Skip to content
This repository has been archived by the owner on Jan 27, 2021. It is now read-only.

Releases: owncloud/ocis-proxy

0.7.0

21 Aug 10:38
Compare
Choose a tag to compare

Changes in 0.7.0

Summary

  • Enhancement - Add numeric uid and gid to the access token: #89
  • Enhancement - Add configuration options for the pre-signed url middleware: #91

Details

  • Enhancement - Add numeric uid and gid to the access token: #89

    The eos storage driver is fetching the uid and gid of a user from the access token. This PR is using
    the response of the accounts service to mint them in the token.

    #89

  • Enhancement - Add configuration options for the pre-signed url middleware: #91

    Added an option to define allowed http methods for pre-signed url requests. This is useful
    since we only want clients to GET resources and don't upload anything with presigned requests.

    #91
    owncloud/product#150

0.6.0

17 Aug 14:49
Compare
Choose a tag to compare

Changes in 0.6.0

Summary

  • Bugfix - Enable new accounts by default: #79
  • Bugfix - Lookup user by id for presigned URLs: #85
  • Bugfix - Build docker images with alpine:latest instead of alpine:edge: #78
  • Change - Add settings and ocs group routes: #81
  • Change - Add route for user provisioning API in ocis-ocs: #80

Details

  • Bugfix - Enable new accounts by default: #79

    When new accounts are created, they also need to be enabled to be useable.

    #79

  • Bugfix - Lookup user by id for presigned URLs: #85

    Phoenix will send the userid, not the username as the OC-Credential for presigned URLs.
    This PR uses the new ocisid claim in the OIDC userinfo to pass the userid to the account
    middleware.

    owncloud/ocis#436
    #85
    owncloud/ocis-pkg#50

  • Bugfix - Build docker images with alpine:latest instead of alpine:edge: #78

    ARM builds were failing when built on alpine:edge, so we switched to alpine:latest instead.

    #78

  • Change - Add settings and ocs group routes: #81

    Route settings requests and ocs group related requests to new services

    #81

  • Change - Add route for user provisioning API in ocis-ocs: #80

    We added a route to send requests on the user provisioning API endpoints to ocis-ocs.

    #80

0.5.0

24 Jul 12:01
v0.5.0
Compare
Choose a tag to compare

Changes in 0.5.0

Summary

  • Bugfix - Provide token configuration from config: #69
  • Bugfix - Provide token configuration from config: #76
  • Change - Add OIDC config flags: #66
  • Change - Mint new username property in the reva token: #62
  • Enhancement - Add Accounts UI routes: #65
  • Enhancement - Add option to disable TLS: #71
  • Enhancement - Only send create home request if an account has been migrated: #52
  • Enhancement - Create a root span on proxy that propagates down to consumers: #64
  • Enhancement - Support signed URLs: #73

Details

  • Bugfix - Provide token configuration from config: #69

    Fixed a bug that causes the createHome middleware to crash if no configuration for the
    TokenManager is propagated.

    #69

  • Bugfix - Provide token configuration from config: #76

    Fixed a bug that causes the createHome middleware to crash if the createHome response has no
    Status set

    #76

  • Change - Add OIDC config flags: #66

    To authenticate requests with an oidc provider we added two environment variables: -
    PROXY_OIDC_ISSUER="https://localhost:9200" and - PROXY_OIDC_INSECURE=true

    This changes ocis-proxy to now load the oidc-middleware by default, requiring a bearer token
    and exchanging the email in the OIDC claims for an account id at the ocis-accounts service.

    Setting PROXY_OIDC_ISSUER="" will disable the OIDC middleware.

    #66

  • Change - Mint new username property in the reva token: #62

    An accounts username is now taken from the on_premises_sam_account_name property instead of
    the preferred_name. Furthermore the group name (also from on_premises_sam_account_name
    property) is now minted into the token as well.

    #62

  • Enhancement - Add Accounts UI routes: #65

    The accounts service has a ui that requires routing - /api/v0/accounts and - /accounts.js

    To http://localhost:9181

    #65

  • Enhancement - Add option to disable TLS: #71

    Can be used to disable TLS when the ocis-proxy is behind an TLS-Terminating reverse proxy.

    Env PROXY_TLS=false or --tls=false

    #71
    #72

  • Enhancement - Only send create home request if an account has been migrated: #52

    This change adds a check if an account has been migrated by getting it from the ocis-accounts
    service. If no account is returned it means it hasn't been migrated.

    #52
    #63

  • Enhancement - Create a root span on proxy that propagates down to consumers: #64

    In order to propagate and correctly associate a span with a request we need a root span that gets
    sent to other services.

    #64

  • Enhancement - Support signed URLs: #73

    We added a middleware that verifies signed urls as generated by the owncloud-sdk. This allows
    directly downloading large files with browsers instead of using blob:// urls, which eats
    memory ...

    #73
    #75
    owncloud/ocis-ocs#18
    owncloud/owncloud-sdk#504

0.4.0

25 Jun 13:05
v0.4.0
Compare
Choose a tag to compare

Changes in 0.4.0

Summary

  • Bugfix - Accounts service response was ignored: #43
  • Bugfix - Fix x-access-token in header: #41
  • Change - Point /data endpoint to reva frontend: #45
  • Change - Send autocreate home request to reva gateway: #51
  • Change - Update to new accounts API: #39
  • Enhancement - Retrieve Account UUID From User Claims: #36
  • Enhancement - Create account if it doesn't exist in ocis-accounts: #55
  • Enhancement - Disable keep-alive on server-side OIDC requests: #268
  • Enhancement - Make jwt secret configurable: #41
  • Enhancement - Respect account_enabled flag: #53

Details

  • Bugfix - Accounts service response was ignored: #43

    We fixed an error in the AccountUUID middleware that was responsible for ignoring an account
    uuid provided by the accounts service.

    #43

  • Bugfix - Fix x-access-token in header: #41

    We fixed setting the x-access-token in the request header, which was broken before.

    #41
    #46

  • Change - Point /data endpoint to reva frontend: #45

    Adjusted example config files to point /data to the reva frontend.

    #45

  • Change - Send autocreate home request to reva gateway: #51

    Send autocreate home request to reva gateway

    #51

  • Change - Update to new accounts API: #39

    Update to new accounts API

    #39

  • Enhancement - Retrieve Account UUID From User Claims: #36

    OIDC Middleware can make use of uuidFromClaims to trade claims.Email for an account's UUID.
    For this, a general purpose cache was added that caches on a per-request basis, meaning
    whenever the request parameters match a set of keys, the cached value is returned, saving a
    round trip to the accounts service that otherwise would happen in every single request.

    #36

  • Enhancement - Create account if it doesn't exist in ocis-accounts: #55

    The accounts_uuid middleware tries to get the account from ocis-accounts. If it doens't exist
    there yet the proxy creates the account using the ocis-account api.

    #55
    #58

  • Enhancement - Disable keep-alive on server-side OIDC requests: #268

    This should reduce file-descriptor counts

    owncloud/ocis#268
    #42
    cs3org/reva#787

  • Enhancement - Make jwt secret configurable: #41

    We added a config option for the reva token manager JWTSecret. It was hardcoded before and is now
    configurable.

    #41

  • Enhancement - Respect account_enabled flag: #53

    If the account returned by the accounts service has the account_enabled flag set to false, the
    proxy will return immediately with the status code unauthorized.

    #53

0.3.1

31 Mar 09:04
Compare
Choose a tag to compare

Changes in 0.3.1

Summary

  • Change - Update ocis-pkg: #30

Details

  • Change - Update ocis-pkg: #30

    We updated ocis-pkg from 2.0.2 to 2.2.0.

    #30

0.3.0

30 Mar 19:51
Compare
Choose a tag to compare

Changes in 0.3.0

Summary

  • Change - Insecure http-requests are now redirected to https: #29
  • Enhancement - Configurable OpenID Connect client: #27
  • Enhancement - Add policy selectors: #4

Details

  • Change - Insecure http-requests are now redirected to https: #29

    #29

  • Enhancement - Configurable OpenID Connect client: #27

    The proxy will try to authenticate every request with the configured OIDC provider.

    See configs/proxy-example.oidc.json for an example-configuration.

    #27

  • Enhancement - Add policy selectors: #4

    "Static-Policy" can be configured to always select a specific policy. See:
    config/proxy-example.json.

    "Migration-Policy" selects policy depending on existence of the uid in the ocis-accounts
    service. See: config/proxy-example-migration.json

    #4

0.2.1

26 Mar 07:44
Compare
Choose a tag to compare

Changes in 0.2.1

Summary

  • Bugfix - Set TLS-Certificate correctly: #25

Details

  • Bugfix - Set TLS-Certificate correctly: #25

    #25

0.2.0

25 Mar 14:09
Compare
Choose a tag to compare

Changes in 0.2.0

Summary

  • Change - Route requests based on regex or query parameters: #21
  • Enhancement - Proxy client urls in default configuration: #19
  • Enhancement - Make TLS-Cert configurable: #14

Details

  • Change - Route requests based on regex or query parameters: #21

    Some requests needed to be distinguished based on a pattern or a query parameter. We've
    implemented the functionality to route requests based on different conditions.

    #21

  • Enhancement - Proxy client urls in default configuration: #19

    Proxy /status.php and index.php/*

    #19

  • Enhancement - Make TLS-Cert configurable: #14

    Before a generates certificates on every start was used for dev purposes.

    #14

0.1.0

18 Mar 15:02
Compare
Choose a tag to compare

Changes in 0.1.0

Summary

  • Change - Initial release of basic version: #1
  • Enhancement - Load Proxy Policies at Runtime: #17

Details

  • Change - Initial release of basic version: #1

    Just prepared an initial basic version.

    #1

  • Enhancement - Load Proxy Policies at Runtime: #17

    While a proxy without policies is of no use, the current state of ocis-proxy expects a config
    file either at an expected Viper location or specified via -- config-file flag. To ease
    deployments and ensure a working set of policies out of the box we need a series of defaults.

    #17
    #16