Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the cargo group with 8 updates #4139

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 18, 2024

Bumps the cargo group with 8 updates:

Package From To
rustc-serialize 0.3.24 0.3.25
h2 0.3.15 0.3.26
openssl 0.10.45 0.10.64
quinn-proto 0.9.2 0.9.6
rustix 0.36.14 0.36.17
shlex 1.1.0 1.3.0
snow 0.9.1 0.9.6
whoami 1.3.0 1.5.1

Updates rustc-serialize from 0.3.24 to 0.3.25

Commits

Updates h2 from 0.3.15 to 0.3.26

Release notes

Sourced from h2's releases.

v0.3.26

What's Changed

  • Limit number of CONTINUATION frames for misbehaving connections.

See https://seanmonstar.com/blog/hyper-http2-continuation-flood/ for more info.

v0.3.25

What's Changed

Full Changelog: hyperium/h2@v0.3.24...v0.3.25

v0.3.24

Fixed

  • Limit error resets for misbehaving connections.

v0.3.23

What's Changed

v0.3.22

What's Changed

  • Add header_table_size(usize) option to client and server builders.
  • Improve throughput when vectored IO is not available.
  • Update indexmap to 2.

New Contributors

v0.3.21

What's Changed

  • Fix opening of new streams over peer's max concurrent limit.
  • Fix RecvStream to return data even if it has received a CANCEL stream error.
  • Update MSRV to 1.63.

New Contributors

v0.3.20

Bug Fixes

... (truncated)

Changelog

Sourced from h2's changelog.

0.3.26 (April 3, 2024)

  • Limit number of CONTINUATION frames for misbehaving connections.

0.3.25 (March 15, 2024)

  • Improve performance decoding many headers.

0.3.24 (January 17, 2024)

  • Limit error resets for misbehaving connections.

0.3.23 (January 10, 2024)

  • Backport fix from 0.4.1 for stream capacity assignment.

0.3.22 (November 15, 2023)

  • Add header_table_size(usize) option to client and server builders.
  • Improve throughput when vectored IO is not available.
  • Update indexmap to 2.

0.3.21 (August 21, 2023)

  • Fix opening of new streams over peer's max concurrent limit.
  • Fix RecvStream to return data even if it has received a CANCEL stream error.
  • Update MSRV to 1.63.

0.3.20 (June 26, 2023)

  • Fix panic if a server received a request with a :status pseudo header in the 1xx range.
  • Fix panic if a reset stream had pending push promises that were more than allowed.
  • Fix potential flow control overflow by subtraction, instead returning a connection error.

0.3.19 (May 12, 2023)

  • Fix counting reset streams when triggered by a GOAWAY.
  • Send too_many_resets in opaque debug data of GOAWAY when too many resets received.

0.3.18 (April 17, 2023)

  • Fix panic because of opposite check in is_remote_local().

0.3.17 (April 13, 2023)

  • Add Error::is_library() method to check if the originated inside h2.
  • Add max_pending_accept_reset_streams(usize) option to client and server builders.
  • Fix theoretical memory growth when receiving too many HEADERS and then RST_STREAM frames faster than an application can accept them off the queue.

... (truncated)

Commits

Updates openssl from 0.10.45 to 0.10.64

Release notes

Sourced from openssl's releases.

openssl-v0.10.64

What's Changed

Full Changelog: sfackler/rust-openssl@openssl-v0.10.63...openssl-v0.10.64

openssl-v0.10.63

What's Changed

Full Changelog: sfackler/rust-openssl@openssl-v0.10.62...openssl-v0.10.63

openssl-v0.10.62

What's Changed

New Contributors

Full Changelog: sfackler/rust-openssl@openssl-v0.10.61...openssl-v0.10.62

openssl v0.10.61

... (truncated)

Commits
  • 4a19cd4 Merge pull request #2175 from reaperhulk/changelog
  • 4e0e05a bump openssl and openssl-sys + changelogs
  • c2b124a Be explicit that aliases are not part of X.509 certificates
  • 1abf4a5 Merge pull request #2167 from alex/expose-alias
  • a644ec2 Merge pull request #2170 from botovq/crypto-free
  • 83940d1 LibreSSL 3.9: fix CRYPTO_malloc/free signatures
  • 51fc569 Merge pull request #2168 from sfackler/alex-patch-1
  • 3c53dee Added binding for EVP_default_properties_enable_fips
  • a12abe1 Expose alias on X509 structs
  • 3acf2ef Merge pull request #2157 from reaperhulk/rebuild-if-changed
  • Additional commits viewable in compare view

Updates quinn-proto from 0.9.2 to 0.9.6

Release notes

Sourced from quinn-proto's releases.

0.9.4

What's Changed

Full Changelog: quinn-rs/quinn@0.10.6...0.9.4

0.9.3

No release notes provided.

Commits

Updates rustix from 0.36.14 to 0.36.17

Commits
  • 76c998c chore: Release rustix version 0.36.17
  • 1c6013a Fix p{read,write}v{,v2}'s encoding of the offset argument on Linux. (#896) (#...
  • 6534992 chore: Release rustix version 0.36.16
  • 4928cf7 Disable riscv64 testing.
  • 8cc159c Fix the test_ttyname_ok test when /dev/stdin is inaccessable. (#821)
  • 6dc7ba9 Downgrade dependencies and disable tests to compile under Rust 1.48.
  • ded8986 Disable MIPS in CI. (#793)
  • 739f9c3 Fixes for Dir on macOS, FreeBSD, and WASI.
  • 87481a9 Merge pull request from GHSA-c827-hfw6-qwvm
  • 5b764b5 chore: Release rustix version 0.36.15
  • Additional commits viewable in compare view

Updates shlex from 1.1.0 to 1.3.0

Changelog

Sourced from shlex's changelog.

1.3.0

  • Full fix for the high-severity security vulnerability RUSTSEC-2024-0006 a.k.a. GHSA-r7qv-8r2h-pg27:
    • Deprecates quote APIs in favor of try_ equivalents that complain about nul bytes.
    • Also adds a builder API, which allows re-enabling nul bytes without using the deprecated interface, and in the future can allow other things (as discussed in quoting_warning).
    • Adds documentation about various security risks that remain, particularly with interactive shells.
  • Adds explicit MSRV of 1.46.0.

1.2.1

  • Partial fix for the high-severity security vulnerability RUSTSEC-2024-0006 a.k.a. GHSA-r7qv-8r2h-pg27 without bumping MSRV:
    • The bytes { and \xa0 are now escaped by quoting functions.

1.2.0

  • Adds bytes module to support operating directly on byte strings.
Commits

Updates snow from 0.9.1 to 0.9.6

Release notes

Sourced from snow's releases.

v0.9.6

  • Validate invalid PSK positions when building a Noise protocol.
  • Raise errors in various typos/mistakes in Noise patterns when parsing.
  • Deprecate the sodiumoxide backend, as that crate is no longer maintained. We may eventually migrate it to a maintaned version of the crate, but for now it's best to warn users.
  • Set a hard limit in read_message() in transport mode to 65535 to be fully compliant with the Noise specification.

Full Changelog: mcginty/snow@v0.9.5...v0.9.6

v0.9.5

This is a security release that fixes a logic flaw in decryption in TransportState (i.e. the stateful one), where the nonce could increase even when decryption failed, which can cause a desync between the sender and receiver, opening this up as a denial of service vector if the attacker has the ability to inject packets in the channel Noise is talking over.

More details can be found in the advisory: GHSA-7g9j-g5jg-3vv3

All users are encouraged to update.

v0.9.4

This is a dependency version bump release because a couple of important dependencies released new versions that needed a Cargo.toml bump:

  • ring 0.17
  • pqcrypto-kyber 0.8
  • aes-gcm 0.10
  • chacha20poly1305 0.10

v0.9.3

This is a quick patch release to use the stable 4.0 version of curve25519-dalek.

v0.9.2

This is a patch release to address a correctness issue for compliance with the Noise specification: the nonce $2^{64} - 1$ is reserved for rekeying, and CipherState and StatelessCipherState did not check that, instead just making sure that there was no integer overflow.

Thanks to @​kjvalencik for reporting the issue and @​complexspaces for contributing the fix PR (#152).

Thanks to @​robyoder as well for fixing broken links and making sure all links were HTTPS (#151).

Full Changelog: mcginty/snow@v0.9.1...v0.9.2

Commits
  • a4be73f meta: v0.9.6 release
  • 9e53dcf TransportState: limit read_message size to 65535
  • faf0560 Deprecate sodiumoxide resolver
  • 308a24d Add warnings about multiple calls to same method in Builder
  • f280991 Error when extraneous parameters are included in string to parse
  • dbdcc48 Error on duplicate modifiers in parameter string
  • 8b1a819 Validate PSK index in pattern to avoid panic
  • 74e30cf meta: v0.9.5 release
  • 12e8ae5 Stateful nonce desync fix
  • 02c26b7 Remove clap from simple example
  • Additional commits viewable in compare view

Updates whoami from 1.3.0 to 1.5.1

Changelog

Sourced from whoami's changelog.

[1.5.1] - 2024-03-09

Fixed

  • Broken link in docs

[1.5.0] - 2024-03-03

Added

  • WASI support
  • Redox support
  • Fallible functions
    • whoami::fallible::devicename()
    • whoami::fallible::devicename_os()
    • whoami::fallible::distro()
    • whoami::fallible::hostname() - notably doesn't normalize to lowercase
    • whoami::fallible::realname()
    • whoami::fallible::realname_os()
    • whoami::fallible::username()
    • whoami::fallible::username_os()
  • whoami::Language
  • whoami::Country
  • whoami::langs()
  • whoami::fallible::account()
  • whoami::fallible::account_os()
  • whoami::DesktopEnv::is_gtk()
  • whoami::DesktopEnv::is_kde()

Removed

  • Generated device names that infer casing based on the hostname when the device name is not available - now returns the hostname unchanged
  • Partial (potentially unsound) support for Android, iOS, watchOS, tvOS, Fuchsia, Haiku, Solaris, and a few others. These targets now use the "fake" implementation.

Changed

  • Deprecated whoami::distro_os()
  • Deprecated whoami::hostname()
  • Deprecated whoami::hostname_os()
  • Deprecated whoami::lang()
  • illumos and Redox are no longer untested targets
  • Documented that illumos and Redox have a higher MSRV (Rust 1.65) than other targets
  • Display implementation on Platform::Illumos now displays in lowercase: illumos

Fixed

... (truncated)

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the cargo group with 8 updates:

| Package | From | To |
| --- | --- | --- |
| [rustc-serialize](https://github.com/rust-lang/rustc-serialize) | `0.3.24` | `0.3.25` |
| [h2](https://github.com/hyperium/h2) | `0.3.15` | `0.3.26` |
| [openssl](https://github.com/sfackler/rust-openssl) | `0.10.45` | `0.10.64` |
| [quinn-proto](https://github.com/quinn-rs/quinn) | `0.9.2` | `0.9.6` |
| [rustix](https://github.com/bytecodealliance/rustix) | `0.36.14` | `0.36.17` |
| [shlex](https://github.com/comex/rust-shlex) | `1.1.0` | `1.3.0` |
| [snow](https://github.com/mcginty/snow) | `0.9.1` | `0.9.6` |
| [whoami](https://github.com/ardaku/whoami) | `1.3.0` | `1.5.1` |


Updates `rustc-serialize` from 0.3.24 to 0.3.25
- [Commits](https://github.com/rust-lang/rustc-serialize/commits)

Updates `h2` from 0.3.15 to 0.3.26
- [Release notes](https://github.com/hyperium/h2/releases)
- [Changelog](https://github.com/hyperium/h2/blob/v0.3.26/CHANGELOG.md)
- [Commits](hyperium/h2@v0.3.15...v0.3.26)

Updates `openssl` from 0.10.45 to 0.10.64
- [Release notes](https://github.com/sfackler/rust-openssl/releases)
- [Commits](sfackler/rust-openssl@openssl-v0.10.45...openssl-v0.10.64)

Updates `quinn-proto` from 0.9.2 to 0.9.6
- [Release notes](https://github.com/quinn-rs/quinn/releases)
- [Commits](https://github.com/quinn-rs/quinn/commits)

Updates `rustix` from 0.36.14 to 0.36.17
- [Release notes](https://github.com/bytecodealliance/rustix/releases)
- [Commits](bytecodealliance/rustix@v0.36.14...v0.36.17)

Updates `shlex` from 1.1.0 to 1.3.0
- [Changelog](https://github.com/comex/rust-shlex/blob/master/CHANGELOG.md)
- [Commits](https://github.com/comex/rust-shlex/commits)

Updates `snow` from 0.9.1 to 0.9.6
- [Release notes](https://github.com/mcginty/snow/releases)
- [Commits](mcginty/snow@v0.9.1...v0.9.6)

Updates `whoami` from 1.3.0 to 1.5.1
- [Changelog](https://github.com/ardaku/whoami/blob/v1/CHANGELOG.md)
- [Commits](ardaku/whoami@v1.3.0...v1.5.1)

---
updated-dependencies:
- dependency-name: rustc-serialize
  dependency-type: direct:production
  dependency-group: cargo
- dependency-name: h2
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: openssl
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: quinn-proto
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: rustix
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: shlex
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: snow
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: whoami
  dependency-type: indirect
  dependency-group: cargo
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jun 18, 2024
@nkysg
Copy link
Collaborator

nkysg commented Jun 19, 2024

@dependabot ignore this dependency

@nkysg nkysg closed this Jun 19, 2024
Copy link
Contributor Author

dependabot bot commented on behalf of github Jun 19, 2024

This pull request was built based on a group rule. Closing it will not ignore any of these versions in future pull requests.

To ignore these dependencies, configure ignore rules in dependabot.yml

@nkysg nkysg deleted the dependabot/cargo/cargo-14b69c98de branch June 19, 2024 01:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant