- Oct 30, 2019
-
-
Joel Speed authored
-
Joel Speed authored
-
Dan Bond authored
* Rewrite dist scripts * add changelog entry * remove multiple loops in dist * styling
-
- Oct 29, 2019
-
-
Dan Bond authored
* fix broken changelog link * Update CHANGELOG.md
-
Johannes-Maria Frank authored
* Added version check for bash version gteq 4 * Added entry to CHANGELOG for bash 4.0 configure script dependency * Corrected changelog entry to right format * Fixed link in changelog entry * Remove uneeded new line.
-
- Oct 26, 2019
-
-
Joel Speed authored
fix bad grammar in upstreams configuration docs
-
Dan Bond authored
-
- Oct 24, 2019
-
-
Tom Deadman authored
* worked on wrapping errors in requests.go, added defer statements * removed .idea (generated by goland) * added another require.NoError * Update pkg/requests/requests.go Co-Authored-By: Dan Bond <pm@danbond.io> * fixed out-of-order imports * changelog entry added * swapped error definitions to use fmt.Errorf rather than Wrap() * formatting changes, added new defers to requests_test.go * suppot for go1.12 pipeline removed from travis pipeline, .idea/ added to gitignore * Reorder changelog entry
-
- Oct 22, 2019
-
-
Joel Speed authored
Redirect to HTTPS
-
Josh Michielsen authored
Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk>
-
Josh Michielsen authored
Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk>
-
Josh Michielsen authored
-
Josh Michielsen authored
Signed-off-by: Josh Michielsen <github@mickey.dev>
-
- Oct 18, 2019
-
-
Dan Bond authored
* remove unnecessary validator tests * fix WriteString error
-
Josh Michielsen authored
Merge branch 'Issue#259-RedirectToHTTPS' of github.com:jmickey/oauth2_proxy into Issue#259-RedirectToHTTPS
-
Josh Michielsen authored
Signed-off-by: Josh Michielsen <github@mickey.dev>
-
Josh Michielsen authored
-
Josh Michielsen authored
Signed-off-by: Josh Michielsen <github@mickey.dev>
-
Joel Speed authored
Add IDToken for Azure provider
-
- Oct 17, 2019
-
-
Josh Michielsen authored
Signed-off-by: Josh Michielsen <github@mickey.dev>
-
Josh Michielsen authored
Signed-off-by: Josh Michielsen <github@mickey.dev>
-
Josh Michielsen authored
Signed-off-by: Josh Michielsen <github@mickey.dev>
-
- Oct 14, 2019
- Oct 10, 2019
-
-
Christian Franke authored
Commit e245ef48 switched dependency management from dep to go module. This should be reflected in `CONTRIBUTING.md`.
-
Joel Speed authored
Some code improvements
-
- Oct 09, 2019
-
-
Kirill Motkov authored
* Remove shadowing of predeclared identifier: new. * strings.ReplaceAll instead of strings.Replace with -1. * Change strings.ToLower comparison to strings.EqualFold. * Rewrite if-else-if-else chain as a switch.
-
- Oct 08, 2019
-
-
Joel Speed authored
docker: build from debian buster
-
Dan Bond authored
-
Dan Bond authored
-
Dan Bond authored
-
Dhi Aurrahman authored
Signed-off-by: Dhi Aurrahman <dio@tetrate.io>
-
- Oct 04, 2019
-
-
leyshon authored
-
Joel Speed authored
Fix permalinks for configuration and sessions
-
- Oct 03, 2019
-
-
leyshon authored
Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk>
-
Joel Speed authored
-
- Oct 02, 2019
-
-
leyshon authored
-
Joel Speed authored
Escape original request URI in sample kubernetes ingress configuration
-
T S authored
The current sample configuration for kubernetes ingress demonstrates using the `auth-signin` annotation to redirect a user to oauth2_proxy's signin page. It constructs the link to do so by directly concatenating `$request_uri` as the `rd` parameter, so the sign-in page knows where to send the user after signin is complete. However, this does not work correctly if the original request URI contains multiple query parameters separated by an ampersand, as that ampersand is interpereted as separating query parameters of the `/oauth2/start` URI. For example: If the user requests a URL: https://example.com/foo?q1=v1&q2=v2 they may be redirected to the signin url https://example.com/oauth2/start?rd=https://example.com/foo?q1=v1&q2=v2 and after completing signin, oauth2_proxy will redirect them to https://example.com/foo?q1=v1 nginx-ingress added an $escaped_request_uri variable about a year ago, to help resolve this kind of issue (https://github.com/kubernetes/ingress-nginx/pull/2811)
-
- Oct 01, 2019
-
-
Joel Speed authored
More fully support X-Auth-Request-Redirect header
-