Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

backend: default oidc scopes list #903

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

ErvinRacz
Copy link
Contributor

Fix default oidc scopes list

The backend expects refresh tokens, however they have to be requested for the token exchange with special scope

The Nebraska backend expects refresh tokens for the Nebraska use sessions with the Nebraska frontend, however the refresh token is not acquired with the default configuration as it has to be requested by using the special scope offline_access.

How to use / How to test

  1. Set up an IDP
  2. use the oidc authentication method
  3. ensure that the offline_access scope is provided along with openid when Nebraska initiates the authentication flow
  4. ensure the idp issues refresh tokens
  5. set the access token expiration to a low value to easily verify if the bakcend can obtain new access tokens with the refresh token
  6. test the athorization flow after login and see if new access tokens are issued with the refresh token
  7. test if new authorization is required if the refresh token is missing or expired

Testing done

air --build.cmd "go build -o ./bin/nebraska ./cmd/nebraska/main.go" \
         --build.bin "./bin/nebraska" \
         --build.args_bin "\
     -http-log \
     -debug \
     --auth-mode oidc \
     --oidc-admin-roles nebraska_admin \
     --oidc-viewer-roles nebraska_member \
     --oidc-roles-path \"http://kinvolk\.io/roles\" \
     --oidc-client-id _redacted_ \
     --oidc-issuer-url https://_redacted_.com/ \
     --oidc-client-secret _redacted_ \
     -oidc-valid-redirect-urls http://localhost:3000/"

Testing done before trial account on Auth0 (see the docs how to set up Auth0 for Nebraska) and a locally running Nebraska instance.

  • Changelog entries added in the respective changelog/ directory (user-facing change, bug fix, security fix, update)
  • Inspected CI output for image differences: /boot and /usr size, packages, list files for any missing binaries, kernel modules, config files, kernel modules, etc.

the backend expects refresh tokens, however they have to be requested
for the token exchange with special scope

partially fixes issue 902
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant