Releases: privacybydesign/irmago
Releases · privacybydesign/irmago
v0.19.1
v0.19.0
Changed
- Remove legacy storage from irmaclient
- Add support for issuing SD-JWT VC together with Idemix over the IRMA protocol to
irmaclientandirmaserver- Irma servers can opt-in to SD-JWT VC issuance by configuring issuer certificates and private keys for SD-JWT VC
- SD-JWT VCs are issued in batches of which the size is specified in the issuance request
- SD-JWT VCs contain key binding public keys for which the private key is stored securely on the client
- These holder/key binding public keys are provided to the issuer's irma server by the client during the commitments POST request
- SD-JWT VC issuers are verified via certificates on the new Yivi trust lists, permissions are checked on the client via a custom json field in the certificates
- Old
Clientwas renamed toIrmaClientand was wrapped in newClientstruct together with newOpenID4VPClient
- Add support for disclosing SD-JWT VC credentials over the OpenID4VP 1.0 protocol to
irmaclient- Supports both
direct_postanddirect_post.jwtresponse modes - Supports DCQL queries for credentials that can be found in the schemes, specified by
vct_values - Supports
x509_san_dnsclient identifier prefix - Verifiers are trusted via x509 certificates on the new Yivi trust lists, attribute permissions are checked on the client via a custom json field in these certificates
- Supports both
Fix
- Solve issue that made log logo paths invalid on iOS after each update/recompilation
Security
- Fix for CVE GHSA-pv8v-c99h-c5q4 (Next session functionality can be used to do sessions on irma server without proper permissions)
v0.18.1
v0.18.0
Changed
-
Download schemes from
https://schemes.yivi.app/instead ofhttps://privacybydesign.foundation/schememanager/Note: if the scheme auto-update mechanism is enabled in your
irma server(enabled by default), please make sure outgoing
network traffic is allowed from yourirma serverto schemes.yivi.app (51.158.130.42) and privacybydesign.foundation (37.97.206.70)
v0.17.1
Changed
- Make keyshare pin challenge more resilient by retrying when
pin_challengeresponsefails due to a server conflict
Security
- Update github.com/golang-jwt/jwt/v4 from 4.5.1 to 4.5.2
v0.17.0
Added
- Option to generate and use scheme private keys encrypted with a passphrase
Changed
- Use golang version 1.23
- Make keyshare protocol more resilient by retrying when
getResponsefails due to a server conflict
Fixed
- Key ID not being set correctly in keyshare JWTs
- Infinite loop in SSE go-routine in sessions with pairing mode enabled
Security
- Update go toolchain to 1.23.5
- Update golang.org/x/crypto to 0.32.0
Internal
- Fix docker-compose not being available for test jobs in default GH Actions runner image
- Dev: make sure keyshare and myirmaserver don't crash when using example configuration
- Add arm64 docker build to delivery workflow
v0.16.0
Added
- Option to configure client mtls redis cert and key for
irma server,irma keyshare serverandirma keyshare myirmaserver
Security
- Update go toolchain to 1.22.5
- Update github.com/hashicorp/go-retryablehttp dependency from 0.7.1 to 0.7.7
Internal
- Phase out deprecated GitHub Actions packages
v0.15.2
v0.15.1
v0.15.0
Added
- Support for Redis in Sentinel mode
- Redis support for
irma keyshare serverandirma keyshare myirmaserver /healthendpoint forirma server,irma keyshare serverandirma keyshare myirmaserverRemoveRequestorSchemefunction inirmaclientto remove a requestor scheme from theirma_configurationdirectory
Changed
- Using optimistic locking in the
irma serverinstead of pessimistic locking storage-fallback-key-fileoption ofirma keyshare serverbeing replaced bystorage-fallback-keys-diroption
Fixed
- HTTP cookies not stored in
irmaclientwhen received from aSet-Cookieheader - Invalid hostname specified in MX record bypasses e-mail address revalidation
- Background revocation tasks not stopped when closing an
irmaclient RemoveSchemefunction inirmaclientnot deleting issuer schemes without a keyshare server (#260)
Internal
- Fixed issue with expired
irma-demo.MijnOverheidkey in testdata - Always use testdata of current branch for integration-test jobs in GitHub Actions workflow