Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/oauth external providers #185

Open
wants to merge 35 commits into
base: feature/oauth2_support
Choose a base branch
from

Conversation

toggm
Copy link
Member

@toggm toggm commented Mar 17, 2025

Implemented support for external OAuth providers:

  • Implemented opaque token validation in backend
  • Introduce custom http header to preselect opaque token issuer as this info is no carried by the token itself
  • Gitlab based on OIDC opaque token validation
  • Github based on custom opaque token validation

toggm added 10 commits March 11, 2025 15:45
…backend with oidc providers handling non JWT based access_tokens (github, gitlab)
* introduce additional X-Token-Issuer header to improve issuer lookup when calling from frontend
* Fix integration of shared caches
* Fix calling introspection and user_info endpoints
* Dispatch refresh_token call to correct provider
* Implement specific TokenValidator logic as github needs further steps
@toggm
Copy link
Member Author

toggm commented Mar 17, 2025

image

@toggm toggm added the enhancement New feature or request label Mar 17, 2025
Copy link

@MarcoSteinacher MarcoSteinacher left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. I just have a few questions to clarify and pointed out minor issues in the comments.

@toggm toggm self-assigned this Mar 20, 2025
…up without declaring gitlab and github client details
@toggm toggm force-pushed the feature/oauth_external_providers branch from 93e2b3d to c931f74 Compare March 20, 2025 12:05
… firefox doesnt resolve class names from global defined styles in symbols
@toggm toggm force-pushed the feature/oauth_external_providers branch from 11287ba to 1e5d117 Compare March 20, 2025 13:09
toggm and others added 10 commits March 20, 2025 16:03
* Provide local keycloak and mailhog instance in dev mode
* start local keycloak with initial realm and lasius client
* Fix JWKS url to override full path as keycloak is using a non-standard path
* Enable JWT validation for custom keycloak in backend
* Implemented logout method in internal oauth provider by removing token from database
* auto logout on provider if logged in with internal oauth provider or keycloak provider
* integrated custom naming and logo for keycloak provider
…keycloak

Enabled support for authentication against local keycloak
- New acceptedTOS field in user profile
- New endpoint /backend/user/accept-tos to accept TOS
Bumped EmbedMongo version to 7.0 for testing.
MarcoSteinacher and others added 13 commits March 25, 2025 11:38
* Fixed styling of demo info box
* Prevent of auto-loop if after successful login backend request fails
* adjust next-auth lookup of internal oauth provider if running in docker container
* add .dockerignore to prevent including local .env.local file in deployment
… in configuration to be able to overwrite via env variables
- LASIUS-18: improve initial selected organisation
- Improve layout of my-org detail page
- Fix startup without custom keycloak logo
- Prevent loading of profile data until user is authenticated
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants