Skip to content

Bump the go_modules group across 4 directories with 1 update#3

Closed
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/bindings/go_modules-security-group-510c3f1ff6
Closed

Bump the go_modules group across 4 directories with 1 update#3
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/bindings/go_modules-security-group-510c3f1ff6

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Jan 12, 2024

Bumps the go_modules group with 1 update in the /bindings directory: golang.org/x/crypto.
Bumps the go_modules group with 1 update in the /contracts directory: golang.org/x/crypto.
Bumps the go_modules group with 1 update in the /node directory: golang.org/x/crypto.
Bumps the go_modules group with 1 update in the /tx-submitter directory: golang.org/x/crypto.

Updates golang.org/x/crypto from 0.16.0 to 0.17.0

Commits
  • 9d2ee97 ssh: implement strict KEX protocol changes
  • 4e5a261 ssh: close net.Conn on all NewServerConn errors
  • 152cdb1 x509roots/fallback: update bundle
  • fdfe1f8 ssh: defer channel window adjustment
  • b8ffc16 blake2b: drop Go 1.6, Go 1.8 compatibility
  • 7e6fbd8 ssh: wrap errors from client handshake
  • bda2f3f argon2: avoid clobbering BP
  • See full diff in compare view

Updates golang.org/x/crypto from 0.16.0 to 0.17.0

Commits
  • 9d2ee97 ssh: implement strict KEX protocol changes
  • 4e5a261 ssh: close net.Conn on all NewServerConn errors
  • 152cdb1 x509roots/fallback: update bundle
  • fdfe1f8 ssh: defer channel window adjustment
  • b8ffc16 blake2b: drop Go 1.6, Go 1.8 compatibility
  • 7e6fbd8 ssh: wrap errors from client handshake
  • bda2f3f argon2: avoid clobbering BP
  • See full diff in compare view

Updates golang.org/x/crypto from 0.16.0 to 0.17.0

Commits
  • 9d2ee97 ssh: implement strict KEX protocol changes
  • 4e5a261 ssh: close net.Conn on all NewServerConn errors
  • 152cdb1 x509roots/fallback: update bundle
  • fdfe1f8 ssh: defer channel window adjustment
  • b8ffc16 blake2b: drop Go 1.6, Go 1.8 compatibility
  • 7e6fbd8 ssh: wrap errors from client handshake
  • bda2f3f argon2: avoid clobbering BP
  • See full diff in compare view

Updates golang.org/x/crypto from 0.16.0 to 0.17.0

Commits
  • 9d2ee97 ssh: implement strict KEX protocol changes
  • 4e5a261 ssh: close net.Conn on all NewServerConn errors
  • 152cdb1 x509roots/fallback: update bundle
  • fdfe1f8 ssh: defer channel window adjustment
  • b8ffc16 blake2b: drop Go 1.6, Go 1.8 compatibility
  • 7e6fbd8 ssh: wrap errors from client handshake
  • bda2f3f argon2: avoid clobbering BP
  • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jan 12, 2024
@dependabot dependabot Bot force-pushed the dependabot/go_modules/bindings/go_modules-security-group-510c3f1ff6 branch from bbb09e1 to 8613ca3 Compare January 24, 2024 08:05
Bumps the go_modules group with 1 update in the /bindings directory: [golang.org/x/crypto](https://github.com/golang/crypto).
Bumps the go_modules group with 1 update in the /contracts directory: [golang.org/x/crypto](https://github.com/golang/crypto).
Bumps the go_modules group with 1 update in the /node directory: [golang.org/x/crypto](https://github.com/golang/crypto).
Bumps the go_modules group with 1 update in the /tx-submitter directory: [golang.org/x/crypto](https://github.com/golang/crypto).


Updates `golang.org/x/crypto` from 0.16.0 to 0.17.0
- [Commits](golang/crypto@v0.16.0...v0.17.0)

Updates `golang.org/x/crypto` from 0.16.0 to 0.17.0
- [Commits](golang/crypto@v0.16.0...v0.17.0)

Updates `golang.org/x/crypto` from 0.16.0 to 0.17.0
- [Commits](golang/crypto@v0.16.0...v0.17.0)

Updates `golang.org/x/crypto` from 0.16.0 to 0.17.0
- [Commits](golang/crypto@v0.16.0...v0.17.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/crypto
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/crypto
  dependency-type: indirect
  dependency-group: go_modules-security-group
- dependency-name: golang.org/x/crypto
  dependency-type: indirect
  dependency-group: go_modules-security-group
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot force-pushed the dependabot/go_modules/bindings/go_modules-security-group-510c3f1ff6 branch from 8613ca3 to 34466ce Compare January 26, 2024 09:32
@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot Bot commented on behalf of github Jan 29, 2024

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot Bot commented on behalf of github Feb 7, 2024

Superseded by #23.

@dependabot dependabot Bot closed this Feb 7, 2024
@dependabot dependabot Bot deleted the dependabot/go_modules/bindings/go_modules-security-group-510c3f1ff6 branch February 7, 2024 04:21
anylots pushed a commit that referenced this pull request Jan 7, 2026
* refactor: simplify the encoding and decoding of tx

* style: cargo fmt

* style: remove .DS_Store
curryxbo pushed a commit that referenced this pull request May 8, 2026
…C / mutex skeletons

Adds non-runtime skeletons for the four pieces of SPEC-005 work that are
gated on pending blocking decisions (tech-design §8). All four files are
self-contained and compile, but none are wired into the main derivation
loop yet — switching them on requires the corresponding §8 decisions to
land. Each TODO is annotated with the specific blocking item.

What this commit adds:

- node/derivation/verify_path_b.go (SPEC-005 §3.3 path B):
    Eligibility check (last_block ≤ safe_head + locally present) and
    trigger condition matching tech-design §3.2.2. Stub returns
    errPathBUnavailable; the actual blob-rebuild encoder is left as a
    TODO pending confirmation that we should reuse tx-submitter helpers
    rather than duplicate them (open question §8 #3).

- node/derivation/verify.go::rollbackLocalChain (SPEC-005 §5.2):
    Replaces the previous stub message with the formal 8-step atomic
    ordering, plus a checkRollbackBoundary helper that enforces the
    finalized_head boundary (SPEC-005 §3.6). The actual SetHead call is
    still TODO and depends on §8 #4 (go-ethereum hash-matched SetHead).

- node/derivation/sequencer_mutex.go (SPEC-005 §3.6 / §4):
    SequencerMutex primitive (RWMutex-based for now) with public
    Acquire/Release Production / Rollback methods. Granularity (global
    stop-the-world vs interval lock) intentionally hidden behind the
    method API so §8 #5 can switch implementation without churning
    callers.

- node/derivation/admin_rpc.go (SPEC-005 §5.1):
    AdminAPI.SetL2Head(number, hash) skeleton. Hash-matched per
    tech-design §3.3 and rejects targets below finalized_head before
    delegating to the rollback executor. Authentication wiring blocked
    on §8 #2.

No call sites are modified; runtime behaviour is unchanged. P3 unblocks
parallel work on §8 decisions: while operators decide on auth /
mutex granularity / SetHead semantics, downstream developers can build
tests against these signatures.

Refs: morph-l2/morph-specs SPEC-005 §3.3 / §3.6 / §4 / §5 / §8
Co-authored-by: Cursor <cursoragent@cursor.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants