Python dependency: Update cryptography requirement from ==47.0.* to ==48.0.*#9926
Python dependency: Update cryptography requirement from ==47.0.* to ==48.0.*#9926dependabot[bot] wants to merge 1 commit into
Conversation
Updates the requirements on [cryptography](https://github.com/pyca/cryptography) to permit the latest version. - [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst) - [Commits](pyca/cryptography@47.0.0...48.0.0) --- updated-dependencies: - dependency-name: cryptography dependency-version: 48.0.0 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
…#9954) Python: - requirements.txt: google-auth-oauthlib 1.3.1 -> 1.4.0 (#9929 / #9931), gated so Python 3.9 stays on 1.3.1 (1.4.0 requires python_version >= 3.10). Mirrors the existing boto3 1.42.*/1.43.* split. - tools/requirements.txt: requests >=2.33.1 -> >=2.34.2 on python_version > '3.9' (#9943 / #9944). - web/regression/requirements.txt: selenium 4.43.0 -> 4.44.0 (#9946). The selenium pin already requires Python >=3.10 in master, so the bump introduces no new 3.9 gap. JavaScript (web/package.json, web/yarn.lock): - postcss 8.5.12 -> 8.5.14 (#9874 / #9889) - @tanstack/react-query 5.100.5 -> 5.100.9 (#9878) - ip-address 10.1.0 -> 10.1.1 (#9918) - packageManager pin yarn@4.14.0 -> yarn@4.15.0 and regenerate yarn.lock at lockfile __metadata.version 10. CI runs yarn 4.15.0 with hardened mode on public PRs and refuses to migrate the lockfile from version 9 (yarn 4.14.x) to 10; master passes today only because hardened mode is PR-only. Electron runtime (runtime/package.json, runtime/yarn.lock): - axios 1.16.0 -> 1.16.1 (#9948) - eslint 10.3.0 -> 10.4.0 (#9947) Skipped (genuine breaking changes, deferred to follow-up PRs): - @mui/material 7 -> 9 (#9843) - @mui/x-date-pickers 8 -> 9 (#9888) - cryptography 47.0.* -> 48.0.* (#9926 / #9932) - paramiko 3.5.1 -> 5.0.0 (#9927 / #9930) - electron 41.5.0 -> 42.1.0 (#9945) Verified in an isolated worktree: - jest: 140/0/0 suites, 824/0/0 tests - eslint: clean (web + runtime, both silent) - pycodestyle: 0 violations project-wide Each version was cross-checked against the corresponding dependabot PR diff via `gh pr diff`. Each Python bump was cross-checked against PyPI's requires_python so Python 3.9 support stays intact.
|
Superseded by #9960, which bumps |
|
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting If you change your mind, just re-open this PR and I'll resolve any conflicts on it. |
Supersedes dependabot #9926 (and its /web/regression duplicate #9932). Inherited via `-r ../../requirements.txt`, so the single edit covers both. cryptography 48 is a smaller bump than its major-version label suggests: - Removed Python 3.8 support. pgAdmin requires Python 3.9+ across the supported platforms, so this is a no-op for us. (3.9.0 and 3.9.1 specifically are excluded by the new metadata; nothing in pgAdmin's CI / packaging runs those exact patch versions.) - Stricter X.509 CRL parsing: a CRL whose inner `TBSCertList.signature` does not match the outer `signatureAlgorithm` now raises `ValueError` instead of being parsed and rejected later during signature verification. - Added ML-KEM and ML-DSA post-quantum primitives (additive). pgAdmin's cryptography surface area is narrow and CRL-free: - web/pgadmin/settings/__init__.py Fernet - web/pgadmin/utils/session.py Fernet, hashes, HKDF - web/pgadmin/utils/crypto.py Cipher, AES, CFB8 No imports of `cryptography.x509`, `CertificateRevocationList`, or `load_pem_x509_crl` anywhere in the tree, so the stricter CRL parsing in 48 cannot affect pgAdmin. The OpenSSL 1.1.x / LibreSSL < 4.1 removal that I initially flagged as a concern actually happened in cryptography 47, which master is already on. No platform-support regression from this bump.
Updates the requirements on cryptography to permit the latest version.
Changelog
Sourced from cryptography's changelog.
... (truncated)
Commits
8e03e30bump for 48.0.0 release (#14796)295e0d2Add AGENTS.md with CLAUDE.md symlink (#14794)104a2deBump BoringSSL, OpenSSL, AWS-LC in CI (#14793)67ec1e5call check_length early on AesSiv::encrypt (#14792)b2da57achangelog for mldsa/mlkem for openssl (#14791)3cf44adML-KEM OpenSSL support (#14781)2e31639ML-DSA OpenSSL support (#14773)5affe5afix rust nightly clippy (#14790)2e73ca4bump rust-openssl dep and update EcPoint::mul_generator to mul_generator2 (#1...82ebd3bBump BoringSSL, OpenSSL, AWS-LC in CI (#14785)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)