Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Almost working pass header auth #844

Draft
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

DiamondJoseph
Copy link
Contributor

@DiamondJoseph DiamondJoseph commented Jan 13, 2025

Minimal changes to Tiled to work when expected authentication headers to come as part of existing TiledClient with external AuthN. I will type up something more coherent tomorrow. Paired change in blueapi

Checklist

  • Add a Changelog entry
  • Add the ticket number which this PR closes to the comment section

@@ -0,0 +1,15 @@
authentication:
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This configuration works with the docker-compose contained in the oidc/ subdirectory. It will eventually be pared down to something that works as an example for the documentation, but for now is purely functional.

It seems Tiled's idea of a "principal" is at odds with Authentication handling as-is: the principal Depends in the FastAPI app is using a completely arbitrary Oauth2 configuration- I do not like how it tries to mutate the Oauth2PasswordBearer, and it is also entirely seperate from all other AuthN handling.

The FastAPI routing and Dependencies are a bit of a mess.

@DiamondJoseph DiamondJoseph force-pushed the almost-working-pass-header-auth branch from 9aadf96 to 920ceab Compare January 14, 2025 14:39
@DiamondJoseph DiamondJoseph force-pushed the almost-working-pass-header-auth branch from 920ceab to 7a919fa Compare January 14, 2025 15:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant