- [#126] Add discovery_url_options option for discovery endpoints URL generation (thanks to @phlegx)
- [#123] Remove reference to ApplicationRecord (thanks to @wheeyls)
- [#124] Clone doorkeeper.grant_flows array before appending 'refresh_token' (thanks to @davidbasalla)
- [#129] Avoid to use the config alias while supporting Doorkeeper 5.2 (thanks to @kymmt90)
- [#119] Execute end_session_endpoint in the controllers context (thanks to @joeljunstrom)
- [#111] Add configuration callback
select_account_for_resource_owner
to support theprompt=select_account
param - [#112] Add grant_types_supported to discovery response
- [#114] Fix user_info endpoint when used in api mode
- [#116] Support Doorkeeper API (> 5.4) for registering custom grant flows.
- [#117] Fix migration template to use Rails migrations DSL for association.
- [#118] Use fragment urls for implicit flow error redirects (thanks to @joeljunstrom)
- [#108] Add support for Doorkeeper 5.4
- [#103] Add support for end_session_endpoint
- [#109] Test against Ruby 2.7 & Rails 6.x
This version adds on_delete: :cascade
to the migration template for the oauth_openid_requests
table, in order to fix #82.
For existing installations, you should add a new migration in your application to drop the existing foreign key and replace it with a new one with on_delete: :cascade
included. Depending on the database you're using and the size of your application this might bring up some concerns, but in most cases the following should be sufficient:
class UpdateOauthOpenIdRequestsForeignKeys < ActiveRecord::Migration[5.2]
def up
remove_foreign_key(:oauth_openid_requests, column: :access_grant_id)
add_foreign_key(:oauth_openid_requests, :oauth_access_grants, column: :access_grant_id, on_delete: :cascade)
end
def down
remove_foreign_key(:oauth_openid_requests, column: :access_grant_id)
add_foreign_key(:oauth_openid_requests, :oauth_access_grants, column: :access_grant_id)
end
end
- [#96] Bump
json-jwt
because of CVE-2019-18848 (thanks to @leleabhinav) - [#97] Fixes for compatibility with Doorkeeper 5.2 (thanks to @linhdangduy)
- [#98] Cascade deletes from
oauth_openid_requests
tooauth_access_grants
(thanks to @manojmj92) - [#99] Fix
audience
claim when application is not set on access token (thanks to @ionut998)
- [#85] This gem now requires Doorkeeper 5.2, Rails 5, and Ruby 2.4
- [#81] Allow silent authentication without user consent (thanks to @jarosan)
- Don't support Doorkeeper >= 5.2 due to breaking changes
- [#80] Check for client presence in controller, fixes a 500 error when
client_id
is missing (thanks to @cincospenguinos @urnf @isabellechalhoub)
- [#75] Fix return value for
after_successful_response
(thanks to @daveed)
- [#72] Add
revocation_endpoint
andintrospection_endpoint
to discovery response (thanks to @scarfacedeb)
- [#70] This gem now requires Doorkeeper 5.0, and actually has done so since v1.5.4 (thanks to @michaelglass)
- [#69] Return
crv
parameter for EC keys (thanks to @marco-nicola)
- [#66] Fix an open redirect vulnerability (CVE-2019-9837, thanks to @meagar)
- [#67] Don't delete existing tokens with
prompt=consent
(thanks to @nov)
- [#62] Support customization of redirect params in
id_token
andid_token token
responses (thanks to @meagar)
- [#60] Don't break native authorization in Doorkeeper 5.x
- [#58] Use versioned migrations for Rails 5.x (thanks to @tvongaza)
- [#56] The previous release was a bit premature, this fixes some compatibility issues with Doorkeeper 5.x
- [#55] This gem is now compatible with Doorkeeper 5.x
- [#52] Custom claims can now also be returned directly in the ID token, see the updated README for usage instructions
- Support for Ruby versions older than 2.3 was dropped
- Redirect errors per Section 3.1.2.6 of OpenID Connect 1.0 (by @ryands)
- Set
id_token
when it's nil in token response (it's used inrefresh_token
requests) (by @Miouge1)
- Support for Implicit Flow (
response_type=id_token
andresponse_type=id_token token
), see the updated README for usage instructions (by @nashby, @nhance and @stevenvegt)
- The configuration setting
jws_private_key
was renamed tosigning_key
, you can still use the old name until it's removed in the next major release
- Support for pairwise subject identifiers (by @travisofthenorth)
- Support for EC and HMAC signing algorithms (by @110y)
- Claims now receive an optional third
access_token
argument which allow you to dynamically adjust claim values based on the client's token (by @gigr)
- Fixes the
undefined local variable or method 'pre_auth'
error
- The configuration setting
jws_public_key
wasn't actually used, it's deprecated now and will be removed in the next major release - The undocumented shorthand
to_proc
syntax for defining claims (claim :user, &:name
) is not supported anymore
- Claims now receive an optional second
scopes
argument which allow you to dynamically adjust claim values based on the requesting applications' scopes (by @nbibler) - The
prompt
parameter valueslogin
andconsent
are now supported - The configuration setting
protocol
was added (by @gigr)
- Standard Claims are now mapped correctly to their default scopes (by @tylerhunt)
- Blank
nonce
parameters are now ignored
nil
values and empty strings are now removed from the UserInfo and IdToken responses- Allow
json-jwt
dependency at ~> 1.6. (by @nbibler) - Configuration blocks no longer internally use
instance_eval
which previously gave undocumented and unexpectedself
access to the caller (by @nbibler)
This release is a general clean-up and adds support for some advanced OpenID Connect features.
- This version adds a table to store temporary nonces, use the generator
doorkeeper:openid_connect:migration
to create a migration - Implement the new configuration callbacks
auth_time_from_resource_owner
andreauthenticate_resource_owner
to support advanced features
- Add discovery endpoint (a16caa8)
- Add webfinger and keys endpoints for discovery (f70898b)
- Add supported claims to discovery response (1d8f9ea)
- Support prompt=none parameter (c775d8b)
- Store and return nonces in IdToken responses (d28ca8c)
- Add generator for initializer (80399fd)
- Support max_age parameter (aabe3aa)
- Respect scope grants in UserInfo response (25f2170)