uruk-project / Jwt

JSON Web Token implementation for .Net & .Net Core
MIT License
84 stars 13 forks source link

Bump Microsoft.IdentityModel.JsonWebTokens from 5.5.0 to 5.6.0 #351

Closed dependabot-preview[bot] closed 4 years ago

dependabot-preview[bot] commented 4 years ago

Bumps Microsoft.IdentityModel.JsonWebTokens from 5.5.0 to 5.6.0.

Release notes *Sourced from [Microsoft.IdentityModel.JsonWebTokens's releases](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases).* > ## 5.6.0 > ## Features > * JWTs can now be created from both SecurityTokenDescriptor.Subject and SecurityTokenDescriptor.Claims ([#1193](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1193)). > * Added support for 'typ' header claim validation to JwtSecurityTokenHandler and JsonWebTokenHandler ([#1220](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1220)). > * Added support for creating unsigned JWTs in JsonWebTokenHandler ([#1204](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1204)). > * Added support for creating custom JWT header claims in JsonWebTokenHandler ([#1210](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1210)). > * Added support for creating a JWT with an empty payload in JsonWebTokenHandler ([#1237](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1237)). > * Added a setter for the AuthenticationProtocolMessage.Script property ([#1193](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1193)). > > ## Bug Fixes > * The OpenIdConnectConfiguration.SigningKeys property is no longer used during JSON serialization and deserialization ([#1242](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1242)). > * RSACryptoServiceProviderProxy now properly disposes an RSA instance ([#1240](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1240)). > * DtdProcessing.Prohibit is now explicitly set when creating an XmlReader ([#1258](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1258)). > * JsonWebTokenHandler.CreateToken() now adds iat, nbf, and exp as longs not strings ([#1207](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1207)). > * DateTime claim processing is now corrected and consistent ([#1261](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1261)). > * Various improvements to the documentation. > > Click [here](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues?utf8=%E2%9C%93&q=+is%3Aissue+milestone%3A5.6.0+) for a full list of issues that were fixed in this release.
Commits - [`2574f3c`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/2574f3cbc3736db085497b9b241ea5ae338357b9) Update version to 5.6.0 - [`6de2b3c`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/6de2b3cd06776d066c82e0a17a5e73b108064892) Fixed incorrect log message usage - [`cff3250`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/cff3250228d99c72b7257b22084945e80ccf443c) Added 'typ' header claim validation ([#1275](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1275)) - [`affefe0`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/affefe01f09a85094598640a1525f7fe8c8d628d) All DateTime properties are clearly marked as UTC ([#1279](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1279)) - [`38d5cb1`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/38d5cb190d073b07b8ad6c0a8e7e36bdd5498ddc) Added a setter for the AuthenticationProtocolMessage.Script property ([#1280](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1280)) - [`501095c`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/501095c3140f2406f3a62742f35d36ab0ca3d547) Fix DateTime claims processing ([#1281](https://github-redirect.dependabot.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1281)) - [`1dd82ed`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/1dd82ed627056e28bb427cb9620f183c6894cc6d) Added ShouldSerializeSigningKeys() method back (always returns false) - [`fd0dbdd`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/fd0dbdd7208d2c2c0cc7d222d5d6aeede176b160) Removed the ShouldSerializeSigningKeys() method - [`602d9f2`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/602d9f2c991a34c990a6b16d16686064910b50c1) OpenIdConnectConfiguration.SigningKeys property is no longer used during dese... - [`7487922`](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/commit/748792271d4eeac65c289b7be616c89a402c03f0) dispose RSA if a new one is created. - Additional commits viewable in [compare view](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/compare/5.5.0...5.6.0)


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.

Dependabot will not automatically merge this PR because it includes a minor update to a production dependency.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language - `@dependabot badge me` will comment on this PR with code to add a "Dependabot enabled" badge to your readme Additionally, you can set the following in your Dependabot [dashboard](https://app.dependabot.com): - Update frequency (including time of day and day of week) - Pull request limits (per update run and/or open at any time) - Automerge options (never/patch/minor, and dev/runtime dependencies) - Out-of-range updates (receive only lockfile updates, if desired) - Security updates (receive only security updates, if desired)