Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(oidc): authz server issuer identification #5912

Merged
merged 1 commit into from
Aug 30, 2023

Conversation

james-d-elliott
Copy link
Member

This implements RFC9207 OAuth 2.0 Authorization Server Issuer Identification which is part of the FAPI 2.0 security profile.

@authelia
Copy link

authelia bot commented Aug 26, 2023

Artifacts

These changes are published for testing on Buildkite, DockerHub and GitHub Container Registry.

Docker Container

  • docker pull authelia/authelia:feat-oidc-rfc9207
  • docker pull ghcr.io/authelia/authelia:feat-oidc-rfc9207

@netlify
Copy link

netlify bot commented Aug 27, 2023

Deploy Preview for authelia-staging ready!

Name Link
🔨 Latest commit 3b9c45b
🔍 Latest deploy log https://app.netlify.com/sites/authelia-staging/deploys/64ee946cfad57d0008d9af92
😎 Deploy Preview https://deploy-preview-5912--authelia-staging.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@codecov
Copy link

codecov bot commented Aug 27, 2023

Codecov Report

Merging #5912 (3c04cb2) into master (34b7a47) will decrease coverage by 0.01%.
The diff coverage is 59.44%.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #5912      +/-   ##
==========================================
- Coverage   73.52%   73.51%   -0.01%     
==========================================
  Files         281      282       +1     
  Lines       24056    24191     +135     
  Branches      443      443              
==========================================
+ Hits        17686    17784      +98     
- Misses       5629     5663      +34     
- Partials      741      744       +3     
Flag Coverage Δ
backend 74.67% <59.44%> (-0.02%) ⬇️
frontend 58.21% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

Files Changed Coverage Δ
internal/middlewares/util.go 100.00% <ø> (ø)
internal/oidc/client_credentials.go 88.35% <ø> (ø)
internal/oidc/flow_client_credentials.go 100.00% <ø> (ø)
internal/oidc/flow_refresh.go 84.21% <ø> (ø)
internal/oidc/types.go 100.00% <ø> (ø)
internal/oidc/resposne_mode.go 52.58% <52.58%> (ø)
internal/handlers/handler_oidc_authorization.go 24.39% <66.66%> (+0.93%) ⬆️
internal/oidc/util.go 98.40% <90.00%> (-0.48%) ⬇️
internal/oidc/client_policy.go 39.34% <100.00%> (ø)
internal/oidc/config.go 100.00% <100.00%> (ø)
... and 1 more

... and 2 files with indirect coverage changes

@james-d-elliott james-d-elliott force-pushed the feat-oidc-rfc9207 branch 2 times, most recently from c118f5e to 3c04cb2 Compare August 27, 2023 03:07
@james-d-elliott james-d-elliott added this to the v4.38.0 milestone Aug 27, 2023
@james-d-elliott james-d-elliott changed the title feat(oidc): rfc9207 server issuer identification feat(oidc): authorization server issuer identification Aug 27, 2023
@james-d-elliott james-d-elliott changed the title feat(oidc): authorization server issuer identification feat(oidc): auth server issuer identification Aug 27, 2023
@james-d-elliott james-d-elliott changed the title feat(oidc): auth server issuer identification feat(oidc): authz server issuer identification Aug 27, 2023
This implements RFC9207 OAuth 2.0 Authorization Server Issuer Identification which is part of the FAPI 2.0 security profile.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
@james-d-elliott james-d-elliott merged commit 0da4abf into master Aug 30, 2023
47 of 49 checks passed
@james-d-elliott james-d-elliott deleted the feat-oidc-rfc9207 branch August 30, 2023 11:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant