{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":61367331,"defaultBranch":"master","name":"napalm-ros","ownerLogin":"napalm-automation-community","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-06-17T10:53:55.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/33203818?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1725408521.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"4605cc8f5900bccf96b137b7ea60a82a88de17cd","ref":"refs/heads/dependabot/pip/cryptography-43.0.1","pushedAt":"2024-09-04T00:08:41.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump cryptography from 42.0.4 to 43.0.1\n\nBumps [cryptography](https://github.com/pyca/cryptography) from 42.0.4 to 43.0.1.\n- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)\n- [Commits](https://github.com/pyca/cryptography/compare/42.0.4...43.0.1)\n\n---\nupdated-dependencies:\n- dependency-name: cryptography\n dependency-type: indirect\n...\n\nSigned-off-by: dependabot[bot] Sourced from idna's\r\nreleases. Thanks to Guido Vranken for reporting the issue. Full Changelog: https://github.com/kjd/idna/compare/v3.6...v3.7 Sourced from idna's\r\nchangelog. 3.7 (2024-04-11)\r\n++++++++++++++++ Thanks to Guido Vranken for reporting the issue. 3.6 (2023-11-25)\r\n++++++++++++++++ 3.5 (2023-11-24)\r\n++++++++++++++++ Thanks Jon Ribbens, Diogo Teles Sant'Anna, Wu Tingfeng for\r\ncontributions\r\nto this release. Sourced from jinja2's\r\nreleases. This is the Jinja 3.1.4 security release, which fixes security issues\r\nand bugs but does not otherwise change behavior and should not result in\r\nbreaking changes. PyPI: https://pypi.org/project/Jinja2/3.1.4/\r\nChanges: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-4 Sourced from jinja2's\r\nchangelog. Released 2024-05-05 Sourced from cryptography's\r\nchangelog. 42.0.4 - 2024-02-20 .. _v42-0-3: 42.0.3 - 2024-02-15\r\nRelease notes
\r\n\r\n
\r\nv3.7
\r\nWhat's Changed
\r\n\r\n
\r\nChangelog
\r\n\r\n
\r\n\r\n
\r\n\r\n
\r\n\r\n
\r\nCommits
\r\n\r\n
\r\n1d365e1
\r\nRelease v3.7c1b3154
\r\nMerge pull request #172 from\r\nkjd/optimize-contextj0394ec7
\r\nMerge branch 'master' into optimize-contextjcd58a23
\r\nMerge pull request #152 from\r\nelliotwutingfeng/dev5beb28b
\r\nMore efficient resolution of joiner contexts1b12148
\r\nUpdate ossf/scorecard-action to v2.3.1d516b87
\r\nUpdate Github actions/checkout to v4c095c75
\r\nMerge branch 'master' into dev60a0a4c
\r\nFix typo in GitHub Actions workflow key5918a0e
\r\nMerge branch 'master' into dev
\r\n\r\n\r\n[![Dependabot compatibility\r\nscore](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=idna&package-manager=pip&previous-version=3.4&new-version=3.7)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)\r\n\r\nDependabot will resolve any conflicts with this PR as long as you don't\r\nalter it yourself. You can also trigger a rebase manually by commenting\r\n`@dependabot rebase`.\r\n\r\n[//]: # (dependabot-automerge-start)\r\n[//]: # (dependabot-automerge-end)\r\n\r\n---\r\n\r\nDependabot commands and options
\r\n
\r\n\r\nYou can trigger Dependabot actions by commenting on this PR:\r\n- `@dependabot rebase` will rebase this PR\r\n- `@dependabot recreate` will recreate this PR, overwriting any edits\r\nthat have been made to it\r\n- `@dependabot merge` will merge this PR after your CI passes on it\r\n- `@dependabot squash and merge` will squash and merge this PR after\r\nyour CI passes on it\r\n- `@dependabot cancel merge` will cancel a previously requested merge\r\nand block automerging\r\n- `@dependabot reopen` will reopen this PR if it is closed\r\n- `@dependabot close` will close this PR and stop Dependabot recreating\r\nit. You can achieve the same result by closing it manually\r\n- `@dependabot show Release notes
