Skip to content

Releases: ploxiln/oauth2_proxy

version 2.7.1

23 Jul 22:18
Compare
Choose a tag to compare

Security related:

Changes:

  • #60 do not set cache-control header for auth-only endpoint
  • #63 new option --skip-auth-strip-headers, enabled by default, to remove some headers from upstream requests allowed by --skip-auth-regex, that would otherwise be set by the normal auth logic

version 2.7.0

27 May 21:18
6a4dd45
Compare
Choose a tag to compare

Security related:

Potentially compatibility-breaking changes:

  • #52 The interpretation of cookie-secret was fixed, and may reject a secret that is not valid for an AES key used for encrypting tokens (for cookie-refresh or pass-access-token). It no longer adds base64 padding after base64 decode (in addition to before base64 decode), which accidentally made cookie-secret seem to be the appropriate length.
  • #57 Rename some flags and config-file options for consistency:
    • flags: --tls-cert to --tls-cert-file, --tls-key to --tls-key-file
    • config: proxy-prefix to proxy_prefix, google_group to google_groups, github_team to github_teams
    • flag --github-team should now be passed multiple times for multiple teams, rather than taking a single comma-separated value, and --github-team= now means a team named "" instead of no-team-required.
  • #55 remove recently-added option/flag xheaders, and replace with new option/flag real-client-ip-header to choose between X-Real-IP or X-Forwarded-For or disabled

Features:

  • #45 new option/flag banner to override default sign-in banner html
  • #54 new option/flag prompt to replace approval_prompt param to provider
  • #56, #58 new option/flag force-https to redirect user requests from http to https (based on X-Forwarded-Proto header because oauth2_proxy listens for either http or https but never both, yet)
  • #46 add header Cache-Control: no-store to auth-flow-related responses to prevent inappropriate browser caching

Fixes and refinements:

  • #47 websockets now respect ssl-insecure-skip-verify option
  • #43 fix sign_in page url fragment after reload in Firefox
  • #49 log reason when redirect (to application) URL is invalid
  • #51 more precise cookie size check/warning
  • #44 clean-up validator tests
  • #53 switch from Travis-CI to GitHub Actions for CI, minor test fixes for go-1.14
  • update README links, cookie-secret generate example

version 2.6.0

19 Feb 12:14
Compare
Choose a tag to compare

Changes:

  • #33 add --cookie-path config option
  • #42 add --xheaders config option (set false to disable trust of X-Real-IP request header)
  • #37 more robust handling of the original app url to redirect to after auth callback
  • #20 add Bitbucket provider
  • add nsswitch.conf to docker image to make netgo resolver use /etc/hosts first
  • minor updates to build and test scripts, README, example config

Fixes:

  • #37 check for /\ redirects (see GHSA-qqxw-m5fj-f7gv)
  • #38 filter out headers which oauth2_proxy is responsible for (if not overwriting them)
  • #32 improve websocket support with Hijack() method
  • #40 GitHub provider: always pass token in header (remove last use of deprecated query param)
  • #31 #41 GitHub provider: require verified email, prefer primary
  • #36 GitLab provider: honor --scope option when using groups

version 2.5.1

21 Mar 16:10
Compare
Choose a tag to compare

Fixes:

  • #29 adjust --redirect-url handling a bit more - fill url path if it is absent (also more compatible with pre-2.5.0 behavior)

Changes:

  • #30 update dependency github.com/mreiferson/go-options

version 2.5.0

20 Mar 04:50
Compare
Choose a tag to compare

About half of these are ported from https://github.com/pusher/oauth2_proxy/ pull requests, and link to there in the PR description.

Changes:

  • #26 websocket proxying support (hopefully ;)
  • #17 add option --flush-interval
  • #14 rename import path to github.com/ploxiln/oauth2_proxy
  • #15 update vendored dependencies, and version of "dep" used in Travis-CI and Dockerfile
  • #16 minor Google and OIDC options handling code cleanup

Fixes:

  • #22 #24 fix option --redirect-url handling
  • #19 make --ssl-insecure-skip-verify keep most DefaultTransport configuration (timeouts, keepalives, etc)

Provider updates:

  • #28 actually support Google nested groups - oauth2_proxy v2.4 claimed this, but didn't
  • #13 add Discord provider
  • #21 OIDC provider: add option --skip-oidc-discovery
  • #25 OIDC provider: fallback from "email" to "sub" (Subject)
  • #23 GitHub provider: rename url query param "limit" to "per_page"

version 2.4.1

06 Jan 12:31
Compare
Choose a tag to compare

BUILDS UPDATED 2019-01-26 with go-1.11.5 (with crypto/tls denial-of-service fix)

Fixes:

  • #11 fix GitLab provider (related to --gitlab-group flag)

Changes:

  • only fetch up to 10 pages of GitLab groups for a user (similar to other providers groups checks)
  • refactor FlagSet into a function for testing
  • clean up test.sh and dist.sh, add Dockerfile

version 2.4

30 Nov 07:30
Compare
Choose a tag to compare

General changes:

  • #3 #8 authenticated-emails-file change-watching refactored a bit, due to flaky tests
    • if file is deleted, will only wait up to 5 seconds for it to re-appear, instead of indefinitely
    • github.com/fsnotify/fsnotify updated to v1.4.7
  • update example config and login page project link to point to this "ploxiln" fork
  • README updates for this "ploxiln" fork
  • #2 travis-ci config updated for this fork, with newer versions of go and dep, and newer base OS

Provider updates:

  • bitly#637 #4 GitLab: new option --gitlab-group / gitlab_groups
  • bitly#500 #6 Google: refactor groups lookup, support nested groups, fix for large orgs with many groups
  • bitly#613 #7 GitHub: fix team lookup for large orgs with many teams
  • bitly#620 #5 OpenID Connect: basic support for refreshing tokens (with cookie-refresh equal to token lifetime)

V2.3 first release of ploxiln fork

23 Nov 21:23
Compare
Choose a tag to compare

Changes in this fork:

  • #1 fix combination of htpasswd auth and --cookie refresh
  • bitly#464 add --whitelist-domain option
  • bitly#651 make --ssl-insecure-skip-verify apply to DefaultTransport
  • bitly#424 support combination of --set-xauthrequest and --pass-access-token
  • bitly#641 add /oauth2/sign_out to docs
  • bitly#595 update fsnotify package import
  • bitly#577 fix hmacauth package import in Gopkg.toml

Changes in bitly master branch since v2.2: