Skip to content

Commit d1e479d

Browse files
pradtkecicnavi
andauthored
Add changelog and upgrade readme (#152)
* Add changelog and upgrade readme Require admin authentication to initiate DB migration * Add fiew things to the list Co-authored-by: Marko Ivančić <[email protected]>
1 parent 265ef7b commit d1e479d

File tree

4 files changed

+65
-2
lines changed

4 files changed

+65
-2
lines changed

CHANGELOG.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,41 @@ All notable changes to this project will be documented in this file.
55
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
66
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
77

8-
## [Unreleased]
8+
## [2.0.0-rc.1] - 2021-10-08
9+
### Added
10+
- Implicit flow support
11+
- Back-channel logout
12+
- RP initiated logout
13+
- Support for 'sid' claim in ID and logout token
14+
- Support for claim types
15+
- Allow users with specific entitlements to add clients
16+
- Support for ACR
17+
- Support for requesting individual claims
18+
- Support for allowed CORS origins for public clients
19+
- Support for 'at_hash' claim in ID token
20+
- Support for 'max_age' parameter
21+
- List of supported grant types in OP configuration document
22+
- List of supported auth methods for token endpoint in OP configuration document
23+
- Support for 'prompt' parameter, for example using 'prompt=login' to require authentication
24+
even if user has active SSO session
25+
- Works with SSP new UI templating enabled
26+
- Pagination for client list
27+
- Support for basic authentication processing filters, for example for f-ticks logging, attribute
28+
manipulation or similar, definable in oidc_config.php
29+
- Support for 'nonce' claim in ID token
30+
- Config options to add prefix to private scope claims and to enable multi-valued claims
31+
### Changed
32+
- Basic flow is now conformant
33+
- Admin client configuration path has moved
34+
- 'token_endpoint' renamed form '.../access_token.php' to '.../token.php'
35+
- Requires php > 7.4
36+
- Auth. source is now optional when defining clients. If auth. source is not set for particular
37+
client, a default one from the configuration will be used during authn.
38+
### Fixed
39+
- When authorization code is reused corresponding tokens are now immediately revoked
40+
- Returning or displaying proper error messages is now more in line to specification
41+
- Expired access tokens are now only deleted if corresponding refresh tokens are also expired
42+
- JWT header parameter 'kid' is now generated dynamically based on public certificate fingerprint
943

1044
## [1.0.0-rc.2] - 2020-05-17
1145
### Added

README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ Installation can be as easy as executing:
1919

2020
Once you install and configure the module checkout the [FAQ](FAQ.md)
2121

22+
## Upgrading?
23+
24+
If you are upgrading versions checkout the [upgrade guide](UPGRADE.md)
25+
2226
### Configure the database
2327

2428
Edit your `config/config.php` and check you configured at least the next parameters from the _database_ section:

UPGRADE.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
2+
# Version 1 to 2
3+
4+
There are numerous DB changes that need to be applied. Perform the migration by logging in as an SSP admin to
5+
https://server/simplesaml/module.php/oidc/install.php
6+
7+
An SSP admin should now use https://server/simplesaml/module.php/oidc/admin-clients/ to manage clients.
8+
The previous `/clients/` path is for authorized users.
9+
10+
Review the changes to `config-templates/module_oidc.php` and apply relevant changes to your configuration.
11+
For example claim types are now supported.
12+
13+
In version 1, in authorization code flow, user claims were always included in ID token, instead of only
14+
including them if access token was not released, as per specification. Since changing this behavior is a
15+
potential breaking change for Relying Parties, in version 2 a config option 'alwaysAddClaimsToIdToken' is
16+
introduced to enable OpenID Providers to keep the behavior from version 1 by setting it to 'true'.
17+
If 'alwaysAddClaimsToIdToken' is set to 'false', user claims will only be added to ID token if access token was
18+
not released. If access token was released, user claims will have to be fetched from 'userinfo' endpoint.
19+
Note that this option only applies to authorization code flow since implicit flow was not available in version 1.
20+
If you are to use the spec compliant behavior, make sure to warn existing Relying Parties about the change.
21+
22+
Token endpoint was renamed from '.../access_token.php' to '.../token.php'. This is a potential breaking change
23+
for clients that do not fetch OP configuration from the /.well-known/openid-configuration URI dynamically, but
24+
instead hardcode endpoints in their configuration. You should probably warn existing Relying Parties about this
25+
change.

www/install.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@
1515
use SimpleSAML\Module\oidc\Controller\OpenIdConnectInstallerController;
1616
use SimpleSAML\Module\oidc\Services\RoutingService;
1717

18-
RoutingService::call(OpenIdConnectInstallerController::class, false);
18+
RoutingService::call(OpenIdConnectInstallerController::class, true);

0 commit comments

Comments
 (0)