and the broader concerns about the codebase's evolution, particularly the duplication of client certificate checking logic. I agree with your assessment that centralizing the logic for determining whether to use a client certificate is a critical improvement. Having this logic in multiple places, such as Specifically, I concur that To address your points:
If the logic were centralized in Regarding your subsequent comment about closing the PR and opening an issue due to the mono-repo migration, I understand the strategic considerations. My role is to provide technical feedback on the code changes themselves, and from that perspective, addressing the architectural concerns you've raised would significantly improve the maintainability and correctness of the codebase. |
Added `CLOUDSDK_CONTEXT_AWARE_USE_CLIENT_CERTIFICATE` and `CLOUDSDK_CONTEXT_AWARE_CERTIFICATE_CONFIG_FILE_PATH` as fallback environment variables for mTLS configuration. Updated `google/auth/transport/_mtls_helper.py` to check these variables if the primary `GOOGLE_API_...` variables are not set. Added tests to verify precedence and fallback logic.
…6834227 Add fallback environment variables for mTLS configuration
feat (iam): Add Cloud SDK context-aware mTLS env var fallbacks and define the env in environment_vars.py
|
Hi @chalmerlowe, This issue is a bit urgent since, we have users encountering error while making IAM calls after enablement of mTLS control so I want it to be pushed now rather than waiting for the mono-repo migration. I agree with using I updated the PR based on your feedback and made the following changes
Let me know if any other additional changes are required. |
CLOUDSDK_CONTEXT_AWARE_USE_CLIENT_CERTIFICATEis another endpoint that can be set in Gcloud CLI to enable Certificate Based Access. We should support it as well.