You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+41-4Lines changed: 41 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,18 +5,50 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5
5
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
6
7
7
## [Unreleased]
8
-
### Added (v9)
8
+
### Added
9
9
- A CryptKeyInterface to allow developers to change the CryptKey implementation with greater ease (PR #1044)
10
10
- The authorization server can now finalize scopes when a client uses a refresh token (PR #1094)
11
11
- An AuthorizationRequestInterface to make it easier to extend the AuthorizationRequest (PR #1110)
12
12
13
-
### Fixed (v9)
13
+
### Fixed
14
14
- If a refresh token has expired, been revoked, cannot be decrypted, or does not belong to the correct client, the server will now issue an `invalid_grant` error and a HTTP 400 response. In previous versions the server incorrectly issued an `invalid_request` and HTTP 401 response (PR #1042) (PR #1082)
15
15
16
-
### Changed (v9)
16
+
### Changed
17
17
- Authorization Request objects are now created through the factory method, `createAuthorizationRequest()` (PR #1111)
18
18
- Changed parameters for `finalizeScopes()` to allow a reference to an auth code ID (PR #1112)
19
19
20
+
## [8.3.3] - released 2021-10-11
21
+
### Security
22
+
- Removed the use of `LocalFileReference()` in lcobucci/jwt. Function deprecated as per [GHSA-7322-jrq4-x5hf](https://github.com/lcobucci/jwt/security/advisories/GHSA-7322-jrq4-x5hf) (PR #1249)
23
+
24
+
## [8.3.2] - released 2021-07-27
25
+
### Changed
26
+
- Conditionally support the `StrictValidAt()` method in lcobucci/jwt so we can use version 4.1.x or greater of the library (PR #1236)
27
+
- When providing invalid credentials, the library now responds with the error message _The user credentials were incorrect_ (PR #1230)
28
+
- Keys are always stored in memory now and are not written to a file in the /tmp directory (PR #1180)
29
+
- The regex for matching the bearer token has been simplified (PR #1238)
30
+
31
+
## [8.3.1] - released 2021-06-04
32
+
### Fixed
33
+
- Revert check on clientID. We will no longer require this to be a string (PR #1233)
34
+
35
+
## [8.3.0] - released 2021-06-03
36
+
### Added
37
+
- The server will now validate redirect uris according to rfc8252 (PR #1203)
38
+
- Events emitted now include the refresh token and access token payloads (PR #1211)
39
+
- Use the `revokeRefreshTokens()` function to decide whether refresh tokens are revoked or not upon use (PR #1189)
40
+
41
+
### Changed
42
+
- Keys are now validated using `openssl_pkey_get_private()` and `openssl_pkey_get_public()` instead of regex matching (PR #1215)
43
+
44
+
### Fixed
45
+
- The server will now only recognise and handle an authorization header if the value of the header is non-empty. This is to circumvent issues where some common frameworks set this header even if no value is present (PR #1170)
46
+
- Added type validation for redirect uri, client ID, client secret, scopes, auth code, state, username, and password inputs (PR #1210)
47
+
- Allow scope "0" to be used. Previously this was removed from a request because it failed an `empty()` check (PR #1181)
48
+
49
+
## [8.2.4] - released 2020-12-10
50
+
### Fixed
51
+
- Reverted the enforcement of at least one redirect_uri for a client. This change has instead been moved to version 9 (PR #1169)
20
52
21
53
## [8.2.3] - released 2020-12-02
22
54
### Added
@@ -534,7 +566,12 @@ Version 5 is a complete code rewrite.
0 commit comments