\r\n\r\n
\r\n3.1.4
\r\n\r\n
\r\nxmlattr
filter does not allow keys with\r\n/
solidus, >
greater-than sign, or\r\n=
equals sign, in addition to disallowing spaces.\r\nRegardless of any validation done by Jinja, user input should never be\r\nused as keys to this filter, or must be separately validated first.\r\nGHSA-h75v-3vvj-5mfjChangelog
\r\n\r\n
\r\nVersion 3.1.4
\r\n\r\n
\r\nxmlattr
filter does not allow keys with\r\n/
solidus, >
\r\ngreater-than sign, or =
equals sign, in addition to\r\ndisallowing spaces.\r\nRegardless of any validation done by Jinja, user input should never be\r\nused\r\nas keys to this filter, or must be separately validated first.\r\n:ghsa:h75v-3vvj-5mfj
Commits
\r\n\r\n
\r\ndd4a8b5
\r\nrelease version 3.1.40668239
\r\nMerge pull request from GHSA-h75v-3vvj-5mfjd655030
\r\ndisallow invalid characters in keys to xmlattr filtera7863ba
\r\nadd ghsa linksb5c98e7
\r\nstart version 3.1.4da3a9f0
\r\nupdate project files (#1968)0ee5eb4
\r\nsatisfy formatter, linter, and strict mypy20477c6
\r\nupdate project files (#5457)e491223
\r\nupdate pyyaml dev dependency36f9885
\r\nfix pr link
\r\n\r\n\r\n[![Dependabot compatibility\r\nscore](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=jinja2&package-manager=pip&previous-version=3.1.3&new-version=3.1.4)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)\r\n\r\nDependabot will resolve any conflicts with this PR as long as you don't\r\nalter it yourself. You can also trigger a rebase manually by commenting\r\n`@dependabot rebase`.\r\n\r\n[//]: # (dependabot-automerge-start)\r\n[//]: # (dependabot-automerge-end)\r\n\r\n---\r\n\r\nDependabot commands and options
\r\n
\r\n\r\nYou can trigger Dependabot actions by commenting on this PR:\r\n- `@dependabot rebase` will rebase this PR\r\n- `@dependabot recreate` will recreate this PR, overwriting any edits\r\nthat have been made to it\r\n- `@dependabot merge` will merge this PR after your CI passes on it\r\n- `@dependabot squash and merge` will squash and merge this PR after\r\nyour CI passes on it\r\n- `@dependabot cancel merge` will cancel a previously requested merge\r\nand block automerging\r\n- `@dependabot reopen` will reopen this PR if it is closed\r\n- `@dependabot close` will close this PR and stop Dependabot recreating\r\nit. You can achieve the same result by closing it manually\r\n- `@dependabot show Changelog
\r\n\r\n
\r\n* Fixed a null-pointer-dereference and segfault that could occur when\r\ncreating\r\na PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the\r\n issue. **CVE-2024-26130**\r\n* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields\r\n``SMIMECapabilities``\r\nand ``SignatureAlgorithmIdentifier`` should now be correctly encoded\r\naccording to the\r\n definitions in :rfc:`2633` :rfc:`3370`.\r\n
.. _v42-0-2:
\r\n\r\n\r\nfe18470
\r\nBump for 42.0.4 release (#10445)aaa2dd0
\r\nFix ASN.1 issues in PKCS#7 and S/MIME signing (#10373)\r\n(#10442)7a4d012
\r\nFixes #10422\r\n-- don't crash when a PKCS#12 key and cert don't match (#10423)\r\n...df314bb
\r\nbackport actions m1 switch to 42.0.x (#10415)c49a7a5
\r\nchangelog and version bump for 42.0.3 (#10396)396bcf6
\r\nfix provider loading take two (#10390)\r\n(#10395)0e0e46f
\r\nbackport: initialize openssl's legacy provider in rust (#10323)\r\n(#10333)Sourced from cryptography's\r\nchangelog.
