mirror of
https://github.com/oauth2-proxy/oauth2-proxy.git
synced 2025-04-25 12:24:41 +02:00
bugfix: move oidc scope logic to oidc provider
This commit is contained in:
parent
01386bf303
commit
6f6039c82b
@ -7,6 +7,7 @@
|
||||
## Breaking Changes
|
||||
|
||||
## Changes since v7.5.0
|
||||
- [#1989](https://github.com/oauth2-proxy/oauth2-proxy/pull/1989) Fix default scope for keycloak-oidc provider
|
||||
|
||||
# V7.5.0
|
||||
|
||||
|
@ -20,16 +20,24 @@ type OIDCProvider struct {
|
||||
SkipNonce bool
|
||||
}
|
||||
|
||||
const oidcDefaultScope = "openid email profile"
|
||||
|
||||
// NewOIDCProvider initiates a new OIDCProvider
|
||||
func NewOIDCProvider(p *ProviderData, opts options.OIDCOptions) *OIDCProvider {
|
||||
p.setProviderDefaults(providerDefaults{
|
||||
oidcProviderDefaults := providerDefaults{
|
||||
name: "OpenID Connect",
|
||||
loginURL: nil,
|
||||
redeemURL: nil,
|
||||
profileURL: nil,
|
||||
validateURL: nil,
|
||||
scope: "",
|
||||
})
|
||||
scope: oidcDefaultScope,
|
||||
}
|
||||
|
||||
if len(p.AllowedGroups) > 0 {
|
||||
oidcProviderDefaults.scope += " groups"
|
||||
}
|
||||
|
||||
p.setProviderDefaults(oidcProviderDefaults)
|
||||
p.getAuthorizationHeaderFunc = makeOIDCHeader
|
||||
|
||||
return &OIDCProvider{
|
||||
|
@ -156,14 +156,6 @@ func newProviderDataFromConfig(providerConfig options.Provider) (*ProviderData,
|
||||
p.EmailClaim = providerConfig.OIDCConfig.UserIDClaim
|
||||
}
|
||||
|
||||
if providerConfig.Type == "oidc" && p.Scope == "" {
|
||||
p.Scope = "openid email profile"
|
||||
|
||||
if len(providerConfig.AllowedGroups) > 0 {
|
||||
p.Scope += " groups"
|
||||
}
|
||||
}
|
||||
|
||||
p.setAllowedGroups(providerConfig.AllowedGroups)
|
||||
|
||||
return p, nil
|
||||
|
Loading…
x
Reference in New Issue
Block a user