openid-client 4.7.4 → 4.7.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "openid-client",
3
- "version": "4.7.4",
3
+ "version": "4.7.5",
4
4
  "description": "OpenID Connect Relying Party (RP, Client) implementation for Node.js runtime, supports passportjs",
5
5
  "keywords": [
6
6
  "auth",
package/types/index.d.ts CHANGED
@@ -380,6 +380,8 @@ export interface IntrospectionResponse {
380
380
  username?: string;
381
381
  aud?: string | string[];
382
382
  scope: string;
383
+ sub?: string;
384
+ nbf?: number;
383
385
  token_type?: string;
384
386
  cnf?: {
385
387
  "x5t#S256"?: string;
package/CHANGELOG.md DELETED
@@ -1,1108 +0,0 @@
1
- # Changelog
2
-
3
- All notable changes to this project will be documented in this file. See [standard-version](https://github.com/conventional-changelog/standard-version) for commit guidelines.
4
-
5
- ## [4.7.4](https://github.com/panva/node-openid-client/compare/v4.7.3...v4.7.4) (2021-05-25)
6
-
7
-
8
- ### Bug Fixes
9
-
10
- * **typescript:** add a missing PATCH method to requestResource ([6b2c3ce](https://github.com/panva/node-openid-client/commit/6b2c3ce09b45a301911fb9f8e1e52831063f7063)), closes [#368](https://github.com/panva/node-openid-client/issues/368)
11
-
12
- ## [4.7.3](https://github.com/panva/node-openid-client/compare/v4.7.2...v4.7.3) (2021-04-30)
13
-
14
-
15
- ### Bug Fixes
16
-
17
- * **fapi:** validate ID Token's iat regardless of which channel it came from ([b68b9ab](https://github.com/panva/node-openid-client/commit/b68b9ab5af6a85a2f42adf6b782cef7e08378658))
18
-
19
- ## [4.7.2](https://github.com/panva/node-openid-client/compare/v4.7.1...v4.7.2) (2021-04-23)
20
-
21
-
22
- ### Bug Fixes
23
-
24
- * **typescript:** add types for 4.6.0 additions ([9064136](https://github.com/panva/node-openid-client/commit/9064136d959b5825f69b32344bbe165f12a10949))
25
-
26
- ## [4.7.1](https://github.com/panva/node-openid-client/compare/v4.7.0...v4.7.1) (2021-04-22)
27
-
28
-
29
- ### Bug Fixes
30
-
31
- * **typescript:** add types for 4.7.0 additions ([2c1d2ab](https://github.com/panva/node-openid-client/commit/2c1d2ab71fe2daba2dad23af1f92f66c92305df5))
32
-
33
- ## [4.7.0](https://github.com/panva/node-openid-client/compare/v4.6.0...v4.7.0) (2021-04-22)
34
-
35
-
36
- ### Features
37
-
38
- * add abort control over Device Flow Handle polling ([#357](https://github.com/panva/node-openid-client/issues/357)) ([f6faa68](https://github.com/panva/node-openid-client/commit/f6faa68850e2582c92e69fa420b8d5c58bfc951c)), closes [#355](https://github.com/panva/node-openid-client/issues/355) [#356](https://github.com/panva/node-openid-client/issues/356)
39
-
40
- ## [4.6.0](https://github.com/panva/node-openid-client/compare/v4.5.2...v4.6.0) (2021-03-25)
41
-
42
-
43
- ### Features
44
-
45
- * added OAuth 2.0 Pushed Authorization Requests client API ([e7af9f5](https://github.com/panva/node-openid-client/commit/e7af9f5125c9c1a8877482b8fda44954e60707a1)), closes [#259](https://github.com/panva/node-openid-client/issues/259)
46
-
47
- ## [4.5.2](https://github.com/panva/node-openid-client/compare/v4.5.1...v4.5.2) (2021-03-24)
48
-
49
-
50
- ### Bug Fixes
51
-
52
- * interoperable audience array value for JWT Client auth assertions ([da7d2f0](https://github.com/panva/node-openid-client/commit/da7d2f0090cd0323a14702bcca77536eb4e2b49d))
53
-
54
- ## [4.5.1](https://github.com/panva/node-openid-client/compare/v4.5.0...v4.5.1) (2021-03-15)
55
-
56
-
57
- ### Bug Fixes
58
-
59
- * use mtls token endpoint alias as audience when using jwt auth with mtls constrained tokens ([c463359](https://github.com/panva/node-openid-client/commit/c4633591ed7ebdf973b0240959078a8217beccbb))
60
-
61
- ## [4.5.0](https://github.com/panva/node-openid-client/compare/v4.4.2...v4.5.0) (2021-03-10)
62
-
63
-
64
- ### Features
65
-
66
- * include `nbf` in FAPIClient Request Objects ([0be56ba](https://github.com/panva/node-openid-client/commit/0be56ba5622e0062495965f55285438542da614e))
67
-
68
- ## [4.4.2](https://github.com/panva/node-openid-client/compare/v4.4.1...v4.4.2) (2021-03-07)
69
-
70
-
71
- ### Bug Fixes
72
-
73
- * resolve discovery URIs one by one to yield consistent results ([6b18218](https://github.com/panva/node-openid-client/commit/6b18218cfa098195ec8442086221a88fa6aef654)), closes [#260](https://github.com/panva/node-openid-client/issues/260) [#267](https://github.com/panva/node-openid-client/issues/267)
74
-
75
- ## [4.4.1](https://github.com/panva/node-openid-client/compare/v4.4.0...v4.4.1) (2021-02-26)
76
-
77
-
78
- ### Bug Fixes
79
-
80
- * hide AggregateError message stack ([3011cca](https://github.com/panva/node-openid-client/commit/3011ccabc63e670adcee432b6565d10b55554865)), closes [#336](https://github.com/panva/node-openid-client/issues/336)
81
-
82
- ## [4.4.0](https://github.com/panva/node-openid-client/compare/v4.3.0...v4.4.0) (2021-01-29)
83
-
84
-
85
- ### Features
86
-
87
- * allow options.https.pfx for mTSL ([075cad7](https://github.com/panva/node-openid-client/commit/075cad73a28d825128e6c92d44e7dba556b6a6f4)), closes [#326](https://github.com/panva/node-openid-client/issues/326)
88
-
89
- ## [4.3.0](https://github.com/panva/node-openid-client/compare/v4.2.3...v4.3.0) (2021-01-22)
90
-
91
-
92
- ### Features
93
-
94
- * **typescript:** add userinfo response generics ([b176b2f](https://github.com/panva/node-openid-client/commit/b176b2f9161be77082c520ab532c237380abda22))
95
-
96
- ## [4.2.3](https://github.com/panva/node-openid-client/compare/v4.2.2...v4.2.3) (2021-01-18)
97
-
98
-
99
- ### Performance
100
-
101
- * use base64url encoding in node when available ([24ab5b4](https://github.com/panva/node-openid-client/commit/24ab5b46c688cd1dd3679fe61a9de668c87e656b))
102
-
103
- ## [4.2.2](https://github.com/panva/node-openid-client/compare/v4.2.1...v4.2.2) (2020-11-30)
104
-
105
-
106
- ### Bug Fixes
107
-
108
- * push pkce <> response type resolution to the authenticate function ([1970af4](https://github.com/panva/node-openid-client/commit/1970af41dc0cd62d44efb1f0a48bdc2a70bcd608)), closes [#312](https://github.com/panva/node-openid-client/issues/312)
109
-
110
- ## [4.2.1](https://github.com/panva/node-openid-client/compare/v4.2.0...v4.2.1) (2020-10-27)
111
-
112
-
113
- ### Bug Fixes
114
-
115
- * **typescript:** add state property to AuthorizationParameters ([#305](https://github.com/panva/node-openid-client/issues/305)) ([b9dfa60](https://github.com/panva/node-openid-client/commit/b9dfa6064d7823ab0bb3eed486a3a5c7ad452982)), closes [#304](https://github.com/panva/node-openid-client/issues/304)
116
-
117
- ## [4.2.0](https://github.com/panva/node-openid-client/compare/v4.1.1...v4.2.0) (2020-10-03)
118
-
119
-
120
- ### Features
121
-
122
- * add callback extras to strategy options ([#295](https://github.com/panva/node-openid-client/issues/295)) ([b77466d](https://github.com/panva/node-openid-client/commit/b77466ddb597accdb783bad07566f28db0d2c827))
123
-
124
- ## [4.1.1](https://github.com/panva/node-openid-client/compare/v4.1.0...v4.1.1) (2020-09-14)
125
-
126
-
127
- ### Bug Fixes
128
-
129
- * **typescript:** ts module interop issues with default export ([6ca57d0](https://github.com/panva/node-openid-client/commit/6ca57d0ef08c188c1da7f3c980b74ba3abf33966)), closes [#291](https://github.com/panva/node-openid-client/issues/291)
130
-
131
- ## [4.1.0](https://github.com/panva/node-openid-client/compare/v4.0.2...v4.1.0) (2020-09-11)
132
-
133
-
134
- ### Features
135
-
136
- * OAuth 2.0 DPoP in various relevant API interfaces ([44a0de7](https://github.com/panva/node-openid-client/commit/44a0de7ceb62cabacd62798ac136f1c394907028))
137
-
138
- ## [4.0.2](https://github.com/panva/node-openid-client/compare/v4.0.1...v4.0.2) (2020-09-11)
139
-
140
-
141
- ### Bug Fixes
142
-
143
- * updated request object mime-type as per draft-ietf-oauth-jwsreq-30 ([d5cc619](https://github.com/panva/node-openid-client/commit/d5cc619cbf137c42898229546e44b8f065af6e3f))
144
-
145
- ## [4.0.1](https://github.com/panva/node-openid-client/compare/v4.0.0...v4.0.1) (2020-09-10)
146
-
147
-
148
- ### Bug Fixes
149
-
150
- * ensure minimal got version handles upcoming node version changes ([fd737a3](https://github.com/panva/node-openid-client/commit/fd737a3598c29d7069328156e06b23d08c1f50c6))
151
-
152
- ## [4.0.0](https://github.com/panva/node-openid-client/compare/v3.15.10...v4.0.0) (2020-09-09)
153
-
154
-
155
- ### ⚠ BREAKING CHANGES
156
-
157
- * the deprecated `issuer.key()` method was removed
158
- * due to added ESM module support Node.js version with
159
- ESM implementation bugs are no longer supported, this only affects early
160
- v13.x versions. The resulting Node.js semver range is
161
- `^10.19.0 || >=12.0.0 < 13 || >=13.7.0` (also taking into account the
162
- `got` dependency update)
163
- * upgraded got http request library dependency from
164
- `v9.x` to `v11.x`. If you override some of the http request options
165
- you will most certainly have to accomodate them.
166
- * Signed Request Object "typ" changed from `JWT` to
167
- `oauth.authz.req+jwt`
168
- * Encrypted Request Object "cty" changed from `JWT` to
169
- `oauth.authz.req+jwt`
170
- * PKCE is now used by default in the passport strategy
171
- * `client.userinfo()` `verb` parameter was renamed to
172
- `method`
173
- * the deprecated `client.resource()` method was removed
174
-
175
- ### Features
176
-
177
- * added support for ESM (ECMAScript modules) ([3ac37e8](https://github.com/panva/node-openid-client/commit/3ac37e80d66d47e9814972ed86d1323b9ee96b79))
178
- * passport strategy will now use PKCE by default where applicable ([56f9fe7](https://github.com/panva/node-openid-client/commit/56f9fe7171ccc1bec6427d4f9bc45e419150ab4d))
179
-
180
-
181
- ### Bug Fixes
182
-
183
- * request object type changed from 'JWT' to 'oauth.authz.req+jwt' ([641a42f](https://github.com/panva/node-openid-client/commit/641a42fdd3097289085340afab652e4b8b9f571c))
184
-
185
-
186
- ### Refactor
187
-
188
- * remove deprecated `client.resource()` ([c0ec865](https://github.com/panva/node-openid-client/commit/c0ec8652673c7b276a7c71eb2d730eb3feb22eeb))
189
- * remove deprecated `issuer.key()` ([5cd1ecf](https://github.com/panva/node-openid-client/commit/5cd1ecfced358c7a685d9dc29aa451a9ef13b770))
190
- * rename `client.userinfo()` `verb` parameter to `method` ([4cb21a4](https://github.com/panva/node-openid-client/commit/4cb21a4c2aef6421fe7a0f67d45baf209989cdd4))
191
- * upgrade got from v9.x to v11.x ([c72b5e8](https://github.com/panva/node-openid-client/commit/c72b5e812f6a94a92e008facefa72c366728d4a5))
192
-
193
- ## [3.15.10](https://github.com/panva/node-openid-client/compare/v3.15.9...v3.15.10) (2020-09-02)
194
-
195
-
196
- ### Bug Fixes
197
-
198
- * **typescript:** add missing types ([#284](https://github.com/panva/node-openid-client/issues/284)) ([49e0ff0](https://github.com/panva/node-openid-client/commit/49e0ff0c695cabd54148bc8a83611dd4ef6ed47c))
199
-
200
- ## [3.15.9](https://github.com/panva/node-openid-client/compare/v3.15.8...v3.15.9) (2020-07-26)
201
-
202
-
203
- ### Bug Fixes
204
-
205
- * **typescript:** max_age in AuthorizationParameters is a number ([5ce2a73](https://github.com/panva/node-openid-client/commit/5ce2a733890dba6ba2bc2f8f296a4235c0c5cdd6)), closes [#279](https://github.com/panva/node-openid-client/issues/279)
206
-
207
-
208
-
209
- ## [3.15.8](https://github.com/panva/node-openid-client/compare/v3.15.7...v3.15.8) (2020-07-17)
210
-
211
-
212
- ### Bug Fixes
213
-
214
- * allow AAD appid including discovery URLs to be multi-tenant ([c27caab](https://github.com/panva/node-openid-client/commit/c27caab9b9df92b591c4f0491fd2ec346ff48988))
215
-
216
-
217
-
218
- ## [3.15.7](https://github.com/panva/node-openid-client/compare/v3.15.6...v3.15.7) (2020-07-16)
219
-
220
-
221
-
222
- ## [3.15.6](https://github.com/panva/node-openid-client/compare/v3.15.5...v3.15.6) (2020-07-06)
223
-
224
-
225
- ### Bug Fixes
226
-
227
- * merge helper returns modified object, leftovers removed ([2e3339b](https://github.com/panva/node-openid-client/commit/2e3339bd82297d6e37574e007b8a443087f3291e))
228
-
229
-
230
-
231
- ## [3.15.5](https://github.com/panva/node-openid-client/compare/v3.15.4...v3.15.5) (2020-06-26)
232
-
233
-
234
- ### Bug Fixes
235
-
236
- * regression from [#272](https://github.com/panva/node-openid-client/issues/272) ([9bff960](https://github.com/panva/node-openid-client/commit/9bff960bda42fd8af7b8569f121ca35c7f4cfae4))
237
-
238
-
239
-
240
- ## [3.15.4](https://github.com/panva/node-openid-client/compare/v3.15.3...v3.15.4) (2020-06-26)
241
-
242
-
243
-
244
- ## [3.15.3](https://github.com/panva/node-openid-client/compare/v3.15.2...v3.15.3) (2020-06-15)
245
-
246
-
247
- ### Bug Fixes
248
-
249
- * give AAD v1 common same treatment as v2 common ([2344e00](https://github.com/panva/node-openid-client/commit/2344e006fd4086d0df8391f9ef95cce25299e45f)), closes [#269](https://github.com/panva/node-openid-client/issues/269)
250
-
251
-
252
-
253
- ## [3.15.2](https://github.com/panva/node-openid-client/compare/v3.15.1...v3.15.2) (2020-06-01)
254
-
255
-
256
- ### Bug Fixes
257
-
258
- * allow any JSON numeric value for timestamp values ([a24a759](https://github.com/panva/node-openid-client/commit/a24a7596c038bacd5bdbfc5b8678a96e62b86fd2)), closes [#263](https://github.com/panva/node-openid-client/issues/263)
259
-
260
-
261
-
262
- ## [3.15.1](https://github.com/panva/node-openid-client/compare/v3.15.0...v3.15.1) (2020-05-12)
263
-
264
-
265
- ### Bug Fixes
266
-
267
- * A192CBC-HS384 and A256CBC-HS512 direct encryption key derivation ([c356bbe](https://github.com/panva/node-openid-client/commit/c356bbeaba1e28b6a56534b9ba503cb536c14d57))
268
-
269
-
270
-
271
- ## [3.15.0](https://github.com/panva/node-openid-client/compare/v3.14.2...v3.15.0) (2020-04-28)
272
-
273
-
274
- ### Features
275
-
276
- * add RPError indicators for unix timestamp comparison failures ([fe3db5c](https://github.com/panva/node-openid-client/commit/fe3db5c46a04cab024901782f202d08234b4cd96)), closes [#250](https://github.com/panva/node-openid-client/issues/250)
277
-
278
-
279
-
280
- ## [3.14.2](https://github.com/panva/node-openid-client/compare/v3.14.1...v3.14.2) (2020-04-07)
281
-
282
-
283
- ### Bug Fixes
284
-
285
- * **typescript:** add options arg to TypeOfGenericClient ([b97b028](https://github.com/panva/node-openid-client/commit/b97b0288d5d79f25cad3d0009212878c5d42a2e0))
286
-
287
-
288
-
289
- ## [3.14.1](https://github.com/panva/node-openid-client/compare/v3.14.0...v3.14.1) (2020-03-21)
290
-
291
-
292
- ### Bug Fixes
293
-
294
- * assert refresh_token grant ID Token sub to equal previous ([23f3f9f](https://github.com/panva/node-openid-client/commit/23f3f9fcb88c157cf9bbfa7cc2444e07f0cedc18))
295
-
296
-
297
-
298
- ## [3.14.0](https://github.com/panva/node-openid-client/compare/v3.13.0...v3.14.0) (2020-02-28)
299
-
300
-
301
- ### Features
302
-
303
- * support additional authorized parties ([c9268ce](https://github.com/panva/node-openid-client/commit/c9268ce24c0080729652d7ba67a7f313227dc815)), closes [#231](https://github.com/panva/node-openid-client/issues/231)
304
-
305
-
306
-
307
- ## [3.13.0](https://github.com/panva/node-openid-client/compare/v3.12.2...v3.13.0) (2020-02-18)
308
-
309
-
310
- ### Features
311
-
312
- * add support for RSA-OAEP-384 and RSA-OAEP-512 JWE algorithms ([6c696e9](https://github.com/panva/node-openid-client/commit/6c696e98202af2a358fde72bd0718c7dff7f3a96))
313
-
314
-
315
-
316
- ## [3.12.2](https://github.com/panva/node-openid-client/compare/v3.12.1...v3.12.2) (2020-01-30)
317
-
318
-
319
- ### Bug Fixes
320
-
321
- * ensure jose version that handles ECDH-ES for larger key sizes right ([e91001a](https://github.com/panva/node-openid-client/commit/e91001a30e0c429ef5bb49e0fda58a54f765c346))
322
-
323
-
324
-
325
- ## [3.12.1](https://github.com/panva/node-openid-client/compare/v3.12.0...v3.12.1) (2020-01-25)
326
-
327
-
328
- ### Bug Fixes
329
-
330
- * allow multiple keys to match when selecting encryption key for request object ([fa3fa67](https://github.com/panva/node-openid-client/commit/fa3fa677709f4e229c6356896731416feff71509))
331
-
332
-
333
-
334
- ## [3.12.0](https://github.com/panva/node-openid-client/compare/v3.11.0...v3.12.0) (2020-01-23)
335
-
336
-
337
- ### Bug Fixes
338
-
339
- * allow omitting the `*_enc` attributes (default 'A128CBC-HS256') ([6567c73](https://github.com/panva/node-openid-client/commit/6567c73996ba247d1bd46796d37a32ffa93d74a5))
340
-
341
-
342
- ### Features
343
-
344
- * new API for fetching arbitrary resources with the access token ([c981ed6](https://github.com/panva/node-openid-client/commit/c981ed68e5cb0a53f064eb27604d8790ef3dac91)), closes [#222](https://github.com/panva/node-openid-client/issues/222)
345
-
346
-
347
-
348
- ## [3.11.0](https://github.com/panva/node-openid-client/compare/v3.10.1...v3.11.0) (2020-01-10)
349
-
350
-
351
- ### Bug Fixes
352
-
353
- * **typescript:** allow 'id_token token' as a response type ([61c486c](https://github.com/panva/node-openid-client/commit/61c486c2b800c9299f4eaf3649711c39a6e5ce57))
354
-
355
-
356
- ### Features
357
-
358
- * detect self-issued OP and validate ID Token accordingly ([c5d3158](https://github.com/panva/node-openid-client/commit/c5d315826a767d1479509931eddb5ae6e3b99532)), closes [#220](https://github.com/panva/node-openid-client/issues/220) [#221](https://github.com/panva/node-openid-client/issues/221)
359
-
360
-
361
-
362
- ## [3.10.1](https://github.com/panva/node-openid-client/compare/v3.10.0...v3.10.1) (2020-01-07)
363
-
364
-
365
- ### Bug Fixes
366
-
367
- * allow duplicate "kid" values in issuer's jwks_uri (sigh) ([8840fb6](https://github.com/panva/node-openid-client/commit/8840fb6e9cb2b3f8e6396b596ff90f8f080e7f7a))
368
-
369
-
370
-
371
- ## [3.10.0](https://github.com/panva/node-openid-client/compare/v3.9.2...v3.10.0) (2019-12-27)
372
-
373
-
374
- ### Bug Fixes
375
-
376
- * enabled full JWT validation on distributed and aggregated claims ([d95e31b](https://github.com/panva/node-openid-client/commit/d95e31bf33bf3dc9a90e420a6dc90bbfd964d885))
377
-
378
-
379
- ### Features
380
-
381
- * allow consuming JARM responses (jwt response mode) ([dd4aae9](https://github.com/panva/node-openid-client/commit/dd4aae92eafbdde5ac11c2d7d422d150ceed45da))
382
-
383
-
384
-
385
- ## [3.9.2](https://github.com/panva/node-openid-client/compare/v3.9.1...v3.9.2) (2019-12-17)
386
-
387
-
388
- ### Bug Fixes
389
-
390
- * skip validating iat is in the past ([0791001](https://github.com/panva/node-openid-client/commit/0791001a6e0244ac3fbde8b9e6cf206d97f82fbe))
391
-
392
-
393
-
394
- ## [3.9.1](https://github.com/panva/node-openid-client/compare/v3.9.0...v3.9.1) (2019-12-15)
395
-
396
-
397
- ### Bug Fixes
398
-
399
- * remove check for nonce presence in params ([cac46fb](https://github.com/panva/node-openid-client/commit/cac46fb1846c853f6c519beddd5ab5bdaf0770b1))
400
-
401
-
402
-
403
- ## [3.9.0](https://github.com/panva/node-openid-client/compare/v3.8.4...v3.9.0) (2019-12-06)
404
-
405
-
406
- ### Bug Fixes
407
-
408
- * check for mTLS request options during token_endpoint calls ([269569f](https://github.com/panva/node-openid-client/commit/269569fbb08139694589f1b27bda690b8d8474fe))
409
- * **typescript:** complete http options ([3997687](https://github.com/panva/node-openid-client/commit/3997687cc68bf76bc92ac143c5e5fe3b9cbd3914))
410
-
411
-
412
- ### Features
413
-
414
- * added API for fetching any resource ([ae242a5](https://github.com/panva/node-openid-client/commit/ae242a5c058386a3607af4a662dbf696938bc6f1))
415
- * added issuer.FAPIClient for FAPI RW integrations ([ab88aa5](https://github.com/panva/node-openid-client/commit/ab88aa590fb5a853ddbd8273a713bf142a9f5049))
416
-
417
-
418
-
419
- ## [3.8.4](https://github.com/panva/node-openid-client/compare/v3.8.3...v3.8.4) (2019-11-26)
420
-
421
-
422
- ### Bug Fixes
423
-
424
- * use shake256(m, 114) for Ed448 ID Token _hash claims ([80311c8](https://github.com/panva/node-openid-client/commit/80311c89273d9e2577dc694f1ac91a00944cc026))
425
-
426
-
427
-
428
- ## [3.8.3](https://github.com/panva/node-openid-client/compare/v3.8.2...v3.8.3) (2019-11-14)
429
-
430
-
431
-
432
- ## [3.8.2](https://github.com/panva/node-openid-client/compare/v3.8.1...v3.8.2) (2019-11-10)
433
-
434
-
435
- ### Bug Fixes
436
-
437
- * assert jwks is present for private_key_jwk first ([c1f875c](https://github.com/panva/node-openid-client/commit/c1f875c0c4a472b2dc424bc9de21a9cbdc8ca8ad))
438
-
439
-
440
-
441
- ## [3.8.1](https://github.com/panva/node-openid-client/compare/v3.8.0...v3.8.1) (2019-11-07)
442
-
443
-
444
- ### Bug Fixes
445
-
446
- * use sha512 for Ed25519 and shake256 for Ed448 ID Token _hash claims ([31f7a04](https://github.com/panva/node-openid-client/commit/31f7a040c289e7fd389a0083803f2998bf62b660))
447
-
448
-
449
-
450
- ## [3.8.0](https://github.com/panva/node-openid-client/compare/v3.7.4...v3.8.0) (2019-11-07)
451
-
452
-
453
- ### Features
454
-
455
- * allow tokenType for userinfo to use as authorization header scheme ([4eaa75f](https://github.com/panva/node-openid-client/commit/4eaa75f714a744f9e712615dedc6702f4f9b7a64))
456
-
457
-
458
-
459
- ## [3.7.4](https://github.com/panva/node-openid-client/compare/v3.7.3...v3.7.4) (2019-10-24)
460
-
461
-
462
- ### Bug Fixes
463
-
464
- * allow distributed claims to be missing from the response ([48d6633](https://github.com/panva/node-openid-client/commit/48d6633af2bb5d724c2fee2628fdfc871324bb94)), closes [#197](https://github.com/panva/node-openid-client/issues/197)
465
-
466
-
467
-
468
- ## [3.7.3](https://github.com/panva/node-openid-client/compare/v3.7.2...v3.7.3) (2019-10-01)
469
-
470
-
471
- ### Bug Fixes
472
-
473
- * use updated jose package ([1f3a251](https://github.com/panva/node-openid-client/commit/1f3a251))
474
-
475
-
476
-
477
- ## [3.7.2](https://github.com/panva/node-openid-client/compare/v3.7.1...v3.7.2) (2019-09-13)
478
-
479
-
480
- ### Bug Fixes
481
-
482
- * **typescript:** add missing Strategy interface properties ([c0d59c4](https://github.com/panva/node-openid-client/commit/c0d59c4)), closes [#189](https://github.com/panva/node-openid-client/issues/189)
483
-
484
-
485
-
486
- ## [3.7.1](https://github.com/panva/node-openid-client/compare/v3.7.0...v3.7.1) (2019-09-09)
487
-
488
-
489
- ### Bug Fixes
490
-
491
- * **typescript:** remove the need for @types/got dependency ([e5a50d7](https://github.com/panva/node-openid-client/commit/e5a50d7))
492
-
493
-
494
-
495
- ## [3.7.0](https://github.com/panva/node-openid-client/compare/v3.6.2...v3.7.0) (2019-09-09)
496
-
497
-
498
- ### Bug Fixes
499
-
500
- * assert client_secret is present when required, require client_id, etc ([82855a5](https://github.com/panva/node-openid-client/commit/82855a5))
501
-
502
-
503
- ### Features
504
-
505
- * Add Typescript definitions ([#184](https://github.com/panva/node-openid-client/issues/184)) ([c37130b](https://github.com/panva/node-openid-client/commit/c37130b))
506
- * allow clientAssertionPayload to overwrite default payload ([28c8964](https://github.com/panva/node-openid-client/commit/28c8964))
507
-
508
-
509
-
510
- ## [3.6.2](https://github.com/panva/node-openid-client/compare/v3.6.1...v3.6.2) (2019-09-03)
511
-
512
-
513
- ### Bug Fixes
514
-
515
- * device authorization request always pushes the client_id to body ([6fbf125](https://github.com/panva/node-openid-client/commit/6fbf125))
516
-
517
-
518
-
519
- ## [3.6.1](https://github.com/panva/node-openid-client/compare/v3.6.0...v3.6.1) (2019-08-24)
520
-
521
-
522
- ### Bug Fixes
523
-
524
- * ignore runtime unsupported or malformed issuer jwks ([f08b8be](https://github.com/panva/node-openid-client/commit/f08b8be))
525
-
526
-
527
-
528
- ## [3.6.0](https://github.com/panva/node-openid-client/compare/v3.5.0...v3.6.0) (2019-08-24)
529
-
530
-
531
- ### Features
532
-
533
- * add RFC8628 - OAuth 2.0 Device Authorization Grant (Device Flow) support ([adb4b76](https://github.com/panva/node-openid-client/commit/adb4b76))
534
- * allow multiple resource parameters in authorization requests ([dfdd8cb](https://github.com/panva/node-openid-client/commit/dfdd8cb))
535
-
536
-
537
-
538
- ## [3.5.0](https://github.com/panva/node-openid-client/compare/v3.4.0...v3.5.0) (2019-08-22)
539
-
540
-
541
- ### Features
542
-
543
- * added Node.js lts/dubnium support for runtime supported features ([54788c2](https://github.com/panva/node-openid-client/commit/54788c2))
544
-
545
-
546
-
547
- ## [3.4.0](https://github.com/panva/node-openid-client/compare/v3.3.0...v3.4.0) (2019-08-13)
548
-
549
-
550
- ### Features
551
-
552
- * electron v6.x runtime support ([65ec619](https://github.com/panva/node-openid-client/commit/65ec619))
553
-
554
-
555
-
556
- ## [3.3.0](https://github.com/panva/node-openid-client/compare/v3.2.3...v3.3.0) (2019-08-02)
557
-
558
-
559
- ### Features
560
-
561
- * option to change http options globally ([a1e0a3f](https://github.com/panva/node-openid-client/commit/a1e0a3f))
562
-
563
-
564
-
565
- ## [3.2.3](https://github.com/panva/node-openid-client/compare/v3.2.2...v3.2.3) (2019-07-18)
566
-
567
-
568
- ### Bug Fixes
569
-
570
- * **strategy:** do not modify the params argument, clone it instead ([4731d29](https://github.com/panva/node-openid-client/commit/4731d29)), closes [#177](https://github.com/panva/node-openid-client/issues/177)
571
-
572
-
573
-
574
- ## [3.2.2](https://github.com/panva/node-openid-client/compare/v3.2.1...v3.2.2) (2019-07-12)
575
-
576
-
577
- ### Bug Fixes
578
-
579
- * give AAD v2 organizations and consumers same treatment as common ([4891b5b](https://github.com/panva/node-openid-client/commit/4891b5b)), closes [#175](https://github.com/panva/node-openid-client/issues/175)
580
-
581
-
582
-
583
- ## [3.2.1](https://github.com/panva/node-openid-client/compare/v3.2.0...v3.2.1) (2019-07-10)
584
-
585
-
586
- ### Bug Fixes
587
-
588
- * plug reported lodash vulnerability ([b690dac](https://github.com/panva/node-openid-client/commit/b690dac))
589
-
590
-
591
-
592
- ## [3.2.0](https://github.com/panva/node-openid-client/compare/v3.1.2...v3.2.0) (2019-06-27)
593
-
594
-
595
- ### Features
596
-
597
- * feat: added support for direct symmetric key encryption alg (dir) ([f1b4282](https://github.com/panva/node-openid-client/commit/f1b4282))
598
-
599
-
600
-
601
- ## [3.1.2](https://github.com/panva/node-openid-client/compare/v3.1.1...v3.1.2) (2019-06-21)
602
-
603
-
604
- ### Bug Fixes
605
-
606
- * ensure runtime @panva/jose dependency ^1.3.0 ([d992deb](https://github.com/panva/node-openid-client/commit/d992deb))
607
-
608
-
609
-
610
- ## [3.1.1](https://github.com/panva/node-openid-client/compare/v3.1.0...v3.1.1) (2019-05-15)
611
-
612
-
613
- ### Bug Fixes
614
-
615
- * passport strategy runtime authenticate parameters regression ([36e741e](https://github.com/panva/node-openid-client/commit/36e741e)), closes [#167](https://github.com/panva/node-openid-client/issues/167)
616
-
617
-
618
-
619
- ## [3.1.0](https://github.com/panva/node-openid-client/compare/v3.0.0...v3.1.0) (2019-05-13)
620
-
621
-
622
- ### Features
623
-
624
- * add helpers for generating secure random values & PKCE challenges ([44f1865](https://github.com/panva/node-openid-client/commit/44f1865))
625
-
626
-
627
-
628
- ## [3.0.0](https://github.com/panva/node-openid-client/compare/v2.5.0...v3.0.0) (2019-05-11)
629
-
630
-
631
- ### Bug Fixes
632
-
633
- * authorizationParams no longer requires nonce for `response_type=token`
634
- * issuer's auth signing algs presence is now asserted if client is missing the relevant metadata property
635
- * unintended (client|issuer).metadata[property] reassignment is no longer possible
636
- * refreshed encrypted ID Tokens are now properly decrypted
637
- * userinfo_endpoint presence on an issuer is now asserted during userinfo function call
638
- * PBES2 symmetric encryption and decryption now correctly uses the `client_secret` value rather then
639
- its SHA digest
640
- * Accept header is now correctly set for all requests
641
- * clients configured to receive signed and/or encrypted userinfo endpoints will now correctly reject
642
- a response that isn't proper `application/jwt`
643
-
644
-
645
- ### Features
646
-
647
- * **Typed Errors** - openid-client now has unique errors for HTTP transport related errors, OP/AS
648
- returned errors and RP(client-side) assertions.
649
- * **common configuration issues are now gracefully handled.** I feel like many developers may be
650
- setting properties like `redirect_uri` or `response_type` on a client instance. I sympathize and
651
- openid-client will now take these common mistakes and accomodate.
652
- * **QoL** `#client.authorizationParams()` will now attempt to resolve the `redirect_uri` and
653
- `response_type` from your client's metadata. If there's only one listed, it will be used
654
- automatically. If there's more, you must continue providing it explicitly.
655
- * **per-request http request options helper function** HTTP request options can now be modified on
656
- a per request basis for the different classes or their instances. This now allows each request's
657
- options to be altered on-demand with e.g. client mutual-TLS certificates or implementing work
658
- arounds for specific AS quirks.
659
- * **mutual-TLS client authentication** is now supported through the above mentioned helper for both
660
- client-authentication and proof-of-possession purposes.
661
- * **custom request bodies** Where the above per-request helper falls short is providing extra
662
- token endpoint exchange parameters like `resource` to authorization code or refresh token exchange,
663
- you can now pass those in the actual client methods.
664
- * **custom client assertion payloads** You can now pass extra claims to the client authenticated
665
- calls e.g. token, introspect, revoke.
666
- * **request objects are now set to be one-time use** Generated Request Objects are secure by default
667
- they include iat, exp and jti claims so that OPs have a way to make them one-time use depending on
668
- their policy.
669
- * **EdDSA support** OKP JSON Web Keys and EdDSA signing and verification is now supported.
670
-
671
-
672
- ### BREAKING CHANGES
673
- * openid-client now uses `@panva/jose` for all things JOSE. As a result of this the minimum required
674
- node version is v12.0.0 and the client will now only function in node.js environments.
675
- * `Issuer.defaultHttpOptions` getter and setter were removed. See documentation customization
676
- section for its replacement.
677
- * `client.CLOCK_TOLERANCE` client property was removed. See documentation customization section for
678
- its replacement.
679
- * `client.authorizationCallback()` has been renamed to `client.callback()`
680
- * `tokenset.claims` getter is now a function `tokenset.claims()`
681
- * `useRequest` and `useGot` methods were removed, with the maintenance mode and inevitable
682
- deprecation of the `request` module i've decided to only support got as an http request library.
683
- * Instead of passing jose library keystore instances with private keys the API now
684
- expects a JWKS formatted object. `keystore` options argument properties are now called just `jwks`.
685
- * `response_type=code` is no longer defaulted to in `#client.authorizationUrl()` if your client
686
- instance has multiple `response_types` members.
687
- * Strict `===` equality operator is now used for assertions, while unlikely the breaking change is
688
- that should some ID Token claims be correct values but incorrect type, these will start failing now.
689
- * `#client.revoke()` no longer returns or in any way processes the response body as per spec
690
- requirements.
691
- * All http(s) responses are now strictly checked for the expected http response status code.
692
- * All http(s) requests now assert that an absolute URL is being requested.
693
- * Passport Strategy will now fail when userinfo is requested via the verify callback arity but no
694
- access token is returned from the OP.
