diff --git a/frontend/js/app/nginx/proxy/form.ejs b/frontend/js/app/nginx/proxy/form.ejs
index 0cc0d543..601ab444 100644
--- a/frontend/js/app/nginx/proxy/form.ejs
+++ b/frontend/js/app/nginx/proxy/form.ejs
@@ -10,6 +10,7 @@
<%- i18n('all-hosts', 'locations') %>
<%- i18n('str', 'ssl') %>
<%- i18n('all-hosts', 'advanced') %>
+ OpenID Connect
@@ -177,6 +178,54 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/frontend/js/app/nginx/proxy/form.js b/frontend/js/app/nginx/proxy/form.js
index eb93bc8f..3358aeff 100644
--- a/frontend/js/app/nginx/proxy/form.js
+++ b/frontend/js/app/nginx/proxy/form.js
@@ -34,7 +34,9 @@ module.exports = Mn.View.extend({
hsts_subdomains: 'input[name="hsts_subdomains"]',
http2_support: 'input[name="http2_support"]',
forward_scheme: 'select[name="forward_scheme"]',
- letsencrypt: '.letsencrypt'
+ letsencrypt: '.letsencrypt',
+ openidc_enabled: 'input[name="openidc_enabled"]',
+ openidc: '.openidc'
},
regions: {
@@ -91,6 +93,17 @@ module.exports = Mn.View.extend({
}
},
+ 'change @ui.openidc_enabled': function () {
+ console.log('Changing');
+ let checked = this.ui.openidc_enabled.prop('checked');
+
+ if (checked) {
+ this.ui.openidc.show().find('input').prop('required', true);
+ } else {
+ this.ui.openidc.hide().find('input').prop('required', false);
+ }
+ },
+
'click @ui.add_location_btn': function (e) {
e.preventDefault();
@@ -128,6 +141,7 @@ module.exports = Mn.View.extend({
data.hsts_enabled = !!data.hsts_enabled;
data.hsts_subdomains = !!data.hsts_subdomains;
data.ssl_forced = !!data.ssl_forced;
+ data.openidc_enabled = data.openidc_enabled === '1';
if (typeof data.domain_names === 'string' && data.domain_names) {
data.domain_names = data.domain_names.split(',');
@@ -152,6 +166,12 @@ module.exports = Mn.View.extend({
data.certificate_id = parseInt(data.certificate_id, 10);
}
+ // OpenID Connect won't work with multiple domain names because the redirect URL has to point to a specific one
+ if (data.openidc_enabled && data.domain_names.length > 1) {
+ alert('Cannot use mutliple domain names when OpenID Connect is enabled');
+ return;
+ }
+
let method = App.Api.Nginx.ProxyHosts.create;
let is_new = true;
@@ -266,6 +286,9 @@ module.exports = Mn.View.extend({
view.ui.certificate_select[0].selectize.setValue(view.model.get('certificate_id'));
}
});
+
+ // OpenID Connect
+ this.ui.openidc.hide().find('input').prop('required', false);
},
initialize: function (options) {
diff --git a/frontend/js/models/proxy-host.js b/frontend/js/models/proxy-host.js
index b82d09fe..77302a7d 100644
--- a/frontend/js/models/proxy-host.js
+++ b/frontend/js/models/proxy-host.js
@@ -22,6 +22,12 @@ const model = Backbone.Model.extend({
block_exploits: false,
http2_support: false,
advanced_config: '',
+ openidc_enabled: false,
+ openidc_redirect_uri: null,
+ openidc_discovery: null,
+ openidc_auth_method: null,
+ openidc_client_id: null,
+ openidc_client_secret: null,
enabled: true,
meta: {},
// The following are expansions: