mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 00:05:50 +03:00
[PR #1285] auth: Add trusted header authentication with IP allowlist #1232
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#1232
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/lldap/lldap/pull/1285
Author: @Kumpelinus
Created: 9/13/2025
Status: 🔄 Open
Base:
main← Head:trusted-headers📝 Commits (1)
662dfabauth: Add trusted header authentication with IP allowlist📊 Changes
10 files changed (+399 additions, -12 deletions)
View changed files
📝
Cargo.lock(+1 -0)📝
app/src/infra/api.rs(+13 -2)📝
crates/auth/src/lib.rs(+15 -0)📝
lldap_config.docker_template.toml(+19 -0)📝
server/Cargo.toml(+1 -0)📝
server/src/auth_service.rs(+233 -5)📝
server/src/cli.rs(+23 -0)📝
server/src/configuration.rs(+46 -1)📝
server/src/graphql_server.rs(+40 -3)📝
server/src/tcp_server.rs(+8 -1)📄 Description
Add support for trusted header authentication that allows users to be authenticated via HTTP headers (e.g., from reverse proxies like Authelia, Authentik, or Traefik ForwardAuth).
This implementation provides a tokenless authentication flow that works alongside the existing JWT-based authentication:
Configuration options:
trusted_header_options.enabled- Enable/disable the featuretrusted_header_options.header_name- Header containing username (default: "Remote-User")trusted_header_options.logout_url- Optional logout redirect URLtrusted_header_options.trusted_proxies- IP addresses/CIDR networks allowed to send trusted headers (default: localhost only)The existing username/password login remains available as fallback when trusted headers are not present.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.