Fork https://github.com/pusher/oauth2_proxy.git Adding gitea provider
Go to file
Jehiah Czebotar 7eb17ba9e0 enable travis
add travis badge
2012-12-26 18:26:05 +00:00
.gitignore initial code import 2012-12-10 20:59:23 -05:00
.travis.yml enable travis 2012-12-26 18:26:05 +00:00
cookies.go initial code import 2012-12-10 20:59:23 -05:00
htpasswd_test.go testing 2012-12-17 13:38:33 -05:00
htpasswd.go testing 2012-12-17 13:38:33 -05:00
main.go testing 2012-12-17 13:38:33 -05:00
oauthproxy.go handle sign in directly (if using htpasswd) 2012-12-26 18:26:03 +00:00
README.md enable travis 2012-12-26 18:26:05 +00:00
string_array.go initial code import 2012-12-10 20:59:23 -05:00
templates_test.go testing 2012-12-17 13:38:33 -05:00
templates.go don't promote htpasswd auth; auth directly 2012-12-26 16:55:20 +00:00
validator.go testing 2012-12-17 13:38:33 -05:00

google_auth_proxy

A reverse proxy that provides authentication using Google OAuth2 to validate individual accounts, or a whole google apps domain.

Build Status

Structure

    _______       ___________________       __________
    |Nginx| ----> |google_auth_proxy| ----> |upstream| 
    -------       -------------------       ----------
                          ||
                          \/
                  [google oauth2 api]

Configuration

  1. visit to Google Api Console https://code.google.com/apis/console/
  2. under "API Access", choose "Create an OAuth 2.0 Client ID"
  3. Edit the application settings, and list the Redirect URI(s) where you will run your application. For example: https://internalapp.yourcompany.com/oauth2/callback

Usage

Usage of ./google_auth_proxy:
  -authenticated-emails-file="": authenticate against emails via file (one per line)
  -client-id="": the Google OAuth Client ID: ie: "123456.apps.googleusercontent.com"
  -client-secret="": the OAuth Client Secret
  -cookie-domain="": an optional cookie domain to force cookies to
  -cookie-secret="": the seed string for secure cookies
  -google-apps-domain="": authenticate against the given google apps domain
  -htpasswd-file="": additionally authenticate against a htpasswd file. Entries must be created with "htpasswd -s" for SHA encryption
  -http-address="0.0.0.0:4180": <addr>:<port> to listen on for HTTP clients
  -pass-basic-auth=true: pass HTTP Basic Auth information to upstream
  -redirect-url="": the OAuth Redirect URL. ie: "https://internalapp.yourcompany.com/oauth2/callback"
  -upstream=[]: the http url(s) of the upstream endpoint. If multiple, routing is based on path
  -version=false: print version string

Unauthenticated requests will be redirected to /oauth2/sign_in to start the sign-in process.

Example

To run google_auth_proxy as a reverse proxy on port 4180 authenticating requests for an application running on port 8080 at internal.yourcompany.com you would use

./google_auth_proxy \
   --redirect-url="https://internal.yourcompany.com/oauth2/callback"  \
   --google-apps-domain="yourcompany.com"  \
   --upstream=http://127.0.0.1:8080/ \
   --cookie-secret=... \
   --client-id=... \
   --client-secret=...

An example Nginx config to listen on ssl (port 443) and forward requests to port 4180 would be

server {
    listen 443 default ssl;
    server_name internal.yourcompany.com;
    ssl_certificate /path/to/cert.pem;
    ssl_certificate_key /path/to/cert.key;
    add_header Strict-Transport-Security max-age=1209600;

    location / {
        proxy_pass http://127.0.0.1:4180;
        proxy_set_header Host $host;
        proxy_set_header X-Real-IP $remote_addr;
        proxy_set_header X-Scheme $scheme;
        proxy_connect_timeout 1;
        proxy_send_timeout 30;
        proxy_read_timeout 30;
    }
}

Documentation

  • /oauth2/sign_in - the login page, which also doubles as a sign out page (it clears cookies)
  • /oauth2/start - a URL that will redirect to start the oauth cycle
  • /oauth2/callback - the URL used at the end of the oauth cycle