Skip to content

Releases: oauth2-proxy/oauth2-proxy

v7.14.2

18 Jan 00:26
3a55dad

Choose a tag to compare

Release Highlights

  • Revert AuthOnly endpoint change from v7.14.1 that caused issues when using skip-provider-button enabled

Important Notes

  • This release reverts the change made in v7.14.1 that caused issues when using the skip-provider-button enabled. Now, when a session does not exist, the AuthOnly endpoint will send a 401 status code as expected instead of a 302 redirect. And instead we extended the documentation to clarify the behavior when using nginx with auth_request and skip-provider-button and how to properly configure redirects for browser and API routes.

Excerpt from v7.14.0 release letter:

This release introduces a breaking change for Alpha Config users and moves us significantly
closer to removing legacy configuration parameters, making the codebase of OAuth2 Proxy more
future proof and extensible.

From v7.14.0 onward, header injection sources must be explicitly nested. If you
previously relied on squashed fields, update to the new structure before upgrading:

# before v7.14.0
injectRequestHeaders:
- name: X-Forwarded-User
  values:
  - claim: user
- name: X-Custom-Secret-header
  values:
  - value: my-super-secret

# v7.14.0 and later
injectRequestHeaders:
- name: X-Forwarded-User
  values:
  - claimSource:
      claim: user
- name: X-Custom-Secret-header
  values:
  - secretSource:
      value: my-super-secret

Furthermore, Alpha Config now fully supports configuring the Server struct using YAML.

// Server represents the configuration for the Proxy HTTP(S) configuration.
type Server struct {
    // BindAddress is the address on which to serve traffic.
    BindAddress string `yaml:"bindAddress,omitempty"`

    // SecureBindAddress is the address on which to serve secure traffic.
    SecureBindAddress string `yaml:"secureBindAddress,omitempty"`

    // TLS contains the information for loading the certificate and key for the
    // secure traffic and further configuration for the TLS server.
    TLS *TLS `yaml:"tls,omitempty"`
}

// TLS contains the information for loading a TLS certificate and key
// as well as an optional minimal TLS version that is acceptable.
type TLS struct {
    // Key is the TLS key data to use.
    Key *SecretSource `yaml:"key,omitempty"`
    // Cert is the TLS certificate data to use.
    Cert *SecretSource `yaml:"cert,omitempty"`
    // MinVersion is the minimal TLS version that is acceptable.
    MinVersion string `yaml:"minVersion,omitempty"`
    // CipherSuites is a list of TLS cipher suites that are allowed.
    CipherSuites []string `yaml:"cipherSuites,omitempty"`
}

More about how to use Alpha Config can be found in the documentation.

Example Alpha configuration: https://github.com/oauth2-proxy/oauth2-proxy/blob/955ab6b/contrib/local-environment/oauth2-proxy-alpha-config.yaml

We are committed to Semantic Versioning and usually avoid breaking changes without a major version release.
Advancing Alpha Config toward its Beta stage required this exception, and even for the Alpha Config we try
to keep breaking changes in v7 to a minium. Thank you for understanding the need for this step to prepare
the project for future maintainability and future improvements like structured logging.

Breaking Changes

Changes since v7.14.1

v7.14.1

17 Jan 15:29
7bf586c

Choose a tag to compare

Release Highlights

  • 🔵 Go1.25.6 and upgrade of dependencies to latest versions
  • 🐛 Bug fixes
    • AuthOnly now starts the auth flow and send status code 302 if no session exists and skip-provider-button is true
    • Fixed static upstream validation issue due to incorrect defaults

Important Notes

Excerpt from v7.14.0 release letter.

https://github.com/oauth2-proxy/oauth2-proxy/releases/v7.14.0

This release introduces a breaking change for Alpha Config users and moves us significantly
closer to removing legacy configuration parameters, making the codebase of OAuth2 Proxy more
future proof and extensible.

From v7.14.0 onward, header injection sources must be explicitly nested. If you
previously relied on squashed fields, update to the new structure before upgrading:

# before v7.14.0
injectRequestHeaders:
- name: X-Forwarded-User
  values:
  - claim: user
- name: X-Custom-Secret-header
  values:
  - value: my-super-secret

# v7.14.0 and later
injectRequestHeaders:
- name: X-Forwarded-User
  values:
  - claimSource:
      claim: user
- name: X-Custom-Secret-header
  values:
  - secretSource:
      value: my-super-secret

Furthermore, Alpha Config now fully supports configuring the Server struct using YAML.

// Server represents the configuration for the Proxy HTTP(S) configuration.
type Server struct {
    // BindAddress is the address on which to serve traffic.
    BindAddress string `yaml:"bindAddress,omitempty"`

    // SecureBindAddress is the address on which to serve secure traffic.
    SecureBindAddress string `yaml:"secureBindAddress,omitempty"`

    // TLS contains the information for loading the certificate and key for the
    // secure traffic and further configuration for the TLS server.
    TLS *TLS `yaml:"tls,omitempty"`
}

// TLS contains the information for loading a TLS certificate and key
// as well as an optional minimal TLS version that is acceptable.
type TLS struct {
    // Key is the TLS key data to use.
    Key *SecretSource `yaml:"key,omitempty"`
    // Cert is the TLS certificate data to use.
    Cert *SecretSource `yaml:"cert,omitempty"`
    // MinVersion is the minimal TLS version that is acceptable.
    MinVersion string `yaml:"minVersion,omitempty"`
    // CipherSuites is a list of TLS cipher suites that are allowed.
    CipherSuites []string `yaml:"cipherSuites,omitempty"`
}

More about how to use Alpha Config can be found in the documentation.

Example Alpha configuration: https://github.com/oauth2-proxy/oauth2-proxy/blob/955ab6b/contrib/local-environment/oauth2-proxy-alpha-config.yaml

We are committed to Semantic Versioning and usually avoid breaking changes without a major version release.
Advancing Alpha Config toward its Beta stage required this exception, and even for the Alpha Config we try
to keep breaking changes in v7 to a minium. Thank you for understanding the need for this step to prepare
the project for future maintainability and future improvements like structured logging.

Breaking Changes

Changes since v7.14.0

  • #3309 fix: Return 302 redirect from AuthOnly endpoint when skip-provider-button is true (@StefanMarkmann)
  • #3302 fix: static upstreams failing validation due to passHostHeader and proxyWebSockets defaults being set incorrectly (@sourava01 / @tuunit)
  • #3312 chore(deps): upgrade to go1.25.6 and latest dependencies (@tuunit)

v7.14.0

17 Jan 10:22
707e6c4

Choose a tag to compare

Release Highlights

Important Notes

This release introduces a breaking change for Alpha Config users and moves us significantly
closer to removing legacy configuration parameters, making the codebase of OAuth2 Proxy more
future proof and extensible.

From v7.14.0 onward, header injection sources must be explicitly nested. If you
previously relied on squashed fields, update to the new structure before upgrading:

# before v7.14.0
injectRequestHeaders:
- name: X-Forwarded-User
  values:
  - claim: user
- name: X-Custom-Secret-header
  values:
  - value: my-super-secret

# v7.14.0 and later
injectRequestHeaders:
- name: X-Forwarded-User
  values:
  - claimSource:
      claim: user
- name: X-Custom-Secret-header
  values:
  - secretSource:
      value: my-super-secret

Furthermore, Alpha Config now fully supports configuring the Server struct using YAML.

// Server represents the configuration for the Proxy HTTP(S) configuration.
type Server struct {
    // BindAddress is the address on which to serve traffic.
    BindAddress string `yaml:"bindAddress,omitempty"`

    // SecureBindAddress is the address on which to serve secure traffic.
    SecureBindAddress string `yaml:"secureBindAddress,omitempty"`

    // TLS contains the information for loading the certificate and key for the
    // secure traffic and further configuration for the TLS server.
    TLS *TLS `yaml:"tls,omitempty"`
}

// TLS contains the information for loading a TLS certificate and key
// as well as an optional minimal TLS version that is acceptable.
type TLS struct {
    // Key is the TLS key data to use.
    Key *SecretSource `yaml:"key,omitempty"`
    // Cert is the TLS certificate data to use.
    Cert *SecretSource `yaml:"cert,omitempty"`
    // MinVersion is the minimal TLS version that is acceptable.
    MinVersion string `yaml:"minVersion,omitempty"`
    // CipherSuites is a list of TLS cipher suites that are allowed.
    CipherSuites []string `yaml:"cipherSuites,omitempty"`
}

More about how to use Alpha Config can be found in the documentation.

Example Alpha configuration: https://github.com/oauth2-proxy/oauth2-proxy/blob/955ab6b/contrib/local-environment/oauth2-proxy-alpha-config.yaml

We are committed to Semantic Versioning and usually avoid breaking changes without a major version release.
Advancing Alpha Config toward its Beta stage required this exception, and even for the Alpha Config we try
to keep breaking changes in v7 to a minium. Thank you for understanding the need for this step to prepare
the project for future maintainability and future improvements like structured logging.

Breaking Changes

  • Alpha Config: header injection no longer supports squashed claim/secret sources; they must now be set explicitly (see example above).

Changes since v7.13.0

  • #2628 feat(structured config): revamp of yaml parsing using mapstructure decoder and custom decoders (@tuunit)
  • #3197 fix: NewRemoteKeySet is not using DefaultHTTPClient (@rsrdesarrollo / @tuunit)
  • #3292 chore(deps): upgrade gomod and bump to golang v1.25.5 (@tuunit)
  • #3304 fix: added conditional so default is not always set and env vars are honored fixes 3303 (@pixeldrew)
  • #3264 fix: more aggressively truncate logged access_token (@MartinNowak / @tuunit)
  • #3267 fix: Session refresh handling in OIDC provider (@gysel)
  • #3290 fix: WebSocket proxy to respect PassHostHeader setting (@UnsignedLong)

v7.13.0

08 Nov 13:36
082b49a

Choose a tag to compare

Release Highlights

Important Notes

By default all specified headers will now be normalized, meaning that both capitalization and the use of underscores (_) versus dashes (-) will be ignored when matching headers to be stripped. For example, both X-Forwarded-For and X_Forwarded-for will now be treated as equivalent and stripped away.

Please read our security advisory for CVE-2025-64484: GHSA-vjrc-mh2v-45x6

Furthermore, we now use the access_token for validating refreshed sessions in OIDC providers instead of the id_token. This is to align with the OIDC specification which states that id_tokens are not guaranteed to be issued when using refresh tokens. In future releases we might remove the id_token validation for sessions completely.

Breaking Changes

N/A

Changes since v7.12.0

  • #3228 fix: use GetSecret() in ticket.go makeCookie to respect cookie-secret-file (@stagswtf)
  • #3244 chore(deps): upgrade to latest go1.25.3 (@tuunit)
  • #3238 chore: Replace pkg/clock with narrowly targeted stub clocks (@dsymonds)
  • #3237 - feat: add option to use organization id for preferred username in Google Provider (@pixeldrew)
  • GHSA-vjrc-mh2v-45x6 fix: request header smuggling by stripping all normalized header variants (@tuunit)
  • #1933 fix: validation of refreshed sessions using the access_token in the OIDC provider (@gysel / @tuunit)
  • #2841 feat: add allowed_* constraint option to proxy endpoint query string (@jacobalberty)

v7.12.0

19 Aug 06:57
5082db0

Choose a tag to compare

Release Highlights

  • 🕵️‍♀️ Vulnerabilities have been addressed
  • 🦸 Support for Cidaas IDP
  • 🐛 Squashed some bugs

Important Notes

Breaking Changes

Changes since v7.11.0

v7.11.0

30 Jul 18:16
c0a928e

Choose a tag to compare

Release Highlights

  • 🏢 Support for SourceHut (sr.ht) provider
  • 🔍️ Support for more fine-grained control over the google admin-sdk scopes and optional google groups
  • 🐛 Squashed some bugs

Important Notes

Firstly, fixed critical vulnerability where skip_auth_routes regex patterns matched against the full request URI (path + query parameters) instead of just the path, allowing authentication bypass attacks.

Secondly, fixed double-escaping of $ in regexes for Alpha Config upstreams path and rewriteTargets:

# Before
upstreams:
  - id: web
    path: ^/(.*)$$
    rewriteTarget: /$$1

# After
upstreams:
  - id: web
    path: ^/(.*)$
    rewriteTarget: /$1

Breaking Changes

If your configuration relies on matching query parameters in skip_auth_routes patterns, you must update your regex patterns to match paths only. Review all skip_auth_routes entries for potential impact.

Example of affected configuration:

# This pattern previously matched both:
# - /api/foo/status (intended)
# - /api/private/sensitive?path=/status (bypass - now fixed)
skip_auth_routes: ["^/api/.*/status"]

For detailed information, migration guidance, and security implications, see the security advisory.

Changes since v7.10.0

  • #2615 feat(cookies): add option to set a limit on the number of per-request CSRF cookies oauth2-proxy sets (@bh-tt)
  • #2605 fix: show login page on broken cookie (@Primexz)
  • #2743 feat: allow use more possible google admin-sdk api scopes (@BobDu)
  • #2359 feat: add SourceHut (sr.ht) provider(@bitfehler)
  • #2524 fix: regex substitution for $ signs in upstream path handling before running envsubst (@dashkan / @tuunit)
  • #3104 feat(cookie): add feature support for cookie-secret-file (@sandy2008)
  • #3055 feat: support non-default authorization request response mode also for OIDC providers (@stieler-it)
  • #3138 feat: make google_groups argument optional when using google provider (@sourava01)
  • #3093 feat: differentiate between "no available key" and error for redis sessions (@nobletrout)
  • GHSA-7rh7-c77v-6434 fix: skip_auth_routes bypass through query parameter inclusion

v7.10.0

17 Jul 12:08
78d2a36

Choose a tag to compare

Release Highlights

Important Notes

Breaking Changes

Changes since v7.9.0

v7.9.0

28 Apr 16:28
2ecb2c6

Choose a tag to compare

Release Highlights

  • 📨 OAuth 2.0 Multiple Response Type Encoding
  • 📦️ Support for JWT encoded profile claims
  • 🔵 Golang version upgrade to v1.23.8
  • 🕵️‍♀️ Vulnerabilities have been addressed
  • 🐛 Squashed some bugs

Important Notes

Breaking Changes

Changes since v7.8.2

v7.8.2

25 Mar 19:51
2ab22bd

Choose a tag to compare

Release Highlights

Important Notes

Breaking Changes

Changes since v7.8.1

v7.8.1

15 Jan 11:38
04cc932

Choose a tag to compare

Release Highlights

  • 🐛 Two bugs have been squashed

Important Notes

Breaking Changes

Changes since v7.8.0

  • #2887 fix: jwt regex validation error during skip-jwt-bearer-tokens flow
  • #2920 fix: missing oauth2-proxy version for docker builds