Blogplace / Blogplace.Backend

GNU General Public License v3.0
5 stars 4 forks source link

Bump Microsoft.AspNetCore.Authentication.JwtBearer, Microsoft.IdentityModel.Tokens and System.IdentityModel.Tokens.Jwt #101

Open dependabot[bot] opened 2 weeks ago

dependabot[bot] commented 2 weeks ago

Bumps Microsoft.AspNetCore.Authentication.JwtBearer, Microsoft.IdentityModel.Tokens and System.IdentityModel.Tokens.Jwt. These dependencies needed to be updated together. Updates Microsoft.AspNetCore.Authentication.JwtBearer from 8.0.10 to 8.0.11

Release notes

Sourced from Microsoft.AspNetCore.Authentication.JwtBearer's releases.

.NET 8.0.11

Release

What's Changed

Full Changelog: https://github.com/dotnet/aspnetcore/compare/v8.0.10...v8.0.11

Commits


Updates Microsoft.IdentityModel.Tokens from 8.1.2 to 7.1.2

Changelog

Sourced from Microsoft.IdentityModel.Tokens's changelog.

8.1.2

Bug fixes

  • CaseSensitiveClaimsIdentity.Clone() now returns a CaseSensitiveClaimsIdentity as expected. See 2879
  • Multiple unused and unusable (for the moment) public APIs were removed. These were introduced by mistake leaking from the work done on logging and exception handling. See 2888. No major version changed needed as these APIs were not usable per se.

Fundamentals

  • Enabled PublicApiAnalyzers to better understand and trace changes to the public API. See2782

8.1.1

Bug fixes

  • Fix bug where ConfigurationManager was updating keys too frequently. See 2866 for details.

8.1.0

Performance improvements

  • Improves performance during issuer validation by replacing string comparison with span comparison. See PR #2826.

New features

  • Add optional check to prevent using keys that are shared across multiple clouds. See issue #2832 for details.

Bug fixes

  • JsonWebTokenHandler would only return unwrapped keys if there was no errors. This change is to align with the behavior in JwtSecurityTokenHandler, that is it returns the keys that were able to be unwrapped, and only throw if no keys were able to be unwrapped. See issue #2695 for details.

Fundamentals

  • Fix flaky tests. See #2793 for details.
  • Update XUnit versoin and fix test warnings due to new XUnit analyzers. See PR #2796 for details.
  • Onhboard to code coverage in ADO. See PR #2798.
  • Use IsTargetFrameworkCompatible(*) so AOT is forward-compatible with .NET 9 and beyond. See PR #2790 for details.
  • Fix a merge conflict impacting dev. See PR #2819.
  • Defining the following attribute in multiple assemblies (.Tokens, .Logging) causes an internal error. [DynamicallyAccessedMembers(DynamicallyAccessedMemberTypes.PublicConstructors)]. See PR #2820.
  • Remove perl dependency. See PR #2830.

Work related to redesign of IdentityModel's token validation logic #2711

8.0.2

... (truncated)

Commits
  • a607fa5 Merged PR 10669: update version to 7.1.2
  • 44021bb Merged PR 10664: Update dev branch from public GitHub dev
  • a22ab8e Merged PR 10603: Re-enable Jwt sub claim as either Number or String
  • 1966c05 fixup prefix
  • 97888a2 Merged PR 10258: Compatibility with 6x for bool claims (#2367)
  • 5c1ea4a Merged PR 10241: Update dev to fix the release build
  • ec25d19 reduced size for netcorestandard2.1 compression size is larger.
  • b16f758 Merged PR 10217: Disable test that set statics.
  • ceeff41 Merged PR 10199: Set MaximumDeflateSize
  • e986e22 Merged PR 10198: Don't resolve jku claim by default
  • Additional commits viewable in compare view


Updates System.IdentityModel.Tokens.Jwt from 8.1.2 to 7.1.2

Changelog

Sourced from System.IdentityModel.Tokens.Jwt's changelog.

8.1.2

Bug fixes

  • CaseSensitiveClaimsIdentity.Clone() now returns a CaseSensitiveClaimsIdentity as expected. See 2879
  • Multiple unused and unusable (for the moment) public APIs were removed. These were introduced by mistake leaking from the work done on logging and exception handling. See 2888. No major version changed needed as these APIs were not usable per se.

Fundamentals

  • Enabled PublicApiAnalyzers to better understand and trace changes to the public API. See2782

8.1.1

Bug fixes

  • Fix bug where ConfigurationManager was updating keys too frequently. See 2866 for details.

8.1.0

Performance improvements

  • Improves performance during issuer validation by replacing string comparison with span comparison. See PR #2826.

New features

  • Add optional check to prevent using keys that are shared across multiple clouds. See issue #2832 for details.

Bug fixes

  • JsonWebTokenHandler would only return unwrapped keys if there was no errors. This change is to align with the behavior in JwtSecurityTokenHandler, that is it returns the keys that were able to be unwrapped, and only throw if no keys were able to be unwrapped. See issue #2695 for details.

Fundamentals

  • Fix flaky tests. See #2793 for details.
  • Update XUnit versoin and fix test warnings due to new XUnit analyzers. See PR #2796 for details.
  • Onhboard to code coverage in ADO. See PR #2798.
  • Use IsTargetFrameworkCompatible(*) so AOT is forward-compatible with .NET 9 and beyond. See PR #2790 for details.
  • Fix a merge conflict impacting dev. See PR #2819.
  • Defining the following attribute in multiple assemblies (.Tokens, .Logging) causes an internal error. [DynamicallyAccessedMembers(DynamicallyAccessedMemberTypes.PublicConstructors)]. See PR #2820.
  • Remove perl dependency. See PR #2830.

Work related to redesign of IdentityModel's token validation logic #2711

8.0.2

... (truncated)

Commits
  • a607fa5 Merged PR 10669: update version to 7.1.2
  • 44021bb Merged PR 10664: Update dev branch from public GitHub dev
  • a22ab8e Merged PR 10603: Re-enable Jwt sub claim as either Number or String
  • 1966c05 fixup prefix
  • 97888a2 Merged PR 10258: Compatibility with 6x for bool claims (#2367)
  • 5c1ea4a Merged PR 10241: Update dev to fix the release build
  • ec25d19 reduced size for netcorestandard2.1 compression size is larger.
  • b16f758 Merged PR 10217: Disable test that set statics.
  • ceeff41 Merged PR 10199: Set MaximumDeflateSize
  • e986e22 Merged PR 10198: Don't resolve jku claim by default
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)