Releases: indigo-dc/oidc-agent
Releases · indigo-dc/oidc-agent
oidc-agent 3.2.3
Enhancements
- Added public client for deep datacloud
- Added public client for extreme datacloud
oidc-agent 3.2.2
Enhancements
- Add possibility to avoid custom uri scheme (useful when running on a remote server)
- Now displaying warning message when client registration could not register all requested scopes.
Bugfixes:
- Fixed bug with doubled communication when not all required scopes could be registered
oidc-agent 3.2.0
Features
- Added the possibility to allow applications that run under another user to obtain tokens from the agent, when starting the agent with the
--with-group
option
oidc-agent 3.1.2
Bugfixes
- Fixed a bug due to which no error message was displayed when trying to
load an account configuration and the oidc-agent directory was not
accessible for oidc-add. - This bug also caused the agent to crash if oidc-token was used to load
this account configuration on the fly and the oidc-agent directory was
not accessible for oidc-agent.
oidc-agent 3.1.1
Bugfixes
- Fixed a bug that did not save the information from dynamic client registration. See #208 for more details.
Dependencies
- Updated the cJSON library
oidc-agent 3.1.0
This releases brings support for oidc-agent on MacOS
oidc-agent 3.0.2
Bugfixes
- Fixed a segfault if the pubclients.conf file does not exist
- Fixed segfault if the issuer.config in the oidc-agent directory doesn't exist and an AT is requested by issuer.
- Fixed behavior of oidc-gen -p when the passed file does not exist.
oidc-agent 3.0.1
Added an public client for elixir
oidc-agent 3.0.0
Features
- Support for agent forwarding
- Support for default account configuration for providers:
- Defaults can be set in the
issuer.config
file in the oidc-agent directory - Other applications can request access tokens by the issuer (IPC-API, liboidc-agent)
oidc-token
can be used with issuer url
- Defaults can be set in the
API
- Incompatible! Changed the type of the oidc-agent socket from
SOCK_SEQPACKET
toSOCK_STREAM
- Added
getAccessToken2
to liboidc-agent; should be used if only an access token is requested - Added
getAccessTokenForIssuer
andgetTokenResponseForIssuer
to liboidc-agent to request access tokens by issuer and not by shortname.
oidc-agent 2.3.1
Bugfixes
- Fixed the course of a bug that would not utilize the cached AT when an application requests an AT with an empty scope value. This fix might have also fixed other unknown bugs.
- Improved the user prompt message for autoload when the application does not send an application_hint
- Fix a bug related to the confirm feature: after a request is declined it was impossible to get an access token for this configuration without reloading the configuration.
Enhancements
- Improved error handling when a wrong refresh token is used