Skip to content

Commit 7101cca

Browse files
committed
Lint
1 parent 02af41b commit 7101cca

File tree

5 files changed

+42
-29
lines changed

5 files changed

+42
-29
lines changed

.markdownlint.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
default: true
3+
4+
MD013: false

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@
77

88
![Main screen capture](docs/oidc.png)
99

10-
To get started, refer to our [Documentation](docs/oidc.md).
10+
To get started, refer to our [documentation](docs/oidc.md).

docker/nginx-certs/README.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,16 @@
1-
Every 90 days these certificates expire. The upstream project/container will refresh its certs occasionally, and we
2-
can sync them here.
1+
# Certificates
2+
3+
Every 90 days these certificates expire. The upstream project/container
4+
will refresh its certs occasionally, and we can sync them here.
35

46
```bash
57
docker pull cirrusid/simplesamlphp:latest
6-
docker run -v $PWD:/opt/tmp/certs cirrusid/simplesamlphp /bin/bash -c 'cp /etc/ssl/certs/${APACHE_CERT_NAME}.key /opt/tmp/certs/default.crt && cp /etc/ssl/private/${APACHE_CERT_NAME}.key /opt/tmp/certs/default.key && openssl x509 -noout -enddate -in /opt/tmp/certs/default.crt > /opt/tmp/certs/expiration'
8+
docker run -v $PWD:/opt/tmp/certs cirrusid/simplesamlphp /bin/bash -c \
9+
'cp /etc/ssl/certs/${APACHE_CERT_NAME}.key /opt/tmp/certs/default.crt &&
10+
cp /etc/ssl/private/${APACHE_CERT_NAME}.key /opt/tmp/certs/default.key &&
11+
openssl x509 -noout -enddate -in /opt/tmp/certs/default.crt >
12+
/opt/tmp/certs/expiration'
713
```
814

9-
The file `expiration` will get updated with the current expiration date of the certificates.
15+
The file `expiration` will get updated with the current expiration date of
16+
the certificates.

docs/configuration.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ After you create the database schema, go to the SimpleSAMLphp admin area:
3232
- OIDC > Client Registry
3333

3434
Notes:
35+
3536
- Clients can be public or confidential.
3637
- Public clients using Authorization Code flow must send PKCE parameters.
3738
- Client ID and secret are generated; use the "show" button to reveal.
3839

3940
## Cron integration
4041

4142
Enable and configure the SimpleSAMLphp cron module to purge expired tokens:
42-
43-
- https://simplesamlphp.org/docs/stable/cron/cron.html
43+
[cron](https://simplesamlphp.org/docs/stable/cron/cron.html)
4444

4545
## Endpoint locations and well-known URLs
4646

@@ -51,9 +51,9 @@ After deployment, visit the SimpleSAMLphp admin area:
5151
There you can see discovery URLs. Typical discovery endpoints are:
5252

5353
- OpenID Connect Discovery:
54-
https://yourserver/simplesaml/module.php/oidc/.well-known/openid-configuration
54+
[https://yourserver/simplesaml/module.php/oidc/.well-known/openid-configuration](https://yourserver/simplesaml/module.php/oidc/.well-known/openid-configuration)
5555
- OpenID Federation configuration:
56-
https://yourserver/simplesaml/module.php/oidc/.well-known/openid-federation
56+
[https://yourserver/simplesaml/module.php/oidc/.well-known/openid-federation](https://yourserver/simplesaml/module.php/oidc/.well-known/openid-federation)
5757

5858
You may publish these as ".well-known" URLs at the web root using your
5959
web server. For example, for `openid-configuration`:
@@ -163,21 +163,21 @@ all SAML entities are present (like a Service Provider). Instead, use the
163163
The OIDC authN state does not include all keys present in SAML authN.
164164
Available SAML-like keys include:
165165

166-
- ['Attributes']
167-
- ['Authority']
168-
- ['AuthnInstant']
169-
- ['Expire']
166+
- \['Attributes'\]
167+
- \['Authority'\]
168+
- \['AuthnInstant'\]
169+
- \['Expire'\]
170170

171171
Source and Destination entity IDs correspond to OP issuer and Client ID:
172172

173-
- ['Source']['entityid'] → OP issuer ID
174-
- ['Destination']['entityid'] → RP (client) ID
173+
- \['Source'\]\['entityid'\] → OP issuer ID
174+
- \['Destination'\]\['entityid'\] → RP (client) ID
175175

176176
Additional OIDC data in the state:
177177

178-
- ['Oidc']['OpenIdProviderMetadata']
179-
- ['Oidc']['RelyingPartyMetadata']
180-
- ['Oidc']['AuthorizationRequestParameters']
178+
- \['Oidc'\]\['OpenIdProviderMetadata'\]
179+
- \['Oidc'\]\['RelyingPartyMetadata'\]
180+
- \['Oidc'\]\['AuthorizationRequestParameters'\]
181181

182182
Example filter configuration:
183183

docs/upgrade.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ apply those relevant to your deployment.
66
## Version 5 to 6
77

88
New features:
9+
910
- Caching support for OIDC protocol artifacts like Access Tokens,
1011
Authorization Codes, Refresh Tokens, but also client and user data.
1112
The cache layer stands in front of the database store, so it can
@@ -48,17 +49,17 @@ find appropriate.
4849
HTTP POST method, in addition to GET.
4950
- Added support for passing authorization request parameters as JWTs,
5051
specifically - passing a Request Object by Value:
51-
https://openid.net/specs/openid-connect-core-1_0.html#RequestObject
52+
[https://openid.net/specs/openid-connect-core-1_0.html#RequestObject](https://openid.net/specs/openid-connect-core-1_0.html#RequestObject)
5253
- Added support for `private_key_jwt` client authentication method at
5354
token endpoint:
54-
https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication
55+
[https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication)
5556

5657
New configuration options:
5758

5859
- (from v6.1) Show `claims_supported` claim in OP Discovery endpoint -
5960
you can now choose to show supported claims, as is recommended by OpenID
6061
Connect Discovery specification
61-
https://openid.net/specs/openid-connect-discovery-1_0.html.
62+
[https://openid.net/specs/openid-connect-discovery-1_0.html](https://openid.net/specs/openid-connect-discovery-1_0.html).
6263
- (optional) Issuer - you can now override the issuer (OP identifier).
6364
If not set, it falls back to the current scheme, host, and optionally
6465
a port (as in all previous module versions).
@@ -110,15 +111,15 @@ Old routes will be removed in version 7.
110111
- If you are using Apache web server: you should check the README file which
111112
now contains a note on how to configure Apache to preserve Authorization
112113
HTTP headers with a Bearer token scheme (stripping of this header in Apache is a
113-
known 'issue': https://github.com/symfony/symfony/issues/19693). If you don't
114+
known [issue](https://github.com/symfony/symfony/issues/19693)). If you don't
114115
set this config, you'll now get warnings about this situation in your logs.
115116
The new authproc filter processing will look in an additional location for
116117
filters, in the main `config.php` under key `authproc.oidc`
117118
- Removed support for plain OAuth2 Implicit flow (response_type `token`),
118119
because of very low usage. Note that the OIDC Implicit flow is still supported
119120
(response_type `id_token token` or `id_token`).
120121

121-
Low-impact changes
122+
Low-impact changes:
122123

123124
- In an effort to move to SimpleSAMLphp way of working with user interface (UI),
124125
the client management UI was updatedto extend from the SimpleSAMLphp base
@@ -136,9 +137,8 @@ OIDC OP implementors. However, if you are using this module as a library or
136137
extending from it, you will probably encounter breaking changes, since a lot
137138
of code has been refactored:
138139

139-
- Upgraded to v5 of lcobucci/jwt https://github.com/lcobucci/jwt
140-
- Upgraded to v3 of laminas/laminas-diactoros
141-
https://github.com/laminas/laminas-diactoros
140+
- Upgraded to v5 of [lcobucci/jwt](https://github.com/lcobucci/jwt)
141+
- Upgraded to v3 of [laminas/laminas-diactoros](https://github.com/laminas/laminas-diactoros)
142142
- SimpleSAMLphp version used during development was bumped to v2.3
143143
- In Authorization Code Flow, a new validation was added which checks for
144144
'openid' value in the 'scope' parameter. Up to now, the 'openid' value was
@@ -181,12 +181,14 @@ like using constructor property promotion, match expressions...
181181
(low maintenance)
182182

183183
# Version 3 to 4
184+
184185
- PHP version requirement was bumped to v8.0 to enable updating important
185186
dependent packages like 'league/oauth2-server' which has already moved to
186187
PHPv8 between their minor releases.
187188
- SimpleSAMLphp version used during development was bumped v2.0
188189

189190
# Version 2 to 3
191+
190192
- Module code was refactored to make it compatible with SimpleSAMLphp v2
191193
- The default key name was changed from oidc_module.pem to oidc_module.key.
192194
If you don't set a custom key name using the option 'privatekey' in a module
@@ -199,11 +201,11 @@ oidc_module.pem to oidc_module.key.
199201

200202
There are many DB changes that need to be applied. Perform the migration by
201203
logging in as an SSP admin to
202-
https://server/simplesaml/module.php/oidc/install.php
204+
[https://server/simplesaml/module.php/oidc/install.php](https://server/simplesaml/module.php/oidc/install.php)
203205

204206
An SSP admin should now use
205-
https://server/simplesaml/module.php/oidc/admin-clients/ to manage clients.
206-
The previous `/clients/` path is for authorized users.
207+
[https://server/simplesaml/module.php/oidc/admin-clients/](https://server/simplesaml/module.php/oidc/admin-clients/)
208+
to manage clients. The previous `/clients/` path is for authorized users.
207209

208210
Review the changes to `config-templates/module_oidc.php` and apply relevant
209211
changes to your configuration. For example, claim types are now supported.

0 commit comments

Comments
 (0)