feat: add OIDC middleware support via Traefik plugin#35
Draft
boehlke wants to merge 5 commits intoOpenSlides:mainfrom
Draft
feat: add OIDC middleware support via Traefik plugin#35boehlke wants to merge 5 commits intoOpenSlides:mainfrom
boehlke wants to merge 5 commits intoOpenSlides:mainfrom
Conversation
This was referenced Feb 19, 2026
Draft
- Configure traefik-oidc-auth plugin when OIDC_ENABLED is set - Add OIDC-authenticated routes for provision, who-am-i, and oauth2 callbacks - Add Keycloak reverse-proxy route and unauthenticated theme endpoint - Redact auth headers from access logs Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Update OIDC-exempt theme route from /system/autoupdate/theme to /system/presenter/theme now that theme serving lives in the backend. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
v0.19.3 does not exist in the Traefik plugin registry, causing the plugin to fail to download and all OIDC-protected routes to return 404. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Add OIDC_INTERNAL_PROVIDER_URL for service-to-service OIDC discovery over plain HTTP (Docker network), while keeping OIDC_PROVIDER_URL as the external issuer URL validated in tokens via ValidIssuer. This fixes the self-signed TLS certificate error when the proxy tries to discover OIDC endpoints via its own HTTPS endpoint.
150e100 to
9d99b98
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
traefik-oidc-authplugin whenOIDC_ENABLEDenvironment variable is set/system/oidc-provision,/system/who-am-i, and/oauth2/*callbacks/keycloak/*) and unauthenticated/system/themeendpointAuthorizationandX-Forwarded-*headers from access logs for securityContext
This configures Traefik to act as an OIDC relying party using the
traefik-oidc-authplugin. WhenOIDC_ENABLED=true, Traefik intercepts unauthenticated requests and redirects to Keycloak for login. The plugin injects the JWT into theAuthorizationheader before forwarding to backend services.Routes that need to bypass OIDC authentication (e.g., the theme endpoint for Keycloak's login page) get explicit routers with higher priority and no middleware.
Related PRs (part of Keycloak OIDC integration):
Authorizationheader injected by this middleware🤖 Co-authored with Claude Code