- Improve header type parameter of client authentication JWTsJOIDCRP-75Philip Smart
- Improve audience handling in JWT client authenticationJOIDCRP-74Philip Smart
- Aliased decoded IdPAttributes are lost during subsequent useJOIDCRP-73Resolved issue: JOIDCRP-73Philip Smart
- Release 2.2.0JOIDCRP-72Resolved issue: JOIDCRP-72Philip Smart
- Possible bug in setting clientId from properties fileJOIDCRP-71Philip Smart
- Custom c14n flow descriptor bean needs to use parent beanJOIDCRP-70Resolved issue: JOIDCRP-70Philip Smart
- As an OIDC RP, using loginHintLookupStrategy, ProfileRequestContext is nullJOIDCRP-69Resolved issue: JOIDCRP-69Philip Smart
- Claim sanitization fails with ill behaving OPJOIDCRP-68Resolved issue: JOIDCRP-68Philip Smart
- Automate tests against the OIDC conformance suiteJOIDCRP-67Philip Smart
- Expose c14n flow list, so it can be separate from the internal listJOIDCRP-66Resolved issue: JOIDCRP-66Philip Smart
- Release 2.1.2JOIDCRP-65Resolved issue: JOIDCRP-65Philip Smart
- Add custom message handler supportJOIDCRP-64Philip Smart
- Flow descriptor is missing wiring for subjectDecoratorJOIDCRP-63Resolved issue: JOIDCRP-63Philip Smart
- Add Pushed Authorization Requests endpointJOIDCRP-62Philip Smart
- Release 2.1.1JOIDCRP-61Resolved issue: JOIDCRP-61Philip Smart
- Conflicting value in oidc-rp.propertiesJOIDCRP-60Resolved issue: JOIDCRP-60Philip Smart
- Release 2.1.0JOIDCRP-59Resolved issue: JOIDCRP-59Philip Smart
- Release 2.0.1JOIDCRP-58Resolved issue: JOIDCRP-58Philip Smart
- RP 2.0.0 distribution package contains shib-support libraryJOIDCRP-57Resolved issue: JOIDCRP-57Philip Smart
- map OIDC ACRs to SAML authnContexts in proxied authentication?JOIDCRP-56Resolved issue: JOIDCRP-56Philip Smart
- Suggest changing the support level for Version 1.0.0JOIDCRP-55Philip Smart
- Arbitrary claims to requestJOIDCRP-54Resolved issue: JOIDCRP-54Philip Smart
- removing the oidc.rp plugin removes too many configuration filesJOIDCRP-53Philip Smart
- idp.authn.Password dependencyJOIDCRP-52Resolved issue: JOIDCRP-52Philip Smart
- Translate nonexistent ACR in responsesJOIDCRP-51Philip Smart
- Default 'sub' based C14N flow dos not runJOIDCRP-50Resolved issue: JOIDCRP-50Philip Smart
- Add CSP protection to viewsJOIDCRP-49Resolved issue: JOIDCRP-49Philip Smart
- Remove failIfResourceIsNull from default asymmetric key configJOIDCRP-48Philip Smart
- Release 2.0.0JOIDCRP-47Resolved issue: JOIDCRP-47Philip Smart
- Convert HTTP client executeOpen calls to ResponseHandlersJOIDCRP-46Resolved issue: JOIDCRP-46Philip Smart
- Leaks in HTTP response handlingJOIDCRP-45Resolved issue: JOIDCRP-45Philip Smart
- Null Handling TaskJOIDCRP-44Resolved issue: JOIDCRP-44Philip Smart
- Update okhttp-tls to latest versionJOIDCRP-43Philip Smart
- Unit tests fails on windowsJOIDCRP-42Resolved issue: JOIDCRP-42Philip Smart
- Upgrade for IdP V5 compatibilityJOIDCRP-41Resolved issue: JOIDCRP-41Philip Smart
- Release 1.1.0JOIDCRP-40Resolved issue: JOIDCRP-40Philip Smart
- Move ProviderMetadataStringListValueLookupFunction to commonsJOIDCRP-39Philip Smart
- Support a prompt parameter profile overrideJOIDCRP-38Philip Smart
- Support the display authentication request parameterJOIDCRP-37Resolved issue: JOIDCRP-37Philip Smart
- Add RP specific clockSkew property for IssuedAtClaimsValidatorJOIDCRP-36Resolved issue: JOIDCRP-36Philip Smart
- Add support for passive inbound requestsJOIDCRP-35Resolved issue: JOIDCRP-35Philip Smart
- Remove nonBrowser authentication flow supportJOIDCRP-34Resolved issue: JOIDCRP-34Philip Smart
- Typo in add default principals propertyJOIDCRP-33Resolved issue: JOIDCRP-33Philip Smart
- Review what is required for FAPI2 (Security Profile) supportJOIDCRP-32Philip Smart
- Support distributed claimsJOIDCRP-31Philip Smart
- Support PCKE (RFC7636)JOIDCRP-30Resolved issue: JOIDCRP-30Philip Smart
- Support client_secret_jwt and private_key_jwt client authenticationJOIDCRP-29Resolved issue: JOIDCRP-29Philip Smart
- Release 1.0.0JOIDCRP-28Resolved issue: JOIDCRP-28Philip Smart
- OpenID Foundation conformance suite testingJOIDCRP-27Resolved issue: JOIDCRP-27Philip Smart
- Save Access Token and Refresh Token to credential setJOIDCRP-26Resolved issue: JOIDCRP-26Philip Smart
50 of 73
PostGreSQL: InputOutputError upon Logout, autoCommit enabled
Fixed
Basics
Logistics
Basics
Logistics
Description
Environment
None
Created August 11, 2022 at 8:37 AM
Updated August 17, 2022 at 1:09 PM
Resolved August 17, 2022 at 1:09 PM
Activity
Rod Widdowson August 17, 2022 at 1:09 PM
Rod Widdowson
August 17, 2022 at 1:09 PM
This has been fixed tested and a new version of the plugin released.
Rod Widdowson August 16, 2022 at 7:39 PM
Rod Widdowson
August 16, 2022 at 7:39 PM
Customer reports sucessful testing on PostGreSQL.
I’ll cut a release tomorrow
Rod Widdowson August 14, 2022 at 10:08 AM
Rod Widdowson
August 14, 2022 at 10:08 AM
I’ve build an example 1.0.4 it passes out tests so I’ve asked for further testing
Rod Widdowson August 12, 2022 at 10:17 AM
Rod Widdowson
August 12, 2022 at 10:17 AM
So, on further reaserach this feels like a pure and simple bug. The Fine Manual states (anout commit()
that
I’m reviewing and testing the obvious bug fix. I’ll reach out to out OOB to get a test on PostGreSQL
Martin Hitschel August 11, 2022 at 4:13 PM
Martin Hitschel
August 11, 2022 at 4:13 PM
Hi I can give it to the customer, I do not run postgresql either. He has a test system though
Upon a SAML Single Logout event, the IdP displays an "InputOutputError".
Logs say: Caused by: org.postgresql.util.PSQLException: Cannot commit when autoCommit is enabled.
Telling p:autoCommit="false" to the bean (wild guess) kept Tomcat from starting at all.