From 3c13eb0d6bf985da43db29479c504ee866aa0eb7 Mon Sep 17 00:00:00 2001
From: Peter Kurfer <peter@icb4dc0.de>
Date: Wed, 5 Feb 2025 20:47:02 +0100
Subject: [PATCH] feat(apigateay): add OIDC and basic auth support

- when setting an OIDC issuer URL the defaulter will fetch and set
  authorization and token endpoints
- basic auth allows to use either inline hashed credentials or plaintext
  credentials from a secret that are automatically hashed
- finish TLS support for API & dashboard listeners
---
 .github/workflows/lint.yml                    |   2 +-
 .husky.toml                                   |   2 +-
 Tiltfile                                      |   5 +
 api/v1alpha1/apigateway_types.go              |  26 +-
 api/v1alpha1/zz_generated.deepcopy.go         |   9 +-
 ...0529180330_alter_api_roles_for_inherit.sql |   2 +
 ...isable_log_statement_on_internal_roles.sql |   6 +
 .../supabase.k8s.icb4dc0.de_apigateways.yaml  |  27 +-
 config/dev/apigateway.yaml                    |  15 +-
 config/dev/ca.yaml                            |  36 ++
 config/dev/kustomization.yaml                 |   4 +-
 config/dev/studio-plaintext-users.yaml        |   8 +
 ...lpha1_apigateway_dashboard_basic_auth.yaml |  30 ++
 ...se_v1alpha1_apigateway_dashboard_oidc.yaml |  36 ++
 docs/api/supabase.k8s.icb4dc0.de.md           |   9 +-
 go.mod                                        |   2 +-
 internal/controlplane/filters.go              |   1 +
 internal/controlplane/snapshot.go             | 292 +++----------
 internal/controlplane/studio.go               | 409 +++++++++++++++++-
 internal/oidc/discovery.go                    |  60 +++
 .../v1alpha1/apigateway_webhook_defaulter.go  |  16 +
 21 files changed, 721 insertions(+), 276 deletions(-)
 create mode 100644 assets/migrations/migrations/20250205060043_disable_log_statement_on_internal_roles.sql
 create mode 100644 config/dev/ca.yaml
 create mode 100644 config/dev/studio-plaintext-users.yaml
 create mode 100644 config/samples/supabase_v1alpha1_apigateway_dashboard_basic_auth.yaml
 create mode 100644 config/samples/supabase_v1alpha1_apigateway_dashboard_oidc.yaml
 create mode 100644 internal/oidc/discovery.go

diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml
index a68de56..a1d3fa9 100644
--- a/.github/workflows/lint.yml
+++ b/.github/workflows/lint.yml
@@ -28,4 +28,4 @@ jobs:
       - name: Run linter
         uses: golangci/golangci-lint-action@v6
         with:
-          version: v1.61
+          version: v1.63.4
diff --git a/.husky.toml b/.husky.toml
index 6d25f22..9f03c14 100644
--- a/.husky.toml
+++ b/.husky.toml
@@ -2,7 +2,7 @@
 
 # git hook pre commit
 pre-commit = [
-    "go mod tidy -go=1.23.5",
+    "go mod tidy -go=1.23.6",
     "go run mage.go GenerateAll",
     "husky lint-staged",
     # "golangci-lint run",
diff --git a/Tiltfile b/Tiltfile
index 8df7741..63d5292 100644
--- a/Tiltfile
+++ b/Tiltfile
@@ -62,6 +62,11 @@ k8s_resource(
     objects=["gateway-sample:APIGateway:supabase-demo"],
     extra_pod_selectors={"app.kubernetes.io/component": "api-gateway"},
     port_forwards=[3000, 8000, 19000],
+    links=[
+        link("https://localhost:3000", "Studio"),
+        link("http://localhost:8000", "API"),
+        link("http://localhost:19000", "Envoy Admin Interface")
+    ],
     new_name='API Gateway',
     resource_deps=[
         'supabase-controller-manager'
diff --git a/api/v1alpha1/apigateway_types.go b/api/v1alpha1/apigateway_types.go
index b1bd84a..359a4a7 100644
--- a/api/v1alpha1/apigateway_types.go
+++ b/api/v1alpha1/apigateway_types.go
@@ -128,10 +128,13 @@ const (
 )
 
 type DashboardOAuth2Spec struct {
+	// OpenIDIssuer - if set the defaulter will fetch the discovery document and fill
+	// TokenEndpoint and AuthorizationEndpoint based on the discovery document
+	OpenIDIssuer string `json:"openIdIssuer,omitempty"`
 	// TokenEndpoint - endpoint where Envoy will retrieve the OAuth2 access and identity token from
-	TokenEndpoint string `json:"tokenEndpoint"`
+	TokenEndpoint string `json:"tokenEndpoint,omitempty"`
 	// AuthorizationEndpoint - endpoint where the user will be redirected to authenticate
-	AuthorizationEndpoint string `json:"authorizationEndpoint"`
+	AuthorizationEndpoint string `json:"authorizationEndpoint,omitempty"`
 	// ClientID - client ID to authenticate with the OAuth2 provider
 	ClientID string `json:"clientId"`
 	// Scopes - scopes to request from the OAuth2 provider (e.g. "openid", "profile", ...) - optional
@@ -142,11 +145,24 @@ type DashboardOAuth2Spec struct {
 	ClientSecretRef *corev1.SecretKeySelector `json:"clientSecretRef"`
 }
 
-type DashboardBasicAuthSpec struct{}
+type DashboardBasicAuthSpec struct {
+	// UsersInline - [htpasswd format](https://httpd.apache.org/docs/2.4/programs/htpasswd.html)
+	// +kubebuilder:validation:items:Pattern="^[\\w_.]+:\\{SHA\\}[A-z0-9]+=*$"
+	UsersInline []string `json:"usersInline,omitempty"`
+	// PlaintextUsersSecretRef - name of a secret that contains plaintext credentials in key-value form
+	// if not empty, credentials will be merged with inline users
+	PlaintextUsersSecretRef string `json:"plaintextUsersSecretRef,omitempty"`
+}
 
 type DashboardAuthSpec struct {
-	OAuth2 *DashboardOAuth2Spec    `json:"oauth2,omitempty"`
-	Basic  *DashboardBasicAuthSpec `json:"basic,omitempty"`
+	// OAuth2 - configure oauth2 authentication for the dashhboard listener
+	// if configured, will be preferred over Basic authentication configuration
+	// effectively disabling basic auth
+	OAuth2 *DashboardOAuth2Spec `json:"oauth2,omitempty"`
+	// Basic - HTTP basic auth configuration, this should only be used in exceptions
+	// e.g. during evaluations or for local development
+	// only used if no other authentication is configured
+	Basic *DashboardBasicAuthSpec `json:"basic,omitempty"`
 }
 
 type DashboardEndpointSpec struct {
diff --git a/api/v1alpha1/zz_generated.deepcopy.go b/api/v1alpha1/zz_generated.deepcopy.go
index 8746d9e..f58f780 100644
--- a/api/v1alpha1/zz_generated.deepcopy.go
+++ b/api/v1alpha1/zz_generated.deepcopy.go
@@ -21,7 +21,7 @@ limitations under the License.
 package v1alpha1
 
 import (
-	"k8s.io/api/core/v1"
+	v1 "k8s.io/api/core/v1"
 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 	runtime "k8s.io/apimachinery/pkg/runtime"
 )
@@ -506,7 +506,7 @@ func (in *DashboardAuthSpec) DeepCopyInto(out *DashboardAuthSpec) {
 	if in.Basic != nil {
 		in, out := &in.Basic, &out.Basic
 		*out = new(DashboardBasicAuthSpec)
-		**out = **in
+		(*in).DeepCopyInto(*out)
 	}
 }
 
@@ -523,6 +523,11 @@ func (in *DashboardAuthSpec) DeepCopy() *DashboardAuthSpec {
 // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
 func (in *DashboardBasicAuthSpec) DeepCopyInto(out *DashboardBasicAuthSpec) {
 	*out = *in
+	if in.UsersInline != nil {
+		in, out := &in.UsersInline, &out.UsersInline
+		*out = make([]string, len(*in))
+		copy(*out, *in)
+	}
 }
 
 // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DashboardBasicAuthSpec.
diff --git a/assets/migrations/migrations/20230529180330_alter_api_roles_for_inherit.sql b/assets/migrations/migrations/20230529180330_alter_api_roles_for_inherit.sql
index 013a074..4df82e3 100644
--- a/assets/migrations/migrations/20230529180330_alter_api_roles_for_inherit.sql
+++ b/assets/migrations/migrations/20230529180330_alter_api_roles_for_inherit.sql
@@ -4,5 +4,7 @@ ALTER ROLE authenticated inherit;
 ALTER ROLE anon inherit;
 ALTER ROLE service_role inherit;
 
+GRANT pgsodium_keyholder to service_role;
+
 -- migrate:down
 
diff --git a/assets/migrations/migrations/20250205060043_disable_log_statement_on_internal_roles.sql b/assets/migrations/migrations/20250205060043_disable_log_statement_on_internal_roles.sql
new file mode 100644
index 0000000..822a758
--- /dev/null
+++ b/assets/migrations/migrations/20250205060043_disable_log_statement_on_internal_roles.sql
@@ -0,0 +1,6 @@
+-- migrate:up
+alter role supabase_admin set log_statement = none;
+alter role supabase_auth_admin set log_statement = none;
+alter role supabase_storage_admin set log_statement = none;
+
+-- migrate:down
diff --git a/config/crd/bases/supabase.k8s.icb4dc0.de_apigateways.yaml b/config/crd/bases/supabase.k8s.icb4dc0.de_apigateways.yaml
index 1a2c783..39ac679 100644
--- a/config/crd/bases/supabase.k8s.icb4dc0.de_apigateways.yaml
+++ b/config/crd/bases/supabase.k8s.icb4dc0.de_apigateways.yaml
@@ -121,8 +121,28 @@ spec:
                       endpoint
                     properties:
                       basic:
+                        description: |-
+                          Basic - HTTP basic auth configuration, this should only be used in exceptions
+                          e.g. during evaluations or for local development
+                          only used if no other authentication is configured
+                        properties:
+                          plaintextUsersSecretRef:
+                            description: |-
+                              PlaintextUsersSecretRef - name of a secret that contains plaintext credentials in key-value form
+                              if not empty, credentials will be merged with inline users
+                            type: string
+                          usersInline:
+                            description: UsersInline - [htpasswd format](https://httpd.apache.org/docs/2.4/programs/htpasswd.html)
+                            items:
+                              pattern: ^[\w_.]+:\{SHA\}[A-z0-9]+=*$
+                              type: string
+                            type: array
                         type: object
                       oauth2:
+                        description: |-
+                          OAuth2 - configure oauth2 authentication for the dashhboard listener
+                          if configured, will be preferred over Basic authentication configuration
+                          effectively disabling basic auth
                         properties:
                           authorizationEndpoint:
                             description: AuthorizationEndpoint - endpoint where the
@@ -157,6 +177,11 @@ spec:
                             - key
                             type: object
                             x-kubernetes-map-type: atomic
+                          openIdIssuer:
+                            description: |-
+                              OpenIDIssuer - if set the defaulter will fetch the discovery document and fill
+                              TokenEndpoint and AuthorizationEndpoint based on the discovery document
+                            type: string
                           resources:
                             description: Resources - resources to request from the
                               OAuth2 provider (e.g. "user", "email", ...) - optional
@@ -174,10 +199,8 @@ spec:
                               retrieve the OAuth2 access and identity token from
                             type: string
                         required:
-                        - authorizationEndpoint
                         - clientId
                         - clientSecretRef
-                        - tokenEndpoint
                         type: object
                     type: object
                   tls:
diff --git a/config/dev/apigateway.yaml b/config/dev/apigateway.yaml
index 2cb1c78..b2b9ae1 100644
--- a/config/dev/apigateway.yaml
+++ b/config/dev/apigateway.yaml
@@ -9,19 +9,18 @@ metadata:
   namespace: supabase-demo
 spec:
   envoy:
-    debugging:
-      componentLogLevels:
-        - component: oauth2
-          level: debug
+    disableIPv6: true
   apiEndpoint:
     jwks:
       name: core-sample-jwt
       key: jwks.json
   dashboardEndpoint:
+    tls:
+      cert:
+        secretName: dashboard-tls-cert
     auth:
       oauth2:
-        tokenEndpoint: "https://login.microsoftonline.com/f4e80111-1571-477a-b56d-c5fe517676b7/oauth2/token"
-        authorizationEndpoint: "https://login.microsoftonline.com/f4e80111-1571-477a-b56d-c5fe517676b7/oauth2/authorize"
+        openIdIssuer: "https://login.microsoftonline.com/f4e80111-1571-477a-b56d-c5fe517676b7/"
         clientId: 3528016b-f6e3-49be-8fb3-f9a9a2ab6c3f
         scopes:
           - openid
@@ -49,6 +48,6 @@ spec:
     - gateway-sample-envoy.supabase-demo.svc.cluster.local
     - localhost:3000
   issuerRef:
-    kind: Issuer
-    name: selfsigned-issuer
+    kind: ClusterIssuer
+    name: cluster-pki
   secretName: dashboard-tls-cert
diff --git a/config/dev/ca.yaml b/config/dev/ca.yaml
new file mode 100644
index 0000000..2106c03
--- /dev/null
+++ b/config/dev/ca.yaml
@@ -0,0 +1,36 @@
+---
+apiVersion: cert-manager.io/v1
+kind: Issuer
+metadata:
+  labels:
+    app.kubernetes.io/name: supabase-operator
+    app.kubernetes.io/managed-by: kustomize
+  name: cluster-pki-bootstrapper
+  namespace: cert-manager
+spec:
+  selfSigned: {}
+---
+apiVersion: cert-manager.io/v1
+kind: Certificate
+metadata:
+  name: cluster-pki-ca
+  namespace: cert-manager
+spec:
+  commonName: cluster-pki
+  isCA: true
+  issuerRef:
+    kind: Issuer
+    name: cluster-pki-bootstrapper
+  secretName: cluster-pki-ca-cert
+---
+apiVersion: cert-manager.io/v1
+kind: ClusterIssuer
+metadata:
+  labels:
+    app.kubernetes.io/name: supabase-operator
+    app.kubernetes.io/managed-by: kustomize
+  name: cluster-pki
+  namespace: cert-manager
+spec:
+  ca:
+    secretName: cluster-pki-ca-cert
diff --git a/config/dev/kustomization.yaml b/config/dev/kustomization.yaml
index 2526b76..67cedd5 100644
--- a/config/dev/kustomization.yaml
+++ b/config/dev/kustomization.yaml
@@ -2,12 +2,14 @@ apiVersion: kustomize.config.k8s.io/v1beta1
 kind: Kustomization
 
 resources:
-  - https://github.com/cert-manager/cert-manager/releases/download/v1.16.3/cert-manager.yaml
+  - https://github.com/cert-manager/cert-manager/releases/download/v1.17.0/cert-manager.yaml
   - https://github.com/cloudnative-pg/cloudnative-pg/releases/download/v1.25.0/cnpg-1.25.0.yaml
+  - ca.yaml
   - namespace.yaml
   - cnpg-cluster.yaml
   - minio.yaml
   - ../default
+  - studio-plaintext-users.yaml
   - studio-credentials-secret.yaml
   - core.yaml
   - apigateway.yaml
diff --git a/config/dev/studio-plaintext-users.yaml b/config/dev/studio-plaintext-users.yaml
new file mode 100644
index 0000000..51f0daa
--- /dev/null
+++ b/config/dev/studio-plaintext-users.yaml
@@ -0,0 +1,8 @@
+---
+apiVersion: v1
+kind: Secret
+metadata:
+  name: studio-sample-basic-auth
+  namespace: supabase-demo
+stringData:
+  ted: not_admin
diff --git a/config/samples/supabase_v1alpha1_apigateway_dashboard_basic_auth.yaml b/config/samples/supabase_v1alpha1_apigateway_dashboard_basic_auth.yaml
new file mode 100644
index 0000000..0af2707
--- /dev/null
+++ b/config/samples/supabase_v1alpha1_apigateway_dashboard_basic_auth.yaml
@@ -0,0 +1,30 @@
+---
+apiVersion: supabase.k8s.icb4dc0.de/v1alpha1
+kind: APIGateway
+metadata:
+  labels:
+    app.kubernetes.io/name: supabase-operator
+    app.kubernetes.io/managed-by: kustomize
+  name: gateway-sample
+spec:
+  apiEndpoint:
+    jwks:
+      # will be created by Core resource operator if not present
+      # just make sure the secret name is either based on the name of the core resource or explicitly set
+      name: core-sample-jwt
+      key: jwks.json
+  dashboardEndpoint:
+    auth:
+      basic:
+        usersInline:
+          # admin:admin
+          - admin:{SHA}0DPiKuNIrrVmD8IUCuw1hQxNqZc=
+        plaintextUsersSecretRef: studio-sample-basic-auth
+---
+apiVersion: v1
+kind: Secret
+metadata:
+  name: studio-sample-basic-auth
+  namespace: supabase-demo
+stringData:
+  ted: not_admin
diff --git a/config/samples/supabase_v1alpha1_apigateway_dashboard_oidc.yaml b/config/samples/supabase_v1alpha1_apigateway_dashboard_oidc.yaml
new file mode 100644
index 0000000..5afc367
--- /dev/null
+++ b/config/samples/supabase_v1alpha1_apigateway_dashboard_oidc.yaml
@@ -0,0 +1,36 @@
+---
+apiVersion: supabase.k8s.icb4dc0.de/v1alpha1
+kind: APIGateway
+metadata:
+  labels:
+    app.kubernetes.io/name: supabase-operator
+    app.kubernetes.io/managed-by: kustomize
+  name: gateway-sample
+spec:
+  apiEndpoint:
+    jwks:
+      # will be created by Core resource operator if not present
+      # just make sure the secret name is either based on the name of the core resource or explicitly set
+      name: core-sample-jwt
+      key: jwks.json
+  dashboardEndpoint:
+    auth:
+      oauth2:
+        openIdIssuer: "https://idp.your-domain.com/"
+        clientId: "<your-client-id>"
+        # if not set, 'user' will be used
+        scopes:
+          - openid
+          - profile
+          - email
+        clientSecretRef:
+          name: studio-sample-oauth2
+          key: clientSecret
+---
+apiVersion: v1
+kind: Secret
+metadata:
+  name: studio-sample-oauth2
+  namespace: supabase-demo
+stringData:
+  clientSecret: "<your-client-secret>"
diff --git a/docs/api/supabase.k8s.icb4dc0.de.md b/docs/api/supabase.k8s.icb4dc0.de.md
index be0cf47..d8e83e7 100644
--- a/docs/api/supabase.k8s.icb4dc0.de.md
+++ b/docs/api/supabase.k8s.icb4dc0.de.md
@@ -331,8 +331,8 @@ _Appears in:_
 
 | Field | Description | Default | Validation |
 | --- | --- | --- | --- |
-| `oauth2` _[DashboardOAuth2Spec](#dashboardoauth2spec)_ |  |  |  |
-| `basic` _[DashboardBasicAuthSpec](#dashboardbasicauthspec)_ |  |  |  |
+| `oauth2` _[DashboardOAuth2Spec](#dashboardoauth2spec)_ | OAuth2 - configure oauth2 authentication for the dashhboard listener<br />if configured, will be preferred over Basic authentication configuration<br />effectively disabling basic auth |  |  |
+| `basic` _[DashboardBasicAuthSpec](#dashboardbasicauthspec)_ | Basic - HTTP basic auth configuration, this should only be used in exceptions<br />e.g. during evaluations or for local development<br />only used if no other authentication is configured |  |  |
 
 
 
@@ -348,6 +348,10 @@ _Appears in:_
 _Appears in:_
 - [DashboardAuthSpec](#dashboardauthspec)
 
+| Field | Description | Default | Validation |
+| --- | --- | --- | --- |
+| `usersInline` _string array_ | UsersInline - [htpasswd format](https://httpd.apache.org/docs/2.4/programs/htpasswd.html) |  | items:Pattern: ^[\w_.]+:\\{SHA\\}[A-z0-9]+=*$ <br /> |
+| `plaintextUsersSecretRef` _string_ | PlaintextUsersSecretRef - name of a secret that contains plaintext credentials in key-value form<br />if not empty, credentials will be merged with inline users |  |  |
 
 
 #### DashboardDbSpec
@@ -417,6 +421,7 @@ _Appears in:_
 
 | Field | Description | Default | Validation |
 | --- | --- | --- | --- |
+| `openIdIssuer` _string_ | OpenIDIssuer - if set the defaulter will fetch the discovery document and fill<br />TokenEndpoint and AuthorizationEndpoint based on the discovery document |  |  |
 | `tokenEndpoint` _string_ | TokenEndpoint - endpoint where Envoy will retrieve the OAuth2 access and identity token from |  |  |
 | `authorizationEndpoint` _string_ | AuthorizationEndpoint - endpoint where the user will be redirected to authenticate |  |  |
 | `clientId` _string_ | ClientID - client ID to authenticate with the OAuth2 provider |  |  |
diff --git a/go.mod b/go.mod
index 4340d2a..d3d519f 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,6 @@
 module code.icb4dc0.de/prskr/supabase-operator
 
-go 1.23.5
+go 1.23.6
 
 require (
 	github.com/alecthomas/kong v1.7.0
diff --git a/internal/controlplane/filters.go b/internal/controlplane/filters.go
index a636275..e6b1e12 100644
--- a/internal/controlplane/filters.go
+++ b/internal/controlplane/filters.go
@@ -24,4 +24,5 @@ const (
 	FilterNameHttpConnectionManager = "envoy.filters.network.http_connection_manager"
 	FilterNameBasicAuth             = "envoy.filters.http.basic_auth"
 	FilterNameOAuth2                = "envoy.filters.http.oauth2"
+	SocketNameTLS                   = "envoy.transport_sockets.tls"
 )
diff --git a/internal/controlplane/snapshot.go b/internal/controlplane/snapshot.go
index f3eb4a4..4e1ed76 100644
--- a/internal/controlplane/snapshot.go
+++ b/internal/controlplane/snapshot.go
@@ -20,28 +20,20 @@ import (
 	"context"
 	"crypto/sha256"
 	"fmt"
-	"net/url"
 	"slices"
-	"strconv"
-	"time"
 
 	accesslogv3 "github.com/envoyproxy/go-control-plane/envoy/config/accesslog/v3"
-	clusterv3 "github.com/envoyproxy/go-control-plane/envoy/config/cluster/v3"
 	corev3 "github.com/envoyproxy/go-control-plane/envoy/config/core/v3"
-	endpointv3 "github.com/envoyproxy/go-control-plane/envoy/config/endpoint/v3"
 	listenerv3 "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3"
 	routev3 "github.com/envoyproxy/go-control-plane/envoy/config/route/v3"
-	oauth2v3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/oauth2/v3"
 	routerv3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/router/v3"
 	hcm "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/network/http_connection_manager/v3"
 	tlsv3 "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/v3"
-	matcherv3 "github.com/envoyproxy/go-control-plane/envoy/type/matcher/v3"
 	"github.com/envoyproxy/go-control-plane/pkg/cache/types"
 	"github.com/envoyproxy/go-control-plane/pkg/cache/v3"
 	"github.com/envoyproxy/go-control-plane/pkg/resource/v3"
 	"google.golang.org/protobuf/proto"
 	"google.golang.org/protobuf/types/known/anypb"
-	"google.golang.org/protobuf/types/known/durationpb"
 	corev1 "k8s.io/api/core/v1"
 	discoveryv1 "k8s.io/api/discovery/v1"
 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -94,7 +86,7 @@ func (s *EnvoyServices) UpsertEndpointSlices(endpointSlices ...discoveryv1.Endpo
 			s.PGMeta.AddOrUpdateEndpoints(eps)
 		case supabase.ServiceConfig.Studio.Name:
 			if s.Studio == nil {
-				s.Studio = new(StudioCluster)
+				s.Studio = &StudioCluster{Client: s.Client}
 			}
 
 			s.Studio.AddOrUpdateEndpoints(eps)
@@ -128,7 +120,15 @@ func (s EnvoyServices) Targets() map[string][]string {
 	return targets
 }
 
-func (s *EnvoyServices) snapshot(ctx context.Context, instance, version string) (snapshot *cache.Snapshot, snapshotHash []byte, err error) {
+func (s *EnvoyServices) snapshot(
+	ctx context.Context,
+	instance, version string,
+) (snapshot *cache.Snapshot, snapshotHash []byte, err error) {
+	socket, err := s.apiTransportSocket(ctx)
+	if err != nil {
+		return nil, nil, fmt.Errorf("failed to setup API TLS listener: %w", err)
+	}
+
 	listeners := []*listenerv3.Listener{{
 		Name: apilistenerName,
 		Address: &corev3.Address{
@@ -152,37 +152,37 @@ func (s *EnvoyServices) snapshot(ctx context.Context, instance, version string)
 						},
 					},
 				},
+				TransportSocket: socket,
 			},
 		},
 	}}
 
-	if studioListener := s.studioListener(instance); studioListener != nil {
+	if studioListener, err := s.Studio.Listener(ctx, instance, s.Gateway); err != nil {
+		return nil, nil, err
+	} else if studioListener != nil {
 		listeners = append(listeners, studioListener)
 	}
 
 	routes := []types.Resource{s.apiRouteConfiguration(instance)}
 
-	if studioRouteCfg := s.studioRoute(instance); studioRouteCfg != nil {
+	if studioRouteCfg := s.Studio.RouteConfiguration(instance); studioRouteCfg != nil {
 		routes = append(routes, studioRouteCfg)
 	}
 
+	studioClusters, err := s.Studio.Cluster(instance, s.Gateway)
+	if err != nil {
+		return nil, nil, err
+	}
+
 	clusters := castResources(
 		slices.Concat(
 			s.Postgrest.Cluster(instance),
 			s.GoTrue.Cluster(instance),
 			s.StorageApi.Cluster(instance),
 			s.PGMeta.Cluster(instance),
-			s.Studio.Cluster(instance),
+			studioClusters,
 		)...)
 
-	if oauth2Spec := s.Gateway.Spec.DashboardEndpoint.OAuth2(); oauth2Spec != nil {
-		if oauth2TokenEndpointCluster, err := s.oauth2TokenEndpointCluster(instance); err != nil {
-			return nil, nil, err
-		} else {
-			clusters = append(clusters, oauth2TokenEndpointCluster)
-		}
-	}
-
 	sdsSecrets, err := s.secrets(ctx)
 	if err != nil {
 		return nil, nil, fmt.Errorf("failed to collect dynamic secrets: %w", err)
@@ -350,231 +350,57 @@ func (s *EnvoyServices) apiRouteConfiguration(instance string) *routev3.RouteCon
 	}
 }
 
-func (s *EnvoyServices) studioListener(instance string) *listenerv3.Listener {
-	if s.Studio == nil {
-		return nil
+func (s *EnvoyServices) apiTransportSocket(ctx context.Context) (*corev3.TransportSocket, error) {
+	tlsSpec := s.Gateway.Spec.ApiEndpoint.TLSSpec()
+	if tlsSpec == nil {
+		return nil, nil
 	}
 
