diff --git a/CHANGELOG.md b/CHANGELOG.md index c6f59ab..8d7056a 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,9 @@ # Changelog +## v0.4.5 + +* Bug: parse `issuer` as `String` and not as `Url` as it caused issuer mismatches during token validation + ## v0.4.4 * Bug: If auth state is missing in the session and token validation is off, use match to safely unwrap diff --git a/Cargo.lock b/Cargo.lock index bc17ac8..16c3a78 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -1160,7 +1160,7 @@ checksum = "af190c94f2773fdb3729c55b007a722abb5384da03bc0986df4c289bf5567e96" [[package]] name = "wasm-oidc-plugin" -version = "0.4.4" +version = "0.4.5" dependencies = [ "aes-gcm", "base64 0.22.1", diff --git a/Cargo.toml b/Cargo.toml index 5e6f743..b92e3bc 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,7 +1,7 @@ [package] publish = false name = "wasm-oidc-plugin" -version = "0.4.4" +version = "0.4.5" authors = ["WWU Cloud Developer , Anton Engelhardt "] description = "A plugin for the Envoy-Proxy written in Rust. It is a HTTP Filter, that implements the OIDC Authorization Code Flow. Requests sent to the filter are checked for the presence of a valid session cookie. If the cookie is not present, the user is redirected to the authorization_endpoint to authenticate. After successful authentication, the user is redirected back to the original request with a code in the URL query. The plugin then exchanges the code for a token using the token_endpoint and stores the token in the session. If the cookie is present, the plugin validates the token and passes the request to the backend, if the token is valid (optional)." license = "Apache-2.0"