Skip to content

Releases: criteo/haproxy-spoe-auth

v1.5.0

04 Sep 12:26
Compare
Choose a tag to compare

Commits

  • 8c77a99: Bump golang.org/x/oauth2 from 0.5.0 to 0.6.0 (#30) (dependabot[bot]) #30
  • fb08c99: Migrate library haproxy-spoe-go (Basha Mougamadou) #43

v1.4.0

14 Mar 13:08
Compare
Choose a tag to compare

Commits

  • 7e9eb29: Bump go version to 1.20 (Basha Mougamadou) #31
  • 1681cce: Retrieve client information from spoe message (Basha Mougamadou) #33

v1.3.0

13 Feb 15:28
27a3c5d
Compare
Choose a tag to compare

Commits

  • eee0bbb: Create a dependabot config file (Manu Nicolas) #19
  • 2511978: Bump github.com/spf13/viper from 1.8.1 to 1.14.0 (dependabot[bot]) #24
  • b1371c5: Bump github.com/vmihailenco/msgpack/v5 from 5.3.4 to 5.3.5 (dependabot[bot]) #23
  • cba6078: Bump github.com/sirupsen/logrus from 1.7.0 to 1.9.0 (dependabot[bot]) #21
  • 3ff3c27: Bump github.com/coreos/go-oidc/v3 from 3.0.0 to 3.5.0 (dependabot[bot]) #20
  • 64016b4: Bump golang.org/x/oauth2 from 0.3.0 to 0.4.0 (dependabot[bot]) #25
  • 2e7b3e3: Bump github.com/spf13/viper from 1.14.0 to 1.15.0 (dependabot[bot]) #26
  • ca87a1e: Bump golang.org/x/oauth2 from 0.4.0 to 0.5.0 (dependabot[bot]) #28
  • 27a3c5d: Send back the logged in LDAP username to haproxy (#27) (Manu Nicolas) #27

v1.2.0

04 Jan 17:03
Compare
Choose a tag to compare

This is a breaking release

This version enables the option to use TLS secured LDAP servers, through the LDAPS protocol. To do that the previous ldap.hostname is removed and replaced by ldap.uri

Commits

  • 6364fff: Bump ldap dependency and clean up (Manu Nicolas) #18
  • 5d9fd80: Switch to the ldap.DialURL function and introduce an option for TLS verification (Manu Nicolas) #18
  • b628e12: Switch to ldaps for tests (Manu Nicolas) #18

v1.1.0

07 Dec 14:24
Compare
Choose a tag to compare

Commits

  • 285e521: Support group authorization for ldap (Basha Mougamadou) #17

v1.0.0

06 Jan 14:02
Compare
Choose a tag to compare
Add an http healthcheck to the OIDC module