Altinn / altinn-accesstoken

Client and server libraries for simple authorization of API calls
BSD 3-Clause "New" or "Revised" License
0 stars 1 forks source link

chore(deps): update nuget non-major dependencies #101

Closed renovate[bot] closed 4 months ago

renovate[bot] commented 4 months ago

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Azure.Identity (source) 1.11.4 -> 1.12.0 age adoption passing confidence
Microsoft.IdentityModel.Protocols.OpenIdConnect 7.6.0 -> 7.6.2 age adoption passing confidence

Release Notes

Azure/azure-sdk-for-net (Azure.Identity) ### [`v1.12.0`](https://togithub.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity_1.12.0) ##### 1.12.0 (2024-06-17) ##### Features Added - Added `AzurePipelinesCredential` for authenticating with Azure Pipelines service connections. - `OnBehalfOfCredential` now supports client assertion callbacks for acquiring tokens on behalf of a user. - All credentials now support setting RefreshOn value if received from MSAL. - ManagedIdentityCredential sets RefreshOn value of half the token lifetime for AccessTokens with an ExpiresOn value greater than 2 hours in the future. - `ClientAssertionCredentialOptions` now supports `TokenCachePersistenceOptions` for configuring token cache persistence.
AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet (Microsoft.IdentityModel.Protocols.OpenIdConnect) ### [`v7.6.2`](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases/tag/7.6.2) [Compare Source](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/compare/7.6.1...7.6.2) # 7.6.2 ##### Bug Fix: - Revert reduced allocations in `AadIssuerValidator` by not using `string.Replace` where appropriate due to an index out-of-range error. ### [`v7.6.1`](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/blob/HEAD/CHANGELOG.md#761) [Compare Source](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/compare/7.6.0...7.6.1) \===== ##### New Features: - Added an Audiences member to the SecurityTokenDescriptor to make it easier to define multiple audiences in JWT and SAML tokens. Addresses issue [#​1479](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1479) with PR [#​2575](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/2575) - Add missing metadata parameters to OpenIdConnectConfiguration. See issue [#​2498](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/2498) for details. ##### Bug Fixes: - Fix over-reporting of `IDX14100`. See issue [#​2058](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/2058) and PR [#​2618](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/2618) for details. - `JwtRegisteredClaimNames` now contains previously missing Standard OpenIdConnect claims. See issue [#​1598](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1598) for details. ##### Performance Improvements: - No longer for every string claim, calling DateTime.TryParse on each value, whether it is expected to be a DateTime or not. See issue [#​2615](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/2615) for details.

Configuration

📅 Schedule: Branch creation - "before 07:00 on Thursday" in timezone Europe/Oslo, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.



This PR has been generated by Mend Renovate. View repository job log here.

sonarcloud[bot] commented 4 months ago

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code

See analysis details on SonarCloud