Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update dependency kelvinmo/simplejwt to ^0.9.0 #267

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate-bot
Copy link
Contributor

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
kelvinmo/simplejwt ^0.4.0 -> ^0.9.0 age adoption passing confidence

Release Notes

kelvinmo/simplejwt (kelvinmo/simplejwt)

v0.9.3

Compare Source

  • Fixed: Issue with gmp_pow for certain versions of PHP (#​214)

v0.9.2

Compare Source

  • Fixed: RSAKey cannot parse PKCS#8 encoded RSA private keys (#​206)

v0.9.1

Compare Source

  • Fixed: Deprecation warning in constructor of AESGCMKeyWrap (#​197)

v0.9.0

Compare Source

  • Changed: Providing invalid JSON tokens into JWT::deserialise() and
    JWE::decrypt() will throw an InvalidTokenException instead of
    InvalidArgumentException
  • Changed: JWT and JWE methods now check for validity of
    algorithm classes
  • Changed: Additional type hinting on public API methods
  • Removed: Support for PHP 7.2

v0.8.2

Compare Source

  • Changed: Update dependency on symfony/console to support v7.0

v0.8.1

Compare Source

  • Fixed: Throw a KeyException when loading an invalid PEM-encoded
    RSAKey

v0.8.0

Compare Source

  • Added: Support for Ed25519 signatures and X25519 key derviation
    algorithms
  • Added: Support for AES GCM key encryption algorithms (A128GCMKW,
    A192GCMKW and A256GCMKW)
  • Added: Support for COSE based keys
  • Changed: Use box to package the jwkstool utility
  • Changed: Refactored Algorithm (now renamed to BaseAlgorithm)
    and Key to extract interfaces (into AlgorithmInterface and
    KeyInterface respectively)
  • Changed: Key ID kid parameter no longer automatically generated
    when a Key object is created. Use Key::getKeyId(true) or
    KeySet::add(..., true) to generate a key ID
  • Removed: Helper::getObject() and Helper::getJWTObject() have been
    replaced by Helper::decode() and Helper::decodeFully() respectively
  • Removed: Support for PHP 7.1

v0.7.1

Compare Source

  • Fixed: Incorrect key selection when encrypting/decrypting keys in
    ECDH-ES+AxxxKW (#​159)
  • Fixed: Exporting keys as JSON in jwkstool

v0.7.0

Compare Source

  • Changed: Split SimpleJWT\Crypt namespace into multiple namespaces, one
    for each algorithm type (#​60)
  • Changed: JWT and JWE now derives from a common parent class Token
  • Changed: Improved ASN.1 processing code (#​68)
  • Changed: Util::base64url_decode() will now throw
    \UnexpectedValueException instead of returning false if the input
    cannot be decoded

v0.6.3

Compare Source

  • Deprecated: Helper::getObject() and Helper::getJWTObject() have been
    replaced by Helper::decode() and Helper::decodeFully() respectively,
    and will be removed in future versions

v0.6.2

Compare Source

  • Changed: Updated symfony/console package version
  • Fixed: Compatibility with PHP 8.1 when using ECDH (#​58)

v0.6.1

Compare Source

  • Changed: JWT::deserialise() no longer takes a $format parameter (which
    is already ignored)
  • Changed: KeyFactory::create() now throws a KeyException if the supplied key
    cannot be decoded
  • Changed: OpenSSLSig::getKeyCriteria() now throws an UnexpectedValueException
    if the supplied algorithm (alg header) is not valid
  • Deprecated: Helper::getJWTObject() now ignores the $jwe_kid parameter
    and will be removed in future versions
  • Fixed: API documentation for better static analysis checks

v0.6.0

Compare Source

  • Added: Support for Elliptic Curve Diffie-Hellman Ephemeral Static algorithms
  • Added: JWT::tokenHash() to calculate OpenID Connect access token hash values
  • Changed: When parsing multi-recipient JWTs and JWEs without corresponding
    key, the error code for InvalidTokenException was changed from
    TOKEN_PARSE_ERROR to SIGNATURE_VERIFICATION_ERROR (for JWSs) and
    DECRYPTION_ERROR (for JWEs), so that they are consistent with their
    single-recipient equivalents
  • Fixed: Decoding JSON formatted JWEs and JWKs
  • Fixed: Parsing multi-recipient JWTs and JWEs

v0.5.3

Compare Source

  • Fixed: typos in documentation leading to deprecation error (#​39)
  • Fixed: incorrect treatment of recipients object in JWE
  • Removed: support for PHP 5

v0.5.2

Compare Source

  • Fixed: Undefined index when calling JWT::deserialise() and
    JWE::decrypt() with an unrecognised token format (#​37)

v0.5.1

Compare Source

  • Added: Support for PHP 8 (#​35)

v0.5.0

Compare Source

  • Added: Support for AES GCM family of algorithms
  • Added: Support for Elliptic Curve Diffie-Hellman key derivation
    algorithm
  • Changed: SimpleJWT\JWT::decode() no longer supports $format parameter
    (format is automatically detected)
  • Changed: SimpleJWT\JWT::deserialise() no longer supports $format parameter
    (format is automatically detected)
  • Changed: Return value of SimpleJWT\JWT::deserialise() changed
  • Changed: SimpleJWT\JWE::decrypt() no longer supports $format parameter
    (format is automatically detected)
  • Removed: SimpleJWT\Keys\Key::getSignature()
  • Fixed: Autoload issue in jwkstool (#​31)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot requested a review from a team as a code owner February 23, 2025 01:01
@trusted-contributions-gcf trusted-contributions-gcf bot added the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Feb 23, 2025
@kokoro-team kokoro-team removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Feb 23, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants