Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
89 commits
Select commit Hold shift + click to select a range
fbd3efe
Initial commit of RBAC split setup
matt-aitken Apr 19, 2026
e6e0c2c
Verdaccio publish
matt-aitken Apr 19, 2026
8d206ae
Every change will republish when in dev
matt-aitken Apr 19, 2026
9a8542f
RBAC/plugin updates
matt-aitken Apr 21, 2026
815b17b
Update RBAC plugin interface: authenticateBearer/Session, drop Prisma…
matt-aitken Apr 22, 2026
9e131bc
JWT/realtime token integration: publicJWT subject, jwt metadata, allo…
matt-aitken Apr 22, 2026
a1ffae6
Lazy loading of plugin
matt-aitken Apr 24, 2026
3080010
RBAC: force-fallback flag + env var + e2e fallback wiring (TRI-8715)
matt-aitken Apr 24, 2026
1d1380b
RBAC: API auth e2e coverage — action + PAT + edge cases (TRI-8716)
matt-aitken Apr 24, 2026
2927fbc
RBAC: resource-scoped JWT e2e coverage (TRI-8716 follow-up)
matt-aitken Apr 24, 2026
06a3083
RBAC: pre-migration JWT behaviour tests for TRI-8719 risks (TRI-8716)
matt-aitken Apr 24, 2026
07f3e6b
RBAC plugin: array resources + action alias wrapper (TRI-8719 Phase A)
matt-aitken Apr 24, 2026
eb30058
RBAC: migrate apiBuilder to rbac.authenticateBearer + ability.can (TR…
matt-aitken Apr 24, 2026
ba4054a
RBAC: dashboardLoader / dashboardAction + migrate admin pages (TRI-8717)
matt-aitken Apr 25, 2026
435ec74
RBAC plugin: authenticateAuthorize* accepts array resources
matt-aitken Apr 26, 2026
3e35247
RBAC tests: shared-container test harness for the comprehensive auth …
matt-aitken Apr 26, 2026
0886803
RBAC plugin: Result types on mutation methods + OSS fallback (TRI-8747)
matt-aitken Apr 26, 2026
52c8c08
RBAC: split dashboardBuilder so client-bundle imports resolve
matt-aitken Apr 27, 2026
754d7ed
Code comments/formatting
matt-aitken Apr 27, 2026
f6ddf1a
Batch added resource
matt-aitken Apr 27, 2026
3dfc8db
Batch add resource
matt-aitken Apr 27, 2026
32cf8d2
RBAC: Teams page UI — role dropdowns, plan-aware disabling, manage ga…
matt-aitken Apr 27, 2026
29ecc74
Delete API batches
matt-aitken Apr 27, 2026
7901df8
RBAC: auto-assign system roles on org create + invite accept (TRI-8854)
matt-aitken Apr 28, 2026
001578c
RBAC: PAT creation flow with role selection (TRI-8749)
matt-aitken Apr 28, 2026
bc3138a
Use defaultValue instead of lots of useState
matt-aitken Apr 28, 2026
047640e
RBAC tests: PAT auth comprehensive matrix (TRI-8741)
matt-aitken Apr 28, 2026
7da91f3
RBAC tests: dashboard session auth for admin pages (TRI-8742)
matt-aitken Apr 28, 2026
317cb2b
RBAC tests: cross-cutting auth edge cases (TRI-8743)
matt-aitken Apr 28, 2026
3d32f9e
RBAC tests: waitpoint completions + input streams (TRI-8740)
matt-aitken Apr 28, 2026
335251a
RBAC tests: trigger task routes (TRI-8733)
matt-aitken Apr 28, 2026
499a68a
RBAC tests: run lists (TRI-8736)
matt-aitken Apr 28, 2026
64244e1
RBAC tests: run mutations — cancel + idempotencyKeys.reset (TRI-8735)
matt-aitken Apr 28, 2026
5f173c1
RBAC tests: run resource routes — multi-key (TRI-8734)
matt-aitken Apr 28, 2026
02b72d4
RBAC tests: batch retrieve + realtime (TRI-8737)
matt-aitken Apr 28, 2026
07cc583
RBAC tests: prompts (TRI-8738)
matt-aitken Apr 28, 2026
eb58f36
RBAC tests: deployments + query (TRI-8739)
matt-aitken Apr 28, 2026
9aaf8f6
RBAC tests: unblock e2e.full harness; all 162 tests pass (TRI-8731)
matt-aitken Apr 28, 2026
a4c88c4
RBAC tests: parameterise RBAC_FORCE_FALLBACK in testcontainers (TRI-8…
matt-aitken Apr 28, 2026
4c1664e
RBAC tests: extract projectCreated to break platform.v3.server cycle …
matt-aitken Apr 28, 2026
54b3967
Latest lockfile… although it'll probably get conflicted again
matt-aitken Apr 28, 2026
1808aa8
RBAC: Roles page (TRI-8880)
matt-aitken Apr 28, 2026
d5282ee
RBAC: drop upfront UserRole inserts from org-creation and invite flows
matt-aitken Apr 29, 2026
a709524
RBAC: scrub "enterprise" / "OSS" / cloud-side references from comments
matt-aitken Apr 29, 2026
4cef871
RBAC: scrub enterprise reference from rbac-force-fallback server-chan…
matt-aitken Apr 29, 2026
b250f61
RBAC: drop Wildcards group from Roles page client-side mapping
matt-aitken Apr 29, 2026
074e6bb
RBAC: extend Permission + RbacResource for CASL conditional rules (TR…
matt-aitken Apr 29, 2026
4ec9372
RBAC: rework Roles page as a permission × role comparison Table (TRI-…
matt-aitken Apr 30, 2026
4c07db5
RBAC: flex Roles page header + cell content horizontally with gap-1
matt-aitken Apr 30, 2026
f8341ab
RBAC: left-align Roles page role columns (header + cells)
matt-aitken Apr 30, 2026
76fd186
RBAC: shrink-to-content sizing for non-Description columns on Roles page
matt-aitken Apr 30, 2026
4c79726
RBAC: revert column shrink-to-content sizing on Roles page
matt-aitken Apr 30, 2026
3a60604
RBAC: render conditional cells as plain dimmed text (no tick + badge)
matt-aitken Apr 30, 2026
d6bbf71
RBAC: invite flow role picker via OrgMemberInvite.rbacRoleId (TRI-8892)
matt-aitken Apr 30, 2026
3d9283a
Tightened up comments and log an error for failed role assignments
matt-aitken Apr 30, 2026
79d0c19
RBAC: rbac.systemRoleIds() instead of duplicating role-id constants
matt-aitken May 1, 2026
b0cee8c
RBAC: give upgrade-link rows a value so Ariakit handles the click
matt-aitken May 1, 2026
66a9d35
RBAC: preserve render prop in SelectItem outside Combobox context
matt-aitken May 1, 2026
75712ce
Fixed role link
matt-aitken May 1, 2026
c512124
RBAC: replace systemRoleIds() with systemRoles() catalogue
matt-aitken May 1, 2026
5ea93af
RBAC: address PR review — batch trigger AND, fallback resilience, pic…
matt-aitken May 1, 2026
e5898a5
Consolidate plugin changesets into a single patch entry
matt-aitken May 4, 2026
6d19193
Tighten plugin changeset description
matt-aitken May 4, 2026
fbd4880
Consolidate server-changes into a single entry
matt-aitken May 4, 2026
8dd61ce
Hide the Roles page for non-cloud
matt-aitken May 4, 2026
bec9c47
Hardcode legacy OrgMember.role=MEMBER on invite
matt-aitken May 4, 2026
b68c396
Invite picker: allow at-or-below the inviter's own role
matt-aitken May 4, 2026
56eb5e8
Remove unneeded comment
matt-aitken May 4, 2026
7b3fd52
Plugin: getUserRoles(userIds, orgId) batch lookup
matt-aitken May 4, 2026
8ec1780
Plugin owns permission display groups
matt-aitken May 4, 2026
7ea3640
Improved the team layout
matt-aitken May 4, 2026
d847335
Not enough permissions tooltip
matt-aitken May 4, 2026
8a74b21
dashboardLoader/Action can access the context data
matt-aitken May 4, 2026
f65a1f8
Sessions routes: post-RBAC apiBuilder shape + preserve superScopes se…
matt-aitken May 4, 2026
409a2ea
Plugin: authenticatePat for cap-and-floor PAT auth (TRI-9087)
matt-aitken May 4, 2026
927cd8b
ci: align e2e-webapp-auth-full pnpm pin with root packageManager
matt-aitken May 4, 2026
50d9b8b
test(webapp): exclude *.e2e.full.test.ts from unit-test glob
matt-aitken May 4, 2026
d0faba3
Address PR review: fallback grace window + multi-table query AND + UX
matt-aitken May 4, 2026
5726fca
test(webapp): every-table semantics for /api/v1/query
matt-aitken May 4, 2026
925593a
apiBuilder: require explicit anyResource() / everyResource() at multi…
matt-aitken May 4, 2026
0935703
Address Devin review: 4 RBAC auth path fixes
matt-aitken May 6, 2026
98c30e3
core: move sanitizeBranchName + isValidGitBranchName to @trigger.dev/…
matt-aitken May 6, 2026
109f0e2
core/plugins/auth boundary: define slim AuthenticatedEnvironment, eli…
matt-aitken May 6, 2026
748a70d
lockfile updates for @trigger.dev/core dep on plugins
matt-aitken May 6, 2026
dde3090
lockfile (cont)
matt-aitken May 6, 2026
d7055f2
e2e-webapp-auth-full.yml: SHA-pin actions, drop persisted credentials
matt-aitken May 6, 2026
8478210
Address Devin review: Decimal coercion + replica plumbing + check-exp…
matt-aitken May 7, 2026
133d468
test(webapp): stop createInMemoryTracing from registering OTel globally
matt-aitken May 7, 2026
3290f57
test(testcontainers): fix assertNonNullable — drop the require("vites…
matt-aitken May 7, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions .changeset/git-branch-utils.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"@trigger.dev/core": patch
---

Add `sanitizeBranchName` and `isValidGitBranchName` exports under `@trigger.dev/core/v3/utils/gitBranch`. These were previously webapp-internal but are now shared with the RBAC fallback's branch-aware authentication path.
5 changes: 5 additions & 0 deletions .changeset/plugin-auth-path.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"@trigger.dev/plugins": patch
---

The public interfaces for a plugin system. Initially consolidated authentication and authorization interfaces.
120 changes: 120 additions & 0 deletions .github/workflows/e2e-webapp-auth-full.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,120 @@
name: "🛡️ E2E Tests: Webapp Auth (full)"

# Comprehensive RBAC auth test suite — see TRI-8731. Runs separately from
# the smoke e2e-webapp.yml because it covers every route family with a
# pass/fail matrix and would otherwise dominate per-PR CI time.
#
# Triggered:
# - Manually via workflow_dispatch.
# - Nightly via schedule.
# - On pull requests touching auth-relevant files only (paths filter).

permissions:
contents: read

on:
workflow_dispatch:
schedule:
- cron: "0 4 * * *" # 04:00 UTC daily
pull_request:
paths:
- "apps/webapp/app/services/routeBuilders/**"
- "apps/webapp/app/services/rbac.server.ts"
- "apps/webapp/app/services/apiAuth.server.ts"
- "apps/webapp/app/services/personalAccessToken.server.ts"
- "apps/webapp/app/services/sessionStorage.server.ts"
- "apps/webapp/app/routes/api.v*.**"
- "apps/webapp/app/routes/realtime.v*.**"
- "apps/webapp/test/**/*.e2e.full.test.ts"
- "apps/webapp/test/setup/global-e2e-full-setup.ts"
- "apps/webapp/test/helpers/sharedTestServer.ts"
- "apps/webapp/test/helpers/seedTestSession.ts"
- "apps/webapp/vitest.e2e.full.config.ts"
- "internal-packages/rbac/**"
- "packages/plugins/**"
- ".github/workflows/e2e-webapp-auth-full.yml"
Comment thread
matt-aitken marked this conversation as resolved.

jobs:
e2eAuthFull:
name: "🛡️ E2E Auth Tests (full)"
runs-on: ubuntu-latest
timeout-minutes: 30
env:
DOCKERHUB_USERNAME: ${{ secrets.DOCKERHUB_USERNAME }}
steps:
- name: 🔧 Disable IPv6
run: |
sudo sysctl -w net.ipv6.conf.all.disable_ipv6=1
sudo sysctl -w net.ipv6.conf.default.disable_ipv6=1
sudo sysctl -w net.ipv6.conf.lo.disable_ipv6=1

- name: 🔧 Configure docker address pool
run: |
CONFIG='{
"default-address-pools" : [
{
"base" : "172.17.0.0/12",
"size" : 20
},
{
"base" : "192.168.0.0/16",
"size" : 24
}
]
}'
mkdir -p /etc/docker
echo "$CONFIG" | sudo tee /etc/docker/daemon.json

- name: 🔧 Restart docker daemon
run: sudo systemctl restart docker

- name: ⬇️ Checkout repo
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
with:
fetch-depth: 0
Comment thread
github-advanced-security[bot] marked this conversation as resolved.
Fixed
# Don't leave the GITHUB_TOKEN in .git/config — this job
# doesn't need to push and the persisted creds would be
# readable from any subsequent step (zizmor/artipacked).
persist-credentials: false

- name: ⎔ Setup pnpm
uses: pnpm/action-setup@fc06bc1257f339d1d5d8b3a19a8cae5388b55320 # v5.0.0
with:
version: 10.33.2

- name: ⎔ Setup node
uses: actions/setup-node@48b55a011bda9f5d6aeb4c2d9c7362e8dae4041e # v6.4.0
with:
node-version: 20.20.0
cache: "pnpm"

- name: 🐳 Login to DockerHub
if: ${{ env.DOCKERHUB_USERNAME }}
uses: docker/login-action@4907a6ddec9925e35a0a9e82d7399ccc52663121 # v4.1.0
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: 🐳 Skipping DockerHub login (no secrets available)
if: ${{ !env.DOCKERHUB_USERNAME }}
run: echo "DockerHub login skipped because secrets are not available."

- name: 🐳 Pre-pull testcontainer images
if: ${{ env.DOCKERHUB_USERNAME }}
run: |
docker pull postgres:14
docker pull redis:7.2
docker pull testcontainers/ryuk:0.11.0

- name: 📥 Download deps
run: pnpm install --frozen-lockfile

- name: 📀 Generate Prisma Client
run: pnpm run generate

- name: 🏗️ Build Webapp
run: pnpm run build --filter webapp

- name: 🛡️ Run Webapp Full Auth E2E Tests
run: cd apps/webapp && pnpm exec vitest run --config vitest.e2e.full.config.ts --reporter=default
env:
WEBAPP_TEST_VERBOSE: "1"
6 changes: 6 additions & 0 deletions .server-changes/plugin-auth-path.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
---
area: webapp
type: improvement
---

Webapp now supports a plugin system. Initially consolidates authentication and authorization paths.
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ import {
Cog8ToothIcon,
CreditCardIcon,
LockClosedIcon,
ShieldCheckIcon,
UserGroupIcon,
} from "@heroicons/react/20/solid";
import { ArrowLeftIcon } from "@heroicons/react/24/solid";
Expand All @@ -14,6 +15,7 @@ import { useFeatures } from "~/hooks/useFeatures";
import { type MatchedOrganization } from "~/hooks/useOrganizations";
import { cn } from "~/utils/cn";
import {
organizationRolesPath,
organizationSettingsPath,
organizationSlackIntegrationPath,
organizationTeamPath,
Expand Down Expand Up @@ -128,6 +130,18 @@ export function OrganizationSettingsSideMenu({
to={organizationTeamPath(organization)}
data-action="team"
/>
{isManagedCloud && (
<>
<SideMenuItem
name="Roles"
icon={ShieldCheckIcon}
activeIconColor="text-sky-500"
inactiveIconColor="text-sky-500"
to={organizationRolesPath(organization)}
data-action="roles"
/>
</>
)}
<SideMenuItem
name="Settings"
icon={Cog8ToothIcon}
Expand Down
10 changes: 9 additions & 1 deletion apps/webapp/app/components/primitives/Select.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -460,7 +460,15 @@ export function SelectItem({
...props
}: SelectItemProps) {
const combobox = Ariakit.useComboboxContext();
const render = combobox ? <Ariakit.ComboboxItem render={props.render} /> : undefined;
// In a Combobox context we wrap the caller's render in ComboboxItem
// so combobox keyboard nav still works. Outside a Combobox we pass
// the render through verbatim — without this, callers like
// SelectLinkItem (which uses render to swap in a <Link>) get their
// render prop silently dropped, which is why those rows looked
// clickable but didn't navigate.
const render = combobox
? <Ariakit.ComboboxItem render={props.render} />
: props.render;
const ref = React.useRef<HTMLDivElement>(null);
const select = Ariakit.useSelectContext();
const selectValue = select?.useState("value");
Expand Down
3 changes: 3 additions & 0 deletions apps/webapp/app/env.server.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1531,6 +1531,9 @@ const EnvironmentSchema = z
// Private connections
PRIVATE_CONNECTIONS_ENABLED: z.string().optional(),
PRIVATE_CONNECTIONS_AWS_ACCOUNT_IDS: z.string().optional(),

