Oleksandr Redko
9891daa585
refactor: simplify tests by using slog.DiscardHandler ( #4058 )
...
Signed-off-by: Oleksandr Redko <oleksandr.red+github@gmail.com>
12 months ago
Kot C
95388bb27a
Add authproxy preferred_username header ( #3950 )
...
Signed-off-by: Kot <kot@yukata.dev>
1 year ago
Mark Sagi-Kazar
c7fd9620aa
chore: fix linter config and violations
...
Signed-off-by: Mark Sagi-Kazar <mark.sagikazar@gmail.com>
1 year ago
Melroy Dsouza
8b93966357
Support for IssuerAlias and groups as maps ( #3676 )
...
Signed-off-by: Melroy Dsouza <meldsza@gmail.com>
1 year ago
Vladimir
3e00d33449
GitLab connector: add GitLab additional group with role ( #2941 )
...
Signed-off-by: zvlb <vl.zemtsov@gmail.com>
Signed-off-by: Maksim Nabokikh <maksim.nabokikh@flant.com>
Signed-off-by: Maksim Nabokikh <max.nabokih@gmail.com>
Co-authored-by: Maksim Nabokikh <maksim.nabokikh@flant.com>
Co-authored-by: Maksim Nabokikh <max.nabokih@gmail.com>
1 year ago
siarhei-haurylau
fe08a08923
saml connector: fix nil pointer on validate saml ( #3793 )
...
Signed-off-by: Siarhei Haurylau <siarhei.haurylau@point-devel.com>
1 year ago
Maksim Nabokikh
d2928d394b
Fix scheme for DialURL ldap connection ( #3677 )
...
* Use scheme without :// suffix
* Make test ldap server listen on custom ports to avoid stepping into go-ldap defaults
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
2 years ago
Maksim Nabokikh
07a42839a3
Fix logger.Warnf error after merging 3661 ( #3668 )
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
2 years ago
Maksim Nabokikh
63f4410ac1
Update dependencies before Dex v2.41 ( #3637 )
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
2 years ago
Jack Warren
849d601e4a
Pass ctx with http.Client to verifier for OIDC connector ( #3641 )
...
Signed-off-by: Jack Warren <jack@jackwarren.info>
2 years ago
Mathew Wicks
fb20f3fa32
fix: always retrieve github emails when `preferredEmailDomain` is set ( #3584 )
...
Signed-off-by: Mathew Wicks <5735406+thesuperzapper@users.noreply.github.com>
2 years ago
Doug Goldstein
f3ef7d46df
feat: allow domain names or IDs in keystone connector ( #3506 )
...
OpenStack Keystone allows a user to authenticate against a domain. That
domain can be specified either as the domain ID or the domain name when
authenticating. The domain ID is a UUID or the special "default" domain
ID so key off of that when deciding what to submit to the keystone API.
Collapsed the code to share the domainKeystone struct by utilizing
omitempty to skip unset fields.
Signed-off-by: Doug Goldstein <cardoe@cardoe.com>
2 years ago
Sean Liao
0b6a78397e
use slog for structured logging ( #3502 )
...
Signed-off-by: Sean Liao <sean+git@liao.dev>
2 years ago
sohgaura
064a409443
OIDC connector option to override jwksURI ( #3543 )
...
Signed-off-by: sohgaura <tiwari.dk1@gmail.com>
Signed-off-by: sohgaura <31881670+sohgaura@users.noreply.github.com>
2 years ago
MichaelKo
b0575946b1
Google: Implement groups fetch by default service account from metadata (support for GKE workload identity) ( #2989 )
...
Signed-off-by: Viacheslav Sychov <viacheslav.sychov@gmail.com>
Signed-off-by: Maksim Nabokikh <maksim.nabokikh@flant.com>
Co-authored-by: Maksim Nabokikh <maksim.nabokikh@flant.com>
2 years ago
mountcount
c6fa45568b
chore: fix function names in comment ( #3464 )
...
Signed-off-by: mountcount <cuimoman@outlook.com>
2 years ago
Abhisek Datta
677ab36020
feat: Add support for configurable prompt type for Google connector ( #3475 )
...
Signed-off-by: abhisek <abhisek.datta@gmail.com>
Signed-off-by: Maksim Nabokikh <max.nabokih@gmail.com>
Co-authored-by: Maksim Nabokikh <max.nabokih@gmail.com>
2 years ago
Maksim Nabokikh
3705207f01
Do not escape password for LDAP connectors ( #3470 )
...
With the change introduced in https://github.com/dexidp/dex/pull/3372 Dex declines passwords that contain special characters. Since password is not passed to any kind of filters, it is safe to pass a password as is. No LDAP query injections are possible.
This commit is a revert of password escaping.
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
2 years ago
Maksim Nabokikh
e5dce3d3b7
OIDC connector: Allow specifying empty prompt type ( #3373 )
...
Enhanced the OIDC connector to allow specifying an empty promptType parameter. Previously, the default behavior always appended 'consent' if promptType was not specified. This adjustment was necessary due to variations in default behaviors across certain Identity Providers (IDPs).
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
Signed-off-by: Maksim Nabokikh <maksim.nabokikh@flant.com>
2 years ago
hsinhoyeh
77333d619c
fix: add sanitizer to ldap account and password ( #3372 )
...
Signed-off-by: hsinhoyeh <yhh92u@gmail.com>
2 years ago
Maksim Nabokikh
60ddd188c0
Update go-jose to v4.0.1 ( #3409 )
...
Signed-off-by: Matthias Loibl <mail@matthiasloibl.com>
Signed-off-by: Maksim Nabokikh <maksim.nabokikh@flant.com>
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
Co-authored-by: Matthias Loibl <mail@matthiasloibl.com>
2 years ago
Chris
79d5874b35
fix(tokenExchange): use correct token type for userInfo requests ( #3336 )
...
Signed-off-by: Chris H <33393789+MrDeerly@users.noreply.github.com>
2 years ago
Patrick Pacher
8e07edc188
Also set the username in authproxy connector ( #3307 )
...
Signed-off-by: Patrick Pacher <patrick.pacher@gmail.com>
2 years ago
Maksim Nabokikh
665a5b627c
Override OIDC provider discovered claims ( #3267 )
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
2 years ago
Matt Pryor
366e53c1b6
Add support for extra claims to authproxy connector ( #2851 )
...
Signed-off-by: Matt Pryor <matt@stackhpc.com>
2 years ago
Jackson Argo
5df1605773
add regex for oidc group matching
...
Signed-off-by: Jackson Argo <jackson@startree.ai>
2 years ago
Oded Ben-Ozer
a6a72453b5
fix some small formatting issue
...
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
2 years ago
Oded Ben-Ozer
115425960c
Address issues raised in review:
...
Improve naming
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
2 years ago
Oded Ben Ozer
033717a07e
Apply suggestions from code review
...
Co-authored-by: Márk Sági-Kazár <sagikazarmark@users.noreply.github.com>
Signed-off-by: Oded Ben Ozer <oded.benozer@gmail.com>
2 years ago
Márk Sági-Kazár
b772ed55ba
feat(connector/microsoft): support custom api and graph URLs ( #3084 )
...
Signed-off-by: Mark Sagi-Kazar <mark.sagikazar@gmail.com>
2 years ago
Pradeep Mudlapur
415ddaa3da
Minimalistic support for group filtering in oidc connector ( #3074 )
...
Signed-off-by: Pradeep Mudlapur <pradeep@juliacomputing.com>
Co-authored-by: Maksim Nabokikh <max.nabokih@gmail.com>
Co-authored-by: Márk Sági-Kazár <sagikazarmark@users.noreply.github.com>
2 years ago
Oded Ben-Ozer
6875b64caf
Address issues raised in review:
...
- Rename some vars
- Cleanup some comments
- Tiny refactor to improve readability
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
2 years ago
Oded Ben-Ozer
7f0056cf13
Fix lint issue
...
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
3 years ago
Oded Ben-Ozer
b1f4bd0195
Address issues raised in review:
...
- Add missing json tag.
- Control delimiter cleaning with a configuration key.
- Use better variable names
- concatenate string using slice and join
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
3 years ago
Oded Ben-Ozer
a52848418a
Rename configuration option to include a reference to groups
...
and structure for future claim modification additions
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
3 years ago
Oded Ben-Ozer
316296b0d3
Document each test case
...
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
3 years ago
Oded Ben Ozer
6d143f16c1
Composite claims in OIDC connector ( #3 )
...
* Add the ability to composite new claims in the OIDC connector, based on upstream claims
Signed-off-by: Oded Ben-Ozer <obenozer@wayfair.com>
3 years ago
Sean Liao
affd4d4e49
verify access tokens by checking getuserinfo during a token exchange ( #3031 )
...
The provider.Verifier.Verify endpoint we were using only works with ID
tokens. This isn't an issue with systems which use ID tokens as access
tokens (e.g. dex), but for systems with opaque access tokens (e.g.
Google / GCP), those access tokens could not be verified.
Instead, check the access token against the getUserInfo endpoint.
Signed-off-by: Sean Liao <sean+git@liao.dev>
Co-authored-by: Maksim Nabokikh <max.nabokih@gmail.com>
3 years ago
Sean Liao
dcf7b18510
OAuth 2.0 Token Exchange ( #2806 )
...
Signed-off-by: Sean Liao <sean+git@liao.dev>
Co-authored-by: Maksim Nabokikh <max.nabokih@gmail.com>
3 years ago
MichaelKo
6cd5c8b867
#2895 : Add Support for Multiple Admin Emails to Retrieve Group Lists ( #2911 )
...
Signed-off-by: Viacheslav Sychov <viacheslav.sychov@gmail.com>
3 years ago
Maksim Nabokikh
bc8c2276e3
Fail if OIDC config contains hosted domains ( #2937 )
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
3 years ago
Josh Soref
d8a9756df7
spelling: verified
...
Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
3 years ago
Josh Soref
ad1fc3b7c1
spelling: upon
...
Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
3 years ago
Josh Soref
acc568be4b
spelling: running
...
Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
3 years ago
Josh Soref
8fdc29da34
spelling: missing
...
Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
3 years ago
Josh Soref
b0803fbc77
spelling: gitlab
...
Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
3 years ago
m.nabokikh
7208e28192
Fix openshift context and add a comment
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
3 years ago
m.nabokikh
96637cf0f7
feat: Bump dependencies and Makefile refactoring
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
3 years ago
m.nabokikh
777e162c0c
feat: LDAP case-insensitive DN attribute
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
3 years ago
Maksim Nabokikh
2ea1a80c86
fix: propagate http client to userInfo requests for OIDC connector ( #2781 )
...
Signed-off-by: m.nabokikh <maksim.nabokikh@flant.com>
3 years ago