Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(server): customizable authz endpoints #4296

Merged
merged 93 commits into from
Jan 25, 2023
Merged

Conversation

james-d-elliott
Copy link
Member

@james-d-elliott james-d-elliott commented Oct 30, 2022

This allows users to customize the authz endpoints.

Closes #2753, Fixes #3716

@authelia
Copy link

authelia bot commented Oct 30, 2022

Artifacts

These changes are published for testing on Buildkite, DockerHub and GitHub Container Registry.

Docker Container

  • docker pull authelia/authelia:feat-authz-custom
  • docker pull ghcr.io/authelia/authelia:feat-authz-custom

@netlify
Copy link

netlify bot commented Oct 30, 2022

Deploy Preview for authelia-staging ready!

Name Link
🔨 Latest commit 59ed3ed
🔍 Latest deploy log https://app.netlify.com/sites/authelia-staging/deploys/63d0d5401d3c4f000924ea89
😎 Deploy Preview https://deploy-preview-4296--authelia-staging.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site settings.

@james-d-elliott james-d-elliott force-pushed the feat-authz-custom branch 4 times, most recently from b41f249 to 6657375 Compare October 30, 2022 06:24
This allows users to customize the authz endpoints.
@james-d-elliott james-d-elliott marked this pull request as ready for review January 3, 2023 04:31
@codecov
Copy link

codecov bot commented Jan 3, 2023

Codecov Report

Merging #4296 (561c64d) into master (78064de) will increase coverage by 0.23%.
The diff coverage is 73.34%.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #4296      +/-   ##
==========================================
+ Coverage   67.40%   67.63%   +0.23%     
==========================================
  Files         271      281      +10     
  Lines       19811    20647     +836     
  Branches      443      443              
==========================================
+ Hits        13353    13964     +611     
- Misses       5678     5872     +194     
- Partials      780      811      +31     
Flag Coverage Δ
backend 67.99% <73.34%> (+0.23%) ⬆️
frontend 63.15% <ø> (+0.04%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
internal/commands/root.go 40.57% <0.00%> (ø)
internal/handlers/handler_oidc_consent.go 30.23% <0.00%> (-1.92%) ⬇️
internal/handlers/handler_register_webauthn.go 0.00% <0.00%> (ø)
internal/handlers/handler_sign_webauthn.go 0.00% <0.00%> (ø)
internal/handlers/util.go 64.70% <ø> (-9.77%) ⬇️
internal/handlers/response.go 43.10% <6.66%> (-1.95%) ⬇️
internal/server/template.go 44.07% <12.50%> (+0.05%) ⬆️
internal/handlers/handler_oidc_authorization.go 37.50% <30.00%> (-3.62%) ⬇️
internal/handlers/handler_sign_totp.go 37.97% <38.46%> (-1.16%) ⬇️
internal/handlers/handler_state.go 54.54% <38.46%> (-20.46%) ⬇️
... and 47 more

@james-d-elliott james-d-elliott changed the title feat(sever): customizable authz endpoints feat(server): customizable authz endpoints Jan 3, 2023
Copy link
Member

@nightah nightah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great work so far, I've submitted my first pass review.

I suspect with some of those changes from require to assert and using the suite method that some of the imports may no longer be required, the linter should hopefully pick this up on the next commit.

docs/content/en/integration/kubernetes/traefik-ingress.md Outdated Show resolved Hide resolved
docs/content/en/integration/kubernetes/traefik-ingress.md Outdated Show resolved Hide resolved
docs/content/en/integration/proxies/caddy.md Outdated Show resolved Hide resolved
docs/content/en/integration/proxies/caddy.md Outdated Show resolved Hide resolved
docs/content/en/integration/proxies/traefik.md Outdated Show resolved Hide resolved
internal/handlers/handler_user_info_test.go Outdated Show resolved Hide resolved
internal/middlewares/authelia_context.go Outdated Show resolved Hide resolved
@@ -14,6 +14,10 @@ func NewPathPrefixSuite() *PathPrefixSuite {
return &PathPrefixSuite{RodSuite: new(RodSuite)}
}

func (s *PathPrefixSuite) TestCheckEnv() {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I suspect this file should actually change after we've merged in the suite environment changes first?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, makes sense. Did they look good to you?

internal/utils/bytes.go Outdated Show resolved Hide resolved
internal/suites/const.go Outdated Show resolved Hide resolved
internal/handlers/handler_user_info_test.go Outdated Show resolved Hide resolved
internal/handlers/handler_user_info_test.go Outdated Show resolved Hide resolved
internal/handlers/handler_user_info_test.go Outdated Show resolved Hide resolved
internal/handlers/handler_user_info_test.go Outdated Show resolved Hide resolved
# Conflicts:
#	internal/suites/const.go
#	internal/suites/example/compose/authelia/docker-compose.backend.dev.yml
#	internal/suites/example/compose/caddy/Caddyfile
#	internal/suites/example/compose/haproxy/haproxy.cfg
#	internal/suites/scenario_multiple_cookie_domain_test.go
#	internal/suites/scenario_one_factor_test.go
#	internal/suites/utils.go
Copy link
Member

@nightah nightah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
3 participants