update tests with default AuthorizationHeaderName
Signed-off-by: dvmartinweigl <martin.weigl@datavisyn.io>
This commit is contained in:
parent
fd89b48cf1
commit
cf9a179276
|
|
@ -39,9 +39,10 @@ func NewLegacyOptions() *LegacyOptions {
|
||||||
},
|
},
|
||||||
|
|
||||||
LegacyHeaders: LegacyHeaders{
|
LegacyHeaders: LegacyHeaders{
|
||||||
PassBasicAuth: true,
|
PassBasicAuth: true,
|
||||||
PassUserHeaders: true,
|
PassUserHeaders: true,
|
||||||
SkipAuthStripHeaders: true,
|
SkipAuthStripHeaders: true,
|
||||||
|
AuthorizationHeaderName: "Authorization",
|
||||||
},
|
},
|
||||||
|
|
||||||
LegacyServer: LegacyServer{
|
LegacyServer: LegacyServer{
|
||||||
|
|
@ -89,6 +90,7 @@ func (l *LegacyOptions) ToOptions() (*Options, error) {
|
||||||
l.Options.Server, l.Options.MetricsServer = l.LegacyServer.convert()
|
l.Options.Server, l.Options.MetricsServer = l.LegacyServer.convert()
|
||||||
|
|
||||||
l.Options.LegacyPreferEmailToUser = l.LegacyHeaders.PreferEmailToUser
|
l.Options.LegacyPreferEmailToUser = l.LegacyHeaders.PreferEmailToUser
|
||||||
|
|
||||||
l.Options.AuthorizationHeaderName = l.LegacyHeaders.AuthorizationHeaderName
|
l.Options.AuthorizationHeaderName = l.LegacyHeaders.AuthorizationHeaderName
|
||||||
|
|
||||||
providers, err := l.LegacyProvider.convert()
|
providers, err := l.LegacyProvider.convert()
|
||||||
|
|
|
||||||
|
|
@ -25,9 +25,10 @@ var _ = Describe("Load", func() {
|
||||||
},
|
},
|
||||||
|
|
||||||
LegacyHeaders: LegacyHeaders{
|
LegacyHeaders: LegacyHeaders{
|
||||||
PassBasicAuth: true,
|
PassBasicAuth: true,
|
||||||
PassUserHeaders: true,
|
PassUserHeaders: true,
|
||||||
SkipAuthStripHeaders: true,
|
AuthorizationHeaderName: "Authorization",
|
||||||
|
SkipAuthStripHeaders: true,
|
||||||
},
|
},
|
||||||
|
|
||||||
LegacyServer: LegacyServer{
|
LegacyServer: LegacyServer{
|
||||||
|
|
@ -48,6 +49,7 @@ var _ = Describe("Load", func() {
|
||||||
|
|
||||||
Options: Options{
|
Options: Options{
|
||||||
BearerTokenLoginFallback: true,
|
BearerTokenLoginFallback: true,
|
||||||
|
AuthorizationHeaderName: "Authorization",
|
||||||
ProxyPrefix: "/oauth2",
|
ProxyPrefix: "/oauth2",
|
||||||
PingPath: "/ping",
|
PingPath: "/ping",
|
||||||
ReadyPath: "/ready",
|
ReadyPath: "/ready",
|
||||||
|
|
|
||||||
|
|
@ -100,6 +100,7 @@ func (o *Options) SetRealClientIPParser(s ipapi.RealClientIPParser) { o.re
|
||||||
func NewOptions() *Options {
|
func NewOptions() *Options {
|
||||||
return &Options{
|
return &Options{
|
||||||
BearerTokenLoginFallback: true,
|
BearerTokenLoginFallback: true,
|
||||||
|
AuthorizationHeaderName: "Authorization",
|
||||||
ProxyPrefix: "/oauth2",
|
ProxyPrefix: "/oauth2",
|
||||||
Providers: providerDefaults(),
|
Providers: providerDefaults(),
|
||||||
PingPath: "/ping",
|
PingPath: "/ping",
|
||||||
|
|
@ -131,6 +132,7 @@ func NewFlagSet() *pflag.FlagSet {
|
||||||
flagSet.Bool("skip-auth-preflight", false, "will skip authentication for OPTIONS requests")
|
flagSet.Bool("skip-auth-preflight", false, "will skip authentication for OPTIONS requests")
|
||||||
flagSet.Bool("ssl-insecure-skip-verify", false, "skip validation of certificates presented when using HTTPS providers")
|
flagSet.Bool("ssl-insecure-skip-verify", false, "skip validation of certificates presented when using HTTPS providers")
|
||||||
flagSet.Bool("skip-jwt-bearer-tokens", false, "will skip requests that have verified JWT bearer tokens (default false)")
|
flagSet.Bool("skip-jwt-bearer-tokens", false, "will skip requests that have verified JWT bearer tokens (default false)")
|
||||||
|
flagSet.String("authorization-header-name", "Authorization", "name of the authorization header to use instead of Authorization")
|
||||||
flagSet.Bool("bearer-token-login-fallback", true, "if skip-jwt-bearer-tokens is set, fall back to normal login redirect with an invalid JWT. If false, 403 instead")
|
flagSet.Bool("bearer-token-login-fallback", true, "if skip-jwt-bearer-tokens is set, fall back to normal login redirect with an invalid JWT. If false, 403 instead")
|
||||||
flagSet.Bool("force-json-errors", false, "will force JSON errors instead of HTTP error pages or redirects")
|
flagSet.Bool("force-json-errors", false, "will force JSON errors instead of HTTP error pages or redirects")
|
||||||
flagSet.Bool("encode-state", false, "will encode oauth state with base64")
|
flagSet.Bool("encode-state", false, "will encode oauth state with base64")
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue