java-crud-api
java-crud-api copied to clipboard
Bump jetty-server from 11.0.10 to 11.0.14 in /core
Bumps jetty-server from 11.0.10 to 11.0.14.
Release notes
Sourced from jetty-server's releases.
11.0.14
Special Thanks to the following Eclipse Jetty community members
@pzygielo(Piotrek Żygieło)@jluehe(jluehe)@dzoech(Dominik Zöchbauer)Changelog
- #9344 - Cleanup Multipart handling for CVE-2023-26048
- #9343 - URI Host Mismatch with optional Compliance modes
- #9339 - Cleanup Cookie Cutter handling for CVE-2023-26049
- #9337 - LowResourceMonitor.getReasons should include detailed reason instead of hard-coded message (
@jluehe)- #9334 - Better support for Cookie RFC 2965 compliance
- #9285 - ContextHandler sends redirect on BaseResponse instead of Wrapped Response object from Handler chain
- #9283 - Configurable Unsafe Host Header Behaviors
- #9188 - Log as info exceptions from server after sending stop with StopMojo.
- #9183 - ConnectHandler may close the connection instead of sending 200 OK
- #9181 java.lang.NullPointerException in SessionHandler.checkRequestedSessionId()
- #9128 - Do not execute any phase for maven plugin :start (
@pzygielo)- #9119 - Wrong value of javax.servlet.forward.context_path attribute
- #9092 - Use ASM Bom
- #9059 - IteratingCallback not serializing close() and failed()
- #9055 - PathMappings optimizations
- #7650 - QueuedThreadPool: Stopped without executing or closing null (
@dzoech)Dependencies
- #9271 - Bump infinispan-bom to 11.0.17.Final
- #9359 - Bump maven.version to 3.9.0
- #9375 - Bump jakarta.servlet.jsp-api to 3.1.1
- #9102 - Bump org.apache.aries.spifly.dynamic.bundle to 1.3.6
- #9098 - Bump org.eclipse.osgi to 3.18.200
- #9106 - Bump org.eclipse.osgi.services to 3.11.100
- #9097 - Bump protostream to 4.6.0.Final
- #9367 - Bump tycho-p2-repository-plugin to 3.0.2
11.0.13
Special Thanks to the following Eclipse Jetty community members
@janvojt(Jan Vojt)@joschi(Jochen Schalanda)@leonchen83(Baoyi Chen)@cowwoc(Gili Tzabari)@Vlatombe(Vincent Latombe)Changelog
- #9006 - WebSocket Message InputStream read() returns signed byte
... (truncated)
Commits
4601fe8Updating to version 11.0.145e1f579revert upgrade from 3aaa65c45a1e783cbc76fca04dd7a545cfa5597b135f14fMerge remote-tracking branch 'origin/jetty-10.0.x' into jetty-11.0.xb707516Fix osgi dependencies for update to org.eclipse.osgi.services.bee5ccaAdd ignore .checkstyle20f5126fix style96de11fMerge remote-tracking branch 'origin/jetty-10.0.x' into jetty-11.0.x4d14641Fix #9334 Cookie Compliance (#9402)d175f32Merge branch 'jetty-10.0.x' into jetty-11.0.xf01d538Merge pull request #9380 from eclipse/dependabot/maven/jetty-10.0.x/org.apach...- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.