fix(auth): restore BetterAuth OIDC flow across api/web/compose
This commit is contained in:
@@ -166,7 +166,7 @@ To use the authentication system, configure these environment variables:
|
||||
OIDC_ISSUER=https://auth.example.com/application/o/mosaic-stack/
|
||||
OIDC_CLIENT_ID=your-client-id
|
||||
OIDC_CLIENT_SECRET=your-client-secret
|
||||
OIDC_REDIRECT_URI=http://localhost:3001/auth/callback
|
||||
OIDC_REDIRECT_URI=http://localhost:3001/auth/oauth2/callback/authentik
|
||||
|
||||
# JWT Session Management
|
||||
JWT_SECRET=change-this-to-a-random-secret-in-production
|
||||
@@ -186,7 +186,7 @@ BetterAuth provides these endpoints automatically:
|
||||
- `POST /auth/sign-up` - User registration
|
||||
- `POST /auth/sign-out` - Logout
|
||||
- `GET /auth/session` - Get current session
|
||||
- `GET /auth/callback/authentik` - OAuth callback handler
|
||||
- `GET /auth/oauth2/callback/authentik` - OAuth callback handler
|
||||
- `GET /auth/profile` - Get authenticated user profile (custom)
|
||||
|
||||
---
|
||||
|
||||
@@ -188,7 +188,7 @@ All components must follow TDD (tests first), achieve 85%+ coverage, and use PDA
|
||||
### Existing Auth Implementation (from Issue #4)
|
||||
|
||||
- BetterAuth is configured in the API (`apps/api/src/auth/`)
|
||||
- Endpoints: `/auth/callback/authentik`, `/auth/session`, `/auth/profile`
|
||||
- Endpoints: `/auth/oauth2/callback/authentik`, `/auth/session`, `/auth/profile`
|
||||
- Shared types available in `@mosaic/shared` package
|
||||
- Session-based auth with JWT tokens
|
||||
|
||||
@@ -313,7 +313,7 @@ Based on existing backend (from Issue #4):
|
||||
- `GET /auth/session` - Get current session
|
||||
- `GET /auth/profile` - Get user profile
|
||||
- `POST /auth/sign-out` - Logout
|
||||
- `GET /auth/callback/authentik` - OIDC callback (redirect from Authentik)
|
||||
- `GET /auth/oauth2/callback/authentik` - OIDC callback (redirect from Authentik)
|
||||
|
||||
### Tasks (to be implemented in future issue)
|
||||
|
||||
|
||||
@@ -161,7 +161,7 @@ Enhance `ConnectionService` to handle OIDC-based authentication:
|
||||
**Integration Tests**:
|
||||
|
||||
- POST /auth/initiate starts OIDC flow with correct params
|
||||
- GET /auth/callback handles OIDC response and creates identity
|
||||
- GET /auth/oauth2/callback/:providerId handles OIDC response and creates identity
|
||||
- POST /auth/validate validates tokens from federated instances
|
||||
- GET /auth/identities returns user's federated identities
|
||||
- Federated requests with valid tokens are authenticated
|
||||
|
||||
Reference in New Issue
Block a user