-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issues in upgrading to 0.12.6 #957
Comments
A couple of things, CVE-2024-31033 is contested, there is a bit more discussion around it here: #930 TL;DR we are waiting for that to get resolved. (but I get it... nobody wants vuln reports, even false reports in their builds) Related to 0.12.6, the error you are seeing is related to your You can read more about how the In order to support non JWT content types, you can use the method: There is a similar discussion on this here: #897 (where there is also some discussion on wrapping this logic in a something like a Your feedback on the ideas in that thread would be helpful! |
I, too, am having an issue with migrating to version 0.12.6. An example from my original code looks like this:
It is flagged with warnings regarding deprecation. I thought that the way to update it was to do this:
But that fails because the members of the How should one go about migrating usages of the deprecated |
@tonedef71 it's hard to tell without seeing the type of For example, if the Does that help? Hopefully that makes sense, but if not, let me know and we'll figure it out :) |
@lhazlewood Thank you for the reply. I have a utility POJO that dynamically derives signing keys and such based on configuration property
I conveniently refer to the various key interface types by their base interface type |
@lhazlewood When the audience of the JWT is a single recipient, how does one coax UPDATE: |
@tonedef71 it's deprecated to discourage its use, the RFC updated to prefer/recommend a String array, so people ideally shouldn't be using single string values anymore. It's there for backwards compatibility for legacy systems only. I hope that helps! Also, if additional context helps, there's this as well: #944 (comment) |
@lhazlewood SIGH I dislike deprecation warnings. Oracle NetSuite seems to reject JWTs with single value arrays. Do you plan on keeping all of the deprecated stuff around in future releases of the library indefinitely? |
@tonedef71 when we release v 1.0, we will remove all deprecated methods except this one and any others mandated as a requirement by the RFCs. For the very few (one? two? can't remember) that must remain per RFC requirements, marking them In this particular case, you can't see it without viewing the source code, but we have an internal developer note for that specific API method to ensure its later retention:
|
They are in clear violation of the RFCs then. If you have the ability to submit a ticket to them, it could help others. 🙏 |
Will |
There are two overloaded variants of that method that are not marked as deprecated and will remain, but the other 4 currently marked as deprecated will be removed because they:
|
@lhazlewood Thank you for elaborating further. What does one need to do to get |
@tonedef71 Per that method's JavaDoc (which references I hope that helps! 😄 |
@lhazlewood Thank you, but I should have been more specific. How does one coax the simple method |
By the way, the old |
@tonedef71 those qualifications are documented in the This precedence was defined long ago in JJWT's history when JDK 8 was the dominant/most-adopted JDK because the PS* algorithms weren't introduced until JDK 11, implying This will likely change in future JJWT releases however because RSA PS* algorithms are always better than the RS* ones due to the additional secure-random elements in every PS* signature. So I definitely recommend using the overloaded |
No, it will be removed because the newer |
Hello! I am tring to upgrade twilio-java to 0.12.6. This because of some known vulnerabilities like CVE-2024-31033 in jjwt 0.11.2. I saw there are some breaking changes in 0.12 version. Since this vulnerability is a blocker for our customers, we have to upgrade. However, I would appreciate if there is some other way we can get rid of this vulnerability.
Anyways, the main issue is that while upgrading to 0.12.6 I am facing a lot of errors. Here is the PR that I have raised. For example, setSigningKey method (though it is deprecated, it is showing errors.
Can someone help in upgrading the version? Maybe if there is some upgrade guide, that would be helpful.
The text was updated successfully, but these errors were encountered: