-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathChanges
1339 lines (1072 loc) · 53.6 KB
/
Changes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Revision history for Perl extension Net::SAML2.
{{$NEXT}}
0.81 -- Fri Aug 30 15:16:41 ADT 2024
This release is dedicated to the memory of Abe Timmerman (ABELTJE)
[Compatibility Deprecation Warning]
As of Release 0.79 the following have been changed and the old version may be
removed in an upcoming release.
- Net::SAML2::Protocol::Artifact
- response_to changed to in_response_to
- Net::SAML2::Protocol::LogoutResponse
- response_to changed to in_response_to
[Significant Changes]
- Reverts "Fix #123 Useless cert_text" as the cert_text is not so useless...
- Note that the latest versions of libxml2 may have made some incompatable
changes. These changes do not seem to impact this module and will be reviewed
closer in a future version.
[Detailed Change Log]
- ad9c30f Fix pod issues
- 2e0028b Disable author testing update to libxml2 or catalog required
- 7ba6750 Revert f3e8e5f4fbfa70c79b1ee4a8850be8a6ba4ede27 Fixes #123 Useless cert_text
- 049ba76 Disable author testing update to libxml2 or catalog required
- 51ae4c8 Revert #123 Useless cert_text
- ca65479 Increment repo version
- b33c185 v0.80
0.80 -- Sat Jun 22 13:13:42 ADT 2024
[Compatibility Deprecation Warning]
As of Release 0.79 the following have been changed and the old version may be
removed in an upcoming release.
- Net::SAML2::Protocol::Artifact
- response_to changed to in_response_to
- Net::SAML2::Protocol::LogoutResponse
- response_to changed to in_response_to
[Significant Changes]
- Minor XML compatibility fixes thanks to Martijn van de Streek (MartijnVdS)
[Detailed Change Log]
- c20e976 Updates for next release
- 931b29f Use "true" and "false" for more boolean values
- aefae65 Include `xml:lang` attribute in ServiceName and ServiceDescription
- a19257d Increment repo version after release
- b4a6c52 v0.79
0.79 -- Sun Apr 21 18:13:48 ADT 2024
[Compatibility Deprecation Warning]
Please not that the following have been changed and the old version my be removed in an
upcoming release.
- Net::SAML2::Protocol::Artifact
- response_to changed to in_response_to
- Net::SAML2::Protocol::LogoutResponse
- response_to changed to in_response_to
[Significant Changes]
- Implement a new Response object that properly deals with Responses that lack Assertions
- Metadata fixes:
- Move boolean values to literals
- Fix KeyDescriptor when only one key exists
[Detailed Change Log]
- bbb127d Revert and standardize substatus spelling
- 2fadb47 Update for in_response_to changes
- e0efd64 Quiet perlcritic and podcoverage tests
- 001d34a Update required version URN::OASIS::SAML2
- ecee0e3 Remove warnings from testsuite
- 971434a Add Object::Response to Net::SAML2
- 90d2c80 Add in_response_to to Role::ProtocolMessage
- fa5a690 Remove NAME sections in modules
- ca4fcda Add addtional test for NameID formats
- 67438b5 Correctly test NameID attributes
- a7dac91 Use method, not Moose interals in tests
- bcfc4d2 Fix boolean values for integrations with crappy IdP's
- 70adeb6 Remove code for old builders
- 3c87e51 Don't mention key usage unless we have both signing and encryption
- 239d1b4 Increment repo version
- eff3908 v0.78
0.78 -- Sun Feb 25 21:09:15 AST 2024
[Compatibility Deprecation Warning]
- id is renamed to issuer. Current code simply warns.
- See 0.77 for other deprecated changes
[Significant Changes]
- MockSAML IdP is a tested implementation
- Signature bug fix
- Deprecate id - use issuer to instantiate objects
- testapp changes for deprecation and to support MockSAML
[Detailed Change Log]
- 49c8a8a Add missing pod for new function
- 7a7e167 testapp: use SSL_verify_mode to disable verification via config
- 35c8b65 s/NET::SAML2/Net::SAML2/
- 1bd4efe Change $sp->id to $sp->issuer in t/09-authn-request.t
- f3e3ec4 Add deprecation warning to id() method
- 99bb04c testapp: add relaystate for a redirect binding
- 116d948 testapp: id has been deprecated use issuer
- c53ba9d Rename id to issuer for Net::SAML2::SP
- b98a763 Fix signature location bug
- b8a297a Increment Repo Version
- 9c7d980 v0.77
- edc6a88 Increment Version for a Release
0.77 -- Fri Feb 02 23:45:43 AST 2024
[Compatibility Deprecation Warning]
- The Redirect now uses SHA256 dy default instead of SHA1
- nameid_format in Protocol::AuthnRequest is Deprecated. Please update your
code to use nameidpolicy_format instead. The current code simply warns but a
future version will use nameid_format for other purposes see:
https://github.com/perl-net-saml2/perl-Net-SAML2/issues/195.
[Detailed Change Log]
- 70890a1 Add deprecation warning for nameid_format in Protocol::AuthnRequest
- 4920a03 add and BumpVersionAfterRelease
- 5ba4c33 Set Default Redirect Signature Algorithm to sha256
- 12afa9a v0.76
0.76 -- Mon Jan 08 18:31:06 AST 2024
- 688dc32 Forgot to increment the version for last release
- 65ba171 v0.75
0.75 -- Mon Jan 01 22:54:10 AST 2024
[ Significant Changes since 0.74 ]
- A future release WILL make sha256 the default. If that is a problem for you please check which year it is.
- waterkip has added the ability to expose the AttributeConsumingService in metadata generation
- See the documentation for AttributeConsumingService and RequestedAttribute
[Detailed Change Log]
- 18e4cdb Update Copyright year
- beb32f7 Updates for Release
- 75f86fe Add attribute_consuming_service to SP for metadata creation
- 0cc1a28 Add AttributeConsumingService object to Net::SAML2
- c77250d Add RequestedAttribute object to Net::SAML2
- 42ef7c0 Fix author tests for Net::SAML2::XML::Sig
- 80d0b6d Reflect that the default will be sha256
- 43d1d5c exclusive was an option for XML::CanonicalizeXML
- f3e8e5f Fixes #123 Useless cert_text
- 40da745 v0.74
0.74 -- Sun Aug 27 22:04:34 ADT 2023
[ Significant Changes since 0.73 ]
- Mostly minor cleanup and a few resolved issues
- Officially support DigiD, eHerkenning and eIDAS implementations
[Detailed Change Log]
- 242b8f4 Update repo version for release
- 6e63336 Quiet annoying Perl::Critic warning
- 722d5a6 Add GitHub::CreateRelease to automatically create a GitHub release
- 789365e verify_xml will die is it does not verify
- 45b299c Only URI escape if defined value
- 9154c4d Split Github Actions workflow
- 924b819 Add more supported implementations in POD
- 92fb773 Always return a default assertion service
- 51fde84 Refactor Test::Net::SAML2::Util
- e60202c Fix dependency things in the dist.ini
- e689af5 Add Coveralls to CI
- aeea977 Update pod for Net::SAML2::Binding::POST::handle_response
- c3863e1 Update pod for Net::SAML2::Binding::Redirect::verify
- 6cf57eb v0.73
0.73 -- Sat Jul 08 07:35:12 ADT 2023
- Release of 0.72 as production release
[ Significant Changes since 0.69 ]
- Quite a few changes and improvements including
- Support to obtain information about the AuthnStatement from the Assertion
- Function to obtain key_name added to the SP
- Verification of artifact responses based on an attribute ID ( via XML::Sig 0.64)
- Improve Decryption of EncryptedData nodes for Assertions (via XML::Enc 0.12 and up)
- Bumps the requirements new versions of:
- XML::Enc => "0.12",
- XML::Sig => "0.64",
- XML::Generator => "1.13"
- Miscelaneous:
- testapp bug fixes and improvements
- Github action improvements
- Tested ADFS IdP again
- Fixed issue DAKKAR reported to LWP::UserAgent Environment Variables
[ Change Log ]
- 8115398 Update version for release
- d460fb9 v0.72
- e04cc05 Fix typo for AuthnRequest Assertion namespace
- ebef6bc Increment version for a release
- 2d815e0 Add scoping to Net::SAML2::Protocol::AuthnRequest
- af3b271 Update test for Net::SAML2::Protocol::AuthnRequest
- ed64638 Fix NAME segment of POD for modules.
- c83527e v0.71
- 914aafb Forgot to increment main module version
- 1292296 Increment version and update LICENSE file
- dd2c070 v0.70
- 79f1a38 Bump XML::Enc version
- faecd40 Fix decrypt for encrypted assertions
- 9d389f1 Decrypt an assertion with EncryptedData nodes
- ae3888a Fix YAML syntax for linux workflow
- 4d73198 Add verification for artifact responses on an attribute ID
- 7869a2f Add tests for part encrypted/part decrypted assertions
- 466e870 Add key_name function to SP
- b4c70d8 testapp: option for acs_url_post in authnRequest
- fa6c350 testapp: SingleLogoutService is not indexed
- d2cf58a install Module::Pluggable
- 2dfb0c1 Remove Pari Install from github action
- 8932955 Bump requirement for XML::Generator
- 11ba40d Create AuthnStatement object
- 488a234 ADFS fully tested again and update repo version
- 9dbd114 Fixes #169 tests fail when PERL_LWP_SSL_CA_* or HTTPS_CA_* env vars are set
- a9aca61 Add XML declartion to generate_metadata
- 7cfe56a Configure SP without Single Logout Service
- ef16349 Fix version for release
- accfc66 v0.69
0.72 -- Fri Jul 07 22:33:42 ADT 2023
[ Significant Changes since 0.69 ]
- All changes from 0.71 plus:
- e04cc05 Fix typo for AuthnRequest Assertion namespace
- ebef6bc Increment version for a release
- 2d815e0 Add scoping to Net::SAML2::Protocol::AuthnRequest
- af3b271 Update test for Net::SAML2::Protocol::AuthnRequest
- ed64638 Fix NAME segment of POD for modules.
0.71 -- Tue Jul 04 23:14:07 ADT 2023
[ Significant Changes since 0.69 ]
- Re-release 0.70 to ensure all commits were included
- Quite a few changes and improvements including
- Support to obtain information about the AuthnStatement from the Assertion
- Function to obtain key_name added to the SP
- Verification of artifact responses based on an attribute ID ( via XML::Sig 0.64)
- Improve Decryption of EncryptedData nodes for Assertions (via XML::Enc 0.12 and up)
- Bumps the requirements new versions of:
- XML::Enc => "0.12",
- XML::Sig => "0.64",
- XML::Generator => "1.13"
- Miscelaneous:
- testapp bug fixes and improvements
- Github action improvements
- Tested ADFS IdP again
- Fixed issue DAKKAR reported to LWP::UserAgent Environment Variables
[ Change Log ]
- 914aafb Forgot to increment main module version
- 1292296 Increment version and update LICENSE file
- dd2c070 v0.70
- 79f1a38 Bump XML::Enc version
- faecd40 Fix decrypt for encrypted assertions
- 9d389f1 Decrypt an assertion with EncryptedData nodes
- ae3888a Fix YAML syntax for linux workflow
- 4d73198 Add verification for artifact responses on an attribute ID
- 7869a2f Add tests for part encrypted/part decrypted assertions
- 466e870 Add key_name function to SP
- b4c70d8 testapp: option for acs_url_post in authnRequest
- fa6c350 testapp: SingleLogoutService is not indexed
- d2cf58a install Module::Pluggable
- 2dfb0c1 Remove Pari Install from github action
- 8932955 Bump requirement for XML::Generator
- 11ba40d Create AuthnStatement object
- 488a234 ADFS fully tested again and update repo version
- 9dbd114 Fixes #169 tests fail when PERL_LWP_SSL_CA_* or HTTPS_CA_* env vars are set
- a9aca61 Add XML declartion to generate_metadata
- 7cfe56a Configure SP without Single Logout Service
- ef16349 Fix version for release
- accfc66 (timlegge/master) v0.69
0.70 -- Tue Jul 04 22:12:49 ADT 2023
[ Significant Changes since 0.69 ]
- Quite a few changes and improvements including
- Support to obtain information about the AuthnStatement from the Assertion
- Function to obtain key_name added to the SP
- Verification of artifact responses based on an attribute ID ( via XML::Sig 0.64)
- Improve Decryption of EncryptedData nodes for Assertions (via XML::Enc 0.12 and up)
- Bumps the requirements new versions of:
- XML::Enc => "0.12",
- XML::Sig => "0.64",
- XML::Generator => "1.13"
- Miscelaneous:
- testapp bug fixes and improvements
- Github action improvements
- Tested ADFS IdP again
- Fixed issue DAKKAR reported to LWP::UserAgent Environment Variables
[ Change Log ]
- 9d389f1 Decrypt an assertion with EncryptedData nodes
- ae3888a Fix YAML syntax for linux workflow
- 4d73198 Add verification for artifact responses on an attribute ID
- 7869a2f Add tests for part encrypted/part decrypted assertions
- 466e870 Add key_name function to SP
- b4c70d8 testapp: option for acs_url_post in authnRequest
- fa6c350 testapp: SingleLogoutService is not indexed
- d2cf58a install Module::Pluggable
- 2dfb0c1 Remove Pari Install from github action
- 8932955 Bump requirement for XML::Generator
- 11ba40d Create AuthnStatement object
- 488a234 ADFS fully tested again and update repo version
- 9dbd114 Fixes #169 tests fail when PERL_LWP_SSL_CA_* or HTTPS_CA_* env vars are set
- a9aca61 Add XML declartion to generate_metadata
- 7cfe56a Configure SP without Single Logout Service
- ef16349 Fix version for release
- accfc66 (timlegge/master) v0.69
0.69 -- Tue Apr 04 20:20:22 ADT 2023
[ Significant Changes since 0.67 ]
- Simply 0.67 issued as a production release
- Couple of small by fixes Wesley Schwengle (waterkip)
- 4953468 Increment version for production release
- b44d100 v0.68
- c296c49 Update Changes for release
0.68 -- Mon Apr 03 19:17:59 ADT 2023
[ Significant Changes since 0.67 ]
- Couple of small by fixes Wesley Schwengle (waterkip)
[ Change Log ]
- 4f4d6d4 Increment version for next release
- 8e993b2 Fix artifact response status codes from assertions
- d7dbf62 Refactor key selection for metadata generation
- 4fa07de Fix version after release
- 52870d2 v0.67
0.67 -- Sun Mar 19 10:03:23 ADT 2023
[ Significant Changes since 0.64 ]
This version supports sending request the the IdP as HTTP-POST requests.
SimpleSAMLphp is added as a tested/supported IdP
Numerous improvements to the testapp (see git repo) to improve testing
testapp can now be fully tested against any configured IdPs using Selenium
- 6c9cd5e Increment version for official release
- a0d4001 v0.66
0.66 -- Sat Mar 18 20:49:26 ADT 2023
- 930f4af Increment version for another TRIAL release
- 63db958 v0.65
- 5023eda Update Changes for a TRIAL release
0.65 -- Sun Mar 12 22:41:33 ADT 2023
[ Significant Changes since 0.64 ]
This version supports sending request the the IdP as HTTP-POST requests.
SimpleSAMLphp is added as a tested/supported IdP
Numerous improvements to the testapp (see git repo) to improve testing
testapp can now be fully tested against any configured IdPs using Selenium
- 8b902c4 Add SimpleSAMLphp to the list of tested IdPs
- 5fb1f81 testapp: Add tests to confirm the configuration of the IdPs
- 033d2e9 testapp: add id to links and buttons to help automate testing
- cf0b39b Create Author Tests to validate Schema of Generated XML
- c815c58 testapp: Don't show POST button for login if IdP does not support
- c093420 testapp: move slo to new format and fix wrong acs url
- 946c2fc testapp: Support HTTP-POST logout
- c5b0a2c testapp: Implement AuthnRequest via POST
- 41b7d12 Add Support for sending requests to IDP via HTTP-POST
- 0b378cb Update version in repo for next release
- fac9f54 testapp: move loading of configuration
- 7d4e50c v0.64
0.64 -- Sun Feb 05 18:21:41 AST 2023
Release 0.63-TRIAL as production release
[ Significant Changes since 0.62 ]
Maintenance release that has a number of fixes for small issues. This is
the first release in some time that has been tested for SOAP connections and
SOAP Artifacts. The testapp has been updated to fix SOAP and the Shibboleth
and samltest.id IdPs.
- Minimum Perl version has been bumped to 5.12
- Contributors and authors set automatically
- Add Shibboleth and samltest.id as supported IdPs
- Allow encryption certificate in SP metadata
- LogoutRequest was missing NameQualifier and SPNameQualifier needed by some IdPs
- Fix bug in obtaining Assertion dates and message id and improve id validation
- Fix multiple SOAP issues including support for multiple certs in metadata
- New Net::SAML2::Protocol::Artifact to access parts of the ArtifactResponse
- Allow obtaining assertion substatus and allow assertions without NameID
- testapp:
- allow untrusted TLS SOAP connections
- read key and cert from config.yml
- fix metadata generation issues and make signing optional
- only enable logout bindings supported by IdP
- allow for custom attribute mapping by IdP
- Support for Shibboleth and samltest.id IdPs
[ Change Log ]
- 63edefa Increment Version number for release
- 17674de v0.63
0.63 -- Fri Feb 03 19:18:42 AST 2023
[ Significant Changes since 0.62 ]
Maintenance release that has a number of fixes for small issues. This is
the first release in some time that has been tested for SOAP connections and
SOAP Artifacts. The testapp has been updated to fix SOAP and the Shibboleth
and samltest.id IdPs.
- Minimum Perl version has been bumped to 5.12
- Contributors and authors set automatically
- Add Shibboleth and samltest.id as supported IdPs
- Allow encryption certificate in SP metadata
- LogoutRequest was missing NameQualifier and SPNameQualifier needed by some IdPs
- Fix bug in obtaining Assertion dates and message id and improve id validation
- Fix multiple SOAP issues including support for multiple certs in metadata
- New Net::SAML2::Protocol::Artifact to access parts of the ArtifactResponse
- Allow obtaining assertion substatus and allow assertions without NameID
- testapp:
- allow untrusted TLS SOAP connections
- read key and cert from config.yml
- fix metadata generation issues and make signing optional
- only enable logout bindings supported by IdP
- allow for custom attribute mapping by IdP
- Support for Shibboleth and samltest.id IdPs
[ Change Log ]
- 8d0b962 use Moose is equivalent to use strict
- faf3ec7 Update for release 0.63
- 1688e1c Add XsdID as a type for id attribute type checking
- fc6a199 Get the substatus of a failed assertion
- 3c9e4fc Create a Artifact to hold the parts of the Artifact
- 36652dc Fixes perl-net-saml2#152 - Incorrect id set on messages from XML
- 33d9985 Allow assertion without a NameID
- 6a140ca Get the correct dates from the assertions
- 3d291ff testapp: allow attribute mapping by IdP
- 60a3592 testapp: only enable supported IdP logout bindings
- cfc5351 Add Shibboleth and samltest.id as supported IdPs
- c81e384 Fix LogoutRequest's missing NameQualifier and SPNameQualifier for samletest.id
- cf8991a remove eol spaces
- ade3fed testapp: signed metadat messes with testing - make it an option
- 571f7a9 testapp Fix issue in metadata generation missing fully qualified URI
- 01424dd testapp: key and cert should be read from config and missed https options
- 787bd1f Allow encryption key to be specified in the metadata.xml
- f6740e4 testapp: allow SOAP connections to untrusted SSL servers
- eb48fa8 SOAP Some IdPs have issues with newlines in SOAP-ENV
- 83e30e1 SOAP binding should support multiple certs in the IdP Metadata
Use Try::Tiny to handle exceptions
- ef2472d Install Sub::Name without running tests
- dffc8c8 Test::Deep requires perl 5.012 and newer
- e213bae New Year advance Copyright
- 9f8b287 Set sane default values for testing testapp
- bf27ae9 Bump version to .63
- b782aa7 Set authors and contributors
- 013a0c6 Update contributors and reorder alphabetically
- d268c0f Add missing Credit for Gianni in 0.62
0.62 -- Wed Nov 30 21:13:55 AST 2022
Thanks to Gianni Ceccarelli for providing an "insecure" option
to allow a Net::SAML2::Binding::Redirect to be unsigned.
- e59ce1b Increment Version in Git Repo
- 165661e testapp allow the metadata or authnreq to be unsigned
- 9f41ae3 Fix testapp metadata generation
- 303a8a2 Fixes: #128 Support ForceAuthn and IsPassive in AuthnRequest
- 29b45e4 Minor pod updates
- 17772d7 Update version number for release
- 1a5796b Add support to SP for SSO redirect binding without signed auth request
- 736bf78 Merge pull request #119 from dakkar/optional-sp-key
- 2de5268 fix POD typo
- 80658ae Redirect::key still optional, but more explicitly so
- bf7f771 make Redirect::key optional
0.61 -- Tue Oct 04 23:37:21 ADT 2022
[ Significant Changes since 0.59 ]
There are multiple potentially BREAKING CHANGES depending on how you
have written your application. Your application may need updates for
this version.
Same a version 0.60-TRIAL
0.60 -- Mon Sep 19 10:53:23 ADT 2022
[ Significant Changes since 0.59 ]
There are multiple potentially BREAKING CHANGES depending on how you
have written your application. Your application may need updates for
this version.
[BREAKING CHANGES]
- Support multiple signing keys in the metadata. This version attempts
to ensure compatibility but the call to Net::SAML2::IdP->cert will return
an array of certs for each 'use'. It is, however, likely that there will
only be one cert in the array.
- Net::SAML2::Binding::SOAP was improved. The call to
Net::SAML2::Binding::SOAP->handle_request() now returns the XML whereas in
the past it returned the certificate's subject and the xml as an array.
This make it consistent with the Redirect and POST Bindings.
- Net::SAML2::Binding::POST was also improved. Previously the call to
Net::SAML2::Binding::POST->handle_response() returned inconsistent results
depending on whether a cacert was provided. This version returns the XML
of the decoded request.
- The testapp required only changes related to the call to
Net::SAML2::IdP->cert($use) that now returns an ARRAY.
[Changes of note:]
- Support multiple signing keys in the metadata. This version attempts to
ensure compatability but the call to Net::SAML2::IdP->cert will return an
array of certs for each $use. It is, however, likely that there will only
be one cert in the array.
- Redirects now validate the raw URI that is passed to the call. It is
assumed that the URI that your application has sent is unmodified from the
response that the web server received. lighttpd in particular normalizes
the response and will break Redirects from Microsoft Azure
(see lighttpd.conf in xt/testapp for a working configuration)
- Net::SAML2::Binding::SOAP and Net::SAML2::Binding::POST were improved.
- SAML trust anchors were implemented and the verification of the SAML
response was improved. It is possible to validate the response with
subject, issuer or issuer_hash as anchors in addition to the cacert.
Neither cacert nor anchors are required as long as the signature of
the response is valid. The cacert has not been required for the
Redirect or SOAP binding so this treats SOAP the same.
[Required Application Updates]
- There were several changed to the test suite that will likely need to be
made in your application:
- To support metadata.xml containing multiple KeyDescriptors the call to
Net::SAML2::IdP->cert($use) now returns an ARRAY. As this is an helper
function that is meant to allow you to pass the cert to another Net::SAML2
call it was deemed low risk. Your code may be unaffected.
- The call to Net::SAML2::Binding::SOAP->handle_request() needs to be updated
to reflect that it returns only the decoded XML not an array of the
Certificate Subject and XML. Depending how your application uses the
response will determine whether changes are required.
- The call to Net::SAML2::Binding::POST->handle_response() returned
inconsistent results depending on whether a cacert was provided. This
version returns the XML of the decoded request. Previously it returned
either 1 for success or if a cacert was used, either "(verified) and the
certificate Subject" or 0 if the certificate verification failed.
- The lighttpd.conf for the testapp did require a change to prevent it from
"normalizing" a SAML Logout Redirect. There are contradictory RFCs
concerning SAML and the "normalising" URIs. If you use lighttpd in a SAML
application with AZURE as your SAML IdP see
[lighttpd.conf](https://github.com/perl-net-saml2/perl-Net-SAML2/commit/3855393eb454097e1e326a516a573f37ce3456a3#diff-8fd15aaa870fd2b9cda596bf3bb870ce2723ae412e55f0b653124b45d87e1bea)
[Possible Impacts]
- It is worth noting that the testapp (that implements a rudimentary Service
Provider) included in the git repo did not require any changes to the
application for this version.
- While my setup tests against multiple IdPs I do not have a working SOAP
IdP at present.
[ Full Change Log ]
- e95e7c2 Fix bug where two keys with different usage fails
- 33092f1 Add isDefault when isDefault is missing in assertion_consumer_service
- 66a4146 Bump version to .60
- 812ea36 0.59 updates
- f589dd0 v0.59
- c1b25f9 Sync changes with the wiki page and clean up indents
- 2c432f2 Remove unnecessary parameters
- 3855393 Allow URIs that do not include scheme and host in redirect
- e1774b6 Update docs for Net::SAML2::Protocol::LogoutRequest
- fdcfbeb Fix docs for Net::SAML2::Binding::Redirect
- 8d24c89 Update docs for Net::SAML2::Protocol::ArtifactResolve
- 27f6508 Update docs for Net::SAML::SP
- 4a89679 Fix docs for Net::SAML2::Binding::SOAP
- f43727d Verify the SAMLResponse based on the raw query string
- 50f5c8a Fixes #12 - multiple signing keys in metadata
- 4902c89 Make SAML trust anchors work on verification of the SAML request
- af68b68 SOAP binding does not require a cacert anymore
- 1854e35 Implement verify_xml() call which only verifies the XML
0.59 -- Wed Aug 24 22:23:53 ADT 2022
There were no changes other than incrementing the version number
from 0.58-TRIAL.
- 564fa93 (tag: 0.59) Update Changes for .58 release
- 2a43f4e v0.58
0.58 -- Fri Aug 12 16:25:59 ADT 2022
[ Significant Changes since 0.57 ]
You will want to test this release. There are numerous changes and
improvements but nothing that obviously breaks functionality.
- Fix bug where NameID Format was an empty string and broke the
constructor for the LogoutRequest in Net::SAML::SP logout_request.
- Add tests for lowercase URL encoded data
A potential change is upcoming, so we want to have tests to ack/nack
the claims of that new change.
- Enclose SOAP action in double quotes
- Allow error URI to be a full fledged URI in Net::SAML::SP
- The generated id is now 32 bytes of randomness instead of 16 bytes
previously
- SAML2 constants moved to URN::OASIS::SAML2
- Make cacert optional in Net::SAML2::SP as it is only needed for the
SOAP request call
- Add Indexes to the assertion_consumer_service in Net::SAML::SP
This allows you to later on ask for the default assertion service by
using get_default_assertion_service().
- Allow injecting own LWP::UserAgent to IdP new_from_url
- When reading metadata we previously always provided a default NameID
Format. We no longer do this, we only return the NameID format if it
was provided by the metadata.
- Make provider optional in Protocol::ArtifactResolve
Previous versions supplied a default when as_xml was called, this
default has been removed.
- Optional parameters in Binding::Redirect
You now need to supply less parameters when verifying the redirect
request (SAMLResponse).
- Optional attributes for NameID in LogoutRequest
In order to respect the SAML specifications the NameQualifier and
SPNameQualifier are omitted from the LogoutRequest. In case you need
the NameQualifier and the SPNameQualifier you'll now need
include_name_qualifier to be set in the constructor. When the NameID
Format is urn:oasis:names:tc:SAML:2.0:nameidformat:persistent, both
become mandatory. For those who need to set the SPNameQualifier to
be the Affiliation Group ID we have affiliation_group_id for you in
the constructor.
[ Change Log ]
- a245b94 Add test for lowercase url escaping
- ba0a803 Fix author tests with dzil
- 97898a2 fix pod for Assertion->nameid_format
- 523ba92 Add missing POD for nameid, nameid_format in Protocol::Assertion
- fb3085d Update Changes for 0.57
- 6c63ed1 Make attributes in NameID optional
- d69b7dd Install sub::name first to prevent pipeline failures
- 7310b6c Bump version string post .57 release
- 8b83b3e Make params optional in Binding::Redirect for SAMLResponse
- 3b2b96b Use cpm instead of cpanminus
- bc7eb07 nameid_format cannot be a zero length string
- 1c5af31 Be able to inject own LWP::UserAgent to IdP new_from_url
- 2abeb49 Add license to distro
- 3f7c673 Install deps manually
- 7f400a0 Install deps manually
- 14c075c Fix documentation and general code cleanup
- ca9fce1 Small refactor on Protocol::AuthnRequest
- 14fb479 Add builder to Binding::SOAP for LWP::UA
- 70ac5d0 Refactor Binding::SOAP::request
- 830275f Add nameid as a node so we can get the value and/or the format
- 066100f Really make provider optional in Protocol::ArtifactResolve
- 5673bb5 v0.56
- 3c7f390 Set version in main module for downstream developers
- 22dbf06 Remove Dockerfile, we have github actions now
- 18fa0ed Add defaults to Net::SAML2::Binding::Redirect
- 6fe4bdc Fix contributers automaticly from git
- 1348af5 Add the index in the assertion_consumer_service
- 02ab7be Make cacert optional in Net::SAML2::SP
- 858dc57 Remove setting default format when not present in metadata
- 9e7c88a Introduce URN_XXX constants in NET::SAML2::SP
- b2e3020 Change from 16 to 32 bytes of randomness
- 42159bc Allow error URI to be a full fledged URI
0.57 -- Fri Aug 05 23:34:05 ADT 2022
[ Release 0.56-TRIAL as 0.57 ]
[ Significant Changes since 0.55 ]
- Numerous fixes and cleanups thanks to Wesley Schwengle (waterkip)
- Functionality changes mostly limited to Net::SAML2::SP
- metadata signing has been improved
- updates to github actions
- new API for ACS/SLO data in metadata
0.56 -- Sun Jul 24 23:52:56 ADT 2022
[ Significant Changes since 0.55 ]
- Numerous fixes and cleanups thanks to Wesley Schwengle (waterkip)
- Functionality changes mostly limited to Net::SAML2::SP
- metadata signing has been improved
- updates to github actions
- new API for ACS/SLO data in metadata
[ Change Log ]
- signing metadata is now optional
- 8ee4f57 Merge pull request #69 from waterkip/GH-46_acs_and_slo_injections
- 027d300 fixup! Implement new API for ACS/SLO data in metadata
- d81549a Implement new API for ACS/SLO data in metadata
- 01d5fb7 Merge pull request #67 from waterkip/testsuite-defaults
- 7c51e1b Merge pull request #68 from waterkip/GH-actions
- 10b9ab0 Only use defaults/required attrs in net_saml2_sp() test method
- 55d6e5e Install Moose in a seperate action
- f4d0718 Run Github actions on pull requests
- 7eb44fe Make Math::Pari installable
- 1fe7b8b cpanm is provided by the perl images
- 7f0c885 Update perl images in the matrix
- 915adaa Merge pull request #65 from waterkip/GH-cleanup-dist.ini
- f754ad7 Merge pull request #66 from waterkip/GH-46-optional_URIs
- b25642f Make some URI's optional in the constructor
- f01ef30 Remove dependencies from dist.ini
- 57142a1 Merge pull request #64 from waterkip/bug-61
- 5e6c0f0 Add ds:KeyName to md:KeyDescriptor/ds:Keyinfo
- c6b9dfb Fix SAML metadata signing
- b18d316 Add missing pod from PR #62
- 9f8cd26 Merge pull request #62 from waterkip/sign-metadata_optional
- 7e637b7 Make signing metadata optional
- beba53f Merge pull request #63 from waterkip/cert-text_builder
- 493af8c Merge pull request #60 from waterkip/sp-defaults
- 29503c9 Use builder for _cert_text
- 5e94d9c Add defaults to authnreq_signed and want_assertions_signed
- c2e49e4 v0.55
- 159332d (tag: 0.55) Bump version for 0.55 release
0.55 -- Fri Apr 15 21:06:36 ADT 2022
[ Significant Changes since 0.53 ]
Support for EncryptedAssertions is automatic if one is received but the
call to Net::SAML2::Protocol::Assertion must provide a key and cacert to
decrypt the EncryptedAssertion and Verify the Signature on the decrypted
Assertion if it is Signed. No changes are required for existing applications
that do not use EncryptedAssertions.
