Skip to content

feat(auth): add --listen-addr and --redirect-host flags for proxy setups#227

Open
cyberfox wants to merge 1 commit intosteipete:mainfrom
cyberfox:main
Open

feat(auth): add --listen-addr and --redirect-host flags for proxy setups#227
cyberfox wants to merge 1 commit intosteipete:mainfrom
cyberfox:main

Conversation

@cyberfox
Copy link

Add support for running OAuth authentication on headless systems behind a reverse proxy. The new flags allow configuring where the OAuth callback server listens and what redirect URI is sent to Google.

  • --listen-addr: Address/port to listen on (e.g. 0.0.0.0:8080)
  • --redirect-host: Hostname for redirect URI (builds https://{host}/oauth2/callback)

This allows running it in a headless behind-the-firewall location, with (for example) an Nginx Proxy Manager that recognizes gog.customdomain.com, SSL terminates, and forwards the response on to the gog listener at the appropriate port. This avoids a lot of the fiddly problems with authenticating an otherwise hard to reach server, and having to copy and paste '127.0.0.1:1' redirected Oauth responses.

Example use:

gog auth add example@gmail.com --listen-addr=0.0.0.0:8085 --redirect-host=gog.example.com

Add support for running OAuth authentication on headless systems behind
a reverse proxy. The new flags allow configuring where the OAuth callback
server listens and what redirect URI is sent to Google.

- --listen-addr: Address/port to listen on (e.g. 0.0.0.0:8080)
- --redirect-host: Hostname for redirect URI (builds https://{host}/oauth2/callback)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant