Skip to content
This repository was archived by the owner on May 22, 2023. It is now read-only.

Conversation

@mattcobb
Copy link

Sink with upstream saml to get fix for vuln CVE-2020-7711 in goxmldsig

Donald Hoelle and others added 30 commits June 15, 2017 17:28
…g a metadata file with multiple EntityDescriptor's underneath a EntitiesDescriptor tag
* Enable persistent name id format
* use dep package manager
* updated travis
…m the assertion (crewjam#130)

fixes crewjam#122

jwt-go not support leeway parameter
…ewjam#133)

We’ve had a bunch of changes requesting the ability to customize
how cookies are set and it is getting a little messy. This change
moves the code to setting and reading cookies into two interfaces
which you can extend/customize.
…nt” time (crewjam#136)

The default is obviously the current time, but for various reasons you may wish to evaluate the
response at a different reference time, for example processing a response that has been deferred.

We can’t use the global TimeNow() thunk, which is designed for testing, because it isn’t safe to modify concurrently.
… does not reset the default. Should resolve the test for issue 152. (crewjam#158)
crewjam and others added 28 commits March 25, 2021 09:31
* upgrade golang.org/x/crypto from v0.0.0-20210317152858-513c2a44f670 to v0.0.0-20210322153248-0c34fe9e7dc2

Co-authored-by: Github Actions <[email protected]>
…wjam#344)

* Change dgrijalva/jwt-go imported module to form3tech-oss/jwt-go.

dgrijalva/jwt-go is abandoned (dgrijalva/jwt-go#457) with an outstanding security vulnerability (dgrijalva/jwt-go#422).

form3tech-oss/jwt-go is a fork that has fixed the vulnerability.
Co-authored-by: dependabot-preview[bot] <27856297+dependabot-preview[bot]@users.noreply.github.com>
From
https://www.oasis-open.org/committees/download.php/56785/sstc-saml-metadata-errata-2.0-wd-05.pdf
```
[E62]A use value of "signing" means that the contained key information is applicable to both signing
and TLS/SSL operations performed by the entity when acting in the enclosing role.

A use value of "encryption" means that the contained key information is suitable for use in wrapping
encryption keys for use by the entity when acting in the enclosing role.

If the use attribute is omitted, then the contained key information is applicable to both of the above uses.
```

We need to include certificates both when they have a "use" attribute of
"signing" as well as when the "use" attribute is missing.

Fixes crewjam#352

SAML input from @simmel.
…jwt/v4 (crewjam#383)

* Switch from github.com/form3tech-oss/jwt-go to github.com/golang-jwt/jwt/v4

* Fix tests for Go 1.17 and update CI accordingly
* add /logout to initiate SLO request

* fix

* unused package

* gofmt-ed
* Add support for aes128-gcm algorithm

* Pass nonce to encrypt function and add some tests
* Implemented SP support for receiving authentication results via artifact
binding.

* update test expectations

Co-authored-by: David Venhoek <[email protected]>
Bumps [github.com/google/go-cmp](https://github.com/google/go-cmp) from 0.5.5 to 0.5.6.
- [Release notes](https://github.com/google/go-cmp/releases)
- [Commits](google/go-cmp@v0.5.5...v0.5.6)

Signed-off-by: dependabot[bot] <[email protected]>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* Support multiple X509Certificate elements in X509Data

* Update test files

* Remove unnecessary comments

* add comments

Co-authored-by: Alexander Zobnin <[email protected]>
Bumps [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt) from 4.1.0 to 4.2.0.
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.1.0...v4.2.0)

---
updated-dependencies:
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* upgrade golang.org/x/crypto from v0.0.0-20210322153248-0c34fe9e7dc2 to v0.0.0-20211215153901-e495a2d5b3d3

Co-authored-by: Github Actions <[email protected]>
Bumps [github.com/google/go-cmp](https://github.com/google/go-cmp) from 0.5.6 to 0.5.7.
- [Release notes](https://github.com/google/go-cmp/releases)
- [Commits](google/go-cmp@v0.5.6...v0.5.7)

---
updated-dependencies:
- dependency-name: github.com/google/go-cmp
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* upgrade golang.org/x/crypto from v0.0.0-20211215153901-e495a2d5b3d3 to v0.0.0-20220128200615-198e4374d7ed

Co-authored-by: Github Actions <[email protected]>
Bumps [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt) from 4.2.0 to 4.4.1.
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.2.0...v4.4.1)

---
updated-dependencies:
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* Allow to specify HTTPClient for SAML artifact resolution

* go fmt
…am#415)

* Fix ArtifactResolveElement and add tests

* goimports
@mattcobb mattcobb changed the title ls-29145 goxmldsig vuln CVE-2020-7711 ls-29145 merge upstream and fix goxmldsig vuln CVE-2020-7711 Apr 29, 2022
@mattcobb mattcobb changed the title ls-29145 merge upstream and fix goxmldsig vuln CVE-2020-7711 ls-29145 merge upstream Apr 29, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.