Skip to content

Releases: go-webauthn/webauthn

v0.11.2

25 Aug 13:08
33464f5
Compare
Choose a tag to compare

v0.11.2 (2024-08-25)

Bug Fixes

  • protocol: out of date tpm manufacturers (#283) (13ad30e)

v0.11.1

06 Aug 22:40
9ca2fae
Compare
Choose a tag to compare

v0.11.1 (2024-08-06)

Bug Fixes

v0.11.0

29 Jul 12:04
f8b9177
Compare
Choose a tag to compare

v0.11.0 (2024-07-29)

Features

BREAKING CHANGES

While I endeavor to avoid breaking changes some are necessary to support both better outcomes for implementers and fix issues which are not desirable. This release packs a quite a few, so it's important to take the time to read. While the details on adapting are not comprehensive, they should easy to understand and clarification will be added where it makes sense. Feel free to open a discussion if you're having issues migrating.

  • MAJOR: A majority of the functionality that exists within the metadata package has been completely reworked. The rework has added a number of great validation options for implementers as well as allowing them to more easily manage metadata blobs and the refresh of these blobs in their own domain logic. This will require substantial work for anyone currently using it. I will aim to make a discussion explaining all of it in the coming days.
  • The following fields and backwards compatible elements have been removed; Icon field from the CredentialEntity struct, WebAuthnIcon function from the User interface, RPIcon/RPOrigin/Timeout fields from the Config struct, Transports field from the CredentialCreationResponse (new field has existed in the AuthenticatorAttestationResponse struct for quite some time which matches the spec).
  • The Backup Eligible and Backup State flags within the CredentialFlags struct (field of the Credential struct) are now strictly validated to be consistent with the spec. This breaks implementations which do not strictly adhere to the specification. Several major providers either have or are currently "upgrading" existing WebAuthn credential records to BE and BS passkeys.
  • The default modality values are now empty by default. This allows additional browser flows to be accessible to implementers. This change will change default behavior. Previously the required resident key value was set to false, and the user verification option was set to 'preferred'. Implementers looking for consistent values should customize the Authenticator Selection Criteria during registration.

v0.10.2

13 Mar 23:30
b677691
Compare
Choose a tag to compare

v0.10.2 (2024-03-14)

Overview

This release just bumps dependencies to their latest versions.

v0.10.1

08 Feb 10:38
fbca431
Compare
Choose a tag to compare

v0.10.1 (2024-02-08)

Overview

This release just bumps dependencies to their latest versions.

v0.10.0

20 Dec 05:51
99b2e0d
Compare
Choose a tag to compare

v0.10.0 (2023-12-20)

Overview

In addition to the listed changes the golang.org/x/crypto package has been updated including the latest security fixes.

Features

  • credential struct tags for json serialization (#197) (99b2e0d), closes #193

Additional Information

Full Changelog: v0.9.4...v0.10.0

v0.9.4

02 Dec 01:21
d8da79f
Compare
Choose a tag to compare

v0.9.4 (2023-12-01)

Bug Fixes

Additional Information

Full Changelog: v0.9.3...v0.9.4

New Contributors

v0.9.3

01 Dec 21:35
5719110
Compare
Choose a tag to compare

v0.9.3 (2023-12-01)

Bug Fixes

Additional Information

Full Changelog: v0.9.2...v0.9.3

v0.9.2

28 Nov 22:08
d61fc8f
Compare
Choose a tag to compare

v0.9.2 (2023-11-28)

Bug Fixes

  • protocol: display name omitted incorrectly (a96556d)

Additional Information

Full Changelog: v0.9.1...v0.9.2

v0.9.1

18 Nov 22:06
115756f
Compare
Choose a tag to compare

0.9.1 (2023-11-18)

Bug Fixes

  • protocol: previous unmarshal functionality broken (#180) (68d2368)

Additional Information

Full Changelog: v0.9.0...v0.9.1