-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Add generic OIDC login option #10614
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
DryRun Security SummaryA pull request adds OpenID Connect (OIDC) authentication support with multiple security considerations including potential configuration vulnerabilities and authentication risks. Expand for full summaryThe pull request adds OpenID Connect (OIDC) authentication support across multiple files, introducing configuration settings, login template modifications, and authentication backend integration. Security findings include:
Code AnalysisWe ran
Overall Riskiness🔴 Risk threshold exceeded. We've notified @mtesauro, @grendel513. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
e7a6740
to
f97900e
Compare
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Hi @dandersonsw are you able to back out the formatting changes that aren not directly related to this PR? It is making review a little challenging |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
f97900e
to
855842e
Compare
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Hi @Maffooch I was able to back out the formatting changes on all the files except for the documentation file. Hopefully that makes it easier to review. Happy to make further changes if needed. Thank you. |
@dandersonsw Just kicked off the tests 🤞 |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
* fixing conflicts and removing code formatting * sha file deleted * remove settings sha * Make some settings optional * Fix ruff * Restore some vuln ids --------- Co-authored-by: Cody Maffucci <[email protected]>
Thanks @dandersonsw for the PR. |
Description
This adds the option of using a generic OIDC identity provider for login, rather than a specific one like Google, Keycloak, etc...
Test results
Ideally you extend the test suite in
tests/
anddojo/unittests
to cover the changed in this PR.Alternatively, describe what you have and haven't tested.
Tested logging in using an OIDC identity provider
Documentation
Please update any documentation when needed in the documentation folder)
Checklist
This checklist is for your information.
dev
.dev
.bugfix
branch.