diff --git a/ChangeLog b/ChangeLog index ee9c7914..4d27a1f2 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,7 @@ +09/11/2024 +- change warnings about not passing unknown claim types into debug messages; see #1263; thanks @nclarkau +- bump to 2.4.16.4rc1 + 09/09/2024 - fix accepting custom cookie names in OIDCOAuthAcceptTokenAs cookie:; see #1261; thanks @bbartke - bump to 2.4.16.4rc0 diff --git a/configure.ac b/configure.ac index 1079fb84..8a824d89 100644 --- a/configure.ac +++ b/configure.ac @@ -1,4 +1,4 @@ -AC_INIT([mod_auth_openidc],[2.4.16.4rc0],[hans.zandbelt@openidc.com]) +AC_INIT([mod_auth_openidc],[2.4.16.4rc1],[hans.zandbelt@openidc.com]) AC_SUBST(NAMEVER, AC_PACKAGE_TARNAME()-AC_PACKAGE_VERSION()) diff --git a/src/util.c b/src/util.c index fee3c648..1cdc43ee 100644 --- a/src/util.c +++ b/src/util.c @@ -1622,10 +1622,10 @@ void oidc_util_set_app_infos(request_rec *r, json_t *j_attrs, const char *claim_ } else { /* don't know how to handle a non-string array element */ - oidc_warn(r, - "unhandled in-array JSON object type [%d] for key \"%s\" when " - "parsing claims array elements", - elem->type, s_key); + oidc_debug(r, + "unhandled in-array JSON object type [%d] for key \"%s\" when " + "parsing claims array elements", + elem->type, s_key); } } @@ -1635,8 +1635,8 @@ void oidc_util_set_app_infos(request_rec *r, json_t *j_attrs, const char *claim_ } else { /* no string and no array, so unclear how to handle this */ - oidc_warn(r, "unhandled JSON object type [%d] for key \"%s\" when parsing claims", - j_value->type, s_key); + oidc_debug(r, "unhandled JSON object type [%d] for key \"%s\" when parsing claims", + j_value->type, s_key); } iter = json_object_iter_next(j_attrs, iter);