forked from oauth2-proxy/oauth2-proxy
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merge 7.7.1 #58
Merged
Merged
Merge 7.7.1 #58
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
the functions `isApiPath` and `isAllowedPath` use the `req.URL.Path` property which leads to faulty behavior when behind a reverse proxy. The correct path can be inferred from the `X-Forwarded-Uri` header by making use of the already provided `requestutil.GetRequestURI` function. Co-authored-by: Jan Wystub <jan@bam-bam-bam.com>
…ri-for-pathregex-match fix: use X-Forwarded-Uri if it exists for pathRegex match
* Validate jsonpath in claim extractor Signed-off-by: Joseph Weigl <joseph.weigl@audi.de> * Add test and changelog for claim extractor json path --------- Signed-off-by: Joseph Weigl <joseph.weigl@audi.de> Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
Embedding css and webfont dependencies allows the application to present itself correctly in an environment that does not allow downloading the files from a cdn. Inspiration taken from oauth2-proxy#1492 but reworked to make use of embed.FS simplifying the approach.
…iles Embed static stylesheets and dependencies
* WIP: support for workload identity * WIP: bugfixes to support WI * Added support for Workload Identity * Added missing flag * Refactoring and typo * Updated CHANGELOG.md * Updated docs * Updated changelog * Improved readability and fixed codeclimate issues * Update CHANGELOG.md Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk> * Fixed if statement * Apply suggestions from code review Co-authored-by: Jan Larwig <jan@larwig.com> * Cleanup * Removed target principal * Removed references to target principal * Added docs * Fixed header anchor linking * Update auth.md * Updated generated code * Improved code * Fixed tests --------- Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk> Co-authored-by: Jan Larwig <jan@larwig.com>
Created using: yarn run docusaurus docs:version 7.5.x
…pe-logic bugfix: move oidc scope logic to oidc provider
* Improved session documentation * Replaced "OAuth2-Proxy" with "OAuth2 Proxy"
* Added several arm builds to dist.sh * Added platforms to Dockerfile and updated docs * Reverted changes made for testing * Fix docker platform images * Fix docker platform images * Update Makefile Co-authored-by: Jan Larwig <jan@larwig.com> * Update Makefile Co-authored-by: Jan Larwig <jan@larwig.com> * Update Makefile Co-authored-by: Jan Larwig <jan@larwig.com> * Formatting improvements --------- Co-authored-by: Jan Larwig <jan@larwig.com>
Only pinning minor version to automatically receive patches
Update alpine to 3.18
…s-for-oidc-based-providers bugfix: default scopes for OIDCProvider based providers
* add search and update depedencies * refactor documentation workflow to follow best github action best practices
…acting the proper base api url for github cloud, github enterprise and gitea (oauth2-proxy#2194)
* Update changelog for v7.5.1 release * Create versioned docs for release v7.5.x Created using: yarn run docusaurus docs:version 7.5.x --------- Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
While parsing config: (28, 4): unescaped control character U+000A
* Update dependencies * Update changelog
* golang.org/x/net upgrade to v0.17.0 https://artifacthub.io/packages/helm/oauth2-proxy/oauth2-proxy?modal=security-report * Update CHANGELOG.md * go mod tidy
fix(ci): testing full release cycle before release branches can be merged
…ertificate-handling fix: self signed certificate handling in v7.7.0
…y#2328) * Issue 2311: runtime error: index out of range [0] with length 0 while extracting state of of the csrf --------- Co-authored-by: tuunit <jan@larwig.com>
…e Go1.22 (loopvar) this linter is no longer relevant. Replaced by copyloopvar
l-lafin
approved these changes
Dec 10, 2024
sailinder
approved these changes
Dec 10, 2024
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well done, mano!
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Merge from Upstream/Release/7.7.1
AB#1611455
Motivation and Context
Keeping OAuth2-Proxy up-to-date with the upstream
How Has This Been Tested?
Created a local container image of the oauth-proxy from this PR and integrated it with Reporting locally.
The following flows were checked:
Checklist: