dependabot[bot] opened a new pull request, #4896:
URL: https://github.com/apache/eventmesh/pull/4896

   Bumps `jwtVersion` from 0.11.1 to 0.12.5.
   Updates `io.jsonwebtoken:jjwt-api` from 0.11.1 to 0.12.5
   <details>
   <summary>Release notes</summary>
   <p><em>Sourced from <a 
href="https://github.com/jwtk/jjwt/releases";>io.jsonwebtoken:jjwt-api's 
releases</a>.</em></p>
   <blockquote>
   <h2>0.12.5</h2>
   <p>This release fixes issue <a 
href="https://redirect.github.com/jwtk/jjwt/issues/916";>#916</a> and ensures 
that builders' <code>NestedCollection</code> changes are applied to the 
collection immediately as mutation methods are called, no longer requiring 
application developers to call <code>.and()</code> to 'commit' or apply a 
change.  For example, prior to this release, the following code did not apply 
changes:</p>
   <pre lang="java"><code>JwtBuilder builder = Jwts.builder();
   builder.audience().add(&quot;an-audience&quot;); // no .and() call
   builder.compact(); // would not keep 'an-audience'
   </code></pre>
   <p>Now this code works as expected and all other 
<code>NestedCollection</code> instances like it apply changes immediately (e.g. 
when calling
   <code>.add(value)</code>).</p>
   <p>However, standard fluent builder chains are still recommended for 
readability when feasible, e.g.</p>
   <pre lang="java"><code>Jwts.builder()
       .audience().add(&quot;an-audience&quot;).and() // allows fluent chaining
       .subject(&quot;Joe&quot;)
       // etc...
       .compact()
   </code></pre>
   <p>These same notes are repeated in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.5/CHANGELOG.md";>CHANGELOG</a>, and 
as always, project documentation is in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.5/README.md";>README</a>.</p>
   <p>Please allow 30 minutes from the time this announcement is published for 
the release to be available in Maven Central.</p>
   <h2>0.12.4</h2>
   <p>This is patch release completes <a 
href="https://github.com/jwtk/jjwt/issues?q=milestone%3A0.12.4+is%3Aissue";>10 
issues</a>, with two especially noteworthy changes, and a number of other 
smaller bug fixes and enhancements.</p>
   <ol>
   <li>The default Jackson deserializer will now reject duplicate JSON members 
by default in an attempt to be a little more strict at rejecting potentially 
malicious or malformed JSON.  This is a default and can be overridden with a 
custom <code>ObjectMapper</code> if desired.</li>
   <li>Password-based JWE encryption key algorithms 
(<code>PBES2_HS256_A128KW</code>, <code>PBES2_HS384_A192KW</code> and 
<code>PBES2_HS512_A256KW</code>) now enforce an upper bound (maximum) number of 
iterations allowed during decryption to mitigate against potential DoS attacks. 
Many thanks to Jingcheng Yang and Jianjun Chen from Sichuan University and 
Zhongguancun Lab for their work on this!</li>
   </ol>
   <p>A number of other issues fixed: thread-safe <code>ServiceLoader</code> 
usage for dynamic JSON processor lookup, Android enhancements for JSON 
<code>Reader</code> APIs, fixed Elliptic Curve field element padding, and more. 
 Please read the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.4/CHANGELOG.md";>0.12.4 
CHANGELOG</a> for full details of all of these changes, and as always, project 
documentation is in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.4/README.md";>0.12.4 README</a>.</p>
   <p>Please allow 30 minutes from the time this announcement is published for 
the release to be available in Maven Central.</p>
   <h2>0.12.3</h2>
   <p>This is a minor patch release that address two issues:</p>
   <ol>
   <li>
   <p>The <code>org.json</code> dependency has been upgraded to 
<code>20231013</code> to address that library's
   <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5072";>CVE-2023-5072</a> 
vulnerability.</p>
   </li>
   <li>
   <p>Empty custom claims values are (re-)enabled which was the behavior in 
&lt;= 0.11.5. See <a 
href="https://redirect.github.com/jwtk/jjwt/issues/858";>Issue 858</a>.</p>
   </li>
   </ol>
   <p>These same notes are repeated in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.3/CHANGELOG.md";>CHANGELOG</a>, and 
as always, project documentation is in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.3/README.md";>README</a>.</p>
   <p>Please allow 30 minutes from the time this announcement is published for 
the release to be available in Maven Central.</p>
   <h2>0.12.2</h2>
   <p>This is a follow-up release to finalize the work in <code>0.12.1</code> 
that tried to fix a reflection scope problem
   on &gt;= JDK 17.  The 0.12.1 fix worked, but only if the importing project 
or application did <em>not</em> have its own
   <code>module-info.java</code> file.</p>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a 
href="https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md";>io.jsonwebtoken:jjwt-api's
 changelog</a>.</em></p>
   <blockquote>
   <h3>0.12.5</h3>
   <p>This patch release:</p>
   <ul>
   <li>
   <p>Ensures that builders' <code>NestedCollection</code> changes are applied 
to the collection immediately as mutation methods are called, no longer
   requiring application developers to call <code>.and()</code> to 'commit' or 
apply a change.  For example, prior to this release,
   the following code did not apply changes:</p>
   <pre lang="java"><code>JwtBuilder builder = Jwts.builder();
   builder.audience().add(&quot;an-audience&quot;); // no .and() call
   builder.compact(); // would not keep 'an-audience'
   </code></pre>
   <p>Now this code works as expected and all other 
<code>NestedCollection</code> instances like it apply changes immediately (e.g. 
when calling
   <code>.add(value)</code>).</p>
   <p>However, standard fluent builder chains are still recommended for 
readability when feasible, e.g.</p>
   <pre lang="java"><code>Jwts.builder()
       .audience().add(&quot;an-audience&quot;).and() // allows fluent chaining
       .subject(&quot;Joe&quot;)
       // etc...
       .compact()
   </code></pre>
   <p>See <a href="https://redirect.github.com/jwtk/jjwt/issues/916";>Issue 
916</a>.</p>
   </li>
   </ul>
   <h3>0.12.4</h3>
   <p>This patch release includes various changes listed below.</p>
   <h4>Jackson Default Parsing Behavior</h4>
   <p>This release makes two behavioral changes to JJWT's default Jackson 
<code>ObjectMapper</code> parsing settings:</p>
   <ol>
   <li>
   <p>In the interest of having stronger standards to reject potentially 
malformed/malicious/accidental JSON that could
   have undesirable effects on an application, JJWT's default 
<code>ObjectMapper </code>is now configured to explicitly reject/fail
   parsing JSON (JWT headers and/or Claims) if/when that JSON contains 
duplicate JSON member names.</p>
   <p>For example, now the following JSON, if parsed, would fail (be rejected) 
by default:</p>
   <pre lang="json"><code>{
     &quot;hello&quot;: &quot;world&quot;,
     &quot;thisWillFail&quot;: 42,
     &quot;thisWillFail&quot;: &quot;test&quot;
   }
   </code></pre>
   <p>Technically, the JWT RFCs <em>do allow</em> duplicate named fields as 
long as the last parsed member is the one used
   (see <a href="https://datatracker.ietf.org/doc/html/rfc7515#section-4";>JWS 
RFC 7515, Section 4</a>), so this is allowed.
   However, because JWTs often reflect security concepts, it's usually better 
to be defensive and reject these</p>
   </li>
   </ol>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/2399e2fdc5e20fad9d71d6bcbfd126cce6521638";><code>2399e2f</code></a>
 [maven-release-plugin] prepare release 0.12.5</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/8d3de658357b351587df3790b3b1372944ad1f2f";><code>8d3de65</code></a>
 Preparing for 0.12.5 release</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/a0a123e848fc25a7920bcbd84615f639c4cc098a";><code>a0a123e</code></a>
 PR <a href="https://redirect.github.com/jwtk/jjwt/issues/917";>#917</a></li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/afcd88983252b249204d53830dd03884050b41af";><code>afcd889</code></a>
 0.12.4 staging (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/913";>#913</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/dd10b12b53b5bb26299c5435aa9d193e71b6b918";><code>dd10b12</code></a>
 Added JWK Set documentation to README.mdJwkset doc (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/912";>#912</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/6335381c978ce83c9c15bd3c349f32d1bed72d4f";><code>6335381</code></a>
 PBES2 decryption maximum iterations (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/911";>#911</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/2884eb79529ec8b56ecdd7c9f7e7fbea5dfc4806";><code>2884eb7</code></a>
 - Updating to GitHub latest actions/checkout and actions/setup-java script 
ve...</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/628bd6f4e8b885be2f9cfbd8cbf0767ce616003a";><code>628bd6f</code></a>
 Secret JWK <code>k</code> values larger than HMAC-SHA minimums (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/909";>#909</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/b12dabf100bbe8749d9bce49628d70b9f73af729";><code>b12dabf</code></a>
 Fix small typos (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/908";>#908</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/26f5dc3dbbb6070735498e4ea497f174b0a3850f";><code>26f5dc3</code></a>
 Updating changelog with more information/clarity for the 0.12.4 release (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/907";>#907</a>)</li>
   <li>Additional commits viewable in <a 
href="https://github.com/jwtk/jjwt/compare/0.11.1...0.12.5";>compare 
view</a></li>
   </ul>
   </details>
   <br />
   
   Updates `io.jsonwebtoken:jjwt-impl` from 0.11.1 to 0.12.5
   <details>
   <summary>Release notes</summary>
   <p><em>Sourced from <a 
href="https://github.com/jwtk/jjwt/releases";>io.jsonwebtoken:jjwt-impl's 
releases</a>.</em></p>
   <blockquote>
   <h2>0.12.5</h2>
   <p>This release fixes issue <a 
href="https://redirect.github.com/jwtk/jjwt/issues/916";>#916</a> and ensures 
that builders' <code>NestedCollection</code> changes are applied to the 
collection immediately as mutation methods are called, no longer requiring 
application developers to call <code>.and()</code> to 'commit' or apply a 
change.  For example, prior to this release, the following code did not apply 
changes:</p>
   <pre lang="java"><code>JwtBuilder builder = Jwts.builder();
   builder.audience().add(&quot;an-audience&quot;); // no .and() call
   builder.compact(); // would not keep 'an-audience'
   </code></pre>
   <p>Now this code works as expected and all other 
<code>NestedCollection</code> instances like it apply changes immediately (e.g. 
when calling
   <code>.add(value)</code>).</p>
   <p>However, standard fluent builder chains are still recommended for 
readability when feasible, e.g.</p>
   <pre lang="java"><code>Jwts.builder()
       .audience().add(&quot;an-audience&quot;).and() // allows fluent chaining
       .subject(&quot;Joe&quot;)
       // etc...
       .compact()
   </code></pre>
   <p>These same notes are repeated in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.5/CHANGELOG.md";>CHANGELOG</a>, and 
as always, project documentation is in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.5/README.md";>README</a>.</p>
   <p>Please allow 30 minutes from the time this announcement is published for 
the release to be available in Maven Central.</p>
   <h2>0.12.4</h2>
   <p>This is patch release completes <a 
href="https://github.com/jwtk/jjwt/issues?q=milestone%3A0.12.4+is%3Aissue";>10 
issues</a>, with two especially noteworthy changes, and a number of other 
smaller bug fixes and enhancements.</p>
   <ol>
   <li>The default Jackson deserializer will now reject duplicate JSON members 
by default in an attempt to be a little more strict at rejecting potentially 
malicious or malformed JSON.  This is a default and can be overridden with a 
custom <code>ObjectMapper</code> if desired.</li>
   <li>Password-based JWE encryption key algorithms 
(<code>PBES2_HS256_A128KW</code>, <code>PBES2_HS384_A192KW</code> and 
<code>PBES2_HS512_A256KW</code>) now enforce an upper bound (maximum) number of 
iterations allowed during decryption to mitigate against potential DoS attacks. 
Many thanks to Jingcheng Yang and Jianjun Chen from Sichuan University and 
Zhongguancun Lab for their work on this!</li>
   </ol>
   <p>A number of other issues fixed: thread-safe <code>ServiceLoader</code> 
usage for dynamic JSON processor lookup, Android enhancements for JSON 
<code>Reader</code> APIs, fixed Elliptic Curve field element padding, and more. 
 Please read the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.4/CHANGELOG.md";>0.12.4 
CHANGELOG</a> for full details of all of these changes, and as always, project 
documentation is in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.4/README.md";>0.12.4 README</a>.</p>
   <p>Please allow 30 minutes from the time this announcement is published for 
the release to be available in Maven Central.</p>
   <h2>0.12.3</h2>
   <p>This is a minor patch release that address two issues:</p>
   <ol>
   <li>
   <p>The <code>org.json</code> dependency has been upgraded to 
<code>20231013</code> to address that library's
   <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5072";>CVE-2023-5072</a> 
vulnerability.</p>
   </li>
   <li>
   <p>Empty custom claims values are (re-)enabled which was the behavior in 
&lt;= 0.11.5. See <a 
href="https://redirect.github.com/jwtk/jjwt/issues/858";>Issue 858</a>.</p>
   </li>
   </ol>
   <p>These same notes are repeated in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.3/CHANGELOG.md";>CHANGELOG</a>, and 
as always, project documentation is in the <a 
href="https://github.com/jwtk/jjwt/blob/0.12.3/README.md";>README</a>.</p>
   <p>Please allow 30 minutes from the time this announcement is published for 
the release to be available in Maven Central.</p>
   <h2>0.12.2</h2>
   <p>This is a follow-up release to finalize the work in <code>0.12.1</code> 
that tried to fix a reflection scope problem
   on &gt;= JDK 17.  The 0.12.1 fix worked, but only if the importing project 
or application did <em>not</em> have its own
   <code>module-info.java</code> file.</p>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a 
href="https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md";>io.jsonwebtoken:jjwt-impl's
 changelog</a>.</em></p>
   <blockquote>
   <h3>0.12.5</h3>
   <p>This patch release:</p>
   <ul>
   <li>
   <p>Ensures that builders' <code>NestedCollection</code> changes are applied 
to the collection immediately as mutation methods are called, no longer
   requiring application developers to call <code>.and()</code> to 'commit' or 
apply a change.  For example, prior to this release,
   the following code did not apply changes:</p>
   <pre lang="java"><code>JwtBuilder builder = Jwts.builder();
   builder.audience().add(&quot;an-audience&quot;); // no .and() call
   builder.compact(); // would not keep 'an-audience'
   </code></pre>
   <p>Now this code works as expected and all other 
<code>NestedCollection</code> instances like it apply changes immediately (e.g. 
when calling
   <code>.add(value)</code>).</p>
   <p>However, standard fluent builder chains are still recommended for 
readability when feasible, e.g.</p>
   <pre lang="java"><code>Jwts.builder()
       .audience().add(&quot;an-audience&quot;).and() // allows fluent chaining
       .subject(&quot;Joe&quot;)
       // etc...
