🚨 [security] Update omniauth: 1.9.1 → 1.9.2 (patch)#400
Open
depfu[bot] wants to merge 1 commit intodevelopfrom
Open
🚨 [security] Update omniauth: 1.9.1 → 1.9.2 (patch)#400depfu[bot] wants to merge 1 commit intodevelopfrom
depfu[bot] wants to merge 1 commit intodevelopfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🚨 Your current dependencies have known security vulnerabilities 🚨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this update. Please take a good look at what changed and the test results before merging this pull request.
What changed?
Security Advisories 🚨
🚨 OmniAuth's `lib/omniauth/failure_endpoint.rb` does not escape `message_key` value
Release Notes
1.9.2
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by 1 commit:
Do not use postentially harmful error message in redirectRelease Notes
5.0.0 (from changelog)
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by 61 commits:
Preparing for release, 5.0.0.Merge pull request #555 from dblock/ruby-3.0Test with Ruby 3.0.Merge pull request #554 from dblock/michaelherold-dash-nil-keysMerge branch 'dash-nil-keys' of https://github.com/michaelherold/hashie into michaelherold-dash-nil-keysMerge pull request #545 from jackjennings/masterUse ruby/setup-ruby and reset fetch depth.Fix: lock elasticsearch version in integration specs.Merge pull request #547 from danwa5/issue-546-trash-propertiesAdd #except under Ruby 3Fix CHANGELOG formattingMerge pull request #543 from hashie/create-github-actionTrack Omniauth official releasesAdd integration tests to CI harnessLint the CI configuration and update badgeRemove mention and configuration of CodeClimateFixed issue where a source hash key can be used in translating multiple propertiesRemove travis.ymlCreate initial actionMerge pull request #541 from amatsuda/uninclude_pretty_inspectHashie::Mash already includes Hashie::Extensions::PrettyInspect via Hashie::HashMerge pull request #537 from michaelherold/dash-consistencyMerge pull request #539 from anakinj/run-27-ci-only-onceMerge pull request #538 from michaelherold/drop-testing-for-old-rubiesDrop testing for unsupported RubiesDrop jruby-9.0.5.0 from build matrixRun 2.7 tests onceFix inconsistencies with Dash defaultsMerge pull request #536 from michaelherold/export-normal-hash-from-indifferentAllow exporting a normal, not-indifferent HashEnsure all properties are set on exported DashExpose `IndifferentAccess` conversion internallyFix an imprecise spec for `Dash#replace`Merge pull request #534 from voke/patch-1Fix typo in README for PredefinedValuesMerge pull request #533 from gnomex/fix-json-specs-errorrequire json at spec_helper to fix #532Add hash slice using IndifferentAccess.Merge pull request #530 from caalberts/dash-allowed-valuesAdd Hashie::Extensions::Dash::AllowListMerge pull request #527 from dblock/copyright-2020Updated Copyright to (c) 2009-2020 Intridea, Inc., and Contributors.Merge pull request #525 from yogeshjain999/indifferent-convert-changeSmall amendments for Hash#merge with IndifferentAccessMerge pull request #524 from aried3r/patch-2Set fast_finish: trueRun danger, integration with Ruby 2.7Rest with TruffleRuby, allow failureTry testing JRuby 9.0 on xenialAdd changelog entryTest with JRuby 9.2Test with Ruby 2.7Merge pull request #523 from dblock/danger-tocAdded TOC and upgraded danger-changelog to verify the keep-a-changelog formatted CHANGELOG.Hashie mascot (#522)Changes to `Mash` initialization key string conversion. (#521)Elasticsearch integration spec fix (#520)Merge pull request #517 from aried3r/patch-1Correct link to PR in CHANGELOG.mdRemove text I missed during releasePreparing for next development iteration, 4.1.1.Security Advisories 🚨
🚨 Denial of Service Vulnerability in Rack Multipart Parsing
🚨 Possible shell escape sequence injection vulnerability in Rack
Commits
See the full diff on Github. The new version differs by 18 commits:
fixup changelogbump versionBetter handling of case-insensitive headers for `Rack::Etag` middleware. (#1919)Add 'custom exception on params too deep error' change to CHANGELOG. (#1914)Expect additional optional version segment in version test. (#1913)Merge branch '2-2-sec' into 2-2-stableupdate changelogbump versionEscape untrusted text when loggingRestrict broken mime parsingEnsure Rack::QueryParser::ParamsTooDeepError is inherited from RangeError. (#1864)Add Ruby 2.3 compatibility for tests, add Ruby 2.3 to CI. (#1863)Merge pull request #1839 from RubyElders/2-2-stable-ciReplace CircleCI with GitHub Actions.Newer rubies spec compatibility.Merge pull request #1838 from RubyElders/custom-range-exception-2-2Use custom exception on params too deep error.Don't ary.inspect in the lint assertions (backport) (#1765)Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with
@depfu rebase.All Depfu comment commands