-
-
Notifications
You must be signed in to change notification settings - Fork 125
fix(deps): update dependency @simplewebauthn/server to v13 #2377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/simplewebauthn-server-13.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+243
−123
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
d4fec5e
to
6261609
Compare
10e7403
to
8a97e2c
Compare
8a97e2c
to
92a3ba5
Compare
dfde46b
to
c54204e
Compare
e7ee6b7
to
fa3cc8e
Compare
d5b94bd
to
74cd5bd
Compare
74cd5bd
to
49fb5b1
Compare
e9b07ec
to
2459093
Compare
6a9cda5
to
1bff812
Compare
7fb3ad3
to
e33b88c
Compare
e33b88c
to
e706f94
Compare
e706f94
to
c74c7c2
Compare
dc1e72e
to
8789638
Compare
8789638
to
951c941
Compare
951c941
to
9d15e5f
Compare
SafeDep Report Summary⚠ 1 packages are identified as suspicious, human review is recommended. Package Details
This report is generated by SafeDep Github App. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Coming soon: The Renovate bot (GitHub App) will be renamed to Mend. PRs from Renovate will soon appear from 'Mend'. Learn more here.
This PR contains the following updates:
10.0.1
->13.2.1
Release Notes
MasterKale/SimpleWebAuthn (@simplewebauthn/server)
v13.2.1
Compare Source
Changes:
generateRegistrationOptions()
will now correctly encoded theuserID
argument tobase64url when it is an instance of Node's
Buffer
(#724)
v13.2.0
Compare Source
Changes
verifyRegistrationResponse()
has been defined more strictlyto communicate that
registrationInfo
will only ever be present ifverified
istrue
(#715)
verifyRegistrationResponse()
can now verify attestations containing SHA256 hashesby using EC public keys with the P-384 curve
(#721)
by setting
attestationSafetyNetEnforceCTSCheck: false
when callingverifyRegistrationResponse()
. This check remains enforced by default(#722)
generic typing for
Uint8Array
via TypeScript 5.7.SimpleWebAuthn values of type
Uint8Array_
are equivalent toUint8Array
in Deno 2.1 andearlier, and
Uint8Array<ArrayBuffer>
in Deno 2.2 and later.(#717)
v13.1.2
Compare Source
Changes
ResidentKeyRequirement
type to help with type inference(#704)
v13.1.1
Compare Source
Changes:
"android-key"
attestation statement verification has been modernized(#675)
"tpm"
attestation statements(#673)
v13.1.0
Compare Source
Changes:
cross-fetch
dependency has been removed from the project to silence in theconsole
DeprecationWarning
's about a "punycode
" module(#661)
startRegistration()
andstartAuthentication()
will now warn about calls madeusing the pre-v11 call structure to encourage refactoring to use the current call structure, but
still try to handle such calls the best they can
(#664)
v13.0.0
Compare Source
Hot on the heels of the last major release, v13 introduces support for registration hints! Refined
types and improved attestation trust anchor verification are also included. Last but not least, we
say goodbye to one of the project's packages for better docs and fewer dependencies to install. Read
on for more information, including refactor advice for dealing with the retirement of
@simplewebauthn/types.
Changes:
preferredAuthenticatorType
argument can be set when callinggenerateRegistrationOptions()
to generate options that encourage the browser to direct the userto register one of three types of authenticators:
'securityKey'
,'localDevice'
, or'remoteDevice'
(a.k.a. opinionatedWebAuthn hints
support) (#653)
startRegistration()
will recognizehints
if specified inoptionsJSON
(#652)
(#650)
within the browser and server packages. See Breaking Changes below for more info
(#655)
Breaking Changes
@typescript/types is being retired
Its types will now be included directly in @simplewebauthn/browser and
@simplewebauthn/server.
To refactor existing imports from /types, simply import them from /browser or /server
instead:
Before:
After:
[server]
attestationType
no longer accepts'indirect'
The benefits of indirect attestation are too minimal to be useful for Relying Parties. In practice
it is almost never used over ignoring the concept completely with
'none'
or needing to beintentional and setting
'direct'
.RP's that have been specifying
attestationType: 'indirect'
when callinggenerateRegistrationOptions()
will need to refactor their code to either omitattestationType
(generateRegistrationOptions()
will default toattestationType: 'none'
) or setattestationType: 'direct'
instead:Before:
After:
-or-
v12.0.0
Compare Source
All SimpleWebAuthn packages are now available for installation from the
JavaScript Registry (JSR)! JSR is an "open-source package registry
for modern JavaScript and TypeScript" - you can read more about this new package registry and its
ESM-centric capabilities here.
All packages in v12.0.0 are functionally identical to v11.0.0! And JSR package hosting is in
addition to existing package hosting on NPM. Nothing changes about package installation via
npm install
. Read on for more information.Packages
Changes
imports are supported (#634)
@simplewebauthn/browser (#634)
To install from JSR, use
npx jsr add @​simplewebauthn/...
ordeno add jsr:@​simplewebauthn/...
depending on which package manager is available.
Projects using
npm
for package management:Projects using
deno
for package management:Projects using HTTPS modules via deno.land/x:
v12.0.0 officially deprecates importing SimpleWebAuthn from deno.land/x. See Breaking Changes
below for refactor guidance.
Breaking Changes
Importing SimpleWebAuthn packages from
"https://deno.land/x/simplewebauthn/..."
URLs is no longersupported. Please use Deno's native support for JSR imports instead, available in projects running
Deno v1.42 and higher.
Before:
After:
Alternatively, use
deno add
to install these packages fromJSR:
v11.0.0
Compare Source
Say hello to support for automatic passkey registration, support for valid conditional UI
<input>
elements stashed away in web components, and to the new
WebAuthnCredential
type that modernizessome logic within.
There are some breaking changes in this release! Please see Breaking Changes below for refactor
guidance.
Packages
Changes
useAutoRegister
argument has been added tostartRegistration()
tosupport attempts to automatically register passkeys for users who just completed non-passkey auth.
verifyRegistrationResponse()
has gained a newrequireUserPresence
option that can be set tofalse
when verifying responses fromstartRegistration({ useAutoRegister: true, ... })
(#623)
verifyBrowserAutofillInput
argument has been added tostartAuthentication()
to disable throwing an error when a correctly configured<input>
elementcannot be found (but perhaps a valid one is present in a web component shadow's DOM)
(#621)
AuthenticatorDevice
type has been renamed toWebAuthnCredential
andhas had its properties renamed. The return value out of
verifyRegistrationResponse()
andcorresponding inputs into
verifyAuthenticationResponse()
have been updated accordingly. SeeBreaking Changes below for refactor guidance
(#625)
verifyRegistrationResponse()
now verifies that the authenticator data AAGUIDmatches the leaf cert's
id-fido-gen-ce-aaguid
extension AAGUID when it is present(#609)
IBM (#610)
uvm
anddpk
have been removed(#611)
Breaking Changes
[browser] Positional arguments in
startRegistration()
andstartAuthentication()
have been replaced by a single objectProperty names in the object match the names of the previously-positional arguments. To update
existing implementations, wrap existing options in an object with corresponding properties:
Before:
After:
[server] [types] The
AuthenticatorDevice
type has been renamed toWebAuthnCredential
AuthenticatorDevice.credentialID
andAuthenticatorDevice.credentialPublicKey
have been shortenedto
WebAuthnCredential.id
andWebAuthnCredential.publicKey
respectively.verifyRegistrationResponse()
has been updated accordingly to return a newcredential
value oftype
WebAuthnCredential
. Update code that storescredentialID
,credentialPublicKey
, andcounter
out ofverifyRegistrationResponse()
to storecredential.id
,credential.publicKey
,and
credential.counter
instead:Before:
After:
Update calls to
verifyAuthenticationResponse()
to match the newcredential
argument thatreplaces the
authenticator
argument:Before:
After:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.