Skip to content

Commit

Permalink
Prepare next release
Browse files Browse the repository at this point in the history
Administrative tweaks for the next release.
  • Loading branch information
pjones committed Feb 17, 2023
1 parent a49c5bc commit ff81d3b
Show file tree
Hide file tree
Showing 10 changed files with 34 additions and 23 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,8 +27,8 @@ jobs:
# https://www.haskell.org/ghc/
# https://hackage.haskell.org/package/cabal-install
os: [ubuntu-latest, macOS-latest, windows-latest]
cabal: ["3.6"]
ghc: ["8.10"]
cabal: ["3.8"]
ghc: ["9.2"]
steps:
- name: Checkout Code
uses: actions/[email protected]
Expand Down
8 changes: 2 additions & 6 deletions .github/workflows/tests.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,12 +11,8 @@ jobs:
os: [ubuntu-latest, macOS-latest, windows-latest]
# https://www.haskell.org/ghc/
# https://hackage.haskell.org/package/cabal-install
cabal: ["3.6"]
ghc: ["8.10", "9.0", "9.2"]
exclude:
# https://gitlab.haskell.org/ghc/ghc/-/issues/17926
- os: windows-latest
ghc: "8.8"
cabal: ["3.8"]
ghc: ["8.10", "9.0", "9.2", "9.4"]
steps:
- name: Clone Repository
uses: actions/[email protected]
Expand Down
8 changes: 8 additions & 0 deletions CHANGES.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,13 @@
# Revision History for `openid-connect`

## Version 0.2.0 (February 17, 2023)

* Tolerate non-standard client authentication methods in discovery
documents via a new constructor (@ondrap)

* Allow access to the ID token (JWT) so you can log out of a session
(`authenticationSuccessWithJwt`) (@ondrap)

## Version 0.1.0 (March 25, 2020)

Initial release.
Expand Down
2 changes: 1 addition & 1 deletion LICENSE
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
Copyright (c) 2020-2022 Peter J. Jones <[email protected]>
Copyright (c) 2020-2023 Peter J. Jones <[email protected]>
All rights reserved.

Redistribution and use in source and binary forms, with or without
Expand Down
12 changes: 6 additions & 6 deletions flake.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 2 additions & 1 deletion flake.nix
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,8 @@
supportedCompilers = [
"ghc8107"
"ghc902"
"ghc922"
"ghc925"
"ghc944"
];

# List of supported systems:
Expand Down
12 changes: 6 additions & 6 deletions openid-connect.cabal
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
cabal-version: 2.2
name: openid-connect
version: 0.1.2
version: 0.2.0
license: BSD-2-Clause
license-file: LICENSE
author: Peter Jones <[email protected]>
maintainer: Peter Jones <[email protected]>
copyright: Copyright (c) 2020-2022 Peter Jones
copyright: Copyright (c) 2020-2023 Peter Jones
homepage: https://github.com/pjones/openid-connect
bug-reports: https://github.com/pjones/openid-connect/issues
category: Network
tested-with: GHC ==8.10.7 || ==9.0.2
tested-with: GHC ==8.10.7 || ==9.0.2 || ==9.2.5 || ==9.4.4
synopsis:
An OpenID Connect library that does all the heavy lifting for you

Expand Down Expand Up @@ -79,7 +79,7 @@ common extensions
--------------------------------------------------------------------------------
common dependencies
build-depends:
, aeson >=1.3 && <2.1
, aeson >=1.3 && <2.2
, base >=4.9 && <5.0
, bytestring >=0.10 && <0.12
, case-insensitive ^>=1.2
Expand All @@ -88,8 +88,8 @@ common dependencies
, cryptonite >=0.25 && <1.0
, http-client >=0.6 && <0.8
, http-types ^>=0.12
, jose >=0.8 && <0.10
, lens >=4.0 && <5.2
, jose >=0.8 && <0.11
, lens >=4.0 && <5.3
, memory >=0.14 && <1.0
, mtl >=2.2 && <2.4
, network-uri >=2.6 && <2.8
Expand Down
4 changes: 3 additions & 1 deletion src/OpenID/Connect/Authentication.hs
Original file line number Diff line number Diff line change
Expand Up @@ -185,7 +185,9 @@ data ClientAuthentication
-- Client with no Client Secret or other authentication mechanism.

| UnsupportedAuthentication Text
-- ^ Other unsupported possible ways to autenticate the client
-- ^ Other unsupported possible ways to autenticate the client.
--
-- @since 0.2.0

deriving stock (Generic, Eq, Show)

Expand Down
2 changes: 2 additions & 0 deletions src/OpenID/Connect/Client/Flow/AuthorizationCode.hs
Original file line number Diff line number Diff line change
Expand Up @@ -323,6 +323,8 @@ authenticationSuccess https time provider creds user =
--
-- Some endpoints (e.g. the end_session_endpoint) may require the original
-- id_token; this functions allows an application to save it for later use.
--
-- @since 0.2.0
authenticationSuccessWithJwt
:: MonadRandom m
=> HTTPS m
Expand Down
2 changes: 2 additions & 0 deletions src/OpenID/Connect/Discovery.hs
Original file line number Diff line number Diff line change
Expand Up @@ -215,6 +215,8 @@ data Discovery = Discovery
-- request that the End-User be logged out at the OP. This URL MUST
-- use the https scheme and MAY contain port, path, and query
-- parameter components.
--
-- @since 0.2.0
}
deriving stock (Generic, Show)
deriving (ToJSON, FromJSON) via GenericJSON Discovery

0 comments on commit ff81d3b

Please sign in to comment.