Bump jsrsasign and angular-oauth2-oidc-jwks in /src/Website/SimpleIdServer.Website
Bumps jsrsasign and angular-oauth2-oidc-jwks. These dependencies needed to be updated together.
Updates jsrsasign from 8.0.24 to 10.5.27
Release notes
Sourced from jsrsasign's releases.
extend CertificationRequestInfo class for challengePassword and unstructuredName
- Changes from 10.5.26 to 10.5.27 (2022-Aug-19)
- src/asn1csr.js
- CertificationRequestInfo class
- add support for challengePassword and unstructuredName (#522)
- "attrs" member support in constructure argument
- test/qunit-do-asn1csr.html
CSRUtil class enhancement
- Changes from 10.5.25 to 10.5.26 (2022-Jul-14)
- src/asn1csr.js
- CSRUtil.verifySignature method added
- CSRUtil.getParam enhanced to support optional argument flagTBS
- test/qunit-do-asn1csr.html
- update some test cases for above
CVE-2022-25898 Security fix in JWS and JWT validation
- Changes from 10.5.24 to 10.5.25 (2022-Jun-23)
- src/jws.js
- JWS.verify and JWS.verifyJWT
- CVE-2022-25898 SECURITY FIX: verify and verifyJWT may accept signature with special characters or \number characters by mistake. Please see security advisory: https://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf
- src/base64x.js
- function isBase64URLDot added
- test/qunit-do-jwt-veri.html
X509.getParam bugfix for v1 certificate
- Changes from 10.5.23 to 10.5.24 (2022-Jun-04)
- src/x509.js
- X509.getParam bugfix for X.509v1 certificate without extension
BitString parsing bug fix
- Changes from 10.5.22 to 10.5.23 (2022-May-27)
- src/base64x.js
- bitstrtobinstr bugfix fix
- src/asn1hex.js
- ASN1HEX.parse change for bin string range
- npm/lib/footers.js
- add missed exports (bitstrtobinstr, binstrtobitstr, namearraytobinstr, extendClass)
- test/qunit-do-{asn1hex-parse,base64x}.html
- add and fix some test cases for above
DERBitString, KeyUsage and tsp PKIFailureInfo critical bug fix
- Changes from 10.5.21 to 10.5.22 (2022-May-24)
- src/asn1.js
- DERBitString critical bugfix
... (truncated)
Changelog
Sourced from jsrsasign's changelog.
ChangeLog for jsrsasign
extend CertificationRequestInfo class for challengePassword and unstructuredName
- Changes from 10.5.26 to 10.5.27 (2022-Aug-19)
- src/asn1csr.js
- CertificationRequestInfo class
- add support for challengePassword and unstructuredName (#522)
- "attrs" member support in constructure argument
- test/qunit-do-asn1csr.html
CSRUtil class enhancement
- Changes from 10.5.25 to 10.5.26 (2022-Jul-14)
- src/asn1csr.js
- CSRUtil.verifySignature method added
- CSRUtil.getParam enhanced to support optional argument flagTBS
- test/qunit-do-asn1csr.html
- update some test cases for above
CVE-2022-25898 Security fix in JWS and JWT validation
- Changes from 10.5.24 to 10.5.25 (2022-Jun-23)
- src/jws.js
- JWS.verify and JWS.verifyJWT
- CVE-2022-25898 SECURITY FIX: verify and verifyJWT may accept signature with special characters or \number characters by mistake. Please see security advisory: https://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf
- src/base64x.js
- function isBase64URLDot added
- test/qunit-do-jwt-veri.html
X509.getParam bugfix for v1 certificate
- Changes from 10.5.23 to 10.5.24 (2022-Jun-04)
- src/x509.js
- X509.getParam bugfix for X.509v1 certificate without extension
BitString parsing bug fix
- Changes from 10.5.22 to 10.5.23 (2022-May-27)
- src/base64x.js
- bitstrtobinstr bugfix fix
- src/asn1hex.js
- ASN1HEX.parse change for bin string range
- npm/lib/footers.js
- add missed exports (bitstrtobinstr, binstrtobitstr, namearraytobinstr, extendClass)
- test/qunit-do-{asn1hex-parse,base64x}.html
- add and fix some test cases for above
DERBitString, KeyUsage and tsp PKIFailureInfo critical bug fix
... (truncated)
Commits
c665ebc10.5.27 release6513aca10.5.26 release4536a6eCVE-2022-25898 Security fix in JWS and JWT validation3edc00710.5.24 releasef6b791610.5.23 release2613c6410.5.22 release4274a5910.5.21 releasef11615aResponderID API doc update5efa28210.5.20 release041564e10.5.19 release- Additional commits viewable in compare view
Updates angular-oauth2-oidc-jwks from 9.0.0 to 13.0.1
Release notes
Sourced from angular-oauth2-oidc-jwks's releases.
12.1
- Fix #1120
12.0.0
Bug Fixes
- #728 (51e438a), closes manfredsteyer/angular-oauth2-oidc#728
- clear location.hash only if it is present (c2b2753), closes #970
- correctly handle ? and & in location replacements (70fd826)
- Disable nonce validation for id token for e2e tests (f5bd96c)
- fix scope/state removal for implicit flow with hash (9e257d0)
- in code flow pass options to error handler (c9a2c55), closes #972
- jwks: update jsrsasign dependency to 10.2.0 (a05bd8a), closes #1061
- multiplying calls to token endpoint in code flow (59f65d2)
- Refresh tokens with a plus sign get corrupted before sending to token endpoint (2204c5a)
- revoketokenandlogout: 'customParameters' should accept boolean (9761bad)
- While Using POPUP mode, we click on login button multiple time it opens multiple popup instead of focusing already opened (bbff95b)
Features
- introduce DateTimeProvider (0c0a4a7)
- logout: postLogoutRedirectUri should not default to redirectUri (ff7d1d9)
- support JWT response on userinfo endpoint (da16494)
- Custom grant type added (manfredsteyer/angular-oauth2-oidc#919)
- Listen for storage to receive auth hash from popup (manfredsteyer/angular-oauth2-oidc#935)
- Add event for unchanged session (manfredsteyer/angular-oauth2-oidc#936)
- Add loginHint to codeFlow (manfredsteyer/angular-oauth2-oidc#938)
- Add a windowRef option to initLoginFlowInPopup to prevent the window from beeing blocked by popup blockers (manfredsteyer/angular-oauth2-oidc#965)
- Use configured revocationEndpoint by default (manfredsteyer/angular-oauth2-oidc#1020)
Thanks to all the contributors: Miguel Serra, Manuel Rauber, Frank Rosner, Everson R R Moura, meysam gheysaryan, Nikolay, Patrick Westerhoff, Jonathan Yee, Flofie, Dirk Bolte, Sebastian Abshoff, Paweł Dymiński, Bala Charan Nihanth Mutluru, Torkill Strømmen, codeepic, sven-codeculture, Mohamed AbdelAal, Chaz Gatian, Réda Housni Alaoui, huy2nhan, Lin Jie, Taras Krasnytsia, Josselin Francois Downey, BobCui, Mike, Jeroen Heijmans, coyoteecd
Special Thanks to the one and only Jeroen Heijmans for moderating the forum/ issues.
10.0.0
- Tested with Angular 10
- Details: see changelog.md
9.2.0
Features
revoketokenandlogout: explicit way to revoke an access token according to RFC 7009 (c799ead)
token-revocation: also revoke refresh_token (429ed2c)
Bug Fixes
- sample: make sense of the guard (1cae011)
... (truncated)
Commits
- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.