-	var (
-		httpFilters []*hcm.HttpFilter
-		serviceCfg  = supabase.ServiceConfig.Envoy
-	)
-
-	if oauth2Spec := s.Gateway.Spec.DashboardEndpoint.OAuth2(); oauth2Spec != nil {
-		httpFilters = append(httpFilters, &hcm.HttpFilter{
-			Name: FilterNameOAuth2,
-			ConfigType: &hcm.HttpFilter_TypedConfig{TypedConfig: MustAny(&oauth2v3.OAuth2{
-				Config: &oauth2v3.OAuth2Config{
-					TokenEndpoint: &corev3.HttpUri{
-						HttpUpstreamType: &corev3.HttpUri_Cluster{
-							Cluster: fmt.Sprintf("%s@%s", dashboardOAuth2ClusterName, instance),
-						},
-						Uri:     s.Gateway.Spec.DashboardEndpoint.Auth.OAuth2.TokenEndpoint,
-						Timeout: durationpb.New(3 * time.Second),
-					},
-					AuthorizationEndpoint: s.Gateway.Spec.DashboardEndpoint.Auth.OAuth2.AuthorizationEndpoint,
-					RedirectUri:           "%REQ(x-forwarded-proto)%://%REQ(:authority)%/callback",
-					RedirectPathMatcher: &matcherv3.PathMatcher{
-						Rule: &matcherv3.PathMatcher_Path{
-							Path: &matcherv3.StringMatcher{
-								MatchPattern: &matcherv3.StringMatcher_Exact{
-									Exact: "/callback",
-								},
-							},
-						},
-					},
-					SignoutPath: &matcherv3.PathMatcher{
-						Rule: &matcherv3.PathMatcher_Path{
-							Path: &matcherv3.StringMatcher{
-								MatchPattern: &matcherv3.StringMatcher_Exact{
-									Exact: "/signout",
-								},
-							},
-						},
-					},
-					Credentials: &oauth2v3.OAuth2Credentials{
-						ClientId: oauth2Spec.ClientID,
-						TokenSecret: &tlsv3.SdsSecretConfig{
-							Name: serviceCfg.Defaults.OAuth2ClientSecretKey,
-							SdsConfig: &corev3.ConfigSource{
-								ConfigSourceSpecifier: &corev3.ConfigSource_Ads{
-									Ads: new(corev3.AggregatedConfigSource),
-								},
-							},
-						},
-						TokenFormation: &oauth2v3.OAuth2Credentials_HmacSecret{
-							HmacSecret: &tlsv3.SdsSecretConfig{
-								Name: serviceCfg.Defaults.HmacSecretKey,
-								SdsConfig: &corev3.ConfigSource{
-									ConfigSourceSpecifier: &corev3.ConfigSource_Ads{
-										Ads: new(corev3.AggregatedConfigSource),
-									},
-								},
-							},
-						},
-					},
-					AuthScopes: oauth2Spec.Scopes,
-					Resources:  oauth2Spec.Resources,
-				},
-			})},
-		})
-	}
-
-	studioConnetionManager := &hcm.HttpConnectionManager{
-		CodecType:  hcm.HttpConnectionManager_AUTO,
-		StatPrefix: "supbase_studio",
-		AccessLog:  []*accesslogv3.AccessLog{AccessLog("supbase_studio_access_log")},
-		RouteSpecifier: &hcm.HttpConnectionManager_Rds{
-			Rds: &hcm.Rds{
-				ConfigSource: &corev3.ConfigSource{
-					ResourceApiVersion: resource.DefaultAPIVersion,
-					ConfigSourceSpecifier: &corev3.ConfigSource_ApiConfigSource{
-						ApiConfigSource: &corev3.ApiConfigSource{
-							TransportApiVersion:       resource.DefaultAPIVersion,
-							ApiType:                   corev3.ApiConfigSource_GRPC,
-							SetNodeOnFirstMessageOnly: true,
-							GrpcServices: []*corev3.GrpcService{{
-								TargetSpecifier: &corev3.GrpcService_EnvoyGrpc_{
-									EnvoyGrpc: &corev3.GrpcService_EnvoyGrpc{ClusterName: "supabase-control-plane"},
-								},
-							}},
-						},
-					},
-				},
-				RouteConfigName: studioRouteName,
-			},
-		},
-		HttpFilters: append(httpFilters, &hcm.HttpFilter{
-			Name:       FilterNameHttpRouter,
-			ConfigType: &hcm.HttpFilter_TypedConfig{TypedConfig: MustAny(new(routerv3.Router))},
-		}),
-	}
-
-	return &listenerv3.Listener{
-		Name: "studio",
-		Address: &corev3.Address{
-			Address: &corev3.Address_SocketAddress{
-				SocketAddress: &corev3.SocketAddress{
-					Protocol: corev3.SocketAddress_TCP,
-					Address:  "0.0.0.0",
-					PortSpecifier: &corev3.SocketAddress_PortValue{
-						PortValue: 3000,
-					},
-				},
-			},
-		},
-		FilterChains: []*listenerv3.FilterChain{
-			{
-				Filters: []*listenerv3.Filter{
-					{
-						Name: FilterNameHttpConnectionManager,
-						ConfigType: &listenerv3.Filter_TypedConfig{
-							TypedConfig: MustAny(studioConnetionManager),
-						},
-					},
-				},
-			},
+	apiTlsSecret := corev1.Secret{
+		ObjectMeta: metav1.ObjectMeta{
+			Name:      tlsSpec.Cert.SecretName,
+			Namespace: s.Gateway.Namespace,
 		},
 	}
-}
 
-func (s *EnvoyServices) studioRoute(instance string) *routev3.RouteConfiguration {
-	if s.Studio == nil {
-		return nil
-	}
-
-	return &routev3.RouteConfiguration{
-		Name: studioRouteName,
-		VirtualHosts: []*routev3.VirtualHost{{
-			Name:    "supabase-studio",
-			Domains: []string{"*"},
-			Routes:  s.Studio.Routes(instance),
-		}},
-	}
-}
-
-func (s *EnvoyServices) oauth2TokenEndpointCluster(instance string) (*clusterv3.Cluster, error) {
-	oauth2Spec := s.Gateway.Spec.DashboardEndpoint.OAuth2()
-	parsedTokenEndpoint, err := url.Parse(oauth2Spec.TokenEndpoint)
-	if err != nil {
-		return nil, fmt.Errorf("failed to parse token endpoint: %w", err)
-	}
-
-	var (
-		endpointPort uint32
-		tls          bool
-	)
-	switch parsedTokenEndpoint.Scheme {
-	case "http":
-		endpointPort = 80
-	case "https":
-		endpointPort = 443
-		tls = true
-	default:
-		return nil, fmt.Errorf("unsupported token endpoint scheme: %s", parsedTokenEndpoint.Scheme)
-	}
-
-	if tokenEndpointPort := parsedTokenEndpoint.Port(); tokenEndpointPort != "" {
-		if parsedPort, err := strconv.ParseUint(tokenEndpointPort, 10, 32); err != nil {
-			return nil, fmt.Errorf("failed to parse token endpoint port: %w", err)
-		} else {
-			endpointPort = uint32(parsedPort)
+	if err := s.Get(ctx, client.ObjectKeyFromObject(&apiTlsSecret), &apiTlsSecret); err != nil {
+		if client.IgnoreNotFound(err) == nil {
+			return nil, nil
 		}
+
+		return nil, err
 	}
 
-	cluster := &clusterv3.Cluster{
-		Name:           fmt.Sprintf("%s@%s", dashboardOAuth2ClusterName, instance),
-		ConnectTimeout: durationpb.New(3 * time.Second),
-		ClusterDiscoveryType: &clusterv3.Cluster_Type{
-			Type: clusterv3.Cluster_LOGICAL_DNS,
-		},
-		LbPolicy: clusterv3.Cluster_ROUND_ROBIN,
-		LoadAssignment: &endpointv3.ClusterLoadAssignment{
-			ClusterName: dashboardOAuth2ClusterName,
-			Endpoints: []*endpointv3.LocalityLbEndpoints{{
-				LbEndpoints: []*endpointv3.LbEndpoint{{
-					HostIdentifier: &endpointv3.LbEndpoint_Endpoint{
-						Endpoint: &endpointv3.Endpoint{
-							Address: &corev3.Address{
-								Address: &corev3.Address_SocketAddress{
-									SocketAddress: &corev3.SocketAddress{
-										Address: parsedTokenEndpoint.Hostname(),
-										PortSpecifier: &corev3.SocketAddress_PortValue{
-											PortValue: endpointPort,
-										},
-										Protocol: corev3.SocketAddress_TCP,
-									},
+	return &corev3.TransportSocket{
+		Name: SocketNameTLS,
+		ConfigType: &corev3.TransportSocket_TypedConfig{
+			TypedConfig: MustAny(&tlsv3.DownstreamTlsContext{
+				CommonTlsContext: &tlsv3.CommonTlsContext{
+					TlsCertificates: []*tlsv3.TlsCertificate{{
+						CertificateChain: &corev3.DataSource{
+							Specifier: &corev3.DataSource_InlineBytes{
+								InlineBytes: apiTlsSecret.Data[corev1.TLSCertKey],
+							},
+						},
+						PrivateKey: &corev3.DataSource{
+							Specifier: &corev3.DataSource_InlineBytes{
+								InlineBytes: apiTlsSecret.Data[corev1.TLSPrivateKeyKey],
+							},
+						},
+					}},
+					ValidationContextType: &tlsv3.CommonTlsContext_ValidationContext{
+						ValidationContext: &tlsv3.CertificateValidationContext{
+							TrustedCa: &corev3.DataSource{
+								Specifier: &corev3.DataSource_InlineBytes{
+									InlineBytes: apiTlsSecret.Data["ca.crt"],
 								},
 							},
 						},
 					},
-				}},
-			}},
+				},
+			}),
 		},
-	}
-
-	if s.Gateway.Spec.Envoy != nil && s.Gateway.Spec.Envoy.DisableIPv6 {
-		cluster.DnsLookupFamily = clusterv3.Cluster_V4_ONLY
-	}
-
-	if tls {
-		cluster.TransportSocket = &corev3.TransportSocket{
-			Name: "envoy.transport_sockets.tls",
-			ConfigType: &corev3.TransportSocket_TypedConfig{
-				TypedConfig: MustAny(&tlsv3.UpstreamTlsContext{
-					Sni:                parsedTokenEndpoint.Hostname(),
-					AllowRenegotiation: true,
-					CommonTlsContext: &tlsv3.CommonTlsContext{
-						TlsParams: &tlsv3.TlsParameters{
-							TlsMinimumProtocolVersion: tlsv3.TlsParameters_TLSv1_2,
-						},
-					},
-				}),
-			},
-		}
-	}
-
-	return cluster, nil
+	}, nil
 }
 
 func castResources[T types.Resource](from ...T) []types.Resource {
diff --git a/internal/controlplane/studio.go b/internal/controlplane/studio.go
index fe79520..9507696 100644
--- a/internal/controlplane/studio.go
+++ b/internal/controlplane/studio.go
@@ -17,49 +17,418 @@ limitations under the License.
 package controlplane
 
 import (
+	"context"
+	"crypto/sha1"
+	"encoding/base64"
 	"fmt"
+	"net/url"
+	"slices"
+	"strconv"
+	"strings"
+	"time"
 
+	accesslogv3 "github.com/envoyproxy/go-control-plane/envoy/config/accesslog/v3"
 	clusterv3 "github.com/envoyproxy/go-control-plane/envoy/config/cluster/v3"
+	corev3 "github.com/envoyproxy/go-control-plane/envoy/config/core/v3"
+	endpointv3 "github.com/envoyproxy/go-control-plane/envoy/config/endpoint/v3"
+	listenerv3 "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3"
 	routev3 "github.com/envoyproxy/go-control-plane/envoy/config/route/v3"
+	basic_authv3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/basic_auth/v3"
+	oauth2v3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/oauth2/v3"
+	routerv3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/router/v3"
+	hcm "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/network/http_connection_manager/v3"
+	tlsv3 "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/v3"
+	matcherv3 "github.com/envoyproxy/go-control-plane/envoy/type/matcher/v3"
+	"github.com/envoyproxy/go-control-plane/pkg/resource/v3"
+	"google.golang.org/protobuf/types/known/durationpb"
+	corev1 "k8s.io/api/core/v1"
+	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+	"sigs.k8s.io/controller-runtime/pkg/client"
 
+	supabasev1alpha1 "code.icb4dc0.de/prskr/supabase-operator/api/v1alpha1"
 	"code.icb4dc0.de/prskr/supabase-operator/internal/supabase"
 )
 
 type StudioCluster struct {
+	client.Client
 	ServiceCluster
 }
 
-func (c *StudioCluster) Cluster(instance string) []*clusterv3.Cluster {
+func (c *StudioCluster) Cluster(instance string, gateway *supabasev1alpha1.APIGateway) ([]*clusterv3.Cluster, error) {
 	if c == nil {
-		return nil
+		return nil, nil
 	}
 
 	serviceCfg := supabase.ServiceConfig.Studio
 
-	return []*clusterv3.Cluster{
+	clusters := []*clusterv3.Cluster{
 		c.ServiceCluster.Cluster(fmt.Sprintf("%s@%s", serviceCfg.Name, instance), uint32(serviceCfg.Defaults.APIPort)),
 	}
+
+	if gateway.Spec.DashboardEndpoint.AuthType() == supabasev1alpha1.DashboardAuthTypeOAuth2 {
+		if tokenEndpointCluster, err := c.oauth2TokenEndpointCluster(instance, gateway); err != nil {
+			return nil, err
+		} else {
+			clusters = append(clusters, tokenEndpointCluster)
+		}
+	}
+
+	return clusters, nil
 }
 
-func (c *StudioCluster) Routes(instance string) []*routev3.Route {
-	if c == nil {
+func (s *StudioCluster) Listener(ctx context.Context, instance string, gateway *supabasev1alpha1.APIGateway) (*listenerv3.Listener, error) {
+	if s == nil {
+		return nil, nil
+	}
+
+	var httpFilters []*hcm.HttpFilter
+
+	switch gateway.Spec.DashboardEndpoint.AuthType() {
+	case supabasev1alpha1.DashboardAuthTypeOAuth2:
+		httpFilters = append(httpFilters, s.oauth2HttpFilter(instance, gateway))
+	case supabasev1alpha1.DashboardAuthTypeBasic:
+		if filter, err := s.basicAuthHttpFilter(ctx, gateway); err != nil {
+			return nil, err
+		} else if filter != nil {
+			httpFilters = append(httpFilters, filter)
+		}
+	}
+
+	studioConnetionManager := &hcm.HttpConnectionManager{
+		CodecType:  hcm.HttpConnectionManager_AUTO,
+		StatPrefix: "supbase_studio",
+		AccessLog:  []*accesslogv3.AccessLog{AccessLog("supbase_studio_access_log")},
+		RouteSpecifier: &hcm.HttpConnectionManager_Rds{
+			Rds: &hcm.Rds{
+				ConfigSource: &corev3.ConfigSource{
+					ResourceApiVersion: resource.DefaultAPIVersion,
+					ConfigSourceSpecifier: &corev3.ConfigSource_ApiConfigSource{
+						ApiConfigSource: &corev3.ApiConfigSource{
+							TransportApiVersion:       resource.DefaultAPIVersion,
+							ApiType:                   corev3.ApiConfigSource_GRPC,
+							SetNodeOnFirstMessageOnly: true,
+							GrpcServices: []*corev3.GrpcService{{
+								TargetSpecifier: &corev3.GrpcService_EnvoyGrpc_{
+									EnvoyGrpc: &corev3.GrpcService_EnvoyGrpc{ClusterName: "supabase-control-plane"},
+								},
+							}},
+						},
+					},
+				},
+				RouteConfigName: studioRouteName,
+			},
+		},
+		HttpFilters: append(httpFilters, &hcm.HttpFilter{
+			Name:       FilterNameHttpRouter,
+			ConfigType: &hcm.HttpFilter_TypedConfig{TypedConfig: MustAny(new(routerv3.Router))},
+		}),
+	}
+
+	socket, err := s.dashboardTransportSocket(ctx, gateway)
+	if err != nil {
+		return nil, fmt.Errorf("failed to setup dashboard TLS listener: %w", err)
+	}
+
+	return &listenerv3.Listener{
+		Name: "studio",
+		Address: &corev3.Address{
+			Address: &corev3.Address_SocketAddress{
+				SocketAddress: &corev3.SocketAddress{
+					Protocol: corev3.SocketAddress_TCP,
+					Address:  "0.0.0.0",
+					PortSpecifier: &corev3.SocketAddress_PortValue{
+						PortValue: 3000,
+					},
+				},
+			},
+		},
+		FilterChains: []*listenerv3.FilterChain{
+			{
+				Filters: []*listenerv3.Filter{
+					{
+						Name: FilterNameHttpConnectionManager,
+						ConfigType: &listenerv3.Filter_TypedConfig{
+							TypedConfig: MustAny(studioConnetionManager),
+						},
+					},
+				},
+				TransportSocket: socket,
+			},
+		},
+	}, nil
+}
+
+func (s *StudioCluster) RouteConfiguration(instance string) *routev3.RouteConfiguration {
+	if s == nil {
 		return nil
 	}
 
-	return []*routev3.Route{{
-		Name: "Studio: /* -> http://studio:3000/*",
-		Match: &routev3.RouteMatch{
-			PathSpecifier: &routev3.RouteMatch_Prefix{
-				Prefix: "/",
-			},
-		},
-		Action: &routev3.Route_Route{
-			Route: &routev3.RouteAction{
-				ClusterSpecifier: &routev3.RouteAction_Cluster{
-					Cluster: fmt.Sprintf("%s@%s", supabase.ServiceConfig.Studio.Name, instance),
+	return &routev3.RouteConfiguration{
+		Name: studioRouteName,
+		VirtualHosts: []*routev3.VirtualHost{{
+			Name:    "supabase-studio",
+			Domains: []string{"*"},
+			Routes: []*routev3.Route{{
+				Name: "Studio: /* -> http://studio:3000/*",
+				Match: &routev3.RouteMatch{
+					PathSpecifier: &routev3.RouteMatch_Prefix{
+						Prefix: "/",
+					},
 				},
-				PrefixRewrite: "/",
-			},
-		},
-	}}
+				Action: &routev3.Route_Route{
+					Route: &routev3.RouteAction{
+						ClusterSpecifier: &routev3.RouteAction_Cluster{
+							Cluster: fmt.Sprintf("%s@%s", supabase.ServiceConfig.Studio.Name, instance),
+						},
+						PrefixRewrite: "/",
+					},
+				},
+			}},
+		}},
+	}
+}
+
+func (s *StudioCluster) oauth2TokenEndpointCluster(
+	instance string,
+	gateway *supabasev1alpha1.APIGateway,
+) (*clusterv3.Cluster, error) {
+	parsedTokenEndpoint, err := url.Parse(gateway.Spec.DashboardEndpoint.OAuth2().TokenEndpoint)
+	if err != nil {
+		return nil, fmt.Errorf("failed to parse token endpoint: %w", err)
+	}
+
+	var (
+		endpointPort uint32
+		tls          bool
+	)
+	switch parsedTokenEndpoint.Scheme {
+	case "http":
+		endpointPort = 80
+	case "https":
+		endpointPort = 443
+		tls = true
+	default:
+		return nil, fmt.Errorf("unsupported token endpoint scheme: %s", parsedTokenEndpoint.Scheme)
+	}
+
+	if tokenEndpointPort := parsedTokenEndpoint.Port(); tokenEndpointPort != "" {
+		if parsedPort, err := strconv.ParseUint(tokenEndpointPort, 10, 32); err != nil {
+			return nil, fmt.Errorf("failed to parse token endpoint port: %w", err)
+		} else {
+			endpointPort = uint32(parsedPort)
+		}
+	}
+
+	cluster := &clusterv3.Cluster{
+		Name:           fmt.Sprintf("%s@%s", dashboardOAuth2ClusterName, instance),
+		ConnectTimeout: durationpb.New(3 * time.Second),
+		ClusterDiscoveryType: &clusterv3.Cluster_Type{
+			Type: clusterv3.Cluster_LOGICAL_DNS,
+		},
+		LbPolicy: clusterv3.Cluster_ROUND_ROBIN,
+		LoadAssignment: &endpointv3.ClusterLoadAssignment{
+			ClusterName: dashboardOAuth2ClusterName,
+			Endpoints: []*endpointv3.LocalityLbEndpoints{{
+				LbEndpoints: []*endpointv3.LbEndpoint{{
+					HostIdentifier: &endpointv3.LbEndpoint_Endpoint{
+						Endpoint: &endpointv3.Endpoint{
+							Address: &corev3.Address{
+								Address: &corev3.Address_SocketAddress{
+									SocketAddress: &corev3.SocketAddress{
+										Address: parsedTokenEndpoint.Hostname(),
+										PortSpecifier: &corev3.SocketAddress_PortValue{
+											PortValue: endpointPort,
+										},
+										Protocol: corev3.SocketAddress_TCP,
+									},
+								},
+							},
+						},
+					},
+				}},
+			}},
+		},
+	}
+
+	if gateway.Spec.Envoy != nil && gateway.Spec.Envoy.DisableIPv6 {
+		cluster.DnsLookupFamily = clusterv3.Cluster_V4_ONLY
+	}
+
+	if tls {
+		cluster.TransportSocket = &corev3.TransportSocket{
+			Name: "envoy.transport_sockets.tls",
+			ConfigType: &corev3.TransportSocket_TypedConfig{
+				TypedConfig: MustAny(&tlsv3.UpstreamTlsContext{
+					CommonTlsContext: new(tlsv3.CommonTlsContext),
+				}),
+			},
+		}
+	}
+
+	return cluster, nil
+}
+
+func (s *StudioCluster) dashboardTransportSocket(
+	ctx context.Context,
+	gateway *supabasev1alpha1.APIGateway,
+) (*corev3.TransportSocket, error) {
+	tlsSpec := gateway.Spec.DashboardEndpoint.TLSSpec()
+	if tlsSpec == nil {
+		return nil, nil
+	}
+
+	dashboardTlsSecret := corev1.Secret{
+		ObjectMeta: metav1.ObjectMeta{
+			Name:      tlsSpec.Cert.SecretName,
+			Namespace: gateway.Namespace,
+		},
+	}
+
+	if err := s.Get(ctx, client.ObjectKeyFromObject(&dashboardTlsSecret), &dashboardTlsSecret); err != nil {
+		if client.IgnoreNotFound(err) == nil {
+			return nil, nil
+		}
+
+		return nil, err
+	}
+
+	return &corev3.TransportSocket{
+		Name: SocketNameTLS,
+		ConfigType: &corev3.TransportSocket_TypedConfig{
+			TypedConfig: MustAny(&tlsv3.DownstreamTlsContext{
+				CommonTlsContext: &tlsv3.CommonTlsContext{
+					TlsCertificates: []*tlsv3.TlsCertificate{{
+						CertificateChain: &corev3.DataSource{
+							Specifier: &corev3.DataSource_InlineBytes{
+								InlineBytes: dashboardTlsSecret.Data[corev1.TLSCertKey],
+							},
+						},
+						PrivateKey: &corev3.DataSource{
+							Specifier: &corev3.DataSource_InlineBytes{
+								InlineBytes: dashboardTlsSecret.Data[corev1.TLSPrivateKeyKey],
+							},
+						},
+					}},
+					ValidationContextType: &tlsv3.CommonTlsContext_ValidationContext{
+						ValidationContext: &tlsv3.CertificateValidationContext{
+							TrustedCa: &corev3.DataSource{
+								Specifier: &corev3.DataSource_InlineBytes{
+									InlineBytes: dashboardTlsSecret.Data["ca.crt"],
+								},
+							},
+						},
+					},
+				},
+			}),
+		},
+	}, nil
+}
+
+func (s *StudioCluster) basicAuthHttpFilter(ctx context.Context, gateway *supabasev1alpha1.APIGateway) (*hcm.HttpFilter, error) {
+	users := gateway.Spec.DashboardEndpoint.Auth.Basic.UsersInline
+
+	usersSecret := corev1.Secret{
+		ObjectMeta: metav1.ObjectMeta{
+			Name:      gateway.Spec.DashboardEndpoint.Auth.Basic.PlaintextUsersSecretRef,
+			Namespace: gateway.Namespace,
+		},
+	}
+
+	if err := s.Client.Get(ctx, client.ObjectKeyFromObject(&usersSecret), &usersSecret); err != nil {
+		if client.IgnoreNotFound(err) != nil {
+			return nil, fmt.Errorf("failed to fetch credentials secret: %w", err)
+		}
+	}
+
+	hash := sha1.New()
+	for username, passwd := range usersSecret.Data {
+		_, _ = hash.Write(passwd)
+		pwHash := base64.StdEncoding.EncodeToString(hash.Sum(nil))
+		users = append(users, fmt.Sprintf("%s:{SHA}%s", username, pwHash))
+		hash.Reset()
+	}
+
+	if len(users) == 0 {
+		return nil, nil
+	}
+
+	slices.Sort(users)
+
+	return &hcm.HttpFilter{
+		Name: FilterNameBasicAuth,
+		ConfigType: &hcm.HttpFilter_TypedConfig{
+			TypedConfig: MustAny(&basic_authv3.BasicAuth{
+				Users: &corev3.DataSource{
+					Specifier: &corev3.DataSource_InlineString{
+						InlineString: strings.Join(users, "\n"),
+					},
+				},
+			}),
+		},
+	}, nil
+}
+
+func (s *StudioCluster) oauth2HttpFilter(instance string, gateway *supabasev1alpha1.APIGateway) *hcm.HttpFilter {
+	var (
+		serviceCfg = supabase.ServiceConfig.Envoy
+		oauth2Spec = gateway.Spec.DashboardEndpoint.OAuth2()
+	)
+
+	return &hcm.HttpFilter{
+		Name: FilterNameOAuth2,
+		ConfigType: &hcm.HttpFilter_TypedConfig{TypedConfig: MustAny(&oauth2v3.OAuth2{
+			Config: &oauth2v3.OAuth2Config{
+				TokenEndpoint: &corev3.HttpUri{
+					HttpUpstreamType: &corev3.HttpUri_Cluster{
+						Cluster: fmt.Sprintf("%s@%s", dashboardOAuth2ClusterName, instance),
+					},
+					Uri:     gateway.Spec.DashboardEndpoint.Auth.OAuth2.TokenEndpoint,
+					Timeout: durationpb.New(3 * time.Second),
+				},
+				AuthorizationEndpoint: gateway.Spec.DashboardEndpoint.Auth.OAuth2.AuthorizationEndpoint,
+				RedirectUri:           "%REQ(x-forwarded-proto)%://%REQ(:authority)%/callback",
+				RedirectPathMatcher: &matcherv3.PathMatcher{
+					Rule: &matcherv3.PathMatcher_Path{
+						Path: &matcherv3.StringMatcher{
+							MatchPattern: &matcherv3.StringMatcher_Exact{
+								Exact: "/callback",
+							},
+						},
+					},
+				},
+				SignoutPath: &matcherv3.PathMatcher{
+					Rule: &matcherv3.PathMatcher_Path{
+						Path: &matcherv3.StringMatcher{
+							MatchPattern: &matcherv3.StringMatcher_Exact{
+								Exact: "/signout",
+							},
+						},
+					},
+				},
+				Credentials: &oauth2v3.OAuth2Credentials{
+					ClientId: oauth2Spec.ClientID,
+					TokenSecret: &tlsv3.SdsSecretConfig{
+						Name: serviceCfg.Defaults.OAuth2ClientSecretKey,
+						SdsConfig: &corev3.ConfigSource{
+							ConfigSourceSpecifier: &corev3.ConfigSource_Ads{
+								Ads: new(corev3.AggregatedConfigSource),
+							},
+						},
+					},
+					TokenFormation: &oauth2v3.OAuth2Credentials_HmacSecret{
+						HmacSecret: &tlsv3.SdsSecretConfig{
+							Name: serviceCfg.Defaults.HmacSecretKey,
+							SdsConfig: &corev3.ConfigSource{
+								ConfigSourceSpecifier: &corev3.ConfigSource_Ads{
+									Ads: new(corev3.AggregatedConfigSource),
+								},
+							},
+						},
+					},
+				},
+				AuthScopes: oauth2Spec.Scopes,
+				Resources:  oauth2Spec.Resources,
+			},
+		})},
+	}
 }
diff --git a/internal/oidc/discovery.go b/internal/oidc/discovery.go
new file mode 100644
index 0000000..4780258
--- /dev/null
+++ b/internal/oidc/discovery.go
@@ -0,0 +1,60 @@
+/*
+Copyright 2025 Peter Kurfer.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+    http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package oidc
+
+import (
+	"context"
+	"encoding/json"
+	"errors"
+	"fmt"
+	"net/http"
+	"strings"
+)
+
+var ErrUnexpectedStatusCode = errors.New("unexpected status code")
+
+type DiscoveryDocument struct {
+	AuthorizationEndpoint string `json:"authorization_endpoint"`
+	TokenEndpoint         string `json:"token_endpoint"`
+}
+
+func IssuerConfiguration(ctx context.Context, issuerUrl string) (dd DiscoveryDocument, err error) {
+	const oidcDiscoveryEndpoint = "/.well-known/openid-configuration"
+	if !strings.HasSuffix(issuerUrl, oidcDiscoveryEndpoint) {
+		issuerUrl = strings.TrimSuffix(issuerUrl, "/") + oidcDiscoveryEndpoint
+	}
+
+	req, err := http.NewRequestWithContext(ctx, http.MethodGet, issuerUrl, nil)
+	if err != nil {
+		return dd, err
+	}
+
+	resp, err := http.DefaultClient.Do(req)
+	if err != nil {
+		return dd, err
+	}
+
+	defer func() {
+		err = errors.Join(err, resp.Body.Close())
+	}()
+
+	if resp.StatusCode != http.StatusOK {
+		return dd, fmt.Errorf("%w: %d - %s", ErrUnexpectedStatusCode, resp.StatusCode, resp.Status)
+	}
+
+	return dd, json.NewDecoder(resp.Body).Decode(&dd)
+}
diff --git a/internal/webhook/v1alpha1/apigateway_webhook_defaulter.go b/internal/webhook/v1alpha1/apigateway_webhook_defaulter.go
index 2d86b97..37da69b 100644
--- a/internal/webhook/v1alpha1/apigateway_webhook_defaulter.go
+++ b/internal/webhook/v1alpha1/apigateway_webhook_defaulter.go
@@ -23,9 +23,11 @@ import (
 	corev1 "k8s.io/api/core/v1"
 	"k8s.io/apimachinery/pkg/runtime"
 	"k8s.io/client-go/tools/record"
+	"sigs.k8s.io/controller-runtime/pkg/log"
 	"sigs.k8s.io/controller-runtime/pkg/webhook"
 
