dependabot[bot] opened a new pull request, #1909:
URL: https://github.com/apache/libcloud/pull/1909

   Bumps [cryptography](https://github.com/pyca/cryptography) from 39.0.0 to 
41.0.1.
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a 
href="https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst";>cryptography's
 changelog</a>.</em></p>
   <blockquote>
   <p>41.0.1 - 2023-06-01</p>
   <pre><code>
   * Temporarily allow invalid ECDSA signature algorithm parameters in X.509
     certificates, which are generated by older versions of Java.
   * Allow null bytes in pass phrases when serializing private keys.
   <p>.. _v41-0-0:</p>
   <p>41.0.0 - 2023-05-30
   </code></pre></p>
   <ul>
   <li><strong>BACKWARDS INCOMPATIBLE:</strong> Support for OpenSSL less than 
1.1.1d has been
   removed.  Users on older version of OpenSSL will need to upgrade.</li>
   <li><strong>BACKWARDS INCOMPATIBLE:</strong> Support for Python 3.6 has been 
removed.</li>
   <li><strong>BACKWARDS INCOMPATIBLE:</strong> Dropped support for LibreSSL 
&lt; 3.6.</li>
   <li>Updated the minimum supported Rust version (MSRV) to 1.56.0, from 
1.48.0.</li>
   <li>Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 
3.1.1.</li>
   <li>Added support for the 
:class:<code>~cryptography.x509.OCSPAcceptableResponses</code>
   OCSP extension.</li>
   <li>Added support for the 
:class:<code>~cryptography.x509.MSCertificateTemplate</code>
   proprietary Microsoft certificate extension.</li>
   <li>Implemented support for equality checks on all asymmetric public key 
types.</li>
   <li>Added support for <code>aes256-...@openssh.com</code> encrypted keys in
   
:func:<code>~cryptography.hazmat.primitives.serialization.load_ssh_private_key</code>.</li>
   <li>Added support for obtaining X.509 certificate signature algorithm 
parameters
   (including PSS) via
   
:meth:<code>~cryptography.x509.Certificate.signature_algorithm_parameters</code>.</li>
   <li>Support signing 
:class:<code>~cryptography.hazmat.primitives.asymmetric.padding.PSS</code>
   X.509 certificates via the new keyword-only argument 
<code>rsa_padding</code> on
   :meth:<code>~cryptography.x509.CertificateBuilder.sign</code>.</li>
   <li>Added support for
   
:class:<code>~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305</code>
   on BoringSSL.</li>
   </ul>
   <p>.. _v40-0-2:</p>
   <p>40.0.2 - 2023-04-14</p>
   <pre><code>
   * Fixed compilation when using LibreSSL 3.7.2.
   * Added some functions to support an upcoming ``pyOpenSSL`` release.
   <p>.. _v40-0-1:</p>
   <p>40.0.1 - 2023-03-24
   </code></pre></p>
   <ul>
   <li>Fixed a bug where certain operations would fail if an object happened to 
be
   in the top-half of the memory-space. This only impacted 32-bit systems.</li>
   </ul>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li><a 
href="https://github.com/pyca/cryptography/commit/d02de9f26e9a2353e89427c1cea8b9ed2bae969e";><code>d02de9f</code></a>
 changelog and version bump (<a 
href="https://redirect.github.com/pyca/cryptography/issues/9008";>#9008</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/53dc686431f59658d892b83383a330d796105843";><code>53dc686</code></a>
 Backport null fix (<a 
href="https://redirect.github.com/pyca/cryptography/issues/9007";>#9007</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/b99900596e65f31543d62cf1a52069c709ba7970";><code>b999005</code></a>
 Backport tolerate (<a 
href="https://redirect.github.com/pyca/cryptography/issues/9006";>#9006</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/c4d494fd3ee907316bd846e90cbf4a8df75a25ac";><code>c4d494f</code></a>
 41.0.0 version bump (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8991";>#8991</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/8708245ccdeaff21d65eea68a4f8d2a7c5949a22";><code>8708245</code></a>
 new openssl day (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8990";>#8990</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/31436a486661cd863d4c77e40facf93fbb2d9f54";><code>31436a4</code></a>
 admit to the existence of nuance in HKDF (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8987";>#8987</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/91e41898e6d1d2a9a6e980c39e2f8baa2fa8a1f8";><code>91e4189</code></a>
 Port DSA to Rust (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8978";>#8978</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/f302d28b81607aab28d22b653da78d564824f267";><code>f302d28</code></a>
 Update CI for new LibreSSL releases (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8975";>#8975</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/851d8ccb340bfc93c827b9e80af939a216b34925";><code>851d8cc</code></a>
 Bump openssl from 0.10.52 to 0.10.53 in /src/rust (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8986";>#8986</a>)</li>
   <li><a 
href="https://github.com/pyca/cryptography/commit/0918c7236c94c29272e0790ba0227cfa9401943b";><code>0918c72</code></a>
 Bump coverage from 7.2.6 to 7.2.7 (<a 
href="https://redirect.github.com/pyca/cryptography/issues/8985";>#8985</a>)</li>
   <li>Additional commits viewable in <a 
href="https://github.com/pyca/cryptography/compare/39.0.0...41.0.1";>compare 
view</a></li>
   </ul>
   </details>
   <br />
   
   
   [![Dependabot compatibility 
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=cryptography&package-manager=pip&previous-version=39.0.0&new-version=41.0.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)
   
   Dependabot will resolve any conflicts with this PR as long as you don't 
alter it yourself. You can also trigger a rebase manually by commenting 
`@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   <details>
   <summary>Dependabot commands and options</summary>
   <br />
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that 
have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI 
passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and 
block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. 
You can achieve the same result by closing it manually
   - `@dependabot ignore this major version` will close this PR and stop 
Dependabot creating any more for this major version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop 
Dependabot creating any more for this minor version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop 
Dependabot creating any more for this dependency (unless you reopen the PR or 
upgrade to it yourself)
   
   
   </details>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@libcloud.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to