Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add proxy support for the SSO with OIDC flow. #189

Closed

Conversation

shilmyhasan
Copy link

The fix introduces proxy support for SSO with OIDC flow. Currently the proxy support is not available while obtaining an access token from IDP during the OIDC Flow and the fix introduces the above ability.x

@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

@shilmyhasan shilmyhasan marked this pull request as ready for review December 6, 2024 03:21
@@ -1245,7 +1245,12 @@ protected OAuthClientResponse requestAccessToken(HttpServletRequest request, Aut
OAuthClientRequest accessTokenRequest = getAccessTokenRequest(context, authzResponse);

// Create OAuth client that uses custom http client under the hood.
OAuthClient oAuthClient = new OAuthClient(new URLConnectionClient());
OAuthClient oAuthClient;
if (Boolean.parseBoolean(IdentityUtil.getProperty(OIDCAuthenticatorConstants.Proxy.proxyEnable))) {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shouldn't this be checking the system properties?

import org.apache.http.impl.conn.DefaultProxyRoutePlanner;
import org.apache.http.protocol.HttpContext;


Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unwanted new line

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants