3.1 KiB
3.1 KiB
Demo Auth Routing Runbook
Purpose
This runbook defines the centralized login routing contract used by demo environments.
- Browser applications are exposed by dedicated demo hosts.
- Session endpoints are routed through Thalos (
auth.dream-views.comand identity API paths). - Domain BFF APIs remain host-scoped by path.
Related runtime ownership reference:
docs/consumption/demo-runtime-source-of-truth.md
Active Public Hosts
| Host | Role |
|---|---|
auth.dream-views.com |
Central Thalos auth host |
furniture-display-demo.dream-views.com |
Furniture display web + furniture API + identity API |
furniture-admin-demo.dream-views.com |
Furniture admin web + furniture API + identity API |
kitchen-ops-demo.dream-views.com |
Kitchen web + kitchen API + identity API |
waiter-floor-demo.dream-views.com |
Waiter web + waiter API + identity API |
customer-orders-demo.dream-views.com |
Customer orders web + customer API + identity API |
pos-transactions-demo.dream-views.com |
POS web + POS API + identity API |
restaurant-admin-demo.dream-views.com |
Restaurant admin web + admin API + identity API |
Routing Contract
1. Central Auth Host
auth.dream-views.com proxies directly to Thalos BFF runtime (127.0.0.1:20080).
Use cases:
- OIDC launch endpoints (for example
/api/identity/oidc/google/start) - OIDC callback endpoints
- Session endpoints (
/api/identity/session/*)
2. Demo Host Path Routing
For each demo host:
/api/identity/session*-> Thalos session upstream- domain-specific API paths -> domain BFF upstream
- all other paths -> web SPA upstream
3. Domain Path Scopes
| Host | Domain API Path Prefix |
|---|---|
furniture-display-demo.dream-views.com |
/api/furniture* |
furniture-admin-demo.dream-views.com |
/api/furniture* |
kitchen-ops-demo.dream-views.com |
/api/kitchen/ops* |
waiter-floor-demo.dream-views.com |
/api/waiter/floor* |
customer-orders-demo.dream-views.com |
/api/customer/orders* |
pos-transactions-demo.dream-views.com |
/api/pos/transactions* |
restaurant-admin-demo.dream-views.com |
/api/restaurant/admin* |
Web Runtime Configuration Contract
All web containers must provide:
API_BASE_URL: same-origin default for domain API callsTHALOS_AUTH_BASE_URL: centralized auth base (typically same host orauth.dream-views.com)THALOS_DEFAULT_RETURN_URL: safe same-origin callback targetTHALOS_DEFAULT_TENANT_ID: tenant context default
Safety Rules
- Callback return targets must be sanitized to same-origin paths.
- Identity routes are always Thalos-owned.
- No direct DAL access from web clients.
- No cross-repo
ProjectReferenceexceptions are introduced by routing changes.
Change Workflow
- Update Caddy site entries under
/etc/caddy/sites-enabled/*.caddy. - Validate Caddy config before reload.
- Reload Caddy.
- Run demo auth-routing validation checklist (see
docs/consumption/demo-auth-routing-validation.md). - Confirm the updated route behavior still matches
docs/consumption/demo-runtime-source-of-truth.md. - Record route changes in this runbook in the same change set.