\r\n\r\n\r\n42.0.2 - 2024-01-30
\r\n\r\n\r\n* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL\r\n3.2.1.\r\n* Fixed an issue that prevented the use of Python buffer protocol\r\nobjects in\r\n ``sign`` and ``verify`` methods on asymmetric keys.\r\n* Fixed an issue with incorrect keyword-argument naming with\r\n``EllipticCurvePrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.exchange`,\r\n ``X25519PrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PrivateKey.exchange`,\r\n ``X448PrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.x448.X448PrivateKey.exchange`,\r\n and ``DHPrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.exchange`.\r\n
.. _v42-0-1:
\r\n42.0.1 - 2024-01-24\r\n
\r\n
\r\n- Fixed an issue with incorrect keyword-argument naming with\r\n
\r\nEllipticCurvePrivateKey
\r\n\r\n:meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign
.- Resolved compatibility issue with loading certain RSA public keys in\r\n\r\n:func:
\r\n~cryptography.hazmat.primitives.serialization.load_pem_public_key
... _v42-0-0:
\r\n
2202123
\r\nchangelog and version bump 42.0.2 (#10268)f7032bd
\r\nbump openssl in CI (#10298)\r\n(#10299)002e886
\r\nFixes #10294\r\n-- correct accidental change to exchange kwarg (#10295)\r\n(#10296)92fa9f2
\r\nsupport bytes-like consistently across our asym sign/verify APIs (#10260)\r\n(#1...6478f7e
\r\nexplicitly support bytes-like for signature/data in RSA sign/verify (#10259)\r\n...4bb8596
\r\nfix the release script (#10233)\r\n(#10254)337437d
\r\n42.0.1 bump (#10252)56255de
\r\nallow SPKI RSA keys to be parsed even if they have an incorrect\r\ndelimiter (#1...12f038b
\r\nfixes #10237\r\n-- correct EC sign parameter name (#10239)\r\n(#10240)Sourced from cryptography's\r\nchangelog.
\r\n\r\n\r\n42.0.0 - 2024-01-22
\r\n\r\n\r\n* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.7.\r\n* **BACKWARDS INCOMPATIBLE:** Loading a PKCS7 with no content field\r\nusing\r\n\r\n:func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_certificates`\r\n or\r\n\r\n:func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_certificates`\r\n will now raise a ``ValueError`` rather than return an empty list.\r\n* Parsing SSH certificates no longer permits malformed critical options\r\nwith\r\n values, as documented in the 41.0.2 release notes.\r\n* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL\r\n3.2.0.\r\n* Updated the minimum supported Rust version (MSRV) to 1.63.0, from\r\n1.56.0.\r\n* We now publish both ``py37`` and ``py39`` ``abi3`` wheels. This should\r\nresolve some errors relating to initializing a module multiple times per\r\n process.\r\n* Support\r\n:class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS` for\r\nX.509 certificate signing requests and certificate revocation lists with\r\nthe\r\n keyword-only argument ``rsa_padding`` on the ``sign`` methods for\r\n :class:`~cryptography.x509.CertificateSigningRequestBuilder` and\r\n :class:`~cryptography.x509.CertificateRevocationListBuilder`.\r\n* Added support for obtaining X.509 certificate signing request\r\nsignature\r\n algorithm parameters (including PSS) via\r\n\r\n:meth:`~cryptography.x509.CertificateSigningRequest.signature_algorithm_parameters`.\r\n* Added support for obtaining X.509 certificate revocation list\r\nsignature\r\n algorithm parameters (including PSS) via\r\n\r\n:meth:`~cryptography.x509.CertificateRevocationList.signature_algorithm_parameters`.\r\n* Added ``mgf`` property to\r\n :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`.\r\n* Added ``algorithm`` and ``mgf`` properties to\r\n :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP`.\r\n* Added the following properties that return timezone-aware ``datetime``\r\nobjects:\r\n :meth:`~cryptography.x509.Certificate.not_valid_before_utc`,\r\n :meth:`~cryptography.x509.Certificate.not_valid_after_utc`,\r\n :meth:`~cryptography.x509.RevokedCertificate.revocation_date_utc`,\r\n :meth:`~cryptography.x509.CertificateRevocationList.next_update_utc`,\r\n :meth:`~cryptography.x509.CertificateRevocationList.last_update_utc`.\r\nThese are timezone-aware variants of existing properties that return\r\nnaïve\r\n ``datetime`` objects.\r\n* Deprecated the following properties that return naïve ``datetime``\r\nobjects:\r\n :meth:`~cryptography.x509.Certificate.not_valid_before`,\r\n :meth:`~cryptography.x509.Certificate.not_valid_after`,\r\n :meth:`~cryptography.x509.RevokedCertificate.revocation_date`,\r\n :meth:`~cryptography.x509.CertificateRevocationList.next_update`,\r\n :meth:`~cryptography.x509.CertificateRevocationList.last_update`\r\n in favor of the new timezone-aware variants mentioned above.\r\n* Added support for\r\n :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ChaCha20`\r\n on LibreSSL.\r\n* Added support for RSA PSS signatures in PKCS7 with\r\n</tr></table> \r\n
... (truncated)
\r\n4e64baf
\r\n42.0.0 version bump (#10232)7cb13a3
\r\nwe'll ship 3.2.0 for 42 (#9951)605c74e
\r\nBump x509-limbo and/or wycheproof in CI (#10231)97578b9
\r\nBump BoringSSL and/or OpenSSL in CI (#10230)972a7b5
\r\nverification: add test_verify_tz_aware (#10229)41daf2d
\r\nMigrate PKCS7 backend to Rust (#10228)d54093e
\r\nRemove some skips in tests that aren't needed anymore (#10223)71929bd
\r\nRemove binding that's not used anymore (#10224)7ea4b89
\r\nfixed formatting in changelog (#10225)410f4a1
\r\nAllow brainpool on libressl (#10222)f0881ba
\r\nCut 3.4.03e4bdf9
\r\nChangelog/comment updates30b447b
\r\nLinting33508c9
\r\nExpand MessageOrderError use to handle more packet types96db1e2
\r\nRaise exception when sequence numbers rollover during initial kex58785d2
\r\nChangelog tweak re: other new Transport kwarg8dcb237
\r\nTest-suite-only bugfix: defer did not actually imply skip_verifyfa46de7
\r\nReset sequence numbers on rekey75e311d
\r\nEnforce zero seqno on kexinit73f079f
\r\nFill in CVE number for Terrapin attackSourced from jinja2's\r\nreleases.
\r\n\r\n\r\n3.1.3
\r\nThis is a fix release for the 3.1.x feature branch.
\r\n\r\n
\r\n- Fix for GHSA-h5c8-rqwp-cp95.\r\nYou are affected if you are using
\r\nxmlattr
and passing user\r\ninput as attribute keys.- Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-3
\r\n- Milestone: https://github.com/pallets/jinja/milestone/15?closed=1
\r\n
Sourced from jinja2's\r\nchangelog.
\r\n\r\n\r\nVersion 3.1.3
\r\nReleased 2024-01-10
\r\n\r\n
\r\n- Fix compiler error when checking if required blocks in parent\r\ntemplates are\r\nempty. :pr:
\r\n1858
- \r\n
xmlattr
filter does not allow keys with spaces.\r\nGHSA-h5c8-rqwp-cp95- Make error messages stemming from invalid nesting of
\r\n{% trans\r\n%}
blocks\r\nmore helpful. :pr:1918
d9de4bb
\r\nrelease version 3.1.350124e1
\r\nskip test pypi9ea7222
\r\nuse trusted publishingda703f7
\r\nuse trusted publishingbce1746
\r\nuse trusted publishing7277d80
\r\nupdate pre-commit hooks5c8a105
\r\nMake nested-trans-block exceptions nicer (#1918)19a55db
\r\nMake nested-trans-block exceptions nicer7167953
\r\nMerge pull request from GHSA-h5c8-rqwp-cp957dd3680
\r\nxmlattr filter disallows keys with spaces