-
Notifications
You must be signed in to change notification settings - Fork 126
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support HTTPS_PROXY env variable in authn-oidc #2902
Conversation
7356c46
to
fe1b50a
Compare
eaeee77
to
834e212
Compare
834e212
to
7ec4eb6
Compare
### Fixed | ||
- OIDC authenticator supports HTTPS_PROXY environment variable | ||
[cyberark/conjur#2902](https://github.com/cyberark/conjur/pull/2902) | ||
- Support plural syntax for revoke and deny |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Trailing spaces
CHANGELOG.md
Outdated
## [1.20.0] - 2023-08-16 | ||
|
||
### Fixed | ||
- OIDC authenticator supports HTTPS_PROXY environment variable |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lists should be surrounded by blank lines
CHANGELOG.md
Outdated
## [1.20.0] - 2023-08-16 | ||
|
||
### Fixed | ||
- OIDC authenticator supports HTTPS_PROXY environment variable |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this apply to V1 and V2? Might want to specify authenticators plural or authentication general.
@@ -104,7 +104,7 @@ def discovery_information(invalidate: false) | |||
skip_nil: true | |||
) do | |||
@discovery_configuration.discover!(@authenticator.provider_uri) | |||
rescue HTTPClient::ConnectTimeoutError, Errno::ETIMEDOUT => e | |||
rescue Errno::ETIMEDOUT => e |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was trying to figure out whether we should replace these HTTPClient
errors with Faraday
ones, but I'm not sure that it's necessary. The error returned by discover!
can only be type OpenIDConnect::Discovery::DiscoveryFailed
, which is too non-specific, I think.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yep it's the same exception type for basically any network error that occurs. I suppose it would be doable to parse it out of the error message but that seemed a bit hacky and unnecessary
7ec4eb6
to
384321f
Compare
## [1.20.0] - 2023-08-16 | ||
|
||
### Fixed | ||
- OIDC authenticators support `https_proxy` and `HTTPS_PROXY` environment variables |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lists should be surrounded by blank lines
Code Climate has analyzed commit 384321f and detected 2 issues on this pull request. Here's the issue category breakdown:
The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 88.5% (0.0% change). View more on Code Climate. |
Desired Outcome
Fix support for
HTTPS_PROXY
variable when using authn-oidc. This issue was occuring due to the underlying HTTP client of the OpenIDConnect gem, and appears to be fixed in a more recent version when it switched to Faraday as its HTTP client.Implemented Changes
Updated OpenIDConnect gem to 2.x
Connected Issue/Story
CNJR-2390
Definition of Done
At least 1 todo must be completed in the sections below for the PR to be
merged.
Changelog
CHANGELOG update
Test coverage
changes, or
Documentation
README
s) were updated in this PRBehavior
Security