Skip to content

Release 23.1-RC1

Compare
Choose a tag to compare
@groldan groldan released this 26 Jun 02:58
· 172 commits to main since this release
v23.1-RC1
d5974b7

What's Changed

  • License file in #1
  • trying to implement proxy configuration for the oauth2 client by @pmauduit in #3
  • Prototype applying georchestra access rules by @pmauduit in #4
  • Package refactoring, load and apply service access rules by @groldan in #5
  • Oauth2 User Service class should also be configured against a proxy, if provided (#8) by @pmauduit in #9
  • Build improvements by @groldan in #10
  • Install maven wrapper and update README and github workflow accordingly by @groldan in #13
  • Support appending sec-* headers as configured, resolved from authenticated user by @groldan in #12
  • Remove authenticated config prop from RoleBasedAccessRule, anonymous=false is enough by @groldan in #15
  • Fix access rules order and add integration tests by @groldan in #16
  • Allow OpenID Connect authentication to go through HTTP proxy by @groldan in #17
  • Use JSONPath to map OpenIDConnect claims to roles and org name by @groldan in #18
  • Feature/auth with multiple ldap dbs by @groldan in #19
  • Add support for LDAP Active Directory authentication. by @groldan in #20
  • AD - changing strategy for authenticating users via Active Directory by @pmauduit in #21
  • Add liveness and readiness management probes end points by @groldan in #22
  • Allow to specify LDAP's user search returned attributes by @groldan in #23
  • Support multiple jsonpath expressions to extract roles from OIDC claims by @groldan in #24
  • Gateway user roles feature (sync from DT gitlab) by @emmdurin in #25
  • Added customizable login and logout pages by @emmdurin in #26
  • Add configuration to extract the user id from an OpenID Connect non-standard claim by @groldan in #31
  • custom login page - dynamically iterates over the oauth2 registered clients by @pmauduit in #27
  • Login: rework ui by @tkohr in #29
  • Fix for OAuth2 providers using HS256 token algorithm by @emmdurin in #30
  • add condition to print oauth section by @jeanmi151 in #33
  • Fixed condition for showing LDAP section of login page by @emmdurin in #34
  • Make all requests having a ?login param to be authenticated by @jahow in #32
  • Fixed OAuth2 support of all MAC algorithm and short client secrets by @emmdurin in #38
  • password rotation for gateway by @marwanehcine in #37
  • Gateway update to handle login errors by @marwanehcine in #42
  • Added cookie affinity filter by @emmdurin in #41
  • Use the OAuth2 registration name if client name is not provided for the login page by @groldan in #46
  • Allow to disable the georchestra header by @groldan in #47
  • Add filters used by GeoServer Cloud by @groldan in #48

New Contributors

Full Changelog: https://github.com/georchestra/georchestra-gateway/commits/v23.1-RC1