chore(deps): update dependency openidc/mod_auth_openidc to v2.4.19 #1477
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.4.16.11->v2.4.19Release Notes
OpenIDC/mod_auth_openidc (OpenIDC/mod_auth_openidc)
v2.4.19: release 2.4.19Compare Source
Note that this release changes the internal session format in a backwards incompatible way so existing sessions are invalid.
Features
OIDCCookieSameSiteoffoption toOIDCPassIDTokenAsso no claims from the ID token will be passed onOIDCCryptoPassphraseis not setnote that the
OIDCCryptoPassphrasedoes need to be configured statically if you want sessions to survive server restarts, or for a cluster that shares a session storage backendBugfixes
oidc_session_killinstead of just clearing itOther
id_tokenanduserinfoendpoint as JSON objects in the session - rather than strings - and avoid parsing/serializing overhead; results in up to 7% performance increase, depending on the number of claims stored; changes the internal session format in a backwards incompatible way so existing sessions are invalid!pconfpool memory allocation handling to avoid increasing memory (pool) consumption over graceful restartsSET..EX %dwhen storing cached data instead of the deprecatedSETEXclient-cookiesizeOIDC_ERRORvariables when PAR is configured but not enabled by the Providercurl_easy_setoptinhttp.ctest/test_*.cand migrate proto tests fromtest.cCommercial
The RPM packages below are signed with the following RSA PGP key:
v2.4.18: release 2.4.18Compare Source
Bugfixes
pconfpool (regression since 2.4.14)OIDCMemCacheConnectionsTTL: interpret the value correctly in seconds instead of microseconds (regression since 2.4.16); see #1345; thanks @rpluemOther
srcandtestsubdirsPackaging
Commercial
The RPM packages below are signed with the following RSA PGP key:
v2.4.17: release 2.4.17Compare Source
Features
scopeparameter as returned from the token endpoint in theOIDC_scopeheader/environment variable and make it available forRequire claim scope:purposes, if not available as a claim returned in theid_tokenoruserinfoendpoint; thanks Amaury BuffetBugfixes
token_endpoint_auth_methods_supportedand avoid the log error:oidc_metadata_provider_parse: oidc_provider_token_endpoint_auth_set: invalid valueand falling back to
client_secret_basicafter that; thanks François Koomansigned_jwks_uri_keyin a multi-provider setup; thanks Sami KorvonenOIDCProviderAuthRequestMethod POSTOIDCPreservePost On(both internal and template-based)Commercial
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.