1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2025-07-13 01:40:48 +02:00
Commit Graph

2083 Commits

Author SHA1 Message Date
cdcc62014d Merge pull request #2894 from oauth2-proxy/fix-lint
Fix linting after updating golangci-lint to 1.62.2
2024-12-31 19:19:57 +07:00
f41a686b43 Fix linting after updating golangci-lint to 1.62.2 2024-12-31 13:14:39 +01:00
c1a21aa877 Merge pull request #2872 from oauth2-proxy/renovate/golangci-golangci-lint-1.x
chore(deps): update dependency golangci/golangci-lint to v1.62.2
2024-12-31 19:00:30 +07:00
1346ae6079 chore(deps): update dependency golangci/golangci-lint to v1.62.2 2024-12-31 11:53:30 +00:00
fe6f8ddb65 Merge pull request #2878 from oauth2-proxy/renovate/golang-1.x
chore(deps): update dependency golang to v1.23.4
2024-12-31 18:52:56 +07:00
5edff8fe1a chore(deps): update dependency golang to v1.23.4 2024-12-31 11:46:50 +00:00
5f188e5b6b Microsoft Entra ID provider (#2390)
* Microsoft Entra ID Provider

* fix typo in function name

* documentation tweaks

* documentation and comment tweak

* docs tweaks

* final tweaks

* refactor: drop flag for skipping graph groups

* update legacy / deprecated provider page and sort provider overview

* reformat

* move entra-id provider into switch (treat like every other provider

* fix test case and reformat

* fix sidebar configuration

* apply review suggestions

* add pagination for graph api

* fix: do not error when groups unable to retrieve

* doc: number of groups fix

* restore master packages

* docs: tiny docs tweak

* address review comments

* fix codegen

---------

Co-authored-by: tuunit <jan@larwig.com>
2024-12-31 11:46:13 +00:00
c64ec1251b Merge pull request #2886 from oauth2-proxy/renovate/go-golang.org-x-net-vulnerability
chore(deps): update module golang.org/x/net to v0.33.0 [security]
2024-12-23 17:38:28 +07:00
47638db231 chore(deps): update module golang.org/x/net to v0.33.0 [security] 2024-12-19 02:01:45 +00:00
bcf20346cf Merge pull request #2884 from oauth2-proxy/renovate/go-golang.org-x-crypto-vulnerability
chore(deps): update module golang.org/x/crypto to v0.31.0 [security]
2024-12-17 15:02:49 +07:00
0dca9af6d7 chore(deps): update module golang.org/x/crypto to v0.31.0 [security] 2024-12-12 00:59:31 +00:00
ef8ba75987 docs: fix insecure Caddy configuration example (#2827)
The original example only protected the root (`/`) path, leaving other routes unsecured.
* docs: add syntax highlighting for nginx config
* docs: fix headings in `configuration/integration` page
* docs: fix redirect in caddy configuraion example
2024-11-11 10:04:04 +01:00
5042203625 chore(deps): update docker-compose 2024-11-11 09:44:08 +01:00
bc1224291c chore(deps): update gomod 2024-11-10 22:43:42 +01:00
05b91f310a chore: extend test cases for oidc provider and documentation regarding implicit setting of the groups scope when no scope was specified in the config
Co-authored-by: Jan Larwig <jan@larwig.com>
2024-11-09 15:48:29 +01:00
2fd2f8c63d chore(deps): update gomod 2024-11-06 16:56:57 +01:00
4e2013e6ba fix: update code_verifier to use recommended method (#2620)
The [RFC](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)
says that a code verifier just uses unreserved characters, but the
recommended method is that it is a base64-urlencoded 32-octet url. Some
implementations of PKCE (most notably the one used by salesforce)
require that this is a valid base64 encoded string[1], so this patch
switches to using the recommended approach to make it more compatible.

[1]: https://help.salesforce.com/s/articleView?id=sf.remoteaccess_pkce.htm&type=5
2024-11-06 15:16:39 +01:00
3ceef0cff4 feat: add CF-Connecting-IP as supported real ip header (#2821) 2024-11-04 23:28:08 +01:00
64e736f668 fix: websocket path rewrite (#2300) 2024-11-04 23:12:35 +01:00
96f0288a36 chore(deps): update alpine docker tag to v3.20.3 (#2682) 2024-11-04 22:30:56 +01:00
0bc8dd98e2 chore(deps): update module github.com/go-jose/go-jose/v3 to v3.0.3 [security] (#2831) 2024-11-04 22:22:03 +01:00
50ec7fa902 chore(deps): update dependency node to v22 (#2836) 2024-11-04 22:16:30 +01:00
b4f7e0603e doc: fix relative URLs to configuration page (#2818) 2024-10-29 16:21:43 +01:00
4d2b5c30a1 Merge pull request #1985 from isodude/systemd-socket
Add support for systemd socket
2024-10-28 03:56:05 +07:00
5ec03ab0e9 chore(deps): update module github.com/go-jose/go-jose/v3 to v4 (#2598) 2024-10-27 17:25:27 +01:00
9945b68a06 doc: readme overhaul and azure sponsorship (#2826)
* new readme structure

* add adopters file

* add microsoft sponsorship

* add reference to adopter file

* add gopher slack invite link

* slightly rephrase nightly image section

* add sponsor request for action

* better formatting for contributor wall

* add longer wait time for stale PRs and issues and allow for exemption through bug and high-priority labels

* apply review suggestion

Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>

---------

Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
2024-10-27 12:12:46 +00:00
6743a9cc89 Add support for systemd.socket
When using sockets to pass data between e.g. nginx and oauth2-proxy it's
simpler to use sockets. Systemd can even facilitate this and pass the
actual socket directly.

This also means that only the socket runs with the same group as nginx
while the service runs with DynamicUser.

Does not support TLS yet.

nginx
```
server {
    location /oauth2/ {
      proxy_pass http://unix:/run/oauth2-proxy/oauth2.sock;
}
```

oauth2-proxy.socket
```
[Socket]
ListenStream=%t/oauth2.sock
SocketGroup=www-data
SocketMode=0660
```

Start oauth2-proxy with the parameter `--http-address=fd:3`.

Signed-off-by: Josef Johansson <josef@oderland.se>
2024-10-23 09:35:47 +02:00
bc8e7162db Allow parsing remote address headers over unix sockets
When listening to a unix socket there is no RemoteAddr for http.Request.
Instead of setting nil, Go sets it to '@'. Marking the IP as trusted if
RemoteAddr allows rest of the settings for parsing remote address in
headers to be applied.

Signed-off-by: Josef Johansson <josef@oderland.se>
2024-10-23 07:48:54 +02:00
e00c7a7edd fix(contrib): revamped systemd service example (#2655) 2024-10-13 20:00:54 +02:00
66f1063722 feat: add X-Envoy-External-Address as supported header (#2755) 2024-10-13 19:55:47 +02:00
798b846643 chore(deps): update dependency @easyops-cn/docusaurus-search-local to ^0.45.0 2024-10-13 19:43:24 +02:00
c555f5f6d5 chore: removed duplicate image line in docker-compose (#2817) 2024-10-13 19:37:26 +02:00
defc456ba0 doc: expand on --upstream URL matching and trailing slash behaviour (#2813) 2024-10-12 18:57:21 +02:00
ab448cf38e doc: add standard opencontainer docker labels (#2800) 2024-10-09 15:01:36 +02:00
6fb020149a Merge pull request #2807 from oauth2-proxy/release/v7.7.1
release v7.7.1
v7.7.1
2024-10-08 17:38:38 +01:00
055a63432c update to release version v7.7.1 2024-10-08 14:41:41 +02:00
ff761d2523 fix: runtime error: index out of range (0) with length 0 (#2328)
* Issue 2311: runtime error: index out of range [0] with length 0 while extracting state of of the csrf

---------

Co-authored-by: tuunit <jan@larwig.com>
2024-10-08 14:40:41 +02:00
642ba174d4 fix: unable to use hyphen in JSON path for oidc-groups-claim option (#2619) 2024-10-07 20:08:44 +02:00
d68336dcf4 Merge pull request #2803 from tuunit/bugfix/self-signed-certificate-handling
fix: self signed certificate handling in v7.7.0
2024-10-07 11:54:22 +01:00
4bd920b208 add changelog entry 2024-10-06 21:55:45 +02:00
bae168f06a better handling of default transport modification 2024-10-06 21:43:38 +02:00
8fd7312a90 fix: self signed certificate handling 2024-10-05 17:29:37 +02:00
cda641473f Merge pull request #2798 from oauth2-proxy/release/v7.7.0
fix(ci): testing full release cycle before release branches can be merged
v7.7.0
2024-10-02 15:17:25 +01:00
07230ead91 fix(ci): testing full release cycle before release branches can be merged 2024-10-02 16:03:13 +02:00
f5d36705fa Merge pull request #2792 from oauth2-proxy/release/v7.7.0
release v7.7.0
2024-10-02 13:52:47 +01:00
1dd4a412b0 add new loop var linter for go1.22 and remove unnecessary exportloopref linter 2024-10-01 11:15:48 +02:00
3c7dadcbd2 add v7.7.0 release highlights 2024-10-01 11:15:48 +02:00
6e32bd6e38 fix missing 'changes since' section logic 2024-10-01 11:15:47 +02:00
f0fe33e032 enforce go 1.22.7 2024-10-01 11:15:47 +02:00
715995843c fix golangci-lint version in pipelines 2024-10-01 11:15:47 +02:00