// Force RBAC to not use the plugin
RBAC_FORCE_FALLBACK: BoolEnv.default(false),
})
.and(GithubAppEnvSchema)
.and(S2EnvSchema)
Expand Down
40 changes: 38 additions & 2 deletions apps/webapp/app/models/member.server.ts
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
import { type Prisma, prisma } from "~/db.server";
import { createEnvironment } from "./organization.server";
import { customAlphabet } from "nanoid";
import { logger } from "~/services/logger.server";
import { rbac } from "~/services/rbac.server";

const tokenValueLength = 40;
const tokenGenerator = customAlphabet("123456789abcdefghijkmnopqrstuvwxyz", tokenValueLength);
Expand Down Expand Up @@ -86,10 +88,19 @@ export async function inviteMembers({
slug,
emails,
userId,
rbacRoleId,
}: {
slug: string;
emails: string[];
userId: string;
/**
* Optional RBAC role to attach to the invite. When set, accepted
* invites trigger `rbac.setUserRole(rbacRoleId)` after the OrgMember
* is created.
*
* `OrgMemberInvite.role` is still set if the plugin isn't installed.
*/
rbacRoleId?: string | null;
}) {
const org = await prisma.organization.findFirst({
where: { slug, members: { some: { userId } } },
Expand All @@ -107,6 +118,7 @@ export async function inviteMembers({
organizationId: org.id,
inviterId: userId,
role: "MEMBER",
rbacRoleId: rbacRoleId ?? null,
} satisfies Prisma.OrgMemberInviteCreateManyInput)
);

Expand Down Expand Up @@ -163,7 +175,7 @@ export async function acceptInvite({
user: { id: string; email: string };
inviteId: string;
}) {
return await prisma.$transaction(async (tx) => {
const result = await prisma.$transaction(async (tx) => {
// 1. Delete the invite and get the invite details
const invite = await tx.orgMemberInvite.delete({
where: {
Expand Down Expand Up @@ -207,8 +219,32 @@ export async function acceptInvite({
},
});

return { remainingInvites, organization: invite.organization };
return {
remainingInvites,
organization: invite.organization,
inviteRole: invite.role,
rbacRoleId: invite.rbacRoleId,
};
});

// If the invite carried an explicit RBAC role. Errors are logged, not fatal.
if (result.rbacRoleId) {
const roleResult = await rbac.setUserRole({
userId: user.id,
organizationId: result.organization.id,
roleId: result.rbacRoleId,
});
if (!roleResult.ok) {
logger.error("acceptInvite: skipped RBAC role assignment", {
organizationId: result.organization.id,
userId: user.id,
rbacRoleId: result.rbacRoleId,
reason: roleResult.error,
});
}
}
Comment thread
matt-aitken marked this conversation as resolved.

return { remainingInvites: result.remainingInvites, organization: result.organization };
}

export async function declineInvite({
Expand Down
2 changes: 1 addition & 1 deletion apps/webapp/app/models/project.server.ts
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import { $replica, prisma } from "~/db.server";
import type { Prisma, Project } from "@trigger.dev/database";
import { type Organization, createEnvironment } from "./organization.server";
import { env } from "~/env.server";
import { projectCreated } from "~/services/platform.v3.server";
import { projectCreated } from "~/services/projectCreated.server";
export type { Project } from "@trigger.dev/database";

const externalRefGenerator = customAlphabet("abcdefghijklmnopqrstuvwxyz", 20);
Expand Down
Loading
Loading