chore: house cleaning of the caos name and update sec (#232)

* chore: house cleaning of the caos name and update sec

* some typos

* make fix non breakable

* Update SECURITY.md

Co-authored-by: Livio Spring <livio.a@gmail.com>

* Update SECURITY.md

Co-authored-by: Livio Spring <livio.a@gmail.com>

Co-authored-by: Livio Spring <livio.a@gmail.com>
This commit is contained in:
Florian Forster 2022-10-17 09:13:54 +02:00 committed by GitHub
parent 4bc4bfffe8
commit 4ac692bfd8
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 18 additions and 9 deletions

View file

@ -96,7 +96,7 @@ Versions that also build are marked with :warning:.
## Why another library ## Why another library
As of 2020 there are not a lot of `OIDC` library's in `Go` which can handle server and client implementations. CAOS is strongly committed to the general field of IAM (Identity and Access Management) and as such, we need solid frameworks to implement services. As of 2020 there are not a lot of `OIDC` library's in `Go` which can handle server and client implementations. ZITADEL is strongly committed to the general field of IAM (Identity and Access Management) and as such, we need solid frameworks to implement services.
### Goals ### Goals

View file

@ -1,6 +1,6 @@
# Security Policy # Security Policy
At CAOS we are extremely grateful for security aware people that disclose vulnerabilities to us and the open source community. All reports will be investigated by our team. At ZITADEL we are extremely grateful for security aware people that disclose vulnerabilities to us and the open source community. All reports will be investigated by our team.
## Supported Versions ## Supported Versions
@ -8,12 +8,13 @@ After the initial Release the following version support will apply
| Version | Supported | | Version | Supported |
| ------- | ------------------ | | ------- | ------------------ |
| 1.x.x | :white_check_mark: (not yet available) |
| 0.x.x | :x: | | 0.x.x | :x: |
| 1.x.x | :white_check_mark: |
| 2.x.x | :white_check_mark: (not released) |
## Reporting a vulnerability ## Reporting a vulnerability
To file a incident, please disclose by email to security@caos.ch with the security details. To file a incident, please disclose by email to security@zitadel.com with the security details.
At the moment GPG encryption is no yet supported, however you may sign your message at will. At the moment GPG encryption is no yet supported, however you may sign your message at will.
@ -35,8 +36,8 @@ TBD
## Public Disclosure ## Public Disclosure
All accepted and mitigated vulnerabilitys will be published on the [Github Security Page](https://github.com/zitadel/oidc/security/advisories) All accepted and mitigated vulnerabilities will be published on the [Github Security Page](https://github.com/zitadel/oidc/security/advisories)
### Timing ### Timing
We think it is crucial to publish advisories `ASAP` as mitigations are ready. But due to the unknown nature of the discloures the time frame can range from 7 to 90 days. We think it is crucial to publish advisories `ASAP` as mitigations are ready. But due to the unknown nature of the disclosures the time frame can range from 7 to 90 days.

View file

@ -62,7 +62,7 @@ func main() {
// protected url which needs an active token and checks if the response of the introspect endpoint // protected url which needs an active token and checks if the response of the introspect endpoint
// contains a requested claim with the required (string) value // contains a requested claim with the required (string) value
// e.g. /protected/username/livio@caos.ch // e.g. /protected/username/livio@zitadel.example
router.HandleFunc(protectedClaimURL, func(w http.ResponseWriter, r *http.Request) { router.HandleFunc(protectedClaimURL, func(w http.ResponseWriter, r *http.Request) {
ok, token := checkToken(w, r) ok, token := checkToken(w, r)
if !ok { if !ok {

View file

@ -8,7 +8,11 @@ import (
"golang.org/x/text/language" "golang.org/x/text/language"
) )
const OidcDevMode = "CAOS_OIDC_DEV" const (
OidcDevMode = "ZITADEL_OIDC_DEV"
// deprecated: use OidcDevMode (ZITADEL_OIDC_DEV=true)
devMode = "CAOS_OIDC_DEV"
)
type Configuration interface { type Configuration interface {
Issuer() string Issuer() string
@ -62,8 +66,12 @@ func ValidateIssuer(issuer string) error {
func devLocalAllowed(url *url.URL) bool { func devLocalAllowed(url *url.URL) bool {
_, b := os.LookupEnv(OidcDevMode) _, b := os.LookupEnv(OidcDevMode)
if !b {
// check the old / current env var as well
_, b = os.LookupEnv(devMode)
if !b { if !b {
return b return b
} }
}
return url.Scheme == "http" return url.Scheme == "http"
} }