Skip to content

Conversation

@SystemsPurge
Copy link

Replaced the seperate flow urls (login,validate...etc) with a single issuer url that defines which flows the IDP supports, making the possible authentication methods supported by the proxy more flexible and IDP dependent.
Added code_challenge_method (PKCE) environment, in case the IDP cannot explicitely provide a secret.
Kept the client_secret env, in case the IDP is able to explicitely add villas as a client.
Changed ingress proxy annotations to account for headers possibly being too big with some auth flows.
If wou want to test, use a keycloak instance ( as an example ), with KC_PROXY=edge and KC_PROXY_HEADERS=xforwarded
Both the public and confidential client configurations should work properly.

{{- end }}
nginx.ingress.kubernetes.io/rewrite-target: /$1
nginx.ingress.kubernetes.io/use-regex: "true"
nginx.ingress.kubernetes.io/proxy-body-size: 1024m
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this was necessary to upload larger files, e.g. CSV results which are pushed to VILLASweb.

@stv0g
Copy link
Contributor

stv0g commented Oct 16, 2025

I dont have the time for testing this unfortunately. But I think we can go ahead and merge it.

Could you maybe check if a configuration without IDP still works?

@SystemsPurge
Copy link
Author

@stv0g What do you mean exactly without IDP? Wihtout external auth?

Ubuntu added 3 commits October 27, 2025 09:18
…s image

Signed-off-by: SystemsPurge <naktiyoussef@proton.me>
Signed-off-by: SystemsPurge <naktiyoussef@proton.me>
Signed-off-by: SystemsPurge <naktiyoussef@proton.me>
@stv0g
Copy link
Contributor

stv0g commented Nov 5, 2025

Yes exactly, just normal auth via VILLASwebs database.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants