1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2025-06-25 00:47:17 +02:00
Commit Graph

813 Commits

Author SHA1 Message Date
4de49983fb Rework GitLab provider (#231)
* Initial version of OIDC based GitLab provider

* Add support for email domain check to GitLab provider

* Add gitlab.com as default issuer for GitLab provider

* Update documentation for GitLab provider

* Update unit tests for new GitLab provider implementation

* Update CHANGELOG for GitLab provider

* Rename GitLab test access token as response to linter
2019-08-06 12:20:54 +01:00
5f9a65f6b1 Adds reference to slack channel in readme 2019-08-06 12:16:03 +01:00
7d910c0ae8 Check Google group membership with hasMember and get. (#224)
* Check Google group membership with hasMember and get.

This PR is an enhancement built on
https://github.com/pusher/oauth2_proxy/pull/160. That PR reduces the
number of calls to the Google Admin API and simplifies the code by
using the hasMember method. It also supports checking membership in
nested groups.

However, the above message doesn't handle members who are not a part
of the domain. The hasMember API returns a 400 for that case. As a
fallback, when the API returns a 400, this change will try using the
`get` API which works as expected for members who aren't a part of the
domain. Supporting members who belong to the Google group but aren't
part of the domain is a requested feature from
https://github.com/pusher/oauth2_proxy/issues/95.

https://developers.google.com/admin-sdk/directory/v1/reference/members/get

Note that nested members who are not a part of the domain will not be
correctly detected with this change.

* Update CHANGELOG.

* Fix incorrect JSON and stop escaping strings.

* Add comments for each scenario.
2019-08-06 10:38:24 +01:00
69c723af81 Merge pull request #232 from ReillyBrogan/fix-changelog-typos
[DOCS] Fix a bunch of places where the repo link was incorrect
2019-08-05 11:28:21 +01:00
a882788efb Merge branch 'master' into fix-changelog-typos 2019-08-05 11:17:28 +01:00
88a7f9f483 Merge pull request #233 from steakunderscore/remove-dep
Remove dep from Travis CI & pre-install modules
2019-08-05 09:44:16 +01:00
8a24dd797f Download modules in travis install step 2019-08-05 09:26:42 +01:00
d346219293 Remove dep from Travis CI
Was missed from previous switch to go modules
2019-08-04 21:24:21 +01:00
1ab63304a1 Fix a bunch of places where the repo link was incorrect 2019-08-03 13:22:42 -05:00
436936836d Fix typo in env tag 2019-07-31 14:39:34 +02:00
a025228a6d Set env tag appropriately 2019-07-31 14:36:13 +02:00
4eab98e65b Fix travis analysis 2019-07-28 16:58:11 +02:00
53524875d1 Get rid of dependencies on bitly/oauth2_proxy/api 2019-07-28 16:46:16 +02:00
800a3694c2 Add docs and record in CHANGELOG 2019-07-28 16:26:09 +02:00
583ec18fa2 Add keycloak provider 2019-07-28 15:54:39 +02:00
3f219bd85c Merge pull request #225 from pusher/fix-codeowners
Fix CODEOWNERS file
2019-07-24 09:37:15 +01:00
23309adc7c Fix CODEOWNERS file 2019-07-24 09:21:08 +01:00
6c4aca957e Merge pull request #223 from pusher/maintainers
Add MAINTAINERS and update CODEOWNERS
2019-07-23 16:45:32 +01:00
e48d28d1b9 Add MAINTAINERS and update CODEOWNERS 2019-07-23 16:20:45 +01:00
4a6b703c54 Update CHANGELOG 2019-07-19 09:03:01 -05:00
93cb575d7c Fix error message for clarity 2019-07-19 08:59:29 -05:00
f537720b52 fix lint errors 2019-07-19 08:57:05 -05:00
122ec45dd8 Requested changes 2019-07-19 08:55:14 -05:00
0d94f5e515 fix lint error 2019-07-19 08:53:20 -05:00
2eecf756e4 Add OIDC support for UserInfo Endpoint Email Verification
* Current OIDC implementation asserts that user email check must come
from JWT token claims. OIDC specification also allows for source
of user email to be fetched from userinfo profile endpoint.
http://openid.net/specs/openid-connect-core-1_0.html#UserInfo

* First, attempt to retrieve email from JWT token claims.  Then fall back to
requesting email from userinfo endpoint.

* Don't fallback to subject for email

https://github.com/bitly/oauth2_proxy/pull/481
2019-07-19 08:53:20 -05:00
8635391543 Merge pull request #178 from kskewes/pinglog
Add silence-ping-logging flag
2019-07-19 11:30:31 +01:00
f29e353586 Update options.go
Co-Authored-By: Joel Speed <Joel.speed@hotmail.co.uk>
2019-07-19 22:11:53 +12:00
2c104c4e7d Merge pull request #211 from steakunderscore/go-mod
Switch from dep to go modules
2019-07-17 10:21:09 +01:00
7bf00b7f4a Merge pull request #213 from pusher/fix-tls-flags
Correct TLS Flags broken in #186
2019-07-17 10:10:18 +01:00
7b1132df13 Fix tls-*-file docs 2019-07-17 09:58:11 +01:00
6bf3f2a51b Correct tls cert flag name per 186 2019-07-16 13:32:57 +01:00
f00a474d91 Correct tls cert flag name per 186 2019-07-16 11:39:06 +12:00
b57d7f77e1 Use ok naming convention for map presence check 2019-07-16 10:06:29 +12:00
84da3c3d8c update changelog with both flags 2019-07-16 10:06:29 +12:00
9ed5623f2a Change env vars to suit incoming PR186 2019-07-16 10:05:10 +12:00
7236039b9d remove remnant from rebase 2019-07-16 10:04:09 +12:00
289dfce28a logger.go ExcludedPaths changed to slice of paths.
- `logger.go` convert slice of paths to map for quicker lookup
- `options.go` combines csv paths and pingpath into slice
2019-07-16 10:04:09 +12:00
4e10cc76e0 Add silence ping logging flag using ExcludePath
- Add `ping-path` option to enable switching on and passing to `logger.go`
  Default remains unchanged at: `"/ping"`
- Add note in configuration.md about silence flag taking precedence

Potential tests:
- `options.go` sets `logger.SetExcludePath` based on silence flag?
- Changing `PingPath` reflected in router?
2019-07-16 09:46:53 +12:00
08021429ea formatting and extra test
Can probably slim down the `ExcludePath` tests.
2019-07-16 09:43:48 +12:00
c4f20fff3d Add exclude logging path option
Useful for excluding /ping endpoint to reduce log volume.
This is somewhat more verbose than a simple bool to disable logging of
the `/ping` endpoint.

Perhaps better to add `-silence-ping-logging` bool flag to `options.go` and
pass in the `/ping` endpoint as part of `logger` declaration in `options.go`.

Could be extended into a slice of paths similar to go-gin's `SkipPaths`:
https://github.com/gin-gonic/gin/blob/master/logger.go#L46
2019-07-16 09:43:47 +12:00
ec97000169 Add silence ping logging flag
Add ability to silence logging of requests to /ping endpoint, reducing
log clutter

Pros:
- Don't have to change all handlers to set/not set silent ping logging
- Don't have to duplicate `loggingHandler` (this could be preferable yet)

Cons:
- Leaking oauth2proxy logic into `package logger`
- Defining default pingPath in two locations

Alternative:
- Add generic exclude path to `logger.go` and pass in `/ping`.
2019-07-16 09:42:24 +12:00
03f218a63c Ensure gomodules are used when downloading 2019-07-15 21:49:38 +01:00
bc81a0f6e4 Merge branch 'master' into go-mod
* master:
  Move docker dep commands to earlier in the build
2019-07-15 21:38:55 +01:00
e952ab4bdf Merge pull request #209 from dekimsey/improve-docker-rebuild-caching
Move docker dep commands to earlier in the build
2019-07-15 16:09:22 +01:00
56f51417ae Merge branch 'master' into go-mod 2019-07-15 16:08:21 +01:00
816c2a6da9 Move docker dep commands to earlier in the build
This will let Docker cache the results of the vendor dependencies.
Making re-builds during testing faster.

Also clean-up spurious test & rm in ./configure
2019-07-15 10:00:34 -05:00
d7e88a4718 Merge pull request #186 from pusher/consistent-config
Make configuration consistent
2019-07-15 15:35:11 +01:00
874c147e04 Fix tls-key-file and tls-cert-file consistency 2019-07-15 12:01:44 +01:00
bdcdfb74f9 Update docs and changelog 2019-07-15 12:01:43 +01:00
f0d006259e Ensure all options use a consistent format for flag vs cfg vs env 2019-07-15 11:59:46 +01:00