Bump fastjson from 1.2.61 to 1.2.83
Created by: dependabot[bot]
Bumps fastjson from 1.2.61 to 1.2.83.
Release notes
Sourced from fastjson's releases.
FASTJSON 1.2.83版本发布(安全修复)
这是一个安全修复版本,修复最近收到在特定场景下可以绕过autoType关闭限制的漏洞,建议fastjson用户尽快采取安全措施保障系统安全。
安全修复方案 :https://github.com/alibaba/fastjson/wiki/security_update_20220523
Issues
- 安全加固
- 修复JDK17下setAccessible报错的问题 #4077
- 下载 https://repo1.maven.org/maven2/com/alibaba/fastjson/1.2.83/
- 文档 https://github.com/alibaba/fastjson/wiki/%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98
- 源码 https://github.com/alibaba/fastjson/tree/1.2.83
fastjson 1.2.79版本发布,BUG修复
这又是一个bug fixed的版本,大家按需升级
Issues
- 修复引入MethodInheritanceComparator导致某些场景序列化报错的问题
- 增强JDK 9兼容
- 修复JSONArray/JSONObject的equals方法在内部对象map/list相同时不直接返回true的问题
相关链接
- 下载 https://repo1.maven.org/maven2/com/alibaba/fastjson/1.2.79/
- 文档 https://github.com/alibaba/fastjson/wiki/%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98
- 源码 https://github.com/alibaba/fastjson/tree/1.2.79
fastjson 1.2.76版本发布,BUG修复增强兼容
这又是一个bug fixed的版本,大家按需升级
Issues
- 修复一些直接抛RuntimeException的问题 #3631
- parser自动识别gzip bytes #3614
- 修复Throwable继承类属性不支持自动类型转换问题 #3217
- 修复PrettyFormat情况下引用计算不对的问题 #3672
- 修复AutoType不兼容LinkedHashMap的问题
- 增强对Enum类型的自定类型转换
- 修复deserializeUsing在泛型某些场景不能正常工作的问题 #3693
- 提升JSONReader性能,减少小对象创建 #3627
- 增强对JSONPath对filter的支持 #3629
- JSONPath支持忽略NullValue的选项 #3607
- 增强对定制化enum的支持 #3601
- 增强对java.time.Instant和org.joda.time.Instant的支持 #3539
- 修复Parser某些场景不能识别引用的问题
相关链接
- 下载 https://repo1.maven.org/maven2/com/alibaba/fastjson/1.2.76/
- 文档 https://github.com/alibaba/fastjson/wiki/%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98
- 源码 https://github.com/alibaba/fastjson/tree/1.2.76
fastjson 1.2.75版本发布,例行Bug修复
... (truncated)
Commits
-
26f13f8
1.2.83 -
8f3410f
bug fix for autotype -
cd3c2de
improved jdk8 java.time support -
c63866e
remove unused import -
35db4ad
bug fix for autoType -
3f009e1
Merge pull request #4085 from hengyunabc/fix_setAccessible -
dd3de5f
fix InaccessibleObjectException in jdk17. #4077 -
a234f9a
Merge pull request #4084 from alibaba/revert-4078-master -
0814909
Revert "fix InaccessibleObjectException in jdk17. #4077" -
ab82d0b
Merge pull request #4078 from hengyunabc/master - Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labels
will set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewers
will set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assignees
will set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestone
will set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.