Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump jsonwebtoken and @slack/oauth #32

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 10, 2023

Bumps jsonwebtoken and @slack/oauth. These dependencies needed to be updated together.
Updates jsonwebtoken from 8.5.1 to 9.0.0

Changelog

Sourced from jsonwebtoken's changelog.

9.0.0 - 2022-12-21

Breaking changes: See Migration from v8 to v9

Breaking changes

  • Removed support for Node versions 11 and below.
  • The verify() function no longer accepts unsigned tokens by default. ([834503079514b72264fd13023a3b8d648afd6a16]auth0/node-jsonwebtoken@8345030)
  • RSA key size must be 2048 bits or greater. ([ecdf6cc6073ea13a7e71df5fad043550f08d0fa6]auth0/node-jsonwebtoken@ecdf6cc)
  • Key types must be valid for the signing / verification algorithm

Security fixes

  • security: fixes Arbitrary File Write via verify function - CVE-2022-23529
  • security: fixes Insecure default algorithm in jwt.verify() could lead to signature validation bypass - CVE-2022-23540
  • security: fixes Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC - CVE-2022-23541
  • security: fixes Unrestricted key type could lead to legacy keys usage - CVE-2022-23539
Commits
  • e1fa9dc Merge pull request from GHSA-8cf7-32gw-wr33
  • 5eaedbf chore(ci): remove github test actions job (#861)
  • cd4163e chore(ci): configure Github Actions jobs for Tests & Security Scanning (#856)
  • ecdf6cc fix!: Prevent accidental use of insecure key sizes & misconfiguration of secr...
  • 8345030 fix(sign&verify)!: Remove default none support from sign and verify met...
  • 7e6a86b Upload OpsLevel YAML (#849)
  • 74d5719 docs: update references vercel/ms references (#770)
  • d71e383 docs: document "invalid token" error
  • 3765003 docs: fix spelling in README.md: Peak -> Peek (#754)
  • a46097e docs: make decode impossible to discover before verify
  • Additional commits viewable in compare view
Maintainer changes

This version was pushed to npm by julien.wollscheid, a new releaser for jsonwebtoken since your current version.


Updates @slack/oauth from 2.2.0 to 2.6.0

Release notes

Sourced from @​slack/oauth's releases.

@​slack/oauth@​2.6.0

What's Changed

Security

Docs

New Contributors

Full Changelog: https://github.com/slackapi/node-slack-sdk/compare/@​slack/web-api@​6.8.0...@​slack/oauth@​2.6.0

@​slack/oauth@​2.5.4

See the full list of issues/pull requests of this release here.

@​slack/oauth@​2.5.3

  • Improve InstallationProvide logic not to save new data when token rotation is enabled plus the tokens are not refreshed (via #1497 ) - thanks @​omermizr!

See the full list of issues/pull requests of this release here.

@​slack/oauth@​2.5.2

  • Fix a bug where additional cookies set by beforeRedirection are overwritten (via #1485 ) - thanks @​seratch!

See the full list of issues/pull requests of this release here.

@​slack/oauth@​2.5.1

  • Improve debug-level logging in InstallProvider#handleInstallPath() (via #1451) - thanks @​seratch!

See the full list of issues/pull requests of this release here.

@​slack/oauth@​2.5.0

Changes

  • Fix #1435: Proper use of state parameter for the OAuth CSRF protection (via #1436) - thanks @​seratch!
  • Fix #1439: Add built-in StateStore implementations using server-side database (via #1441) - thanks @​seratch!
  • Fix #1438: Add more callbacks (beforeRedirection, before/afterInstallation, async success/failure) in InstallProvider (via #1442) - thanks @​seratch!
  • Re-organize the source files in the OAuth package (via #1430) - thanks @​seratch!
  • Add error types to exposed ones from @​slack/oauth (via #1431) - thanks @​seratch!
  • Update FileInstallationStore to behave more consistently (via #1437) - thanks @​seratch!
  • Fix eslint warnings and TODOs in OAuth module (via #1425) - thanks @​seratch!
  • Rename sub directory for installation stores (via #1443) - thanks @​seratch!
  • Add exported interface types that were missing in v2.5.0-rc1 release (via #1446) - thanks @​seratch!

... (truncated)

Commits
  • 0f57402 Publish
  • 547d239 Upgrade jsonwebtoken for critical level security issues (#1575)
  • 8fc8cc6 Fix issue #1566 Add admin.conversations.bulk{Archive|Delete|Move} API method ...
  • f428ba0 Update the web-api response types using the latest source
  • 60879af fix(web-api): fix auth.revoke argument type definition (#1562)
  • 5abfa5e Update maintainer's guide to clarify release instructions (#1556)
  • 85bf475 Update docs to include files.uploadV2 (#1548)
  • a196828 Publish @​slack/web-api@​6.8.0 (#1555)
  • 1f9df28 Publish @​slack/types@​2.8.0 (#1554)
  • c635b77 ChatUnfurlArguments require either channel and ts or unfurl_id and `sou...
  • Additional commits viewable in compare view
Maintainer changes

This version was pushed to npm by slackhq, a new releaser for @​slack/oauth since your current version.


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [jsonwebtoken](https://github.com/auth0/node-jsonwebtoken) and [@slack/oauth](https://github.com/slackapi/node-slack-sdk). These dependencies needed to be updated together.

Updates `jsonwebtoken` from 8.5.1 to 9.0.0
- [Release notes](https://github.com/auth0/node-jsonwebtoken/releases)
- [Changelog](https://github.com/auth0/node-jsonwebtoken/blob/master/CHANGELOG.md)
- [Commits](auth0/node-jsonwebtoken@v8.5.1...v9.0.0)

Updates `@slack/oauth` from 2.2.0 to 2.6.0
- [Release notes](https://github.com/slackapi/node-slack-sdk/releases)
- [Commits](https://github.com/slackapi/node-slack-sdk/compare/@slack/oauth@2.2.0...@slack/oauth@2.6.0)

---
updated-dependencies:
- dependency-name: jsonwebtoken
  dependency-type: indirect
- dependency-name: "@slack/oauth"
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 10, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants