Releases: zmartzone/lua-resty-openidc
Releases · zmartzone/lua-resty-openidc
release 1.5.4
Bugfixes
- bugfix rare case where OP public key is starting with 0x80 byte, and thus resulting in systematic token signature verification error with message "too long"
Features
- added support for passing bearer token as cookie with
opts. auth_accept_token_as - added support introspection interval with
opts.introspection_interval - added support for passing request cookies on introspection call with
opts.pass_cookies - added passing introspection endpoint authorization method into
openidc_call_token_endpointcall - tighten JWT verification
- disabled support for "none" alg tokens introduced with 1.5.2 by default; If you want to enable it, you will now have to explicitly set the
accept_none_alg optiontotrue - id tokens using a signature algorithm not announced by the discovery endpoint are now rejected.
- you can now specify which signing algorithm you expect a bearer token to use in order to avoid being tricked into accepting a rogue token signed with a symmetric key when expecting an asymmetric cypher.
- added an option to reject tokens signed by an algorithm not supported by lua-resty-jwt
- disabled support for "none" alg tokens introduced with 1.5.2 by default; If you want to enable it, you will now have to explicitly set the
Other
release 1.5.3
Features
- add support for configuring an outgoing proxy (requires
lua-resty-http >= 0.12; see #139; thanks @grrolland - add support for running behind reverse proxy by interpreting
X-Forwarded-Host/Forwarded-HostandX-Forwarded-Proto/Forwarded-Protoheaders; see #128
Bugfixes
release 1.5.2
Bugfixes
- avoid that
lua-resty-jwtis an unneccessary dependency in an OAuth 2.0 RS remote validation setup; closes #124 - allow setting
ssl_verifytofalseon userinfo endpoint call; closes #125 - avoid putting a negative TTL into the cache; closes #127
- make handling of missing
jwks_urimore robust - ensure we don't log nil if initial JWT verification fails
release 1.5.1
Bugfixes
- fix return of access_token when
renew_access_token_on_expiry = false; see #121 - restore backwards compatible behavior of accepting non-supported signatures on
id_token's received on a backchannel call to the token endpoint in an OIDC flow
Features
- added support for verifying HMAC signatures on ID tokens (was supported for JWT access tokens only); see #122
release 1.5.0
This is quite a significant new release with the most important changes being verification of RSA signatures on tokens received from the token endpoint (required for passing OpenID Connect Certification) and the addition of a testbed. There are numerous other improvements across the board, some of which may impact existing installations, especially when using more advanced features.
Features
- verify RSA signatures on JWTs (
id_token/access_token); thanks @venkatmarepalli - provided explicit control over whether the access token gets renewed on expiry. If refresh fails, the user is redirected to the OP's authorization endpoint (disable with
opts. renew_access_token_on_expiry = false) - added support for configurable network timeouts
- add
id_token_hintwhen callingend_session_endpoint
Bugfixes
- fixed case where
openidc.introspectwould accept invalid tokens if they contained anexpclaim - ensured id_token_hint uses the correct query string separator when
opts.redirect_after_logout_uriis used together withredirect_after_logout_with_id_token_hint - check that
subis always present in theid_token - check that
subreturned from theuserinfoendpoint matchessubin theid_token - leave
optsalone when silently re-authenticating; see #119 and #120
Other
- add testbed / unit tests / coverage
- now uses
cjson.safewhen decoding JSON received from external sources for improved error handling - rely on
lua-resty-jwtvalidators forid_tokenand/or JWTaccess_tokenvalidation - unify JWT
access tokenand OIDCid_tokenvalidation
release 1.4.1
release 1.4.0
release 1.3.2
Features
- allow optional claim specs when verifying JWT access tokens; thanks @bodewig
- return the raw bearer token from
openidc.bearer_jwt_verify; thanks @bodewig - add support for passing session options to resty.session; closes #56; thanks @gene1wood
- add unauth_action "pass" option to .authenticate(); closes #53; thanks @dholth
- renew access token on expiration with refresh token grant; thanks @gonzalad
- support for prompt parameter during authorization, returning session data, and logout url override; thanks @gdestuynder
Bugfixes
- guard call to openidc_discover against repeated use; thanks @bodewig
release 1.3.1
Bugfixes
- avoid crashes when no session is found upon callback to the redirect_uri; may address #43; thanks @venkatmarepalli and @bungle
Features
- support RFC 7662 for token introspection
- use
opts.expiry_claimfor TTL cache control; closes #35; thanks @iperdomo
Packaging
- change rockspec so all newer dependencies/Lua versions of packages are allowed
- add dist.ini for OpenResty OPM; addresses #38