-
-
Couldn't load subscription status.
- Fork 1.5k
chore(deps): update dependency microsoft.identitymodel.tokens to v8 - autoclosed #1813
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency microsoft.identitymodel.tokens to v8 - autoclosed #1813
Conversation
✅ Deploy Preview for selenium-dev ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
6e9e2e9 to
b74816a
Compare
f626b1a to
4643205
Compare
CI Failure Feedback 🧐(Checks updated until commit 74d9796)
✨ CI feedback usage guide:The CI feedback tool (
In addition to being automatically triggered, the tool can also be invoked manually by commenting on a PR: where Configuration options
See more information about the |
4643205 to
5dd3979
Compare
b9c9c1e to
b1a1629
Compare
b1a1629 to
72fddb8
Compare
72fddb8 to
dfd5662
Compare
This PR contains the following updates:
7.7.1->8.0.2Release Notes
AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet (Microsoft.IdentityModel.Tokens)
v8.0.2Compare Source
=====
Security fundamentals
BannedApiAnalyzersto prevent use ofClaimsIdentityconstructors. See PR #2778 for details.Bug fixes
UseRfcDefinitionOfEpkAndKidswitch. See PR #2747 for details.DoNotFailOnMissingTidin 7x andDontFailOnMissingTidin 8x, adding the method for back compat. See issue #2750 for details.JsonWebKeySetstores the original string it was created with. See PR #2755 for details.SignatureProvider. See #2788 for details.Fundamentals
9.0.100-preview.7.24407.12and add<NoWarn>$(NoWarn);SYSLIB0057</NoWarn>due to breaking changes in preview7. #2786.Work relating to #2711
v8.0.1Compare Source
=====
Bug fixes
SignatureProviderwas disposed but still able to leverage the cache andSignatureProvidernow disposes when compacting. See PR #2682 for details.JsonWebTokenHandler.ValidateJWEAsyncnow considers the decrypt keys in the configuration. See issue #2737 for details.Performance improvement
AppContext.TryGetSwitchstatically caches internally but takes out a lock..NET almost always caches these values. They're not expected to change while the process is running unlike normal config. IdentityModel now caches the value. See issue #2722 for details.
v8.0.0Compare Source
=====
CVE package updates
CVE-2024-30105
Breaking change:
Full list of breaking changes.
ClaimsIdentitywhere claim retrieval is case-sensitive. The currentClaimsIdentity, in .NET, retrieves claims in a case-insensitive manner which is different than querying the underlyingSecurityToken. The newCaseSensitiveClaimsIdentityclass provides consistent retrieval logic withSecurityToken. Fallback to previous behavior via an AppContext switch. See PR #2700 for details.CollectionUtilities.IsNullOrEmptyinternal. See issues**https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/2651dotnet/issues/2651) and #1722 for details.Overall improvements to the validation in IdentityModel:
New Features:
StreamtoWriteinOIDCConfigurationSerializer. See PR #2698 for details.Bug fixes:
AadIssuerValidator.GetTenantIdFromTokeninValidateIssuerSigningKey, to only consider thetid. An AppContext switch enables fallbacking to the previous behavior, which should not be needed. See PR #2680 for details.authorization_details_types_supportedfrom RFC 9396 - OAuth 2.0 Rich Authorization Requests toOpenIdConnectConfiguration.OpenIdConnectPromptnow has thecreateprompt from Initiating User Registration via OpenID Connect 1.0OpenIdConnectGrantTypes:urn:ietf:params:oauth:grant-type:saml2-bearerfrom RFC 7522 - Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants,urn:ietf:params:oauth:grant-type:jwt-bearerfrom RFC 7523 - JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants,urn:ietf:params:oauth:grant-type:device_codefrom RFC 8628 - OAuth 2.0 Device Authorization Grant,urn:ietf:params:oauth:grant-type:token-exchangefrom RFC 8693 - OAuth 2.0 Token Exchange,urn:openid:params:grant-type:cibafrom OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0NotImplementedException. Now a message is returned that the user can act on to fix the issue. See issue #1970.Fundamentals
ConfigurationManager.GetConfigurationAsynca virtual method. See PR #2661Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.