mirror of
https://github.com/zitadel/zitadel.git
synced 2025-03-04 08:35:13 +00:00
Merge branch 'next' into next-rc
# Conflicts: # internal/auth/repository/eventsourcing/eventstore/auth_request_test.go # proto/zitadel/resources/action/v3alpha/action_service.proto
This commit is contained in:
commit
b93fa831c8
@ -8,28 +8,29 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
Authorization = "authorization"
|
Authorization = "authorization"
|
||||||
Accept = "accept"
|
Accept = "accept"
|
||||||
AcceptLanguage = "accept-language"
|
AcceptLanguage = "accept-language"
|
||||||
CacheControl = "cache-control"
|
CacheControl = "cache-control"
|
||||||
ContentType = "content-type"
|
ContentType = "content-type"
|
||||||
ContentLength = "content-length"
|
ContentLength = "content-length"
|
||||||
Expires = "expires"
|
Expires = "expires"
|
||||||
Location = "location"
|
Location = "location"
|
||||||
Origin = "origin"
|
Origin = "origin"
|
||||||
Pragma = "pragma"
|
Pragma = "pragma"
|
||||||
UserAgentHeader = "user-agent"
|
UserAgentHeader = "user-agent"
|
||||||
ForwardedFor = "x-forwarded-for"
|
ForwardedFor = "x-forwarded-for"
|
||||||
ForwardedHost = "x-forwarded-host"
|
ForwardedHost = "x-forwarded-host"
|
||||||
ForwardedProto = "x-forwarded-proto"
|
ForwardedProto = "x-forwarded-proto"
|
||||||
Forwarded = "forwarded"
|
Forwarded = "forwarded"
|
||||||
XUserAgent = "x-user-agent"
|
ZitadelForwarded = "x-zitadel-forwarded"
|
||||||
XGrpcWeb = "x-grpc-web"
|
XUserAgent = "x-user-agent"
|
||||||
XRequestedWith = "x-requested-with"
|
XGrpcWeb = "x-grpc-web"
|
||||||
XRobotsTag = "x-robots-tag"
|
XRequestedWith = "x-requested-with"
|
||||||
IfNoneMatch = "If-None-Match"
|
XRobotsTag = "x-robots-tag"
|
||||||
LastModified = "Last-Modified"
|
IfNoneMatch = "If-None-Match"
|
||||||
Etag = "Etag"
|
LastModified = "Last-Modified"
|
||||||
|
Etag = "Etag"
|
||||||
|
|
||||||
ContentSecurityPolicy = "content-security-policy"
|
ContentSecurityPolicy = "content-security-policy"
|
||||||
XXSSProtection = "x-xss-protection"
|
XXSSProtection = "x-xss-protection"
|
||||||
|
@ -17,7 +17,7 @@ func WithOrigin(fallBackToHttps bool, http1Header, http2Header string, instanceH
|
|||||||
r,
|
r,
|
||||||
fallBackToHttps,
|
fallBackToHttps,
|
||||||
// to make sure we don't break existing configurations we append the existing checked headers as well
|
// to make sure we don't break existing configurations we append the existing checked headers as well
|
||||||
slices.Compact(append(instanceHostHeaders, http1Header, http2Header, http_util.Forwarded, http_util.ForwardedFor, http_util.ForwardedHost, http_util.ForwardedProto)),
|
slices.Compact(append(instanceHostHeaders, http1Header, http2Header, http_util.Forwarded, http_util.ZitadelForwarded, http_util.ForwardedFor, http_util.ForwardedHost, http_util.ForwardedProto)),
|
||||||
publicDomainHeaders,
|
publicDomainHeaders,
|
||||||
)
|
)
|
||||||
next.ServeHTTP(w, r.WithContext(http_util.WithDomainContext(r.Context(), origin)))
|
next.ServeHTTP(w, r.WithContext(http_util.WithDomainContext(r.Context(), origin)))
|
||||||
@ -52,7 +52,8 @@ func hostFromRequest(r *http.Request, headers []string) (host, proto string) {
|
|||||||
for _, header := range headers {
|
for _, header := range headers {
|
||||||
switch http.CanonicalHeaderKey(header) {
|
switch http.CanonicalHeaderKey(header) {
|
||||||
case http.CanonicalHeaderKey(http_util.Forwarded),
|
case http.CanonicalHeaderKey(http_util.Forwarded),
|
||||||
http.CanonicalHeaderKey(http_util.ForwardedFor):
|
http.CanonicalHeaderKey(http_util.ForwardedFor),
|
||||||
|
http.CanonicalHeaderKey(http_util.ZitadelForwarded):
|
||||||
hostFromHeader, protoFromHeader = hostFromForwarded(r.Header.Values(header))
|
hostFromHeader, protoFromHeader = hostFromForwarded(r.Header.Values(header))
|
||||||
case http.CanonicalHeaderKey(http_util.ForwardedHost):
|
case http.CanonicalHeaderKey(http_util.ForwardedHost):
|
||||||
hostFromHeader = r.Header.Get(header)
|
hostFromHeader = r.Header.Get(header)
|
||||||
|
@ -2604,6 +2604,7 @@ func TestAuthRequestRepo_VerifyPassword_IgnoreUnknownUsernames(t *testing.T) {
|
|||||||
a.SetPolicyOrgID("instance1")
|
a.SetPolicyOrgID("instance1")
|
||||||
return a
|
return a
|
||||||
}
|
}
|
||||||
|
|
||||||
type fields struct {
|
type fields struct {
|
||||||
AuthRequests func(*testing.T, string) cache.AuthRequestCache
|
AuthRequests func(*testing.T, string) cache.AuthRequestCache
|
||||||
UserViewProvider userViewProvider
|
UserViewProvider userViewProvider
|
||||||
|
@ -109,6 +109,7 @@ func AssertResourceListDetails[D ResourceListDetailsMsg](t testing.TB, expected,
|
|||||||
assert.Nil(t, gotDetails)
|
assert.Nil(t, gotDetails)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
assert.Equal(t, wantDetails.GetTotalResult(), gotDetails.GetTotalResult())
|
assert.Equal(t, wantDetails.GetTotalResult(), gotDetails.GetTotalResult())
|
||||||
assert.Equal(t, wantDetails.GetAppliedLimit(), gotDetails.GetAppliedLimit())
|
assert.Equal(t, wantDetails.GetAppliedLimit(), gotDetails.GetAppliedLimit())
|
||||||
|
|
||||||
|
@ -8,6 +8,7 @@ import "google/protobuf/duration.proto";
|
|||||||
import "google/protobuf/struct.proto";
|
import "google/protobuf/struct.proto";
|
||||||
import "protoc-gen-openapiv2/options/annotations.proto";
|
import "protoc-gen-openapiv2/options/annotations.proto";
|
||||||
import "validate/validate.proto";
|
import "validate/validate.proto";
|
||||||
|
|
||||||
import "zitadel/protoc_gen_zitadel/v2/options.proto";
|
import "zitadel/protoc_gen_zitadel/v2/options.proto";
|
||||||
|
|
||||||
import "zitadel/resources/action/v3alpha/target.proto";
|
import "zitadel/resources/action/v3alpha/target.proto";
|
||||||
|
Loading…
x
Reference in New Issue
Block a user