- Renamed
OAuth2AuthenticationTokenUtil->OAuth2AuthenticationTokenExtractor - Updated dependencies
Minimum required Java version: 21
- Updated to Spring Boot 4.x
- Removed fork of
OidcUserServiceto move closer to the standard implementation. Only fork the requiredOidcUserRequestUtils#shouldRetrieveUserInfo
- Removed fork of
- Update Vaadin to 25
- Removed
TotalVaadinFlowWebSecurityas it's no longer supported - Please note that Stylesheet may now required being added to
PublicStatelessPathsProvider
- Removed
- Updated Jackson Databind to v3
ActuatorUserConfig: Remove deprecatedpasswordSha256- UsepasswordHashinstead- Migrated demos and tests
- Code cleanup
Last expected version for Spring Boot 3.x
- Updated dependencies
- Improve default HSTS customization logic
- Vaadin
- Made the way
HttpSecurity#securityMatcheris applied in Sidecars customizable #221- By default
PathPatternRequestMatcheris now used instead ofMvcRequestMatcherorAntPathRequestMatcher - This fixes problems where the app/servlet utilizes an existing
urlMappingthat could result in incorrect path interception. - Further details can be found in
software.xdev.sse.web.sidecar.httpsecurity
- By default
- Fix incorrect lookup of
LoginUrlStoreinTotalVaadinFlowSecurityConfigurer#configureLoginViewFromLoginUrlStore TotalVaadinFlowSecurityConfigurermake it possible to enable/disable certain configurations
- Made the way
- Web
- Add customizer for HSTS
- also used by sidecars (e.g. Actuator)
- HSTS is disabled by default if SSL/HTTPS is also disabled
- Further details can be found in
software.xdev.sse.web.hsts
- Add customizer for HSTS
- Updated dependencies
- Vaadin
- Deprecated
TotalVaadinFlowWebSecuritybecauseVaadinWebSecurityis deprecated - Added wrapper for Vaadin's new
TotalVaadinFlowSecurityConfigurer#196- Updated the demo accordingly
- Deprecated
- Actuator
- Disabled caching by default
SHA-256is usually faster than utilizing a cache- This heavily depends on the used hardware, however most systems have hardware acceleration for
SHA-256
- This heavily depends on the used hardware, however most systems have hardware acceleration for
- Removed
expiring-limited-cachecacher as it provides no advantage
- Actuator
- Added support for custom password hashers
- The default built-in password-hasher is still using
SHA-256
- The default built-in password-hasher is still using
ActuatorUserConfig#passwordSha256was renamed topasswordHashpasswordSha256is deprecated and will be removed in a future release
- Now utilizes password hash caching if possible
- The cache defaults to a maximum size of 100 and a cached duration of 1h
- Enabled when one of the following libraries is detected on the class-path:
- Can be disabled with
sse.sidecar.actuator.password-hash.cache.enabledif required - See source code for details configuration options
- Added support for custom password hashers
- Updated dependencies
- Minor code cleanup
- Updated dependencies
- Added more tests
- Updated dependencies
- Added
LoginUrlStore- Stores the login url so that it can be used inside other parts of applications to e.g. display dedicated login components
- Enabled by default, can be disabled with
sse.web.login-url-store.enabled=false
- OAuth2-OIDC
- Added
OAuth2LoginUrlStoreAdapterto determine the login url
- Added
- Vaadin
- Now handles
LoginUrlStoreif present and set's the value toNavigationAccessControl#setLoginView- This is usually only needed when the authentication is anonymous and navigation to a view that requires non-anonymous authentication happens
- Now handles
- Updated to Spring Boot 3.5
- Migrated deployment to Sonatype Maven Central Portal #155
- Updated dependencies
- OAuth2-OIDC
DefaultDeAuthApplier: Use already present request/response if possible
- Vaadin
- Fix
VaadinOAuth2RefreshReloadCommunicatornot always setting status code401(which causesxhrAdapter.jsto ignore the response)- This should only affect applications with anonymous auth enabled
- Fix
- OAuth2-OIDC
- Do not register
OAuth2RefreshFiltertwice - DeAuth JS-556
- Apply correctly
- Make it possible to customize application
- Do not register
- Vaadin
XHRReloadVaadinServiceInitListener#45- Improved performance by not building element every request and cloning it instead
- If an error occurs while the script is added to the document the error is now logged (once at WARN; all subsequent ones at DEBUG)
- Vaadin
- Fix
SecureVaadinRequestCacheignoring non-optional url parameters
- Fix
Initial production ready release
- Added demo + integration tests
- Vaadin
- Fix XHR Reload not working (header missing) due to incorrect auto-configuration order
- Vaadin
- Add Vaadin XHR Reload subsystem
- Fixes Vaadin being stuck in loops with POST or similar requests when authentification expires
- Fix wrong CSRF method being used, resulting in CSRF errors when these requests are encountered
- DO NOT redirect these requests to login
- OAuth2/OIDC
- Make it possible to specify applicable sources for
OAuth2RefreshReloadCommunicator
- Make it possible to specify applicable sources for
Initial preview version for internal integration tests and release management checks