-
Notifications
You must be signed in to change notification settings - Fork 1.2k
providers: add OpenID Connect provider #165
Conversation
52c9100
to
1c886b1
Compare
Quick demo video: https://www.youtube.com/watch?v=cbiAhIUl8Hg&feature=youtu.be |
1c886b1
to
997ea28
Compare
@jehiah rebased. I would like @bobbyrullo or @bcwaldon to review too since this is the first time I have used the go-oidc library. |
See the README for usage with Dex or any other OIDC provider. This has only been tested against CoreOS Dex but should work against other providers like Google, Facebook, etc as well.
New dependency for the go-oidc provider on the CoreOS Go OIDC library.
997ea28
to
52e7f91
Compare
ping @bobbyrullo @bcwaldon @jehiah |
sorry, not been keeping up with Github notifications very well. Taking a look now. |
Is this likely to get merged into mainline? I see that CoreOS is maintaining a fork at /~https://github.com/coreos/oauth2_proxy which looks like it includes this functionality. If I want to use the proxy with OIDC today, I'm wondering if I should focus on CoreOS' fork, or on this upstream original. |
cc @ericchiang |
Yeah I can take a crack at revamping the PR. |
Is there anything we can do to help get this merged? |
Updated PR here #389 |
Closed in favor of #389 |
See the README for usage with Dex or any other OIDC provider.
This has only been tested against CoreOS Dex but should work against
other providers like Google, Facebook, etc as well.
To try it out see the improved Dex docs here: dexidp/dex#176