Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Github allowed organizations authentication #10111

Closed
adiletmaratov opened this issue Dec 7, 2017 · 1 comment
Closed

Github allowed organizations authentication #10111

adiletmaratov opened this issue Dec 7, 2017 · 1 comment

Comments

@adiletmaratov
Copy link
Contributor

adiletmaratov commented Dec 7, 2017

Third-party application access policy of Github is "Access restricted" by default for a couple of years now.
I took config from defaults.ini config file and tried to setup grafana to allow authenticate users from specific organizations only. "Access restricted" policy does not allow third party applications to view organization specific information when authenticating. Instead, there is a different endpoint to get user's organizations membership: "https://api.github.com/users//orgs", but grafana's [auth.github] api_url is set to "https://api.github.com/user" and grafana tries to get a list of organizations by just appending "/orgs" to the end of api_url, which shows only organizations with "Access allowed" application access policy.

What was the expected result?
I expect grafana to take organizations_url field from user data response from github and make another request to get organizations that the user is member of.

What happened instead?
Grafana just concatenates "/orgs" to the api_url config and makes a request, which is useless in this case.

@bergquist
Copy link
Contributor

Closed by #10112

bergquist added a commit that referenced this issue Dec 11, 2017
* master:
  changelog: adds note about closing #10131
  Explicitly specify default region in CloudWatch datasource (#9440)
  wait for all sub routines to finish
  changelog: adds ntoe about closing #10111
  postgres: change $__timeGroup macro to include "AS time" column alias (#10119)
  fixes broken test
  Solves problem with Github authentication restriction by organization membership when the organization's access policy is set to "Access restricted". "Access restricted" policy should not stop user to authenticate.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants