Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Override OIDC provider discovered claims #3267

Merged
merged 3 commits into from
Jan 10, 2024

Conversation

nabokihms
Copy link
Member

Overview

The feature allows to override specific endpoints discovered by the go-oidc library.

The exemplary case is when you want to request the token internally in Kubernetes by using the service discovery DNS-based name without accessing the public address of an IdP.

What this PR does / why we need it

Closes #2147

Special notes for your reviewer

All the provider options could be added to be able to be overridden in the future.

@nabokihms nabokihms force-pushed the oidc-provider-override-discovery branch from 4ffe616 to 054261f Compare January 10, 2024 14:47
Copy link
Member

@sagikazarmark sagikazarmark left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Maybe suggest extreme care when using this option (maybe even log it) as it can be a vulnerability when not properly configured.

Signed-off-by: m.nabokikh <[email protected]>
@nabokihms
Copy link
Member Author

Adding a warning does make sense to me. Added.

@nabokihms nabokihms merged commit 665a5b6 into dexidp:master Jan 10, 2024
9 checks passed
@nabokihms nabokihms deleted the oidc-provider-override-discovery branch January 10, 2024 19:03
nabokihms added a commit to dexidp/website that referenced this pull request Jan 10, 2024
Update the doc after merging dexidp/dex#3267

Signed-off-by: Maksim Nabokikh <[email protected]>
kerberos727 added a commit to kerberos727/dex-project that referenced this pull request Aug 23, 2024
Update the doc after merging dexidp/dex#3267

Signed-off-by: Maksim Nabokikh <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants