Release 23.1-RC1
What's Changed
- License file in #1
- trying to implement proxy configuration for the oauth2 client by @pmauduit in #3
- Prototype applying georchestra access rules by @pmauduit in #4
- Package refactoring, load and apply service access rules by @groldan in #5
- Oauth2 User Service class should also be configured against a proxy, if provided (#8) by @pmauduit in #9
- Build improvements by @groldan in #10
- Install maven wrapper and update README and github workflow accordingly by @groldan in #13
- Support appending sec-* headers as configured, resolved from authenticated user by @groldan in #12
- Remove authenticated config prop from RoleBasedAccessRule, anonymous=false is enough by @groldan in #15
- Fix access rules order and add integration tests by @groldan in #16
- Allow OpenID Connect authentication to go through HTTP proxy by @groldan in #17
- Use JSONPath to map OpenIDConnect claims to roles and org name by @groldan in #18
- Feature/auth with multiple ldap dbs by @groldan in #19
- Add support for LDAP Active Directory authentication. by @groldan in #20
- AD - changing strategy for authenticating users via Active Directory by @pmauduit in #21
- Add liveness and readiness management probes end points by @groldan in #22
- Allow to specify LDAP's user search returned attributes by @groldan in #23
- Support multiple jsonpath expressions to extract roles from OIDC claims by @groldan in #24
- Gateway user roles feature (sync from DT gitlab) by @emmdurin in #25
- Added customizable login and logout pages by @emmdurin in #26
- Add configuration to extract the user id from an OpenID Connect non-standard claim by @groldan in #31
- custom login page - dynamically iterates over the oauth2 registered clients by @pmauduit in #27
- Login: rework ui by @tkohr in #29
- Fix for OAuth2 providers using HS256 token algorithm by @emmdurin in #30
- add condition to print oauth section by @jeanmi151 in #33
- Fixed condition for showing LDAP section of login page by @emmdurin in #34
- Make all requests having a
?login
param to be authenticated by @jahow in #32 - Fixed OAuth2 support of all MAC algorithm and short client secrets by @emmdurin in #38
- password rotation for gateway by @marwanehcine in #37
- Gateway update to handle login errors by @marwanehcine in #42
- Added cookie affinity filter by @emmdurin in #41
- Use the OAuth2 registration name if client name is not provided for the login page by @groldan in #46
- Allow to disable the georchestra header by @groldan in #47
- Add filters used by GeoServer Cloud by @groldan in #48
New Contributors
- @pmauduit made their first contribution in #3
- @groldan made their first contribution in #5
- @emmdurin made their first contribution in #25
- @tkohr made their first contribution in #29
- @jeanmi151 made their first contribution in #33
- @jahow made their first contribution in #32
- @marwanehcine made their first contribution in #37
Full Changelog: https://github.com/georchestra/georchestra-gateway/commits/v23.1-RC1