Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump cryptography from 40.0.2 to 41.0.3 #82

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Aug 2, 2023

Bumps cryptography from 40.0.2 to 41.0.3.

Changelog

Sourced from cryptography's changelog.

41.0.3 - 2023-08-01


* Fixed performance regression loading DH public keys.
* Fixed a memory leak when using
  :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.2.

.. _v41-0-2:

41.0.2 - 2023-07-10

  • Fixed bugs in creating and parsing SSH certificates where critical options with values were handled incorrectly. Certificates are now created correctly and parsing accepts correct values as well as the previously generated invalid forms with a warning. In the next release, support for parsing these invalid forms will be removed.

.. _v41-0-1:

41.0.1 - 2023-06-01


* Temporarily allow invalid ECDSA signature algorithm parameters in X.509
  certificates, which are generated by older versions of Java.
* Allow null bytes in pass phrases when serializing private keys.

.. _v41-0-0:

41.0.0 - 2023-05-30

  • BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1d has been removed. Users on older version of OpenSSL will need to upgrade.
  • BACKWARDS INCOMPATIBLE: Support for Python 3.6 has been removed.
  • BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.6.
  • Updated the minimum supported Rust version (MSRV) to 1.56.0, from 1.48.0.
  • Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.1.
  • Added support for the :class:~cryptography.x509.OCSPAcceptableResponses OCSP extension.
  • Added support for the :class:~cryptography.x509.MSCertificateTemplate proprietary Microsoft certificate extension.
  • Implemented support for equality checks on all asymmetric public key types.
  • Added support for aes256-gcm@openssh.com encrypted keys in :func:~cryptography.hazmat.primitives.serialization.load_ssh_private_key.
  • Added support for obtaining X.509 certificate signature algorithm parameters (including PSS) via :meth:~cryptography.x509.Certificate.signature_algorithm_parameters.
  • Support signing :class:~cryptography.hazmat.primitives.asymmetric.padding.PSS

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [cryptography](https://github.com/pyca/cryptography) from 40.0.2 to 41.0.3.
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](pyca/cryptography@40.0.2...41.0.3)

---
updated-dependencies:
- dependency-name: cryptography
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Aug 2, 2023
@op1st-prow op1st-prow bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Aug 2, 2023
@goern
Copy link
Member

goern commented Aug 6, 2023

/test pytest
/lgtm
/approve

@op1st-prow op1st-prow bot added the lgtm Indicates that a PR is ready to be merged. label Aug 6, 2023
@op1st-prow
Copy link

op1st-prow bot commented Aug 6, 2023

@goern: The specified target(s) for /test were not found.
The following commands are available to trigger required jobs:

  • /test pre-commit
  • /test thoth-pytest-py38

Use /test all to run all jobs.

In response to this:

/test pytest
/lgtm
/approve

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@op1st-prow
Copy link

op1st-prow bot commented Aug 6, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: goern

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@op1st-prow op1st-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 6, 2023
@op1st-prow op1st-prow bot removed the lgtm Indicates that a PR is ready to be merged. label Aug 6, 2023
@goern
Copy link
Member

goern commented Aug 6, 2023

/lgtm

@op1st-prow op1st-prow bot added the lgtm Indicates that a PR is ready to be merged. label Aug 6, 2023
@op1st-prow op1st-prow bot removed the lgtm Indicates that a PR is ready to be merged. label Aug 6, 2023
@goern
Copy link
Member

goern commented Aug 6, 2023

/lgtm

@op1st-prow op1st-prow bot added the lgtm Indicates that a PR is ready to be merged. label Aug 6, 2023
@op1st-prow
Copy link

op1st-prow bot commented Aug 6, 2023

@dependabot[bot]: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
op1st/prow/pytest 9ab8995 link true /test pytest

Full PR test history. Your PR dashboard. Please help us and open an issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dependencies Pull requests that update a dependency file lgtm Indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant