Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package apache2-mod_auth_openidc for openSUSE:Factory checked in at 2024-12-19 21:41:52 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/apache2-mod_auth_openidc (Old) and /work/SRC/openSUSE:Factory/.apache2-mod_auth_openidc.new.29675 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "apache2-mod_auth_openidc" Thu Dec 19 21:41:52 2024 rev:33 rq:1232177 version:2.4.16.6 Changes: -------- --- /work/SRC/openSUSE:Factory/apache2-mod_auth_openidc/apache2-mod_auth_openidc.changes 2024-09-20 17:13:35.367674676 +0200 +++ /work/SRC/openSUSE:Factory/.apache2-mod_auth_openidc.new.29675/apache2-mod_auth_openidc.changes 2024-12-19 21:42:03.716241084 +0100 @@ -1,0 +2,57 @@ +Wed Dec 11 13:55:46 UTC 2024 - pgaj...@suse.com + +- version update to 2.4.16.6 + 12/05/2024 + - metadata: fix caching of JWKs from jwks_uri when using the default expiry setting (i.e. not using OIDCJWKSRefreshInterval) + and avoid fetching JWKs from the jwks_uri for each user login; also addresses Redis cache + error entries the log [ERR invalid expire time in 'setex' command] + - avoid segfault and improve error reporting in case apr_temp_dir_get fails when a temp directory cannot be found + on the system upon initalizing cache mutexes and file cache; see #1288; thanks @ErmakovDmitriy + 11/21/2024 + - add option to set local address for outgoing HTTP requests; see #1283; thanks @studersi + using e.g. SetEnvIfExpr true OIDC_CURL_INTERFACE=192.168.10.2 + - try and address metris cleanup segmentation fault on shutdown; see #1207 + by not flushing metrics to the shared memory segment upon exit + 11/14/2024 + - allow specific settings Strict|Lax|None|Disabled for OIDCCookieSameSite in addition to On(=Lax)|Off(=None) + - fix: default behaviour Lax + - fix: apply OIDCCookieSameSite Off/None properly to state cookies instead of always setting Lax + - re-introduces the option to configure a Strict SameSite session cookie policy, which will turn the initial + Lax session cookie - set upon receving the response to the Redirect URI - into a Strict session cookie + immediately after the first application request + - allows for a "Disabled" value that does not set any SameSite flag on the cookies, in which case a browser + falls back to its default browser behaviour (which should be Lax by spec) + 11/07/2024 + - info: fix requests to the info hook with extend_session=false; see #1279; thanks @fnieri-cdp + - properly reflect the (unmodified) inactivity timeout in the response ("timeout") + - avoid refreshing an access token (since the session is not saved) + - avoid refreshing claims from the user info endpoint, and possibly refreshing the access token + 10/23/2024 + - metadata: allow plain HTTP URLs in metadata elements `jwks_uri` and `signed_jwks_uri` + to ensure backwards compatibility with <=2.4.15.7 and to support private/test deployments + 10/22/2024 + - address warnings from static code analysis tool CodeChecker + 10/04/2024 + - ensure backwards compatibility with versions <2.4.16.x when a JSON array of string values + is provided in the "aud" claim of the ID token; required by (at least) Oracle IDCS + see #1272 and #1273; thanks @lufik and @tydalforce + - add OIDCIDTokenAudValues configuration primitive that allows for explicit (and exhaustive) + configuration of the list of accepted values in the "aud" claim of the ID token + e.g. as required for passing FAPI 2 conformance testing + 09/27/2024 + - correct usage of free() for json_dumps return values instead of cjose_get_dealloc()() + - use compact encoding and preserve order where appropriate for most calls to json_dumps + - replace json_dumps/free combos with oidc_util_encode_json + - refactor oidc_jwk_to_json + 09/26/2024 + - fix oidc_jwk_copy wrt. "x5t", which broke private_key_jwt authentication to Azure AD since 2.4.13 + see #1269; thanks @uoe-pjackson + 09/21/2024 + - refactor state and userinfo + 09/11/2024 + - change warnings about not passing unknown claim types into debug messages; see #1263; thanks @nclarkau + 09/09/2024 + - fix accepting custom cookie names in OIDCOAuthAcceptTokenAs cookie:<name>; see #1261; thanks @bbartke + - improve basic authentication parsing when using OIDCOAuthAcceptTokenAs basic + +------------------------------------------------------------------- Old: ---- mod_auth_openidc-2.4.16.3.tar.gz New: ---- mod_auth_openidc-2.4.16.6.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ apache2-mod_auth_openidc.spec ++++++ --- /var/tmp/diff_new_pack.YFg5GT/_old 2024-12-19 21:42:04.492273249 +0100 +++ /var/tmp/diff_new_pack.YFg5GT/_new 2024-12-19 21:42:04.492273249 +0100 @@ -17,7 +17,7 @@ Name: apache2-mod_auth_openidc -Version: 2.4.16.3 +Version: 2.4.16.6 Release: 0 Summary: Apache2.x module for an OpenID Connect enabled Identity Provider License: Apache-2.0 ++++++ mod_auth_openidc-2.4.16.3.tar.gz -> mod_auth_openidc-2.4.16.6.tar.gz ++++++ ++++ 7417 lines of diff (skipped)