-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SPA - OIDC integration following the design implemented on the PoC #558
Open
g-saracca
wants to merge
101
commits into
authentication-oidc
Choose a base branch
from
feat/528-oidc-integration
base: authentication-oidc
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…tibility with bearer auth feature flag
g-saracca
changed the title
Feat/528 OIDC integration
SPA - OIDC integration following the design implemented on the PoC
Dec 3, 2024
g-saracca
added
Size: 10
A percentage of a sprint. 7 hours.
GREI Re-arch
GREI re-architecture-related
Original size: 10
SPA.Q4.4
OIDC login + API authentication
FY25 Sprint 11
FY25 Sprint 11 (2024-11-20 - 2024-12-04)
labels
Dec 4, 2024
@ekraffmiller Back to Ready For Review .. There was a single test failing when checking a checkbox (Terms Of Use), this was only happening in github actions, this was because the interactivity was happening too fast, I added a 300ms |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
FY25 Sprint 11
FY25 Sprint 11 (2024-11-20 - 2024-12-04)
FY25 Sprint 12
FY25 Sprint 12 (2024-12-04 - 2024-12-18)
GREI Re-arch
GREI re-architecture-related
Original size: 10
Size: 10
A percentage of a sprint. 7 hours.
SPA.Q4.4
OIDC login + API authentication
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What this PR does / why we need it:
Change SPA authentication method to use Keycloak as OIDC provider using PKCE based on an initial PoC.
Which issue(s) this PR closes:
Special notes for your reviewer:
This PR does not point to the
develop
branch but to a separate branch ( authentication-oidc ), the idea is in another PR to configure the deployment to another environment that is not Beta maybe to be able to test this not only locally before merging to develop.All unit tests and e2e tests are working now with this new authentication method.
Application terms of use are empty for now as we don't have an API endpoint for it yet.
Suggestions on how to test this:
Step 1: Run the Development Environment
npm i
.cd packages/design-system && npm i && npm run build
.cd ../../
..env
file similar to.env.example
, with the variableVITE_DATAVERSE_BACKEND_URL=http://localhost:8000
.dev-env/.env
file is filled with the appropriate data. For theREGISTRY
variable, please setghcr.io
, as we will use a PR-generated dataverse image.cd dev-env
../run-env.sh 10959-bearer-token-auth-ext
.Step 2: Test the feature in the SPA
Another path:
Does this PR introduce a user interface change? If mockups are available, please link/include them here:
signup-success.mov
Is there a release notes update needed for this change?:
No
Additional documentation:
No