Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Respect ExternalUrl for OAuth #21

Merged

Conversation

josefandersson
Copy link
Contributor

@josefandersson josefandersson commented Apr 30, 2023

I may be missing something, but is there a reason not to enforce the configured ExternalUrl for OAuth?

I had issues with the Host being 127:0:0:1:<service-port> behind nginx reverse proxy unless I overwrite the Host header (as mentioned in the README) but that feels less safe.

(This is untested.)

@josefandersson
Copy link
Contributor Author

I guess another option is to have a "trust proxy" bool option which then trusts X-Forwarded-Host if set.

@thomiceli
Copy link
Owner

Thanks, i simply missed it..

@thomiceli thomiceli merged commit 713b5d6 into thomiceli:master May 1, 2023
4 checks passed
@josefandersson
Copy link
Contributor Author

Ah ok, np 😄 Thanks for creating the project!

@josefandersson josefandersson deleted the oath-respect-external-url-config branch May 3, 2023 20:30
jiriks74 pushed a commit to jiriks74/opengist that referenced this pull request Apr 28, 2024
…rnal-url-config

Respect ExternalUrl for OAuth
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants