Skip to content

Bump NetEscapades.AspNetCore.SecurityHeaders from 0.24.0 to 1.0.0 in /src/PersonalWebApp#224

Merged
Ky7m merged 1 commit intomainfrom
dependabot/nuget/src/PersonalWebApp/NetEscapades.AspNetCore.SecurityHeaders-1.0.0
Apr 2, 2025
Merged

Bump NetEscapades.AspNetCore.SecurityHeaders from 0.24.0 to 1.0.0 in /src/PersonalWebApp#224
Ky7m merged 1 commit intomainfrom
dependabot/nuget/src/PersonalWebApp/NetEscapades.AspNetCore.SecurityHeaders-1.0.0

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Apr 2, 2025

Bumps NetEscapades.AspNetCore.SecurityHeaders from 0.24.0 to 1.0.0.

Release notes

Sourced from NetEscapades.AspNetCore.SecurityHeaders's releases.

v1.0.0

Changes in 1.0.0

This marks the first major release of the NetEscapades.AspNetCore.SecurityHeaders. For simplicity, all the changes since 0.24.0 are included below.

Breaking Changes:

  • Drop support for .NET Standard 2.0, raises minimum framework to .NET Core 3.1 #167, #171
  • Removed "document header" functionality, in favour of always adding all headers #186
  • Remove X-XSS-Protection from default headers and mark obsolete #168
  • Add cross-origin-opener-policy: same-origin to default headers #184
  • Mark Feature-Policy as obsolete #187
  • Mark Expect-CT as obsolete #197
  • Make nonce generation lazy on call to HttpContext.GetNonce() #198
  • Remove ambient-light-sensor=() from DefaultSecureDirectives() for permissions policy #203 (Thanks @​damienbod!)
  • Update COOP, COEP, and CORP for AddDefaultSecurityHeaders() and AddDefaultApiSecurityHeaders() #204 (Thanks @​damienbod)!)
  • Removes obsolete APIs (#217)

Features:

  • Allow configuring "named" policies, and applying different policies to different endpoints #172, #173, #185
  • Allow customizing the HeaderPolicyCollection just before it is applied, customizing per request #174, #185
  • Make adding directives to Content-Security-Policy idempotent to avoid duplicates #169
  • Add AddDefaultApiSecurityHeaders() for adding default headers to APIs #183, #184
  • Add AddPermissionsPolicyWithRecommendedDirectives() and PermissionsPolicyBuilder.AddDefaultSecureDirectives() for adding secure Permissions-Policy directives in bulk #183, #184
  • NetEscapades.AspNetCore.SecurityHeaders now has an icon, thanks @​khalidabuhakmeh! #195
  • Allow accessing an IServiceProvider when configuring a SecurityHeaderPolicyBuilder #200
  • Adds support for Trusted Types to Content-Security-Policy (#216, #218)

Build updates:

  • Allow building from forks #232
  • Fix release generation #231, #235, #236
  • Fix recording test results #221
  • Define version in the build project instead #223
  • Generate SBOM #222
  • Generate SBOM attestation #224
  • Generate artifact provenance attestation #225
  • Automatically create releases #229
  • Fix incorrect dependency on obsolete Microsoft.AspNetCore.Mvc.Razor package #205 (Thanks @​trejjam)
  • Update documentation #214 (Thanks @​schwastek)

Changes from 1.0.0-preview.4 to 1.0.0:


... (truncated)

Changelog

Sourced from NetEscapades.AspNetCore.SecurityHeaders's changelog.

[v1.0.0]

Changes from 0.24.0-1.0.0:

Breaking Changes:

  • Drop support for .NET Standard 2.0, raises minimum framework to .NET Core 3.1 #167, #171
  • Removed "document header" functionality, in favour of always adding all headers #186
  • Remove X-XSS-Protection from default headers and mark obsolete #168
  • Add cross-origin-opener-policy: same-origin to default headers #184
  • Mark Feature-Policy as obsolete #187
  • Mark Expect-CT as obsolete #197
  • Make nonce generation lazy on call to HttpContext.GetNonce() #198
  • Remove ambient-light-sensor=() from DefaultSecureDirectives() for permissions policy #203 (Thanks damienbod!)
  • Update COOP, COEP, and CORP for AddDefaultSecurityHeaders() and AddDefaultApiSecurityHeaders() #204 (Thanks damienbod!)
  • Removes obsolete APIs (#217)

Features:

  • Allow configuring "named" policies, and applying different policies to different endpoints #172, #173, #185
  • Allow customizing the HeaderPolicyCollection just before it is applied, customizing per request #174, #185
  • Make adding directives to Content-Security-Policy idempotent to avoid duplicates #169
  • Add AddDefaultApiSecurityHeaders() for adding default headers to APIs #183, #184
  • Add AddPermissionsPolicyWithRecommendedDirectives() and PermissionsPolicyBuilder.AddDefaultSecureDirectives() for adding secure Permissions-Policy directives in bulk #183, #184
  • NetEscapades.AspNetCore.SecurityHeaders now has an icon, thanks @​khalidabuhakmeh! #195
  • Allow accessing an IServiceProvider when configuring a SecurityHeaderPolicyBuilder #200
  • Adds support for Trusted Types to Content-Security-Policy (#216, #218)

Build updates:

  • Allow building from forks #232
  • Fix release generation #231, #235, #236
  • Fix recording test results #221
  • Define version in the build project instead #223
  • Generate SBOM #222
  • Generate SBOM attestation #224
  • Generate artifact provenance attestation #225
  • Automatically create releases #229

Changes from 1.0.0-preview.4 to 1.0.0:

Build updates:

[v1.0.0-preview.4]

Build updates:

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [NetEscapades.AspNetCore.SecurityHeaders](https://github.com/andrewlock/NetEscapades.AspNetCore.SecurityHeaders) from 0.24.0 to 1.0.0.
- [Release notes](https://github.com/andrewlock/NetEscapades.AspNetCore.SecurityHeaders/releases)
- [Changelog](https://github.com/andrewlock/NetEscapades.AspNetCore.SecurityHeaders/blob/main/CHANGELOG.md)
- [Commits](andrewlock/NetEscapades.AspNetCore.SecurityHeaders@v0.24.0...v1.0.0)

---
updated-dependencies:
- dependency-name: NetEscapades.AspNetCore.SecurityHeaders
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added .NET Pull requests that update .net code dependencies Pull requests that update a dependency file labels Apr 2, 2025
@Ky7m Ky7m merged commit 58a1793 into main Apr 2, 2025
2 checks passed
@dependabot dependabot bot deleted the dependabot/nuget/src/PersonalWebApp/NetEscapades.AspNetCore.SecurityHeaders-1.0.0 branch April 2, 2025 22:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file .NET Pull requests that update .net code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant