Skip to content

Releases: nats-io/jwt

Release v2.0.2

04 May 16:10
babf3f0
Compare
Choose a tag to compare

Changelog

Fixed

  • Regular expression to accept EOF/newline at the end of the decoration (#151)

Complete Changes

v2.0.1...v2.0.2

Release v2.0.1

14 Mar 23:13
22bf1cf
Compare
Choose a tag to compare

Changelog

Fixed

  • Import validation to return error when token are in the wrong context (#149)

Complete Changes

v2.0.0...v2.0.1

Release v2.0.0

14 Mar 19:53
a84d3be
Compare
Choose a tag to compare

Changelog

Added

  • Information link and description to account and export (#122)
  • Ability to specify headers for latency tracking (#125)
  • Ability to have wildcards export/imports (#131)
  • Roles for signing keys (#129)
  • Generic claims can now have custom types (#132)
  • Keys() function to SigningKeys which returns all signing keys in the account (#134)
  • New field LocalSubject to rename the remote subject (#137)
  • Accessor to read To without deprecation warning (#138)
  • Flag enforcing subordinate objects to be signed with signing keys (#140)
  • Advertise flag to exports and extending maximum description length (#143)
  • Support for account mappings (#145)

Deprecated

  • The To subject in imports (#137)

Removed

  • JWT activation token as URL and corresponding download (#144)

Fixed

  • Import token validation (#124)
  • Removed unnecessary warning for imports without token (#130)
  • Ensure that generic claims type is a string (#133)
  • Missing validation for permissions (#139)
  • Fixed default value for JetStream to be 0 (disabled) (#141)
  • op.DidSign(op) when strict signing key usage was enforced (#142)

Updated

  • Dependencies to nkeys v0.3.0 (#147)

Complete Changes

v1.2.2...v2.0.0

Release v1.2.2

30 Nov 16:49
0ea3265
Compare
Choose a tag to compare

Changelog

Fixed

  • Make the error more meaningful when parsing a newer JWT (#119)

Complete Changes

v1.2.0...v1.2.2

Release v1.2.0

30 Oct 23:40
057ba30
Compare
Choose a tag to compare

Changelog

Added

  • Allow revocations to have a pub key of '*' which matches any JWT issued. This enables mass revocations based on a single time without the need to know the public key (#114)

Complete Changes

v1.1.0...v1.2.0

Release v1.1.0

21 Oct 15:51
7507723
Compare
Choose a tag to compare

Changelog

Added

  • IsClaimRevoked() to check user claim and fixed some comments (#108)

Fixed

  • Import/Export validation issue with nil values (#107)
  • Make IsRevoked timestamp check inclusive (#109)
  • Documentation for JWT activation revocation (#110)

Complete Changes

v1.0.1...v1.1.0

Release v1.0.1

29 May 19:52
Compare
Choose a tag to compare

Changelog

Added

  • BearerToken field to the user JWT (#62)
  • SystemAccount identity to operator (#77)

Changed

  • Remove permissions validation in the library (#70)
  • Relaxed regular expression allowing optional carriage returns (#72)

Updated

  • NKeys dependency (#74)

Complete Changes

v0.3.2...v1.0.1

Release v0.3.2

14 Nov 21:48
0c3fc7a
Compare
Choose a tag to compare

Changelog

Updated

  • Sorting of imports and exports on account claim encoding (#56)

Fixed

  • Block imports with wildcards (#58)
  • Added back blank lines that were removed when decoration code was moved from nsc to jwt (#57)

Complete Changes

v0.3.0...v0.3.2

v0.3.0

20 Sep 17:04
Compare
Choose a tag to compare
  • Added a validation that a service import cannot duplicate the subject #55
  • Removed the internal wipeSlice functionality from ParseDecoratedJWT/NKey client code should to wipe slices as they were the ones creating them #48
  • Added doc description to the operator JWT fields #50

v0.2.16

18 Sep 15:07
9193286
Compare
Choose a tag to compare

This release adds the ability to track service latency for exported services.