       .compact()
   </code></pre>
   <p>See <a href="https://redirect.github.com/jwtk/jjwt/issues/916";>Issue 
916</a>.</p>
   </li>
   </ul>
   <h3>0.12.4</h3>
   <p>This patch release includes various changes listed below.</p>
   <h4>Jackson Default Parsing Behavior</h4>
   <p>This release makes two behavioral changes to JJWT's default Jackson 
<code>ObjectMapper</code> parsing settings:</p>
   <ol>
   <li>
   <p>In the interest of having stronger standards to reject potentially 
malformed/malicious/accidental JSON that could
   have undesirable effects on an application, JJWT's default 
<code>ObjectMapper </code>is now configured to explicitly reject/fail
   parsing JSON (JWT headers and/or Claims) if/when that JSON contains 
duplicate JSON member names.</p>
   <p>For example, now the following JSON, if parsed, would fail (be rejected) 
by default:</p>
   <pre lang="json"><code>{
     &quot;hello&quot;: &quot;world&quot;,
     &quot;thisWillFail&quot;: 42,
     &quot;thisWillFail&quot;: &quot;test&quot;
   }
   </code></pre>
   <p>Technically, the JWT RFCs <em>do allow</em> duplicate named fields as 
long as the last parsed member is the one used
   (see <a href="https://datatracker.ietf.org/doc/html/rfc7515#section-4";>JWS 
RFC 7515, Section 4</a>), so this is allowed.
   However, because JWTs often reflect security concepts, it's usually better 
to be defensive and reject these</p>
   </li>
   </ol>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/2399e2fdc5e20fad9d71d6bcbfd126cce6521638";><code>2399e2f</code></a>
 [maven-release-plugin] prepare release 0.12.5</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/8d3de658357b351587df3790b3b1372944ad1f2f";><code>8d3de65</code></a>
 Preparing for 0.12.5 release</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/a0a123e848fc25a7920bcbd84615f639c4cc098a";><code>a0a123e</code></a>
 PR <a href="https://redirect.github.com/jwtk/jjwt/issues/917";>#917</a></li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/afcd88983252b249204d53830dd03884050b41af";><code>afcd889</code></a>
 0.12.4 staging (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/913";>#913</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/dd10b12b53b5bb26299c5435aa9d193e71b6b918";><code>dd10b12</code></a>
 Added JWK Set documentation to README.mdJwkset doc (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/912";>#912</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/6335381c978ce83c9c15bd3c349f32d1bed72d4f";><code>6335381</code></a>
 PBES2 decryption maximum iterations (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/911";>#911</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/2884eb79529ec8b56ecdd7c9f7e7fbea5dfc4806";><code>2884eb7</code></a>
 - Updating to GitHub latest actions/checkout and actions/setup-java script 
ve...</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/628bd6f4e8b885be2f9cfbd8cbf0767ce616003a";><code>628bd6f</code></a>
 Secret JWK <code>k</code> values larger than HMAC-SHA minimums (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/909";>#909</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/b12dabf100bbe8749d9bce49628d70b9f73af729";><code>b12dabf</code></a>
 Fix small typos (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/908";>#908</a>)</li>
   <li><a 
href="https://github.com/jwtk/jjwt/commit/26f5dc3dbbb6070735498e4ea497f174b0a3850f";><code>26f5dc3</code></a>
 Updating changelog with more information/clarity for the 0.12.4 release (<a 
href="https://redirect.github.com/jwtk/jjwt/issues/907";>#907</a>)</li>
   <li>Additional commits viewable in <a 
href="https://github.com/jwtk/jjwt/compare/0.11.1...0.12.5";>compare 
view</a></li>
   </ul>
   </details>
   <br />
   
   Updates `io.jsonwebtoken:jjwt-jackson` from 0.11.1 to 0.12.5
   
   
   Dependabot will resolve any conflicts with this PR as long as you don't 
alter it yourself. You can also trigger a rebase manually by commenting 
`@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   <details>
   <summary>Dependabot commands and options</summary>
   <br />
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that 
have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI 
passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and 
block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. 
You can achieve the same result by closing it manually
   - `@dependabot show <dependency name> ignore conditions` will show all of 
the ignore conditions of the specified dependency
   - `@dependabot ignore this major version` will close this PR and stop 
Dependabot creating any more for this major version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop 
Dependabot creating any more for this minor version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop 
Dependabot creating any more for this dependency (unless you reopen the PR or 
upgrade to it yourself)
   
   
   </details>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@eventmesh.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@eventmesh.apache.org
For additional commands, e-mail: dev-h...@eventmesh.apache.org

Reply via email to