|
| 1 | +#!/usr/bin/env bash |
| 2 | +# Start local Supabase with SAML enabled via MockSAML. |
| 3 | +# |
| 4 | +# `supabase stop && supabase start` recreates the auth container from scratch, |
| 5 | +# stripping any env vars injected by setup-mocksaml. This script runs that |
| 6 | +# cycle and then re-injects the SAML env vars and ensures the MockSAML provider |
| 7 | +# is registered — no need to rerun the full skill. |
| 8 | +# |
| 9 | +# Usage: ./supabase/start-with-saml.sh [--reset] |
| 10 | +# --reset Run `supabase db reset` instead of stop/start (wipes DB data) |
| 11 | + |
| 12 | +set -euo pipefail |
| 13 | + |
| 14 | +# Fixed dev-only RSA private key (PKCS#1, base64). Safe to commit — not used in production. |
| 15 | +SAML_KEY="MIIEpAIBAAKCAQEA1ZjTGI7UUCESupdcHDl+50qvPG0vwxPEOJaTJyuuD+8stL4yJ4+OQqNDKKF/0D3b+750MiSPIR3a9EjLeb9gwhuRqOZb0CrSN8Ra72wbzq4WxzhhsMIQoVDjuxSLebOnvT6O8/UJLVEh0cXGnuFAsHL9LJxG1MDsR+tQMp9kUvP4o2x2AqDA9/9faiM5d8WRjhSTldywqI9xMre2o3VKgJnt8zdJcWMG6oVvjVI+DZihCKKx4NUkIiASQuNUIAPdaNbOJt0xIDUtncDRTvtgLH0mw/YFtN+JiI49wTTi8aVlsJzdG4MlqCoeQuHtMwy7NvkGOuCJWNul3LVNrJ9OBQIDAQABAoIBAQCqMceifcx2vKOrwgdHBhk0OrI+t9Gi4xEq9e/y+j8Lu0woCJT2KND2EBjnOygYyfGLOkpj2fWiMaPRml9ndzKl+EmsB0GJMVWn0fGTbNULbnP/8dEFgty1bTrISqqIIrq5dCt7//d8AHWuLKUC3AErl7Rb43oc9ExRUhLpA1BxNzgq2l7rHKGgw6Da30qFqLimBBbZ4ZWdQDkiFlS4QbxasCR5aDwwR18Lbig2pwBY5IACjLlmgtEAFIKDGaulCrBhqe6FJKZaWXJGmIy74PX+G90lfhfAc6IEJuiQ9lblzKqrlEYHR9tBPfVn7er2+4gFT8XKOF8UKwKEtx71ic4BAoGBAPMtSl0J4fi0uqjuZwT63G84JxrY8ynUUPBauHayIRh5fUCxHAX/CjTIXINPSZkANzBWSUdb2azxzEoEzjGcT5Nv2UuA6Ho5Gbmk+ilIS2f16kSz1G5nohjh9sTJ6+Pqv5NT/RAGGw8Vl7Xphrr3Ep5L7kgH6HRrRPpoAvzC9ighAoGBAODcOgMjohIQxKfmvh6ygbkFIi1joPR4e6c1OPdHAnrz7oA6QmBUJpXDG4MDvTFglDRS/EWeUQYHVhpeTMDJrbZ9L2VHKxz+cX7p4O+oLn/gDFjUhcThh2T28j2b7jmogCAXkLaxIoB1JuVthJjTcmvSbulykjl1KEaMKTCDzlllAoGBAKzgktBH2VUVLuov6h85NIMA+ZP1jhE7tnrZE/CWPD8JB4l5H8IHiTrzAgn70QerhpCflyLa4oo3sBMjDW9pf40CZAlwUFWryGUZKxs0IR98TRqgebIvjKaB5gwKvN9gIOfdOrgsjwoPQLZ7mWPLiHnu4yxkKtaw9+3JCe6lr5fhAoGAY5YFd1hzse6NOhM+RlgmjavRXCrQoRUvJnmy1gkz9wJLsaybsw/x2sgDSj4Ar3qniJjsM2UPW00qfBkhgwyPC9Bbik4/sOKbn2qzfVCN74Jp1XmiGPUNQtD/rft+QTj4Lb5iEBdZQW0hIeEkJY8YENqs1mUwj5Psl3oB0APAAuUCgYBIAUouSaUSZ+XqKGWIrEUYwxwrhfCjv5ID+X7Q9AbZUUbSyO9z6+ARcZFCOxgkVcBOC33c8wxHI52IZ1mKxQwmEjhQXwt1VwNZtzaQYEb2RaVsVKEUTSrR56vCTYYwLBCJoL3AZBu2pKdXEws1yCw1AC6LY5V6HZVQkuq0Y8nkdA==" |
| 16 | + |
| 17 | +RESET=${1:-} |
| 18 | +PSQL="psql postgresql://postgres:postgres@localhost:5432/postgres" |
| 19 | + |
| 20 | +# Detect docker prefix (direct or via Lima VM) |
| 21 | +if docker ps &>/dev/null; then |
| 22 | + DOCKER="docker" |
| 23 | +elif limactl shell tiger docker ps &>/dev/null 2>&1; then |
| 24 | + DOCKER="limactl shell tiger docker" |
| 25 | +else |
| 26 | + echo "Error: cannot reach Docker daemon. Start Docker or your Lima VM first." >&2 |
| 27 | + exit 1 |
| 28 | +fi |
| 29 | + |
| 30 | +# ── Step 1: Start Supabase ──────────────────────────────────────────────────── |
| 31 | + |
| 32 | +if [[ "$RESET" == "--reset" ]]; then |
| 33 | + echo "--- Running supabase db reset ---" |
| 34 | + supabase db reset |
| 35 | +else |
| 36 | + echo "--- Running supabase stop/start ---" |
| 37 | + supabase stop |
| 38 | + # Remove the auth container if it still exists — supabase stop doesn't remove |
| 39 | + # containers that were manually recreated by this script (not tracked by |
| 40 | + # docker-compose), which causes a name conflict on the next start. |
| 41 | + $DOCKER rm -f supabase_auth_flow &>/dev/null || true |
| 42 | + supabase start |
| 43 | +fi |
| 44 | + |
| 45 | +# ── Step 2: Inject SAML env vars (skipped if already present) ──────────────── |
| 46 | + |
| 47 | +if $DOCKER exec supabase_auth_flow env 2>/dev/null | grep -q "GOTRUE_SAML_ENABLED=true"; then |
| 48 | + echo "SAML env vars already present — skipping container recreation." |
| 49 | +else |
| 50 | + echo "--- Injecting SAML env vars into auth container ---" |
| 51 | + |
| 52 | + IMAGE=$($DOCKER inspect supabase_auth_flow --format '{{.Config.Image}}') |
| 53 | + NETWORK=$($DOCKER inspect supabase_auth_flow --format '{{range $k,$v := .NetworkSettings.Networks}}{{$k}}{{end}}') |
| 54 | + |
| 55 | + $DOCKER inspect supabase_auth_flow --format '{{range .Config.Env}}{{println .}}{{end}}' \ |
| 56 | + | grep -v -E '^(PATH=|API_EXTERNAL_URL=)' \ |
| 57 | + > /tmp/auth_env.txt |
| 58 | + echo "GOTRUE_SAML_ENABLED=true" >> /tmp/auth_env.txt |
| 59 | + echo "GOTRUE_SAML_PRIVATE_KEY=$SAML_KEY" >> /tmp/auth_env.txt |
| 60 | + echo "API_EXTERNAL_URL=http://127.0.0.1:5431/auth/v1" >> /tmp/auth_env.txt |
| 61 | + |
| 62 | + if [[ "$DOCKER" == limactl* ]]; then |
| 63 | + limactl copy /tmp/auth_env.txt tiger:/tmp/auth_env.txt |
| 64 | + fi |
| 65 | + |
| 66 | + $DOCKER stop supabase_auth_flow && $DOCKER rm supabase_auth_flow |
| 67 | + $DOCKER run -d \ |
| 68 | + --name supabase_auth_flow \ |
| 69 | + --network "$NETWORK" \ |
| 70 | + --restart always \ |
| 71 | + --env-file /tmp/auth_env.txt \ |
| 72 | + "$IMAGE" auth |
| 73 | + |
| 74 | + sleep 3 |
| 75 | + if $DOCKER logs supabase_auth_flow --tail 5 2>&1 | grep -q "GoTrue API started"; then |
| 76 | + echo "GoTrue is running with SAML enabled." |
| 77 | + else |
| 78 | + echo "Warning: GoTrue may not have started cleanly. Check logs:" |
| 79 | + $DOCKER logs supabase_auth_flow --tail 20 |
| 80 | + exit 1 |
| 81 | + fi |
| 82 | +fi |
| 83 | + |
| 84 | +# ── Step 3: Ensure MockSAML provider is registered ─────────────────────────── |
| 85 | + |
| 86 | +PROVIDER_ID=$($PSQL -t -c "SELECT id FROM auth.sso_providers LIMIT 1;" 2>/dev/null | tr -d ' \n') |
| 87 | + |
| 88 | +if [[ -n "$PROVIDER_ID" ]]; then |
| 89 | + echo "MockSAML provider already registered (id: $PROVIDER_ID)." |
| 90 | +else |
| 91 | + echo "--- Registering MockSAML provider ---" |
| 92 | + |
| 93 | + # Extract the sb_secret_... key from Kong config — Kong translates it to |
| 94 | + # the service_role JWT when used as an apikey header. |
| 95 | + SERVICE_ROLE_KEY=$($DOCKER exec supabase_kong_flow cat /home/kong/kong.yml \ |
| 96 | + | grep -o "sb_secret_[A-Za-z0-9_-]*" | head -1 || true) |
| 97 | + |
| 98 | + if [[ -z "$SERVICE_ROLE_KEY" ]]; then |
| 99 | + echo "Error: could not determine service role key from Kong config." >&2 |
| 100 | + exit 1 |
| 101 | + fi |
| 102 | + |
| 103 | + read -r -p "Email domain to associate with MockSAML [example.com]: " DOMAIN |
| 104 | + DOMAIN="${DOMAIN:-example.com}" |
| 105 | + |
| 106 | + RESPONSE=$(curl -s -X POST 'http://127.0.0.1:5431/auth/v1/admin/sso/providers' \ |
| 107 | + -H "apikey: $SERVICE_ROLE_KEY" \ |
| 108 | + -H 'Content-Type: application/json' \ |
| 109 | + -d "{\"type\":\"saml\",\"metadata_url\":\"https://mocksaml.com/api/saml/metadata\",\"domains\":[\"$DOMAIN\"]}") |
| 110 | + |
| 111 | + PROVIDER_ID=$(echo "$RESPONSE" | python3 -c "import json,sys; print(json.load(sys.stdin)['id'])" 2>/dev/null || true) |
| 112 | + |
| 113 | + if [[ -z "$PROVIDER_ID" ]]; then |
| 114 | + echo "Error: failed to register provider. Response: $RESPONSE" >&2 |
| 115 | + exit 1 |
| 116 | + fi |
| 117 | + |
| 118 | + echo "MockSAML provider registered (id: $PROVIDER_ID, domain: $DOMAIN)." |
| 119 | +fi |
| 120 | + |
| 121 | +# ── Step 4: Link provider to a tenant ──────────────────────────────────────── |
| 122 | + |
| 123 | +LINKED_TENANT=$($PSQL -t -c "SELECT tenant FROM public.tenants WHERE sso_provider_id = '$PROVIDER_ID' LIMIT 1;" 2>/dev/null | tr -d ' \n') |
| 124 | + |
| 125 | +if [[ -n "$LINKED_TENANT" ]]; then |
| 126 | + echo "Provider already linked to tenant: $LINKED_TENANT" |
| 127 | +else |
| 128 | + DEFAULT_TENANT=$($PSQL -t -c "SELECT tenant FROM public.tenants WHERE tenant NOT LIKE 'ops.%' ORDER BY tenant LIMIT 1;" 2>/dev/null | tr -d ' \n') |
| 129 | + |
| 130 | + echo "" |
| 131 | + echo "Available tenants:" |
| 132 | + $PSQL -t -c "SELECT tenant FROM public.tenants WHERE tenant NOT LIKE 'ops.%' ORDER BY tenant;" 2>/dev/null | tr -d ' ' | grep -v '^$' |
| 133 | + echo "" |
| 134 | + read -r -p "Tenant to link to MockSAML provider [$DEFAULT_TENANT]: " TENANT |
| 135 | + TENANT="${TENANT:-$DEFAULT_TENANT}" |
| 136 | + |
| 137 | + # Normalise: ensure trailing slash |
| 138 | + TENANT="${TENANT%/}/" |
| 139 | + |
| 140 | + $PSQL -c "UPDATE public.tenants SET sso_provider_id = '$PROVIDER_ID' WHERE tenant = '$TENANT';" |
| 141 | + echo "Linked provider to tenant: $TENANT" |
| 142 | +fi |
| 143 | + |
| 144 | +echo "" |
| 145 | +echo "--- Setup complete ---" |
| 146 | +echo " Provider ID : $PROVIDER_ID" |
| 147 | +echo " SSO login : curl -s -X POST 'http://127.0.0.1:5431/auth/v1/sso' -H 'Content-Type: application/json' -d '{\"provider_id\":\"$PROVIDER_ID\"}'" |
0 commit comments