[skip changelog] Bump github.com/ProtonMail/go-crypto from 1.2.0 to 1.3.0
Merged
Number: #2918
Type: Pull Request
State: Merged
Type: Pull Request
State: Merged
Author:
dependabot[bot]
Association: Contributor
Comments: 1
Association: Contributor
Comments: 1
Created:
May 23, 2025 at 12:48 PM UTC
(5 months ago)
(5 months ago)
Updated:
June 09, 2025 at 11:48 AM UTC
(5 months ago)
(5 months ago)
Merged:
June 09, 2025 at 11:48 AM UTC
(5 months ago)
by alessio-perugini
(5 months ago)
by alessio-perugini
Time to Close:
17 days
Labels:
topic: infrastructure
topic: infrastructure
Description:
Bumps github.com/ProtonMail/go-crypto from 1.2.0 to 1.3.0.
Release notes
Sourced from github.com/ProtonMail/go-crypto's releases.
Release v1.3.0
What's Changed
- API v2: Tolerate invalid key signatures if one verifies in ProtonMail/go-crypto#284
- Enforce acceptable hash functions in clearsign in ProtonMail/go-crypto#281
- Allow to set a decompressed message size limit in ProtonMail/go-crypto#285
- API v1: Only allow acceptable hashes when writing signatures in ProtonMail/go-crypto#286
Full Changelog: https://github.com/ProtonMail/go-crypto/compare/v1.2.0...v1.3.0
Release v1.3.0-proton
This release is v1.3.0 with support for the following non-standardized features:
- Presistent symmetric keys experimental + latest draft draft-ietf-openpgp-persistent-symmetric-keys-00
- Automatic forwarding draft-wussler-openpgp-forwarding-00
- Post-quantum algorithms draft-ietf-openpgp-pqc (Updated to draft-ietf-openpgp-pqc-09)
Commits
3b22d85Merge pull request #286 from ProtonMail/feat/v1-api-enforce-signature-hashesa9af95cfeat(v1): Only allow acceptable hashes when writing signatures3c60603Merge pull request #285 from ProtonMail/feat/decompression-size-limitd664700feat: Allow to set a decompressed size limite1ea40eMerge pull request #281 from ProtonMail/fix/clearsign-check-hash9cd4c3afeat(clearsign): Write complete legacy hash header244eb1cfix(clearsign): Enforce acceptable hash functions in clearsigna994e32Merge pull request #284 from ProtonMail/feat/less-restrictive-key-signature8fe0e95feat(v2): Tolerate invalid key signatures if one passes- See full diff in compare view
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Pull Request Statistics
Commits:
2
2
Files Changed:
24
24
Additions:
+69
+69
Deletions:
-69
-69
Package Dependencies
Package:
github.com/ProtonMail/go-crypto
Ecosystem:
go
go
Version Change:
1.2.0 → 1.3.0
Update Type:
Minor
Minor
Technical Details
| ID: | 602409 |
| UUID: | 2539772818 |
| Node ID: | PR_kwDOCJXT4c6XYduS |
| Host: | GitHub |
| Repository: | arduino/arduino-cli |
| Merge State: | Unknown |