njwt
Version:
JWT Library for Node.js
66 lines (35 loc) • 1.69 kB
Markdown
# nJwt Change Log
### 2.0.1
* [#107](https://github.com/jwtk/njwt/pull/107) Freeze `prototype` of all classes to prevent prototype pollution vuln ([CVE-2024-34273](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-34273))
### 2.0.0
* [#98](https://github.com/jwtk/njwt/pull/98) Bumps jsonwebtoken version, drop Node < 12 from engines
### 1.2.0
* [#84](https://github.com/jwtk/njwt/pull/84) Resolves `uuid` vulnerability.
### 1.1.0
* [#77](https://github.com/jwtk/njwt/pull/77) Adds TypeScript type definitions.
### 1.0.0
* Removed support for older Node versions. Now requires Node 6+.
### 0.4.1
* Updated `nJwt.base64urlEncode()` to replace deprecated `new Buffer()` with `Buffer.from()`
### 0.4.0
* Added a key resolver interface, use `nJwt.createVerifier().withKeyResolver(function(kid, cb){ })`
* Added `jwt.setClaim(claim, value)` and `jwt.setHeader(param, value)` for setting body claims and header values in a chain-able way.
### 0.3.2
Added support for the `nbf`, "not before", claim.
### 0.3.1
Fixed to support proper signing and verification of ECDSA signatures.
### 0.3.0
The JWTs that are returned by `nJwt.verify()` and `nJwt.parse()` will no longer
populate the `iat` and `jti` fields with default random values.
### 0.2.3
Fixed to prevent the `jti` and `iat` claims of the passed token from being
over-written with default random values during verification.
### 0.2.2
`jwt.toString()` is now an alias for `jwt.compact()`.
### 0.2.1
When parsing a JWT string, the header values of the JWT are now populated on the
object that is returned.
### 0.2.0
The default `exp` field is now set to a default expiration of 1 hour.
### 0.1.0
First release.