Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automated dependency upgrades #289

Closed

Conversation

hc-github-team-secure-vault-ecosystem
Copy link
Contributor

Full log: https://github.com/hashicorp/vault-plugin-auth-jwt/actions/runs/8501822747

IMPROVEMENTS:

  • Updated dependencies:
    • github.com/hashicorp/cap v0.5.0 -> v0.6.0
    • github.com/hashicorp/vault/api v1.12.0 -> v1.12.2
    • github.com/hashicorp/vault/sdk v0.11.0 -> v0.11.1
    • github.com/stretchr/testify v1.8.4 -> v1.9.0
    • golang.org/x/oauth2 v0.17.0 -> v0.18.0
    • google.golang.org/api v0.163.0 -> v0.172.0

@hc-github-team-secure-vault-ecosystem hc-github-team-secure-vault-ecosystem added the dependencies Pull requests that update a dependency file label Apr 1, 2024
@hc-github-team-secure-vault-core

Vault CI check PR: hashicorp/vault#26218

@tvoran
Copy link
Member

tvoran commented Apr 2, 2024

This plugin needs to be updated to go 1.21, but these updates are also bringing in go-oidc v3.10.0, which started using go-jose v4, whose ParseSigned() now requires a set of allow-listed algorithms. The testJWT uses algorithm HS256, which isn't an allowed algorithm.

@fairclothjm fairclothjm closed this Apr 5, 2024
@fairclothjm fairclothjm deleted the auto-dependency-upgrades branch April 5, 2024 15:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants