Skip to content

Commit 4178ac4

Browse files
authored
Merge pull request oauth2-proxy#2498 from oauth2-proxy/release/v7.6.0
release v7.6.0
2 parents 84e1cc2 + 40efe79 commit 4178ac4

37 files changed

+2606
-5
lines changed

CHANGELOG.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,16 @@
66

77
## Breaking Changes
88

9+
## Changes since v7.6.0
10+
11+
# V7.6.0
12+
13+
## Release Highlights
14+
15+
## Important Notes
16+
17+
## Breaking Changes
18+
919
## Changes since v7.5.1
1020

1121
- [#2381](https://github.com/oauth2-proxy/oauth2-proxy/pull/2381) Allow username authentication to Redis cluster (@rossigee)

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Going forward, all images shall be available at `quay.io/oauth2-proxy/oauth2-pro
2323

2424
1. Choose how to deploy:
2525

26-
a. Using a [Prebuilt Binary](https://github.com/oauth2-proxy/oauth2-proxy/releases) (current release is `v7.5.1`)
26+
a. Using a [Prebuilt Binary](https://github.com/oauth2-proxy/oauth2-proxy/releases) (current release is `v7.6.0`)
2727

2828
b. Using Go to install the latest release
2929
```bash

contrib/local-environment/docker-compose-gitea.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ version: '3.0'
1414
services:
1515
oauth2-proxy:
1616
container_name: oauth2-proxy
17-
image: gitea-oauth #quay.io/oauth2-proxy/oauth2-proxy:v7.5.1
17+
image: gitea-oauth #quay.io/oauth2-proxy/oauth2-proxy:v7.6.0
1818
command: --config /oauth2-proxy.cfg
1919
hostname: oauth2-proxy
2020
volumes:

contrib/local-environment/docker-compose-keycloak.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ version: '3.0'
1414
services:
1515
oauth2-proxy:
1616
container_name: oauth2-proxy
17-
image: quay.io/oauth2-proxy/oauth2-proxy:v7.5.1
17+
image: quay.io/oauth2-proxy/oauth2-proxy:v7.6.0
1818
command: --config /oauth2-proxy.cfg
1919
hostname: oauth2-proxy
2020
volumes:

contrib/local-environment/docker-compose.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ version: '3.0'
1313
services:
1414
oauth2-proxy:
1515
container_name: oauth2-proxy
16-
image: quay.io/oauth2-proxy/oauth2-proxy:v7.5.1
16+
image: quay.io/oauth2-proxy/oauth2-proxy:v7.6.0
1717
command: --config /oauth2-proxy.cfg
1818
hostname: oauth2-proxy
1919
volumes:

docs/docs/installation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ title: Installation
55

66
1. Choose how to deploy:
77

8-
a. Using a [Prebuilt Binary](https://github.com/oauth2-proxy/oauth2-proxy/releases) (current release is `v7.5.1`)
8+
a. Using a [Prebuilt Binary](https://github.com/oauth2-proxy/oauth2-proxy/releases) (current release is `v7.6.0`)
99

1010
b. Using Go to install the latest release
1111
```bash

docs/docs/welcome.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
id: welcome
33
title: Welcome
44
hide_table_of_contents: true
5+
slug: /
56
---
67

78
![OAuth2 Proxy](/img/logos/OAuth2_Proxy_horizontal.svg)
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
id: behaviour
3+
title: Behaviour
4+
---
5+
6+
1. Any request passing through the proxy (and not matched by `--skip-auth-regex`) is checked for the proxy's session cookie (`--cookie-name`) (or, if allowed, a JWT token - see `--skip-jwt-bearer-tokens`).
7+
2. If authentication is required but missing then the user is asked to log in and redirected to the authentication provider (unless it is an Ajax request, i.e. one with `Accept: application/json`, in which case 401 Unauthorized is returned)
8+
3. After returning from the authentication provider, the oauth tokens are stored in the configured session store (cookie, redis, ...) and a cookie is set
9+
4. The request is forwarded to the upstream server with added user info and authentication headers (depending on the configuration)
10+
11+
Notice that the proxy also provides a number of useful [endpoints](features/endpoints.md).
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
id: contribution
3+
title: Contribution Guide
4+
---
5+
6+
We track bugs and issues using Github.
7+
8+
If you find a bug, please open an Issue. When opening an Issue or Pull Request please follow the preconfigured template and take special note of the checkboxes.
9+
10+
If you want to fix a bug, add a new feature or extend existing functionality, please create a fork, create a feature branch and open a PR back to this repo.
11+
Please mention open bug issue number(s) within your PR if applicable.
12+
13+
We suggest using [Visual Studio Code](https://code.visualstudio.com/docs/languages/go) with the official [Go for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=golang.go) extension.
14+
15+
16+
# Go version
17+
18+
This project is currently still using go 1.19. You can follow the installation guide for go [here.](https://go.dev/doc/install) And you can find go version 1.19 in the archived section [here.](https://go.dev/dl/)
19+
20+
# Preparing your fork
21+
Clone your fork, create a feature branch and update the depedencies to get started.
22+
```bash
23+
git clone git@github.com:<YOUR_FORK>/oauth2-proxy
24+
cd oauth2-proxy
25+
git branch feature/<BRANCH_NAME>
26+
git push --set-upstream origin feature/<BRANCH_NAME>
27+
go mod download
28+
```
29+
30+
31+
# Testing / Debugging
32+
For starting oauth2-proxy locally open the debugging tab and create the `launch.json` and select `Go: Launch Package`.
33+
34+
![Debugging Tab](/img/debug-tab.png)
35+
```json
36+
{
37+
"version": "0.2.0",
38+
"configurations": [
39+
{
40+
"name": "Launch OAuth2-Proxy with Dex",
41+
"type": "go",
42+
"request": "launch",
43+
"mode": "auto",
44+
"program": "${workspaceFolder}",
45+
"args": [
46+
"--config",
47+
// The following configuration contains settings for a locally deployed
48+
// upstream and dex as an idetity provider
49+
"contrib/local-environment/oauth2-proxy.cfg"
50+
]
51+
},
52+
{
53+
"name": "Launch OAuth2-Proxy with Keycloak",
54+
"type": "go",
55+
"request": "launch",
56+
"mode": "auto",
57+
"program": "${workspaceFolder}",
58+
"args": [
59+
"--config",
60+
// The following configuration contains settings for a locally deployed
61+
// upstream and keycloak as an idetity provider
62+
"contrib/local-environment/oauth2-proxy-keycloak.cfg"
63+
]
64+
}
65+
]
66+
}
67+
```
68+
69+
Before you can start your local version of oauth2-proxy, you will have to use the provided docker compose files to start a local upstream service and identity provider. We suggest using [httpbin](https://hub.docker.com/r/kennethreitz/httpbin) as your upstream for testing as it allows for request and response introspection of all things HTTP.
70+
71+
Open a terminal and switch to the `contrib/local-environment` directory.
72+
73+
- Dex as your IdP: `docker compose -f docker-compose.yaml up dex etcd httpbin`
74+
- Keycloak as your IdP: `docker compose -f docker-compose-keycloak.yaml up keycloak httpbin`
75+
76+
The username for both is `admin@example.com` and password is `password`.
77+
78+
Start oauth2-proxy from the debug tab and open http://oauth2-proxy.localtest.me:4180/ for testing.
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
id: security
3+
title: Security
4+
---
5+
6+
:::note
7+
OAuth2 Proxy is a community project.
8+
Maintainers do not work on this project full time, and as such,
9+
while we endeavour to respond to disclosures as quickly as possible,
10+
this may take longer than in projects with corporate sponsorship.
11+
:::
12+
13+
## Security Disclosures
14+
15+
:::important
16+
If you believe you have found a vulnerability within OAuth2 Proxy or any of its
17+
dependencies, please do NOT open an issue or PR on GitHub, please do NOT post
18+
any details publicly.
19+
:::
20+
21+
Security disclosures MUST be done in private.
22+
If you have found an issue that you would like to bring to the attention of the
23+
maintenance team for OAuth2 Proxy, please compose an email and send it to the
24+
list of maintainers in our [MAINTAINERS](https://github.com/oauth2-proxy/oauth2-proxy/blob/master/MAINTAINERS) file.
25+
26+
Please include as much detail as possible.
27+
Ideally, your disclosure should include:
28+
- A reproducible case that can be used to demonstrate the exploit
29+
- How you discovered this vulnerability
30+
- A potential fix for the issue (if you have thought of one)
31+
- Versions affected (if not present in master)
32+
- Your GitHub ID
33+
34+
### How will we respond to disclosures?
35+
36+
We use [GitHub Security Advisories](https://docs.github.com/en/github/managing-security-vulnerabilities/about-github-security-advisories)
37+
to privately discuss fixes for disclosed vulnerabilities.
38+
If you include a GitHub ID with your disclosure we will add you as a collaborator
39+
for the advisory so that you can join the discussion and validate any fixes
40+
we may propose.
41+
42+
For minor issues and previously disclosed vulnerabilities (typically for
43+
dependencies), we may use regular PRs for fixes and forego the security advisory.
44+
45+
Once a fix has been agreed upon, we will merge the fix and create a new release.
46+
If we have multiple security issues in flight simultaneously, we may delay
47+
merging fixes until all patches are ready.
48+
We may also backport the fix to previous releases,
49+
but this will be at the discretion of the maintainers.

0 commit comments

Comments
 (0)