1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
|
### 2.0.1
* Remove verbose warning for cert presence when proxying
### 2.0.0
* Require java 11 or 17 (clj-parent 5.3.0, bouncycastle test dependencies)
* Update clj-parent to 5.3.0 to modernize the dependencies
* Move ring-mock into the dev dependencies
* Remove dependency on n-repl
* Adds ring-codec as a dependency (it was moved out of ring-core in 1.2)
* Changes a test expectation since ring-codec no longer uses java URL Decoder
* fix for clj-rbac-client dependency (Thanks @jcharaou!)
### 1.0.0
* [TK-474](https://tickets.puppetlabs.com/browse/TK-474) Support
rules based on RBAC permissions
### 0.7.0
* [TK-352](https://tickets.puppetlabs.com/browse/TK-352) Support
subject-alt-names.
* [SERVER-1310](https://tickets.puppetlabs.com/browse/SERVER-1310) Use
standard error formats in API responses.
* [SERVER-1300](https://tickets.puppetlabs.com/browse/SERVER-1300) Identify
maintainers and update contact information.
### 0.6.1
* [TK-360](https://tickets.puppetlabs.com/browse/TK-360) Remove IP address,
requestor name, and rule from HTTP response to forbidden requests
* Fixes bug preventing certname entry from working properly in allow/deny map
### 0.6.0
* [TK-293](https://tickets.puppetlabs.com/browse/TK-293) Allow authorization
rules that match on CSR Attributes instead of just certname
### 0.5.1
* [TK-360](https://tickets.puppetlabs.com/browse/TK-360) Remove IP address,
requestor name, and rule from HTTP response to forbidden requests.
### 0.5.0
* [TK-286](https://tickets.puppetlabs.com/browse/TK-286) Rename API term
`authentic?` to `authenticated` for clarity.
* [TK-289](https://tickets.puppetlabs.com/browse/TK-289) No longer log warning
message when rules are out of sort order in configuration file.
* [TK-285](https://tickets.puppetlabs.com/browse/TK-285) Add validation for
rule regex paths with capture groups and allow/deny back-references.
### 0.1.5
* Added API function `authorization-check` to the AuthorizationService
protocol to support authorization from non-Ring-based handlers such as Java
Servlets.
* [TK-268](https://tickets.puppetlabs.com/browse/TK-268) Weight 'deny' ACEs
before 'allow' ACEs - regardless of any attributes of their patterns - to
simplify behavior.
### 0.1.4
* [TK-282](https://tickets.puppetlabs.com/browse/TK-282) Added support for an
`allow-header-cert-info` field to the `authorization` config.
### 0.1.3
* [TK-262](https://tickets.puppetlabs.com/browse/TK-262) Added support for a
`version` field to the `authorization` config.
* [TK-266](https://tickets.puppetlabs.com/browse/TK-266) Added support for
`sort-order` and `name` fields in a rule definition.
* [TK-271](https://tickets.puppetlabs.com/browse/TK-271) Added support for more
than one `method` to be specified in a rule definition.
* [TK-277](https://tickets.puppetlabs.com/browse/TK-277) Use wrapper function
for parsing query-params from the Ring request, to avoid prematurely slurping
a request body for a request which is a urlencoded form post.
* [TK-279](https://tickets.puppetlabs.com/browse/TK-279) Log error-level message
when a request is denied.
* [TK-280](https://tickets.puppetlabs.com/browse/TK-280) Updated the
`README.md` with more documentation on using the trapperkeeper-authorization
service from a developer perspective. Also added a
`doc/authorization-config.md` page which documents the available settings in
the `authorization` configuration.
* Created simple standalone Ring-based example which integrates with
trapperkeeper-authorization.
### 0.1.2
* [TK-259](https://tickets.puppetlabs.com/browse/TK-259) Added support for
matching rules on `query-params` from the request.
* [TK-260](https://tickets.puppetlabs.com/browse/TK-260) Added optional
`allow-unauthenticated` attribute to the rule definition to be used for
specifying that a rule would match any request - whether or not an
authenticated name could be derived for the request.
* [TK-272](https://tickets.puppetlabs.com/browse/TK-272) Fixed ability for the
`deny: "*"` directive to deny - rather than allow - all matching requests.
* [TK-275](https://tickets.puppetlabs.com/browse/TK-275) Move elements of the
rule definition which determine whether the rule is a match for the request
into a `match-request` section.
### 0.1.1
* [TK-258](https://tickets.puppetlabs.com/browse/TK-258) Created a Trapperkeeper
service, AuthorizationService, with a `wrap-with-authorization-check`
function for accessing the authorization middleware from another service.
Rules loaded from `authorization` section in Trapperkeeper configuration.
* Removed ability to obtain the request's authenticated name from a
reverse-proxy DNS lookup when no name can be retrieved from the client
certificate on the request.
* Bumped `puppetlabs/ssl-utils` dependency from 0.8.0 to 0.8.1.
* Authorization failures returned as HTTP 403 instead of 401.
### 0.0.1
* Not released by PuppetLabs. Code imported from the 0.0.1 tag on
https://github.com/masterzen/trapperkeeper-authorization.
|