rota-slackbot
rota-slackbot copied to clipboard
Bump jsonwebtoken and @slack/oauth
Bumps jsonwebtoken and @slack/oauth. These dependencies needed to be updated together.
Updates jsonwebtoken
from 8.5.1 to 9.0.0
Changelog
Sourced from jsonwebtoken's changelog.
9.0.0 - 2022-12-21
Breaking changes: See Migration from v8 to v9
Breaking changes
- Removed support for Node versions 11 and below.
- The verify() function no longer accepts unsigned tokens by default. ([834503079514b72264fd13023a3b8d648afd6a16]https://github.com/auth0/node-jsonwebtoken/commit/834503079514b72264fd13023a3b8d648afd6a16)
- RSA key size must be 2048 bits or greater. ([ecdf6cc6073ea13a7e71df5fad043550f08d0fa6]https://github.com/auth0/node-jsonwebtoken/commit/ecdf6cc6073ea13a7e71df5fad043550f08d0fa6)
- Key types must be valid for the signing / verification algorithm
Security fixes
- security: fixes
Arbitrary File Write via verify function
- CVE-2022-23529- security: fixes
Insecure default algorithm in jwt.verify() could lead to signature validation bypass
- CVE-2022-23540- security: fixes
Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
- CVE-2022-23541- security: fixes
Unrestricted key type could lead to legacy keys usage
- CVE-2022-23539
Commits
e1fa9dc
Merge pull request from GHSA-8cf7-32gw-wr335eaedbf
chore(ci): remove github test actions job (#861)cd4163e
chore(ci): configure Github Actions jobs for Tests & Security Scanning (#856)ecdf6cc
fix!: Prevent accidental use of insecure key sizes & misconfiguration of secr...8345030
fix(sign&verify)!: Remove defaultnone
support fromsign
andverify
met...7e6a86b
Upload OpsLevel YAML (#849)74d5719
docs: update references vercel/ms references (#770)d71e383
docs: document "invalid token" error3765003
docs: fix spelling in README.md: Peak -> Peek (#754)a46097e
docs: make decode impossible to discover before verify- Additional commits viewable in compare view
Maintainer changes
This version was pushed to npm by julien.wollscheid, a new releaser for jsonwebtoken since your current version.
Updates @slack/oauth
from 2.0.1 to 2.6.0
Release notes
Sourced from @slack/oauth
's releases.
@slack/oauth
@2
.6.0What's Changed
Security
- Upgraded
jsonwebtoken
dependency for critical level security issues by@seratch
in slackapi/node-slack-sdk#1575- Fixed
auth.revoke
argument type definition by@Cattttttttt
in slackapi/node-slack-sdk#1562- Added support for
admin.conversations.bulk{Archive|Delete|Move}
API method, by@hello-ashleyintech
in slackapi/node-slack-sdk#1572Docs
- Update docs to include
files.uploadV2
by@srajiang
in slackapi/node-slack-sdk#1548- Update maintainer's guide to clarify release instructions by
@hello-ashleyintech
in slackapi/node-slack-sdk#1556New Contributors
@Cattttttttt
made their first contribution in slackapi/node-slack-sdk#1562 🎉, thank you!Full Changelog: https://github.com/slackapi/node-slack-sdk/compare/
@slack/web-api
@6.8.0...
@slack/oauth
@2.6.0
@slack/oauth
@2
.5.4
- Fix #1506:
handleInstallPath
throws an error whenstateVerification
isfalse
(via #1507) - thanks@rockingskier
!See the full list of issues/pull requests of this release here.
@slack/oauth
@2
.5.3
- Improve InstallationProvide logic not to save new data when token rotation is enabled plus the tokens are not refreshed (via #1497 ) - thanks
@omermizr
!See the full list of issues/pull requests of this release here.
@slack/oauth
@2
.5.2
- Fix a bug where additional cookies set by beforeRedirection are overwritten (via #1485 ) - thanks
@seratch
!See the full list of issues/pull requests of this release here.
@slack/oauth
@2
.5.1See the full list of issues/pull requests of this release here.
@slack/oauth
@2
.5.0Changes
- Fix #1435: Proper use of state parameter for the OAuth CSRF protection (via #1436) - thanks
@seratch
!- Fix #1439: Add built-in StateStore implementations using server-side database (via #1441) - thanks
@seratch
!- Fix #1438: Add more callbacks (
beforeRedirection
,before/afterInstallation
, async success/failure) inInstallProvider
(via #1442) - thanks@seratch
!- Re-organize the source files in the OAuth package (via #1430) - thanks
@seratch
!- Add error types to exposed ones from
@slack/oauth
(via #1431) - thanks@seratch
!- Update
FileInstallationStore
to behave more consistently (via #1437) - thanks@seratch
!- Fix eslint warnings and TODOs in OAuth module (via #1425) - thanks
@seratch
!- Rename sub directory for installation stores (via #1443) - thanks
@seratch
!- Add exported interface types that were missing in v2.5.0-rc1 release (via #1446) - thanks
@seratch
!
... (truncated)
Commits
0f57402
Publish547d239
Upgrade jsonwebtoken for critical level security issues (#1575)8fc8cc6
Fix issue #1566 Add admin.conversations.bulk{Archive|Delete|Move} API method ...f428ba0
Update the web-api response types using the latest source60879af
fix(web-api): fix auth.revoke argument type definition (#1562)5abfa5e
Update maintainer's guide to clarify release instructions (#1556)85bf475
Update docs to include files.uploadV2 (#1548)a196828
Publish@slack/web-api
@6
.8.0 (#1555)1f9df28
Publish@slack/types
@2
.8.0 (#1554)c635b77
ChatUnfurlArguments require eitherchannel
andts
orunfurl_id
and `sou...- Additional commits viewable in compare view
Maintainer changes
This version was pushed to npm by slackhq, a new releaser for @slack/oauth
since your current version.
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labels
will set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewers
will set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assignees
will set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestone
will set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.