transfer all changelogs from the extensions to the root

This commit is contained in:
Michael Barz
2020-10-07 12:54:48 +02:00
parent 66df806e45
commit 6c9840f9df
294 changed files with 371 additions and 5159 deletions

View File

@@ -1,478 +0,0 @@
# Changelog for [unreleased] (UNRELEASED)
The following sections list the changes for ocis-proxy unreleased.
[unreleased]: https://github.com/owncloud/ocis/proxy/compare/v0.7.0...master
## Summary
* Bugfix - Fix director selection: [#99](https://github.com/owncloud/ocis/proxy/pull/99)
* Bugfix - Add settings API and app endpoints to example config: [#93](https://github.com/owncloud/ocis/proxy/pull/93)
* Change - Remove accounts caching: [#100](https://github.com/owncloud/ocis/proxy/pull/100)
* Enhancement - Add hello API and app endpoints to example config and builtin config: [#96](https://github.com/owncloud/ocis/proxy/pull/96)
* Enhancement - Add roleIDs to the access token: [#95](https://github.com/owncloud/ocis/proxy/pull/95)
## Details
* Bugfix - Fix director selection: [#99](https://github.com/owncloud/ocis/proxy/pull/99)
We fixed a bug where simultaneous requests could be executed on the wrong backend.
https://github.com/owncloud/ocis/proxy/pull/99
* Bugfix - Add settings API and app endpoints to example config: [#93](https://github.com/owncloud/ocis/proxy/pull/93)
We had the ocis-settings API and app endpoints in the builtin config already, but they were
missing in the example config. Added them for consistency.
https://github.com/owncloud/ocis/proxy/pull/93
* Change - Remove accounts caching: [#100](https://github.com/owncloud/ocis/proxy/pull/100)
We removed the accounts cache in order to avoid problems with accounts that have been updated in
the accounts service.
https://github.com/owncloud/ocis/proxy/pull/100
* Enhancement - Add hello API and app endpoints to example config and builtin config: [#96](https://github.com/owncloud/ocis/proxy/pull/96)
We added the ocis-hello API and app endpoints to both the example config and the builtin config.
https://github.com/owncloud/ocis/proxy/pull/96
* Enhancement - Add roleIDs to the access token: [#95](https://github.com/owncloud/ocis/proxy/pull/95)
We are using the roleIDs of the authenticated user for permission checks against
ocis-settings. We added the roleIDs to the access token to have them available quickly.
https://github.com/owncloud/ocis/proxy/pull/95
# Changelog for [0.7.0] (2020-08-21)
The following sections list the changes for ocis-proxy 0.7.0.
[0.7.0]: https://github.com/owncloud/ocis/proxy/compare/v0.6.0...v0.7.0
## Summary
* Enhancement - Add numeric uid and gid to the access token: [#89](https://github.com/owncloud/ocis/proxy/pull/89)
* Enhancement - Add configuration options for the pre-signed url middleware: [#91](https://github.com/owncloud/ocis/proxy/issues/91)
## Details
* Enhancement - Add numeric uid and gid to the access token: [#89](https://github.com/owncloud/ocis/proxy/pull/89)
The eos storage driver is fetching the uid and gid of a user from the access token. This PR is using
the response of the accounts service to mint them in the token.
https://github.com/owncloud/ocis/proxy/pull/89
* Enhancement - Add configuration options for the pre-signed url middleware: [#91](https://github.com/owncloud/ocis/proxy/issues/91)
Added an option to define allowed http methods for pre-signed url requests. This is useful
since we only want clients to GET resources and don't upload anything with presigned requests.
https://github.com/owncloud/ocis/proxy/issues/91
https://github.com/owncloud/product/issues/150
# Changelog for [0.6.0] (2020-08-17)
The following sections list the changes for ocis-proxy 0.6.0.
[0.6.0]: https://github.com/owncloud/ocis/proxy/compare/v0.5.0...v0.6.0
## Summary
* Bugfix - Enable new accounts by default: [#79](https://github.com/owncloud/ocis/proxy/pull/79)
* Bugfix - Lookup user by id for presigned URLs: [#85](https://github.com/owncloud/ocis/proxy/pull/85)
* Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#78](https://github.com/owncloud/ocis/proxy/pull/78)
* Change - Add settings and ocs group routes: [#81](https://github.com/owncloud/ocis/proxy/pull/81)
* Change - Add route for user provisioning API in ocis-ocs: [#80](https://github.com/owncloud/ocis/proxy/pull/80)
## Details
* Bugfix - Enable new accounts by default: [#79](https://github.com/owncloud/ocis/proxy/pull/79)
When new accounts are created, they also need to be enabled to be useable.
https://github.com/owncloud/ocis/proxy/pull/79
* Bugfix - Lookup user by id for presigned URLs: [#85](https://github.com/owncloud/ocis/proxy/pull/85)
Phoenix will send the `userid`, not the `username` as the `OC-Credential` for presigned URLs.
This PR uses the new `ocisid` claim in the OIDC userinfo to pass the userid to the account
middleware.
https://github.com/owncloud/ocis/issues/436
https://github.com/owncloud/ocis/proxy/pull/85
https://github.com/owncloud/ocis-pkg/pull/50
* Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#78](https://github.com/owncloud/ocis/proxy/pull/78)
ARM builds were failing when built on alpine:edge, so we switched to alpine:latest instead.
https://github.com/owncloud/ocis/proxy/pull/78
* Change - Add settings and ocs group routes: [#81](https://github.com/owncloud/ocis/proxy/pull/81)
Route settings requests and ocs group related requests to new services
https://github.com/owncloud/ocis/proxy/pull/81
* Change - Add route for user provisioning API in ocis-ocs: [#80](https://github.com/owncloud/ocis/proxy/pull/80)
We added a route to send requests on the user provisioning API endpoints to ocis-ocs.
https://github.com/owncloud/ocis/proxy/pull/80
# Changelog for [0.5.0] (2020-07-23)
The following sections list the changes for ocis-proxy 0.5.0.
[0.5.0]: https://github.com/owncloud/ocis/proxy/compare/v0.4.0...v0.5.0
## Summary
* Bugfix - Provide token configuration from config: [#69](https://github.com/owncloud/ocis/proxy/pull/69)
* Bugfix - Provide token configuration from config: [#76](https://github.com/owncloud/ocis/proxy/pull/76)
* Change - Add OIDC config flags: [#66](https://github.com/owncloud/ocis/proxy/pull/66)
* Change - Mint new username property in the reva token: [#62](https://github.com/owncloud/ocis/proxy/pull/62)
* Enhancement - Add Accounts UI routes: [#65](https://github.com/owncloud/ocis/proxy/pull/65)
* Enhancement - Add option to disable TLS: [#71](https://github.com/owncloud/ocis/proxy/issues/71)
* Enhancement - Only send create home request if an account has been migrated: [#52](https://github.com/owncloud/ocis/proxy/issues/52)
* Enhancement - Create a root span on proxy that propagates down to consumers: [#64](https://github.com/owncloud/ocis/proxy/pull/64)
* Enhancement - Support signed URLs: [#73](https://github.com/owncloud/ocis/proxy/issues/73)
## Details
* Bugfix - Provide token configuration from config: [#69](https://github.com/owncloud/ocis/proxy/pull/69)
Fixed a bug that causes the createHome middleware to crash if no configuration for the
TokenManager is propagated.
https://github.com/owncloud/ocis/proxy/pull/69
* Bugfix - Provide token configuration from config: [#76](https://github.com/owncloud/ocis/proxy/pull/76)
Fixed a bug that causes the createHome middleware to crash if the createHome response has no
Status set
https://github.com/owncloud/ocis/proxy/pull/76
* Change - Add OIDC config flags: [#66](https://github.com/owncloud/ocis/proxy/pull/66)
To authenticate requests with an oidc provider we added two environment variables: -
`PROXY_OIDC_ISSUER="https://localhost:9200"` and - `PROXY_OIDC_INSECURE=true`
This changes ocis-proxy to now load the oidc-middleware by default, requiring a bearer token
and exchanging the email in the OIDC claims for an account id at the ocis-accounts service.
Setting `PROXY_OIDC_ISSUER=""` will disable the OIDC middleware.
https://github.com/owncloud/ocis/proxy/pull/66
* Change - Mint new username property in the reva token: [#62](https://github.com/owncloud/ocis/proxy/pull/62)
An accounts username is now taken from the on_premises_sam_account_name property instead of
the preferred_name. Furthermore the group name (also from on_premises_sam_account_name
property) is now minted into the token as well.
https://github.com/owncloud/ocis/proxy/pull/62
* Enhancement - Add Accounts UI routes: [#65](https://github.com/owncloud/ocis/proxy/pull/65)
The accounts service has a ui that requires routing - `/api/v0/accounts` and - `/accounts.js`
To http://localhost:9181
https://github.com/owncloud/ocis/proxy/pull/65
* Enhancement - Add option to disable TLS: [#71](https://github.com/owncloud/ocis/proxy/issues/71)
Can be used to disable TLS when the ocis-proxy is behind an TLS-Terminating reverse proxy.
Env PROXY_TLS=false or --tls=false
https://github.com/owncloud/ocis/proxy/issues/71
https://github.com/owncloud/ocis/proxy/pull/72
* Enhancement - Only send create home request if an account has been migrated: [#52](https://github.com/owncloud/ocis/proxy/issues/52)
This change adds a check if an account has been migrated by getting it from the ocis-accounts
service. If no account is returned it means it hasn't been migrated.
https://github.com/owncloud/ocis/proxy/issues/52
https://github.com/owncloud/ocis/proxy/pull/63
* Enhancement - Create a root span on proxy that propagates down to consumers: [#64](https://github.com/owncloud/ocis/proxy/pull/64)
In order to propagate and correctly associate a span with a request we need a root span that gets
sent to other services.
https://github.com/owncloud/ocis/proxy/pull/64
* Enhancement - Support signed URLs: [#73](https://github.com/owncloud/ocis/proxy/issues/73)
We added a middleware that verifies signed urls as generated by the owncloud-sdk. This allows
directly downloading large files with browsers instead of using `blob://` urls, which eats
memory ...
https://github.com/owncloud/ocis/proxy/issues/73
https://github.com/owncloud/ocis/proxy/pull/75
https://github.com/owncloud/ocis-ocs/pull/18
https://github.com/owncloud/owncloud-sdk/pull/504
# Changelog for [0.4.0] (2020-06-25)
The following sections list the changes for ocis-proxy 0.4.0.
[0.4.0]: https://github.com/owncloud/ocis/proxy/compare/v0.3.1...v0.4.0
## Summary
* Bugfix - Accounts service response was ignored: [#43](https://github.com/owncloud/ocis/proxy/pull/43)
* Bugfix - Fix x-access-token in header: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
* Change - Point /data endpoint to reva frontend: [#45](https://github.com/owncloud/ocis/proxy/pull/45)
* Change - Send autocreate home request to reva gateway: [#51](https://github.com/owncloud/ocis/proxy/pull/51)
* Change - Update to new accounts API: [#39](https://github.com/owncloud/ocis/proxy/issues/39)
* Enhancement - Retrieve Account UUID From User Claims: [#36](https://github.com/owncloud/ocis/proxy/pull/36)
* Enhancement - Create account if it doesn't exist in ocis-accounts: [#55](https://github.com/owncloud/ocis/proxy/issues/55)
* Enhancement - Disable keep-alive on server-side OIDC requests: [#268](https://github.com/owncloud/ocis/issues/268)
* Enhancement - Make jwt secret configurable: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
* Enhancement - Respect account_enabled flag: [#53](https://github.com/owncloud/ocis/proxy/issues/53)
## Details
* Bugfix - Accounts service response was ignored: [#43](https://github.com/owncloud/ocis/proxy/pull/43)
We fixed an error in the AccountUUID middleware that was responsible for ignoring an account
uuid provided by the accounts service.
https://github.com/owncloud/ocis/proxy/pull/43
* Bugfix - Fix x-access-token in header: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
We fixed setting the x-access-token in the request header, which was broken before.
https://github.com/owncloud/ocis/proxy/pull/41
https://github.com/owncloud/ocis/proxy/pull/46
* Change - Point /data endpoint to reva frontend: [#45](https://github.com/owncloud/ocis/proxy/pull/45)
Adjusted example config files to point /data to the reva frontend.
https://github.com/owncloud/ocis/proxy/pull/45
* Change - Send autocreate home request to reva gateway: [#51](https://github.com/owncloud/ocis/proxy/pull/51)
Send autocreate home request to reva gateway
https://github.com/owncloud/ocis/proxy/pull/51
* Change - Update to new accounts API: [#39](https://github.com/owncloud/ocis/proxy/issues/39)
Update to new accounts API
https://github.com/owncloud/ocis/proxy/issues/39
* Enhancement - Retrieve Account UUID From User Claims: [#36](https://github.com/owncloud/ocis/proxy/pull/36)
OIDC Middleware can make use of uuidFromClaims to trade claims.Email for an account's UUID.
For this, a general purpose cache was added that caches on a per-request basis, meaning
whenever the request parameters match a set of keys, the cached value is returned, saving a
round trip to the accounts service that otherwise would happen in every single request.
https://github.com/owncloud/ocis/proxy/pull/36
* Enhancement - Create account if it doesn't exist in ocis-accounts: [#55](https://github.com/owncloud/ocis/proxy/issues/55)
The accounts_uuid middleware tries to get the account from ocis-accounts. If it doens't exist
there yet the proxy creates the account using the ocis-account api.
https://github.com/owncloud/ocis/proxy/issues/55
https://github.com/owncloud/ocis/proxy/issues/58
* Enhancement - Disable keep-alive on server-side OIDC requests: [#268](https://github.com/owncloud/ocis/issues/268)
This should reduce file-descriptor counts
https://github.com/owncloud/ocis/issues/268
https://github.com/owncloud/ocis/proxy/pull/42
https://github.com/cs3org/reva/pull/787
* Enhancement - Make jwt secret configurable: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
We added a config option for the reva token manager JWTSecret. It was hardcoded before and is now
configurable.
https://github.com/owncloud/ocis/proxy/pull/41
* Enhancement - Respect account_enabled flag: [#53](https://github.com/owncloud/ocis/proxy/issues/53)
If the account returned by the accounts service has the account_enabled flag set to false, the
proxy will return immediately with the status code unauthorized.
https://github.com/owncloud/ocis/proxy/issues/53
# Changelog for [0.3.1] (2020-03-31)
The following sections list the changes for ocis-proxy 0.3.1.
[0.3.1]: https://github.com/owncloud/ocis/proxy/compare/v0.3.0...v0.3.1
## Summary
* Change - Update ocis-pkg: [#30](https://github.com/owncloud/ocis/proxy/pull/30)
## Details
* Change - Update ocis-pkg: [#30](https://github.com/owncloud/ocis/proxy/pull/30)
We updated ocis-pkg from 2.0.2 to 2.2.0.
https://github.com/owncloud/ocis/proxy/pull/30
# Changelog for [0.3.0] (2020-03-30)
The following sections list the changes for ocis-proxy 0.3.0.
[0.3.0]: https://github.com/owncloud/ocis/proxy/compare/v0.2.1...v0.3.0
## Summary
* Change - Insecure http-requests are now redirected to https: [#29](https://github.com/owncloud/ocis/proxy/pull/29)
* Enhancement - Configurable OpenID Connect client: [#27](https://github.com/owncloud/ocis/proxy/pull/27)
* Enhancement - Add policy selectors: [#4](https://github.com/owncloud/ocis/proxy/issues/4)
## Details
* Change - Insecure http-requests are now redirected to https: [#29](https://github.com/owncloud/ocis/proxy/pull/29)
https://github.com/owncloud/ocis/proxy/pull/29
* Enhancement - Configurable OpenID Connect client: [#27](https://github.com/owncloud/ocis/proxy/pull/27)
The proxy will try to authenticate every request with the configured OIDC provider.
See configs/proxy-example.oidc.json for an example-configuration.
https://github.com/owncloud/ocis/proxy/pull/27
* Enhancement - Add policy selectors: [#4](https://github.com/owncloud/ocis/proxy/issues/4)
"Static-Policy" can be configured to always select a specific policy. See:
config/proxy-example.json.
"Migration-Policy" selects policy depending on existence of the uid in the ocis-accounts
service. See: config/proxy-example-migration.json
https://github.com/owncloud/ocis/proxy/issues/4
# Changelog for [0.2.1] (2020-03-25)
The following sections list the changes for ocis-proxy 0.2.1.
[0.2.1]: https://github.com/owncloud/ocis/proxy/compare/v0.2.0...v0.2.1
## Summary
* Bugfix - Set TLS-Certificate correctly: [#25](https://github.com/owncloud/ocis/proxy/pull/25)
## Details
* Bugfix - Set TLS-Certificate correctly: [#25](https://github.com/owncloud/ocis/proxy/pull/25)
https://github.com/owncloud/ocis/proxy/pull/25
# Changelog for [0.2.0] (2020-03-25)
The following sections list the changes for ocis-proxy 0.2.0.
[0.2.0]: https://github.com/owncloud/ocis/proxy/compare/v0.1.0...v0.2.0
## Summary
* Change - Route requests based on regex or query parameters: [#21](https://github.com/owncloud/ocis/proxy/issues/21)
* Enhancement - Proxy client urls in default configuration: [#19](https://github.com/owncloud/ocis/proxy/issues/19)
* Enhancement - Make TLS-Cert configurable: [#14](https://github.com/owncloud/ocis/proxy/pull/14)
## Details
* Change - Route requests based on regex or query parameters: [#21](https://github.com/owncloud/ocis/proxy/issues/21)
Some requests needed to be distinguished based on a pattern or a query parameter. We've
implemented the functionality to route requests based on different conditions.
https://github.com/owncloud/ocis/proxy/issues/21
* Enhancement - Proxy client urls in default configuration: [#19](https://github.com/owncloud/ocis/proxy/issues/19)
Proxy /status.php and index.php/*
https://github.com/owncloud/ocis/proxy/issues/19
* Enhancement - Make TLS-Cert configurable: [#14](https://github.com/owncloud/ocis/proxy/pull/14)
Before a generates certificates on every start was used for dev purposes.
https://github.com/owncloud/ocis/proxy/pull/14
# Changelog for [0.1.0] (2020-03-18)
The following sections list the changes for ocis-proxy 0.1.0.
[0.1.0]: https://github.com/owncloud/ocis/proxy/compare/500e303cb544ed93d84153f01219d77eeee44929...v0.1.0
## Summary
* Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis/proxy/issues/1)
* Enhancement - Load Proxy Policies at Runtime: [#17](https://github.com/owncloud/ocis/proxy/issues/17)
## Details
* Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis/proxy/issues/1)
Just prepared an initial basic version.
https://github.com/owncloud/ocis/proxy/issues/1
* Enhancement - Load Proxy Policies at Runtime: [#17](https://github.com/owncloud/ocis/proxy/issues/17)
While a proxy without policies is of no use, the current state of ocis-proxy expects a config
file either at an expected Viper location or specified via -- config-file flag. To ease
deployments and ensure a working set of policies out of the box we need a series of defaults.
https://github.com/owncloud/ocis/proxy/issues/17
https://github.com/owncloud/ocis/proxy/pull/16

View File

@@ -1,5 +0,0 @@
Change: Initial release of basic version
Just prepared an initial basic version.
https://github.com/owncloud/ocis/proxy/issues/1

View File

@@ -1,7 +0,0 @@
Enhancement: Load Proxy Policies at Runtime
While a proxy without policies is of no use, the current state of ocis-proxy expects a config file either at an expected Viper location or specified via -- config-file flag.
To ease deployments and ensure a working set of policies out of the box we need a series of defaults.
https://github.com/owncloud/ocis/proxy/issues/17
https://github.com/owncloud/ocis/proxy/pull/16

View File

@@ -1,6 +0,0 @@
Change: Route requests based on regex or query parameters
Some requests needed to be distinguished based on a pattern or a query parameter.
We've implemented the functionality to route requests based on different conditions.
https://github.com/owncloud/ocis/proxy/issues/21

View File

@@ -1,5 +0,0 @@
Enhancement: Proxy client urls in default configuration
Proxy /status.php and index.php/*
https://github.com/owncloud/ocis/proxy/issues/19

View File

@@ -1,5 +0,0 @@
Enhancement: Make TLS-Cert configurable
Before a generates certificates on every start was used for dev purposes.
https://github.com/owncloud/ocis/proxy/pull/14

View File

@@ -1,3 +0,0 @@
Bugfix: Set TLS-Certificate correctly
https://github.com/owncloud/ocis/proxy/pull/25

View File

@@ -1,8 +0,0 @@
Enhancement: Configurable OpenID Connect client
The proxy will try to authenticate every request with the configured OIDC provider.
See configs/proxy-example.oidc.json for an example-configuration.
https://github.com/owncloud/ocis/proxy/pull/27

View File

@@ -1,10 +0,0 @@
Enhancement: Add policy selectors
"Static-Policy" can be configured to always select a specific policy.
See: config/proxy-example.json.
"Migration-Policy" selects policy depending on existence of the uid in the ocis-accounts service.
See: config/proxy-example-migration.json
https://github.com/owncloud/ocis/proxy/issues/4

View File

@@ -1,4 +0,0 @@
Change: Insecure http-requests are now redirected to https
https://github.com/owncloud/ocis/proxy/pull/29

View File

@@ -1,5 +0,0 @@
Change: Update ocis-pkg
We updated ocis-pkg from 2.0.2 to 2.2.0.
https://github.com/owncloud/ocis/proxy/pull/30

View File

@@ -1,5 +0,0 @@
Enhancement: Retrieve Account UUID From User Claims
OIDC Middleware can make use of uuidFromClaims to trade claims.Email for an account's UUID. For this, a general purpose cache was added that caches on a per-request basis, meaning whenever the request parameters match a set of keys, the cached value is returned, saving a round trip to the accounts service that otherwise would happen in every single request.
https://github.com/owncloud/ocis/proxy/pull/36

View File

@@ -1,7 +0,0 @@
Enhancement: create account if it doesn't exist in ocis-accounts
The accounts_uuid middleware tries to get the account from ocis-accounts.
If it doens't exist there yet the proxy creates the account using the ocis-account api.
https://github.com/owncloud/ocis/proxy/issues/55
https://github.com/owncloud/ocis/proxy/issues/58

View File

@@ -1,6 +0,0 @@
Bugfix: Accounts service response was ignored
We fixed an error in the AccountUUID middleware that was responsible for ignoring an account uuid
provided by the accounts service.
https://github.com/owncloud/ocis/proxy/pull/43

View File

@@ -1,7 +0,0 @@
Enhancement: Disable keep-alive on server-side OIDC requests
This should reduce file-descriptor counts
https://github.com/owncloud/ocis/issues/268
https://github.com/owncloud/ocis/proxy/pull/42
https://github.com/cs3org/reva/pull/787

View File

@@ -1,5 +0,0 @@
Enhancement: Make jwt secret configurable
We added a config option for the reva token manager JWTSecret. It was hardcoded before and is now configurable.
https://github.com/owncloud/ocis/proxy/pull/41

View File

@@ -1,5 +0,0 @@
Change: Point /data endpoint to reva frontend
Adjusted example config files to point /data to the reva frontend.
https://github.com/owncloud/ocis/proxy/pull/45

View File

@@ -1,6 +0,0 @@
Enhancement: respect account_enabled flag
If the account returned by the accounts service has the account_enabled flag
set to false, the proxy will return immediately with the status code unauthorized.
https://github.com/owncloud/ocis/proxy/issues/53

View File

@@ -1,5 +0,0 @@
Change: Send autocreate home request to reva gateway
Send autocreate home request to reva gateway
https://github.com/owncloud/ocis/proxy/pull/51

View File

@@ -1,6 +0,0 @@
Bugfix: Fix x-access-token in header
We fixed setting the x-access-token in the request header, which was broken before.
https://github.com/owncloud/ocis/proxy/pull/41
https://github.com/owncloud/ocis/proxy/pull/46

View File

@@ -1,5 +0,0 @@
Change: Update to new accounts API
Update to new accounts API
https://github.com/owncloud/ocis/proxy/issues/39

View File

@@ -1,9 +0,0 @@
Enhancement: Add Accounts UI routes
The accounts service has a ui that requires routing
- `/api/v0/accounts` and
- `/accounts.js`
to http://localhost:9181
https://github.com/owncloud/ocis/proxy/pull/65

View File

@@ -1,9 +0,0 @@
Enhancement: Add option to disable TLS
Can be used to disable TLS when the ocis-proxy is behind an
TLS-Terminating reverse proxy.
env PROXY_TLS=false or --tls=false
https://github.com/owncloud/ocis/proxy/issues/71
https://github.com/owncloud/ocis/proxy/pull/72

View File

@@ -1,11 +0,0 @@
Change: Add OIDC config flags
To authenticate requests with an oidc provider we added two environment variables:
- `PROXY_OIDC_ISSUER="https://localhost:9200"` and
- `PROXY_OIDC_INSECURE=true`
This changes ocis-proxy to now load the oidc-middleware by default, requiring a bearer token and exchanging the email in the OIDC claims for an account id at the ocis-accounts service.
Setting `PROXY_OIDC_ISSUER=""` will disable the OIDC middleware.
https://github.com/owncloud/ocis/proxy/pull/66

View File

@@ -1,7 +0,0 @@
Enhancement: only send create home request if an account has been migrated
This change adds a check if an account has been migrated by getting it from the
ocis-accounts service. If no account is returned it means it hasn't been migrated.
https://github.com/owncloud/ocis/proxy/issues/52
https://github.com/owncloud/ocis/proxy/pull/63

View File

@@ -1,5 +0,0 @@
Bugfix: Provide token configuration from config
Fixed a bug that causes the createHome middleware to crash if no configuration for the TokenManager is propagated.
https://github.com/owncloud/ocis/proxy/pull/69

View File

@@ -1,5 +0,0 @@
Bugfix: Provide token configuration from config
Fixed a bug that causes the createHome middleware to crash if the createHome response has no Status set
https://github.com/owncloud/ocis/proxy/pull/76

View File

@@ -1,5 +0,0 @@
Enhancement: Create a root span on proxy that propagates down to consumers
In order to propagate and correctly associate a span with a request we need a root span that gets sent to other services.
https://github.com/owncloud/ocis/proxy/pull/64

View File

@@ -1,8 +0,0 @@
Enhancement: Support signed URLs
We added a middleware that verifies signed urls as generated by the owncloud-sdk. This allows directly downloading large files with browsers instead of using `blob://` urls, which eats memory ...
https://github.com/owncloud/ocis/proxy/issues/73
https://github.com/owncloud/ocis/proxy/pull/75
https://github.com/owncloud/ocis-ocs/pull/18
https://github.com/owncloud/owncloud-sdk/pull/504

View File

@@ -1,6 +0,0 @@
Change: mint new username property in the reva token
An accounts username is now taken from the on_premises_sam_account_name property instead of the preferred_name.
Furthermore the group name (also from on_premises_sam_account_name property) is now minted into the token as well.
https://github.com/owncloud/ocis/proxy/pull/62

View File

@@ -1,5 +0,0 @@
Bugfix: enable new accounts by default
When new accounts are created, they also need to be enabled to be useable.
https://github.com/owncloud/ocis/proxy/pull/79

View File

@@ -1,7 +0,0 @@
Bugfix: Lookup user by id for presigned URLs
Phoenix will send the `userid`, not the `username` as the `OC-Credential` for presigned URLs. This PR uses the new `ocisid` claim in the OIDC userinfo to pass the userid to the account middleware.
https://github.com/owncloud/ocis/proxy/pull/85
https://github.com/owncloud/ocis-pkg/pull/50
https://github.com/owncloud/ocis/issues/436

View File

@@ -1,5 +0,0 @@
Change: add settings and ocs group routes
Route settings requests and ocs group related requests to new services
https://github.com/owncloud/ocis/proxy/pull/81

View File

@@ -1,5 +0,0 @@
Bugfix: build docker images with alpine:latest instead of alpine:edge
ARM builds were failing when built on alpine:edge, so we switched to alpine:latest instead.
https://github.com/owncloud/ocis/proxy/pull/78

View File

@@ -1,5 +0,0 @@
Change: Add route for user provisioning API in ocis-ocs
We added a route to send requests on the user provisioning API endpoints to ocis-ocs.
https://github.com/owncloud/ocis/proxy/pull/80

View File

@@ -1,5 +0,0 @@
Enhancement: Add numeric uid and gid to the access token
The eos storage driver is fetching the uid and gid of a user from the access token. This PR is using the response of the accounts service to mint them in the token.
https://github.com/owncloud/ocis/proxy/pull/89

View File

@@ -1,7 +0,0 @@
Enhancement: add configuration options for the pre-signed url middleware
Added an option to define allowed http methods for pre-signed url requests.
This is useful since we only want clients to GET resources and don't upload anything with presigned requests.
https://github.com/owncloud/ocis/proxy/issues/91
https://github.com/owncloud/product/issues/150

View File

@@ -1,53 +0,0 @@
{{ $allVersions := . }}
{{- range $index, $changes := . }}{{ with $changes -}}
{{ if gt (len $allVersions) 1 -}}
# Changelog for [{{ .Version }}] ({{ .Date }})
The following sections list the changes for ocis-proxy {{ .Version }}.
{{/* creating version compare links */ -}}
{{ $next := add1 $index -}}
{{ if ne (len $allVersions) $next -}}
{{ $previousVersion := (index $allVersions $next).Version -}}
{{ if eq .Version "unreleased" -}}
[{{ .Version }}]: https://github.com/owncloud/ocis/proxy/compare/v{{ $previousVersion }}...master
{{ else -}}
[{{ .Version }}]: https://github.com/owncloud/ocis/proxy/compare/v{{ $previousVersion }}...v{{ .Version }}
{{ end -}}
{{ end -}}
{{- /* last version managed by calens, end of the loop */ -}}
{{ if eq .Version "0.1.0" -}}
[{{ .Version }}]: https://github.com/owncloud/ocis/proxy/compare/500e303cb544ed93d84153f01219d77eeee44929...v{{ .Version }}
{{ end -}}
{{ else -}}
# Changes in {{ .Version }}
{{ end -}}
## Summary
{{ range $entry := .Entries }}{{ with $entry }}
* {{ .Type }} - {{ .Title }}: [#{{ .PrimaryID }}]({{ .PrimaryURL }})
{{- end }}{{ end }}
## Details
{{ range $entry := .Entries }}{{ with $entry }}
* {{ .Type }} - {{ .Title }}: [#{{ .PrimaryID }}]({{ .PrimaryURL }})
{{ range $par := .Paragraphs }}
{{ wrapIndent $par 80 3 }}
{{ end -}}
{{ range $url := .IssueURLs }}
{{ $url -}}
{{ end -}}
{{ range $url := .PRURLs }}
{{ $url -}}
{{ end -}}
{{ range $url := .OtherURLs }}
{{ $url -}}
{{ end }}
{{ end }}{{ end -}}
{{ end }}{{ end -}}

View File

@@ -1,6 +0,0 @@
# Changelog
We are using [calens](https://github.com/restic/calens) to properly generate a
changelog before we are tagging a new release. To get an idea how this could
look like <https://github.com/restic/restic/tree/master/changelog> would be the
best reference.

View File

@@ -1,11 +0,0 @@
Bugfix: Fix behavior for foobar (in present tense)
We've fixed the behavior for foobar, a long-standing annoyance for users. The
text should be wrapped at 80 characters length.
The text in the paragraphs is written in past tense. The last section is a list
of issue URLs, PR URLs and other URLs. The first issue ID (or the first PR ID,
in case there aren't any issue links) is used as the primary ID.
https://github.com/owncloud/ocis/proxy/issues/1234
https://github.com/owncloud/ocis/proxy/pull/55555

View File

@@ -1,6 +0,0 @@
Enhancement: Add autoprovision accounts flag
Added a new `PROXY_AUTOPROVISION_ACCOUNTS` environment variable. When enabled, the proxy will try to create a new account when it cannot match the username or email from the oidc userinfo to an existing user. Enable it to learn users from an external identity provider. Defaults to false.
https://github.com/owncloud/product/issues/219
https://github.com/owncloud/ocis/issues/629

View File

@@ -1,5 +0,0 @@
Bugfix: Fix director selection
We fixed a bug where simultaneous requests could be executed on the wrong backend.
https://github.com/owncloud/ocis/proxy/pull/99

View File

@@ -1,5 +0,0 @@
Enhancement: Add hello API and app endpoints to example config and builtin config
We added the ocis-hello API and app endpoints to both the example config and the builtin config.
https://github.com/owncloud/ocis/proxy/pull/96

View File

@@ -1,5 +0,0 @@
Enhancement: Add roleIDs to the access token
We are using the roleIDs of the authenticated user for permission checks against ocis-settings. We added the roleIDs to the access token to have them available quickly.
https://github.com/owncloud/ocis/proxy/pull/95

View File

@@ -1,6 +0,0 @@
Enhancement: Add version command
Added a command to list the currently running services with their respective version.
Also added a metrics entry for build information which includes the service version.
https://github.com/owncloud/product/issues/226

View File

@@ -1,5 +0,0 @@
Change: Remove accounts caching
We removed the accounts cache in order to avoid problems with accounts that have been updated in the accounts service.
https://github.com/owncloud/ocis/proxy/pull/100

View File

@@ -1,6 +0,0 @@
Bugfix: Add settings API and app endpoints to example config
We had the ocis-settings API and app endpoints in the builtin config already, but they were missing in the example
config. Added them for consistency.
https://github.com/owncloud/ocis/proxy/pull/93

View File

@@ -76,10 +76,12 @@ github.com/Masterminds/goutils v1.1.0/go.mod h1:8cTjp+g8YejhMuvIA5y2vz3BpJxksy86
github.com/Masterminds/semver v1.4.2/go.mod h1:MB6lktGJrhw8PrUyiEoblNEGEQ+RzHPF078ddwwvV3Y=
github.com/Masterminds/semver v1.5.0 h1:H65muMkzWKEuNDnfl9d70GUjFniHKHRbFPGBuZ3QEww=
github.com/Masterminds/semver v1.5.0/go.mod h1:MB6lktGJrhw8PrUyiEoblNEGEQ+RzHPF078ddwwvV3Y=
github.com/Masterminds/semver/v3 v3.0.2 h1:tRi7ENs+AaOUCH+j6qwNQgPYfV26dX3JNonq+V4mhqc=
github.com/Masterminds/semver/v3 v3.0.2/go.mod h1:VPu/7SZ7ePZ3QOrcuXROw5FAcLl4a0cBrbBpGY/8hQs=
github.com/Masterminds/semver/v3 v3.1.0/go.mod h1:VPu/7SZ7ePZ3QOrcuXROw5FAcLl4a0cBrbBpGY/8hQs=
github.com/Masterminds/sprig v2.22.0+incompatible h1:z4yfnGrZ7netVz+0EDJ0Wi+5VZCSYp4Z0m2dk6cEM60=
github.com/Masterminds/sprig v2.22.0+incompatible/go.mod h1:y6hNFY5UBTIWBxnzTeuNhlNS5hqE0NB0E6fgfo2Br3o=
github.com/Masterminds/sprig/v3 v3.0.1 h1:RuaOafp+8qOLUPX1lInLfUrLc1MEVbnz7a40RLoixKY=
github.com/Masterminds/sprig/v3 v3.0.1/go.mod h1:Cp7HwZjmqKrC+Y7XqSJOU2yRvAJRGLiohfgz5ZJj8+4=
github.com/Masterminds/sprig/v3 v3.1.0/go.mod h1:ONGMf7UfYGAbMXCZmQLy8x3lCDIPrEZE/rU8pmrbihA=
github.com/Microsoft/go-winio v0.4.11/go.mod h1:VhR8bwka0BXejwEJY73c50VrPtXAaKcyvVC4A4RozmA=
@@ -743,6 +745,7 @@ github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
github.com/huandu/xstrings v1.0.0/go.mod h1:4qWG/gcEcfX4z/mBDHJ++3ReCw9ibxbsNJbcucJdbSo=
github.com/huandu/xstrings v1.2.0/go.mod h1:DvyZB1rfVYsBIigL8HwpZgxHwXozlTgGqn63UyNX5k4=
github.com/huandu/xstrings v1.3.0 h1:gvV6jG9dTgFEncxo+AF7PH6MZXi/vZl25owA/8Dg8Wo=
github.com/huandu/xstrings v1.3.0/go.mod h1:y5/lhBue+AyNmUVz9RLU9xbLR0o4KIIExikq4ovT0aE=
github.com/huandu/xstrings v1.3.1/go.mod h1:y5/lhBue+AyNmUVz9RLU9xbLR0o4KIIExikq4ovT0aE=
github.com/huandu/xstrings v1.3.2 h1:L18LIDzqlW6xN2rEkpdV8+oL/IXWJ1APd+vsdYy4Wdw=
@@ -956,6 +959,7 @@ github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh
github.com/mitchellh/mapstructure v1.3.1/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo=
github.com/mitchellh/mapstructure v1.3.3 h1:SzB1nHZ2Xi+17FP0zVQBHIZqvwRN9408fJO8h+eeNA8=
github.com/mitchellh/mapstructure v1.3.3/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo=
github.com/mitchellh/reflectwalk v1.0.0 h1:9D+8oIskB4VJBN5SFlmc27fSlIBZaov1Wpk/IfikLNY=
github.com/mitchellh/reflectwalk v1.0.0/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw=
github.com/mitchellh/reflectwalk v1.0.1 h1:FVzMWA5RllMAKIdUSC8mdWo3XtwoecrH79BY70sEEpE=
github.com/mitchellh/reflectwalk v1.0.1/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw=
@@ -1180,6 +1184,7 @@ github.com/rcrowley/go-metrics v0.0.0-20190826022208-cac0b30c2563/go.mod h1:bCqn
github.com/refs/pman v0.0.0-20200701173654-f05b8833071a/go.mod h1:fp4xg8dOs/XaZfB3abn1pxvclh10MtG4tdCc61lrmCo=
github.com/remyoudompheng/bigfft v0.0.0-20200410134404-eec4a21b6bb0/go.mod h1:qqbHyh8v60DhA7CoWK5oRCqLrMHRGoxYCSS9EjAz6Eo=
github.com/restic/calens v0.1.0/go.mod h1:u67f5msOjCTDYNzOf/NoAUSdmXP03YXPCwIQLYADy5M=
github.com/restic/calens v0.2.0 h1:LVNAtmFc+Pb4ODX66qdX1T3Di1P0OTLyUsVyvM/xD7E=
github.com/restic/calens v0.2.0/go.mod h1:UXwyAKS4wsgUZGEc7NrzzygJbLsQZIo3wl+62Q1wvmU=
github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg=
github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ=