Sync from SUSE:SLFO:Main apache2-mod_auth_openidc revision 3be2560e5dc08661d466bc85bbf7fb29
This commit is contained in:
parent
d8a677d89a
commit
d6de88a313
@ -1,3 +1,69 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Feb 10 11:16:24 UTC 2025 - pgajdos@suse.com
|
||||||
|
|
||||||
|
- version update to 2.4.16.7
|
||||||
|
01/29/2025
|
||||||
|
- add OIDCProfile to configure OpenID Connect profile behaviours for, so far "FAPI20" only, which configures:
|
||||||
|
Authentication Request method, DPoP, PKCE, ID token aud values requirements
|
||||||
|
token endpoint JWT authentication "aud" values, "iss" parameter requirement in authentication reponses
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Dec 11 13:55:46 UTC 2024 - pgajdos@suse.com
|
||||||
|
|
||||||
|
- version update to 2.4.16.6
|
||||||
|
12/05/2024
|
||||||
|
- metadata: fix caching of JWKs from jwks_uri when using the default expiry setting (i.e. not using OIDCJWKSRefreshInterval)
|
||||||
|
and avoid fetching JWKs from the jwks_uri for each user login; also addresses Redis cache
|
||||||
|
error entries the log [ERR invalid expire time in 'setex' command]
|
||||||
|
- avoid segfault and improve error reporting in case apr_temp_dir_get fails when a temp directory cannot be found
|
||||||
|
on the system upon initalizing cache mutexes and file cache; see #1288; thanks @ErmakovDmitriy
|
||||||
|
11/21/2024
|
||||||
|
- add option to set local address for outgoing HTTP requests; see #1283; thanks @studersi
|
||||||
|
using e.g. SetEnvIfExpr true OIDC_CURL_INTERFACE=192.168.10.2
|
||||||
|
- try and address metris cleanup segmentation fault on shutdown; see #1207
|
||||||
|
by not flushing metrics to the shared memory segment upon exit
|
||||||
|
11/14/2024
|
||||||
|
- allow specific settings Strict|Lax|None|Disabled for OIDCCookieSameSite in addition to On(=Lax)|Off(=None)
|
||||||
|
- fix: default behaviour Lax
|
||||||
|
- fix: apply OIDCCookieSameSite Off/None properly to state cookies instead of always setting Lax
|
||||||
|
- re-introduces the option to configure a Strict SameSite session cookie policy, which will turn the initial
|
||||||
|
Lax session cookie - set upon receving the response to the Redirect URI - into a Strict session cookie
|
||||||
|
immediately after the first application request
|
||||||
|
- allows for a "Disabled" value that does not set any SameSite flag on the cookies, in which case a browser
|
||||||
|
falls back to its default browser behaviour (which should be Lax by spec)
|
||||||
|
11/07/2024
|
||||||
|
- info: fix requests to the info hook with extend_session=false; see #1279; thanks @fnieri-cdp
|
||||||
|
- properly reflect the (unmodified) inactivity timeout in the response ("timeout")
|
||||||
|
- avoid refreshing an access token (since the session is not saved)
|
||||||
|
- avoid refreshing claims from the user info endpoint, and possibly refreshing the access token
|
||||||
|
10/23/2024
|
||||||
|
- metadata: allow plain HTTP URLs in metadata elements `jwks_uri` and `signed_jwks_uri`
|
||||||
|
to ensure backwards compatibility with <=2.4.15.7 and to support private/test deployments
|
||||||
|
10/22/2024
|
||||||
|
- address warnings from static code analysis tool CodeChecker
|
||||||
|
10/04/2024
|
||||||
|
- ensure backwards compatibility with versions <2.4.16.x when a JSON array of string values
|
||||||
|
is provided in the "aud" claim of the ID token; required by (at least) Oracle IDCS
|
||||||
|
see #1272 and #1273; thanks @lufik and @tydalforce
|
||||||
|
- add OIDCIDTokenAudValues configuration primitive that allows for explicit (and exhaustive)
|
||||||
|
configuration of the list of accepted values in the "aud" claim of the ID token
|
||||||
|
e.g. as required for passing FAPI 2 conformance testing
|
||||||
|
09/27/2024
|
||||||
|
- correct usage of free() for json_dumps return values instead of cjose_get_dealloc()()
|
||||||
|
- use compact encoding and preserve order where appropriate for most calls to json_dumps
|
||||||
|
- replace json_dumps/free combos with oidc_util_encode_json
|
||||||
|
- refactor oidc_jwk_to_json
|
||||||
|
09/26/2024
|
||||||
|
- fix oidc_jwk_copy wrt. "x5t", which broke private_key_jwt authentication to Azure AD since 2.4.13
|
||||||
|
see #1269; thanks @uoe-pjackson
|
||||||
|
09/21/2024
|
||||||
|
- refactor state and userinfo
|
||||||
|
09/11/2024
|
||||||
|
- change warnings about not passing unknown claim types into debug messages; see #1263; thanks @nclarkau
|
||||||
|
09/09/2024
|
||||||
|
- fix accepting custom cookie names in OIDCOAuthAcceptTokenAs cookie:<name>; see #1261; thanks @bbartke
|
||||||
|
- improve basic authentication parsing when using OIDCOAuthAcceptTokenAs basic
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Sep 17 08:52:12 UTC 2024 - pgajdos@suse.com
|
Tue Sep 17 08:52:12 UTC 2024 - pgajdos@suse.com
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package apache2-mod_auth_openidc
|
# spec file for package apache2-mod_auth_openidc
|
||||||
#
|
#
|
||||||
# Copyright (c) 2024 SUSE LLC
|
# Copyright (c) 2025 SUSE LLC
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
Name: apache2-mod_auth_openidc
|
Name: apache2-mod_auth_openidc
|
||||||
Version: 2.4.16.3
|
Version: 2.4.16.7
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Apache2.x module for an OpenID Connect enabled Identity Provider
|
Summary: Apache2.x module for an OpenID Connect enabled Identity Provider
|
||||||
License: Apache-2.0
|
License: Apache-2.0
|
||||||
|
BIN
mod_auth_openidc-2.4.16.3.tar.gz
(Stored with Git LFS)
BIN
mod_auth_openidc-2.4.16.3.tar.gz
(Stored with Git LFS)
Binary file not shown.
BIN
mod_auth_openidc-2.4.16.7.tar.gz
(Stored with Git LFS)
Normal file
BIN
mod_auth_openidc-2.4.16.7.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user