Skip to content

v1.0.0

Compare
Choose a tag to compare
@github-actions github-actions released this 05 Dec 16:11
· 12 commits to main since this release
356dd89

1.0.0 (2022-12-05)

Bug Fixes

  • add authorization to cors (#48) (d02653e)
  • add authorizations to userinfo (#37) (2966355)
  • add code_challenge_methods_supported to discovery endpoint (#43) (57cf8ee)
  • Add db scanner methods for SpaceDelimitedArray (#194) (5fb36bf)
  • add missing WithCustomEndSessionEndpoint (5af734d)
  • add missing WithCustomKeysEndpoint (c3e583b)
  • allow additional scopes (#69) (2370409)
  • allow http schema for redirect url for native apps in dev mode (#242) (a314c14)
  • allow loopback redirect_uri for native apps (72fc861)
  • allowed ConcatenateJSON with empty input (#138) (c45f03e)
  • another typo (4cf6c6d)
  • append client id to aud (#71) (13b1473)
  • aud (a731a46)
  • avoid potential race conditions (#220) (c4b7ef9)
  • change callbackpath (#74) (27f3bc0)
  • change channel for GetSigningKey to time (a2e2f06)
  • Change op.tokenHandler to follow the same pattern as the rest of the endpoint handlers (#210) (2d248b1)
  • check grant types and add refresh token to discovery (14faebb)
  • check refresh token grant type (#100) (3e336a4)
  • cli client (#92) (5cd7bae)
  • clock skew when using jwt profile (b23f37f)
  • code challenge (c316986)
  • create access token from storage (5e7e5eb)
  • custom absolute endpoints (660519a)
  • decode basic auth header components (clientID, clientSecret) (deb3365)
  • dependencies (5b6175a)
  • Ease dev host name constraints (8661300)
  • encoding of basic auth header values (d7d7daa)
  • end session (#35) (628bc4e)
  • ensure signer has key on OP creation (e39146c)
  • explicit allow Origin from request (c88e6b4)
  • grant_types_supported in discovery (2ebbd7a)
  • handle code separately (#30) (58545a1)
  • handle keys without use in FindMatchingKey (bcd9ec8)
  • handle single aud string claim, extract en/decoder interface, comments (#51) (abd3b6f)
  • implement storage (7700cb3)
  • improve example & fix userinfo marshal (#132) (ff2c164)
  • improve interceptor handling (#49) (c828290)
  • improve JWS and key verification (#128) (a63fbee)
  • jwt profile request in op (fd3daa2)
  • make checkKey public (7e2c22f)
  • make GenerateJWTProfileToken public (#82) (fa92a20)
  • make pkce code_verifier spec compliant #125 (fcad98f)
  • make pkce code_verifier spec compliant #125 (af3a497), closes /datatracker.ietf.org/doc/html/rfc7636#section-4
  • marshal user info address (#58) (60560ce)
  • move to new org (#177) (550f787)
  • parse error (cae42cc)
  • parse max_age and prompt correctly (and change scope type) (#105) (400f5c4)
  • possible nil pointer on userinfo (f40a07f)
  • remove bracket (#40) (3507057)
  • remove signing key creation (when not found) (06dcac4)
  • remove test because we know it works. :P (28f731c)
  • removeUserinfoScopes return new slice (without manipulating passed one) (#110) (1132c9d)
  • return error when delegating user in jwt profile request (#94) (a2601f1)
  • rp verification process (#95) (850faa1)
  • rp.RefreshAccessToken did not work (#216) (88a98c0)
  • simplify JWTProfileVerifier interface (39fef3e)
  • state and auth code response encoding (#185) (854e14b)
  • storage interface (17a72cc)
  • supported ui locales from config (#107) (8a35b89)
  • typo (df432c8)
  • unmarshalling of audience as array (#53) (f645dd3)
  • url safe encryption with no padding (#93) (b258b3c)
  • use default redirect uri when not passed on end_session endpoint (#201) (53ede2e)
  • UserInfo with JWT access token (return error in DecryptAES) (9b480be)
  • WithPath on NewCookieHandler set domain instead! (#240) (89d1c90)
  • cli: added implementation for token to client for caching (#29) (303fdfc)
  • version (535c758)
  • version! (80f1272)
  • wrap original fetch key error (f2f509a)

Features

BREAKING CHANGES

    • move functions from utils package into separate packages