This repository has been archived by the owner on Jan 4, 2025. It is now read-only.
forked from OpenIDC/mod_auth_openidc
-
Notifications
You must be signed in to change notification settings - Fork 2
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
see OpenIDC#853; thanks @studersi; bump to 2.4.11.3rc0 Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Use optionally provided sid and iss parameters by the OP during front channel logout as specified in "OpenID Connect Front-Channel Logout 1.0 - draft 05" at https://openid.net/specs/openid-connect-frontchannel-1_0.html. * src/mod_auth_openidc.c::oidc_save_in_session: Always save the sid in the session if present as it can be used in the front channel logout case as well. * src/mod_auth_openidc.c::oidc_cleanup_by_sid: New function to factor out some code from oidc_handle_logout_backchannel. * oidc_handle_logout_request::oidc_handle_logout_request In case of a front channel logout where no session was provided look for the optional request parameters sid and iss to retrieve the session from the cache and clean it up. As some OP's like MS Azure do not provide the iss parameter as the spec mandates try to use a possible static provider in this case. * oidc_handle_logout_request::oidc_handle_logout_backchannel: Make use of oidc_cleanup_by_sid. * src/mod_auth_openidc.h: New defines for OIDC_REDIRECT_URI_REQUEST_SID and OIDC_REDIRECT_URI_REQUEST_ISS.
…hannel logout; see OpenIDC#855; thanks @rpluem-vf
Use optionally provided sid and iss request parameters during front channel logout
fix for ipv6 hosts if logout url is set
thanks @@codemaker219; bump to 2.4.11.3rc1 Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Escape periods in regular expressions for OIDCRedirectURLsAllowed documentation.
when used with array matching closes #902; thanks @smanolache; bump to 2.4.11.3rc4 Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
closes #903; thanks @smanolache Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
see OpenIDC#812 and OpenIDC#888; bump to 2.4.11.4rc1 Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
update cjose to 0.6.2
over the one returned in the frontchannel for "code token" and "code id_token token" flows; for certification purposes Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
for certification purposes Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
for substitution; closes #915; bump to 2.4.11.4rc2
Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
* ChangeLog: Document change * auth_openidc.conf Document the new directives OIDCMemCacheConnectionsMin OIDCMemCacheConnectionsSMax OIDCMemCacheConnectionsHMax OIDCMemCacheConnectionsTTL * src/cache/memcache.c oidc_cache_memcache_post_config: Use the new parameters or use defaults when calling apr_memcache_server_create * src/config.c oidc_set_uint32_slot: New function to set an apr_uint32_t value in the server config oidc_set_timeout_slot: New function to set an 32 bit uint timeout slot in the server config oidc_create_server_config: Init additional fields oidc_merge_server_config: Merge additional fields Declare the new directives OIDCMemCacheConnectionsMin OIDCMemCacheConnectionsSMax OIDCMemCacheConnectionsHMax OIDCMemCacheConnectionsTTL * src/mod_auth_openidc.h Add new fields to struct oidc_cfg * test/stub.c Add new stubs from httpd API: ap_mpm_query ap_timeout_parameter_parse
…tings Allow setting connection pool parameters for Memcache server connections
Add autom4te.cache to .gitignore
or pull keys from the JWKS URI; for certification purposes Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
see: OpenIDC#1096 bump to 2.4.14.3rc7 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
also update github urls. zmartzone account has been renamed OpenIDC. [sc-27050]
see #1111; thanks @brandonk10; bump to 2.4.14.4rc0 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
in 1cf0a98 when using OIDCRefreshAccessTokenBeforeExpiry Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
when using OIDCPassClaimsAs <any> latin1; bump to 2.4.14.4rc1 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
see OpenIDC#1107 bump to 2.4.14.4rc2 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
to customize the POST preservation/restore process bump to 2.4.14.4rc3 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
and use it instead of global locking for Redis caching Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
to avoid parsing JSON on each request; bump to 2.4.14.4rc4 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
free the parsed id_token that is returned; bump to 2.4.14.4rc5 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
JasonAlt
approved these changes
Dec 1, 2023
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.