Merge "Add an option to set OIDCXForwardedHeaders"

This commit is contained in:
Zuul 2024-11-28 15:18:16 +00:00 committed by Gerrit Code Review
commit 93420ed41b
3 changed files with 13 additions and 0 deletions

View File

@ -234,6 +234,10 @@ keystone_enable_federation_openid: "{{ enable_keystone_federation | bool and key
keystone_should_remove_attribute_mappings: False
keystone_should_remove_identity_providers: False
keystone_federation_oidc_response_type: "id_token"
# can be set to any supported headers, according to
# https://github.com/OpenIDC/mod_auth_openidc/blob/ea3af872dcdbb4634a7e541c5e8c7326dafbb090/auth_openidc.conf
# e.g."X-Forwarded-Proto", "X-Forwarded-Port" etc.
keystone_federation_oidc_forwarded_headers: ""
keystone_federation_oidc_claim_delimiter: ";"
keystone_federation_oidc_scopes: "openid email profile"

View File

@ -58,6 +58,7 @@ LogLevel info
{% endif -%}
{% if keystone_enable_federation_openid | bool %}
OIDCXForwardedHeaders "{{ keystone_federation_oidc_forwarded_headers }}"
OIDCClaimPrefix "OIDC-"
OIDCClaimDelimiter "{{ keystone_federation_oidc_claim_delimiter }}"
OIDCResponseType "{{ keystone_federation_oidc_response_type }}"

View File

@ -0,0 +1,8 @@
---
fixes:
- |
Add an option to set OIDCX forwarded headers in keystone. This is useful
when keystone is behind a proxy and the proxy is adding headers to the
request. The new option is ``keystone_federation_oidc_forwarded_headers``.
The default value is empty, to preserve the current behavior.
`LP#2080402 <https://bugs.launchpad.net/bugs/2080402>`__