# Changelog

# Changelog

# v0.12.0 (opens new window) (2021-01-07)

Full Changelog (opens new window)

# New

# Fixed

# Documentation

# Dependency

# Deployment

# Changed

# v0.11.1 (opens new window) (2020-12-11)

Full Changelog (opens new window)

# Fixed

# Documentation

# Deployment

# v0.11.0 (opens new window) (2020-12-04)

Full Changelog (opens new window)

# Breaking

# New

# Fixed

# Security

# Documentation

# Dependency

# Deployment

# Changed

# v0.11.0-rc2 (opens new window) (2020-11-19)

Full Changelog (opens new window)

# New

# Fixed

# Dependency

# Changed

# v0.11.0-rc1 (opens new window) (2020-11-13)

Full Changelog (opens new window)

# Breaking

# New

# Fixed

# Documentation

# Dependency

# Deployment

# Changed

# v0.10.6 (opens new window) (2020-09-30)

Full Changelog (opens new window)

# Changed

# v0.10.5 (opens new window) (2020-09-28)

Full Changelog (opens new window)

# Documentation

# Changed

# v0.10.4 (opens new window) (2020-09-22)

Full Changelog (opens new window)

# Documentation

# Changed

# v0.10.3 (opens new window) (2020-09-11)

Full Changelog (opens new window)

# Changed

# v0.10.2 (opens new window) (2020-08-26)

Full Changelog (opens new window)

# Documentation

# Changed

# v0.10.1 (opens new window) (2020-08-20)

Full Changelog (opens new window)

# Documentation

# Changed

# v0.10.0

# Changes

  • Add storage backend interface @cuonglm GH-1072
  • all: update outdated comments about OptionsUpdater interface @cuonglm GH-1207
  • Allow specify go executable in Makefile @cuonglm GH-1008
  • audit: add protobuf definitions @calebdoxsey GH-1047
  • authenticate: hide impersonation form from non-admin users @cuonglm GH-979
  • authenticate: move impersonate from proxy to authenticate @calebdoxsey GH-965
  • authenticate: remove useless/duplicated code block @cuonglm GH-962
  • authenticate: revoke current session oauth token before sign out @cuonglm GH-964
  • authorize,proxy: allow traefik forward auth without uri query @cuonglm GH-1103
  • authorize: add evaluator store @calebdoxsey GH-1105
  • authorize: add test for denied response @cuonglm GH-1197
  • authorize: avoid serializing databroker data map to improve performance @calebdoxsey GH-995
  • authorize: clear session state if session was deleted in databroker @cuonglm GH-1053
  • authorize: derive check response message from reply message @cuonglm GH-1193
  • authorize: include "kid" in JWT header @cuonglm GH-1049
  • authorize: store policy evaluator on success only @cuonglm GH-1206
  • authorize/evaluator: add more test cases @cuonglm GH-1198
  • authorize/evaluator: fix wrong custom policies decision @cuonglm GH-1199
  • authorize/evaluator/opa: use route policy object instead of array index @cuonglm GH-1001
  • cache: add client telemetry @travisgroth GH-975
  • cache: add test for runMemberList @cuonglm GH-1007
  • cache: attempt to join memberlist cluster for sanity check @travisgroth GH-1004
  • cache: fix missing parameter @travisgroth GH-1005
  • cache: only run memberlist for in-memory databroker @travisgroth GH-1224
  • ci: Add cloudrun build @travisgroth GH-1097
  • ci: support rc releases @travisgroth GH-1011
  • cmd/pomerium-cli: do not require terminal with cached creds @travisgroth GH-1196
  • config: add check to assert service account is required for policies with allowed_groups @desimone GH-997
  • config: add support for policies stored in the databroker @calebdoxsey GH-1099
  • config: additional kubernetes token source support @travisgroth GH-1200
  • config: allow setting directory sync interval and timeout @cuonglm GH-1098
  • config: default to google idp credentials for serverless @travisgroth GH-1170
  • config: fix loading storage client cert from wrong location @travisgroth GH-1212
  • config: Set loopback address by ipv4 IP @travisgroth GH-1116
  • cryptutil: move to pkg dir, add token generator @calebdoxsey GH-1029
  • deployment: fix brew creation for pomerium-cli @travisgroth GH-1192
  • directory.Group entry for groups @calebdoxsey GH-1118
  • docs/docs: update upgrading to mention redis storage backend @cuonglm GH-1172
  • envoy: disable idle timeouts to controlplane @travisgroth GH-1000
  • grpc: rename internal/grpc to pkg/grpc @calebdoxsey GH-1010
  • grpc: use relative paths in codegen @desimone GH-1106
  • grpcutil: add functions for JWTs in gRPC metadata @calebdoxsey GH-1165
  • Increasing authorize coverage @cuonglm GH-1221
  • integration: add dummy value for idp_service_account @cuonglm GH-1009
  • internal/controlplane: set envoy prefix rewrite if present @cuonglm GH-1034
  • internal/controlplane: using envoy strip host port matching @cuonglm GH-1126
  • internal/databroker: handle new db error @cuonglm GH-1129
  • internal/databroker: store server version @cuonglm GH-1121
  • internal/directory: improve google user groups list @cuonglm GH-1092
  • internal/directory: use both id and name for group @cuonglm GH-1086
  • internal/directory/google: return both group e-mail and id @travisgroth GH-1083
  • internal/frontend/assets/html: make timestamp human readable @cuonglm GH-1107
  • internal/sessions: handle claims "ver" field generally @cuonglm GH-990
  • internal/urlutil: add tests for GetDomainsForURL @cuonglm GH-1183
  • memberlist: use bufio reader instead of scanner @calebdoxsey GH-1002
  • config: options refactor @calebdoxsey GH-1088
  • pkg: add grpcutil package @calebdoxsey GH-1032
  • pkg/storage: add package docs @cuonglm GH-1078
  • pkg/storage: change backend interface to return error @cuonglm GH-1131
  • pkg/storage: introduce storage.Backend Watch method @cuonglm GH-1135
  • pkg/storage: make Watch returns receive only channel @cuonglm GH-1211
  • pkg/storage/redis: do not use timeout to signal redis conn to stop @cuonglm GH-1155
  • pkg/storage/redis: fix multiple data race @cuonglm GH-1210
  • pkg/storage/redis: metrics updates @travisgroth GH-1195
  • pkg/storage/redis: move last version to redis @cuonglm GH-1134
  • proxy: add support for spdy upgrades @travisgroth GH-1203
  • proxy: avoid second policy validation @travisgroth GH-1204
  • proxy: refactor handler setup code @travisgroth GH-1205
  • set session state expiry @calebdoxsey GH-1215
  • Sleep longer before running integration tests @cuonglm GH-968
  • telemetry: add tracing spans to cache and databroker @travisgroth GH-987

# New

  • authenticate: allow hot reloaded admin users config @cuonglm [GH-984]
  • authenticate: support hot reloaded config @cuonglm GH-984
  • authorize: custom rego policies @calebdoxsey GH-1123
  • authorize: include "kid" in JWT headers @cuonglm [GH-1046]
  • azure: use OID for user id in session @calebdoxsey GH-985
  • config: add pass_identity_headers @cuonglm [GH-903]
  • config: add remove_request_headers @cuonglm [GH-822]
  • config: both base64 and file reference can be used for "certificates" @dmitrif [GH-1055]
  • config: change config key parsing to attempt Base64 decoding first. @dmitrif GH-1055
  • config: change default log level to INFO @cuonglm [GH-902]
  • custom rego in databroker @calebdoxsey GH-1124
  • databroker server backend config @cuonglm GH-1127
  • databroker: add encryption for records @calebdoxsey GH-1168
  • deploy: Add homebrew tap publishing @travisgroth GH-1179
  • deployment: cut separate archive for cli @desimone GH-1177
  • directory: add service account struct and parsing method @calebdoxsey GH-971
  • envoy: enable strip host port matching @cuonglm [GH-1126]
  • github: implement github directory provider @calebdoxsey GH-963
  • google: store directory information by user id @calebdoxsey GH-988
  • identity: support custom code flow request params @desimone GH-998
  • implement google cloud serverless authentication @calebdoxsey GH-1080
  • internal/directory/okta: store directory information by user id @cuonglm GH-991
  • internal/directory/onelogin: store directory information by user id @cuonglm GH-992
  • kubernetes apiserver integration @calebdoxsey GH-1063
  • pkg/storage/redis: add authentication support @cuonglm GH-1159
  • pkg/storage/redis: add redis TLS support @cuonglm GH-1163
  • pomerium-cli k8s exec-credential @calebdoxsey GH-1073
  • redis storage backend @cuonglm GH-1082
  • telmetry: add databroker storage metrics and tracing @travisgroth GH-1161
  • use custom binary for arm64 linux release @calebdoxsey GH-1065

# Fixed

  • authenticate: fix wrong condition checking in VerifySession @cuonglm GH-1146
  • authenticate: fix wrong SignIn telemetry name @cuonglm GH-1038
  • authorize: Force redirect scheme to https @travisgroth GH-1075
  • authorize: strip port from host header if necessary @cuonglm GH-1175
  • authorize/evaluator/opa: set client tls cert usage explicitly @travisgroth GH-1026
  • authorize/evaluator/opa/policy: fix allow rules with impersonate @cuonglm GH-1094
  • cache: fix data race in NotifyJoin @cuonglm GH-1028
  • ci: fix arm docker image releases @travisgroth GH-1178
  • ci: Prevent dirty git state @travisgroth GH-1117
  • ci: release fixes @travisgroth GH-1181
  • config: fix deep copy of config @calebdoxsey GH-1089
  • controlplane: add robots route @desimone GH-966
  • deploy: ensure pomerium-cli is built correctly @travisgroth GH-1180
  • deployment: fix pomerium-cli release @desimone GH-1104
  • envoy: Set ExtAuthz Cluster name to URL Host @travisgroth GH-1132
  • fix databroker restart versioning, handle missing sessions @calebdoxsey GH-1145
  • fix lint errors @travisgroth GH-1171
  • fix redirect loop, remove user/session services, remove duplicate deleted_at fields @calebdoxsey GH-1162
  • handle example.com and example.com:443 @calebdoxsey GH-1153
  • internal/controlplane: enable envoy use remote address @cuonglm GH-1023
  • internal/databroker: fix wrong server version init @cuonglm GH-1125
  • pkg/grpc: fix wrong audit protoc gen file @cuonglm GH-1048
  • pkg/storage/redis: handling connection to redis backend failure @cuonglm GH-1174
  • pomerium-cli: fix kubernetes token caching @calebdoxsey GH-1169
  • pomerium-cli: kubernetes fixes @calebdoxsey GH-1176
  • proxy: do not set X-Pomerium-Jwt-Assertion/X-Pomerium-Claim-* headers by default @cuonglm [GH-903]
  • proxy: fix invalid session after logout in forward auth mode @cuonglm GH-1062
  • proxy: fix redirect url with traefik forward auth @cuonglm GH-1037
  • proxy: fix wrong forward auth request @cuonglm GH-1030

# Documentation

  • docs: Update synology.md @roulesse GH-1219
  • docs: add installation section @travisgroth GH-1223
  • docs: add kubectl config commands @travisgroth GH-1152
  • docs: add kubernetes docs @calebdoxsey GH-1087
  • docs: add recipe for TiddlyWiki on Node.js @favadi GH-1143
  • docs: add required in cookie_secret @mig4ng GH-1142
  • docs: add warnings cones around requiring IdP Service Accounts @travisgroth GH-999
  • docs: cloud Run / GCP Serverless @travisgroth GH-1101
  • docs: document preserve_host_header with policy routes to static ip @cuonglm GH-1024
  • docs: fix incorrect example middleware @travisgroth GH-1128
  • docs: fix links, clarify upgrade guide for v0.10 @desimone GH-1220
  • docs: fix minor errors @travisgroth GH-1214
  • docs: Kubernetes topic @travisgroth GH-1222
  • docs: Move examples repo into main repo @travisgroth GH-1102
  • docs: Redis and stateful storage docs @travisgroth GH-1173
  • docs: refactor sections, consolidate examples @desimone GH-1164
  • docs: rename docs/reference to docs/topics @desimone GH-1182
  • docs: service account instructions for azure @calebdoxsey GH-969
  • docs: service account instructions for gitlab @calebdoxsey GH-970
  • docs: update architecture diagrams + descriptions @travisgroth GH-1218
  • docs: update GitHub documentation for service account @calebdoxsey GH-967
  • docs: Update Istio VirtualService example @jeffhubLR GH-1006
  • docs: update okta service account docs to match new format @calebdoxsey GH-972
  • Docs: Update README stating specific requirements for SIGNING_KEY @bradjones1 GH-1217
  • docs: update reference docs @desimone GH-1208
  • docs: update service account instructions for OneLogin @calebdoxsey GH-973
  • docs: update upgrading document for breaking changes @calebdoxsey GH-974
  • docs/.vuepress: fix missing local-oidc recipes section @cuonglm GH-1147
  • docs/configuration: add doc for trailing slash limitation in "To" field @cuonglm GH-1040
  • docs/docs: add changelog for #1055 @cuonglm GH-1084
  • docs/docs/identity-providers: document gitlab default scopes changed @cuonglm GH-980
  • docs/recipes: add local oidc example @cuonglm GH-1045

# Dependency

  • chore(deps): bump envoy to 1.15.0 @desimone GH-1119
  • chore(deps): google.golang.org/genproto commit hash to da3ae01 @renovate GH-1138
  • chore(deps): module google/go-cmp to v0.5.1 @renovate GH-1139
  • chore(deps): update envoy to 1.14.4 @desimone GH-1076
  • chore(deps): update github.com/skratchdot/open-golang commit hash to eef8423 @renovate GH-1108
  • chore(deps): update golang.org/x/crypto commit hash to 123391f @renovate GH-1184
  • chore(deps): update golang.org/x/crypto commit hash to 948cd5f @renovate GH-1056
  • chore(deps): update golang.org/x/net commit hash to 4c52546 @renovate GH-1017
  • chore(deps): update golang.org/x/net commit hash to ab34263 @renovate GH-1057
  • chore(deps): update golang.org/x/sync commit hash to 6e8e738 @renovate GH-1018
  • chore(deps): update google.golang.org/genproto commit hash to 11fb19a @renovate GH-1109
  • chore(deps): update google.golang.org/genproto commit hash to 8145dea @renovate GH-1185
  • chore(deps): update google.golang.org/genproto commit hash to 8698661 @renovate GH-1058
  • chore(deps): update google.golang.org/genproto commit hash to 8e8330b @renovate GH-1039
  • chore(deps): update google.golang.org/genproto commit hash to ee7919e @renovate GH-1019
  • chore(deps): update google.golang.org/genproto commit hash to fbb79ea @renovate GH-945
  • chore(deps): update module cenkalti/backoff/v4 to v4.0.2 @renovate GH-946
  • chore(deps): update module contrib.go.opencensus.io/exporter/jaeger to v0.2.1 @renovate GH-1186
  • chore(deps): update module contrib.go.opencensus.io/exporter/zipkin to v0.1.2 @renovate GH-1187
  • chore(deps): update module envoyproxy/go-control-plane to v0.9.6 @renovate GH-1059
  • chore(deps): update module go.opencensus.io to v0.22.4 @renovate GH-948
  • chore(deps): update module golang/mock to v1.4.4 @renovate GH-1188
  • chore(deps): update module google.golang.org/api to v0.28.0 @renovate GH-949
  • chore(deps): update module google.golang.org/api to v0.29.0 @renovate GH-1060
  • chore(deps): update module google.golang.org/grpc to v1.30.0 @renovate GH-1020
  • chore(deps): update module google.golang.org/grpc to v1.31.0 @renovate GH-1189
  • chore(deps): update module google.golang.org/protobuf to v1.25.0 @renovate GH-1021
  • chore(deps): update module google/go-cmp to v0.5.0 @renovate GH-950
  • chore(deps): update module hashicorp/memberlist to v0.2.2 @renovate GH-951
  • chore(deps): update module open-policy-agent/opa to v0.21.0 @renovate GH-952
  • chore(deps): update module open-policy-agent/opa to v0.21.1 @renovate GH-1061
  • chore(deps): update module open-policy-agent/opa to v0.22.0 @renovate GH-1110
  • chore(deps): update module prometheus/client_golang to v1.7.0 @renovate GH-953
  • chore(deps): update module prometheus/client_golang to v1.7.1 @renovate GH-1022
  • chore(deps): update module spf13/cobra to v1 @renovate GH-1111
  • chore(deps): update module spf13/viper to v1.7.1 @renovate GH-1190
  • chore(deps)😒 bump opa v0.21.0 @desimone GH-993

# v0.9.1

# Security

  • envoy: fixes CVE-2020-11080 by rejecting HTTP/2 SETTINGS frames with too many parameters

# v0.9.0

# New

  • proxy: envoy is now used to handle proxying
  • authenticate: add jwks and .well-known endpoint @desimone [GH-745]
  • authorize: add client mTLS support @calebdoxsey [GH-751]

# Fixed

  • cache: fix closing too early @calebdoxsey [GH-791]
  • authenticate: fix insecure gRPC connection string default port @calebdoxsey [GH-795]
  • authenticate: fix user-info call for AWS cognito @calebdoxsey [GH-792]
  • authenticate: clear session if ctx fails @desimone [GH-806]
  • telemetry: fix autocache labels @travisgroth [GH-805]
  • telemetry: fix missing/incorrect grpc labels @travisgroth [GH-804]
  • authorize: fix authorization panic caused by logging a nil reference @desimone [GH-704]

# Changes

  • authenticate: remove authorize url validate check @calebdoxsey [GH-790]
  • authorize: reduce log noise for empty jwt @calebdoxsey [GH-793]
  • authorize: refactor and add additional unit tests @calebdoxsey [GH-757]
  • envoy: add GRPC stats handler to control plane service @travisgroth [GH-744]
  • envoy: enable zipkin tracing @travisgroth [GH-737]
  • envoy: improvements to logging @calebdoxsey [GH-742]
  • envoy: remove 'accept-encoding' header from proxied metric requests @travisgroth [GH-750]
  • envoy: support ports in hosts for routing @calebdoxsey [GH-748]
  • forward-auth: support x-forwarded-uri @calebdoxsey [GH-780]
  • proxy/forward-auth: block expired request prior to 302 @desimone [GH-773]
  • sessions/state: add nickname claim @BenoitKnecht [GH-755]
  • state: infer user (user) from subject (sub) @desimone [GH-772]
  • telemetry: refactor GRPC Server Handler @travisgroth [GH-756]
  • telemetry: service label updates @travisgroth [GH-802]
  • xds: add catch-all for pomerium routes @calebdoxsey [GH-789]
  • xds: disable cluster validation to handle out-of-order updates @calebdoxsey [GH-783]

# Documentation

  • docs: add mTLS recipe @calebdoxsey [GH-807]
  • docs: add argo recipe @calebdoxsey [GH-803]
  • docs: update dockerfiles for v0.9.0 @calebdoxsey [GH-801]
  • docs: typo on configuration doc @kintoandar [GH-800]
  • docs: docs regarding claim headers @strideynet [GH-782]
  • docs: update traefik example and add note about forwarded headers @calebdoxsey [GH-784]
  • docs: add note about unsupported platforms @calebdoxsey [GH-799]
  • docs: expose config parameters in sidebar @travisgroth [GH-797]
  • docs: update examples @travisgroth [GH-796]

# v0.8.3

# Changes

  • state: infer user (user) from subject (sub) @desimone GH-772
  • proxy/forward-auth: block expired request prior to 302 @desimone GH-773

# v0.8.2

# Security

This release includes a fix for a bug that, under certain circumstances, could allow a user with a valid but expired session to resend a request to an upstream application. The repeated request would not return a response, but could reach the upstream application. Thank you to @selaux for reporting this issue! [GH-762]

# v0.8.1

# Fixed

  • authorize: fix authorization panic caused by logging a nil reference @desimone [GH-704]

# v0.8.0

To see a complete list of changes see the diff (opens new window).

# New

# Changes

# Fixed

# Documentation

# v0.7.5

# Fixed

# v0.7.4

# Fixed

# v0.7.3

# Fixed

# v0.7.2

# Changes

# Fixed

# Documentation

# Dependency

# v0.7.1

There were no changes in the v0.7.1 release, but we updated the build process slightly.

# v0.7.0

# New

# Fixed

# Documentation

# Dependency

# v0.6.0

# New

# Changed

# Fixed

# Documentation

# Dependency

# v0.5.0

# New

  • Session state is now route-scoped. Each managed route uses a transparent, signed JSON Web Token (JWT) to assert identity.
  • Managed routes no longer need to be under the same subdomain! Access can be delegated to any route, on any domain.
  • Programmatic access now also uses JWT tokens. Access tokens are now generated via a standard oauth2 token flow, and credentials can be refreshed for as long as is permitted by the underlying identity provider.
  • User dashboard now pulls in additional user context fields (where supported) like the profile picture, first and last name, and so on.

# Security

  • Some identity providers (Okta, Onelogin, and Azure) previously used mutable signifiers to set and assert group membership. Group membership for all providers now use globally unique and immutable identifiers when available.

# Changed

  • Azure AD identity provider now uses globally unique and immutable ID for group membership (opens new window).
  • Okta no longer uses tokens to retrieve group membership. Group membership is now fetched using Okta's HTTP API. Group membership (opens new window) is now determined by the globally unique and immutable ID field.
  • Okta now requires an additional set of credentials to be used to query for group membership set as a service account (opens new window).
  • URLs are no longer validated to be on the same domain-tree as the authenticate service. Managed routes can live on any domain.
  • OneLogin no longer uses tokens to retrieve group membership. Group membership is now fetched using OneLogin's HTTP API. Group membership (opens new window) is now determined by the globally unique and immutable ID field.

# Removed

  • Force refresh has been removed from the dashboard.
  • Previous programmatic authentication endpoints (/api/v1/token) has been removed and is no longer supported.

# Fixed

# v0.4.2

# Security

# v0.4.1

# Fixed

  • Fixed an issue where requests handled by forward-auth would not be redirected back to the underlying route after successful authentication and authorization. GH-363 (opens new window)
  • Fixed an issue where requests handled by forward-auth would add an extraneous query-param following sign-in causing issues in some configurations. GH-366 (opens new window)

# v0.4.0

# New

# Security

  • The user's original intended location before completing the authentication process is now encrypted and kept confidential from the identity provider. GH-316 (opens new window)
  • Under certain circumstances, where debug logging was enabled, pomerium's shared secret could be leaked to http access logs as a query param. GH-338 (opens new window)

# Fixed

  • Fixed an issue where CSRF would fail if multiple tabs were open. GH-306 (opens new window)
  • Fixed an issue where pomerium would clean double slashes from paths. GH-262 (opens new window)
  • Fixed a bug where the impersonate form would persist an empty string for groups value if none set. GH-303 (opens new window)
  • Fixed HTTP redirect server which was not redirecting the correct hostname.

# Changed

  • The healthcheck endpoints (/ping) now returns the http status 405 StatusMethodNotAllowed for non-GET requests.
  • Authenticate service no longer uses gRPC.
  • The global request logger now captures the full array of proxies from X-Forwarded-For, in addition to just the client IP.
  • Options code refactored to eliminate global Viper state. GH-332 (opens new window)
  • Pomerium will no longer default to looking for certificates in the root directory. GH-328 (opens new window)
  • Pomerium will validate that either insecure_server, or a valid certificate bundle is set. GH-328 (opens new window)

# Removed

  • Removed AUTHENTICATE_INTERNAL_URL/authenticate_internal_url which is no longer used.

# v0.3.1

# Security

# v0.3.0

# New

  • GRPC Improvements. GH-261 (opens new window) / GH-69 (opens new window)

    • Enable WaitForReady to allow background retries through transient failures
    • Expose a configurable timeout for backend requests to Authorize and Authenticate
    • Enable DNS round_robin load balancing to Authorize and Authenticate services by default
  • Add ability to set client certificates for downstream connections. GH-259 (opens new window)

# Fixed

# Changed

# v0.2.1

# Security

# v0.2.0

# New

# Telemetry GH-35 (opens new window)

  • Tracing GH-230 (opens new window) aka distributed tracing, provides insight into the full lifecycles, aka traces, of requests to the system, allowing you to pinpoint failures and performance issues.

  • Metrics provide quantitative information about processes running inside the system, including counters, gauges, and histograms.

    • Add informational metrics. GH-227 (opens new window)

    • GRPC Metrics Implementation. GH-218 (opens new window)

      • Additional GRPC server metrics and request sizes
      • Improved GRPC metrics implementation internals
      • The GRPC method label is now 'grpc_method' and GRPC status is now grpc_client_status and grpc_server_status
    • HTTP Metrics Implementation. GH-220 (opens new window)

      • Support HTTP request sizes on client and server side of proxy
      • Improved HTTP metrics implementation internals
      • The HTTP method label is now http_method, and HTTP status label is now http_status

# Changed

# FIXED

# v0.1.0

# NEW

# CHANGED

# FIXED

# v0.0.5

# NEW

  • Add ability to detect changes and reload policy configuration files. GH-150 (opens new window)
  • Add user dashboard containing information about the current user's session. GH-123 (opens new window)
  • Add functionality allowing users to initiate manual refresh of their session. This is helpful when a user's access control details are updated but their session hasn't updated yet. To prevent abuse, manual refresh is gated by a cooldown (REFRESH_COOLDOWN) which defaults to five minutes. GH-73 (opens new window)
  • Add Administrator (super user) account support (ADMINISTRATORS). GH-110 (opens new window)
  • Add feature that allows Administrators to impersonate / sign-in as another user from the user dashboard. GH-110 (opens new window)
  • Add docker images and builds for ARM. GH-95 (opens new window)
  • Add support for public, unauthenticated routes. GH-129 (opens new window)

# CHANGED

# FIXED

# v0.0.4

# CHANGED

# FIXED

  • Fixed a bug in the Google provider implementation where the refresh_token. Updated the google implementation to use the new prompt=consent oauth2 parameters. Reported and fixed by @chemhack GH-81 (opens new window)

# DOCUMENTATION

# v0.0.3

# FEATURES

  • Authorization : The authorization module adds support for per-route access policy. In this release we support the most common forms of identity based access policy: allowed_users, allowed_groups, and allowed_domains. In future versions, the authorization module will also support context and device based authorization policy and decisions. See website documentation for more details.

  • Group Support : The authenticate service now retrieves a user's group membership information during authentication and refresh. This change may require additional identity provider configuration; all of which are described in the updated docs (opens new window). A brief summary of the requirements for each IdP are as follows:

  • WebSocket Support : With Go 1.12 (opens new window) pomerium automatically proxies WebSocket requests.

# CHANGED

  • Added LOG_LEVEL config setting that allows for setting the desired minimum log level for an event to be logged. GH-74 (opens new window)
  • Changed POMERIUM_DEBUG config setting to just do console-pretty printing. No longer sets log level. GH-74 (opens new window)
  • Updated generate_wildcard_cert.sh to generate a elliptic curve 256 cert by default.
  • Updated env.example to include a POLICY setting example.
  • Added IDP_SERVICE_ACCOUNT to env.example .
  • Removed ALLOWED_DOMAINS settings which has been replaced by POLICY. Authorization is now handled by the authorization service and is defined in the policy configuration files.
  • Removed ROUTES settings which has been replaced by POLICY.
  • Add refresh endpoint ${url}/.pomerium/refresh which forces a token refresh and responds with the json result.
  • Group membership added to proxy headers (x-pomerium-authenticated-user-groups) and (x-pomerium-jwt-assertion).
  • Default Cookie lifetime (COOKIE_EXPIRE) changed from 7 days to 14 hours ~ roughly one business day.
  • Moved identity (authenticate/providers) into its own internal identity package as third party identity providers are going to authorization details (group membership, user role, etc) in addition to just authentication attributes.
  • Removed circuit breaker package. Calls that were previously wrapped with a circuit breaker fall under gRPC timeouts; which are gated by relatively short timeouts.
  • Session expiration times are truncated at the second.
  • Removed gitlab provider. We can't support groups until this gitlab bug (opens new window) is fixed.
  • Request context is now maintained throughout request-flow via the context package (opens new window) enabling timeouts, request tracing, and cancellation.

# FIXED

  • http.Server and httputil.NewSingleHostReverseProxy now uses pomerium's logging package instead of the standard library's built in one. GH-58 (opens new window)