Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency duende.accesstokenmanagement to v3 #204

Merged
merged 1 commit into from
Oct 21, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 1, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Duende.AccessTokenManagement 2.1.2 -> 3.0.0 age adoption passing confidence

Release Notes

DuendeSoftware/Duende.AccessTokenManagement (Duende.AccessTokenManagement)

v3.0.0

Compare Source

This is a major release of Duende.AccessTokenManagement and Duende.AccessTokenManagement.OpenIdConnect. Highlights include

  • Improved support for Blazor Server
  • Updates to dependencies
  • Bug fixes and improvements

Breaking Changes

  • Support for .NET 6 and 7 has been dropped, as Microsoft either no longer supports or soon will no longer support those versions in the coming months. Duende.AccessTokenManagement Version 2.1 (which supports .NET 6 and 7) will continue to be supported until .NET 6 reaches end of life in November.
  • The OpenIdConnectUserAccessTokenHandler no longer depends on HttpContext, and instead depends on the new IUserAccessor interface. This change allows us to use the handler in Blazor Server projects. If you have customized the handler in a derived class, update your derived class's constructor to depend on the IUserAccessor and pass that to the handler's constructor. You probably don't need to implement IUserAccessor - the default implementation of the IUserAccessor is registered automatically and accesses the current user from the HttpContext, and a blazor server specific implementation is also available.
  • The OpenIdConnectUserAccessTokenHandler also now takes a direct dependency on the IUserTokenManagementService, rather than resolving it from the HttpContext. Again, if you have customized the handler in a derived class, you'll need to update constructors.

Blazor Server Support

This release improves our support for Blazor Server. We've added a new method to use when registering services: AddBlazorServerAccessTokenManagement. This method sets up dependencies needed specifically in a Blazor Server environment, including retrieving the current user without using HttpContext when it is not available. This simplifies creating HttpClients that use the current user's access token.

Blazor Server implementations have always required a server side token store (an implementation of ITokenStore). You should pass your implementation of ITokenStore to AddBlazorServerAccessTokenManagement's type parameter.

We've also exposed the logic related to storage of tokens in an AuthenticationTicket as a new service.

Dependencies

  • We now depend on:
    • version 7.0.0 or later of IdentityModel
    • version 8.0.1 or later of the ASP.NET OpenIdConnect Authentication Handler (Microsoft.AspNetCore.Authentication.OpenIdConnect)
    • version 7.1.2 or later of the Microsoft JWT Handler (System.IdentityModel.Tokens.Jwt)

Our approach for dependencies is to depend on the minimum patch version that accomplishes
the following:

  • Avoid depending on a version of a package that has a known security vulnerability
  • Avoid depending on a version that has a transitive dependency on a version of a package that has a known vulnerability
  • Depend on the same version of the Microsoft JWT handler as the ASP.NET OpenIdConnect Authentication Handler

Full Changelog

Blazor Support
Bugs and Improvements
Dependencies
Dependabot

New Contributors

Full Changelog: DuendeSoftware/Duende.AccessTokenManagement@2.1.2...3.0.0


Configuration

📅 Schedule: Branch creation - "every 3 months on the first day of the month" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Oct 1, 2024

🦙 MegaLinter status: ⚠️ WARNING

Descriptor Linter Files Fixed Errors Elapsed time
✅ ACTION actionlint 5 0 0.11s
✅ BASH bash-exec 1 0 0.0s
✅ BASH shellcheck 1 0 0.01s
✅ BASH shfmt 1 0 0.02s
⚠️ CSHARP csharpier 95 1 6.22s
⚠️ CSHARP roslynator 3 2 46.62s
✅ DOCKERFILE hadolint 1 0 0.23s
✅ EDITORCONFIG editorconfig-checker 184 0 2.79s
✅ JSON jsonlint 29 0 0.26s
✅ JSON prettier 29 0 5.03s
✅ JSON v8r 29 0 17.76s
✅ MARKDOWN markdownlint 4 0 1.37s
✅ PROTOBUF protolint 4 0 4.91s
✅ REPOSITORY checkov yes no 14.38s
✅ REPOSITORY dustilock yes no 0.01s
✅ REPOSITORY gitleaks yes no 0.34s
✅ REPOSITORY git_diff yes no 0.07s
✅ REPOSITORY grype yes no 14.58s
✅ REPOSITORY kics yes no 19.91s
✅ REPOSITORY secretlint yes no 1.4s
✅ REPOSITORY syft yes no 0.38s
✅ REPOSITORY trivy yes no 10.69s
✅ REPOSITORY trivy-sbom yes no 1.05s
✅ REPOSITORY trufflehog yes no 6.9s
✅ XML xmllint 2 0 0.01s
✅ YAML prettier 30 0 1.55s
✅ YAML v8r 30 0 43.54s
✅ YAML yamllint 30 0 1.26s

See detailed report in MegaLinter reports

You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.

MegaLinter is graciously provided by OX Security

@renovate renovate bot force-pushed the renovate/duende.accesstokenmanagement-3.x branch from 0656974 to 058ea71 Compare October 20, 2024 11:00
Copy link

Trivy image scan report

ghcr.io/miracum/fhir-pseudonymizer:pr-204 (ubuntu 24.04)

No Vulnerabilities found

No Misconfigurations found

opt/fhir-pseudonymizer/FhirPseudonymizer.deps.json

No Vulnerabilities found

No Misconfigurations found

opt/fhir-pseudonymizer/packages.lock.json

No Vulnerabilities found

No Misconfigurations found

usr/share/dotnet/shared/Microsoft.AspNetCore.App/8.0.8/Microsoft.AspNetCore.App.deps.json

1 known vulnerabilities found (LOW: 0 CRITICAL: 0 HIGH: 1 MEDIUM: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
Microsoft.AspNetCore.App.Runtime.linux-x64 CVE-2024-38229 HIGH 8.0.8 9.0.0-rc.2.24474.3, 8.0.10

No Misconfigurations found

usr/share/dotnet/shared/Microsoft.NETCore.App/8.0.8/Microsoft.NETCore.App.deps.json

No Vulnerabilities found

No Misconfigurations found

Copy link

github-actions bot commented Oct 20, 2024

Code Coverage

Package Line Rate Branch Rate Health
FhirPseudonymizer.Tests 100% 100%
FhirPseudonymizer 74% 65%
Summary 81% (826 / 1018) 69% (95 / 138)

Minimum allowed line rate is 50%


iter8 report

Experiment summary:
*******************

  Experiment completed: true
  No task failures: true
  Total number of tasks: 7
  Number of completed tasks: 7
  Number of completed loops: 1

Whether or not service level objectives (SLOs) are satisfied:
*************************************************************

  SLO Conditions                 | Satisfied
  --------------                 | ---------
  http/error-count <= 0          | true
  http/latency-mean (msec) <= 25 | true
  http/latency-p99 (msec) <= 85  | true
  

Latest observed values for metrics:
***********************************

  Metric                     | value
  -------                    | -----
  http/error-count           | 0.00
  http/error-rate            | 0.00
  http/latency-max (msec)    | 952.02
  http/latency-mean (msec)   | 15.98
  http/latency-min (msec)    | 2.17
  http/latency-p50 (msec)    | 8.22
  http/latency-p75 (msec)    | 17.28
  http/latency-p90 (msec)    | 48.42
  http/latency-p95 (msec)    | 56.62
  http/latency-p99 (msec)    | 69.38
  http/latency-p99.9 (msec)  | 111.85
  http/latency-stddev (msec) | 21.35
  http/request-count         | 25000.00
  

@chgl chgl merged commit 745909c into master Oct 21, 2024
16 checks passed
@renovate renovate bot deleted the renovate/duende.accesstokenmanagement-3.x branch October 21, 2024 15:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant