3.0.0
π WASM is now supported! π
Changes since 3.0.0-alpha.1
Bug Fixes
-
Don't set empty JWK signing algorithms in
Client::new()
(#104). This fixes a bug introduced in 3.0.0-alpha.1/2.5.0 (#87) that caused clients constructed viaClient::new()
not to allow any signature algorithms for ID tokens and user info JWTs unless they manually set the allowed algorithms on theIdTokenVerifier
. This patch restores the original behavior of defaulting to accepting onlyRS256
for clients constructed viaClient::new()
, as indicated in the spec.Clients constructed via
Client::from_provider_metadata()
will continue to receive the signing algorithms specified in the provider metadata during OpenID Connect Discovery (as introduced in 3.0.0-alpha.1/2.5.0 via #87).
New Features
- Add
AuthorizationRequest::add_scopes
(#105)
Other Changes
- Remove unnecessary
'static
bound fromProviderMetadata::discover_async
(#107)
Summary of changes since 2.5.1
Breaking Changes
-
Replace
ring
with RustCrypto crates (#96). This change increases the minimum supported Rust version (MSRV) to 1.57 and adds support for WASM targets.Special thanks to @sbihel for contributing this change!
-
Establish new MSRV policy: this crate will maintain a policy of supporting Rust releases going back at least 6 months. Changes that break compatibility with Rust releases older than 6 months will no longer be considered SemVer breaking changes and will not result in a new major version number for this crate (f3dedb3).
Other Changes
- Make
CoreRsaPrivateSigningKey
Send
andSync
(bc09d22).