- Nov 07, 2017
-
-
Tanvir Alam authored
-
- Oct 24, 2017
-
-
Jehiah Czebotar authored
Don't set the cookie domain to the host by default, as it breaks Cookie Prefixes
-
Jehiah Czebotar authored
Swap out bmizerany/assert package in favor of stretchr/testify/assert
-
Tanvir Alam authored
-
- Oct 23, 2017
-
-
Jehiah Czebotar authored
Clarify that GitHub team option in README
-
- Oct 13, 2017
-
-
Jehiah Czebotar authored
Add OpenID Connect provider name.
-
- Oct 09, 2017
-
-
Jehiah Czebotar authored
Drop deprecated MyUSA provider.
-
- Oct 08, 2017
-
-
Joshua Carp authored
[Resolves #390]
-
Joshua Carp authored
-
- Sep 13, 2017
-
-
Jehiah Czebotar authored
Use read_user as default scope for GitLab
-
Miouge1 authored
-
Miouge1 authored
-
- Sep 10, 2017
-
-
Jehiah Czebotar authored
*: add an OpenID Connect provider
-
- Sep 09, 2017
-
-
Eric Chiang authored
See the README for usage with Dex or any other OIDC provider. To test run a backend: python3 -m http.server Run dex and modify the example config with the proxy callback: go get github.com/coreos/dex/cmd/dex cd $GOPATH/src/github.com/coreos/dex sed -i.bak \ 's|http://127.0.0.1:5555/callback|http://127.0.0.1:5555/oauth2/callback|g' \ examples/config-dev.yaml make ./bin/dex serve examples/config-dev.yaml Then run the oauth2_proxy oauth2_proxy \ --oidc-issuer-url http://127.0.0.1:5556/dex \ --upstream http://localhost:8000 \ --client-id example-app \ --client-secret ZXhhbXBsZS1hcHAtc2VjcmV0 \ --cookie-secret foo \ --email-domain '*' \ --http-address http://127.0.0.1:5555 \ --redirect-url http://127.0.0.1:5555/oauth2/callback \ --cookie-secure=false Login with the username/password "admin@example.com:password"
-
- Sep 06, 2017
-
-
Hans Kristian Flaatten authored
-
- Aug 29, 2017
-
-
Jehiah Czebotar authored
nginx auth_request: fix -skip-provider-button
-
Jehiah Czebotar authored
Updates README.md with svg badge
-
Jehiah Czebotar authored
strip all tokens
-
Jehiah Czebotar authored
gracefully report un-parsed upstream URL
-
Jehiah Czebotar authored
Remove check for >0 upstreams
-
Jehiah Czebotar authored
Update cookie generation to match base64 encoding
-
- Aug 06, 2017
-
-
Pierce Lopez authored
-
Pierce Lopez authored
upstreamURL is a nil pointer if there is an error parsing --upstream
-
- Jul 21, 2017
-
-
Christian Svensson authored
When used solely for auth_request there is no upstream. Instead of forcing users to set a dummy upstream, remove the check.
-
- Jul 20, 2017
-
-
Christian Svensson authored
Current code is using URLEncoding but example was using the standard RFC 4648 encoding. Switch to using the URL encoding in the example as well.
-
- Jul 14, 2017
-
-
Colin Arnott authored
-
- Jun 29, 2017
-
-
Nikita Sobolev authored
-
- Jun 22, 2017
-
-
Alan Braithwaite authored
-
- Jun 21, 2017
-
-
Jehiah Czebotar authored
Update Google Auth Provider instructions
-
Bart Spaans authored
-
- Jun 10, 2017
-
-
Jehiah Czebotar authored
Fix spelling mistake in docs
-
Shivansh Dhar authored
-
- May 26, 2017
-
-
Jehiah Czebotar authored
[github provider] use Authorization header, not access_token query parameter
-
- May 18, 2017
-
-
Colin Arnott authored
-
- May 16, 2017
-
-
Jehiah Czebotar authored
README: nginx auth_request example updates
-
- Apr 25, 2017
-
-
Pierce Lopez authored
how to pass back the refreshed oauth2_proxy cookie from an nginx auth_request
-
Pierce Lopez authored
/oauth2/auth is not more sensitive than other /oauth2/ paths, does not need "internal" protection "spdy" protocol is obsolete, http2 is the thing to enable now. But it's orthogonal anyway. No need for two separate content/upstream location blocks in this example, reduce to just one, with a comment that it could be serving files instead of proxying.
-
Jehiah Czebotar authored
dist.sh: use go build option to strip binaries
-
Pierce Lopez authored
30% release binary size reduction
-
Pierce Lopez authored
-