Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

providers/oauth2: remember session_id from initial token #7976

Merged
merged 2 commits into from
Dec 22, 2023

Conversation

BeryJu
Copy link
Member

@BeryJu BeryJu commented Dec 22, 2023

Details

Remember the session_id from the initial token created and copy it to further tokens

Also update the proxy provider to use the hashed session id as claim

#2023


Checklist

  • Local tests pass (ak test authentik/)
  • The code has been formatted (make lint-fix)

If an API change has been made

  • The API schema has been updated (make gen-build)

If changes to the frontend have been made

  • The code has been formatted (make web)
  • The translation files have been updated (make i18n-extract)

If applicable

  • The documentation has been updated
  • The documentation has been formatted (make website)

… for future access/refresh tokens

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@BeryJu BeryJu requested a review from a team as a code owner December 22, 2023 23:25
Copy link

netlify bot commented Dec 22, 2023

Deploy Preview for authentik-storybook canceled.

Name Link
🔨 Latest commit cccb70f
🔍 Latest deploy log https://app.netlify.com/sites/authentik-storybook/deploys/65861acef8d64300089510ff

Copy link

codecov bot commented Dec 22, 2023

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (23c03d4) 92.59% compared to head (cccb70f) 92.60%.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #7976   +/-   ##
=======================================
  Coverage   92.59%   92.60%           
=======================================
  Files         593      593           
  Lines       29402    29406    +4     
=======================================
+ Hits        27224    27230    +6     
+ Misses       2178     2176    -2     
Flag Coverage Δ
e2e 50.77% <100.00%> (+0.06%) ⬆️
integration 26.14% <50.00%> (+<0.01%) ⬆️
unit 89.69% <100.00%> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@BeryJu BeryJu changed the title proxviders/oauth2: remember session_id from initial token providers/oauth2: remember session_id from initial token Dec 22, 2023
@BeryJu
Copy link
Member Author

BeryJu commented Dec 22, 2023

/cherry-pick version-2023.10

@BeryJu BeryJu merged commit 9a261c5 into main Dec 22, 2023
64 checks passed
@BeryJu BeryJu deleted the proxviders/proxy/remember-session_id branch December 22, 2023 23:53
gcp-cherry-pick-bot bot pushed a commit that referenced this pull request Dec 22, 2023
* providers/oauth2: remember session_id original token was created with for future access/refresh tokens

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* providers/proxy: use hashed session as `sid`

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
BeryJu added a commit that referenced this pull request Dec 23, 2023
…7976) (#7977)

providers/oauth2: remember session_id from initial token (#7976)

* providers/oauth2: remember session_id original token was created with for future access/refresh tokens



* providers/proxy: use hashed session as `sid`



---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: Jens L <jens@goauthentik.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant