-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixes #30535 - Set HTTP headers for proxy requests #872
Conversation
33856dd
to
cc2d829
Compare
bf32057
to
8bda021
Compare
1781019
to
6c91300
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From a quick glance this looks correct. I'll be out until the next week, but I'll try to give it a spin then. It looks like this is backwards compatible which always makes me happy.
I'm having some problems making this work, using The ugly workaround is to edit |
templates/auth_kerb.conf.erb
Outdated
@@ -8,6 +8,14 @@ | |||
KrbAuthRealms <%= @facts['foreman_ipa']['default_realm'] %> | |||
Krb5KeyTab <%= scope.lookupvar('::foreman::http_keytab') %> | |||
KrbLocalUserMapping On | |||
|
|||
# Set headers for proxy requests |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Setting these here won't apply to the intercept for form login. I put them in lookup_identity which covers ^/users/(ext)?login$
and it fixes both form intercept and ticket authentication
@hsahmed could you update according to the latest comments please? |
I have moved the headers to lookup_identity, however I have not been able to test it yet. I will test and amend the commit later today. |
I have moved the headers to lookup_identity and they're now working for both SSO and intercept login. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ekohl final thoughts before merging?
Upon reapplying this patch to after an upgrade, I noticed an inconsistency. The |
No description provided.