mirror of
https://github.com/oauth2-proxy/oauth2-proxy.git
synced 2025-04-04 22:34:22 +02:00
Merge branch 'master' into fix/missing-version-during-docker-built
This commit is contained in:
commit
a29eda3a6d
@ -8,7 +8,8 @@
|
||||
|
||||
## Changes since v7.8.0
|
||||
|
||||
- [#2920](https://github.com/oauth2-proxy/oauth2-proxy/pull/2920) fix: setting version during docker built
|
||||
- [#2887](https://github.com/oauth2-proxy/oauth2-proxy/issues/2887) fix: jwt regex validation error during skip-jwt-bearer-tokens flow
|
||||
- [#2920](https://github.com/oauth2-proxy/oauth2-proxy/pull/2920) fix: missing oauth2-proxy version for docker builds
|
||||
|
||||
# V7.8.0
|
||||
|
||||
|
@ -13,7 +13,7 @@ import (
|
||||
k8serrors "k8s.io/apimachinery/pkg/util/errors"
|
||||
)
|
||||
|
||||
const jwtRegexFormat = `^ey[IJ][a-zA-Z0-9_-]*\.ey[IJ][a-zA-Z0-9_-]*\.[a-zA-Z0-9_-]+$`
|
||||
const jwtRegexFormat = `^ey[a-zA-Z0-9_-]*\.ey[a-zA-Z0-9_-]*\.[a-zA-Z0-9_-]+$`
|
||||
|
||||
func NewJwtSessionLoader(sessionLoaders []middlewareapi.TokenToSessionFunc) alice.Constructor {
|
||||
js := &jwtSessionLoader{
|
||||
|
@ -71,6 +71,7 @@ Nnc3a3lGVWFCNUMxQnNJcnJMTWxka1dFaHluYmI4Ongtb2F1dGgtYmFzaWM=`
|
||||
// validToken will pass the token regex so can be used to check token fetching
|
||||
// is valid. It will not pass the OIDC Verifier however.
|
||||
const validToken = "eyJfoobar.eyJfoobar.12345asdf"
|
||||
const validTokenWithSpace = "eyAidHlwIjogIkpXVCIsICJraWQiOiAiRTJlWW5ZMWR1eGttTkpiVGdCRzd4MkVpNVJZPSIsICJhbGciOiAiUlMyNTYiIH0K.eyJfoobar.12345asdf"
|
||||
|
||||
Context("JwtSessionLoader", func() {
|
||||
var verifier middlewareapi.VerifyFunc
|
||||
@ -294,6 +295,11 @@ Nnc3a3lGVWFCNUMxQnNJcnJMTWxka1dFaHluYmI4Ongtb2F1dGgtYmFzaWM=`
|
||||
expectedErr: nil,
|
||||
expectedToken: validToken,
|
||||
}),
|
||||
Entry("Bearer <valid-token-with-whitespace>", findBearerTokenFromHeaderTableInput{
|
||||
header: fmt.Sprintf("Bearer %s", validTokenWithSpace),
|
||||
expectedErr: nil,
|
||||
expectedToken: validTokenWithSpace,
|
||||
}),
|
||||
Entry("Basic invalid-base64", findBearerTokenFromHeaderTableInput{
|
||||
header: "Basic invalid-base64",
|
||||
expectedErr: errors.New("invalid basic auth token: illegal base64 data at input byte 7"),
|
||||
|
Loading…
x
Reference in New Issue
Block a user