hero_collab: Slack feature parity — auth integration with hero_proxy #34
Labels
No labels
prio_critical
prio_low
type_bug
type_contact
type_issue
type_lead
type_question
type_story
type_task
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
lhumina_code/hero_os#34
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
hero_collab is being developed as a Slack alternative for the Hero OS ecosystem. A comprehensive implementation plan has been created and Phase 0 (bug fixes) is complete. Phase 1 (authentication) requires integration with hero_proxy.
Full plan and progress: lhumina_code/hero_collab#9
Auth Integration with hero_proxy
hero_collab needs to read the identity headers that hero_proxy injects after authentication:
X-Hero-User— the authenticated username/email (injected by hero_proxy after OAuth, signature, or IP-match auth)X-Hero-Context— the user's context ID (fromusers.contextcolumn in hero_proxy DB)X-Hero-Claims— comma-separated permissions resolved via hero_proxy's group→role→claims BFSHow it works
hero_proxy strips spoofed
X-Hero-*headers, authenticates the user, then injects trusted headers. hero_collab reads and trusts these headers, mapsX-Hero-Userto a local collab user, and injects the user ID ascaller_idfor its existing permission system.Related hero_proxy work
What hero_collab needs from the ecosystem
users.listRPC — hero_collab will call this to populate invite/member-add dropdowns with system usersCurrent status