Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump main to v8.4.6 #3

Closed
wants to merge 222 commits into from
Closed

Bump main to v8.4.6 #3

wants to merge 222 commits into from

Conversation

YannDanthu
Copy link

Merge latest v8.x branch.

panva and others added 30 commits December 1, 2022 22:07
BREAKING CHANGE: The non-standard `introspection_endpoint_auth_method`, and `introspection_endpoint_auth_signing_alg` client metadata properties were removed. The client's `token_endpoint_auth_method`, and `token_endpoint_auth_signing_alg` properties are now used as the only indication of how a client must authenticate at the introspection endpoint. The accompanying JWA and authentication methods configuration properties were also removed.
BREAKING CHANGE: The non-standard `revocation_endpoint_auth_method`, and `revocation_endpoint_auth_signing_alg` client metadata properties were removed. The client's `token_endpoint_auth_method`, and `token_endpoint_auth_signing_alg` properties are now used as the only indication of how a client must authenticate at the revocation endpoint. The accompanying JWA and authentication methods configuration properties were also removed.
`Client.prototype.clientAuthMethod` and
`Client.prototype.clientAuthSigningAlg` prototype getters were added as
as aliases to the client's `tokenEndpointAuthMethod` and
`tokenEndpointAuthSigningAlg` getters.

BREAKING CHANGE: The `tokenEndpointAuthMethods` configuration method was renamed to `clientAuthMethods`.
BREAKING CHANGE: The `enabledJWA.tokenEndpointAuthSigningAlgValues` configuration method was renamed to `enabledJWA.clientAuthSigningAlgValues`.
BREAKING CHANGE: It is no longer possible to pass Bearer tokens using the `access_token` query string parameter. This can be reverted using the `acceptQueryParamAccessTokens` configuration option.
BREAKING CHANGE: The client registration management update action now rotates registration access tokens by default. This can be reverted using the `features.registrationManagement.rotateRegistrationAccessToken` configuration option.
BREAKING CHANGE: The PBKDF2 based JWE Key Management Algorithms, which were previously disabled by default, are now completely removed.
BREAKING CHANGE: The "none" JWS algorithm, which was previously disabled by default, is now completely removed.
BREAKING CHANGE: Request Object use now defaults to its stricter definition from RFC 9101 rather than OIDC Core 1.0. This can be reverted using the `features.requestObjects.mode` configuration option.
BREAKING CHANGE: Default Authorization Code duration is now 60 seconds instead of 10 minutes. This can be reverted using the `ttl.AuthorizationCode` configuration option.
BREAKING CHANGE: Removed support for Node.js 12.
BREAKING CHANGE: Removed support for Node.js 14.
BREAKING CHANGE: Removed support for Node.js 16.
BREAKING CHANGE: Node.js LTS 18 (^18.12.0) is now required.
BREAKING CHANGE: PASETO Access Token format support was removed.
BREAKING CHANGE: `httpOptions` no longer defaults to using the npm module `cacheable-lookup` as its `dnsLookup` option. It defaults to `node:dns` module's `lookup` export instead.
BREAKING CHANGE: `oidc-provider` is now an ESM-only module, it must now be imported using the `import` declaration or the `import()` syntax, the `Provider` constructor is the module's default export, the `errors` and `interactionPolicy` exports are the package's named exports. There is no `Provider` named export.
BREAKING CHANGE: `httpOptions` return property `lookup` was renamed to `dnsLookup`.
BREAKING CHANGE: `httpOptions` return property `timeout` was removed, return an `AbortSignal` instance as `signal` property instead.
Node's native `assert()` can be very heavy, especially in a large
project with a source map as it creates a full stack trace on failure.

Co-authored-by: Wayne Robinson <[email protected]>

closes panva#1204
closes panva#1205
BREAKING CHANGE: `request_uri` parameter support is now disabled by default. This can be reverted using the `features.requestObjects.requestUri` configuration option.
BREAKING CHANGE: The RSA1_5 JWE Key Management Algorithm, which was previously disabled by default, is now completely removed.
BREAKING CHANGE: `id_token_signed_response_alg` now must be set when `id_token_encrypted_response_alg` is also set on a client.
BREAKING CHANGE: `userinfo_signed_response_alg` now must be set when `userinfo_encrypted_response_alg` is also set on a client.
BREAKING CHANGE: `introspection_signed_response_alg` now must be set when `introspection_encrypted_response_alg` is also set on a client.
BREAKING CHANGE: `authorization_signed_response_alg` now must be set when `authorization_encrypted_response_alg` is also set on a client.
dependabot bot and others added 28 commits December 18, 2023 20:44
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
@YannDanthu
Copy link
Author

this means moving to esm, so no for now.

@YannDanthu YannDanthu closed this Jun 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.