-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency duende.accesstokenmanagement to v3 #204
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🦙 MegaLinter status:
|
Descriptor | Linter | Files | Fixed | Errors | Elapsed time |
---|---|---|---|---|---|
✅ ACTION | actionlint | 5 | 0 | 0.11s | |
✅ BASH | bash-exec | 1 | 0 | 0.0s | |
✅ BASH | shellcheck | 1 | 0 | 0.01s | |
✅ BASH | shfmt | 1 | 0 | 0.02s | |
csharpier | 95 | 1 | 6.22s | ||
roslynator | 3 | 2 | 46.62s | ||
✅ DOCKERFILE | hadolint | 1 | 0 | 0.23s | |
✅ EDITORCONFIG | editorconfig-checker | 184 | 0 | 2.79s | |
✅ JSON | jsonlint | 29 | 0 | 0.26s | |
✅ JSON | prettier | 29 | 0 | 5.03s | |
✅ JSON | v8r | 29 | 0 | 17.76s | |
✅ MARKDOWN | markdownlint | 4 | 0 | 1.37s | |
✅ PROTOBUF | protolint | 4 | 0 | 4.91s | |
✅ REPOSITORY | checkov | yes | no | 14.38s | |
✅ REPOSITORY | dustilock | yes | no | 0.01s | |
✅ REPOSITORY | gitleaks | yes | no | 0.34s | |
✅ REPOSITORY | git_diff | yes | no | 0.07s | |
✅ REPOSITORY | grype | yes | no | 14.58s | |
✅ REPOSITORY | kics | yes | no | 19.91s | |
✅ REPOSITORY | secretlint | yes | no | 1.4s | |
✅ REPOSITORY | syft | yes | no | 0.38s | |
✅ REPOSITORY | trivy | yes | no | 10.69s | |
✅ REPOSITORY | trivy-sbom | yes | no | 1.05s | |
✅ REPOSITORY | trufflehog | yes | no | 6.9s | |
✅ XML | xmllint | 2 | 0 | 0.01s | |
✅ YAML | prettier | 30 | 0 | 1.55s | |
✅ YAML | v8r | 30 | 0 | 43.54s | |
✅ YAML | yamllint | 30 | 0 | 1.26s |
See detailed report in MegaLinter reports
You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.
renovate
bot
force-pushed
the
renovate/duende.accesstokenmanagement-3.x
branch
from
October 20, 2024 11:00
0656974
to
058ea71
Compare
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
Microsoft.AspNetCore.App.Runtime.linux-x64 |
CVE-2024-38229 | HIGH | 8.0.8 | 9.0.0-rc.2.24474.3, 8.0.10 |
No Misconfigurations found
usr/share/dotnet/shared/Microsoft.NETCore.App/8.0.8/Microsoft.NETCore.App.deps.json
No Vulnerabilities found
No Misconfigurations found
Minimum allowed line rate is iter8 reportExperiment summary:
*******************
Experiment completed: true
No task failures: true
Total number of tasks: 7
Number of completed tasks: 7
Number of completed loops: 1
Whether or not service level objectives (SLOs) are satisfied:
*************************************************************
SLO Conditions | Satisfied
-------------- | ---------
http/error-count <= 0 | true
http/latency-mean (msec) <= 25 | true
http/latency-p99 (msec) <= 85 | true
Latest observed values for metrics:
***********************************
Metric | value
------- | -----
http/error-count | 0.00
http/error-rate | 0.00
http/latency-max (msec) | 952.02
http/latency-mean (msec) | 15.98
http/latency-min (msec) | 2.17
http/latency-p50 (msec) | 8.22
http/latency-p75 (msec) | 17.28
http/latency-p90 (msec) | 48.42
http/latency-p95 (msec) | 56.62
http/latency-p99 (msec) | 69.38
http/latency-p99.9 (msec) | 111.85
http/latency-stddev (msec) | 21.35
http/request-count | 25000.00
|
chgl
approved these changes
Oct 21, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.1.2
->3.0.0
Release Notes
DuendeSoftware/Duende.AccessTokenManagement (Duende.AccessTokenManagement)
v3.0.0
Compare Source
This is a major release of Duende.AccessTokenManagement and Duende.AccessTokenManagement.OpenIdConnect. Highlights include
Breaking Changes
OpenIdConnectUserAccessTokenHandler
no longer depends onHttpContext
, and instead depends on the newIUserAccessor
interface. This change allows us to use the handler in Blazor Server projects. If you have customized the handler in a derived class, update your derived class's constructor to depend on theIUserAccessor
and pass that to the handler's constructor. You probably don't need to implementIUserAccessor
- the default implementation of theIUserAccessor
is registered automatically and accesses the current user from theHttpContext
, and a blazor server specific implementation is also available.OpenIdConnectUserAccessTokenHandler
also now takes a direct dependency on theIUserTokenManagementService
, rather than resolving it from theHttpContext
. Again, if you have customized the handler in a derived class, you'll need to update constructors.Blazor Server Support
This release improves our support for Blazor Server. We've added a new method to use when registering services:
AddBlazorServerAccessTokenManagement
. This method sets up dependencies needed specifically in a Blazor Server environment, including retrieving the current user without usingHttpContext
when it is not available. This simplifies creatingHttpClient
s that use the current user's access token.Blazor Server implementations have always required a server side token store (an implementation of
ITokenStore
). You should pass your implementation ofITokenStore
toAddBlazorServerAccessTokenManagement
's type parameter.We've also exposed the logic related to storage of tokens in an
AuthenticationTicket
as a new service.Dependencies
Our approach for dependencies is to depend on the minimum patch version that accomplishes
the following:
Full Changelog
Blazor Support
Bugs and Improvements
Dependencies
Dependabot
New Contributors
Full Changelog: DuendeSoftware/Duende.AccessTokenManagement@2.1.2...3.0.0
Configuration
📅 Schedule: Branch creation - "every 3 months on the first day of the month" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.