-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
providers/proxy: fix missing JWT/claims header #17759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
✅ Deploy Preview for authentik-docs canceled.
|
✅ Deploy Preview for authentik-storybook canceled.
|
✅ Deploy Preview for authentik-integrations canceled.
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #17759 +/- ##
==========================================
+ Coverage 92.68% 92.93% +0.25%
==========================================
Files 869 869
Lines 47949 47949
==========================================
+ Hits 44443 44563 +120
+ Misses 3506 3386 -120
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
| // Convert map to Claims using mapstructure marshaling (like getClaimsFromSession does) | ||
| var claims types.Claims | ||
| err = json.Unmarshal(jsonData, &claims) | ||
| err := mapstructure.Decode(claimsMap, &claims) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
more mapstructure, good catch
|
authentik PR Installation instructions Instructions for docker-composeAdd the following block to your AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-f3525a4e0a3bf5d06c0fcaf9dd5fa5b1334e16d1
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)sAfterwards, run the upgrade commands from the latest release notes. Instructions for KubernetesAdd the following block to your authentik:
outposts:
container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
image:
repository: ghcr.io/goauthentik/dev-server
tag: gh-f3525a4e0a3bf5d06c0fcaf9dd5fa5b1334e16d1Afterwards, run the upgrade commands from the latest release notes. |
* replace interface{} with any
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
* fix raw token not saved to map or json
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
* also fix proxy claims
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
* fix test
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
---------
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
|
🍒 Cherry-pick to |
* main: (28 commits) ci: use hashes for actions everywhere (#17803) website/integrations: fixed paperless-ngx yml syntax issue and added additional info (#17739) core, web: update translations (#17782) ci: rework internal repo (#17797) root: use hashes for dockerfile FROM (#17795) web: bump validator from 13.15.15 to 13.15.20 in /packages/prettier-config (#17776) tasks: delay startup signals (#17769) website: bump the build group in /website with 6 updates (#17712) core, web: update translations (#17660) web: bump vite from 7.1.11 to 7.1.12 in /web (#17689) website: bump validator from 13.15.15 to 13.15.20 in /website (#17741) web: bump eslint-plugin-react-hooks from 7.0.0 to 7.0.1 in /packages/eslint-config in the eslint group across 1 directory (#17714) web: bump validator from 13.15.15 to 13.15.20 in /packages/eslint-config (#17742) packages/django-postgres-cache: use upsert instead of select/update in a transaction (#17760) providers/radius: fix panic when no cert is configured (#17762) sources/oauth: Make PKCE verifier 128 characters (#17763) providers/proxy: fix missing JWT/claims header (#17759) providers/proxy: add gorm logging (#17758) web: bump the sentry group across 1 directory with 2 updates (#17743) root: Add Dockerfile label org.opencontainers.image.source (#17756) ...
raw JWT was not correctly de-serialized when loading session
also fix other fields not being correctly serialized
fixes #17750
fixes #17753