Bump sslcontext-kickstart-for-pem from 7.4.11 to 8.3.7
Bumps sslcontext-kickstart-for-pem from 7.4.11 to 8.3.7.
Changelog
Sourced from sslcontext-kickstart-for-pem's changelog.
v8.3.7
- Added Apache5SslUtils toTlsSocketStrategy method
- Marked Apache5SslUtils toSocketFactory method as deprecated
- Bumped dependencies
v8.3.6
- Bumped dependencies
- Enhanced logging within LoggingX509ExtendedTrustManager
- Exposed JDK (aka cacert) keystore and System property derived keystore in KeyStoreUtils
v8.3.5
- Removed verbose debug logging for CertificateUtils
- Added getters for hostname and port for TrustManagerParameters
- Simplify usage of Security Provider
- Bumped dependencies
v8.3.4
- Bumped dependencies
- Bug-fix added support for reloading ciphers in SSLEngine, SSLSocketFactory and SSLServerSocketFactory
v8.3.3
- Added reloadable ciphers
- Bumped dependencies
v8.3.2
- Added custom security provider
- Bumped dependencies
- Bug-fix remove invalid characters when generating certificate alias
- Bug-fix handle timout exception correctly on java 8 when extracting certificates
v8.3.1
- Bumped dependencies
- Added system name to the system trust manager
- Bug-fix clear certificate collector after each fetch
- Bug-fix resolve empty collector for certificate extracting client when disabling resolving root ca
- Added timeout to certificate extracting client
- Applied sonar recommendations
v8.3.0
- Bumped dependencies
- Added option to extract public key from private key
- Added option to disable resolving root ca when extracting server certificates
- Added options to exclude ciphers and protocols in the SSLFactory
- Bug-fix allow adding new certificates in a nested TrustManager
- Simplified adding certificates to TrustManager
- Simplified swapping TrustManagers
- Added JdkX509ExtendedTrustManager wrapper for JDK trusted CA's from cacerts
- Added SystemX509ExtendedTrustManager wrapper for OS trusted CA's
v8.2.0
- Added option to conceal trusted certificate names for a server
- Bumped dependencies
v8.1.7
- Resolved CVE-2023-33201 LDAP injection vulnerability caused by transitive dependency of Bouncy Castle in the library of sslcontext-kickstart-for-pem
- Bumped dependencies
- Filter out duplicate extracted certificates
- Add appending capabilities to an existing keystore
- Added option to extract port from uri
... (truncated)
Commits
-
6112102
[maven-release-plugin] prepare release v8.3.7 -
1494ad1
Updated docs -
3767ee6
Added support for TlsSocketStrategy (#561) -
5b32fc7
Bump org.apache.maven.plugins:maven-gpg-plugin from 3.2.5 to 3.2.6 (#558) -
59556ef
Bump org.eclipse.jetty:jetty-reactive-httpclient from 1.1.17 to 1.1.18 (#559) -
c88bb8b
Bump version.jetty from 9.4.55.v20240627 to 9.4.56.v20240826 (#557) -
714405e
Bump version.netty-handler from 4.1.112.Final to 4.1.113.Final (#556) -
823a951
Bump org.apache.maven.plugins:maven-surefire-plugin from 3.4.0 to 3.5.0 (#554) -
300b949
Bump org.apache.maven.plugins:maven-surefire-report-plugin (#555) -
4462bbc
Bump version.byte-buddy from 1.15.0 to 1.15.1 (#553) - Additional commits viewable in compare view
Dependabot commands
You can trigger Dependabot actions by commenting on this MR
-
$dependabot rebase
will rebase this MR -
$dependabot recreate
will recreate this MR rewriting all the manual changes and resolving conflicts