Skip to content
This repository has been archived by the owner on Dec 12, 2024. It is now read-only.

Bump golang.org/x/crypto from 0.4.0 to 0.5.0 #242

Merged
merged 3 commits into from
Jan 10, 2023

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 9, 2023

Bumps golang.org/x/crypto from 0.4.0 to 0.5.0.

Commits
  • 3d872d0 go.mod: update golang.org/x dependencies
  • bc7d1d1 bcrypt: reject passwords longer than 72 bytes
  • 7e3ac20 internal/wycheproof: also use Verify in TestECDSA
  • 23edec0 ssh: ensure that handshakeTransport goroutines have finished before Close ret...
  • f495dc3 acme: eliminate arbitrary timeouts in tests
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.

Dependabot will merge this PR once it's up-to-date and CI passes on it, as requested by @decentralgabe.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 9, 2023
@codecov-commenter
Copy link

Codecov Report

Merging #242 (d124f3a) into main (217bf1d) will not change coverage.
The diff coverage is n/a.

@@           Coverage Diff           @@
##             main     #242   +/-   ##
=======================================
  Coverage   24.58%   24.58%           
=======================================
  Files          31       31           
  Lines        3022     3022           
=======================================
  Hits          743      743           
  Misses       2157     2157           
  Partials      122      122           

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.4.0 to 0.5.0.
- [Release notes](https://github.com/golang/crypto/releases)
- [Commits](golang/crypto@v0.4.0...v0.5.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/golang.org/x/crypto-0.5.0 branch from d124f3a to a2e08af Compare January 9, 2023 15:04
@decentralgabe
Copy link
Contributor

@dependabot squash and merge

@dependabot dependabot bot merged commit e0d5ab8 into main Jan 10, 2023
@dependabot dependabot bot deleted the dependabot/go_modules/golang.org/x/crypto-0.5.0 branch January 10, 2023 22:37
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants