-
Notifications
You must be signed in to change notification settings - Fork 136
603 better oauth datasources #611
base: develop
Are you sure you want to change the base?
Conversation
…e api (localhost:8080 to be used instead of the old localhost:8006)
|
Minimum allowed coverage is Generated by 🐒 cobertura-action against b4f9ea2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ESLint found more than 20 potential problems in the proposed changes. Check the Files changed tab for more details.
…handling of new route to get the redirect url for oauth to be completed
| server.get('/register', unauthedMiddlewareChain, checkSessionWelcome, renderStaticPage(app, '/register')); | ||
| server.get( | ||
| '/login', | ||
| unauthedMiddlewareChain, |
Check failure
Code scanning / CodeQL
Missing rate limiting High
authorization
…ve the internal airbyte api handle it
…ill need to patch bugs, fix issues, make dynamic
|
Current status of the code:
The next few commits will likely be refactoring the implementation to do the following in order:
|
… for dynamic custom passport use
| oauthRouter.get( | ||
| '/hubspot/callback', | ||
| useSession, | ||
| useJWT, |
Check failure
Code scanning / CodeQL
Missing rate limiting High
authorization
| oauthRouter.get( | ||
| '/salesforce/callback', | ||
| useSession, | ||
| useJWT, |
Check failure
Code scanning / CodeQL
Missing rate limiting High
authorization
| oauthRouter.get( | ||
| '/xero/callback', | ||
| useSession, | ||
| useJWT, |
Check failure
Code scanning / CodeQL
Missing rate limiting High
authorization
…tible verify callback
|
Somewhere along the line here a bug was introduced that replaced the file upload/drop area with the connectors dropdown |
|
@NaderRNA what's happening with this PR?? where are we with this?? |
|
Currently the branch supports custom OAuth implementation for any OAuth provider where we have a Client ID and Client Secret for the oauth. Currently HubSpot is completley functional using OAuth but there are some issues with out Airtable, Salesforce and Xero app credentials so I'm just trying to iron those out with Andrew. |
This reverts commit cea520e.
|
reverting back because Airtable was creating more problems as I was implementing it. Using custom strategies on passport seems to be broken with our current versions of passport.js. To use airtable or anything not supported by passport.js, a custom implementation is required that skips passport implementation and is completely end to end handled by the webapp |
|
@iandjx where are we at with this.... this would be a really good addition |
Ability to connect to datasources (airbyte) using OAuth login page
Uses passport.js to authenticate the OAuth, gets the refreshToken (which is the only thing airbyte needs to establish a connection to a source with OAuth).
Aims to keep current datasource flow as unchanged as possible.
We only have client ID and client Secrets for the following which will be the only ones supported:
(crossed out oauth providers are implemented)