 	supabasev1alpha1 "code.icb4dc0.de/prskr/supabase-operator/api/v1alpha1"
+	"code.icb4dc0.de/prskr/supabase-operator/internal/oidc"
 	"code.icb4dc0.de/prskr/supabase-operator/internal/supabase"
 )
 
@@ -49,6 +51,7 @@ func (d *APIGatewayCustomDefaulter) Default(ctx context.Context, obj runtime.Obj
 		defaultManagerNamespace = "supabase-system"
 	)
 
+	logger := log.FromContext(ctx)
 	apiGateway, ok := obj.(*supabasev1alpha1.APIGateway)
 
 	if !ok {
@@ -106,5 +109,18 @@ func (d *APIGatewayCustomDefaulter) Default(ctx context.Context, obj runtime.Obj
 		}
 	}
 
+	if oauth2Spec := apiGateway.Spec.DashboardEndpoint.OAuth2(); oauth2Spec != nil {
+		if oauth2Spec.OpenIDIssuer != "" {
+			logger.Info("Fetching OIDC discovery document", "discovery_url", oauth2Spec.OpenIDIssuer)
+			discoveryDoc, err := oidc.IssuerConfiguration(ctx, oauth2Spec.OpenIDIssuer)
+			if err != nil {
+				return fmt.Errorf("failed to fetch OIDC configuration: %w", err)
+			}
+
+			oauth2Spec.TokenEndpoint = discoveryDoc.TokenEndpoint
+			oauth2Spec.AuthorizationEndpoint = discoveryDoc.AuthorizationEndpoint
+		}
+	}
+
 	return nil
 }