2022-02-04

Shibboleth Developer's Meeting, 2022-02-04

Call Administrivia

09:00 Central US / 10:00 Eastern US / 15:00 UK / 17:00 FI

Calls are normally the 1st and 3rd Fridays of each month. Next call would be Friday 2022-02-18. Any reason to deviate from this?

60 to 90 minute call window.

Call Details

This week's call will use the Zoom system at GU, see ZoomGU for access info.

AGENDA

  1. https://shibboleth.atlassian.net/browse/JOIDC-11?focusedCommentId=32046

    1. Stumbled on a complex set of registration trade-offs after starting on encryption support.

    2. Related is whether we actually intend to support unverified profile configurations, which currently break due to assumptions that client metadata is present.

Attendees:

Brent

Daniel

  • Nothing to report.

 

Henri

Ian

 

John

  • Continuing to chip away, very slowly, at the spec churn required to add Amazon Linux 2022 support to cpp-linbuild

Marvin

 

Phil

 

Rod

  • GEN-308: Move maven up to latest versionClosed When do we want to move the lowest version?

  • Getting rid of internal shib-thirdparty repo / -P centralDisabled

    • All nightly build do a post build signature check of their local repository check except

      • XMLSecTool - This uses a more complex (better?) assembly which bring in more stuff. Under way.

      • IDWSFClient - can we pull this from the night build? (I have keys for it, but why add clutter) Also, it needs totally orphaned not-yet-commons jar

      • The depcheck projects

      • jetty94-dta-ssl-nightly, trustany-ssl-nightly disabled. What to do about this.

      • jetty-base - no nightly build, but the windows variant does have some checking

      • Anything else?

    • Need to make sure that versions:set doesn’t import anything else we don’t know about

      • Anything else being used during a build?

        • PS. site site:stage is used to build site and API docs, not sure if that needs or is part of verification (it passed fine for the last build). Unless a rogue plugin adds some malicious JS to the API docs.

    • My belief is that with the above bullets fixed/understood/waived we are good to go, Do we agree

  • Jetty-10 Windows. I’m going to wait until the jetty-base is stabilized and documented and then do the Windows stuff (noting the building the installer also has to change). This means that the current plan is to ship 4.2.0.0 with Jetty 9.4-44. I’m happy with that because we can slipstream out a 4.2.0.1 whenever we feel like it.

 

Scott

  • JOIDC-11: Support for client_credentials grantClosed

    • Finishing up introspection/revocation flows and tests

      • Both legacy and JWT tokens validated with new claims validators

      • Fixed signature verification to allow for non-JWK credentials

      • Added compliant client_id claim (fallback to legacy claim name used now)

      • Flows are usable (with proper authentication) by either the client_id or an audience of the token (original use cases addressed by the former)

    • TBD documentation and the encryption support plus RP config for whether to issue unencrypted tokens

  • IDP-1901: Bug with Java 17 due to WarningInterceptClosed

    • Looks like combination of Spring defect + Java HashMap implementation quirk

    • Hopefully Spring fix will limit future occurrences

    • Eclipse and testbed seem to run ok under 17

  • Jetty 10

    • Found undocumented but supported request log hook for sending to SLF4J, simplest way to get request logging via logback

    • We can ship it with either slf4j/logback 1.x or 2.x, our choice

Tom

  • Jetty 10 idp-jetty-base WIP

  • Java 17 + Jetty tests

  • Prep to take Nexus off the public internet

Other

Â