Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump jjwt_version from 0.12.3 to 0.12.4 #3995

Merged
merged 1 commit into from
Jan 29, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 29, 2024

Bumps jjwt_version from 0.12.3 to 0.12.4.
Updates io.jsonwebtoken:jjwt-api from 0.12.3 to 0.12.4

Release notes

Sourced from io.jsonwebtoken:jjwt-api's releases.

0.12.4

This is patch release completes 10 issues, with two especially noteworthy changes, and a number of other smaller bug fixes and enhancements.

  1. The default Jackson deserializer will now reject duplicate JSON members by default in an attempt to be a little more strict at rejecting potentially malicious or malformed JSON. This is a default and can be overridden with a custom ObjectMapper if desired.
  2. Password-based JWE encryption key algorithms (PBES2_HS256_A128KW, PBES2_HS384_A192KW and PBES2_HS512_A256KW) now enforce an upper bound (maximum) number of iterations allowed during decryption to mitigate against potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen from Sichuan University and Zhongguancun Lab for their work on this!

A number of other issues fixed: thread-safe ServiceLoader usage for dynamic JSON processor lookup, Android enhancements for JSON Reader APIs, fixed Elliptic Curve field element padding, and more. Please read the 0.12.4 CHANGELOG for full details of all of these changes, and as always, project documentation is in the 0.12.4 README.

Please allow 30 minutes from the time this announcement is published for the release to be available in Maven Central.

Changelog

Sourced from io.jsonwebtoken:jjwt-api's changelog.

0.12.4

This patch release includes various changes listed below.

Jackson Default Parsing Behavior

This release makes two behavioral changes to JJWT's default Jackson ObjectMapper parsing settings:

  1. In the interest of having stronger standards to reject potentially malformed/malicious/accidental JSON that could have undesirable effects on an application, JJWT's default ObjectMapper is now configured to explicitly reject/fail parsing JSON (JWT headers and/or Claims) if/when that JSON contains duplicate JSON member names.

    For example, now the following JSON, if parsed, would fail (be rejected) by default:

    {
      "hello": "world",
      "thisWillFail": 42,
      "thisWillFail": "test"
    }

    Technically, the JWT RFCs do allow duplicate named fields as long as the last parsed member is the one used (see JWS RFC 7515, Section 4), so this is allowed. However, because JWTs often reflect security concepts, it's usually better to be defensive and reject these unexpected scenarios by default. The RFC later supports this position/preference in Section 10.12:

    Ambiguous and potentially exploitable situations
    could arise if the JSON parser used does not enforce the uniqueness
    of member names or returns an unpredictable value for duplicate
    member names.
    

    Finally, this is just a default, and the RFC does indeed allow duplicate member names if the last value is used, so applications that require duplicates to be allowed can simply configure their own ObjectMapper and use that with JJWT instead of assuming this (new) JJWT default. See [Issue #877](jwtk/jjwt#877) for more.

  2. If using JJWT's support to use Jackson to parse Custom Claim Types (for example, a Claim that should be unmarshalled into a POJO), and the JSON for that POJO contained a member that is not represented in the specified class, Jackson would fail parsing by default. Because POJOs and JSON data models can sometimes be out of sync due to different class versions, the default behavior has been changed to ignore these unknown JSON members instead of failing (i.e. the ObjectMapper's DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES is now set to false) by default.

    Again, if you prefer the stricter behavior of rejecting JSON with extra or unknown properties, you can configure true on your own ObjectMapper instance and use that instance with the Jwts.parser() builder.

Additional Changes

This release also:

... (truncated)

Commits
  • bf4168c [maven-release-plugin] prepare release 0.12.4
  • 5c6dec0 - Adding 0.12.4 release version references
  • dd10b12 Added JWK Set documentation to README.mdJwkset doc (#912)
  • 6335381 PBES2 decryption maximum iterations (#911)
  • 2884eb7 - Updating to GitHub latest actions/checkout and actions/setup-java script ve...
  • 628bd6f Secret JWK k values larger than HMAC-SHA minimums (#909)
  • b12dabf Fix small typos (#908)
  • 26f5dc3 Updating changelog with more information/clarity for the 0.12.4 release (#907)
  • f61cfa8 Test case change to reflect accurate assertion for Elliptic Curve 'd' values ...
  • fd619e0 disable FAIL_ON_UNKNOWN_PROPERTIES deserialization feature of Jackson by defa...
  • Additional commits viewable in compare view

Updates io.jsonwebtoken:jjwt-impl from 0.12.3 to 0.12.4

Release notes

Sourced from io.jsonwebtoken:jjwt-impl's releases.

0.12.4

This is patch release completes 10 issues, with two especially noteworthy changes, and a number of other smaller bug fixes and enhancements.

  1. The default Jackson deserializer will now reject duplicate JSON members by default in an attempt to be a little more strict at rejecting potentially malicious or malformed JSON. This is a default and can be overridden with a custom ObjectMapper if desired.
  2. Password-based JWE encryption key algorithms (PBES2_HS256_A128KW, PBES2_HS384_A192KW and PBES2_HS512_A256KW) now enforce an upper bound (maximum) number of iterations allowed during decryption to mitigate against potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen from Sichuan University and Zhongguancun Lab for their work on this!

A number of other issues fixed: thread-safe ServiceLoader usage for dynamic JSON processor lookup, Android enhancements for JSON Reader APIs, fixed Elliptic Curve field element padding, and more. Please read the 0.12.4 CHANGELOG for full details of all of these changes, and as always, project documentation is in the 0.12.4 README.

Please allow 30 minutes from the time this announcement is published for the release to be available in Maven Central.

Changelog

Sourced from io.jsonwebtoken:jjwt-impl's changelog.

0.12.4

This patch release includes various changes listed below.

Jackson Default Parsing Behavior

This release makes two behavioral changes to JJWT's default Jackson ObjectMapper parsing settings:

  1. In the interest of having stronger standards to reject potentially malformed/malicious/accidental JSON that could have undesirable effects on an application, JJWT's default ObjectMapper is now configured to explicitly reject/fail parsing JSON (JWT headers and/or Claims) if/when that JSON contains duplicate JSON member names.

    For example, now the following JSON, if parsed, would fail (be rejected) by default:

    {
      "hello": "world",
      "thisWillFail": 42,
      "thisWillFail": "test"
    }

    Technically, the JWT RFCs do allow duplicate named fields as long as the last parsed member is the one used (see JWS RFC 7515, Section 4), so this is allowed. However, because JWTs often reflect security concepts, it's usually better to be defensive and reject these unexpected scenarios by default. The RFC later supports this position/preference in Section 10.12:

    Ambiguous and potentially exploitable situations
    could arise if the JSON parser used does not enforce the uniqueness
    of member names or returns an unpredictable value for duplicate
    member names.
    

    Finally, this is just a default, and the RFC does indeed allow duplicate member names if the last value is used, so applications that require duplicates to be allowed can simply configure their own ObjectMapper and use that with JJWT instead of assuming this (new) JJWT default. See [Issue #877](jwtk/jjwt#877) for more.

  2. If using JJWT's support to use Jackson to parse Custom Claim Types (for example, a Claim that should be unmarshalled into a POJO), and the JSON for that POJO contained a member that is not represented in the specified class, Jackson would fail parsing by default. Because POJOs and JSON data models can sometimes be out of sync due to different class versions, the default behavior has been changed to ignore these unknown JSON members instead of failing (i.e. the ObjectMapper's DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES is now set to false) by default.

    Again, if you prefer the stricter behavior of rejecting JSON with extra or unknown properties, you can configure true on your own ObjectMapper instance and use that instance with the Jwts.parser() builder.

Additional Changes

This release also:

... (truncated)

Commits
  • bf4168c [maven-release-plugin] prepare release 0.12.4
  • 5c6dec0 - Adding 0.12.4 release version references
  • dd10b12 Added JWK Set documentation to README.mdJwkset doc (#912)
  • 6335381 PBES2 decryption maximum iterations (#911)
  • 2884eb7 - Updating to GitHub latest actions/checkout and actions/setup-java script ve...
  • 628bd6f Secret JWK k values larger than HMAC-SHA minimums (#909)
  • b12dabf Fix small typos (#908)
  • 26f5dc3 Updating changelog with more information/clarity for the 0.12.4 release (#907)
  • f61cfa8 Test case change to reflect accurate assertion for Elliptic Curve 'd' values ...
  • fd619e0 disable FAIL_ON_UNKNOWN_PROPERTIES deserialization feature of Jackson by defa...
  • Additional commits viewable in compare view

Updates io.jsonwebtoken:jjwt-jackson from 0.12.3 to 0.12.4

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps `jjwt_version` from 0.12.3 to 0.12.4.

Updates `io.jsonwebtoken:jjwt-api` from 0.12.3 to 0.12.4
- [Release notes](https://github.com/jwtk/jjwt/releases)
- [Changelog](https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md)
- [Commits](jwtk/jjwt@0.12.3...0.12.4)

Updates `io.jsonwebtoken:jjwt-impl` from 0.12.3 to 0.12.4
- [Release notes](https://github.com/jwtk/jjwt/releases)
- [Changelog](https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md)
- [Commits](jwtk/jjwt@0.12.3...0.12.4)

Updates `io.jsonwebtoken:jjwt-jackson` from 0.12.3 to 0.12.4

---
updated-dependencies:
- dependency-name: io.jsonwebtoken:jjwt-api
  dependency-type: direct:production
  update-type: version-update:semver-patch
- dependency-name: io.jsonwebtoken:jjwt-impl
  dependency-type: direct:production
  update-type: version-update:semver-patch
- dependency-name: io.jsonwebtoken:jjwt-jackson
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot requested a review from cliu123 as a code owner January 29, 2024 06:57
@dependabot dependabot bot added dependencies Pull requests that update a dependency file java Pull requests that update Java code labels Jan 29, 2024
Copy link

codecov bot commented Jan 29, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (d441138) 65.62% compared to head (e31076a) 65.56%.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #3995      +/-   ##
==========================================
- Coverage   65.62%   65.56%   -0.06%     
==========================================
  Files         298      298              
  Lines       21246    21246              
  Branches     3457     3457              
==========================================
- Hits        13942    13930      -12     
- Misses       5585     5595      +10     
- Partials     1719     1721       +2     

see 4 files with indirect coverage changes

@willyborankin willyborankin added the backport 2.x backport to 2.x branch label Jan 29, 2024
@willyborankin willyborankin merged commit 4525c95 into main Jan 29, 2024
95 of 96 checks passed
@willyborankin willyborankin deleted the dependabot/gradle/jjwt_version-0.12.4 branch January 29, 2024 13:33
opensearch-trigger-bot bot pushed a commit that referenced this pull request Jan 29, 2024
Bumps `jjwt_version` from 0.12.3 to 0.12.4.
Updates `io.jsonwebtoken:jjwt-api` from 0.12.3 to 0.12.4
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/releases">io.jsonwebtoken:jjwt-api's
releases</a>.</em></p>
<blockquote>
<h2>0.12.4</h2>
<p>This is patch release completes <a
href="https://github.com/jwtk/jjwt/issues?q=milestone%3A0.12.4+is%3Aissue">10
issues</a>, with two especially noteworthy changes, and a number of
other smaller bug fixes and enhancements.</p>
<ol>
<li>The default Jackson deserializer will now reject duplicate JSON
members by default in an attempt to be a little more strict at rejecting
potentially malicious or malformed JSON. This is a default and can be
overridden with a custom <code>ObjectMapper</code> if desired.</li>
<li>Password-based JWE encryption key algorithms
(<code>PBES2_HS256_A128KW</code>, <code>PBES2_HS384_A192KW</code> and
<code>PBES2_HS512_A256KW</code>) now enforce an upper bound (maximum)
number of iterations allowed during decryption to mitigate against
potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen
from Sichuan University and Zhongguancun Lab for their work on
this!</li>
</ol>
<p>A number of other issues fixed: thread-safe
<code>ServiceLoader</code> usage for dynamic JSON processor lookup,
Android enhancements for JSON <code>Reader</code> APIs, fixed Elliptic
Curve field element padding, and more. Please read the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/CHANGELOG.md">0.12.4
CHANGELOG</a> for full details of all of these changes, and as always,
project documentation is in the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/README.md">0.12.4
README</a>.</p>
<p>Please allow 30 minutes from the time this announcement is published
for the release to be available in Maven Central.</p>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md">io.jsonwebtoken:jjwt-api's
changelog</a>.</em></p>
<blockquote>
<h3>0.12.4</h3>
<p>This patch release includes various changes listed below.</p>
<h4>Jackson Default Parsing Behavior</h4>
<p>This release makes two behavioral changes to JJWT's default Jackson
<code>ObjectMapper</code> parsing settings:</p>
<ol>
<li>
<p>In the interest of having stronger standards to reject potentially
malformed/malicious/accidental JSON that could
have undesirable effects on an application, JJWT's default
<code>ObjectMapper </code>is now configured to explicitly reject/fail
parsing JSON (JWT headers and/or Claims) if/when that JSON contains
duplicate JSON member names.</p>
<p>For example, now the following JSON, if parsed, would fail (be
rejected) by default:</p>
<pre lang="json"><code>{
  &quot;hello&quot;: &quot;world&quot;,
  &quot;thisWillFail&quot;: 42,
  &quot;thisWillFail&quot;: &quot;test&quot;
}
</code></pre>
<p>Technically, the JWT RFCs <em>do allow</em> duplicate named fields as
long as the last parsed member is the one used
(see <a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-4">JWS RFC
7515, Section 4</a>), so this is allowed.
However, because JWTs often reflect security concepts, it's usually
better to be defensive and reject these
unexpected scenarios by default. The RFC later supports this
position/preference in
<a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-10.12">Section
10.12</a>:</p>
<pre><code>Ambiguous and potentially exploitable situations
could arise if the JSON parser used does not enforce the uniqueness
of member names or returns an unpredictable value for duplicate
member names.
</code></pre>
<p>Finally, this is just a default, and the RFC does indeed allow
duplicate member names if the last value is used,
so applications that require duplicates to be allowed can simply
configure their own <code>ObjectMapper</code> and use
that with JJWT instead of assuming this (new) JJWT default. See
[Issue <a
href="https://redirect.github.com/jwtk/jjwt/issues/877">#877</a>](<a
href="https://redirect.github.com/jwtk/jjwt/issues/877">jwtk/jjwt#877</a>)
for more.</p>
</li>
<li>
<p>If using JJWT's support to use Jackson to parse
<a href="https://github.com/jwtk/jjwt#json-jackson-custom-types">Custom
Claim Types</a> (for example, a Claim that should be
unmarshalled into a POJO), and the JSON for that POJO contained a member
that is not represented in the specified
class, Jackson would fail parsing by default. Because POJOs and JSON
data models can sometimes be out of sync
due to different class versions, the default behavior has been changed
to ignore these unknown JSON members instead
of failing (i.e. the <code>ObjectMapper</code>'s
<code>DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES</code> is now
set to <code>false</code>)
by default.</p>
<p>Again, if you prefer the stricter behavior of rejecting JSON with
extra or unknown properties, you can configure
<code>true</code> on your own <code>ObjectMapper</code> instance and use
that instance with the <code>Jwts.parser()</code> builder.</p>
</li>
</ol>
<h4>Additional Changes</h4>
<p>This release also:</p>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/jwtk/jjwt/commit/bf4168cdceb85435b17d912a2087960ae597d37f"><code>bf4168c</code></a>
[maven-release-plugin] prepare release 0.12.4</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/5c6dec061ff99ef7122a33960ada95e496a37087"><code>5c6dec0</code></a>
- Adding 0.12.4 release version references</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/dd10b12b53b5bb26299c5435aa9d193e71b6b918"><code>dd10b12</code></a>
Added JWK Set documentation to README.mdJwkset doc (<a
href="https://redirect.github.com/jwtk/jjwt/issues/912">#912</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/6335381c978ce83c9c15bd3c349f32d1bed72d4f"><code>6335381</code></a>
PBES2 decryption maximum iterations (<a
href="https://redirect.github.com/jwtk/jjwt/issues/911">#911</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/2884eb79529ec8b56ecdd7c9f7e7fbea5dfc4806"><code>2884eb7</code></a>
- Updating to GitHub latest actions/checkout and actions/setup-java
script ve...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/628bd6f4e8b885be2f9cfbd8cbf0767ce616003a"><code>628bd6f</code></a>
Secret JWK <code>k</code> values larger than HMAC-SHA minimums (<a
href="https://redirect.github.com/jwtk/jjwt/issues/909">#909</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/b12dabf100bbe8749d9bce49628d70b9f73af729"><code>b12dabf</code></a>
Fix small typos (<a
href="https://redirect.github.com/jwtk/jjwt/issues/908">#908</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/26f5dc3dbbb6070735498e4ea497f174b0a3850f"><code>26f5dc3</code></a>
Updating changelog with more information/clarity for the 0.12.4 release
(<a
href="https://redirect.github.com/jwtk/jjwt/issues/907">#907</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/f61cfa875d1bfd9164c16069ab62bf7b74fcc831"><code>f61cfa8</code></a>
Test case change to reflect accurate assertion for Elliptic Curve 'd'
values ...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/fd619e0a4229e01cbd3ab1bd0a7a4f6cab21d784"><code>fd619e0</code></a>
disable FAIL_ON_UNKNOWN_PROPERTIES deserialization feature of Jackson by
defa...</li>
<li>Additional commits viewable in <a
href="https://github.com/jwtk/jjwt/compare/0.12.3...0.12.4">compare
view</a></li>
</ul>
</details>
<br />

Updates `io.jsonwebtoken:jjwt-impl` from 0.12.3 to 0.12.4
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/releases">io.jsonwebtoken:jjwt-impl's
releases</a>.</em></p>
<blockquote>
<h2>0.12.4</h2>
<p>This is patch release completes <a
href="https://github.com/jwtk/jjwt/issues?q=milestone%3A0.12.4+is%3Aissue">10
issues</a>, with two especially noteworthy changes, and a number of
other smaller bug fixes and enhancements.</p>
<ol>
<li>The default Jackson deserializer will now reject duplicate JSON
members by default in an attempt to be a little more strict at rejecting
potentially malicious or malformed JSON. This is a default and can be
overridden with a custom <code>ObjectMapper</code> if desired.</li>
<li>Password-based JWE encryption key algorithms
(<code>PBES2_HS256_A128KW</code>, <code>PBES2_HS384_A192KW</code> and
<code>PBES2_HS512_A256KW</code>) now enforce an upper bound (maximum)
number of iterations allowed during decryption to mitigate against
potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen
from Sichuan University and Zhongguancun Lab for their work on
this!</li>
</ol>
<p>A number of other issues fixed: thread-safe
<code>ServiceLoader</code> usage for dynamic JSON processor lookup,
Android enhancements for JSON <code>Reader</code> APIs, fixed Elliptic
Curve field element padding, and more. Please read the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/CHANGELOG.md">0.12.4
CHANGELOG</a> for full details of all of these changes, and as always,
project documentation is in the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/README.md">0.12.4
README</a>.</p>
<p>Please allow 30 minutes from the time this announcement is published
for the release to be available in Maven Central.</p>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md">io.jsonwebtoken:jjwt-impl's
changelog</a>.</em></p>
<blockquote>
<h3>0.12.4</h3>
<p>This patch release includes various changes listed below.</p>
<h4>Jackson Default Parsing Behavior</h4>
<p>This release makes two behavioral changes to JJWT's default Jackson
<code>ObjectMapper</code> parsing settings:</p>
<ol>
<li>
<p>In the interest of having stronger standards to reject potentially
malformed/malicious/accidental JSON that could
have undesirable effects on an application, JJWT's default
<code>ObjectMapper </code>is now configured to explicitly reject/fail
parsing JSON (JWT headers and/or Claims) if/when that JSON contains
duplicate JSON member names.</p>
<p>For example, now the following JSON, if parsed, would fail (be
rejected) by default:</p>
<pre lang="json"><code>{
  &quot;hello&quot;: &quot;world&quot;,
  &quot;thisWillFail&quot;: 42,
  &quot;thisWillFail&quot;: &quot;test&quot;
}
</code></pre>
<p>Technically, the JWT RFCs <em>do allow</em> duplicate named fields as
long as the last parsed member is the one used
(see <a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-4">JWS RFC
7515, Section 4</a>), so this is allowed.
However, because JWTs often reflect security concepts, it's usually
better to be defensive and reject these
unexpected scenarios by default. The RFC later supports this
position/preference in
<a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-10.12">Section
10.12</a>:</p>
<pre><code>Ambiguous and potentially exploitable situations
could arise if the JSON parser used does not enforce the uniqueness
of member names or returns an unpredictable value for duplicate
member names.
</code></pre>
<p>Finally, this is just a default, and the RFC does indeed allow
duplicate member names if the last value is used,
so applications that require duplicates to be allowed can simply
configure their own <code>ObjectMapper</code> and use
that with JJWT instead of assuming this (new) JJWT default. See
[Issue <a
href="https://redirect.github.com/jwtk/jjwt/issues/877">#877</a>](<a
href="https://redirect.github.com/jwtk/jjwt/issues/877">jwtk/jjwt#877</a>)
for more.</p>
</li>
<li>
<p>If using JJWT's support to use Jackson to parse
<a href="https://github.com/jwtk/jjwt#json-jackson-custom-types">Custom
Claim Types</a> (for example, a Claim that should be
unmarshalled into a POJO), and the JSON for that POJO contained a member
that is not represented in the specified
class, Jackson would fail parsing by default. Because POJOs and JSON
data models can sometimes be out of sync
due to different class versions, the default behavior has been changed
to ignore these unknown JSON members instead
of failing (i.e. the <code>ObjectMapper</code>'s
<code>DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES</code> is now
set to <code>false</code>)
by default.</p>
<p>Again, if you prefer the stricter behavior of rejecting JSON with
extra or unknown properties, you can configure
<code>true</code> on your own <code>ObjectMapper</code> instance and use
that instance with the <code>Jwts.parser()</code> builder.</p>
</li>
</ol>
<h4>Additional Changes</h4>
<p>This release also:</p>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/jwtk/jjwt/commit/bf4168cdceb85435b17d912a2087960ae597d37f"><code>bf4168c</code></a>
[maven-release-plugin] prepare release 0.12.4</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/5c6dec061ff99ef7122a33960ada95e496a37087"><code>5c6dec0</code></a>
- Adding 0.12.4 release version references</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/dd10b12b53b5bb26299c5435aa9d193e71b6b918"><code>dd10b12</code></a>
Added JWK Set documentation to README.mdJwkset doc (<a
href="https://redirect.github.com/jwtk/jjwt/issues/912">#912</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/6335381c978ce83c9c15bd3c349f32d1bed72d4f"><code>6335381</code></a>
PBES2 decryption maximum iterations (<a
href="https://redirect.github.com/jwtk/jjwt/issues/911">#911</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/2884eb79529ec8b56ecdd7c9f7e7fbea5dfc4806"><code>2884eb7</code></a>
- Updating to GitHub latest actions/checkout and actions/setup-java
script ve...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/628bd6f4e8b885be2f9cfbd8cbf0767ce616003a"><code>628bd6f</code></a>
Secret JWK <code>k</code> values larger than HMAC-SHA minimums (<a
href="https://redirect.github.com/jwtk/jjwt/issues/909">#909</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/b12dabf100bbe8749d9bce49628d70b9f73af729"><code>b12dabf</code></a>
Fix small typos (<a
href="https://redirect.github.com/jwtk/jjwt/issues/908">#908</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/26f5dc3dbbb6070735498e4ea497f174b0a3850f"><code>26f5dc3</code></a>
Updating changelog with more information/clarity for the 0.12.4 release
(<a
href="https://redirect.github.com/jwtk/jjwt/issues/907">#907</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/f61cfa875d1bfd9164c16069ab62bf7b74fcc831"><code>f61cfa8</code></a>
Test case change to reflect accurate assertion for Elliptic Curve 'd'
values ...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/fd619e0a4229e01cbd3ab1bd0a7a4f6cab21d784"><code>fd619e0</code></a>
disable FAIL_ON_UNKNOWN_PROPERTIES deserialization feature of Jackson by
defa...</li>
<li>Additional commits viewable in <a
href="https://github.com/jwtk/jjwt/compare/0.12.3...0.12.4">compare
view</a></li>
</ul>
</details>
<br />

Updates `io.jsonwebtoken:jjwt-jackson` from 0.12.3 to 0.12.4

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
(cherry picked from commit 4525c95)
Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
github-actions bot added a commit that referenced this pull request Jan 29, 2024
Backport 4525c95 from #3995.

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
dlin2028 pushed a commit to dlin2028/security that referenced this pull request May 1, 2024
Bumps `jjwt_version` from 0.12.3 to 0.12.4.
Updates `io.jsonwebtoken:jjwt-api` from 0.12.3 to 0.12.4
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/releases">io.jsonwebtoken:jjwt-api's
releases</a>.</em></p>
<blockquote>
<h2>0.12.4</h2>
<p>This is patch release completes <a
href="https://github.com/jwtk/jjwt/issues?q=milestone%3A0.12.4+is%3Aissue">10
issues</a>, with two especially noteworthy changes, and a number of
other smaller bug fixes and enhancements.</p>
<ol>
<li>The default Jackson deserializer will now reject duplicate JSON
members by default in an attempt to be a little more strict at rejecting
potentially malicious or malformed JSON. This is a default and can be
overridden with a custom <code>ObjectMapper</code> if desired.</li>
<li>Password-based JWE encryption key algorithms
(<code>PBES2_HS256_A128KW</code>, <code>PBES2_HS384_A192KW</code> and
<code>PBES2_HS512_A256KW</code>) now enforce an upper bound (maximum)
number of iterations allowed during decryption to mitigate against
potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen
from Sichuan University and Zhongguancun Lab for their work on
this!</li>
</ol>
<p>A number of other issues fixed: thread-safe
<code>ServiceLoader</code> usage for dynamic JSON processor lookup,
Android enhancements for JSON <code>Reader</code> APIs, fixed Elliptic
Curve field element padding, and more. Please read the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/CHANGELOG.md">0.12.4
CHANGELOG</a> for full details of all of these changes, and as always,
project documentation is in the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/README.md">0.12.4
README</a>.</p>
<p>Please allow 30 minutes from the time this announcement is published
for the release to be available in Maven Central.</p>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md">io.jsonwebtoken:jjwt-api's
changelog</a>.</em></p>
<blockquote>
<h3>0.12.4</h3>
<p>This patch release includes various changes listed below.</p>
<h4>Jackson Default Parsing Behavior</h4>
<p>This release makes two behavioral changes to JJWT's default Jackson
<code>ObjectMapper</code> parsing settings:</p>
<ol>
<li>
<p>In the interest of having stronger standards to reject potentially
malformed/malicious/accidental JSON that could
have undesirable effects on an application, JJWT's default
<code>ObjectMapper </code>is now configured to explicitly reject/fail
parsing JSON (JWT headers and/or Claims) if/when that JSON contains
duplicate JSON member names.</p>
<p>For example, now the following JSON, if parsed, would fail (be
rejected) by default:</p>
<pre lang="json"><code>{
  &quot;hello&quot;: &quot;world&quot;,
  &quot;thisWillFail&quot;: 42,
  &quot;thisWillFail&quot;: &quot;test&quot;
}
</code></pre>
<p>Technically, the JWT RFCs <em>do allow</em> duplicate named fields as
long as the last parsed member is the one used
(see <a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-4">JWS RFC
7515, Section 4</a>), so this is allowed.
However, because JWTs often reflect security concepts, it's usually
better to be defensive and reject these
unexpected scenarios by default. The RFC later supports this
position/preference in
<a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-10.12">Section
10.12</a>:</p>
<pre><code>Ambiguous and potentially exploitable situations
could arise if the JSON parser used does not enforce the uniqueness
of member names or returns an unpredictable value for duplicate
member names.
</code></pre>
<p>Finally, this is just a default, and the RFC does indeed allow
duplicate member names if the last value is used,
so applications that require duplicates to be allowed can simply
configure their own <code>ObjectMapper</code> and use
that with JJWT instead of assuming this (new) JJWT default. See
[Issue <a
href="https://redirect.github.com/jwtk/jjwt/issues/877">#877</a>](<a
href="https://redirect.github.com/jwtk/jjwt/issues/877">jwtk/jjwt#877</a>)
for more.</p>
</li>
<li>
<p>If using JJWT's support to use Jackson to parse
<a href="https://github.com/jwtk/jjwt#json-jackson-custom-types">Custom
Claim Types</a> (for example, a Claim that should be
unmarshalled into a POJO), and the JSON for that POJO contained a member
that is not represented in the specified
class, Jackson would fail parsing by default. Because POJOs and JSON
data models can sometimes be out of sync
due to different class versions, the default behavior has been changed
to ignore these unknown JSON members instead
of failing (i.e. the <code>ObjectMapper</code>'s
<code>DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES</code> is now
set to <code>false</code>)
by default.</p>
<p>Again, if you prefer the stricter behavior of rejecting JSON with
extra or unknown properties, you can configure
<code>true</code> on your own <code>ObjectMapper</code> instance and use
that instance with the <code>Jwts.parser()</code> builder.</p>
</li>
</ol>
<h4>Additional Changes</h4>
<p>This release also:</p>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/jwtk/jjwt/commit/bf4168cdceb85435b17d912a2087960ae597d37f"><code>bf4168c</code></a>
[maven-release-plugin] prepare release 0.12.4</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/5c6dec061ff99ef7122a33960ada95e496a37087"><code>5c6dec0</code></a>
- Adding 0.12.4 release version references</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/dd10b12b53b5bb26299c5435aa9d193e71b6b918"><code>dd10b12</code></a>
Added JWK Set documentation to README.mdJwkset doc (<a
href="https://redirect.github.com/jwtk/jjwt/issues/912">#912</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/6335381c978ce83c9c15bd3c349f32d1bed72d4f"><code>6335381</code></a>
PBES2 decryption maximum iterations (<a
href="https://redirect.github.com/jwtk/jjwt/issues/911">#911</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/2884eb79529ec8b56ecdd7c9f7e7fbea5dfc4806"><code>2884eb7</code></a>
- Updating to GitHub latest actions/checkout and actions/setup-java
script ve...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/628bd6f4e8b885be2f9cfbd8cbf0767ce616003a"><code>628bd6f</code></a>
Secret JWK <code>k</code> values larger than HMAC-SHA minimums (<a
href="https://redirect.github.com/jwtk/jjwt/issues/909">#909</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/b12dabf100bbe8749d9bce49628d70b9f73af729"><code>b12dabf</code></a>
Fix small typos (<a
href="https://redirect.github.com/jwtk/jjwt/issues/908">#908</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/26f5dc3dbbb6070735498e4ea497f174b0a3850f"><code>26f5dc3</code></a>
Updating changelog with more information/clarity for the 0.12.4 release
(<a
href="https://redirect.github.com/jwtk/jjwt/issues/907">#907</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/f61cfa875d1bfd9164c16069ab62bf7b74fcc831"><code>f61cfa8</code></a>
Test case change to reflect accurate assertion for Elliptic Curve 'd'
values ...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/fd619e0a4229e01cbd3ab1bd0a7a4f6cab21d784"><code>fd619e0</code></a>
disable FAIL_ON_UNKNOWN_PROPERTIES deserialization feature of Jackson by
defa...</li>
<li>Additional commits viewable in <a
href="https://github.com/jwtk/jjwt/compare/0.12.3...0.12.4">compare
view</a></li>
</ul>
</details>
<br />

Updates `io.jsonwebtoken:jjwt-impl` from 0.12.3 to 0.12.4
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/releases">io.jsonwebtoken:jjwt-impl's
releases</a>.</em></p>
<blockquote>
<h2>0.12.4</h2>
<p>This is patch release completes <a
href="https://github.com/jwtk/jjwt/issues?q=milestone%3A0.12.4+is%3Aissue">10
issues</a>, with two especially noteworthy changes, and a number of
other smaller bug fixes and enhancements.</p>
<ol>
<li>The default Jackson deserializer will now reject duplicate JSON
members by default in an attempt to be a little more strict at rejecting
potentially malicious or malformed JSON. This is a default and can be
overridden with a custom <code>ObjectMapper</code> if desired.</li>
<li>Password-based JWE encryption key algorithms
(<code>PBES2_HS256_A128KW</code>, <code>PBES2_HS384_A192KW</code> and
<code>PBES2_HS512_A256KW</code>) now enforce an upper bound (maximum)
number of iterations allowed during decryption to mitigate against
potential DoS attacks. Many thanks to Jingcheng Yang and Jianjun Chen
from Sichuan University and Zhongguancun Lab for their work on
this!</li>
</ol>
<p>A number of other issues fixed: thread-safe
<code>ServiceLoader</code> usage for dynamic JSON processor lookup,
Android enhancements for JSON <code>Reader</code> APIs, fixed Elliptic
Curve field element padding, and more. Please read the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/CHANGELOG.md">0.12.4
CHANGELOG</a> for full details of all of these changes, and as always,
project documentation is in the <a
href="https://github.com/jwtk/jjwt/blob/0.12.4/README.md">0.12.4
README</a>.</p>
<p>Please allow 30 minutes from the time this announcement is published
for the release to be available in Maven Central.</p>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/jwtk/jjwt/blob/master/CHANGELOG.md">io.jsonwebtoken:jjwt-impl's
changelog</a>.</em></p>
<blockquote>
<h3>0.12.4</h3>
<p>This patch release includes various changes listed below.</p>
<h4>Jackson Default Parsing Behavior</h4>
<p>This release makes two behavioral changes to JJWT's default Jackson
<code>ObjectMapper</code> parsing settings:</p>
<ol>
<li>
<p>In the interest of having stronger standards to reject potentially
malformed/malicious/accidental JSON that could
have undesirable effects on an application, JJWT's default
<code>ObjectMapper </code>is now configured to explicitly reject/fail
parsing JSON (JWT headers and/or Claims) if/when that JSON contains
duplicate JSON member names.</p>
<p>For example, now the following JSON, if parsed, would fail (be
rejected) by default:</p>
<pre lang="json"><code>{
  &quot;hello&quot;: &quot;world&quot;,
  &quot;thisWillFail&quot;: 42,
  &quot;thisWillFail&quot;: &quot;test&quot;
}
</code></pre>
<p>Technically, the JWT RFCs <em>do allow</em> duplicate named fields as
long as the last parsed member is the one used
(see <a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-4">JWS RFC
7515, Section 4</a>), so this is allowed.
However, because JWTs often reflect security concepts, it's usually
better to be defensive and reject these
unexpected scenarios by default. The RFC later supports this
position/preference in
<a
href="https://datatracker.ietf.org/doc/html/rfc7515#section-10.12">Section
10.12</a>:</p>
<pre><code>Ambiguous and potentially exploitable situations
could arise if the JSON parser used does not enforce the uniqueness
of member names or returns an unpredictable value for duplicate
member names.
</code></pre>
<p>Finally, this is just a default, and the RFC does indeed allow
duplicate member names if the last value is used,
so applications that require duplicates to be allowed can simply
configure their own <code>ObjectMapper</code> and use
that with JJWT instead of assuming this (new) JJWT default. See
[Issue <a
href="https://redirect.github.com/jwtk/jjwt/issues/877">#877</a>](<a
href="https://redirect.github.com/jwtk/jjwt/issues/877">jwtk/jjwt#877</a>)
for more.</p>
</li>
<li>
<p>If using JJWT's support to use Jackson to parse
<a href="https://github.com/jwtk/jjwt#json-jackson-custom-types">Custom
Claim Types</a> (for example, a Claim that should be
unmarshalled into a POJO), and the JSON for that POJO contained a member
that is not represented in the specified
class, Jackson would fail parsing by default. Because POJOs and JSON
data models can sometimes be out of sync
due to different class versions, the default behavior has been changed
to ignore these unknown JSON members instead
of failing (i.e. the <code>ObjectMapper</code>'s
<code>DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES</code> is now
set to <code>false</code>)
by default.</p>
<p>Again, if you prefer the stricter behavior of rejecting JSON with
extra or unknown properties, you can configure
<code>true</code> on your own <code>ObjectMapper</code> instance and use
that instance with the <code>Jwts.parser()</code> builder.</p>
</li>
</ol>
<h4>Additional Changes</h4>
<p>This release also:</p>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/jwtk/jjwt/commit/bf4168cdceb85435b17d912a2087960ae597d37f"><code>bf4168c</code></a>
[maven-release-plugin] prepare release 0.12.4</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/5c6dec061ff99ef7122a33960ada95e496a37087"><code>5c6dec0</code></a>
- Adding 0.12.4 release version references</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/dd10b12b53b5bb26299c5435aa9d193e71b6b918"><code>dd10b12</code></a>
Added JWK Set documentation to README.mdJwkset doc (<a
href="https://redirect.github.com/jwtk/jjwt/issues/912">#912</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/6335381c978ce83c9c15bd3c349f32d1bed72d4f"><code>6335381</code></a>
PBES2 decryption maximum iterations (<a
href="https://redirect.github.com/jwtk/jjwt/issues/911">#911</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/2884eb79529ec8b56ecdd7c9f7e7fbea5dfc4806"><code>2884eb7</code></a>
- Updating to GitHub latest actions/checkout and actions/setup-java
script ve...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/628bd6f4e8b885be2f9cfbd8cbf0767ce616003a"><code>628bd6f</code></a>
Secret JWK <code>k</code> values larger than HMAC-SHA minimums (<a
href="https://redirect.github.com/jwtk/jjwt/issues/909">#909</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/b12dabf100bbe8749d9bce49628d70b9f73af729"><code>b12dabf</code></a>
Fix small typos (<a
href="https://redirect.github.com/jwtk/jjwt/issues/908">#908</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/26f5dc3dbbb6070735498e4ea497f174b0a3850f"><code>26f5dc3</code></a>
Updating changelog with more information/clarity for the 0.12.4 release
(<a
href="https://redirect.github.com/jwtk/jjwt/issues/907">#907</a>)</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/f61cfa875d1bfd9164c16069ab62bf7b74fcc831"><code>f61cfa8</code></a>
Test case change to reflect accurate assertion for Elliptic Curve 'd'
values ...</li>
<li><a
href="https://github.com/jwtk/jjwt/commit/fd619e0a4229e01cbd3ab1bd0a7a4f6cab21d784"><code>fd619e0</code></a>
disable FAIL_ON_UNKNOWN_PROPERTIES deserialization feature of Jackson by
defa...</li>
<li>Additional commits viewable in <a
href="https://github.com/jwtk/jjwt/compare/0.12.3...0.12.4">compare
view</a></li>
</ul>
</details>
<br />

Updates `io.jsonwebtoken:jjwt-jackson` from 0.12.3 to 0.12.4


Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)


</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport 2.x backport to 2.x branch dependencies Pull requests that update a dependency file java Pull requests that update Java code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants