Skip to content
  1. Apr 12, 2019
  2. Feb 19, 2019
  3. Feb 07, 2019
  4. Feb 02, 2019
  5. Jan 31, 2019
  6. Jan 22, 2019
  7. Jan 14, 2019
  8. Jan 08, 2019
  9. Dec 20, 2018
  10. Nov 27, 2018
  11. Mar 02, 2018
  12. Dec 19, 2017
  13. Dec 05, 2017
  14. Nov 22, 2017
  15. Nov 07, 2017
  16. Oct 08, 2017
  17. Sep 09, 2017
    • Eric Chiang's avatar
      *: add an OpenID Connect provider · cb48577e
      Eric Chiang authored
      See the README for usage with Dex or any other OIDC provider.
      
      To test run a backend:
      
          python3 -m http.server
      
      Run dex and modify the example config with the proxy callback:
      
          go get github.com/coreos/dex/cmd/dex
          cd $GOPATH/src/github.com/coreos/dex
          sed -i.bak \
            's|http://127.0.0.1:5555/callback|http://127.0.0.1:5555/oauth2/callback|g' \
             examples/config-dev.yaml
          make
          ./bin/dex serve examples/config-dev.yaml
      
      Then run the oauth2_proxy
      
          oauth2_proxy \
            --oidc-issuer-url http://127.0.0.1:5556/dex \
            --upstream http://localhost:8000 \
            --client-id example-app \
            --client-secret ZXhhbXBsZS1hcHAtc2VjcmV0 \
            --cookie-secret foo \
            --email-domain '*' \
            --http-address http://127.0.0.1:5555 \
            --redirect-url http://127.0.0.1:5555/oauth2/callback \
            --cookie-secure=false
      
      Login with the username/password "admin@example.com:password"
      cb48577e
  18. Sep 06, 2017
  19. Jul 20, 2017
  20. Jun 29, 2017
  21. Jun 21, 2017
  22. Jun 10, 2017
  23. Apr 25, 2017
  24. Apr 07, 2017
  25. Mar 29, 2017
  26. Jan 24, 2017
    • Omar Elazhary's avatar
      Allow to pass user headers only (issue #205) · 24f91a0b
      Omar Elazhary authored
      * This fixes https://github.com/bitly/oauth2_proxy/issues/205
      * Add new boolean option -pass-user-headers
        to control whether X-Forwarded-User and X-Forwarded-Email
        headers will be set (as opposed to HTTP BASIC auth)
      * This is required e.g. for grafana [1] where
        X-Forwarded-User is needed but HTTP BASIC auth fails
        (password is not known and must not be known in this scenario)
      * Keep behaviour of PassBasicAuth unchanged for compatibility
      
      [1] http://docs.grafana.org/installation/configuration/#authproxy
      24f91a0b