1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2025-04-25 12:24:41 +02:00

bugfix: move oidc scope logic to oidc provider

This commit is contained in:
Jan Larwig 2023-08-27 12:26:33 +02:00 committed by tuunit
parent 01386bf303
commit 6f6039c82b
3 changed files with 12 additions and 11 deletions

View File

@ -7,6 +7,7 @@
## Breaking Changes
## Changes since v7.5.0
- [#1989](https://github.com/oauth2-proxy/oauth2-proxy/pull/1989) Fix default scope for keycloak-oidc provider
# V7.5.0

View File

@ -20,16 +20,24 @@ type OIDCProvider struct {
SkipNonce bool
}
const oidcDefaultScope = "openid email profile"
// NewOIDCProvider initiates a new OIDCProvider
func NewOIDCProvider(p *ProviderData, opts options.OIDCOptions) *OIDCProvider {
p.setProviderDefaults(providerDefaults{
oidcProviderDefaults := providerDefaults{
name: "OpenID Connect",
loginURL: nil,
redeemURL: nil,
profileURL: nil,
validateURL: nil,
scope: "",
})
scope: oidcDefaultScope,
}
if len(p.AllowedGroups) > 0 {
oidcProviderDefaults.scope += " groups"
}
p.setProviderDefaults(oidcProviderDefaults)
p.getAuthorizationHeaderFunc = makeOIDCHeader
return &OIDCProvider{

View File

@ -156,14 +156,6 @@ func newProviderDataFromConfig(providerConfig options.Provider) (*ProviderData,
p.EmailClaim = providerConfig.OIDCConfig.UserIDClaim
}
if providerConfig.Type == "oidc" && p.Scope == "" {
p.Scope = "openid email profile"
if len(providerConfig.AllowedGroups) > 0 {
p.Scope += " groups"
}
}
p.setAllowedGroups(providerConfig.AllowedGroups)
return p, nil