Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): Update openidconnect requirement from 2.3 to 3.0 #265

Merged
merged 1 commit into from
May 25, 2023

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github May 22, 2023

Updates the requirements on openidconnect to permit the latest version.

Release notes

Sourced from openidconnect's releases.

3.0.0

🚀 WASM is now supported! 🚀

Changes since 3.0.0-alpha.1

Bug Fixes

  • Don't set empty JWK signing algorithms in Client::new() (#104). This fixes a bug introduced in 3.0.0-alpha.1/2.5.0 (#87) that caused clients constructed via Client::new() not to allow any signature algorithms for ID tokens and user info JWTs unless they manually set the allowed algorithms on the IdTokenVerifier. This patch restores the original behavior of defaulting to accepting only RS256 for clients constructed via Client::new(), as indicated in the spec.

    Clients constructed via Client::from_provider_metadata() will continue to receive the signing algorithms specified in the provider metadata during OpenID Connect Discovery (as introduced in 3.0.0-alpha.1/2.5.0 via #87).

New Features

  • Add AuthorizationRequest::add_scopes (#105)

Other Changes

  • Remove unnecessary 'static bound from ProviderMetadata::discover_async (#107)

Summary of changes since 2.5.1

Breaking Changes

  • Replace ring with RustCrypto crates (#96). This change increases the minimum supported Rust version (MSRV) to 1.57 and adds support for WASM targets.

    Special thanks to @​sbihel for contributing this change!

  • Establish new MSRV policy: this crate will maintain a policy of supporting Rust releases going back at least 6 months. Changes that break compatibility with Rust releases older than 6 months will no longer be considered SemVer breaking changes and will not result in a new major version number for this crate (f3dedb3c3e74802cdf0c20d7d87ce35ffa846eb1).

Other Changes

  • Make CoreRsaPrivateSigningKey Send and Sync (bc09d22afc140e1d2d6caf8756dda4a17cc991fa).
Commits
  • 5685dbf Update Rust 1.57 lockfile
  • 66e918b Bump version to 3.0.0
  • 1ecc97f Remove unnecessary 'static bound from ProviderMetadata::discover_async (#107)
  • d177811 Add AuthorizationRequest::add_scopes (#105)
  • 8e550ab Don't set empty JWK signing algorithms in Client::new (#104)
  • a0434bb Update Rust 1.57 lockfile to fix MSRV build
  • 9cc776c Bump version to 3.0,0-alpha.2
  • 64be3c7 Allow unit tests to compile for WASM target
  • e57ce08 Check WASM build in CI
  • bc09d22 Make CoreRsaPrivateSigningKey Send and Sync
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file rust Pull requests that update Rust code labels May 22, 2023
Updates the requirements on [openidconnect](https://github.com/ramosbugs/openidconnect-rs) to permit the latest version.
- [Release notes](https://github.com/ramosbugs/openidconnect-rs/releases)
- [Commits](ramosbugs/openidconnect-rs@2.3.0...3.0.0)

---
updated-dependencies:
- dependency-name: openidconnect
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/cargo/openidconnect-3.0 branch from 76e7e58 to cdd5214 Compare May 25, 2023 09:17
@lukehinds lukehinds merged commit 75efcc9 into main May 25, 2023
@dependabot dependabot bot deleted the dependabot/cargo/openidconnect-3.0 branch May 25, 2023 20:21
flavio added a commit to flavio/sigstore-rs that referenced this pull request May 26, 2023
Update to the latest version of a bunch of crypto libraries. These
libraries, especially the ones that belong to RustCrypto, have to be
updated at the same time.

There have been a lot of API changes and deprecation warnigns, which needed
quite some adaptation of our codebase.

This fixes the following issues: sigstore#267, sigstore#266, sigstore#265, sigstore#248, sigstore#236, sigstore#234, sigstore#233, sigstore#230

Signed-off-by: Flavio Castelli <fcastelli@suse.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file rust Pull requests that update Rust code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant