Skip to content

chore(deps): bump github.com/lestrrat-go/jwx/v3 from 3.1.0 to 3.1.1#1513

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/github.com/lestrrat-go/jwx/v3-3.1.1
Open

chore(deps): bump github.com/lestrrat-go/jwx/v3 from 3.1.0 to 3.1.1#1513
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/github.com/lestrrat-go/jwx/v3-3.1.1

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 7, 2026

Bumps github.com/lestrrat-go/jwx/v3 from 3.1.0 to 3.1.1.

Release notes

Sourced from github.com/lestrrat-go/jwx/v3's releases.

v3.1.1

For more detailed release notes, see Changes.

What's Changed

Full Changelog: lestrrat-go/jwx@v3.1.0...v3.1.1

Changelog

Sourced from github.com/lestrrat-go/jwx/v3's changelog.

v3.1.1 7 May 2026

  • [jws] Coordinated RFC 7797 b64=false handling pass: jws.Verify rejects payloads with b64=false unless b64 is also listed in crit; jws.Sign auto-declares b64 in crit when emitting b64=false; Message.MarshalJSON honors b64=false instead of silently re-encoding; jws.VerifyCompactFast refuses any compact JWS carrying b64 (the fast path doesn't process extension headers); and b64 is now declared as a typed boolean header field rather than handled ad-hoc. (#2081, #2087, #2102, #2104, #2106)

  • [jws] Reject malformed general-form JSON-serialized JWS: inputs with a top-level header member as a sibling of signatures are rejected (the spec only permits header inside per-signature objects), as are inputs whose protected member is a literal JSON object instead of a base64url-encoded string. (#2089, #2108)

  • [jws] jws.AlgorithmsForKey failures from unclassifiable keys are now wrapped in a typed sentinel so callers can branch on "couldn't categorize this key" without string matching the error message. (#2110)

  • [jws] Verify error-shape consistency: VerifyCompactFast refusals now match the jws.VerifyError() taxonomy used by the slow path, fan-out verify errors name the loose WithKeySet options that were tried, multi-signature b64 mismatches name the offending signature index and conflicting value, and the compact b64=false+payload-contains-. error references RFC 7797 §5.2 and points at WithDetachedPayload. (#2083, #2085, #2114)

  • [jws] Keys fetched via the jku header are no longer accepted for signature verification when the JWK declares use=enc. (#2060)

  • [jws][jwe] jws.VerifyMessage and jwe.DecryptMessage observe context cancellation between loop iterations rather than only at boundaries. Long fan-out verify/decrypt loops now respond to a cancelled context promptly. (#2112, #2117)

  • [jwe] Reject PBES2 messages whose p2c (iteration count) does not parse cleanly into int64 or violates the configured bound. The error now names the violated bound (min vs max) instead of the generic "out of range". (#2119)

  • [jwe] jwe.WithKey() validates the alg-vs-key shape at option construction time rather than during encryption, so misuse surfaces at the call site instead of inside the encrypt loop. (#2121)

... (truncated)

Commits
  • 59b8b1b release v3.1.1
  • 4d4ab01 Changes: draft v3.1.1 release notes (#2155)
  • ad739f5 jwk: fix phantom ContinueParseError refs and unmarshaler typo in docs (#2142)
  • 3227cf9 jwk: treat nil key from custom KeyParser as continue, not success (#2140)
  • 82c067e jwk: stream the keys array with cap-before-allocate (#2137)
  • 931a815 jwk: wrap ParseKey errors with ParseError sentinel (#2135)
  • 53f6225 jwk: stop duplicating JWK fields at JWKS top level on parse (#2133)
  • 8943519 jwe: document WithMaxDecompressBufferSize behavior at non-positive values (#2...
  • 4797307 jwe: add WithDisabledKeyAlgorithms global policy hook (#2129)
  • de41d0e jwe: keySetProvider surfaces per-key errors via errors.Join (#2127)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/lestrrat-go/jwx/v3](https://github.com/lestrrat-go/jwx) from 3.1.0 to 3.1.1.
- [Release notes](https://github.com/lestrrat-go/jwx/releases)
- [Changelog](https://github.com/lestrrat-go/jwx/blob/v3.1.1/Changes)
- [Commits](lestrrat-go/jwx@v3.1.0...v3.1.1)

---
updated-dependencies:
- dependency-name: github.com/lestrrat-go/jwx/v3
  dependency-version: 3.1.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies One or more dependencies are being bumped go Pull requests that update Go code labels May 7, 2026
@dependabot dependabot Bot requested a review from a team as a code owner May 7, 2026 07:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies One or more dependencies are being bumped go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants