Published August 29, 2024
| Version v5.2.0
Software
Open
indigo-dc/oidc-agent: oidc-agent 5.2.0
Authors/Creators
- 1. @KIT-SCC
- 2. KIT
- 3. Instituto de Física de Cantabria
- 4. CERN
- 5. Morgridge Institute for Research
- 6. @EGI-Federation
- 7. Discord
- 8. DESY
Description
Features
- Added possibility to add custom request parameters to requests done by the agent. This is done through
a
custom_parameters.configfile placed in the agent dir or/etc/oidc-agent - Added the capability to
oidc-agentto restart after an update, i.e. when the oidc-agent binary changes, i.e. after a package update. This behavior is enabled through the--restart-on-updateoption. oidc-agent-serviceincludes the--restart-on-updateoption on default in theoidc-agent-service.optionsfile, i.e. auto-restart after update is enabled on default for agents started throughoidc-agent-service. This can be disabled in theoidc-agent-service.optionsfile.- Added the
--bearerand--auth-headeroptions tooidc-token. These can be used to ease api calls.
Changes
- Renamed the long option of
oidc-agent-afrom--bind_addressto--bind-address.
Change / Enhancement / Bugfix
The previous release stated that:
When an account configuration is generated and the OP returns scopes in the initial token flow, the account
configuration is updated with those scopes.
This did not work as intended. We made the following changes:
- Fixed a bug, so that the agent now actually behaves as described.
- Implemented separate scope lists for the initial token flow and the refreshing of tokens. Only the refresh-scope-list is updated. This way access tokens can be obtained with the correct (updated) scope, but re-authentication flows can still use the original scope list.
Enhancements
oidc-addcan now also take an issuer url to load the default account for this issuer, i.e.oidc-add <issuer_url>oidc-agentnow has a command line argument--pid-fileto which the agent's pid is written.oidc-agent-serviceuses the new--pid-fileoption ofoidc-agent- If no socket path is set a default path is tried. The default path
is
$TMPDIR/oidc-agent-service-$UID/oidc-agent.sock, this is the path used byoidc-agent-service
Bugfixes
- Fixed a bug where the ipc api would return always
successwhen a mytoken is requested, even when this failed. - Fixed some memory leaks
OpenID Provider
- Added https://alice-auth.cern.ch/
- Added https://atlas-auth.cern.ch/
- Added https://cms-auth.cern.ch/
- Added https://lhcb-auth.cern.ch/
- Added https://dteam-auth.cern.ch/
Files
indigo-dc/oidc-agent-v5.2.0.zip
Files
(2.1 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:1f0faaf4e33e8dc165a3e888e572278d
|
2.1 MB | Preview Download |
Additional details
Related works
- Is supplement to
- Software: https://github.com/indigo-dc/oidc-agent/tree/v5.2.0 (URL)