[ Commits ]
- 159332d Bump version for 0.55 release
- 92a1eb5 Support Unsigned encrypted Assertions
- 39016c6 v0.54
0.54 -- Sat Apr 09 18:13:04 ADT 2022
[ Significant Changes since 0.53 ]
Support for EncryptedAssertion
[ Commits ]
- b166c3e Updates for new Version
- ab8c986 Move to OurPkgVersion and remove VERSION from repo
- 6d1b058 Merge pull request #57 from timlegge/encrypted-assertions
- bff02f7 Minor lighttpd config update for testapp
- 94e42b0 Support EncryptedAssertions
- 34a432c v0.53
0.53 -- Thu Feb 03 21:02:47 AST 2022
[Significant Changes since 0.52]
- Fix bug with Saml LogoutResponse on HTTP-Redirect Binding introduced in 0.52
- testapp: simplify testing by allowing easier testing against multiple IdPs
- 22d2b2a (HEAD -> master) Update version information
- 13c18ee Merge pull request #56 from timlegge/testapp-multiple-idp-support
- a2ff662 Allow custom config.yml file per Identity Provider
- 4bf230a Add support for multiple IdPs to the SamlTest testapp Makes
testing against Multiple IdPs much simpler to setup and configure
- 905f78a SP initiated SAMLLogout has SAMLResponse on redirect
- 378ea9b v0.52
0.52 -- Sun Jan 30 23:17:19 AST 2022
[Significant Changes since 0.49]
- Document IdP and SP initiated LogoutRequest handling
- Fix issue if multiple X509Certificate tags are found in metadata
- 5d70bac Update for official release
- b753644 Update Makefile.PL and README
0.51 -- Sun Jan 30 14:15:43 AST 2022
- d4153b5 v0.51
- a9f5ca5 Fix the Commit ids - forgot to rebase before push
0.50 -- Sun Jan 30 13:59:48 AST 2022
- 8cc6d8e v0.50
- af1deee Add additional deveeloper files to .gitignore
- 8223e85 Remove eol spaces
- 3eb54d3 Create a pid file for lighttpd
- 89393ab Merge pull request #55 from timlegge/master
- 237ef74 NameId Format is optional in the LogoutRequest
- a8ee006 Fix an un reported issue validating URL with extra parameters
- b096862 Fixes issue in Discusion #54 when there are multiple
X509Certificate tags in the metadata
- 11ba7f4 Add information related to the LogoutRequest and
LogoutResponse that can be either SP of IdP initiated
- 5780c6c Move from File::Slurp to File::Slurper
0.49 -- Tue Dec 07 21:22:58 AST 2021
[Significant Changes since 0.46]
- Net::SAML2::XML::Sig is now a subclass of XML::Sig
- XML::Sig 0.52 is now a dependency
- 064f718 v0.49
- 6e76482 Simplify dist.ini and add SignReleaseNotes
- e96982c Bump Version
- 3fc63f5 v0.48
0.48 -- Mon Dec 06 16:53:49 AST 2021
- 8589b4a Update Version
- 9c73463 Missing VERSION and Abstract
- 586fd5b v0.47
0.47 -- Sun Dec 05 15:07:51 AST 2021
- e580299 Update version number
- 837aa20 add strict and warnings to quiet author critic
- 2ff8aeb Merge pull request #51 from timlegge/move-to-xml-sig
- 3634910 test of properly handling comments in nameid and email
- 4c20821 Moving to XML::Sig - keeping them in sync is a pain
0.46 -- Thu Nov 25 21:53:52 AST 2021
- dd9776e Merge pull request #50 from timlegge/issue-38
- 54cf599 Testapp should display unicode
- ac74ac4 Fixes Issue #49 - Issue verifying XML that includes wide characters
- 5afc7dd Add strict and warnings to tests
- c20ed8c Add strict and warnings and move existing to the stop
- 26c53c1 v0.45
- 5397713 (tag: 0.45) Update for new version
0.45 -- Wed Nov 17 17:33:34 AST 2021
- 594d135 add missing use statement (ziali088)
0.44 -- Sun Oct 31 14:33:03 ADT 2021
- Packaging issue reissuing 0.43 without changes
0.43 -- Sat Oct 30 23:09:24 ADT 2021
[Release Version of 0.42]
- No changes
[Significant Changes since 0.40]
- COMPATABILITY WARNING: version 0.44 will likely make sha256 the default
- HTTP-Redirect now supports signing and verifying with more than rsa-sha1
- include HTTP-Post for SingleLogoutService in generated metadata
- Destination missing in LogoutRequest
- Added PingIdentity to the tested IdPs
- Most other changes related to the testapp Saml2Test (in git repo)
- Fix issue with LogoutResponse on HTTP-Redirect for some IdP (Azure, Ping)
- Make SP metadata.xml more configuable and sign
0.42 -- Fri Oct 29 22:35:53 ADT 2021
[Significant Changes since 0.40]
- COMPATABILITY WARNING: version 0.44 will likely make sha256 the default
- HTTP-Redirect now supports signing and verifying with more than rsa-sha1
- include HTTP-Post for SingleLogoutService in generated metadata
- Destination missing in LogoutRequest
- Added PingIdentity to the tested IdPs
- Most other changes related to the testapp Saml2Test (in git repo)
- Fix issue with LogoutResponse on HTTP-Redirect for some IdP (Azure, Ping)
- Make SP metadata.xml more configuable and sign
[Change Log]
- b9d4786 Merge pull request #44 from timlegge/azure-lowercase
- 4f2a40c Update for latest build
- ffd4188 Add issuer to make testing between multiple IdPs clearer
- 1049084 Fix issues with LogoutResponse
- 378c815 Merge pull request #43 from timlegge/metadata
- bfe0966 Sign Metadata
- 1cd0003 Net::SAML2::SP configurable values for metadata
0.41 -- Thu Oct 21 17:59:37 ADT 2021
[Significant Changes since 0.40]
- COMPATABILITY WARNING: version 0.44 will likely make sha256 the default
- HTTP-Redirect now supports signing and verifying with more than rsa-sha1
- include HTTP-Post for SingleLogoutService in generated metadata
- Destination missing in LogoutRequest
- Added PingIdentity to the tested IdPs
- Most other changes related to the testapp Saml2Test (in git repo)
[Change Log]
- 07b68dd v0.41
- c4ec6e2 Merge pull request #38 from timlegge/dist-changes
- 54e612e Improve packaging and update changes
- 1d894a9 testapp: prevent app error if the are no slo_urls
- d6e2ab9 testapp: Change to decoding in sls-redirect-response
- 23240d8 Fixes #30 - Modules withou version and cleanup missing Abstract
- 9c5585b Merge pull request #37 from timlegge/testapp
- c51ba51 Tested compatiblity against PingIdentity
- b4d3fe9 Remove end of line spaces
- 41ef582 testapp: provide documentation on how to use the Saml2Test application
- 5a8ebb7 Fixes #36 testapp: metadata is rendered as text by the browser
- f1e2eca testapp: add .gitignore file testapp
- ca4b8bd Fixes #35: Metadata does not include HTTP-Post for SingleLogoutService
- 64008da testapp: Better org_name
- 22073bb Update certificates with 10 year expiration
- f215c40 testapp: add lightttpd.conf to proxy https traffic to testapp on port 3000
- f92ba77 testapp: provide lighttpd config to deliver a metatdata.xml file
- 2d671a4 Fixes #32: HTTP-Redirect should support more than sha1
- 5e2425a testapp: Make required settings configurable
- f70b0a5 Fixes #34: testapp: Dancer request_uri is not decoded
- 8c0d048 testapp: Fixes #33 Destination is not properly assigned
- 6e0a685 Fixes #31 Destination missing in LogoutRequest
- 652c763 testapp: support post for LogoutResponse
0.40 - 2021-07-26
[Significant Changes since 0.38]
- Add support for Auth0 SAML (bug fix)
- Add options to allow https for metadata urls
[Change Log]
- TDD Update Changes and Increment version
- 314df85 Remove Test::TrailingSpace keeps failing on automatic License file
- 9bc0901 Mention TUTORIAL.md in synopsis and README
- 343ae20 Rename Tutorial
- b5591cc Update documentation for ssl_opts for Idp new_from_url
0.39-TRIAL - 2021-07-25
[Change Log]
- b34f4f8 Update Changes and Increment version
- 5921d12 Fixes #28 support https urls for metadata
- 95a2311 Fixes #29 which also supports Auth0 SAML
- 09591b6 Test InResponseTo on Assertions
0.38 - 2021-07-23
[Change Log]
- 88abdeb Update Changes and Increment version
0.37-TRIAL - 2021-07-21
[Change Log]
- cc4e029 Update Changes and Increment version
- f6227a4 Replace remaining XML::XPath with XML::libXML
0.36-TRIAL - 2021-07-15
[Change Log]
- 7bddf72 Update Changes and Increment version
- be1a42f Remove no_comments call from IdP
0.35-TRIAL - 2021-07-14
[Significant Changes]
Replaces XML::XPath with XML::libXML which is better maintained and more
powerful. XML::libXML options are set to disable loading external documents
and expanding entities as well as disabling network access.
[Change Log]
- a071834 Update Changes and Increment version
- 3741d2a Replace XML::XPath with XML::libXML
- f3887f5 Fixup Contributors and cleanup README
- 9d8c3bd Automatically generate README for repo
- 4a1f2ef Update dist.ini to use Pod2Readme
0.34 - 2021-03-30
[Significant Changes since 0.32]
- Mostly an improvement in documentation