-
-
Notifications
You must be signed in to change notification settings - Fork 130
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ROMM-540] OIDC Support #1321
[ROMM-540] OIDC Support #1321
Conversation
Test Results92 tests 92 ✅ 27s ⏱️ Results for commit 37db255. ♻️ This comment has been updated with latest results. |
fa09c59
to
f2f8956
Compare
request.session.clear() | ||
|
||
return {"msg": "Successfully logged out"} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is unchanged, just moved it up
@@ -102,7 +102,7 @@ async def lifespan(app: FastAPI) -> AsyncGenerator[None, None]: | |||
app.include_router(states.router, prefix="/api") | |||
app.include_router(tasks.router, prefix="/api") | |||
app.include_router(feeds.router, prefix="/api") | |||
app.include_router(config.router, prefix="/api") | |||
app.include_router(configs.router, prefix="/api") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is to stop vscode complaining when getting confused between the backend/config
and config/__init__
@@ -16,3 +16,4 @@ env = | |||
SCHEDULED_UPDATE_SWITCH_TITLEDB_CRON=0 4 * * * | |||
UPLOAD_TIMEOUT=20 | |||
LOGLEVEL=DEBUG | |||
OIDC_ENABLED=false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we set this for all tests so they run, but override it in OIDC handler tests
Just added the new |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great implementation! Just added a few small comments.
086748b
to
37db255
Compare
Nice, thanks for this! |
This PR adds support for authentication via an external OIDC server (Authentik, Authelia, etc). New
OIDC_
env variables were added to connect to the OIDC provider. Hitting the endpoint/login/openid
kicks off the OAuth flow, and the callback (with encrypted token) is handled by/oauth/openid
.The dev docker-compose.yml now includes entries for running an authentik server locally (for dev and testing). Setup in authentik requires creating an OAuth Provider, then an Application using that provider.
Closes #540