-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(sso): add support for identityProviderId in SAML flow #9411
Conversation
Updated SAML callback URLs and relevant logic to include identityProviderId, ensuring better handling of multiple identity providers. Refactored client and server-side code to streamline form interactions and validation within the SSO module.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PR Summary
This PR enhances SSO identity provider handling, particularly focusing on SAML flow improvements and direct provider access support.
- Added identityProviderId to SAML callback URLs and metadata generation in
sso-auth.controller.ts
to support direct SSO access from providers - Fixed form validation in
SettingsSSOSAMLForm.tsx
by triggering validation after file upload to resolve greyed-out Save button - Optimized form state management in
SettingsSSOIdentitiesProvidersForm.tsx
usinguseMemo
andwatch
instead ofgetValues
- Updated URL path construction in
sso.service.ts
to include provider ID for consistent multi-provider support - Streamlined form submission in
SettingsSecuritySSOIdentifyProvider.tsx
usinglodash.pick
for targeted field selection
6 file(s) reviewed, 1 comment(s)
Edit PR Review Bot Settings | Greptile
await createSSOIdentityProvider( | ||
SSOIdentitiesProvidersParamsSchema.parse( | ||
pick( | ||
formConfig.getValues(), | ||
Object.keys(sSOIdentityProviderDefaultValues[type]()), | ||
), | ||
), | ||
); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
logic: This validation approach could allow invalid fields to be submitted if they were populated before switching SSO types. Consider clearing irrelevant fields when type changes.
Log
|
Updated SAML callback URLs and relevant logic to include identityProviderId, ensuring better handling of multiple identity providers. Refactored client and server-side code to streamline form interactions and validation within the SSO module.
Fix #9323 #9325