Skip to content

Commit 48ad854

Browse files
committed
don't apply authz to the redirect URI; bump to 2.4.9.3
fixes ac56864 Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
1 parent 1ec4826 commit 48ad854

File tree

3 files changed

+14
-1
lines changed

3 files changed

+14
-1
lines changed

ChangeLog

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
08/26/2021
2+
- don't apply authz to the redirect URI; fixes ac5686495a51bc93e257e42bfdc9c9c46252feb1
3+
14
08/20/2021
25
- fix graceful restart (regression); see #458; thanks @Foxite
36
- bump to 2.4.9.2

configure.ac

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
AC_INIT([mod_auth_openidc],[2.4.9.2],[hans.zandbelt@zmartzone.eu])
1+
AC_INIT([mod_auth_openidc],[2.4.9.3],[hans.zandbelt@zmartzone.eu])
22

33
AC_SUBST(NAMEVER, AC_PACKAGE_TARNAME()-AC_PACKAGE_VERSION())
44

src/mod_auth_openidc.c

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4030,11 +4030,16 @@ authz_status oidc_authz_checker(request_rec *r, const char *require_args,
40304030

40314031
oidc_debug(r, "enter: require_args=\"%s\"", require_args);
40324032

4033+
oidc_cfg *c = ap_get_module_config(r->server->module_config,
4034+
&auth_openidc_module);
4035+
40334036
/* check for anonymous access and PASS mode */
40344037
if (r->user != NULL && strlen(r->user) == 0) {
40354038
r->user = NULL;
40364039
if (oidc_dir_cfg_unauth_action(r) == OIDC_UNAUTH_PASS)
40374040
return AUTHZ_GRANTED;
4041+
if (oidc_util_request_matches_url(r, oidc_get_redirect_uri(r, c)) == TRUE)
4042+
return AUTHZ_GRANTED;
40384043
}
40394044

40404045
/* get the set of claims from the request state (they've been set in the authentication part earlier */
@@ -4114,11 +4119,16 @@ static int oidc_handle_unauthorized_user22(request_rec *r) {
41144119
*/
41154120
int oidc_auth_checker(request_rec *r) {
41164121

4122+
oidc_cfg *c = ap_get_module_config(r->server->module_config,
4123+
&auth_openidc_module);
4124+
41174125
/* check for anonymous access and PASS mode */
41184126
if (r->user != NULL && strlen(r->user) == 0) {
41194127
r->user = NULL;
41204128
if (oidc_dir_cfg_unauth_action(r) == OIDC_UNAUTH_PASS)
41214129
return OK;
4130+
if (oidc_util_request_matches_url(r, oidc_get_redirect_uri(r, c)) == TRUE)
4131+
return OK;
41224132
}
41234133

41244134
/* get the set of claims from the request state (they've been set in the authentication part earlier */

0 commit comments

Comments
 (0)