Skip to content

Releases: TeslaGov/ngx-http-auth-jwt-module

2.2.0

28 Aug 17:03
Compare
Choose a tag to compare

What's Changed

Full Changelog: 2.1.0...2.2.0

2.1.0

18 Mar 16:33
032fa5c
Compare
Choose a tag to compare

2.0.3

04 Dec 18:33
07f6f99
Compare
Choose a tag to compare
  • #115

  • Build Date: 2023-12-04 18:33:30+00:00

  • Commit: 07f6f99

Development build: master@02f4e17eb84dd2de78d5cedca8f0b4f8247470e3

28 Aug 16:13
5f9ffd2
Compare
Choose a tag to compare

Warning

This is an automatically generated pre-release version of the module, which includes the latest master branch changes.
Please report any bugs you find to the issue tracker.

  • Build Date: 2024-08-28 16:13:35+00:00
  • Commit: 02f4e17

2.0.2

10 Aug 16:56
Compare
Choose a tag to compare

fix: #105

2.0.1

26 Apr 16:14
Compare
Choose a tag to compare

Fixes an issue introduced in v2.0.0 where claims which were extracted at a higher config level were not passed down to nested levels.

Updated 5/4 -- uploaded new binaries built with the proper NGINX version (#96).

2.0.0

25 Apr 18:59
b2ec2bb
Compare
Choose a tag to compare

This release applies a number of feature adjustments, some of which may require small adjustments to your NGINX config. The goals of this release were cleanup and to remove places where we hard-coded a few things, allowing for greater flexibility.

  • Breaking Change: Renamed directive auth_jwt_extract_sub to auth_jwt_validate_sub and it no longer extracts the sub, it only validates that it is non-empty (as the name suggests). Note that this is off by default.
  • Breaking Change: Removed directive auth_jwt_validate_email -- use auth_jwt_extract_*_claims instead (see below).
  • Breaking Change: Renamed directive auth_jwt_validation_type to auth_jwt_location for clarity (see below).
  • New Feature: Added auth_jwt_extract_request_claims and auth_jwt_extract_response_claims which can be used to extract one or more claims from the JWT and place them on request or response cookies, and also access them by variable. See the README for more information.
  • New Feature: You may now specify a custom header which contains the JWT. Use the auth_jwt_location directive to do so, e.g. auth_jwt_location: HEADER=Auth-Token. You may optionally prefix the JWT with "Bearer ". (#72)
  • Fix: #82 -- Compatibility with nginx 1.23.0+
  • Cleanup: Some of the build process has been cleaned up and refactored, as well as the actual C code for the module.
  • Cleanup: The README has been cleaned up and reorganized.

1.2.0

19 Apr 04:15
Compare
Choose a tag to compare
  • Updated to not respond with a "Location" header when redirects are disabled (#74)
  • Updated the README.
  • Fixed some tests.
  • Renamed variables for clarity.
  • Added support for higher-bit HS/RS algorithms (#80).
  • Fixed link with jansson (#63).
  • Fixed the cp_bin function.
  • Fixed issues compiling on Ubuntu 22.04.

PEM Support, Optional `sub`, Docker Cleanup

13 Jun 12:18
aa024c5
Compare
Choose a tag to compare
  • PEM key file support (#56)
  • rearrange dockerfile
  • Copy the PC files out of the docker image
  • Ignore the PC files
  • Revert "Merge pull request #54 from TeslaGov/pr/42"
  • downgrade libjwt and libjansson
  • Use nginx.org yum repo instead of epel
  • Fix possible overflow - thanks @eutychus
  • added NGINX_VERSION to Makefile to allow for overriding
  • Dockerfile formatting
  • Makefile cleanup
  • add task to copy binaries from container
  • add option to not extract sub -- fixes #66 (#70)
  • Docker / build refactor & update Nginx (#69)

removed auth_jwt_redirect

07 Jul 14:29
Compare
Choose a tag to compare

In this release, I merged the generous contribution from @max-lt that reduced the C-code in favor of nginx configuration. This eliminated the need for the auth_jwt_redirect attribute.