Skip to content

Releases: creek-service/creek-json-schema

v0.4.1

21 Apr 21:23
50e7558
Compare
Choose a tag to compare

What's Changed

Dependency Updates

  • Bump com.diffplug.spotless:spotless-plugin-gradle from 6.16.0 to 6.17.0 by @dependabot in #142
  • Bump gradle.plugin.org.kt3k.gradle.plugin:coveralls-gradle-plugin from 2.12.0 to 2.12.2 by @dependabot in #139
  • Bump org.mockito:mockito-junit-jupiter from 5.1.1 to 5.2.0 by @dependabot in #141
  • Bump org.jetbrains.kotlin.jvm from 1.7.22 to 1.8.10 by @dependabot in #122
  • Bump kotlinVersion from 1.7.22 to 1.8.10 by @dependabot in #128
  • Bump pl.allegro.tech.build.axion-release from 1.14.4 to 1.15.0 by @dependabot in #152
  • Bump com.github.spotbugs.snom:spotbugs-gradle-plugin from 5.0.13 to 5.0.14 by @dependabot in #156
  • Bump kotlinVersion from 1.8.10 to 1.8.20 by @dependabot in #155
  • Bump org.jetbrains.kotlin.jvm from 1.8.10 to 1.8.20 by @dependabot in #157
  • Bump com.gradle.publish:plugin-publish-plugin from 1.1.0 to 1.2.0 by @dependabot in #158
  • Bump info.picocli:picocli from 4.7.1 to 4.7.3 by @dependabot in #159
  • Bump org.junit-pioneer:junit-pioneer from 2.0.0 to 2.0.1 by @dependabot in #160
  • Bump com.diffplug.spotless:spotless-plugin-gradle from 6.17.0 to 6.18.0 by @dependabot in #162
  • Bump org.mockito:mockito-junit-jupiter from 5.2.0 to 5.3.0 by @dependabot in #161
  • Bump creekVersion from 0.4.1-SNAPSHOT to 0.4.1 by @dependabot in #163
  • Bump org.mockito:mockito-junit-jupiter from 5.3.0 to 5.3.1 by @dependabot in #164

Less Exciting Things

Full Changelog: v0.4.0...v0.4.1

v0.4.0

14 Mar 00:24
71df575
Compare
Choose a tag to compare

What's Changed

Dependency Updates

  • Bump io.github.gradle-nexus:publish-plugin from 1.1.0 to 1.2.0 by @dependabot in #134
  • Bump com.diffplug.spotless:spotless-plugin-gradle from 6.15.0 to 6.16.0 by @dependabot in #133
  • Bump io.github.classgraph:classgraph from 4.8.154 to 4.8.155 by @dependabot in #135
  • Bump log4jVersion from 2.19.0 to 2.20.0 by @dependabot in #132
  • Bump io.github.classgraph:classgraph from 4.8.155 to 4.8.157 by @dependabot in #140
  • Bump io.github.gradle-nexus:publish-plugin from 1.2.0 to 1.3.0 by @dependabot in #143

Full Changelog: v0.3.2...v0.4.0

v0.3.2

16 Feb 18:27
a73989e
Compare
Choose a tag to compare

What's Changed

Dependency Updates

  • Bump org.mockito:mockito-junit-jupiter from 5.1.0 to 5.1.1 by @dependabot in #118
  • Update transitive dependencies with security vulnerabilities by @big-andy-coates in #121
  • Bump org.junit-pioneer:junit-pioneer from 1.9.1 to 2.0.0 by @dependabot in #124
  • Bump com.diffplug.spotless:spotless-plugin-gradle from 6.14.0 to 6.14.1 by @dependabot in #123
  • Bump pl.allegro.tech.build.axion-release from 1.14.3 to 1.14.4 by @dependabot in #126
  • Bump com.diffplug.spotless:spotless-plugin-gradle from 6.14.1 to 6.15.0 by @dependabot in #127
  • Bump creekVersion from 0.3.2-SNAPSHOT to 0.3.2 by @dependabot in #129

Full Changelog: v0.3.1...v0.3.2

v0.3.1

30 Jan 18:55
acafe94
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

Dependency Updates

Known security vulnerabilities in dependencies

At the time of release the following known security vulnerabilities existing in dependencies of the released Creek jars:

Snake YAML's Deserialization of Untrusted Data

See CVE-2022-1471 & GHSA-mjmj-j48q-9wg2.

At the time of writing, this was marked with High / Critical priority. However, if you read up on the
vulnerability
,
you'll see the vulnerability is that the deserializer allows instantiation or arbitrary types, and this
can lead to remote code execution if you're parsing YAML from an untrustworthy source, e.g. text submitted
from a form on a website.

This is not an issue for Creek, as all YAML being deserialized is from a trusted source, i.e. you, the
user, running Creek system tests written in YAML.

SnakeYaml isn't used directly by Creek. Creek makes use of it via Jackson. Fixing this (none) issue in Creek is not currently possible.

Jackson core's Uncontrolled Resource Consumption

See sonatype-2022-6438.

At the time of writing, this is marked with High priority. However, if you
read up on this vulnerability, this is also about parsing
data from untrustworthy source.

This is not an issue for Creek, as all data being deserialized is from a trusted source, i.e. you, the
user, running Creek system tests written in YAML.

There is already a fix in Jackson. Creek will update to 2.15.0
of Jackson when it is released.

Full Changelog: v0.3.0...v0.3.1

v0.3.0

12 Jan 00:04
91d190e
Compare
Choose a tag to compare

What's Changed

Exciting New Features 🎉

Dependency Updates

Full Changelog: v0.2.0...v0.3.0

v0.2.0

06 Nov 19:24
0a23b97
Compare
Choose a tag to compare

What's Changed

Dependency Updates

Less Exciting Things

Full Changelog: v0.1.6...v0.2.0