Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump pyopenssl from 21.0.0 to 22.1.0 in /stix_shifter #1144

Merged
merged 4 commits into from
Nov 4, 2022

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Oct 6, 2022

Bumps pyopenssl from 21.0.0 to 22.1.0.

Changelog

Sourced from pyopenssl's changelog.

22.1.0 (2022-09-25)

Backward-incompatible changes: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

  • Remove support for SSLv2 and SSLv3.
  • The minimum cryptography version is now 38.0.x (and we now pin releases against cryptography major versions to prevent future breakage)
  • The OpenSSL.crypto.X509StoreContextError exception has been refactored, changing its internal attributes. [#1133](https://github.com/pyca/pyopenssl/issues/1133) <https://github.com/pyca/pyopenssl/pull/1133>_

Deprecations: ^^^^^^^^^^^^^

  • OpenSSL.SSL.SSLeay_version is deprecated in favor of OpenSSL.SSL.OpenSSL_version. The constants OpenSSL.SSL.SSLEAY_* are deprecated in favor of OpenSSL.SSL.OPENSSL_*.

Changes: ^^^^^^^^

  • Add OpenSSL.SSL.Connection.set_verify and OpenSSL.SSL.Connection.get_verify_mode to override the context object's verification flags. [#1073](https://github.com/pyca/pyopenssl/issues/1073) <https://github.com/pyca/pyopenssl/pull/1073>_
  • Add OpenSSL.SSL.Connection.use_certificate and OpenSSL.SSL.Connection.use_privatekey to set a certificate per connection (and not just per context) [#1121](https://github.com/pyca/pyopenssl/issues/1121) <https://github.com/pyca/pyopenssl/pull/1121>_.

22.0.0 (2022-01-29)

Backward-incompatible changes: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

  • Drop support for Python 2.7. [#1047](https://github.com/pyca/pyopenssl/issues/1047) <https://github.com/pyca/pyopenssl/pull/1047>_
  • The minimum cryptography version is now 35.0.

Deprecations: ^^^^^^^^^^^^^

Changes: ^^^^^^^^

  • Expose wrappers for some DTLS <https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security>_ primitives. [#1026](https://github.com/pyca/pyopenssl/issues/1026) <https://github.com/pyca/pyopenssl/pull/1026>_
Commits
  • d7e539c Bump for 22.1.0 release (#1148)
  • ad50a44 disallow latest sphinx release because it doesn't work with sphinx_rtd_theme ...
  • f0ed288 add Connection.use_(certificate|privatekey) (#1121)
  • a3483a7 fixes #1143 -- pin cryptography max version to prevent future pain (#1145)
  • a52db02 Move away from the SSLEAY name (#1144)
  • a145fc3 Switch to the new utils.deprecation spelling (#1140)
  • 301e29a Don't test that invalid RSA keys can be imported (#1139)
  • 38f9b4e Fix docs in SSL.Context.get_alpn_proto_negotiated (#1137)
  • 65ca53a Make X509StoreContextError's message friendlier (#1133)
  • 02db1a0 Fix incorrect documentation on X509Req.set_version #1130 (#1131)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [pyopenssl](https://github.com/pyca/pyopenssl) from 21.0.0 to 22.1.0.
- [Release notes](https://github.com/pyca/pyopenssl/releases)
- [Changelog](https://github.com/pyca/pyopenssl/blob/main/CHANGELOG.rst)
- [Commits](pyca/pyopenssl@21.0.0...22.1.0)

---
updated-dependencies:
- dependency-name: pyopenssl
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Oct 6, 2022
@codecov
Copy link

codecov bot commented Nov 3, 2022

Codecov Report

Base: 64.21% // Head: 84.75% // Increases project coverage by +20.53% 🎉

Coverage data is based on head (080e63d) compared to base (ca9fc81).
Patch coverage: 100.00% of modified lines in pull request are covered.

❗ Current head 080e63d differs from pull request most recent head 630b310. Consider uploading reports for the commit 630b310 to get more accurate results

Additional details and impacted files
@@             Coverage Diff              @@
##           develop    #1144       +/-   ##
============================================
+ Coverage    64.21%   84.75%   +20.53%     
============================================
  Files          556      556               
  Lines        54363    41261    -13102     
============================================
+ Hits         34911    34969       +58     
+ Misses       19452     6292    -13160     
Impacted Files Coverage Δ
...cp_chronicle/stix_translation/query_constructor.py 95.65% <100.00%> (+17.45%) ⬆️
...fter_modules/mysql/stix_transmission/api_client.py 0.00% <0.00%> (ø)
...er_modules/msatp/stix_transmission/error_mapper.py 0.00% <0.00%> (ø)
...er_modules/mysql/stix_transmission/error_mapper.py 0.00% <0.00%> (ø)
...r_modules/cloudsql/stix_transmission/api_client.py 0.00% <0.00%> (ø)
...r_modules/qradar/stix_transmission/error_mapper.py 0.00% <0.00%> (ø)
..._modules/error_test/stix_transmission/connector.py 0.00% <0.00%> (ø)
...modules/guardium/stix_transmission/error_mapper.py 0.00% <0.00%> (ø)
...modules/stix_bundle/stix_transmission/connector.py 0.00% <0.00%> (ø)
...odules/alertflex/stix_transmission/error_mapper.py 0.00% <0.00%> (ø)
... and 304 more

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report at Codecov.
📢 Do you have feedback about the report comment? Let us know in this issue.

@mdazam1942 mdazam1942 merged commit 9cb6a13 into develop Nov 4, 2022
@mdazam1942 mdazam1942 deleted the dependabot/pip/stix_shifter/pyopenssl-22.1.0 branch November 4, 2022 15:46
baulus pushed a commit that referenced this pull request Dec 7, 2022
Bumps [pyopenssl](https://github.com/pyca/pyopenssl) from 21.0.0 to 22.1.0.
- [Release notes](https://github.com/pyca/pyopenssl/releases)
- [Changelog](https://github.com/pyca/pyopenssl/blob/main/CHANGELOG.rst)
- [Commits](pyca/pyopenssl@21.0.0...22.1.0)

---
updated-dependencies:
- dependency-name: pyopenssl
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Danny Elliott <danny.elliott@ibm.com>
Co-authored-by: Md Azam <mdazam@ca.ibm.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants