Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

adds support for auth proxy header #1859

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

eyJhb
Copy link
Contributor

@eyJhb eyJhb commented Jan 2, 2025

Useful if you have authentication in front of wger, and want to use that instead of wgers authentication/signup methods.

Proposed Changes

Added a new setting, which can be used to setup proxy auth header, e.g. using Authelia to authenticate + create users on the instance.

Fixes #1847 , and potential VERY SIMPLE solution for #1805 ( #1797 )

Please check that the PR fulfills these requirements

  • Tests for the changes have been added (for bug fixes / features)
  • Added yourself to AUTHORS.rst

Other questions

  • Do users need to run some commmands in their local instances due to this PR
    (e.g. database migration)? No

Remaining work

  • Add to documentation.
  • Flutter needs to support setting API key, instead of username/password.

@eyJhb eyJhb force-pushed the proxyauthheader branch 4 times, most recently from 714efe6 to 2a306f4 Compare January 2, 2025 11:43
@eyJhb eyJhb changed the title adds support for proxy auth header adds support for auth proxy header Jan 2, 2025
@eyJhb eyJhb force-pushed the proxyauthheader branch 2 times, most recently from d46d469 to 7a7a494 Compare January 2, 2025 12:10
Useful if you have authentication in front of wger, and want to use
that instead of wgers authentication/signup methods.
@eyJhb
Copy link
Contributor Author

eyJhb commented Jan 2, 2025

Maybe this should only be checked for / like in Miniflux here 1pav/miniflux@5a40096 , but I'm unsure what would be best tbh.

@rolandgeider
Copy link
Member

BTW I haven't forgotte about this PR, but since it would add a new auth method I'd like to make sure we do it right. I've added this to the 2.4 backlog (so after the flexible routines get merged)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: No status
Development

Successfully merging this pull request may close these issues.

Support for Proxy Auth via. HTTP header
2 participants