695
-
696
-
697
-
698
- ## [2.5.0](https://github.com/panva/node-openid-client/compare/v2.4.5...v2.5.0) (2019-04-29)
699
-
700
-
701
- ### Bug Fixes
702
-
703
- * key lookup cache is now working as intended ([90d2f2a](https://github.com/panva/node-openid-client/commit/90d2f2a)), closes [#162](https://github.com/panva/node-openid-client/issues/162)
704
-
705
-
706
- ### Features
707
-
708
- * add support for azure ad v2 multitenant apps ([24486dd](https://github.com/panva/node-openid-client/commit/24486dd)), closes [#148](https://github.com/panva/node-openid-client/issues/148)
709
-
710
-
711
-
712
- ## [2.4.5](https://github.com/panva/node-openid-client/compare/v2.4.4...v2.4.5) (2018-11-05)
713
-
714
-
715
- ### Bug Fixes
716
-
717
- * upgrade min node-jose version to fix its performance in node ([e682dfc](https://github.com/panva/node-openid-client/commit/e682dfc))
718
-
719
-
720
-
721
- ## [2.4.4](https://github.com/panva/node-openid-client/compare/v2.4.3...v2.4.4) (2018-10-18)
722
-
723
-
724
- ### Bug Fixes
725
-
726
- * strategy code_verifier length, removed uuid dependency ([60d0cb8...ea4a8fd](https://github.com/panva/node-openid-client/compare/60d0cb8...ea4a8fd)), closes [#131](https://github.com/panva/node-openid-client/issues/131)
727
-
728
-
729
-
730
- ## [2.4.3](https://github.com/panva/node-openid-client/compare/v2.4.2...v2.4.3) (2018-10-10)
731
-
732
-
733
- ### Bug Fixes
734
-
735
- * assign Discovery 1.0 defaults when discovering with .well-known ([74b593e](https://github.com/panva/node-openid-client/commit/74b593e))
736
-
737
-
738
-
739
- ## [2.4.2](https://github.com/panva/node-openid-client/compare/v2.4.1...v2.4.2) (2018-09-27)
740
-
741
-
742
- ### Bug Fixes
743
-
744
- * non-string error responses are not treated as OpenIdConnectError ([782d464](https://github.com/panva/node-openid-client/commit/782d464)), closes [#125](https://github.com/panva/node-openid-client/issues/125)
745
-
746
-
747
-
748
- ## [2.4.1](https://github.com/panva/node-openid-client/compare/v2.4.0...v2.4.1) (2018-09-16)
749
-
750
-
751
- ### Bug Fixes
752
-
753
- * lts/boron unsupported syntax fix ([5289188](https://github.com/panva/node-openid-client/commit/5289188))
754
-
755
-
756
-
757
- ## [2.4.0](https://github.com/panva/node-openid-client/compare/v2.3.1...v2.4.0) (2018-09-16)
758
-
759
-
760
- ### Bug Fixes
761
-
762
- * OpenIdConnectError also returns session_state ([95fae3d](https://github.com/panva/node-openid-client/commit/95fae3d))
763
- * stop sending state on the authorisation code token grant ([c4c9e50](https://github.com/panva/node-openid-client/commit/c4c9e50))
764
-
765
-
766
- ### Features
767
-
768
- * add RP-Initiated Logout URL helper ([7c2e030](https://github.com/panva/node-openid-client/commit/7c2e030)), closes [#116](https://github.com/panva/node-openid-client/issues/116)
769
-
770
-
771
-
772
- ## [2.3.1](https://github.com/panva/node-openid-client/compare/v2.3.0...v2.3.1) (2018-08-23)
773
-
774
-
775
- ### Bug Fixes
776
-
777
- * apply safer, simpler www-authenticate parsing regex ([ffce55a](https://github.com/panva/node-openid-client/commit/ffce55a))
778
- * only assign Discovery 1.0 defaults when Issuer is discovered ([dca60b8](https://github.com/panva/node-openid-client/commit/dca60b8))
779
-
780
-
781
-
782
- ## [2.3.0](https://github.com/panva/node-openid-client/compare/v2.2.1...v2.3.0) (2018-08-11)
783
-
784
-
785
- ### Features
786
-
787
- * authorization response parameter checking based on response_type ([6e0ac57](https://github.com/panva/node-openid-client/commit/6e0ac57))
788
- * passport strategy automatically checks response REQUIRED params ([902eeed](https://github.com/panva/node-openid-client/commit/902eeed))
789
-
790
-
791
-
792
- # Pre standard-version Change Log
793
- ## Version 2.2.x
794
- ### Version 2.2.1
795
- - 2018-07-10 [DIFF](https://github.com/panva/node-openid-client/compare/v2.2.0...v2.2.1)
796
- - improved discovery support of custom .well-known suffixes
797
- - chores - refactoring, missing tests, cleanup
798
-
799
- ### Version 2.2.0
800
- - 2018-07-04 [DIFF](https://github.com/panva/node-openid-client/compare/v2.1.1...v2.2.0)
801
- - added support for [RFC8414 - OAuth 2.0 Authorization Server Metadata](https://tools.ietf.org/html/rfc8414)
802
- discovery
803
-
804
- ## Version 2.1.x
805
- ### Version 2.1.1
806
- - 2018-06-28 [DIFF](https://github.com/panva/node-openid-client/compare/v2.1.0...v2.1.1)
807
- - fixed handling of bearer endpoint responses with www-authenticate headers only. fixes #102
808
-
809
- ### Version 2.1.0
810
- - 2018-05-31 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.4...v2.1.0)
811
- - `node-jose` dependency bumped to major ^1.0.0 - fixes `A\d{3}GCMKW` symmetrical encryption support
812
- - dependency updates
813
-
814
- ## Version 2.0.x
815
- ### Version 2.0.4
816
- - 2018-05-25 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.3...v2.0.4)
817
- - fixed circular when serializing OpenIdConnectError
818
- - base64url dependency update
819
-
820
- ### Version 2.0.3
821
- - 2018-05-15 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.2...v2.0.3)
822
- - base64url dependency replaced
823
-
824
- ### Version 2.0.2
825
- - 2018-05-10 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.1...v2.0.2)
826
- - dependency tree updates
827
-
828
- ### Version 2.0.1
829
- - 2018-04-26 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.0...v2.0.1)
830
- - fixed `client_secret_basic` requiring the username and password tokens to be `x-www-form-urlencoded`
831
- according to https://tools.ietf.org/html/rfc6749#section-2.3.1
832
- - NOTE: Although technically a fix, this is a breaking change when used with providers that also
833
- don't currently follow the standard. A proper way of submitting client_id and client_secret using
834
- `client_secret_basic` is `Authorization: base64(formEncode(client_id):formEncode(client_secret))`.
835
- If your client_id and client_secret does contain special characters that need encoding this does not
836
- affect you. If it does, try using `client_secret_post` instead.
837
-
838
- ### Version 2.0.0
839
- - 2018-04-12 [DIFF](https://github.com/panva/node-openid-client/compare/v1.20.0...v2.0.0)
840
- - dropped support for Node.js v4.x due to its End-of-Life on [2018-04-30](https://github.com/nodejs/Release)
841
- - removed deprecated `client#grantAuth`
842
- - removed deprecated way of passing keystore directly to `Client#register`
843
- - removed support for passing client to `OpenIDConnectStrategy` as single argument, use
844
- `new Strategy({ client })` instead of `new Strategy(client)`.
845
- - fixed a bug requiring nonce to be passed for `response_type=none`
846
-
847
- ## Version 1.20.0
848
- - 2018-03-13 [DIFF](https://github.com/panva/node-openid-client/compare/v1.19.5...v1.20.0)
849
- - added documentation for `OpenIdConnectError`
850
- - added `error_uri` from IdP responses to `OpenIdConnectError` instances
851
- - fixed `OpenIdConnectError` messages to include `error_description`
852
-
853
- ## Version 1.19.x
854
- ### Version 1.19.5
855
- - 2018-03-10 [DIFF](https://github.com/panva/node-openid-client/compare/v1.19.4...v1.19.5)
856
- - `Issuer.discover` now parses the provided URI instead of just inspecting the string. #80
857
-
858
- ### Version 1.19.4
859
- - 2018-01-30 [DIFF](https://github.com/panva/node-openid-client/compare/v1.19.3...v1.19.4)
860
- - fixed edge cases of (and simplified) private id token decryption method
861
-
862
- ### Version 1.19.3
863
- - 2018-01-22 [DIFF](https://github.com/panva/node-openid-client/compare/v1.19.2...v1.19.3)
864
- - fix return values of `#authorizationCallback()` for `response_type=none` to resolve a TokenSet
865
-
866
- ### Version 1.19.2
867
- - 2018-01-16 [DIFF](https://github.com/panva/node-openid-client/compare/v1.19.1...v1.19.2)
868
- - fixed `authorizationUrl` to respect existing issuer authorization_endpoint query parameters
869
-
870
- ### Version 1.19.1
871
- - 2018-01-15 [DIFF](https://github.com/panva/node-openid-client/compare/v1.19.0...v1.19.1)
872
- - adjusted the passport state mismatch related error message to hint developers at a local setup
873
- issue
874
-
875
- ### Version 1.19.0
876
- - 2017-12-12 [DIFF](https://github.com/panva/node-openid-client/compare/v1.18.2...v1.19.0)
877
- - added maintained request wrapper and a simple api to use request instead of `got`
878
-
879
- ## Version 1.18.x
880
- ### Version 1.18.2
881
- - 2017-12-05 [DIFF](https://github.com/panva/node-openid-client/compare/v1.18.1...v1.18.2)
882
- - bumped node-jose dependency
883
-
884
- ### Version 1.18.1
885
- - 2017-11-25 [DIFF](https://github.com/panva/node-openid-client/compare/v1.18.0...v1.18.1)
886
- - fixed the order of several `assert.equal` calls to swap actual/expected descriptions
887
- - added assertion error messages for passport strategy
888
-
889
- ### Version 1.18.0
890
- - 2017-11-19 [DIFF](https://github.com/panva/node-openid-client/compare/v1.17.0...v1.18.0)
891
- - added option for the passport strategy to use PKCE
892
- - updated http request library `got` dependency
893
-
894
- ## Version 1.17.0
895
- - 2017-10-31 [DIFF](https://github.com/panva/node-openid-client/compare/v1.16.0...v1.17.0)
896
- - now uses `client_secret_post` as default for Issuer instances that do not support
897
- `client_secret_basic` but do signal support for `client_secret_post` in their discovery document
898
-
899
- ## Version 1.16.0
900
- - 2017-10-13 [DIFF](https://github.com/panva/node-openid-client/compare/v1.15.0...v1.16.0)
901
- - added `s_hash` value validation support for ID Tokens returned by authorization endpoint
902
- - fixed edge cases where valid `_hash` but from invalid sha-length was accepted
903
-
904
- ## Version 1.15.0
905
- - 2017-09-11 [DIFF](https://github.com/panva/node-openid-client/compare/v1.14.0...v1.15.0)
906
- - added support for Request Objects encrypted with symmetrical keys
907
- - fixed PBES2 encryption to use client_secret derived symmetrical key instead of its full octet value
908
-
909
- ## Version 1.14.0
910
- - 2017-09-09 [DIFF](https://github.com/panva/node-openid-client/compare/v1.13.0...v1.14.0)
911
- - added Passport Strategy `passReqToCallback` option, defaults to false
912
-
913
- ## Version 1.13.0
914
- - 2017-08-24 [DIFF](https://github.com/panva/node-openid-client/compare/v1.12.1...v1.13.0)
915
- - added an optional keystore argument to `Client#fromUri(uri, token, [keystore])` to pass a keystore
916
- with private asymmetrical keys
917
- - fixed keystore check during constructor `Client#new` calls to check that only private asymmetrical
918
- keys are added
919
-
920
- ## Version 1.12.0
921
- ### Version 1.12.1
922
- - 2017-08-11 [DIFF](https://github.com/panva/node-openid-client/compare/v1.12.0...v1.12.1)
923
- - explicitly specified accepted response type via `accept: application/json` header
924
- - added state to token_endpoint calls for servers supporting mixup mitigation
925
-
926
- ### Version 1.12.0
927
- - 2017-07-17 [DIFF](https://github.com/panva/node-openid-client/compare/v1.11.1...v1.12.0)
928
- - Allow session key to be specified in passport strategy options
929
-
930
- ## Version 1.11.0
931
- ### Version 1.11.1
932
- - 2017-07-14 [DIFF](https://github.com/panva/node-openid-client/compare/v1.11.0...v1.11.1)
933
- - relaxed #callbackParams to allow IncomingMessage lookalikes
934
- - update internal dependencies
935
-
936
- ### Version 1.11.0
937
- - 2017-05-19 [DIFF](https://github.com/panva/node-openid-client/compare/v1.10.0...v1.11.0)
938
- - fixed default application_type from `['web']` to `'web'`
939
- - added barebones `Issuer.httpClient` setter to help advanced developers in complex environments
940
- to change the used http request client
941
-
942
- ## Version 1.10.0
943
- - 2017-05-04 [DIFF](https://github.com/panva/node-openid-client/compare/v1.9.0...v1.10.0)
944
- - added pure OAuth 2.0 stripped down callback function `#oauthCallback`
945
- - added an extra option for `#userinfo` requests to have extra params in either query or body
946
-
947
- ## Version 1.9.0
948
- - 2017-04-30 [DIFF](https://github.com/panva/node-openid-client/compare/v1.8.2...v1.9.0)
949
- - added introspection/revocation specific client and issuer properties. To remain backwards
950
- compatible they default to their token endpoint counterparts
951
- - issuer.revocation_endpoint_auth_methods_supported
952
- - issuer.introspection_endpoint_auth_methods_supported
953
- - issuer.revocation_endpoint_auth_signing_alg_values_supported
954
- - issuer.introspection_endpoint_auth_signing_alg_values_supported
955
- - client.revocation_endpoint_auth_method
956
- - client.introspection_endpoint_auth_method
957
- - client.revocation_endpoint_auth_signing_alg
958
- - client.introspection_endpoint_auth_signing_alg
959
-
960
- ## Version 1.8.0
961
- ### Version 1.8.2
962
- - 2017-04-29 [DIFF](https://github.com/panva/node-openid-client/compare/v1.8.0...v1.8.2)
963
- - bumped node-jose dependency to avoid github tar.gz dependencies
964
- - adjusted token_endpoint_auth_method=none to how it should be
965
-
966
- ### Version 1.8.0
967
- - 2017-04-07 [DIFF](https://github.com/panva/node-openid-client/compare/v1.7.2...v1.8.0)
968
- - Issuer and Client now recognize custom properties, this is so that new Registry Contents do not
969
- require a new release of openid-client to be picked up. Custom properties are exposed as getters
970
- so long as they do not interfere with the object's Prototype and they are always available in
971
- `#metadata` getter.
972
-
973
- ## Version 1.7.0
974
- ### Version 1.7.2
975
- - 2017-03-28 [DIFF](https://github.com/panva/node-openid-client/compare/v1.7.1...v1.7.2)
976
- - added missing check for webfinger issuer location protocol
977
-
978
- ### Version 1.7.1
979
- - 2017-03-28 [DIFF](https://github.com/panva/node-openid-client/compare/v1.6.4...v1.7.1)
980
- - added authorizationCallback support for submitting code_verifier
981
- - example now includes session management OP and RP frames
982
-
983
- 1.7.0 failed to publish properly, use 1.7.1 instead
984
-
985
- ## Version 1.6.0
986
- ### Version 1.6.4
987
- - 2017-03-14 [DIFF](https://github.com/panva/node-openid-client/compare/v1.6.3...v1.6.4)
988
- - fixed receiving (correct) empty responses from revocation endpoints (#21)
989
-
990
- ### Version 1.6.3
991
- - 2017-03-14 [DIFF](https://github.com/panva/node-openid-client/compare/v1.6.2...v1.6.3)
992
- - bumped minimum node-jose version to cover http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html
993
-
994
- ### Version 1.6.2
995
- - 2017-03-09 [DIFF](https://github.com/panva/node-openid-client/compare/v1.6.1...v1.6.2)
996
- - fixed verify callback skipping userinfo when userinfo_endpoint is not configured (#19)
997
- - removed mandatory checks from passport strategy, allowing i.e. implicit only OPs (#19)
998
-
999
- ### Version 1.6.1
1000
- - 2017-03-07 [DIFF](https://github.com/panva/node-openid-client/compare/v1.6.0...v1.6.1)
1001
- - fixed verify callback skipping userinfo call when arity says it should but no access token is present (#18)
1002
-
1003
- ### Version 1.6.0
1004
- - 2017-02-15 [DIFF](https://github.com/panva/node-openid-client/compare/v1.5.3...v1.6.0)
1005
- - added at_hash presence assertion for applicable (implicit) ID Token validation
1006
- - added c_hash presence assertion for applicable (hybrid) ID Token validation from the authorization_endpoint
1007
-
1008
- ## Version 1.5.0
1009
- ### Version 1.5.3
1010
- - 2017-02-15 [DIFF](https://github.com/panva/node-openid-client/compare/v1.5.2...v1.5.3)
1011
- - fixed an ID Token validation for ID Token returned by Token Endpoint that includes c_hash
1012
-
1013
- ### Version 1.5.2
1014
- - 2017-02-01 [DIFF](https://github.com/panva/node-openid-client/compare/v1.5.1...v1.5.2)
1015
- - fixed passport strategy, have it use prototype instead of ES6 class syntax
1016
-
1017
- ### Version 1.5.1
1018
- - 2017-01-29 [DIFF](https://github.com/panva/node-openid-client/compare/v1.5.0...v1.5.1)
1019
- - fixed client_assertion aud claim for `_jwt` auth methods when used in introspection and revocation
1020
-
1021
- ### Version 1.5.0
1022
- - 2017-01-26 [DIFF](https://github.com/panva/node-openid-client/compare/v1.4.0...v1.5.0)
1023
- - added a passport.js strategy
1024
- - added missing max_age, default_max_age related functionality
1025
- - authorizationCallback now supports max_age check
1026
- - clients with default_max_age use this default value automatically
1027
- - when max_age is checked auth_time claim is mandatory and must be a number
1028
- - added missing require_auth_time related functionality
1029
- - clients with require_auth_time = true have the presence and format of auth_time claim validated
1030
- - authorizationUrl and authorizationPost now removes null and undefined values and ensures parameters
1031
- are stringified before passed to url.format
1032
- - added client.CLOCK_TOLERANCE property, to allow for clock skew (in seconds)
1033
-
1034
- ## Version 1.4.0
1035
- - 2017-01-10 [DIFF](https://github.com/panva/node-openid-client/compare/v1.3.1...v1.4.0)
1036
- - deprecated passing keystore directly to Client#register, pass an object with keystore property instead
1037
- - added the option to provide InitialAccessToken value to Client#register
1038
-
1039
- ## Version 1.3.0
1040
- ### Version 1.3.1
1041
- - 2016-12-18 [DIFF](https://github.com/panva/node-openid-client/compare/v1.3.0...v1.3.1)
1042
- - added error messages when expected response is missing
1043
-
1044
- ### Version 1.3.0
1045
- - 2016-12-13 [DIFF](https://github.com/panva/node-openid-client/compare/v1.2.0...v1.3.0)
1046
- - added `#requestObject` method to Client to return signed and/or encrypted Request Object
1047
-
1048
- ## Version 1.2.0
1049
- - 2016-12-09 [DIFF](https://github.com/panva/node-openid-client/compare/v1.1.0...v1.2.0)
1050
- - added `#claims` getter to TokenSets returned from `authorizationCallback` and `refresh`;
1051
-
1052
- ## Version 1.1.0
1053
- - 2016-11-23 [DIFF](https://github.com/panva/node-openid-client/compare/v1.0.2...v1.1.0)
1054
- - fixed unpacking aggregated claims with alg=none and no iss claim
1055
- - fetching distributed claims now expects a JWT response, previously expected invalid OP responses
1056
-
1057
- ## Version 1.0.0
1058
- ### Version 1.0.2
1059
- - 2016-11-22 [DIFF](https://github.com/panva/node-openid-client/compare/v1.0.1...v1.0.2)
1060
- - fixed signed userinfo response validation in case iss, aud and similar ID Token claims are missing
1061
-
1062
- ### Version 1.0.1
1063
- - 2016-11-18 [DIFF](https://github.com/panva/node-openid-client/compare/v1.0.0...v1.0.1)
1064
- - Updated uuid dependency
1065
-
1066
- ### Version 1.0.0
1067
- RP test tools are passing, no changes required from the library, API is declared stable, hence 1.0.0
1068
- release.
1069
-
1070
- - 2016-11-16 [DIFF](https://github.com/panva/node-openid-client/compare/v0.7.0...v1.0.0)
1071
- - See [1.x migration](#migrating-from-0x-to-10) to update your 0.x deployment into 1.x.
1072
-
1073
- ## Migrating from 0.x to 1.0
1074
-
1075
- 1. update your package.json file to `"^1.0.0"`
1076
- 2. sit back and relax, no breaking changes
1077
-
1078
- ## pre 1.x changelog
1079
-
1080
- 4. Major version zero (0.y.z) is for initial development. Anything may change at any time.
1081
- The public API should not be considered stable.
1082
-
1083
- 5. Version 1.0.0 defines the public API.
1084
-
1085
- - https://github.com/panva/node-openid-client/compare/v0.6.0...v0.7.0
1086
- - added: webfinger discovery
1087
- - added: callback parameter helper for node's http.IncomingMessage
1088
- - tested for lts/argon (4), lts/boron (6) and current stable (7)
1089
- - https://github.com/panva/node-openid-client/compare/v0.5.4...v0.6.0
1090
- - added: handling of symmetrically encrypted responses (A...GCMKW, A...KW, PBES2-HS...+A...KW)
1091
- - fix: state check supersedes error check, still not sure about it though
1092
- - https://github.com/panva/node-openid-client/compare/v0.5.0...v0.5.4
1093
- - added: token_type_hint for introspection and revocation
1094
- - fix: handle refresh w/o id_token
1095
- - fix: ignore nonce values when refreshing w/ id_token
1096
- - fix: validateIdToken only checks at_hash and c_hash values when TokenSet is passed in
1097
- - fix: session_state now part of returned TokenSet
1098
- - https://github.com/panva/node-openid-client/compare/v0.4.1...v0.5.0
1099
- - aggregated and distributed claim handling
1100
- - https://github.com/panva/node-openid-client/compare/v0.3.0...v0.4.1
1101
- - fix: issuer with path component discovery
1102
- - built-in signed and/or encrypted userinfo handling
1103
- - authorizationCallback handling of implicit and hybrid responses
1104
- - https://github.com/panva/node-openid-client/compare/v0.2.0...v0.3.0
1105
- - encrypted userinfo and idtoken response handling
1106
- - https://github.com/panva/node-openid-client/compare/v0.1.0...v0.2.0
1107
- - httpOptions configurable on a library level
1108
- - signed userinfo response handling