-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: update kickstart.json #84
Conversation
This commit is responsible for integrating the node-oidc-provider created by panva and removing the custom implementation of oidc. As a result there was a change in schema and a lot of things got deprecated and broken. Tests broke, code failed. Deprecated code was removed and All of the mess was cleaned and stabilized. Zolo.md is created to help understand the next developer the remaining tasks and how to accomplish them. Tests were removed as a result the count came down to 386 from 510 :(
feat: integrate node-oidc-provider by panva
This commit is responsible for removing server_error from the devInteractions page
refactor: update code to remove errors
Nest oidc provider was used to made login process smooth and easy. Some errors were encountered since sqlite was used. however was corrected
Earlier a user/someone else can login from any password value, however it is changed to -> match the original password value to avoid unauthorized access
Minio requires that the AS supports a policy claim in the id_token, hence it needed to be mapped using the roles available to a user in that tenant, now the user is login based on admin or normal user
Now applications can login without asking for consent from the end user This feature has been warned not to used because 1. asking for user consent is ethical 2. This might be not be bug-free as mentioned below link: https:/panva/node-oidc-provider/blob/v7.x/recipes/skip_consent.md
refactor: make nest-oidc-provider to handle login
earlier findAccount just returns the role and don't check whether the role belongs to corresponding application or not which might have led to privilege escalation. Now it is fixed in the findAccount function
This commit fixes failing tests due to change in schema of application and other minor fixes
* fix: user registration on login User registration info is being saved in the user Registration minor bug fixes * chore: a minor fix * chore: docker compose and kickstart.json updated kickstart.json to have more than 1 tenant and client created docker compose file
Caution Review failedThe pull request is closed. 📝 WalkthroughWalkthroughThe pull request introduces several modifications across multiple files. Key changes include the commenting out of scripts in the Changes
Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
Checklist
Make sure you have
@nestjs/swagger
decorators wherever requiredDescription
Describe the aim/objective of this PR
Steps to test
Add steps to run and test teh desired changes
References
Add relevant links and screenshots outlining the working status of this PR
Demo
If relevant to your change, attach a screen recording showcasing that the change is working and giving desired results.
Summary by CodeRabbit
New Features
docker-compose.yml
for easier application setup and management.InteractionHelper
class for streamlined handling of OIDC interactions.kickstart.json
to support multiple application configurations and OAuth2 settings.Bug Fixes
Tests
InteractionHelper
andOidcController
classes.