-
-
Notifications
You must be signed in to change notification settings - Fork 634
chore(deps): update dependency @simplewebauthn/browser to v13 #6871
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/simplewebauthn-browser-13.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+7
−9
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
COMPARE TO
|
| Name | Diff |
|---|---|
| packages/experience/package.json | 0 Bytes |
| pnpm-lock.yaml | 📉 -53 Bytes |
|
This PR is stale because it has been open 10 for days with no activity. Remove stale label or comment or this will be closed in 5 days. |
1ce16bb to
b00a8ac
Compare
9c689e9 to
9bb0a07
Compare
|
This PR is stale because it has been open for 30 days with no activity. |
9bb0a07 to
e63e684
Compare
e63e684 to
64deae3
Compare
64deae3 to
2b6bcc5
Compare
2b6bcc5 to
47a6ecc
Compare
47a6ecc to
c8a5722
Compare
c8a5722 to
8277c38
Compare
8277c38 to
a632af4
Compare
a632af4 to
4b581e7
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^10.0.0->^13.0.0Release Notes
MasterKale/SimpleWebAuthn (@simplewebauthn/browser)
v13.2.2Compare Source
Changes
increased software supply chain transparency, both
libraries are now published via GitHub Actions workflows. Package listings on
JSR and
NPM feature build transparency logs at the
bottom of their respective pages (#725,
#726,
#727)
v13.2.0Compare Source
Changes
verifyRegistrationResponse()has been defined more strictlyto communicate that
registrationInfowill only ever be present ifverifiedistrue(#715)
verifyRegistrationResponse()can now verify attestations containing SHA256 hashesby using EC public keys with the P-384 curve
(#721)
by setting
attestationSafetyNetEnforceCTSCheck: falsewhen callingverifyRegistrationResponse(). This check remains enforced by default(#722)
generic typing for
Uint8Arrayvia TypeScript 5.7.SimpleWebAuthn values of type
Uint8Array_are equivalent toUint8Arrayin Deno 2.1 andearlier, and
Uint8Array<ArrayBuffer>in Deno 2.2 and later.(#717)
v13.1.2Compare Source
Changes
ResidentKeyRequirementtype to help with type inference(#704)
v13.1.0Compare Source
Changes:
cross-fetchdependency has been removed from the project to silence in theconsole
DeprecationWarning's about a "punycode" module(#661)
startRegistration()andstartAuthentication()will now warn about calls madeusing the pre-v11 call structure to encourage refactoring to use the current call structure, but
still try to handle such calls the best they can
(#664)
v13.0.0Compare Source
Hot on the heels of the last major release, v13 introduces support for registration hints! Refined
types and improved attestation trust anchor verification are also included. Last but not least, we
say goodbye to one of the project's packages for better docs and fewer dependencies to install. Read
on for more information, including refactor advice for dealing with the retirement of
@simplewebauthn/types.
Changes:
preferredAuthenticatorTypeargument can be set when callinggenerateRegistrationOptions()to generate options that encourage the browser to direct the userto register one of three types of authenticators:
'securityKey','localDevice', or'remoteDevice'(a.k.a. opinionatedWebAuthn hints
support) (#653)
startRegistration()will recognizehintsif specified inoptionsJSON(#652)
(#650)
within the browser and server packages. See Breaking Changes below for more info
(#655)
Breaking Changes
@typescript/types is being retired
Its types will now be included directly in @simplewebauthn/browser and
@simplewebauthn/server.
To refactor existing imports from /types, simply import them from /browser or /server
instead:
Before:
After:
[server]
attestationTypeno longer accepts'indirect'The benefits of indirect attestation are too minimal to be useful for Relying Parties. In practice
it is almost never used over ignoring the concept completely with
'none'or needing to beintentional and setting
'direct'.RP's that have been specifying
attestationType: 'indirect'when callinggenerateRegistrationOptions()will need to refactor their code to either omitattestationType(generateRegistrationOptions()will default toattestationType: 'none') or setattestationType: 'direct'instead:Before:
After:
-or-
v12.0.0Compare Source
All SimpleWebAuthn packages are now available for installation from the
JavaScript Registry (JSR)! JSR is an "open-source package registry
for modern JavaScript and TypeScript" - you can read more about this new package registry and its
ESM-centric capabilities here.
All packages in v12.0.0 are functionally identical to v11.0.0! And JSR package hosting is in
addition to existing package hosting on NPM. Nothing changes about package installation via
npm install. Read on for more information.Packages
Changes
imports are supported (#634)
@simplewebauthn/browser (#634)
To install from JSR, use
npx jsr add @​simplewebauthn/...ordeno add jsr:@​simplewebauthn/...depending on which package manager is available.
Projects using
npmfor package management:Projects using
denofor package management:Projects using HTTPS modules via deno.land/x:
v12.0.0 officially deprecates importing SimpleWebAuthn from deno.land/x. See Breaking Changes
below for refactor guidance.
Breaking Changes
Importing SimpleWebAuthn packages from
"https://deno.land/x/simplewebauthn/..."URLs is no longersupported. Please use Deno's native support for JSR imports instead, available in projects running
Deno v1.42 and higher.
Before:
After:
Alternatively, use
deno addto install these packages fromJSR:
v11.0.0Compare Source
Say hello to support for automatic passkey registration, support for valid conditional UI
<input>elements stashed away in web components, and to the new
WebAuthnCredentialtype that modernizessome logic within.
There are some breaking changes in this release! Please see Breaking Changes below for refactor
guidance.
Packages
Changes
useAutoRegisterargument has been added tostartRegistration()tosupport attempts to automatically register passkeys for users who just completed non-passkey auth.
verifyRegistrationResponse()has gained a newrequireUserPresenceoption that can be set tofalsewhen verifying responses fromstartRegistration({ useAutoRegister: true, ... })(#623)
verifyBrowserAutofillInputargument has been added tostartAuthentication()to disable throwing an error when a correctly configured<input>elementcannot be found (but perhaps a valid one is present in a web component shadow's DOM)
(#621)
AuthenticatorDevicetype has been renamed toWebAuthnCredentialandhas had its properties renamed. The return value out of
verifyRegistrationResponse()andcorresponding inputs into
verifyAuthenticationResponse()have been updated accordingly. SeeBreaking Changes below for refactor guidance
(#625)
verifyRegistrationResponse()now verifies that the authenticator data AAGUIDmatches the leaf cert's
id-fido-gen-ce-aaguidextension AAGUID when it is present(#609)
IBM (#610)
uvmanddpkhave been removed(#611)
Breaking Changes
[browser] Positional arguments in
startRegistration()andstartAuthentication()have been replaced by a single objectProperty names in the object match the names of the previously-positional arguments. To update
existing implementations, wrap existing options in an object with corresponding properties:
Before:
After:
[server] [types] The
AuthenticatorDevicetype has been renamed toWebAuthnCredentialAuthenticatorDevice.credentialIDandAuthenticatorDevice.credentialPublicKeyhave been shortenedto
WebAuthnCredential.idandWebAuthnCredential.publicKeyrespectively.verifyRegistrationResponse()has been updated accordingly to return a newcredentialvalue oftype
WebAuthnCredential. Update code that storescredentialID,credentialPublicKey, andcounterout ofverifyRegistrationResponse()to storecredential.id,credential.publicKey,and
credential.counterinstead:Before:
After:
Update calls to
verifyAuthenticationResponse()to match the newcredentialargument thatreplaces the
authenticatorargument:Before:
After:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.