Commit Graph

140 Commits

Author SHA1 Message Date
Patrik 4103f1b62d
chore: use TLS termination validation middleware from ory/x (#3984) 2025-05-05 10:52:04 +02:00
Patrik 6f592fc842
fix: enable CORS with hot-reloaded origins (#3601) 2023-08-16 11:46:27 +02:00
Arne Luenser 0b56f53a49 feat: bump fosite and add some more tracing 2023-08-08 16:09:06 +02:00
hackerman 807cbd209a
fix: use correct tracer in middleware (#3567) 2023-07-10 15:10:28 +02:00
Misa Munde 3ec683d7cf
feat: sqa metrics v2 (#3533)
Co-authored-by: Patrik <zepatrik@users.noreply.github.com>
2023-06-13 10:37:10 +02:00
Joe Kralicky bef7a2f444
chore(deps): bump github.com/knadh/koanf to v2.0.1 (#3541) 2023-06-10 10:51:43 +02:00
mloiseleur fc7af90440
feat: add metrics to disabled access log (#3526) 2023-05-31 09:14:04 +02:00
Richard Hillmann eddf7f3867
fix: disable health check request logs (#3496) 2023-05-24 08:40:47 +02:00
Misa Munde 1b1899e947
fix: sqa config values unified across projects (#3490) 2023-04-17 13:53:28 +02:00
Arne Luenser f56e5fad74 fix: append /v2 to module path 2023-01-28 08:40:41 +01:00
Kevin Goslar d768cf6580
docs: standardize license headers (#3216) 2022-11-03 10:10:12 -05:00
Arne 1d13be6d3b
feat: hot-reload TLS certificate (#3265) 2022-10-04 13:06:57 +02:00
aeneasr 3a263854d8 fix: make servicelocator explicit 2022-09-07 08:10:31 +02:00
aeneasr e130dfa93c fix: prefix paths correctly with /admin 2022-09-07 08:10:31 +02:00
aeneasr 5552e4df97 fix: resolve migration regressions
BREAKING CHANGES: We removed compatibility with unsupported database versions (e.g. MySQL 5.6). Ory Hydra v2.x is now compatible with MySQL 8.0.13+, PostgreSQL 11.8+, CockroachDB v22.1.2+.
2022-09-07 08:10:31 +02:00
Grant Zvolsky 0752721dd8 refactor(client): rename SDK methods and introduce `/admin` prefix
BREAKING CHANGE: This release updates SDK services from `public` and `admin` to `v2`. Methods exposed at the admin interface are now prefixed with `admin` (e.g. `adminCreateOAuth2Client`). Administrative endpoints now have an `/admin` prefix (e.g. `POST /admin/clients`). Existing administrative endpoints will redirect to this new prefixed path for backwards compatibility.
2022-09-07 08:10:31 +02:00
aeneasr 2d5c8930de feat: make CORS config hot reloadable 2022-09-07 08:10:31 +02:00
aeneasr 9717cad614 feat: improve cookie settings 2022-09-07 08:10:31 +02:00
aeneasr 46b5887464 refactor: deprecate `--dangerous-allow-insecure-redirect-url` flag
BREAKING CHANGE: CLI flag `--dangerous-allow-insecure-redirect-url` has been removed. Please use the `--dev` flag instead!
2022-09-07 08:10:31 +02:00
aeneasr 17c226cc2a refactor: remove `/oauth2/flush` endpoint
BREAKING CHANGE: HTTP endpoint `/oauth2/flush`, used to flush inactive access token was deprecated and has been removed. Please use `hydra janitor` instead.
2022-09-07 08:10:31 +02:00
aeneasr 81503e03e1 chore: fix compile and lint issues 2022-09-07 08:10:31 +02:00
aeneasr 6e59302550 chore: format 2022-09-07 08:10:31 +02:00
aeneasr 13691d3995 fix: remove unnecessary load of TLS certificates at boot 2022-09-07 08:10:31 +02:00
Anirudh Oppiliappan 2ee922938b feat(tracing): add lots of tracing spans (#3125) 2022-09-07 08:10:31 +02:00
aeneasr 68cb7d511f fix: compile issues 2022-09-07 08:10:31 +02:00
aeneasr bbe0406df6 feat: config hot reloading architecture 2022-09-07 08:10:31 +02:00
Grant Zvolsky 47d0518efe feat: switch to otelx (#3108) 2022-09-07 08:10:31 +02:00
Grant Zvolsky 8e961d0eb3 code review 2022-09-07 08:10:31 +02:00
Grant Zvolsky b7fc2bff53 feat: implement NID 2022-09-07 08:10:31 +02:00
Grant Zvolský 9544c03a3b
feat: custom client token ttl (#3206)
This change introduces a new endpoint that allows you to control how long client tokens last. Now you can configure the lifespan for each valid combination of Client, GrantType, and TokenType.

See #3157

Co-authored-by: aeneasr <3372410+aeneasr@users.noreply.github.com>
Co-authored-by: Andreas Bucksteeg <andreas@bucksteeg.de>
2022-07-28 21:12:09 +02:00
seremenko-wish f588ec69d4
fix: prometheus URL label (#2503)
Fixes #2502
2021-05-19 19:48:14 +02:00
Stepan Rakitin 60704d490c
feat: split TLS config into admin and public interfaces (#2476)
Adds the possibility to specify TLS certificates for admin and public endpoints individually. Also improves compatibility for internal networks (e.g. Kubernetes) by removing the need for having TLS termination on admin endpoints. This can be enabled by setting `serve.admin.tls.enabled` to false.


