1
0
Fork 0
mirror of https://github.com/Luzifer/nginx-sso.git synced 2024-12-20 21:01:17 +00:00
Commit graph

117 commits

Author SHA1 Message Date
8738d621fe
Update dumb-init
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2020-06-30 00:41:17 +02:00
0efe62db0e
Switch Dockerfile to readonly modules and recent alpine
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2020-06-30 00:35:58 +02:00
f9118beb79
Remove vendored libraries
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2020-06-30 00:35:34 +02:00
e28a06726a
prepare release v0.25.0 2020-06-22 14:22:07 +02:00
68780426b5
[#62] Add support for multiple domain requirements (#63) 2020-06-22 14:18:36 +02:00
Paul TREHIOU
5e40728ec3
Add cookie auth key environment variable (#59) 2020-04-09 16:08:14 +02:00
827cc380d0
prepare release v0.24.1 2020-04-08 01:14:58 +02:00
4a72836925
Lint: Fix some minor linter errors
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2020-04-08 01:14:35 +02:00
Paul TREHIOU
f9d9c025dd
Fix: Config loading after CookieStore init (#58)
* fix config loading after CookieStore init

* refactor according to suggestions

* fix module init on SIGHUP
2020-04-08 01:11:48 +02:00
df6201acb8
prepare release v0.24.0 2020-01-13 22:40:43 +01:00
6d0d520ffd
[#50] Handle all 4xx errors as "user not found" (#52)
* [#50] Handle all 4xx errors as "user not found"

to ensure broad acceptance of OIDC providers

Signed-off-by: Knut Ahlers <knut@ahlers.me>

* Fix: Error is reported earlier with Go default error

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2020-01-13 21:39:55 +00:00
3e9a00944f
prepare release v0.23.0 2019-12-28 14:12:51 +01:00
c0886ce964
Allow to configure anonymous access (#48)
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-12-28 13:12:18 +00:00
21aee74144
prepare release v0.22.0 2019-11-03 18:57:57 +01:00
af97f59477
Fix: Broken HTML tag
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-11-03 18:55:32 +01:00
12a38ee1c8
Update vendoring
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-11-03 18:51:13 +01:00
3d0fb11afa
Switch to Go1.12+ vendoring
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-11-03 18:50:44 +01:00
07b98e0a57
Fix: Handle Unauthorized as no user found instead of generic error
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-11-03 18:43:22 +01:00
e83dc6a124
prepare release v0.21.5 2019-06-29 12:57:45 +02:00
09cf06c905
[#41] Set default cookie values in all providers (#45)
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-06-29 12:40:39 +02:00
b84a79ed21
prepare release v0.21.4 2019-06-15 00:18:36 +02:00
Maximilian Gaß
1e9446d2e6 Prefer simple authenticator over LDAP (#42)
Allows to have local accounts that always work, even if there are LDAP
problems
2019-06-15 00:17:16 +02:00
07f10142d1
prepare release v0.21.3 2019-05-14 00:01:02 +02:00
c511e08ab7
Fix: Even with offline access no refresh token is present
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-05-13 22:43:14 +02:00
9bd8af70e5
prepare release v0.21.2 2019-05-13 21:24:48 +02:00
93d242c404
Fix: Google not returning refresh tokens
which then causes logins with duration of more than 60m to time out and
not be able to refresh as of the missing refresh token. The "offline"
access type should ensure the token always contains a refresh token and
the user can be active for longer than 60m.

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-05-13 21:23:14 +02:00
bc006367fe
prepare release v0.21.1 2019-04-26 19:44:58 +02:00
8af1eeaa4c
Fix: Use cookie for redirects after oAuth flow
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-26 19:44:22 +02:00
72187c5f64
prepare release v0.21.0 2019-04-23 00:51:59 +02:00
b8c89a5e0f
Vendor new dependencies for OIDC
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-23 00:50:32 +02:00
2b15b34bb4
Fix: Only overwrite default if config is non-empty
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-23 00:50:32 +02:00
6575bc553d
[#35] Implement OpenID Connect auth provider
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-23 00:50:32 +02:00
abc203a990
prepare release v0.20.1 2019-04-22 20:07:39 +02:00
521042ea15
Fix: Do not list login methods without label
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 20:07:22 +02:00
8bf323fdbd
prepare release v0.20.0 2019-04-22 19:55:05 +02:00
5e46619865
Add special group for all authenticated users
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 19:54:27 +02:00
930a23f461
Modernize login dialog
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 19:43:56 +02:00
1d3f88ff47
prepare release v0.19.0 2019-04-22 06:44:23 +02:00
9b3c895c04
Update dependencies
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 06:44:07 +02:00
29beaa6fa3
Move auth plugins to own modules
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 06:44:06 +02:00
282a95c2e9
Move MFA plugins to own modules
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 06:44:06 +02:00
8d968ce29d
Add default page in case neither redirect was specified
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 06:44:06 +02:00
42db8e247d
Implement oAuth2 provider: Google
fixes #15
refs #35

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-22 06:42:44 +02:00
841f6458cd
Prepare moving auth plugins to own modules
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-21 16:58:06 +02:00
9b4ea27827
prepare release v0.18.0 2019-04-21 03:45:16 +02:00
e67316431b
Add redirect on root URL to login page
fixes #34
closes #37

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-21 03:43:36 +02:00
1cb9199bd9
Add default redirect URL for missing go-parameter
This adds a configuration option to set a default redirect URL for when
no `go` parameter was passed. This allows for users to have bookmarked
the login page and be redirected to the right location instead of seeing
a 404 page.

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-21 03:43:36 +02:00
a3390d6c75
prepare release v0.17.0 2019-04-21 00:20:42 +02:00
45f15de654
Work around missing URL parameters
when passing the URL with parameters in the `go=` parameter inside
nginx. This is caused by nginx not being able to escape ampersands which
then are parsed as parameters to the login handler instead of parameters
of the redirect URL.

There is a quite old ticket in nginx to implement proper escaping of URL
elements which would be a way better solution but until someone decides
to take care of that this should at least improve the situation.

refs #39

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-04-21 00:15:36 +02:00
ccee36a78e
prepare release v0.16.2 2019-04-16 01:38:48 +02:00