Skip to content

Releases: g0dsCookie/ldapauthd

v1.3.0

14 Apr 12:28
7e8b65a
Compare
Choose a tag to compare

Added

  • Added new option LDAPAUTHD_SESSION_PREFIX
    • This allows to use a single memcached for multiple ldapauthd instances

Updated

  • Updated container to use latest alpine3.11

v1.2.3

06 Aug 06:40
Compare
Choose a tag to compare

Fixed

  • Retry memcache connection on ConnectionError before raising an exception
    • This introduced the new option LDAPAUTHD_SESSION_RETRY which accepts the count after which the login attempt should fail

v1.2.2

28 Jun 09:39
Compare
Choose a tag to compare

Fixed

  • Use X-Forward-Proto on 307 Redirection instead of hard-coded http

v1.2.1

14 Jun 07:59
Compare
Choose a tag to compare

Fixed

  • On many concurrent requests there was a race-condition with pymemcache resulting in socket timeouts and errors

v1.2.0

17 May 09:59
Compare
Choose a tag to compare

Added

  • Authentication sessions
  • Single-Sign-On with Authentication sessions and LDAPAUTHD_SESSION_DOMAIN

Changed

  • HTTP Headers are now latin1-encoded instead of utf8

New Configurations

  • LDAPAUTHD_SESSION_STORAGE defines the storage backend for sessions. Currently only memcached is available
  • LDAPAUTHD_SESSION_DOMAIN defines the domain for the cookie. This allows your to use Single-Sign-On if configured correctly.
    • For example you have 2 websites running on example.org and sub.example.org. If you set LDAPAUTHD_SESSION_DOMAIN=.example.org the session from example.org will also be available on sub.example.org
  • LDAPAUTHD_SESSION_HOST defines the hostname for your storage backend.
  • LDAPAUTHD_SESSION_TTL defines the maximum seconds a session is valid.

v1.1.1

22 Feb 08:22
Compare
Choose a tag to compare

Changed

  • Boolean config values are now case-insensitive. Alternatively you can use 0=false or 1=true

v1.1.0

21 Feb 12:36
Compare
Choose a tag to compare

Added

  • LDAP_LOGLEVEL to manually set the loglevel for ldap3. Normally you don't need this
  • Logs from ldap3 will be statically logged as ERROR
  • LDAP_ATTRIBUTES to specify any ldap attribute and map them to http response headers.
  • LDAP_ROLEHEADER to specify the http header name for the matched role, if any.
  • This includes a change of how LDAP_ALLOWEDUSERS and LDAP_ALLOWEDGROUPS are parsed, see below

Changed

  • LDAP_ALLOWEDUSERS is now parsed as (json) dictionary: {"username": "role"}
  • LDAP_ALLOWEDGROUPS is now parsed as (json) dictionary: {"cn=mygroup,ou=myou,dc=example,dc=org": "role"}
  • HTTP access logs are now properly logged with ldapauthd logger instead of default HTTP logger

Removed

  • LDAPAUTHD_FORWARD_USER and LDAPAUTHD_FORWARD_EMAIL has been removed in favor of LDAP_ATTRIBUTES

v1.0.0

19 Feb 14:26
Compare
Choose a tag to compare
  • Now supports X-Forwarded-User/X-Forwarded-Email (#4)

v0.2.0

19 Feb 14:08
Compare
Choose a tag to compare
  • Now using ldap3 instead of python-ldap
  • It is now possible to use multiple ldap servers as backend (#3)

v0.1.1

18 Feb 09:03
Compare
Choose a tag to compare

Fixed

  • LDAP_SSL_VALIDATE=False now works as expected (#1)
  • The daemon may now bind to ports <=1023 (#2)