You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+41-10
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,35 @@ All notable changes to this project will be documented in this file.
4
4
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5
5
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
6
7
+
## [Unreleased]
8
+
### Added
9
+
- Added a new function to the provided ClientTrait, `supportsGrantType` to allow the auth server to issue the response `unauthorized_client` when applicable (PR #1420)
10
+
11
+
### Fixed
12
+
- Clients only validated for Refresh, Device Code, and Password grants if the client is confidential (PR #1420)
13
+
14
+
### Changed
15
+
- Key permission checks ignored on Windows regardless of userland choice as cannot be run successfully on this OS (PR #1447)
16
+
17
+
## [9.1.0] - released 2024-11-21
18
+
### Added
19
+
- Support for PHP 8.4 (PR #1454)
20
+
21
+
### Fixed
22
+
- In the Auth Code grant, when requesting an access token with an invalid auth code, we now respond with an invalid_grant error instead of invalid_request (PR #1433)
23
+
- Fixed spec compliance issue where device access token request was mistakenly expecting to receive scopes in the request (PR #1412)
24
+
- Refresh tokens pre version 9 might have had user IDs set as ints which meant they were incorrectly rejected. We now cast these values to strings to allow old refresh tokens (PR #1436)
25
+
- Fixed bug on setting interval visibility of device authorization grant (PR #1410)
26
+
- Fix a bug where the new poll date were not persisted when `slow_down` error happens, because the exception is thrown before calling `persistDeviceCode`. (PR #1410)
27
+
- Fix a bug where `slow_down` error response may have been returned even after the user has completed the auth flow (already approved / denied the request). (PR #1410)
28
+
29
+
## [9.0.1] - released 2024-10-14
30
+
### Fixed
31
+
- Auto-generated event emitter is now persisted. Previously, a new emitter was generated every time (PR #1428)
32
+
- Fixed bug where you could not omit a redirect uri even if one had not been specified during the auth request (PR #1428)
33
+
- Fixed bug where "state" parameter wasn't present on `invalid_scope` error response and wasn't on fragment part of `access_denied` redirect URI on Implicit grant (PR #1298)
34
+
- Fixed bug where disabling refresh token revocation via `revokeRefreshTokens(false)` unintentionally disables issuing new refresh token (PR #1449)
35
+
7
36
## [9.0.0] - released 2024-05-13
8
37
### Added
9
38
- Device Authorization Grant added (PR #1074)
@@ -53,13 +82,13 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
53
82
54
83
## [8.5.3] - released 2023-07-06
55
84
### Security
56
-
- If a key string is provided to the CryptKey constructor with an invalid
57
-
passphrase, the LogicException message generated will expose the given key.
85
+
- If a key string is provided to the CryptKey constructor with an invalid
86
+
passphrase, the LogicException message generated will expose the given key.
58
87
The key is no longer leaked via this exception (PR #1353)
59
88
60
89
## [8.5.2] - released 2023-06-16
61
90
### Changed
62
-
- Bumped the versions for laminas/diactoros and psr/http-message to support
91
+
- Bumped the versions for laminas/diactoros and psr/http-message to support
63
92
PSR-7 v2.0 (PR #1339)
64
93
65
94
## [8.5.1] - released 2023-04-04
@@ -151,13 +180,13 @@ a PKCE downgrade attack (PR #1326)
151
180
- Removed support for PHP 7.2 (PR #1146)
152
181
153
182
### Fixed
154
-
- Fix typo in parameter hint. `code_challenged` changed to `code_challenge`. Thrown by Auth Code Grant when the code challenge does not match the regex. (PR #1130)
183
+
- Fix typo in parameter hint. `code_challenged` changed to `code_challenge`. Thrown by Auth Code Grant when the code challenge does not match the regex. (PR #1130)
155
184
- Undefined offset was returned when no client redirect URI was set. Now throw an invalidClient exception if no redirect URI is set against a client (PR #1140)
156
185
157
186
## [8.1.1] - released 2020-07-01
158
187
159
188
### Fixed
160
-
- If you provide a valid redirect_uri with the auth code grant and an invalid scope, the server will use the given
189
+
- If you provide a valid redirect_uri with the auth code grant and an invalid scope, the server will use the given
161
190
redirect_uri instead of the default client redirect uri (PR #1126)
162
191
163
192
## [8.1.0] - released 2020-04-29
@@ -177,9 +206,9 @@ redirect_uri instead of the default client redirect uri (PR #1126)
177
206
### Fixed
178
207
- Clients are now explicitly prevented from using the Client Credentials grant unless they are confidential to conform
179
208
with the OAuth2 spec (PR #1035)
180
-
- Abstract method `getIdentifier()` added to AccessTokenTrait. The trait cannot be used without the `getIdentifier()`
209
+
- Abstract method `getIdentifier()` added to AccessTokenTrait. The trait cannot be used without the `getIdentifier()`
181
210
method being defined (PR #1051)
182
-
- An exception is now thrown if a refresh token is accidentally sent in place of an authorization code when using the
211
+
- An exception is now thrown if a refresh token is accidentally sent in place of an authorization code when using the
183
212
Auth Code Grant (PR #1057)
184
213
- Can now send access token request without being forced to specify a redirect URI (PR #1096)
185
214
- In the BearerTokenValidator, if an implementation is using PDO, there is a possibility that a RuntimeException will be thrown when checking if an access token is revoked. This scenario no longer incorrectly issues an exception with a hint mentioning an issue with JSON decoding. (PR #1107)
@@ -233,7 +262,7 @@ Auth Code Grant (PR #1057)
233
262
## [7.3.0] - released 2018-11-13
234
263
235
264
### Changed
236
-
- Moved the `finalizeScopes()` call from `validateAuthorizationRequest` method to the `completeAuthorizationRequest` method so it is called just before the access token is issued (PR #923)
265
+
- Moved the `finalizeScopes()` call from `validateAuthorizationRequest` method to the `completeAuthorizationRequest` method so it is called just before the access token is issued (PR #923)
237
266
238
267
### Added
239
268
- Added a ScopeTrait to provide an implementation for jsonSerialize (PR #952)
@@ -335,7 +364,7 @@ To address feedback from the security release the following change has been made
335
364
## [5.1.4] - 2017-07-01
336
365
337
366
- Fixed multiple security vulnerabilities as a result of a security audit paid for by the [Mozilla Secure Open Source Fund](https://wiki.mozilla.org/MOSS/Secure_Open_Source). All users of this library are encouraged to update as soon as possible to this version or version 6.0 or greater.
338
-
- It is recommended on each `AuthorizationServer` instance you set the `setEncryptionKey()`. This will result in stronger encryption being used. If this method is not set messages will be sent to the defined error handling routines (using `error_log`). Please see the examples and documentation for examples.
367
+
- It is recommended on each `AuthorizationServer` instance you set the `setEncryptionKey()`. This will result in stronger encryption being used. If this method is not set messages will be sent to the defined error handling routines (using `error_log`). Please see the examples and documentation for examples.
339
368
- TravisCI now tests PHP 7.1 (Issue #671)
340
369
- Fix middleware example fatal error (Issue #682)
341
370
- Fix typo in the first README sentence (Issue #690)
@@ -646,7 +675,9 @@ Version 5 is a complete code rewrite.
0 commit comments