Closes #1231
Closes #1962
2021-04-26 21:55:58 +02:00
Simon Lipp 44fd4e42f0
refactor: move unix socket support helpers into ory/x (#2486)
Co-authored-by: hackerman <3372410+aeneasr@users.noreply.github.com>
2021-04-25 22:28:09 +02:00
aeneasr 6fa591c849 feat: move to go 1.16 and static embed files 2021-03-08 17:24:00 +01:00
hackerman 4937a00b9a
fix: bump ory/x and update config usage (#2248) 2020-12-15 13:55:30 +01:00
aeneasr 8c12b27a59 refactor: replace viper with koanf config management
BREAKING CHANGES: After battling with [spf13/viper](https://github.com/spf13/viper) for several years we finally found a viable alternative with [knadh/koanf](https://github.com/knadh/koanf). The complete internal configuration infrastructure has changed, with several highlights:

1. Configuration sourcing works from all sources (file, env, cli flags) with validation against the configuration schema, greatly improving developer experience when changing or updating configuration.
2. Configuration reloading has improved significantly and works flawlessly on Kubernetes.
3. Performance increased dramatically, completely removing the need for a cache layer between the configuration system and ORY Hydra.
4. It is now possible to load several config files using the `--config` flag.
5. Configuration values are now sent to the tracer (e.g. Jaeger) if tracing is enabled.

Please be aware that deprecated configuration flags have finally been removed with this change. It is also possible that ORY Hydra might complain about an invalid configuration, because the validation process has improved significantly.
2020-12-02 13:37:05 +01:00
aeneasr 083213814c fix: resolve gosec issues and false positives 2020-10-03 12:35:39 +02:00
Ante Mihalj 7d3a1c8605
feat: metrics prometheus endpoint should not require x-forwarded-proto header (#2074)
- moved MetricsPrometheusPath constant to metrics/prometheus/metrics.go
- added rule to allow insecure requests for MetricsPrometheusPath endpoint
- arranged tls_termination_test.go test to cover all cases in RejectInsecureRequests function

Closes #2072
2020-10-02 08:38:13 +02:00
hackerman b36073af48
fix: bump deps to patch CVE-2020-15223 (#2067)
BREAKING CHANGES: As part of this patch, a few things have changed in a breaking fashion:

- OAuth2 Redirection URL error parameters `error_hint`, `error_debug` have been deprecated and now part of `error_description`. The parameters are still included for compatibility reasons but will be removed in a future release.
- OAuth2 Error `revocation_client_mismatch` was not standardized and has been removed. Instead, you will now receive `unauthorized_client` with a description explaning why the flow failed.
2020-09-29 10:01:13 +02:00
Gajewski Dmitriy 39652acb2d
feat: allow to automatically set GOMAXPROCS according to linux container quota (#2034)
Co-authored-by: hackerman <3372410+aeneasr@users.noreply.github.com>
2020-08-31 22:17:44 +02:00
aeneasr dd485581de chore: bump ory/x 2020-08-06 00:10:48 +02:00
Dexter Chua b19b7cfd2e
feat: allow modifying unix socket permissions (#1915)
This allows the reverse proxy to actually read the unix socket, since

 - The default permissions are 0755
 - Hydra is usually run as a user different than the reverse proxy
 - One needs read and write permissions to connect to the socket

With the commit, one can set the group to be a group that contains the
reverse proxy user and permissions to 0770
2020-06-22 16:20:37 +02:00
sawadashota 48c2c6de27
fix: remove duplicated tracing logger (#1900)
Signed-off-by: sawadashota <xiootas@gmail.com>
2020-06-12 09:54:29 +02:00
hackerman 9c6eba8d06
fix: use .bin in PATH and improve CI tasks (#1897) 2020-06-08 19:38:55 +02:00
aeneasr fdb3231e19 fix: resolve dependency issues and adopt logrusx logger 2020-05-28 14:35:37 +02:00
hackerman 9145e65bdd
fix: return proper error code in refresh and code flows (#1800)
Resolves a regression issue which sends an invalid error response
when a refresh token is being re-used, is not found, or the wrong
client is accessing it.

This patch also bumps jose-related tooling which introduces better
security measure against certain types of x509 attacks.

See https://community.ory.sh/t/refresh-token-endpoint-returns-invalid-request-error-expecting-invalid-grant/1637/2
See https://github.com/ory/fosite/pull/426
See https://github.com/ory/fosite/issues/418
2020-04-16 17:54:52 +02:00
hackerman bfeac3c758
refactor: move docs to this repository (#1782) 2020-04-06 15:16:25 +02:00
Patrik 631cefd902
feat: add a config.schema.json and validate the config with it (#1733)
Closes #1729

Co-authored-by: aeneasr <aeneas@ory.sh>
2020-04-06 09:44:26 +02:00
hackerman 622b5853ef
chore: move to ory analytics fork (#1776) 2020-04-03 17:15:38 +02:00
hackerman c6bdbcf18b
fix: move to ory sqa service (#1768) 2020-03-24 18:05:57 +01:00