Affected by GO-2022-0517
and 13 other vulnerabilities
GO-2022-0517 : Argo CD SSO users vulnerable to Cross-site Scripting in github.com/argoproj/argo-cd
GO-2022-0518 : Argo CD certificate verification is skipped for connections to OIDC providers in github.com/argoproj/argo-cd
GO-2023-1520 : JWT audience claim is not verified in github.com/argoproj/argo-cd
GO-2023-1577 : Users with any cluster secret update access may update out-of-bounds cluster secrets in github.com/argoproj/argo-cd
GO-2023-1670 : Argo CD authenticated but unauthorized users may enumerate Application names via the API in github.com/argoproj/argo-cd
GO-2023-2049 : Argo CD cluster secret might leak in cluster details page in github.com/argoproj/argo-cd
GO-2023-2050 : Argo CD repo-server Denial of Service vulnerability in github.com/argoproj/argo-cd
GO-2024-2646 : Cross-site scripting on application summary component in github.com/argoproj/argo-cd/v2
GO-2024-2667 : Out of memory crash from malicious Helm registry in github.com/argoproj/argo-cd/v2
GO-2024-2728 : Argo CD's API server does not enforce project sourceNamespaces in github.com/argoproj/argo-cd
GO-2024-2792 : Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in ignoreDifferences in github.com/argoproj/argo-cd
GO-2024-2877 : ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd
GO-2024-2898 : Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd
GO-2024-3002 : Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in github.com/argoproj/argo-cd
Discover Packages
github.com/argoproj/argo-cd/v2
util
dex
package
Version:
v2.4.4
Opens a new window with list of versions in this module.
Published: Jul 7, 2022
License: Apache-2.0
Opens a new window with license information.
Imports: 13
Opens a new window with list of imports.
Imported by: 2
Opens a new window with list of known importers.
Documentation
Documentation
¶
NewDexHTTPReverseProxy returns a reverse proxy to the Dex server. Dex is assumed to be configured
with the external issuer URL muxed to the same path configured in server.go. In other words, if
Argo CD API server wants to proxy requests at /api/dex, then the dex config yaml issuer URL should
also be /api/dex (e.g. issuer: https://argocd.example.com/api/dex )
DexRewriteURLRoundTripper is an HTTP RoundTripper to rewrite HTTP requests to the specified
dex server address. This is used when reverse proxying Dex to avoid the API server from
unnecessarily communicating to Argo CD through its externally facing load balancer, which is not
always permitted in firewalled/air-gapped networks.
NewDexRewriteURLRoundTripper creates a new DexRewriteURLRoundTripper
Source Files
¶
Click to show internal directories.
Click to hide internal directories.