-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update oryd/hydra Docker tag to v2.3.0 #6
Open
renovate
wants to merge
1
commit into
develop
Choose a base branch
from
renovate/oryd-hydra-2.x
base: develop
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Brutus5000
force-pushed
the
develop
branch
2 times, most recently
from
November 14, 2023 08:58
842f860
to
1d094d0
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 21:55
e58c2c9
to
39feb1f
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 21:58
39feb1f
to
4f63249
Compare
Brutus5000
force-pushed
the
develop
branch
2 times, most recently
from
November 15, 2023 22:04
f83bba0
to
4ed4739
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:04
4f63249
to
3223a72
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:08
3223a72
to
073aa90
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:09
073aa90
to
12eeae0
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:10
12eeae0
to
ad7ced8
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:15
ad7ced8
to
e32dcb3
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:23
e32dcb3
to
1958e81
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:24
1958e81
to
e3742cc
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:26
e3742cc
to
2c07a8e
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:29
2c07a8e
to
83156e2
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:40
83156e2
to
8aa0d53
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
November 15, 2023 22:41
8aa0d53
to
bd31ee8
Compare
Brutus5000
force-pushed
the
develop
branch
14 times, most recently
from
January 14, 2025 23:04
4d1ce0c
to
bcb55bf
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 15, 2025 13:16
f3ad781
to
2037e9f
Compare
renovate
bot
changed the title
Update oryd/hydra Docker tag to v2
Update oryd/hydra Docker tag to v2.3.0
Jan 15, 2025
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 16, 2025 20:50
2037e9f
to
408a41a
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 16, 2025 23:44
408a41a
to
ca148f5
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 17, 2025 06:25
ca148f5
to
aabc046
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 18, 2025 21:40
aabc046
to
17bbbea
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 18, 2025 23:27
17bbbea
to
8557ba7
Compare
Brutus5000
force-pushed
the
develop
branch
2 times, most recently
from
January 19, 2025 20:39
ae4ef2b
to
9a3f29b
Compare
renovate
bot
force-pushed
the
renovate/oryd-hydra-2.x
branch
from
January 19, 2025 20:39
8557ba7
to
79c0a9a
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.2.0
->v2.3.0
v1.11.10
->v2.3.0
Release Notes
ory/hydra (oryd/hydra)
v2.3.0
Compare Source
We’re thrilled to announce the release of Ory Hydra 2.3.0! This version comes packed with graceful token refresh, performance improvements, and fixes that enhance stability, reduce database load, and streamline the developer experience. We strongly recommend upgrading to take advantage of these enhancements and ensure the best possible OAuth2 and OpenID Connect experience with Ory Hydra. Thank you to everyone who contributed!
Ory Hydra now supports graceful refresh token rotation, making OAuth2 and OpenID Connect refresh flows significantly more resilient in scenarios such as Single Page Apps and IoT. Even in highly distributed or concurrent environments, Hydra gracefully handles token refreshes reliably, ensuring tokens are not dropped or double-used.
PRs: #3860, #3895
Previously, the
redirect_uri
was not required when performing flows withscope=openid
. This release enforces the requirement to comply with the OpenID Connect standard.PR: #3900
Hydra now supports explicit SQL migration commands
migrate sql up|down|status
that streamline database schema management and help with zero-downtime upgrades.PR: #3894
The CLI introduces new parameters and an option to specify a custom client ID on creation, making it easier to manage and script Hydra deployments.
PRs: #3718, #3725, #3874
hydra perform authorization-code
A minimal built-in UI for login and consent can be enabled when testing with the CLI, removing the need to spin up a separate service.
PR: #3845
Unused indices have been removed, down migration scripts renamed for consistency, and all migrations are more efficient overall.
PRs: #3859, #3911
Improve persistence logic – Database transactions and concurrency have been improved across the authorization and token handlers.
PRs: #3756, #3763, #3886
Support for more claims in password grant – You can now include additional claims in the password grant flow, providing extra flexibility in advanced scenarios. Only available with an Ory Enterprise License.
PR: #3864
Transaction Wrappers
Authorization and token issuance are now wrapped more consistently to prevent partial writes and race conditions.
PRs: #3730, #3763
Improved Docker setup
Docker configurations have been refined, removing inconsistencies in the Compose setup and enabling a fully static binary build.
PRs: #3826, #3924
Proper JSON round-tripping
Fixed an issue causing custom claims to break if they were nested or unexpectedly typed. JSON round-trips are now correct.
PR: #3819
Speed up public key retrieval
Reduced overhead for the JWK public endpoint, solving CPU contention issues in large-scale deployments.
PRs: #3787, #3870
Fix Docker Compose references
The CLI now properly references
docker compose
instead ofdocker-compose
, ensuring compatibility with modern Docker setups.PR: #3815
Dependency upgrades
Bumped
fosite
,ory/x
,pgx/v5
, and various third-party libraries for improved stability and performance.Updated docs
Updated examples, improved JWK documentation, added notes on Docker Compose usage, and refined OpenID Connect discovery docs.
More tracing context
Tracing calls have been consistently standardized with
otelx.End()
, and additional context ensures better observability.Code generation & housekeeping
Various housekeeping tasks: pinned GHA versions, fixed minor comment typos, updated newsletters/links, and more.
To upgrade to 2.3.0, follow the usual steps:
v2.3.0
.hydra migrate sql up
(if using the new commands) or your usual migration procedure.Check the migration docs for detailed information.
As always, we love hearing from our community. Here are some ways to get involved:
Thanks to all contributors for making Ory Hydra the best-in-class OAuth2 and OpenID Connect server.
For Ory Hydra v2.4.0 we are looking at another highly anticipated community-contributed feature, the OAuth 2.0 Device Authorization Grant!
Full Changelog: v2.2.0...v2.3.0
Happy building with Ory Hydra!
Breaking Changes
Going forward, OAuth2 Clients requesting an OpenID Connect flow must include the
redirect_uri
parameter or the request will be rejected.Deleting consents no longer returns 404 in certain edge cases but instead always 204.
Bug Fixes
Advertise support for response_mode=form_post in OIDC discovery document (#3861) (9cc5f28)
Broken JSON round-tripping for custom claims (b36b701):
Adding custom claims with numerical types (think JavaScript Number) previously did not
round-trip through Hydra correctly. For example, passing UNIX timestamps in custom claims
would end up as floating points in exponential notation in the final token. That, in turn,
confused or broke downstream consumers of the token, including Kratos.
Ref https://github.com/go-jose/go-jose/issues/144
Change comment on revokeOAuth2LoginSessions (#3853) (6d829dd)
Change index name in down migration (#3911) (3a09db2)
Correct span names (554238b)
Correctly pass multiple token audiences and prompt parameters when performing the authorization code flow from the CLI (#3736) (632faef)
Cpu contention when reading JWKs and suppress generating duplicate JWKs (#3870) (d5f65c5):
Previously each concurrent caller would need to lock a shared mutex when reading or writing a given JWK set.
The read path now doesn't require locking a mutex at all and instead returns valid query results directly.
The write path is now protected by a concurrency control mechanism (using x/sync/singleflight) to ensure only one JWK set is generated and persisted.
Note: Duplicate JWK sets may still be improperly generated if running more than one Hydra instance in a high traffic environment.
Do not iteratively delete records (#3766) (5ef20a2):
Resolves performance issues on some databases when deleting consent.
Do not retry sending responses (#3764) (1bbfdb5)
docs: Adjust note about SDK support on oauth2 flow endpoints (#3812) (d0e047c)
Error log when RP responds with status code 204 (#3731) (153e4b5)
Faster GetPublicKeys (#3787) (04c34aa):
GetPublicKeys used to fetch all keys in a set, even if they were actually not being used. This patch fixes that.
Improve docker set up (#3924) (8ca6cbd), closes #3914 #3683:
Improves the docker set up and removes some unused files.
Incorrect context passthru (fa50e3e)
Incorrect indices (#3778) (cb0004b)
Limit HTTP response size (2559819)
Omit explicit transaction in ConfirmLoginSession and add tracing (#3886) (a5b2d75)
Pass context to database ping (fa21711)
Require
redirect_uri
in openid requests (#3900) (5caa629):Resolves a deviation from the OpenID Connect spec, where the
redirect_uri
was not required when performing flows withscope=openid
.Untyped int build issues on 32bit architectures (#3885) (68aa167)
Upgrade fosite and improve webhook integration (#3727) (89323e2)
Use docker compose rather than docker-compose (#3815) (ffdfb73)
Wrap authorize response in transaction (#3763) (5b106aa)
Wrap token handler in transaction (#3730) (67a85cc)
Code Generation
Documentation
Features
Add access token strategy parameter to cli (#3718) (7862dc3), closes #3717
Add expiry and requested times to logout table (#3837) (f83193f)
Add id parameter to create oauth2-client cli (#3725) (b372fd2):
Fixes https://github.com/ory/hydra/issues/3724
Add Inspect option to registry (2013450)
Add migrate sql up|down|status (#3894) (d27882f):
This patch adds the ability to execute down migrations using:
Please read
hydra migrate sql down --help
carefully.Going forward, please use the following commands
instead of the previous, now deprecated
commands.
See https://github.com/ory-corp/cloud/issues/7350
Built-in login/consent UI for
hydra perform authorization-code
(#3845) (7f8bd90)Graceful refresh token rotation (#3860) (e278b40), closes #1831 #3770:
This patch adds a configuration flag which enables graceful refresh token rotation. Previously, refresh tokens could only be used once. On reuse, all tokens of that chain would be revoked.
This is particularly challenging in environments, where it's difficult to make guarantees on synchronization. This could lead to refresh tokens being sent twice due to some parallel execution.
To resolve this, refresh tokens can now be graceful by changing
oauth2.grant.refresh_token.grace_period=10s
(example value). During this time, a refresh token can be used multiple times to generate new refresh, ID, and access tokens.All tokens will correctly be invalidated, when the refresh token is re-used after the grace period expires, or when the delete consent endpoint is used.
Handle concurrent refreshes and improve graceful refreshing (#3895) (0a6c966):
This patch improves Ory Hydra's ability to deal with refresh flows which, for example, concurrently refresh the same token. Furthermore, graceful token refresh has been improved to handle a variety of edge cases and scenarios.
Additionally, serializability errors in CockroachDB are now correctly retried.
See https://github.com/ory-corp/cloud/issues/7311
Clohttps://github.com/ory/hydra/pull/38953895
Improve persistence logic (#3756) (50301e0)
Reduce size of verifiers (#3857) (0cd00dc)
Remove unused indices (#3859) (56fc3da)
Support more claims in password grant (#3864) (41476ec):
For the resource owner password grant, the Kratos identity ID is now written to the sub claim, and the username is written to the ext.username claim. Further, token hooks are called for the initial token issuance as well as refresh flows for access tokens issued via the resource owner password grant, allowing users to customize the fields present in the access token (for the jwt strategy) as well as on introspection.
Update clients from files through the CLI (#3874) (f777fd1)
Upgrade to jackc/pgx/v5 (#3798) (cd7e7ef)
Tests
Unclassified
Artifacts can be verified with cosign using this public key.
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.