Chore(deps): Bump jjwt.suite.version from 0.12.3 to 0.12.5
Bumps jjwt.suite.version from 0.12.3 to 0.12.5.
Updates io.jsonwebtoken:jjwt-api from 0.12.3 to 0.12.5
Release notes
Sourced from io.jsonwebtoken:jjwt-api's releases.
0.12.5
This release fixes issue #916 and ensures that builders'
NestedCollectionchanges are applied to the collection immediately as mutation methods are called, no longer requiring application developers to call.and()to 'commit' or apply a change. For example, prior to this release, the following code did not apply changes:JwtBuilder builder = Jwts.builder(); builder.audience().add("an-audience"); // no .and() call builder.compact(); // would not keep 'an-audience'Now this code works as expected and all other
NestedCollectioninstances like it apply changes immediately (e.g. when calling.add(value)).However, standard fluent builder chains are still recommended for readability when feasible, e.g.
Jwts.builder() .audience().add("an-audience").and() // allows fluent chaining .subject("Joe") // etc... .compact()These same notes are repeated in the CHANGELOG, and as always, project documentation is in the README.
Please allow 30 minutes from the time this announcement is published for the release to be available in Maven Central.
0.12.4
This is patch release completes 10 issues, with two especially noteworthy changes, and a number of other smaller bug fixes and enhancements.
- The default Jackson deserializer will now reject duplicate JSON members by default in an attempt to be a little more strict at rejecting potentially malicious or malformed JSON. This is a default and can be overridden with a custom
ObjectMapperif desired.- Password-based JWE encryption key algorithms (
PBES2_HS256_A128KW,PBES2_HS384_A192KWandPBES2_HS512_A256KW) now enforce an upper bound (maximum) number of iterations allowed during decryption to mitigate against potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen from Sichuan University and Zhongguancun Lab for their work on this!A number of other issues fixed: thread-safe
ServiceLoaderusage for dynamic JSON processor lookup, Android enhancements for JSONReaderAPIs, fixed Elliptic Curve field element padding, and more. Please read the 0.12.4 CHANGELOG for full details of all of these changes, and as always, project documentation is in the 0.12.4 README.Please allow 30 minutes from the time this announcement is published for the release to be available in Maven Central.
Changelog
Sourced from io.jsonwebtoken:jjwt-api's changelog.
0.12.5
This patch release:
Ensures that builders'
NestedCollectionchanges are applied to the collection immediately as mutation methods are called, no longer requiring application developers to call.and()to 'commit' or apply a change. For example, prior to this release, the following code did not apply changes:JwtBuilder builder = Jwts.builder(); builder.audience().add("an-audience"); // no .and() call builder.compact(); // would not keep 'an-audience'Now this code works as expected and all other
NestedCollectioninstances like it apply changes immediately (e.g. when calling.add(value)).However, standard fluent builder chains are still recommended for readability when feasible, e.g.
Jwts.builder() .audience().add("an-audience").and() // allows fluent chaining .subject("Joe") // etc... .compact()See Issue 916.
0.12.4
This patch release includes various changes listed below.
Jackson Default Parsing Behavior
This release makes two behavioral changes to JJWT's default Jackson
ObjectMapperparsing settings:
In the interest of having stronger standards to reject potentially malformed/malicious/accidental JSON that could have undesirable effects on an application, JJWT's default
ObjectMapperis now configured to explicitly reject/fail parsing JSON (JWT headers and/or Claims) if/when that JSON contains duplicate JSON member names.For example, now the following JSON, if parsed, would fail (be rejected) by default:
{ "hello": "world", "thisWillFail": 42, "thisWillFail": "test" }Technically, the JWT RFCs do allow duplicate named fields as long as the last parsed member is the one used (see JWS RFC 7515, Section 4), so this is allowed. However, because JWTs often reflect security concepts, it's usually better to be defensive and reject these
... (truncated)
Commits
2399e2f[maven-release-plugin] prepare release 0.12.58d3de65Preparing for 0.12.5 releasea0a123ePR #917afcd8890.12.4 staging (#913)dd10b12Added JWK Set documentation to README.mdJwkset doc (#912)6335381PBES2 decryption maximum iterations (#911)2884eb7- Updating to GitHub latest actions/checkout and actions/setup-java script ve...628bd6fSecret JWKkvalues larger than HMAC-SHA minimums (#909)b12dabfFix small typos (#908)26f5dc3Updating changelog with more information/clarity for the 0.12.4 release (#907)- Additional commits viewable in compare view
Updates io.jsonwebtoken:jjwt-impl from 0.12.3 to 0.12.5
Release notes
Sourced from io.jsonwebtoken:jjwt-impl's releases.
0.12.5
This release fixes issue #916 and ensures that builders'
NestedCollectionchanges are applied to the collection immediately as mutation methods are called, no longer requiring application developers to call.and()to 'commit' or apply a change. For example, prior to this release, the following code did not apply changes:JwtBuilder builder = Jwts.builder(); builder.audience().add("an-audience"); // no .and() call builder.compact(); // would not keep 'an-audience'Now this code works as expected and all other
NestedCollectioninstances like it apply changes immediately (e.g. when calling.add(value)).However, standard fluent builder chains are still recommended for readability when feasible, e.g.
Jwts.builder() .audience().add("an-audience").and() // allows fluent chaining .subject("Joe") // etc... .compact()These same notes are repeated in the CHANGELOG, and as always, project documentation is in the README.
Please allow 30 minutes from the time this announcement is published for the release to be available in Maven Central.
0.12.4
This is patch release completes 10 issues, with two especially noteworthy changes, and a number of other smaller bug fixes and enhancements.
- The default Jackson deserializer will now reject duplicate JSON members by default in an attempt to be a little more strict at rejecting potentially malicious or malformed JSON. This is a default and can be overridden with a custom
ObjectMapperif desired.- Password-based JWE encryption key algorithms (
PBES2_HS256_A128KW,PBES2_HS384_A192KWandPBES2_HS512_A256KW) now enforce an upper bound (maximum) number of iterations allowed during decryption to mitigate against potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen from Sichuan University and Zhongguancun Lab for their work on this!A number of other issues fixed: thread-safe
ServiceLoaderusage for dynamic JSON processor lookup, Android enhancements for JSONReaderAPIs, fixed Elliptic Curve field element padding, and more. Please read the 0.12.4 CHANGELOG for full details of all of these changes, and as always, project documentation is in the 0.12.4 README.Please allow 30 minutes from the time this announcement is published for the release to be available in Maven Central.
Changelog
Sourced from io.jsonwebtoken:jjwt-impl's changelog.
0.12.5
This patch release:
Ensures that builders'
NestedCollectionchanges are applied to the collection immediately as mutation methods are called, no longer requiring application developers to call.and()to 'commit' or apply a change. For example, prior to this release, the following code did not apply changes:JwtBuilder builder = Jwts.builder(); builder.audience().add("an-audience"); // no .and() call builder.compact(); // would not keep 'an-audience'Now this code works as expected and all other
NestedCollectioninstances like it apply changes immediately (e.g. when calling.add(value)).However, standard fluent builder chains are still recommended for readability when feasible, e.g.
Jwts.builder() .audience().add("an-audience").and() // allows fluent chaining .subject("Joe") // etc... .compact()See Issue 916.
0.12.4
This patch release includes various changes listed below.
Jackson Default Parsing Behavior
This release makes two behavioral changes to JJWT's default Jackson
ObjectMapperparsing settings:
In the interest of having stronger standards to reject potentially malformed/malicious/accidental JSON that could have undesirable effects on an application, JJWT's default
ObjectMapperis now configured to explicitly reject/fail parsing JSON (JWT headers and/or Claims) if/when that JSON contains duplicate JSON member names.For example, now the following JSON, if parsed, would fail (be rejected) by default:
{ "hello": "world", "thisWillFail": 42, "thisWillFail": "test" }Technically, the JWT RFCs do allow duplicate named fields as long as the last parsed member is the one used (see JWS RFC 7515, Section 4), so this is allowed. However, because JWTs often reflect security concepts, it's usually better to be defensive and reject these
... (truncated)
Commits
2399e2f[maven-release-plugin] prepare release 0.12.58d3de65Preparing for 0.12.5 releasea0a123ePR #917afcd8890.12.4 staging (#913)dd10b12Added JWK Set documentation to README.mdJwkset doc (#912)6335381PBES2 decryption maximum iterations (#911)2884eb7- Updating to GitHub latest actions/checkout and actions/setup-java script ve...628bd6fSecret JWKkvalues larger than HMAC-SHA minimums (#909)b12dabfFix small typos (#908)26f5dc3Updating changelog with more information/clarity for the 0.12.4 release (#907)- Additional commits viewable in compare view
Updates io.jsonwebtoken:jjwt-jackson from 0.12.3 to 0.12.5
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)