Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat/OIDC loopback redirect dynamic #13871

Conversation

paladin-devops
Copy link
Contributor

Addresses #13523.

Adds check to OIDC provider to allow for redirect URI to have a dynamic port # in the URI if the loopback address is included in the OIDC client, and if the OIDC client's redirect URI is the loopback address.

@vercel vercel bot temporarily deployed to Preview – vault-storybook February 2, 2022 04:54 Inactive
@vercel vercel bot temporarily deployed to Preview – vault-storybook February 2, 2022 04:57 Inactive
…IDC client if it is the IPv4 or IPv6 loopback address.
@paladin-devops paladin-devops force-pushed the feat/oidc-loopback-redirect-dynamic branch from 63e4fdc to 4a66798 Compare February 2, 2022 04:59
@vercel vercel bot temporarily deployed to Preview – vault-storybook February 2, 2022 04:59 Inactive
@austingebauer
Copy link
Contributor

Thanks, @paladin-devops! I had just started working on this issue too :) I'll be giving this a review.

@austingebauer austingebauer self-requested a review February 2, 2022 05:24
@hghaf099 hghaf099 added bug Used to indicate a potential bug ecosystem identity/oidc labels Feb 2, 2022
Copy link
Contributor

@austingebauer austingebauer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks again for this contribution, @paladin-devops! I have a few suggestions. I also wrote some tests and am happy to contribute those after this gets merged.

vault/identity_store_oidc_provider.go Outdated Show resolved Hide resolved
changelog/13871.txt Outdated Show resolved Hide resolved
vault/identity_store_oidc_provider_util.go Outdated Show resolved Hide resolved
Co-authored-by: Austin Gebauer <[email protected]>
@vercel vercel bot temporarily deployed to Preview – vault-storybook February 6, 2022 06:24 Inactive
@vercel vercel bot temporarily deployed to Preview – vault-storybook February 6, 2022 06:34 Inactive
@paladin-devops
Copy link
Contributor Author

@austingebauer thanks for the feedback & review! My next contribution will include tests up front. :) Looking forward to integrating this w/Waypoint!

Copy link
Contributor

@austingebauer austingebauer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! Thanks again, @paladin-devops. I'll be backporting this into the Vault 1.9.x branch as well.

@austingebauer austingebauer merged commit 8b09873 into hashicorp:main Feb 7, 2022
fairclothjm pushed a commit that referenced this pull request Feb 12, 2022
* Add check for OIDC provider to permit a non-exact redirect URI from OIDC client if it is the IPv4 or IPv6 loopback address.

* Update changelog/13871.txt

Co-authored-by: Austin Gebauer <[email protected]>

* Update redirectURI check to match that for the OIDC auth method.

Co-authored-by: Austin Gebauer <[email protected]>
@paladin-devops paladin-devops deleted the feat/oidc-loopback-redirect-dynamic branch February 16, 2022 21:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Used to indicate a potential bug ecosystem identity/oidc
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants