1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2025-06-15 00:15:00 +02:00
Commit Graph

1233 Commits

Author SHA1 Message Date
6453e78db3 Merge branch 'master' into docFormat 2019-08-13 16:22:18 +01:00
b167744b0a Merge pull request #145 from rtluckie/feature/add_oidc_userinfo_support
Add OIDC support for UserInfo Endpoint Email Verification
2019-08-13 15:35:51 +01:00
fb52bdb90c Fix some typos 2019-08-13 12:42:23 +02:00
c457eeb711 Merge branch 'master' into feature/add_oidc_userinfo_support 2019-08-12 17:32:29 -05:00
9938bb95d9 Merge branch 'master' into docFormat 2019-08-11 17:23:33 -07:00
4b985992d8 add missing header border 2019-08-11 17:21:32 -07:00
8b61559b8d Fix links in docs
- Fixed a bunch of references to the repo, which were 404ing
- Fixed a couple of things that 301/302ed
- Fixed some in page references
2019-08-11 16:07:03 +01:00
e1b70dc9f0 Merge pull request #240 from vitaliytv/patch-1
[docs] Fix link to oauth2_proxy.cfg
2019-08-11 15:20:58 +01:00
9e37de53e3 docs: fix path to oauth2_proxy.cfg 2019-08-11 14:55:19 +03:00
18156713e3 indent content in ordered list, fixes 165 2019-08-10 21:46:13 -07:00
14c25c1d8a use a table for command line options 2019-08-10 21:45:18 -07:00
a91cce7ab9 Merge pull request #238 from thought-machine/fix-typo
Fix typos in changelog
2019-08-07 19:36:03 +01:00
02dfa87f11 Fix typos in changelog 2019-08-07 18:00:37 +01:00
7134d22bcc New flag "-ssl-upstream-insecure-skip-validation" (#234)
* New flag "-ssl-upstream-insecure-skip-validation" to skip SSL validation for upstreams with self generated / invalid SSL certificates.

* Fix tests for modified NewReverseProxy method.

* Added change to the changelog.

* Remove duplicate entries from changelog.
2019-08-07 17:48:53 +01:00
d85660248c Adding docs for how to configure Okta for the OIDC provider (#235)
* Adding documentation for Okta OIDC provider.

* additional clean up.

* Clearer heading

* Forgot a word.

* updated documentation based on ReillyProcentive review.

* Per steakunderscore review: removed defaults. Removed extra hardening steps (expiration, https only etc) not directly related to setting up Okta w/ OIDC
2019-08-07 11:57:18 +01:00
64672c34eb Merge pull request #236 from thought-machine/slack
Adds reference to slack channel in readme
2019-08-06 12:47:10 +01:00
c3eac4f6d4 Merge branch 'master' into slack 2019-08-06 12:23:45 +01:00
4de49983fb Rework GitLab provider (#231)
* Initial version of OIDC based GitLab provider

* Add support for email domain check to GitLab provider

* Add gitlab.com as default issuer for GitLab provider

* Update documentation for GitLab provider

* Update unit tests for new GitLab provider implementation

* Update CHANGELOG for GitLab provider

* Rename GitLab test access token as response to linter
2019-08-06 12:20:54 +01:00
5f9a65f6b1 Adds reference to slack channel in readme 2019-08-06 12:16:03 +01:00
7d910c0ae8 Check Google group membership with hasMember and get. (#224)
* Check Google group membership with hasMember and get.

This PR is an enhancement built on
https://github.com/pusher/oauth2_proxy/pull/160. That PR reduces the
number of calls to the Google Admin API and simplifies the code by
using the hasMember method. It also supports checking membership in
nested groups.

However, the above message doesn't handle members who are not a part
of the domain. The hasMember API returns a 400 for that case. As a
fallback, when the API returns a 400, this change will try using the
`get` API which works as expected for members who aren't a part of the
domain. Supporting members who belong to the Google group but aren't
part of the domain is a requested feature from
https://github.com/pusher/oauth2_proxy/issues/95.

https://developers.google.com/admin-sdk/directory/v1/reference/members/get

Note that nested members who are not a part of the domain will not be
correctly detected with this change.

* Update CHANGELOG.

* Fix incorrect JSON and stop escaping strings.

* Add comments for each scenario.
2019-08-06 10:38:24 +01:00
69c723af81 Merge pull request #232 from ReillyBrogan/fix-changelog-typos
[DOCS] Fix a bunch of places where the repo link was incorrect
2019-08-05 11:28:21 +01:00
a882788efb Merge branch 'master' into fix-changelog-typos 2019-08-05 11:17:28 +01:00
88a7f9f483 Merge pull request #233 from steakunderscore/remove-dep
Remove dep from Travis CI & pre-install modules
2019-08-05 09:44:16 +01:00
8a24dd797f Download modules in travis install step 2019-08-05 09:26:42 +01:00
d346219293 Remove dep from Travis CI
Was missed from previous switch to go modules
2019-08-04 21:24:21 +01:00
1ab63304a1 Fix a bunch of places where the repo link was incorrect 2019-08-03 13:22:42 -05:00
436936836d Fix typo in env tag 2019-07-31 14:39:34 +02:00
a025228a6d Set env tag appropriately 2019-07-31 14:36:13 +02:00
4eab98e65b Fix travis analysis 2019-07-28 16:58:11 +02:00
53524875d1 Get rid of dependencies on bitly/oauth2_proxy/api 2019-07-28 16:46:16 +02:00
800a3694c2 Add docs and record in CHANGELOG 2019-07-28 16:26:09 +02:00
583ec18fa2 Add keycloak provider 2019-07-28 15:54:39 +02:00
3f219bd85c Merge pull request #225 from pusher/fix-codeowners
Fix CODEOWNERS file
2019-07-24 09:37:15 +01:00
23309adc7c Fix CODEOWNERS file 2019-07-24 09:21:08 +01:00
6c4aca957e Merge pull request #223 from pusher/maintainers
Add MAINTAINERS and update CODEOWNERS
2019-07-23 16:45:32 +01:00
e48d28d1b9 Add MAINTAINERS and update CODEOWNERS 2019-07-23 16:20:45 +01:00
4a6b703c54 Update CHANGELOG 2019-07-19 09:03:01 -05:00
93cb575d7c Fix error message for clarity 2019-07-19 08:59:29 -05:00
f537720b52 fix lint errors 2019-07-19 08:57:05 -05:00
122ec45dd8 Requested changes 2019-07-19 08:55:14 -05:00
0d94f5e515 fix lint error 2019-07-19 08:53:20 -05:00
2eecf756e4 Add OIDC support for UserInfo Endpoint Email Verification
* Current OIDC implementation asserts that user email check must come
from JWT token claims. OIDC specification also allows for source
of user email to be fetched from userinfo profile endpoint.
http://openid.net/specs/openid-connect-core-1_0.html#UserInfo

* First, attempt to retrieve email from JWT token claims.  Then fall back to
requesting email from userinfo endpoint.

* Don't fallback to subject for email

https://github.com/bitly/oauth2_proxy/pull/481
2019-07-19 08:53:20 -05:00
8635391543 Merge pull request #178 from kskewes/pinglog
Add silence-ping-logging flag
2019-07-19 11:30:31 +01:00
f29e353586 Update options.go
Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk>
2019-07-19 22:11:53 +12:00
2c104c4e7d Merge pull request #211 from steakunderscore/go-mod
Switch from dep to go modules
2019-07-17 10:21:09 +01:00
7bf00b7f4a Merge pull request #213 from pusher/fix-tls-flags
Correct TLS Flags broken in #186
2019-07-17 10:10:18 +01:00
7b1132df13 Fix tls-*-file docs 2019-07-17 09:58:11 +01:00
6bf3f2a51b Correct tls cert flag name per 186 2019-07-16 13:32:57 +01:00
f00a474d91 Correct tls cert flag name per 186 2019-07-16 11:39:06 +12:00
b57d7f77e1 Use ok naming convention for map presence check 2019-07-16 10:06:29 +12:00