Skip to content

Conversation

@mastermatt
Copy link
Contributor

This is a copy of the changes in #575, with the addition of test updates.

@mastermatt
Copy link
Contributor Author

@tngan @ahacker1-securesaml I've updated tests for this small change.
I would really appreciate it if we could get this out as a patch.

Copy link
Contributor

@ahacker1-securesaml ahacker1-securesaml left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good to me. as a note, users should not use samlContent for any securit purposes or use it for authentication details. it should be used for purely debugging purposes

@ahacker1-securesaml
Copy link
Contributor

I am not the maintainer of this library. But I messaged him on slack to take a look.

You should look at sponsoring the library, https://github.com/sponsors/tngan
the maintainer has provided you a fast track to meet enterprise requirements. this library directly contributes to the companies security and revenue

ahacker1-securesaml referenced this pull request Oct 7, 2025
* Refactor to support encrypted assertions
- Update CHANGELOG.md

* Refactor: move authenio to devDependencies

* Upgrade xml-crypto to 6.1.2

* Fix: CHANGELOG.md
@mastermatt
Copy link
Contributor Author

Hey @tngan could I bump you on this? I'm hoping to get a patch published. Let me know if I can help in anyway.

@ryanhos
Copy link

ryanhos commented Nov 13, 2025

@tngan I have some discretionary sponsorship funds available for a one-time contribution. Any chance you have time to get eyes on this soon?

Passing a value that was parsed and re-stringified can mess up whitespace encodings.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants