Skip to content

Releases: kakawait/cas-security-spring-boot-starter

1.0.6

26 Nov 17:39
Compare
Choose a tag to compare
  • Add support for CAS client >= 3.6 (#147)

1.0.5

04 Sep 16:19
Compare
Choose a tag to compare
  • Fix java 11 build error due to incompatibility between lombok and javadoc (#146)

1.0.4

04 Sep 14:02
Compare
Choose a tag to compare
  • Replace @PostConstruct to avoid mess with JDK8 / JDK11

1.0.3

04 Sep 14:02
Compare
Choose a tag to compare
  • Add new interface ProxyCallbackUrlAwareTicketValidator if you'd like to create your own TicketValidator but do not
    want to extends Cas20ServiceTicketValidator (or others) because they added final everywhere and so is impossible
    to extends...

1.0.2

18 Mar 16:44
280c77f
Compare
Choose a tag to compare
  • Update dependencies for security fixes

1.0.1

31 Jan 12:04
f3afa3b
Compare
Choose a tag to compare
  • Happy new year 🎉
  • Move some method to become public in order to facilate customization (02e1e80)

1.0.0

31 Jan 12:01
2f11ae1
Compare
Choose a tag to compare
  • First release that supporting Spring boot 2 (#32)
  • Remove deprecated module cas-security-dynamic-service-resolver (#35)
  • Open some api to facilitate extensibility (#122, #109)

Breaking changes

Spring boot 2 support breaking changes

By supporting Spring Boot 2, you should understand that some security features has been removed on Spring Boot 2 regarding Spring Boot 1 (see official documentations Spring boot 2 migration guide - security and Spring boot 2 security migration).

No more basic auth by default on Spring boot 2

Some behaviors will not be able on Spring Boot 2 for example excepting getting Basic Auth support in addition to Cas Auth if you put security.basic.enabled=true (which is default). You must re-add Basic Auth by yourself like on cas-security-spring-boot-sample.

No more default ROLE_USER and ROLE based authentication by default

In addition, no more default role ROLE_USER will be added to any authenticated user.

Thus default security.cas.authorization.mode (formerly security.cas.authorization.mode) value is now authenticated instead of role.

However if you want to re-add default ROLE_ on every authenticated user you could use:

security:
  cas:
    user:
      default-roles: USER

Where security.cas.user.default-roles accepts list of roles.

And if you comes back to ROLE based authentication instead of just authenticated, you should:

security:
  cas:
    user:
      default-roles: USER
    authorization:
      mode: role
      roles: USER

Where security.cas.authorization.roles (which only useful when using security.cas.authorization.mode=ROLE) is list of roles that use must have to be accepted.

0.8.1

10 Sep 22:23
3f8609c
Compare
Choose a tag to compare

Bug fixes

  • Fix IllegalArgumentException when using security.cas.paths

0.8.0

10 Sep 22:23
578367a
Compare
Choose a tag to compare
Release 0.8.0

0.7.1

25 Apr 08:40
4f792d9
Compare
Choose a tag to compare

Bug fixes

  • Fix pom.xml deployment phase