mirror of
https://github.com/danswer-ai/danswer.git
synced 2025-03-20 23:01:51 +01:00
This allow using Danswer in typical (non-google) enterprise environments. * Access Tokens can be very large. A token without claims is already 1100 bytes for me (larger than allowed in danswer by default). With roles I got a 12kB token. For that reason I changed the field to TEXT in the database. * Danswer used to swallow most errors when OIDC would fail. Nodejs forwards a request to the backend and swallows all errors. Even within the backend we catched all ValueErrors and only returned the last exception with the request. Added full stack trace logging to allow debugging issues with userinfo and other endpoints. * Allow changing name of the login provider on the login button. * Changed variables and URLs to generic OAUTH_XX (without google in the name) but kept compatibility with the existing google integration * Tested again Keycloak with OpenID Connect Next steps: * Claim to role mappings * Auto login/SSO (Login button is just an extra click)
This is a Next.js project bootstrapped with create-next-app
.
Getting Started
Install node / npm: https://docs.npmjs.com/downloading-and-installing-node-js-and-npm
Install all dependencies: npm i
Then, run the development server:
npm run dev
# or
yarn dev
# or
pnpm dev
Open http://localhost:3000 with your browser to see the result.