DEV Community

Cover image for Auth0 deployment with GitHub Actions
Stefan Alfbo
Stefan Alfbo

Posted on

Auth0 deployment with GitHub Actions

Auth0 is a flexible, drop-in solution to add authentication and authorization services to your applications. They have a free plan if you want to sign up and test it.

I will describe one possible way to setup the deployment pipeline for an Auth0 implementation so the configuration is defined as code. The main components that will be in use are:

Begin with setting up the project.



mkdir auth0-deployment-example && $_

npm install auth0-deploy-cli --save-dev

echo "node_modules/" > .gitignore
git init
git add .
git commit -m"Create an Auth0 deployment example project

This project will use:
* Deploy CLI Tool
* GitHub Actions
* npm"

code .


Enter fullscreen mode Exit fullscreen mode

The deploy cli tool will communicate with a management API that is provided by Auth0, therefore we first need to create an application on our tenant.

Create a new application (machine to machine) in the Auth0 dashboard. I will name it to Deploy CLI to catch the intention of the application.

Create application

In the next step select the Auth0 Management API in the drop down list. The permission list is harder, we want to follow the principle of least privilege, but it's still difficult to know which ones to select. The deploy cli tool will return good error/warning messages if you are missing any permissions, so one approach is to the use trial and error approach. This is how it's documented by Auth0.

The principle of least privilege is abided, so it will operate within the set of permissions granted. , you'll need to select read:clients, but it’s recommended to select read:, create:, and update:* permissions for all resource types within management purview. To enable deletions, you delete:* scopes.

I will start out with read:clients only.

Permissions

The view below displays the credentials that we need for talking with the management API.

Credentials

Add a new row in the .gitignore file that ignores .env files so that we can handle our credentials in a secure way in our project (remember to commit the changes to git).



node_modules/
.env


Enter fullscreen mode Exit fullscreen mode

Create a .env file with the following keys, and add the required values for each key depending on your environment.



AUTH0_DOMAIN=<from the Deploy CLI application>
AUTH0_CLIENT_ID=<from the Deploy CLI application>
AUTH0_CLIENT_SECRET=<from the Deploy CLI application>


Enter fullscreen mode Exit fullscreen mode

With that file on place you can run following command so that your current shell also has them.



set -o allexport && source .env && set +o allexport


Enter fullscreen mode Exit fullscreen mode

So lets test that we can communicate with our tenant via the management API.



npx a0deploy export --format=directory --output_folder=src/auth0


Enter fullscreen mode Exit fullscreen mode

This gave me a lot of warnings.

cli export

That is because I only allowed read:clients in the permission list. This how you can see what permissions you really need to give your application.

Personally I like to have read on most things since then it is easier to see if something has been manually changed in the Auth0 dashboard and not by the code. That is also a "debug" way to see what configuration files needs to be changed for a specific feature in Auth0.

When the export is successful you should have a bunch of json configuration files in the src/auth0/ directory. All these files should be committed to your git repository.

Usually there is more than one tenant in use because you might have a production, test and maybe more environments. To handle this you can have specific config files for each environment.



mkdir src/auth0/config
touch src/auth0/config/test.json
touch src/auth0/config/prod.json


Enter fullscreen mode Exit fullscreen mode

The config files has some specific configuration properties that is described here, it's worth reading.

For example you might allow logout URLs for your Auth0 application and they are different for each environment. Here is how test.json could look like.



{
"AUTH0_KEYWORD_REPLACE_MAPPINGS": {
    "ENVIRONMENT": "dev",
    "ALLOWED_LOGOUTS": ["https://dev-test-site.com/logout", "localhost:3000/logout"],
    "ALLOWED_ORIGINS": ["https://dev-test-site.com", "localhost:3000"]
  }
}


Enter fullscreen mode Exit fullscreen mode

To use this variable in your configuration file for a client you will need to change it like this (located in the clients directory)



{
  ...
  "allowed_logout_urls": @@ALLOWED_LOGOUTS@@,
  "is_first_party": true,
  "oidc_conformant": true,
  "sso_disabled": false,
  "cross_origin_auth": false,
  ...
}


Enter fullscreen mode Exit fullscreen mode

The cli tool will then replace the placeholder with correct values when the code is deployed to Auth0. The command for deploying your changes to Auth0 can look like this, depending on your needs.



npx a0deploy import -c ./src/auth0/config/test.json -i ./src/auth0


Enter fullscreen mode Exit fullscreen mode

-c is the config file to use.
-i the folder where all configuration files are located

Last thing we need to do is to add some scripts to the package.json file so the export and import commands are available for every developer.



{
  "scripts": {
    "deploy:prod": "a0deploy deploy -c ./src/auth0/config/prod.json -i ./src/auth0",
    "deploy:test": "a0deploy deploy -c ./src/auth0/config/test.json -i ./src/auth0",
    "dump": "a0deploy dump --format=directory --output_folder=src/auth0"
  },
  "devDependencies": {
    "auth0-deploy-cli": "^7.18.0"
  }
}


Enter fullscreen mode Exit fullscreen mode

Note: I'm using the alias for import and export that is provided by a0deploy. These names are much better and has clearer intention. Just found out that they existed now when reading the documentation. So now I need to update my real projects.

Last step is to create a workflow file for GitHub Actions.



mkdir -p .github/workflows
touch .github/workflows/deploy-to-auth0-test.yml


Enter fullscreen mode Exit fullscreen mode

The content of the workflow could look like this.



name: Deploy to Auth0 test

on:
  workflow_dispatch: # Enable manual deploy from GitHub UI
  # Deploy on each push to main that concerns the Auth0 code configuration
  push:
    branches:
      - main
    path:
      # Auth0 configuration files
      - "src/auth0/**"
      # This workflow file
      - ".github/workflows/deploy-to-auth0-test.yml"

jobs:
  deploy:
    runs-on: ubuntu-latest
    defaults:
      run:
        working-directory: ./src/auth0/
    steps:
      - name: Checkout
        uses: actions/checkout@v3
      - name: Install Node.js
        uses: actions/setup-node@v3 
        with:
          node-version: 18
      - name: Install Auth0 dependencies
        run: npm ci
      - name: Deploy to the tenant
        env:
          AUTH0_DOMAIN: the-domain.eu.auth0.com
          AUTH0_CLIENT_ID: ${{ secrets.TEST_AUTH0_CLIENT_ID }}
          AUTH0_CLIENT_SECRET: ${{ secrets.TEST_AUTH0_CLIENT_SECRET }}
        run: npm run deploy:test


Enter fullscreen mode Exit fullscreen mode

Make sure that you use GitHubs encrypted secrets for your Auth0 secrets. I like to prefix my secrets with the environment to group them toghether in the UI.

That's about it. Now there is an automatic pipeline for deploying changes of the Auth0 configuration of a tenant.

This action will deploy all changes to Auth0 when someone makes a commit to main that concerns the code for Auth0. It is also a possible to run the deployment manually. That can be handy to do a "rollback" in Auth0 if someone has made some test changes in the dashboard, a way to get back to a known state.

My experience is that it's good to make a dump time to time from Auth0 to see if the configuration files are drifting or not. That could be because of someone has made a change in the Auth0 dashboard, but the changes hasn't been commited to the repository as code. Another reason is that Auth0 has added/changed a feature which might give the dump new default values for that feature or configuration possibilities.

This solution has worked smooth over the time I have been using it. Before starting to use the Deploy CLI Tool, I used Terraform instead, it worked great too. However I think you should already be invested in Terraform if you want to use it with Auth0 also.

Top comments (0)