Skip to content
  1. Nov 22, 2017
  2. Nov 21, 2017
    • Heather Hendy's avatar
      Merge pull request #466 from clobrano/github-use-login-as-user · b0c1c851
      Heather Hendy authored
      GitHub use login as user
      b0c1c851
    • Carlo Lobrano's avatar
      Github provider: use login as user · 731fa9f8
      Carlo Lobrano authored
      - Save both user and email in session state:
          Encoding/decoding methods save both email and user
          field in session state, for use cases when User is not derived from
          email's local-parth, like for GitHub provider.
      
          For retrocompatibility, if no user is obtained by the provider,
          (e.g. User is an empty string) the encoding/decoding methods fall back
          to the previous behavior and use the email's local-part
      
          Updated also related tests and added two more tests to show behavior
          when session contains a non-empty user value.
      
      - Added first basic GitHub provider tests
      
      - Added GetUserName method to Provider interface
          The new GetUserName method is intended to return the User
          value when this is not the email's local-part.
      
          Added also the default implementation to provider_default.go
      
      - Added call to GetUserName in redeemCode
      
          the new GetUserName method is used in redeemCode
          to get SessionState User value.
      
          For backward compatibility, if GetUserName error is
          "not implemented", the error is ignored.
      
      - Added GetUserName method and tests to github provider.
      731fa9f8
    • Heather Hendy's avatar
      Merge pull request #502 from talam/update_options_parsing · 6ddbb2c5
      Heather Hendy authored
      options: update options parsing for better handling of incorrect values
      6ddbb2c5
    • Dave Nicponski's avatar
      options: update options parsing for better handling of incorrect values · e955d2be
      Dave Nicponski authored
      * don't add in failed compiled regexes for skip auth regex option
      * improve test coverage for skip auth regex option to handle partial
      success case
      * add tests for incorrect upstream options parsing errors
      e955d2be
  3. Nov 20, 2017
  4. Nov 18, 2017
  5. Nov 17, 2017
  6. Nov 07, 2017
  7. Oct 24, 2017
  8. Oct 23, 2017
  9. Oct 13, 2017
  10. Oct 09, 2017
  11. Oct 08, 2017
  12. Sep 13, 2017
  13. Sep 10, 2017
  14. Sep 09, 2017
    • Eric Chiang's avatar
      *: add an OpenID Connect provider · cb48577e
      Eric Chiang authored
      See the README for usage with Dex or any other OIDC provider.
      
      To test run a backend:
      
          python3 -m http.server
      
      Run dex and modify the example config with the proxy callback:
      
          go get github.com/coreos/dex/cmd/dex
          cd $GOPATH/src/github.com/coreos/dex
          sed -i.bak \
            's|http://127.0.0.1:5555/callback|http://127.0.0.1:5555/oauth2/callback|g' \
             examples/config-dev.yaml
          make
          ./bin/dex serve examples/config-dev.yaml
      
      Then run the oauth2_proxy
      
          oauth2_proxy \
            --oidc-issuer-url http://127.0.0.1:5556/dex \
            --upstream http://localhost:8000 \
            --client-id example-app \
            --client-secret ZXhhbXBsZS1hcHAtc2VjcmV0 \
            --cookie-secret foo \
            --email-domain '*' \
            --http-address http://127.0.0.1:5555 \
            --redirect-url http://127.0.0.1:5555/oauth2/callback \
            --cookie-secure=false
      
      Login with the username/password "admin@example.com:password"
      cb48577e
  15. Sep 06, 2017
  16. Aug 29, 2017
  17. Aug 06, 2017
  18. Jul 21, 2017
  19. Jul 20, 2017
  20. Jul 14, 2017
  21. Jun 29, 2017
  22. Jun 22, 2017