Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(deps): bump golang.org/x/crypto from 0.11.0 to 0.12.0 #4235

Merged
merged 1 commit into from
Aug 7, 2023

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Aug 7, 2023

⚠️ Dependabot is rebasing this PR ⚠️

Rebasing might not happen immediately, so don't worry if this takes some time.

Note: if you make any changes to this PR yourself, they will take precedence over the rebase.


Bumps golang.org/x/crypto from 0.11.0 to 0.12.0.

Commits
  • b4ddeed go.mod: update golang.org/x dependencies
  • edc325d ssh: fix call to Fatalf from a non-test goroutine
  • eab9315 ssh: add diffie-hellman-group16-sha512 kex
  • ddfa821 ssh: ignore invalid MACs and KEXs just like we do for ciphers
  • d08e19b x509roots/fallback: update bundle
  • 12e1fcd internal/wycheproof: skip all tests in short test mode
  • 3f8f064 ssh: prefer sha256 based RSA key algorithms
  • 5df3b59 ssh: disable client agent tests on Windows
  • 2e82bdd fix TestValidTerminalMode: missing output from echo SHELL $SHELL
  • 64e0e99 ssh: fix RSA certificate and public key authentication with older clients
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.

Dependabot will merge this PR once it's up-to-date and CI passes on it, as requested by @caarlos0.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Aug 7, 2023
@cloudflare-pages
Copy link

cloudflare-pages bot commented Aug 7, 2023

Deploying with  Cloudflare Pages  Cloudflare Pages

Latest commit: 99272e2
Status: ✅  Deploy successful!
Preview URL: https://64f694a5.goreleaser.pages.dev
Branch Preview URL: https://dependabot-go-modules-golang-nn64.goreleaser.pages.dev

View logs

@pull-request-size pull-request-size bot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Aug 7, 2023
@caarlos0
Copy link
Member

caarlos0 commented Aug 7, 2023

@dependabot squash and merge

@caarlos0
Copy link
Member

caarlos0 commented Aug 7, 2023

@dependabot rebase

@dependabot dependabot bot force-pushed the dependabot/go_modules/golang.org/x/crypto-0.12.0 branch from 2df86ef to ec9f404 Compare August 7, 2023 12:16
@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Aug 7, 2023

One of your CI runs failed on this pull request, so Dependabot won't merge it.

Dependabot will still automatically merge this pull request if you amend it and your tests pass.

@codecov
Copy link

codecov bot commented Aug 7, 2023

Codecov Report

Merging #4235 (ec9f404) into main (e7ceead) will not change coverage.
Report is 1 commits behind head on main.
The diff coverage is n/a.

❗ Current head ec9f404 differs from pull request most recent head 99272e2. Consider uploading reports for the commit 99272e2 to get more accurate results

@@           Coverage Diff           @@
##             main    #4235   +/-   ##
=======================================
  Coverage   84.05%   84.05%           
=======================================
  Files         131      131           
  Lines       12402    12402           
=======================================
  Hits        10425    10425           
  Misses       1575     1575           
  Partials      402      402           

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.11.0 to 0.12.0.
- [Commits](golang/crypto@v0.11.0...v0.12.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/golang.org/x/crypto-0.12.0 branch from ec9f404 to 99272e2 Compare August 7, 2023 12:39
@caarlos0
Copy link
Member

caarlos0 commented Aug 7, 2023

@dependabot squash and merge

@caarlos0 caarlos0 merged commit 1d189e7 into main Aug 7, 2023
8 of 10 checks passed
@caarlos0 caarlos0 deleted the dependabot/go_modules/golang.org/x/crypto-0.12.0 branch August 7, 2023 13:04
@github-actions github-actions bot added this to the v1.20.0 milestone Aug 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant