Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dynamic claim values #23

Merged
merged 17 commits into from
Nov 2, 2021
Merged

Dynamic claim values #23

merged 17 commits into from
Nov 2, 2021

Conversation

bellebaum
Copy link
Contributor

@bellebaum bellebaum commented Nov 2, 2021

This PR, next to several bugfixes,
adds the option to specify desired values for ID token claims.
This is standardized per OIC Core Spec, Section 5.5.
Additionally, we also support requesting claims for an access token in a similar matter when requesting said token.
This behaviour is not standardized, but follows this IETF draft.

Other changes:

  • ENV is now immediately written to config (this also fixed some subtle bugs)
  • Added a script to execute all tests one after the other for convenience

Bugfixes:

  • Replaced wrong occurences of token with id_token
  • disable ID token creation when openid functionality is disabled
  • wrongly expected nil in /token
  • unconfigured logout redirect
  • Issue HTTP-OPTION Requests result in Error #18 : temporary mitigation by means of explicit OPTION request handling

A leftover from past changes noticed thanks to issue #19
A new configuration option was added to the base config to specify a default user backend

This addresses issue #20
And fixed a bug where certain attributes were not updated via the admin API
Replaced wrong occurences of 'token' with 'id_token'
Load webfinger conf through config.rb
Disable id_token creation when openid is set to false
This allows specifying them through the config files alone
and removes several bugs where ENV did not have an effect when it should

Includes some bugfixes:
- expected nil when checking the scopen in /token, got []
- logout redirect unconfigured
It disables sinatra/cors and handles OPTION requests and Access-Control-Allow-* Headers manually

At some point we want to revisit this.
For convenience
@bellebaum
Copy link
Contributor Author

I will rework the README and merge then

@sonarcloud
Copy link

sonarcloud bot commented Nov 2, 2021

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 4 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@bellebaum bellebaum merged commit b83ec8b into master Nov 2, 2021
@bellebaum bellebaum deleted the dynamic-claims-oiclike branch November 4, 2021 07:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant