Skip to content

Releases: panva/jose

v1.5.1

27 Jul 09:27
Compare
Choose a tag to compare

Bug Fixes

  • correctly pad integers when importing RSA JWK (1dc7f35)

v1.5.0

23 Jul 12:58
Compare
Choose a tag to compare

Features

  • validate JWTs according to a JWT profile - ID Token (6c98b61)

It is now possible to pass a profile to JWT.verify and have the JWT validated according to it. This makes sure you pass all the right options and that required claims are present, prohibited claims are missing and that the right JWT typ is used.

More profiles will be added in the future.

v1.4.1

14 Jul 16:31
Compare
Choose a tag to compare

Bug Fixes

  • honour the JWT.sign jti option (36c9ce2), closes #33

v1.4.0

08 Jul 20:10
Compare
Choose a tag to compare

Features

  • add secp256k1 EC Key curve and ES256K (211d7af)

v1.3.0

21 Jun 13:05
Compare
Choose a tag to compare

Features

  • compute private RSA key p, q, dp, dq, qi when omitted (6e3d6fd), closes #26
  • add support for JWK x5c, x5t and x5t#S256 (9d46c48)
  • instances of JWKS.KeyStore are now iterable (e.g. for ... of) (2eae293)

Bug Fixes

  • limit calculation of missing RSA private components (5b53cb0)
  • reject rsa keys without all factors and exponents with a specific message (b0ff436)

Deprecations

  • this deprecates the use of JWK.importKey in favor of JWK.asKey
  • this deprecates the use of JWKS.KeyStore.fromJWKS in favor of JWKS.asKeyStore

Both JWK.importKey and JWKS.KeyStore.fromJWKS could have resulted in the process getting blocked when large bitsize RSA private keys were missing their components and could also result in an endless calculation loop when the private key's private exponent was outright invalid or tampered with.

The new methods still allow to import private RSA keys with these optimization key parameters missing but its disabled by default and one should choose to enable it when working with keys from trusted sources

It is recommended not to use @panva/jose versions with this feature in its original on-by-default form - v1.1.0 and v1.2.0

v1.0.2

13 May 09:19
Compare
Choose a tag to compare

Bug Fixes

  • add missing keystore.toJWKS() .d.ts definition (c7a8606), closes #25

v1.0.1

27 Apr 18:05
Compare
Choose a tag to compare

Bug Fixes

  • oct key ts "k" type fix (0750d2c)

v1.0.0

23 Apr 16:05
Compare
Choose a tag to compare

Bug Fixes

  • fail to import invalid PEM formatted strings and buffers (857dc2b)

Features

  • add JWK key_ops support, fix .algorithms() op returns (23b874c)
  • add key.toPEM() export function with optional encryption (1159b0d)
  • add OKP Key and EdDSA sign/verify support (2dbd3ed), closes #12

BREAKING CHANGES

  • key.algorithms(op) un+wrapKey was split into correct wrapKey/unwrapKey/deriveKey returns
  • keystore.all and keystore.get operation option was removed, key_ops: string[] supersedes it
  • node.js minimal version is now v12.0.0 due to its added EdDSA support (crypto.sign, crypto.verify and eddsa key objects)

v0.12.0

07 Apr 12:15
Compare
Choose a tag to compare

Reverts

  • add EC P-256K JWK and ES256K sign/verify support (e21fea1)

BREAKING CHANGES

  • removing ES256K alg and EC P-256K crv support until the IETF WG decides on what the final names will be.

v0.11.5

04 Apr 09:11
Compare
Choose a tag to compare

Features

  • add key.secret and key.type for completeness (2dd7053)
  • add key.thumbprint always returning the JWK Thumbprint (RFC7638) (65db7e0)