Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cb 4389 convert reverse proxy #2300

Merged
merged 49 commits into from
Jan 23, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
49 commits
Select commit Hold shift + click to select a range
434af0f
CB-4389. Converted reverse proxy to identity provider
DenisSinelnikov Jan 11, 2024
1dc6a11
CB-4039 build logout redirect link on backend side
alexander-skoblikov Jan 12, 2024
476f297
Merge branch 'devel' into CB-4039-logout-with-context
Jan 12, 2024
5585b07
CB-4039 fix return value
alexander-skoblikov Jan 12, 2024
557910c
CB-4389. Added auto configuration for Reverse proxy if its enabled on…
DenisSinelnikov Jan 15, 2024
2c6cd7a
CB-4389. Added check for already exist configuration
DenisSinelnikov Jan 15, 2024
2f2c214
Merge branch 'devel' into CB-4039-logout-with-context
Jan 16, 2024
1712a63
CB-4389. Refactor after review
DenisSinelnikov Jan 16, 2024
5602f68
CB-4039 adds logout with context for Okta Identity Provider
Jan 16, 2024
18be424
CB-4039 backward compatibility fix
alexander-skoblikov Jan 16, 2024
121883d
Merge branch 'devel' into CB-4039-logout-with-context
Jan 16, 2024
dfea9e7
CB-4039 add since annotation
alexander-skoblikov Jan 16, 2024
a547a29
CB-4039 api return type fix
alexander-skoblikov Jan 16, 2024
2d943a5
CB-4039 logout extended
Jan 16, 2024
1a17447
CB-4389. Refactor after review
DenisSinelnikov Jan 16, 2024
eabdb15
Merge branch 'devel' into CB-4389-convert-reverse-proxy
DenisSinelnikov Jan 16, 2024
8724726
Merge branch 'devel' into CB-4389-convert-reverse-proxy
DenisSinelnikov Jan 17, 2024
1f6f9f3
Merge branch 'devel' into CB-4039-logout-with-context
Jan 17, 2024
ed66382
CB-4389. Refactor after review
DenisSinelnikov Jan 17, 2024
38341af
CB-4039 okta logout redirect moved to AuthenticationService
Jan 17, 2024
b08cfa1
CB-4039 remove windowService dep
Jan 17, 2024
e20314e
CB-4039 removes old logic of identity provider logout links
Jan 17, 2024
3e4587c
CB-4039 okta review changes
Jan 17, 2024
afe11af
Merge branch 'devel' into CB-4039-logout-with-context
dariamarutkina Jan 17, 2024
c895e4c
Merge branch 'CB-4039-logout-with-context' into CB-4389-convert-rever…
DenisSinelnikov Jan 17, 2024
83292a2
CB-4389. Merge logout logic into branch
DenisSinelnikov Jan 17, 2024
cbeddec
Merge branch 'devel' into CB-4389-convert-reverse-proxy
DenisSinelnikov Jan 17, 2024
8e6ab28
Merge branch 'devel' into CB-4389-convert-reverse-proxy
DenisSinelnikov Jan 18, 2024
41edc6a
Merge remote-tracking branch 'origin/CB-4389-convert-reverse-proxy' i…
DenisSinelnikov Jan 18, 2024
6af4e79
CB-4389. Delete param after review
DenisSinelnikov Jan 22, 2024
97fdb60
Merge branch 'devel' into CB-4389-convert-reverse-proxy
DenisSinelnikov Jan 22, 2024
b493de9
Merge branch 'devel' into CB-4389-convert-reverse-proxy
DenisSinelnikov Jan 22, 2024
addf652
Merge branch 'devel' into CB-4389-convert-reverse-proxy
EvgeniaBzzz Jan 22, 2024
051946b
Merge branch 'devel' into CB-4389-convert-reverse-proxy
EvgeniaBzzz Jan 23, 2024
48eece4
CB-4389. Converted reverse proxy to identity provider
DenisSinelnikov Jan 11, 2024
3a8034a
CB-4389. Added auto configuration for Reverse proxy if its enabled on…
DenisSinelnikov Jan 15, 2024
7649de1
CB-4389. Added check for already exist configuration
DenisSinelnikov Jan 15, 2024
e7cc756
CB-4389. Refactor after review
DenisSinelnikov Jan 16, 2024
10a93cb
CB-4389. Refactor after review
DenisSinelnikov Jan 16, 2024
285e1a7
CB-4389. Refactor after review
DenisSinelnikov Jan 17, 2024
2e1826c
CB-4039 adds logout with context for Okta Identity Provider
Jan 16, 2024
41ef8c5
CB-4039 okta logout redirect moved to AuthenticationService
Jan 17, 2024
f2569fc
CB-4389. Merge logout logic into branch
DenisSinelnikov Jan 17, 2024
8b4dd63
CB-4389. Delete param after review
DenisSinelnikov Jan 22, 2024
c68e688
CB-4546 shows hex/base64 only on blob column selection (#2314)
sergeyteleshev Jan 22, 2024
20291de
Merge remote-tracking branch 'origin/CB-4389-convert-reverse-proxy' i…
DenisSinelnikov Jan 23, 2024
0bdb8f3
CB-4389. Fix logout redirect and npe for logout parameter
DenisSinelnikov Jan 23, 2024
b43f639
CB-4389. Fix logout redirect and npe for logout parameter
DenisSinelnikov Jan 23, 2024
4c3f481
CB-4389. Change version
DenisSinelnikov Jan 23, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -27,17 +27,12 @@
* Federated auth provider.
* Provides links to external auth resource
*/
public interface SMAuthProviderFederated {
public interface SMAuthProviderFederated extends SMSignOutLinkProvider {

@NotNull
String getSignInLink(String id, @NotNull Map<String, Object> providerConfig) throws DBException;

/**
* @return a common link for logout, not related with the user context
*/
@NotNull
String getCommonSignOutLink(String id, @NotNull Map<String, Object> providerConfig) throws DBException;

@Override
default String getUserSignOutLink(
@NotNull SMAuthProviderCustomConfiguration providerConfig,
@NotNull Map<String, Object> userCredentials
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
/*
* DBeaver - Universal Database Manager
* Copyright (C) 2010-2024 DBeaver Corp and others
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.cloudbeaver.auth;

import org.jkiss.code.NotNull;
import org.jkiss.dbeaver.DBException;
import org.jkiss.dbeaver.model.security.SMAuthProviderCustomConfiguration;

import java.util.Map;

public interface SMSignOutLinkProvider {

Check warning on line 25 in server/bundles/io.cloudbeaver.model/src/io/cloudbeaver/auth/SMSignOutLinkProvider.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.model/src/io/cloudbeaver/auth/SMSignOutLinkProvider.java#L25

Missing a Javadoc comment.

/**

Check warning on line 27 in server/bundles/io.cloudbeaver.model/src/io/cloudbeaver/auth/SMSignOutLinkProvider.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.model/src/io/cloudbeaver/auth/SMSignOutLinkProvider.java#L27

Summary javadoc is missing.
* @return a common link for logout, not related with the user context
*/
@NotNull
String getCommonSignOutLink(String id, @NotNull Map<String, Object> providerConfig) throws DBException;

String getUserSignOutLink(

Check warning on line 33 in server/bundles/io.cloudbeaver.model/src/io/cloudbeaver/auth/SMSignOutLinkProvider.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.model/src/io/cloudbeaver/auth/SMSignOutLinkProvider.java#L33

Missing a Javadoc comment.
@NotNull SMAuthProviderCustomConfiguration providerConfig,
@NotNull Map<String, Object> userCredentials
) throws DBException;
}
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@

import io.cloudbeaver.auth.CBAuthConstants;
import io.cloudbeaver.auth.SMAuthProviderFederated;
import io.cloudbeaver.auth.SMSignOutLinkProvider;
import io.cloudbeaver.utils.WebAppUtils;
import org.jkiss.dbeaver.DBException;
import org.jkiss.dbeaver.Log;
Expand Down Expand Up @@ -85,8 +86,8 @@ private String buildRedirectUrl(String baseUrl) {
@Property
public String getSignOutLink() throws DBException {
SMAuthProvider<?> instance = providerDescriptor.getInstance();
return instance instanceof SMAuthProviderFederated
? ((SMAuthProviderFederated) instance).getCommonSignOutLink(getId(), config.getParameters())
return instance instanceof SMSignOutLinkProvider
? ((SMSignOutLinkProvider) instance).getCommonSignOutLink(getId(), config.getParameters())
: null;
}

Expand Down
3 changes: 3 additions & 0 deletions server/bundles/io.cloudbeaver.service.auth/plugin.xml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,9 @@
<service id="auth" label="User authentication" description="User authentication services" class="io.cloudbeaver.service.auth.WebServiceBindingAuth">

</service>
<service id="reverse.configurator" label="Reverse Proxy Configurator" description="Reverse proxy configurator"
class="io.cloudbeaver.service.auth.ReverseProxyConfigurator">
</service>
</extension>
<extension point="io.cloudbeaver.handler">
<sessionHandler id="RPSessionHandler" class="io.cloudbeaver.service.auth.RPSessionHandler"/>
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
/*
* DBeaver - Universal Database Manager
* Copyright (C) 2010-2024 DBeaver Corp and others
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.cloudbeaver.service.auth;
DenisSinelnikov marked this conversation as resolved.
Show resolved Hide resolved

interface RPConstants {
String PARAM_LOGOUT_URL = "logout-url";
String PARAM_USER = "user-header";
String PARAM_TEAM = "team-header";
String PARAM_FIRST_NAME = "first-name-header";
String PARAM_LAST_NAME = "last-name-header";
String PARAM_ROLE_NAME = "role-header";
}
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@
import org.jkiss.dbeaver.DBException;
import org.jkiss.dbeaver.Log;
import org.jkiss.dbeaver.model.auth.SMAuthInfo;
import org.jkiss.dbeaver.model.security.SMAuthProviderCustomConfiguration;
import org.jkiss.dbeaver.model.security.SMConstants;
import org.jkiss.dbeaver.model.security.SMController;
import org.jkiss.dbeaver.model.security.SMStandardMeta;
Expand All @@ -41,10 +42,10 @@

import java.io.IOException;
import java.text.MessageFormat;
import java.util.Collections;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.*;

import jakarta.servlet.http.HttpServletRequest;

Check warning on line 47 in server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/RPSessionHandler.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/RPSessionHandler.java#L47

Import statement for jakarta.servlet.http.HttpServletRequest is in the wrong order. Should be in the THIRD_PARTY_PACKAGE group, expecting not assigned imports on this line.
import jakarta.servlet.http.HttpServletResponse;

Check warning on line 48 in server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/RPSessionHandler.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/RPSessionHandler.java#L48

Import statement for jakarta.servlet.http.HttpServletResponse is in the wrong order. Should be in the THIRD_PARTY_PACKAGE group, expecting not assigned imports on this line.

public class RPSessionHandler implements DBWSessionHandler {

Expand All @@ -62,22 +63,38 @@
return false;
}

public void reverseProxyAuthentication(@NotNull HttpServletRequest request, @NotNull WebSession webSession) throws DBWebException {
public void reverseProxyAuthentication(@NotNull HttpServletRequest request, @NotNull WebSession webSession) throws DBException {

Check warning on line 66 in server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/RPSessionHandler.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/RPSessionHandler.java#L66

Missing a Javadoc comment.
SMController securityController = webSession.getSecurityController();
WebAuthProviderDescriptor authProvider = WebAuthProviderRegistry.getInstance().getAuthProvider(RPAuthProvider.AUTH_PROVIDER);
if (authProvider == null) {
throw new DBWebException("Auth provider " + RPAuthProvider.AUTH_PROVIDER + " not found");
}
SMAuthProviderExternal<?> authProviderExternal = (SMAuthProviderExternal<?>) authProvider.getInstance();
String userName = request.getHeader(RPAuthProvider.X_USER);
String teams = request.getHeader(RPAuthProvider.X_TEAM);
SMAuthProviderCustomConfiguration configuration = WebAppUtils.getWebAuthApplication()
.getAuthConfiguration()
.getAuthCustomConfigurations()
.stream()
.filter(p -> p.getProvider().equals(authProvider.toString()))
.findFirst()
.orElse(null);
Map<String, Object> paramConfigMap = new HashMap<>();
if (configuration != null) {
authProvider.getConfigurationParameters().forEach(p ->
paramConfigMap.put(p.getId(), configuration.getParameters().get(p.getId())
));
}
String userName = request.getHeader(
resolveParam(paramConfigMap.get(RPConstants.PARAM_USER), RPAuthProvider.X_USER)
);
String teams = request.getHeader(resolveParam(paramConfigMap.get(RPConstants.PARAM_TEAM), RPAuthProvider.X_TEAM));
if (CommonUtils.isEmpty(teams)) {
// backward compatibility
teams = request.getHeader(RPAuthProvider.X_ROLE);
}
String role = request.getHeader(RPAuthProvider.X_ROLE_TE);
String firstName = request.getHeader(RPAuthProvider.X_FIRST_NAME);
String lastName = request.getHeader(RPAuthProvider.X_LAST_NAME);
String role = request.getHeader(resolveParam(paramConfigMap.get(RPConstants.PARAM_ROLE_NAME), RPAuthProvider.X_ROLE_TE));
String firstName = request.getHeader(resolveParam(paramConfigMap.get(RPConstants.PARAM_FIRST_NAME), RPAuthProvider.X_FIRST_NAME));
String lastName = request.getHeader(resolveParam(paramConfigMap.get(RPConstants.PARAM_LAST_NAME), RPAuthProvider.X_LAST_NAME));
String logoutUrl = Objects.requireNonNull(configuration).getParameter(RPConstants.PARAM_LOGOUT_URL);
List<String> userTeams = teams == null ? Collections.emptyList() : List.of(teams.split("\\|"));
if (userName != null) {
try {
Expand All @@ -89,6 +106,9 @@
if (!CommonUtils.isEmpty(lastName)) {
credentials.put(SMStandardMeta.META_LAST_NAME, lastName);
}
if (CommonUtils.isNotEmpty(logoutUrl)) {
credentials.put("logoutUrl", logoutUrl);
}
Map<String, Object> sessionParameters = webSession.getSessionParameters();
sessionParameters.put(SMConstants.SESSION_PARAM_TRUSTED_USER_TEAMS, userTeams);
sessionParameters.put(SMConstants.SESSION_PARAM_TRUSTED_USER_ROLE, role);
Expand All @@ -102,7 +122,7 @@
webSession.getSessionId(),
currentSmSessionId,
sessionParameters,
WebSession.CB_SESSION_TYPE, authProvider.getId(), null, userCredentials);
WebSession.CB_SESSION_TYPE, authProvider.getId(), configuration.getId(), userCredentials);
new WebSessionAuthProcessor(webSession, smAuthInfo, false).authenticateSession();
log.debug(MessageFormat.format(
"Successful reverse proxy authentication: user ''{0}'' with teams {1}", userName, userTeams));
Expand All @@ -120,4 +140,11 @@
public boolean handleSessionClose(WebSession webSession) throws DBException, IOException {
return false;
}

private String resolveParam(Object value, String defaultValue) {
if (value != null && !value.toString().isEmpty()) {
return value.toString();
}
return defaultValue;
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
/*
* DBeaver - Universal Database Manager
* Copyright (C) 2010-2024 DBeaver Corp and others
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.cloudbeaver.service.auth;
DenisSinelnikov marked this conversation as resolved.
Show resolved Hide resolved

import io.cloudbeaver.auth.provider.rp.RPAuthProvider;
import io.cloudbeaver.model.app.WebAppConfiguration;
import io.cloudbeaver.model.app.WebApplication;
import io.cloudbeaver.model.app.WebAuthApplication;
import io.cloudbeaver.model.session.WebSession;
import io.cloudbeaver.service.DBWServiceServerConfigurator;
import org.jkiss.code.NotNull;
import org.jkiss.code.Nullable;
import org.jkiss.dbeaver.DBException;
import org.jkiss.dbeaver.Log;
import org.jkiss.dbeaver.model.security.SMAuthProviderCustomConfiguration;

import java.util.HashMap;
import java.util.Map;

public class ReverseProxyConfigurator implements DBWServiceServerConfigurator {
private static final Log log = Log.getLog(ReverseProxyConfigurator.class);

@Override
public void configureServer(
@NotNull WebApplication application,
@Nullable WebSession session,
@NotNull WebAppConfiguration appConfig
) throws DBException {
}

@Override
public void migrateConfigurationIfNeeded(@NotNull WebApplication application) throws DBException {
if (migrationNotNeeded(application)) {
return;
}
migrateConfiguration(application);
}

@Override
public void reloadConfiguration(@NotNull WebAppConfiguration appConfig) throws DBException {

}

private void migrateConfiguration(
@NotNull WebApplication application
) {
if (!(application instanceof WebAuthApplication authApplication)) {
return;
}

SMAuthProviderCustomConfiguration smReverseProxyProviderConfiguration =
authApplication.getAuthConfiguration().getAuthProviderConfiguration(RPAuthProvider.AUTH_PROVIDER);
if (smReverseProxyProviderConfiguration == null) {
smReverseProxyProviderConfiguration = new SMAuthProviderCustomConfiguration(RPAuthProvider.AUTH_PROVIDER);
smReverseProxyProviderConfiguration.setProvider(RPAuthProvider.AUTH_PROVIDER);
smReverseProxyProviderConfiguration.setDisplayName("Reverse Proxy");
smReverseProxyProviderConfiguration.setDescription(
"Automatically created provider after changing Reverse Proxy configuration way in 23.3.4 version"
);
smReverseProxyProviderConfiguration .setIconURL("");

Check warning on line 74 in server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/ReverseProxyConfigurator.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/ReverseProxyConfigurator.java#L74

. is preceded with whitespace.
Map<String, Object> parameters = new HashMap<>();
parameters.put(RPConstants.PARAM_USER, RPAuthProvider.X_USER);
parameters.put(RPConstants.PARAM_TEAM, RPAuthProvider.X_TEAM);
parameters.put(RPConstants.PARAM_FIRST_NAME, RPAuthProvider.X_FIRST_NAME);
parameters.put(RPConstants.PARAM_LAST_NAME, RPAuthProvider.X_LAST_NAME);
smReverseProxyProviderConfiguration.setParameters(parameters);
authApplication.getAuthConfiguration().addAuthProviderConfiguration(smReverseProxyProviderConfiguration );

Check warning on line 81 in server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/ReverseProxyConfigurator.java

View check run for this annotation

Jenkins-CI-integration / CheckStyle Java Report

server/bundles/io.cloudbeaver.service.auth/src/io/cloudbeaver/service/auth/ReverseProxyConfigurator.java#L81

) is preceded with whitespace.
try {
authApplication.flushConfiguration();
} catch (Exception e) {
log.error("Failed to save server configuration", e);
}
}
}

private boolean migrationNotNeeded(@NotNull WebApplication application) {
if (!(application instanceof WebAuthApplication authApplication)) {
return true;
}

if (!authApplication.getAuthConfiguration().isAuthProviderEnabled(RPAuthProvider.AUTH_PROVIDER)) {
log.debug("Reverse proxy provider disabled, migration not needed");
return true;
}

boolean isReverseProxyConfigured = authApplication.getAuthConfiguration()
.getAuthCustomConfigurations().stream()
.anyMatch(p -> p.getProvider().equals(RPAuthProvider.AUTH_PROVIDER));

if (isReverseProxyConfigured) {
log.debug("Reverse proxy provider already exist, migration not needed");
return true;
}
return false;
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@
import io.cloudbeaver.DBWebException;
import io.cloudbeaver.WebServiceUtils;
import io.cloudbeaver.auth.SMAuthProviderFederated;
import io.cloudbeaver.auth.SMSignOutLinkProvider;
import io.cloudbeaver.auth.provider.local.LocalAuthProvider;
import io.cloudbeaver.model.WebPropertyInfo;
import io.cloudbeaver.model.session.WebAuthInfo;
Expand Down Expand Up @@ -148,18 +149,26 @@ public WebLogoutInfo authLogout(
var cbApp = CBApplication.getInstance();
for (WebAuthInfo removedInfo : removedInfos) {
if (removedInfo.getAuthProviderDescriptor()
.getInstance() instanceof SMAuthProviderFederated federatedProvider
&& removedInfo.getAuthSession() instanceof SMSessionExternal externalSession
.getInstance() instanceof SMSignOutLinkProvider provider
&& removedInfo.getAuthSession() != null
) {
var providerConfig =
cbApp.getAuthConfiguration().getAuthProviderConfiguration(removedInfo.getAuthConfiguration());
if (providerConfig == null) {
log.warn(removedInfo.getAuthConfiguration() + " provider configuration wasn't found");
continue;
}
String logoutUrl = federatedProvider.getUserSignOutLink(providerConfig,
externalSession.getAuthParameters());
logoutUrls.add(logoutUrl);
String logoutUrl;
if (removedInfo.getAuthSession() instanceof SMSessionExternal externalSession) {
logoutUrl = provider.getUserSignOutLink(providerConfig,
externalSession.getAuthParameters());
} else {
logoutUrl = provider.getUserSignOutLink(providerConfig,
Map.of());
}
if (CommonUtils.isNotEmpty(logoutUrl)) {
logoutUrls.add(logoutUrl);
}
}
}
return new WebLogoutInfo(logoutUrls);
Expand Down
11 changes: 11 additions & 0 deletions server/bundles/io.cloudbeaver.service.security/plugin.xml
Original file line number Diff line number Diff line change
Expand Up @@ -18,13 +18,24 @@
<authProvider id="reverseProxy" label="Reverse proxy"
description="Reverse proxy header based authentication"
trusted="true"
configurable="true"
class="io.cloudbeaver.auth.provider.rp.RPAuthProvider"
icon="platform:/plugin/org.jkiss.dbeaver.model/icons/tree/key.png">
<credentials>
<propertyGroup label="General">
<property id="user" label="User name" type="string" description="User name" admin="true" user="true" identifying="true"/>
</propertyGroup>
</credentials>
<configuration>
<propertyGroup label="Configuration">
<property id="logout-url" label="Logout url" type="string" description="Logout url"/>
<property id="user-header" label="User header name" type="string" description="User header name"/>
<property id="team-header" label="Team name" type="string" description="Team header name"/>
<property id="first-name-header" label="First name header" type="string" description="First name header name"/>
<property id="last-name-header" label="Last name header" type="string" description="Last name header name"/>
<property id="role-header" label="Role header" type="string" description="Role header name" features="distributed"/>
</propertyGroup>
</configuration>
</authProvider>
</extension>
</plugin>
Loading
Loading