Add support for group and email headers to authproxy connector #2379
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Overview
This commit adds several new options to the authproxy connector to allow additional user
attributes to be extracted.
What this PR does / why we need it
A new emailHeader config option on the connector allows different values for the UserID
Email fields of the identity to be used, if the option is not specified then Email will
be populated from UserID as before.
User groups may also be extracted from headers in one of two different ways.
In order to extract group information the groupHeader config option must be specified.
If the groupSeparator option is specified and non-empty then the group header is treated
as a delimited list of group names, for example given groupSeparator = "," then the
expected format of header would be
X-Remote-Group: allUsers,admins
Alternatively if groupSeparator is not provided then the header is treated as a repeated
list of group names, for example
X-Remote-Group: allUsers
X-Remote-Group: admins
Special notes for your reviewer
Note that the connector behaviour remains unchanged in all cases where the new config
options have not been used, ensuring backwards compatibility for existing installations.
Does this PR introduce a user-facing change?