Commit Graph

22 Commits

Author SHA1 Message Date
Igor Ippolitov bd3f672763 Fixed a typo in .service file and fixed missing file in .install 2016-11-07 14:20:38 +03:00
Igor Ippolitov f824aee3ef files needed for debian packaging and minor changes into rpm spec 2016-11-02 20:06:42 +03:00
Igor Ippolitov 438518509d ensure required parameters are set at the time of a request 2016-11-02 20:06:42 +03:00
Igor Ippolitov 5fec096aa6 added options for commandline 2016-11-02 18:33:15 +03:00
Vladimir Homutov 3873fab889 Merge pull request #11 from thresheek/master
Added systemd service file and rpm spec file
2016-11-02 18:47:07 +04:00
Konstantin Pavlov 6cd01885aa Added RPM spec file. 2016-11-02 17:37:28 +03:00
Konstantin Pavlov fe3b441727 Added systemd service file for nginx-ldap-auth-daemon.
This service file assumes nginx-ldap-auth-daemon.py was installed to
/usr/bin under the name of nginx-ldap-auth-daemon.
2016-11-02 17:31:29 +03:00
Vladimir Homutov 40fc2ef257 Merge pull request #10 from rysiekpl/master
Minor bugfixes
2016-10-10 23:53:52 +04:00
Michał 'rysiek' Woźniak 24bf24ffbb Minor bugfixes: password can now contain colons, log_message uses self.ctx (instead of global ctx, which does not exist) 2016-10-10 21:38:15 +02:00
Vladimir Homutov c61f0137b7 Merge /home/vl/tasks/0216-ldap_auth_lab/src/nginx-ldap-auth 2016-10-10 16:51:28 +03:00
Vladimir Homutov d56a55e21e Updated documentation and example.
Commit 06444b36f6 changed returned error
code from 403 to 401 in case of failed auth and documentaion must be
updated accordingly.
2016-10-10 16:48:29 +03:00
Vladimir Homutov 06444b36f6 Merge pull request #9 from ArfyFR/patch-1
Use RFC2616 recommandation to reply 401 instead on 403 for auth_failed
2016-10-10 17:46:18 +04:00
Vladimir Homutov 7f3634bba0 more robust error routine.
self.ctx may be unset in case of bad request or other low-level error.
2016-10-10 16:39:56 +03:00
ArfyFR f57c05388d Use RFC2616 recommandation to reply 401 instead on 403 for auth_failed
Cf https://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html ,

401 is for: auth failed... please retry ;)
-----------
10.4.2 401 Unauthorized
 The request requires user authentication. The response MUST include a WWW-Authenticate header field (section 14.47) containing a challenge applicable to the requested resource. The client MAY repeat the request with a suitable Authorization header field (section 14.8). If the request already included Authorization credentials, then the 401 response indicates that authorization has been refused for those credentials. If the 401 response contains the same challenge as the prior response, and the user agent has already attempted authentication at least once, then the user SHOULD be presented the entity that was given in the response, since that entity might include relevant diagnostic information. HTTP access authentication is explained in "HTTP Authentication: Basic and Digest Access Authentication" [43].



403 is for: more or less auth shouldn't be repeated
-----------
10.4.4 403 Forbidden
 The server understood the request, but is refusing to fulfill it. Authorization will not help and the request SHOULD NOT be repeated. If the request method was not HEAD and the server wishes to make public why the request has not been fulfilled, it SHOULD describe the reason for the refusal in the entity. If the server does not wish to make this information available to the client, the status code 404 (Not Found) can be used instead.

Regards,
Pascal
2016-10-10 09:09:05 +02:00
Vladimir Homutov 52d5cba3e9 Merge pull request #6 from ClassicTim/add_rh_ctl_script
Added CTL script for RedHat linux.
2016-07-08 13:08:01 +04:00
Artem Stepanov 9e55fd2c76 Added ctl script for RedHat linux. 2016-07-05 16:21:23 +03:00
Vladimir Homutov 995d0f8eaa Default binddn is changed to empty string.
This allows to use anonymous bind, if binddn is not provided. Previous
default setting lead to use of unauthenticated bind, which is usually
disabled in LDAP server configurations.
2016-06-28 13:55:13 +03:00
Faisal Memon 081d42d5cc 2nd try to fix formatting. 2015-06-22 11:59:33 -07:00
Faisal Memon cb503c9218 fix link at end 2015-06-22 11:52:50 -07:00
tmauro-nginx ebeaf8fd57 Update README.md
Standardizing representation of hyperlink to "How Authentication Works in the Reference Implementation" section of blog post. Adding space in front of OpenLDAP hyperlink in 'Compatibility' section, hoping that makes the link look right.
2015-06-22 11:42:06 -07:00
tmauro-nginx f40722de6e Update README.md
Correcting link to blog post: changing https://nginx.com/blog/nginx-plus-authenticate-users#configure to .../#ldap-auth-configure
2015-06-22 11:36:26 -07:00
Vladimir Homutov 6a345efd55 Initial commit 2015-06-19 14:13:56 +03:00