Issues
- Release 1.1.0JWEBAUTHN-50Resolved issue: JWEBAUTHN-50Philip Smart
- canonicalization after the WebAuthn flow has been run fails in some casesJWEBAUTHN-49Philip Smart
- Default cleanup hook is not wired up correctlyJWEBAUTHN-48Resolved issue: JWEBAUTHN-48Philip Smart
- How to run credential policies from the MFA flowJWEBAUTHN-47Philip Smart
- the management view shows canonical username instead of the one that was searched forJWEBAUTHN-46Resolved issue: JWEBAUTHN-46Philip Smart
- Change signature counter update flag to false by defaultJWEBAUTHN-45Philip Smart
- Document approach for conditionally requiring 2fa for the registration flowJWEBAUTHN-44Philip Smart
- evaluate credential policy rules for all tokens in store before authenticationJWEBAUTHN-43Resolved issue: JWEBAUTHN-43Philip Smart
- credential policies are not evaluated for all keysJWEBAUTHN-42Resolved issue: JWEBAUTHN-42Philip Smart
- Improve options for feature detection on browsersJWEBAUTHN-41Philip Smart
- Credential repository injection/configuration is not consistentJWEBAUTHN-40Resolved issue: JWEBAUTHN-40Philip Smart
- Determine 'trusted authenticators' switch at runtimeJWEBAUTHN-39Philip Smart
- AllowUntrustedAttestation property is missing from default properties fileJWEBAUTHN-38Resolved issue: JWEBAUTHN-38Philip Smart
- Lookup user credentials from user handle expects user handleJWEBAUTHN-37Resolved issue: JWEBAUTHN-37Philip Smart
- giving a username that does canonicalize to management search leads to uncaught exceptionJWEBAUTHN-36Resolved issue: JWEBAUTHN-36Philip Smart
- Registration username input required even after authenticationJWEBAUTHN-35Philip Smart
- Support for WebAuthn Signal APIJWEBAUTHN-34Philip Smart
- Make collecting nickname during key registration optional/configurableJWEBAUTHN-33Resolved issue: JWEBAUTHN-33Philip Smart
- add a Last Used field to registration and management viewsJWEBAUTHN-32Resolved issue: JWEBAUTHN-32Philip Smart
- unexpected error message leaking to authentication viewJWEBAUTHN-31Resolved issue: JWEBAUTHN-31Philip Smart
- two different NoRegisteredWebAuthnCredentials eventsJWEBAUTHN-30Resolved issue: JWEBAUTHN-30Philip Smart
- username that does not canonicalize leads to uncaught exceptionJWEBAUTHN-29Resolved issue: JWEBAUTHN-29Philip Smart
- Support software authenticator AAGUID UI descriptionsJWEBAUTHN-28Resolved issue: JWEBAUTHN-28Philip Smart
- Add basic authenticator policyJWEBAUTHN-27Resolved issue: JWEBAUTHN-27Philip Smart
- Allow metadata to be attached to registrations retroactivelyJWEBAUTHN-26Resolved issue: JWEBAUTHN-26Philip Smart
- Have username/password login during registration pre-fill the username fieldJWEBAUTHN-25Philip Smart
- Make user.name configurableJWEBAUTHN-24Resolved issue: JWEBAUTHN-24Philip Smart
- user.displayName is not usedJWEBAUTHN-23Resolved issue: JWEBAUTHN-23Philip Smart
- Support for different usernames in key registrationJWEBAUTHN-22Resolved issue: JWEBAUTHN-22Philip Smart
- IdP does not start with a non-existing fido metadata cache fileJWEBAUTHN-21Resolved issue: JWEBAUTHN-21Philip Smart
- Remove webauthn-json JS in favour of parseCreationOptionsFromJSON from browser APIsJWEBAUTHN-20Philip Smart
- Support WebAuthn level 3 attestation statements in assertion responseJWEBAUTHN-19Philip Smart
- Release 1.0.0JWEBAUTHN-18Resolved issue: JWEBAUTHN-18Philip Smart
- Add 'last used' field to passkey registrationJWEBAUTHN-17Philip Smart
- Add auditingJWEBAUTHN-16Resolved issue: JWEBAUTHN-16Philip Smart
- Look into Silent AuthenticationJWEBAUTHN-15Philip Smart
- Support device-bound public key extensionsJWEBAUTHN-14Philip Smart
- Add option to disable signature count updatesJWEBAUTHN-13Resolved issue: JWEBAUTHN-13Philip Smart
- Add an access control predicate for guarding against username changesJWEBAUTHN-12Resolved issue: JWEBAUTHN-12Philip Smart
- Pull identity information from the AttributeResolver during registrationJWEBAUTHN-11Resolved issue: JWEBAUTHN-11Philip Smart
- Enhance error messaging from the WebAuthn APIJWEBAUTHN-10Philip Smart
- Support HTTP APIs for registering and managing user credentialsJWEBAUTHN-9Philip Smart
- Add an admin flow suitable for an sys admin to manage other users keysJWEBAUTHN-8Resolved issue: JWEBAUTHN-8Philip Smart
- Monitor and potentially implement the WebAuthn Report APIJWEBAUTHN-7Philip Smart
- Signal an end-state from the authentication flow if user has no registered credentialsJWEBAUTHN-6Resolved issue: JWEBAUTHN-6Philip Smart
- Add support for FIDO Alliance MetadataJWEBAUTHN-5Resolved issue: JWEBAUTHN-5Philip Smart
- Add CSP protection to viewsJWEBAUTHN-4Resolved issue: JWEBAUTHN-4Philip Smart
- Look into the Autofill UIJWEBAUTHN-3Philip Smart
- Add the WebAuthn plugin to JenkinsJWEBAUTHN-2Resolved issue: JWEBAUTHN-2Tom Zeller
- Map out authentication flowsJWEBAUTHN-1Resolved issue: JWEBAUTHN-1Philip Smart
50 of 50
Release 1.1.0
Completed
Basics
Logistics
Basics
Logistics
Description
Environment
None
Details
Assignee
Philip SmartPhilip SmartReporter
Philip SmartPhilip Smart
Details
Details
Assignee
Philip Smart
Philip SmartReporter
Philip Smart
Philip SmartCreated March 13, 2025 at 4:39 PM
Updated March 13, 2025 at 5:51 PM
Resolved March 13, 2025 at 5:51 PM
Activity
Show:
Philip SmartMarch 13, 2025 at 4:51 PM
Move to download:
cp -v /home/nexus/sonatype-work/nexus/storage/releases/net/shibboleth/idp/plugin/authn/idp-plugin-webauthn-dist/1.1.0/idp-plugin-webauthn-dist-1.1.0.tar.gz .
cp -v /home/nexus/sonatype-work/nexus/storage/releases/net/shibboleth/idp/plugin/authn/idp-plugin-webauthn-dist/1.1.0/idp-plugin-webauthn-dist-1.1.0.tar.gz.asc .
sha256sum idp-plugin-webauthn-dist-1.1.0.tar.gz > idp-plugin-webauthn-dist-1.1.0.tar.gz.sha256
sha256sum -c idp-plugin-webauthn-dist-1.1.0.tar.gz.sha256
sudo mkdir /home/shibwww/html/downloads/identity-provider/plugins/webauthn/1.1.0
sudo cp -v -p idp-plugin-webauthn-dist-1.1.0* /home/shibwww/html/downloads/identity-provider/plugins/webauthn/1.1.0/
sudo chown -R shibwww:shibwww /home/shibwww/html/downloads/identity-provider/plugins/webauthn/1.1.0/
sudo chmod -R g-w /home/shibwww/html/downloads/identity-provider/plugins/webauthn/1.1.0/
Philip SmartMarch 13, 2025 at 4:48 PM
Build and deploy Javadoc:
# Setup environment for the deploy script
export MAVEN=/opt/apache-maven-3.9.5/bin/mvn
export USERNAME=philsmart
export REPO=/tmp/philsrepo/
# checkout parent project to access the javadoc script
cd /tmp
git clone git@git.shibboleth.net:java-parent-project
# navigate back to the common
cd java-idp-plugin-webauthn/
git checkout 1.1.0
# make sure the container can reach the Nexus instances for the initial javadoc deployment
ssh -l philsmart -L 1581:127.0.0.1:1581 -N shibboleth.net -f
# run deploy script
../java-parent-project/bin/build-and-deploy-javadoc.sh
Philip SmartMarch 13, 2025 at 4:44 PM
Build and tag version:
#WebAuthn
export GPG_TTY=$(tty)
export REPO=/tmp/philsrepo
cd /tmp
git clone git@git.shibboleth.net:java-idp-plugin-webauthn
cd java-idp-plugin-webauthn/
git checkout main
#ensure plugin version is correct in
vi webauthn-impl/src/main/resources/net/shibboleth/idp/plugin/authn/webauthn/plugin.properties
#ensure the keys are correct
vi webauthn-dist/src/main/resources/bootstrap/keys.txt
## ## test release
mvn -Dmaven.repo.local=$REPO -Prelease clean verify
## Test enforcer
mvn -Dmaven.repo.local=$REPO -Prelease,sign clean install
## update to non snapshot
### Note, versions:set may not work if too new for the parent. So do manually if required.
mvn -Dmaven.repo.local=/tmp/versionset -DgenerateBackupPoms=false -DnewVersion=1.1.0 versions:set
vi pom.xml
## set SNAPSHOTS to RELEASE if needed
##check build
mvn -Dmaven.repo.local=$REPO -Prelease clean verify
## Test enforcer
mvn -Dmaven.repo.local=$REPO -Prelease,sign clean install
#Check no SNAPSHOT
find . -name 'pom.xml' -exec grep SNAPSHOT {} \;
## check git status and add
git status
git add -A
git commit -m 'Update files to be tagged for release'
git tag -s -m "Tag 1.1.0 release" 1.1.0
#set version back
mvn -Dmaven.repo.local=/tmp/versionset -DgenerateBackupPoms=false -DnewVersion=1.1.1-SNAPSHOT versions:set
git add -A
git commit -m 'Bump version after release'
## build version
git checkout 1.1.0
mvn -Dmaven.repo.local=$REPO -Prelease,sign clean verify
mvn -Dmaven.repo.local=$REPO -Prelease,sign clean install
#deploy
mvn -Dmaven.repo.local=$REPO -DskipTests -DdeployAtEnd=true -Prelease,sign deploy
#commit back
git checkout main
git push
git push origin 1.1.0
Verify/update plugin properties version
Build and tag version
Release nexus artifact
Build/deploy Javadoc
Move to downloads
Update plugin.properties
Update plugin status
Announce