fix(lasuite): fix OIDC config for People login

- Switch all user-facing app OAuth2 clients to client_secret_post
  (mozilla-django-oidc sends credentials in POST body by default)
- Set LOGIN_REDIRECT_URL=/ so Django redirects to frontend after login
- Add local overlay patch to disable OIDC SSL verification
  (mkcert CA not trusted inside pods; production uses real certs)
This commit is contained in:
2026-03-03 11:31:28 +00:00
parent b19e553f54
commit f13beed1c4
4 changed files with 22 additions and 7 deletions

View File

@@ -20,7 +20,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://docs.DOMAIN_SUFFIX/oidc/callback/ - https://docs.DOMAIN_SUFFIX/oidc/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-docs secretName: oidc-docs
skipConsent: true skipConsent: true
--- ---
@@ -40,7 +40,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://drive.DOMAIN_SUFFIX/oidc/callback/ - https://drive.DOMAIN_SUFFIX/oidc/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-drive secretName: oidc-drive
skipConsent: true skipConsent: true
--- ---
@@ -60,7 +60,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://meet.DOMAIN_SUFFIX/oidc/callback/ - https://meet.DOMAIN_SUFFIX/oidc/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-meet secretName: oidc-meet
skipConsent: true skipConsent: true
--- ---
@@ -80,7 +80,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://chat.DOMAIN_SUFFIX/oidc/callback/ - https://chat.DOMAIN_SUFFIX/oidc/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-conversations secretName: oidc-conversations
skipConsent: true skipConsent: true
--- ---
@@ -100,7 +100,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://mail.DOMAIN_SUFFIX/oidc/callback/ - https://mail.DOMAIN_SUFFIX/oidc/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-messages secretName: oidc-messages
skipConsent: true skipConsent: true
--- ---
@@ -120,7 +120,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://people.DOMAIN_SUFFIX/api/v1.0/callback/ - https://people.DOMAIN_SUFFIX/api/v1.0/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-people secretName: oidc-people
skipConsent: true skipConsent: true
--- ---
@@ -140,7 +140,7 @@ spec:
scope: openid email profile scope: openid email profile
redirectUris: redirectUris:
- https://find.DOMAIN_SUFFIX/oidc/callback/ - https://find.DOMAIN_SUFFIX/oidc/callback/
tokenEndpointAuthMethod: client_secret_basic tokenEndpointAuthMethod: client_secret_post
secretName: oidc-find secretName: oidc-find
skipConsent: true skipConsent: true
--- ---

View File

@@ -125,6 +125,8 @@ backend:
ALLOWED_HOSTS: people.DOMAIN_SUFFIX ALLOWED_HOSTS: people.DOMAIN_SUFFIX
DJANGO_ALLOWED_HOSTS: people.DOMAIN_SUFFIX DJANGO_ALLOWED_HOSTS: people.DOMAIN_SUFFIX
DJANGO_CSRF_TRUSTED_ORIGINS: https://people.DOMAIN_SUFFIX DJANGO_CSRF_TRUSTED_ORIGINS: https://people.DOMAIN_SUFFIX
# Redirect to frontend SPA root after successful OIDC login.
LOGIN_REDIRECT_URL: /
# celeryWorker and celeryBeat intentionally have no envVars here. # celeryWorker and celeryBeat intentionally have no envVars here.
# The desk chart template automatically injects backend.envVars into all # The desk chart template automatically injects backend.envVars into all

View File

@@ -37,6 +37,12 @@ images:
newName: src.DOMAIN_SUFFIX/studio/people-frontend newName: src.DOMAIN_SUFFIX/studio/people-frontend
patches: patches:
# Disable SSL verification for OIDC server-side calls — mkcert CA not trusted in pods
- path: patch-oidc-verify-ssl.yaml
target:
kind: ConfigMap
name: lasuite-oidc-provider
# Add hostPort for TURN relay range on Lima VM # Add hostPort for TURN relay range on Lima VM
- path: values-pingora.yaml - path: values-pingora.yaml
target: target:

View File

@@ -0,0 +1,7 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: lasuite-oidc-provider
namespace: lasuite
data:
OIDC_VERIFY_SSL: "false"