Skip to content
  1. Mar 11, 2019
  2. Mar 05, 2019
    • Ben's avatar
      Small clarification around health checks (#84) · 66c5eb31
      Ben authored
      Type: docs
      I simply added the word health check. I was searching all over the
      package for a health check, to only realise that it had been called
      ping. I think the small addition might help others avoid my troubles.
      66c5eb31
  3. Mar 04, 2019
    • Marcel D. Juhnke's avatar
      Add -skip-oidc-discovery option (#41) · 8816a2a9
      Marcel D. Juhnke authored
      
      
      * added karrieretutor go-oidc fork for using an AAD B2C Policy
      
      * added karrieretutor go-oidc fork for using an AAD B2C Policy
      
      * added --skip-oidc-discovery option
      
      * added --skip-oidc-discovery option
      
      * add simple test for skip-oidc-discovery option
      
      * revert Dockerfile to pusher upstream
      
      * revert Dockerfile to pusher upstream
      
      * remove karrieretutor b2c option leftover
      
      * remove karrieretutor b2c option leftover
      
      * Fix typo (missing letters)
      
      Co-Authored-By: default avatarmarratj <marrat@marrat.de>
      
      * Fix typo (missing letters)
      
      Co-Authored-By: default avatarmarratj <marrat@marrat.de>
      
      * replace fake http client with NewProvider() from go-oidc
      
      * remove OIDC UserInfo URL option (not required)
      
      * add info about -skip-oidc-discovery to README
      
      * add note to changelog
      
      * Update outdated comment
      8816a2a9
  4. Feb 22, 2019
  5. Feb 13, 2019
  6. Feb 08, 2019
  7. Feb 02, 2019
  8. Jan 31, 2019
  9. Jan 22, 2019
  10. Jan 14, 2019
  11. Jan 08, 2019
  12. Dec 20, 2018
  13. Nov 27, 2018
  14. Mar 02, 2018
  15. Dec 19, 2017
  16. Dec 05, 2017
  17. Nov 22, 2017
  18. Nov 07, 2017
  19. Oct 08, 2017
  20. Sep 09, 2017
    • Eric Chiang's avatar
      *: add an OpenID Connect provider · cb48577e
      Eric Chiang authored
      See the README for usage with Dex or any other OIDC provider.
      
      To test run a backend:
      
          python3 -m http.server
      
      Run dex and modify the example config with the proxy callback:
      
          go get github.com/coreos/dex/cmd/dex
          cd $GOPATH/src/github.com/coreos/dex
          sed -i.bak \
            's|http://127.0.0.1:5555/callback|http://127.0.0.1:5555/oauth2/callback|g' \
             examples/config-dev.yaml
          make
          ./bin/dex serve examples/config-dev.yaml
      
      Then run the oauth2_proxy
      
          oauth2_proxy \
            --oidc-issuer-url http://127.0.0.1:5556/dex \
            --upstream http://localhost:8000 \
            --client-id example-app \
            --client-secret ZXhhbXBsZS1hcHAtc2VjcmV0 \
            --cookie-secret foo \
            --email-domain '*' \
            --http-address http://127.0.0.1:5555 \
            --redirect-url http://127.0.0.1:5555/oauth2/callback \
            --cookie-secure=false
      
      Login with the username/password "admin@example.com:password"
      cb48577e
  21. Sep 06, 2017
  22. Jul 20, 2017
  23. Jun 29, 2017
  24. Jun 21, 2017
  25. Jun 10, 2017
  26. Apr 25, 2017
  27. Apr 07, 2017