Releases: wiltonsr/ldapAuth
Releases · wiltonsr/ldapAuth
v0.1.9
Deprecation Notice
Passing the following parameters directly in the configuration is now deprecated.
- URL
- Port
- Minimum TLS version
- Maxiumum TLS version
- Certificate authorities
- InsecureSkipVerify
- StartTLS
If your config uses these parameters they will be automatically copied to the new ServerList
format.
In future releases, these parameters will be removed. You can check how to migrate in options docs and examples.
What's Changed
Full Changelog: v0.1.8...v0.1.9
v0.1.8
Merge pull request #62 from wiltonsr/fix-issue-61
Use same operation mode to bind validations
v0.1.7
Merge pull request #60 from wiltonsr/add-tls-version-option
Add options options to customize TLS versions
v0.1.6
Merge pull request #56 from DanElbert/consistent_headers
Ensure Username, Authorization, Ldap-Extra-Attr-DN, and Ldap-Extra-Attr-CN headers are consistently handled
v0.1.5
Merge pull request #55 from wiltonsr/strip-commas
Strip comma when baseDN is empty
v0.1.4
Merge pull request #51 from wiltonsr/fix-html-escaping
fix: replace html templating with text templating to avoid html escaping
v0.1.3
Deprecated
UseTLS
option is now deprecated and will be ignored as of this release. TLS connections will be inferred from the URL scheme (ldaps) and from the StartTLS
option if set. This is not a breaking change.
v0.1.2
Fix: Disable nested group filter by default as not supported by most LDAP servers
v0.1.1
Merge pull request #44 from fcinqmars/feat-cookie-options
add extra cookie options
v0.1.0
- Add support to
allowedUsers
feature