RTradeLtd / Temporal

☄️ Temporal is an easy-to-use, enterprise-grade interface into distributed and decentralized storage
https://temporal.cloud
MIT License
227 stars 40 forks source link

build(deps): bump github.com/libp2p/go-libp2p-core from 0.0.3 to 0.2.5 #411

Closed dependabot-preview[bot] closed 5 years ago

dependabot-preview[bot] commented 5 years ago

Bumps github.com/libp2p/go-libp2p-core from 0.0.3 to 0.2.5.

Release notes *Sourced from [github.com/libp2p/go-libp2p-core's releases](https://github.com/libp2p/go-libp2p-core/releases).* > ## v0.2.5 > This release [fixes a bug](https://github-redirect.dependabot.com/libp2p/go-libp2p-core/pull/74) in the insecure plaintext security protocol. The implementation now conforms to the spec by using varints to delimit messages instead of fixed-length integers. > > ## Release v0.2.4 > * Updates gogo/protobuf. > * Forbids <2048 bit RSA keys when compiling with OpenSSL. Previously, these were only forbidden with go's built in RSA implementation. > > ## v0.2.3 > * Fixes build on arm64/linux by updating sha256-simd. > * Include all known multiaddr protocol definitions (circuit, websocket, dns, > etc.) by default. Previously, one would have to manually import the appropriate > transport. > * Fixes a few more constant time private key comparison issues. > * Update dependencies. > > ## v0.2.2 > - Introduces a return value, `error`, on the `EventBus` interface's `Emit` method. While this is a departure from the previous interface, we believe that moving from a panic to returning an error will lead to more stable code. Any old code that relies on recovering from a panic should update accordingly to handle the error returned. > > ## v0.2.1 > - Removes support for Blowfish cipher. **NOTE**: Any code attempting to use an unknown cipher type will panic. This is not new behavior, though users will now be given an understandable panic message. > > ## v0.2.0 > - Increases the minimum strength requirement of RSA keys to 2048 bits. > > **NOTE**: While this change doesn't break any programmer APIs, it does incur breakage in tests that require. **We recommend switching to the incoming release, v0.1.0, of go-libp2p-testing for key-generation needs, for it has switched to using Ed25519 keys by default.** If you prefer to use weak RSA keys in tests, you can bypass this restriction by setting the environment variable `LIBP2P_ALLOW_WEAK_RSA_KEYS` to any non-empty value (e.g. `1`), which returns the minimum strength requirement to its previous value of 512 bits. > > ## v0.1.0 > - Introduces an implementation of `insecure` transport that adheres to the new [specification](https://github.com/libp2p/specs/tree/master/plaintext). **Note**: _This release does not break the API, but the underlying protocol has changed. As always, the insecure transport is to be used in **testing only**. Tests using the insecure transport should continue to function, so long as all peers in the tests operate to the new specification._ > > ## v0.0.9 > * Reverts the upgrade of the `insecure` transport to the the [new spec](https://github.com/libp2p/specs/tree/master/plaintext) to prevent API breakage. > > ## v0.0.8 > Don't panic when trying to generate keys on curves we don't know. Instead, return an error. > > ## v0.0.7 > * Replace private key equality checks with constant time equivalents. Prevents leakage of information when comparing keys. > * Adjust `insecure` transport to adhere to the new specification: https://github.com/libp2p/specs/tree/master/plaintext. > > ## v0.0.6 > * eventbus interface changes for solidification. > > ## v0.0.5 > Introduces a registry for OpenCensus views, namespaced by string module names. > > ## v0.0.4 > * introduces an eventbus abstraction. > * introduces an initial set of events covering protocol updates. > * upgrades golang.org/x/crypto.
Commits - [`f06e38f`](https://github.com/libp2p/go-libp2p-core/commit/f06e38f2e833108ea94e39bb4642940175ca7547) use varints for delimiting plaintext 2.0 msgs ([#74](https://github-redirect.dependabot.com/libp2p/go-libp2p-core/issues/74)) - [`42a4b34`](https://github.com/libp2p/go-libp2p-core/commit/42a4b347f6b3a2265e43ae83367e76ccf9a41a90) Merge pull request [#71](https://github-redirect.dependabot.com/libp2p/go-libp2p-core/issues/71) from kpp/clear_bwc - [`b1df0aa`](https://github.com/libp2p/go-libp2p-core/commit/b1df0aa8b13529b9c9fcfcc8a7630ff1c0c3fccd) fix(metrics): update go-flow-metrics and fix tests for upstream changes - [`91d2454`](https://github.com/libp2p/go-libp2p-core/commit/91d2454e8c6337e80f421cf73513a8050c54fb13) Add a test for BandwidthCounter::Reset - [`7dbbdcc`](https://github.com/libp2p/go-libp2p-core/commit/7dbbdcc41768ed82722e8340406f249e15dd0208) Add API to reset bandwidth counters - [`f94ed8d`](https://github.com/libp2p/go-libp2p-core/commit/f94ed8d804a19608d36251b1d23633ccd135b9b0) Merge pull request [#69](https://github-redirect.dependabot.com/libp2p/go-libp2p-core/issues/69) from libp2p/chore/update-protobuf - [`11af061`](https://github.com/libp2p/go-libp2p-core/commit/11af061e49057eee881390513c2704f1af168041) chore(dep): update protobuf - [`a5bf248`](https://github.com/libp2p/go-libp2p-core/commit/a5bf2487c11df7ab7b6d09fa56f774c87be13f35) Merge pull request [#66](https://github-redirect.dependabot.com/libp2p/go-libp2p-core/issues/66) from quorumcontrol/update/crypto-library - [`2eac5ef`](https://github.com/libp2p/go-libp2p-core/commit/2eac5ef26382c6cea5893b87cae01017ea22162f) Merge pull request [#67](https://github-redirect.dependabot.com/libp2p/go-libp2p-core/issues/67) from libp2p/fix/openssl-min-key-size - [`bf79471`](https://github.com/libp2p/go-libp2p-core/commit/bf79471ef016171d32f98a1fae82fae85ae79e2c) fix(key size): forbid small openssl RSA keys - Additional commits viewable in [compare view](https://github.com/libp2p/go-libp2p-core/compare/v0.0.3...v0.2.5)


Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Note: This repo was added to Dependabot recently, so you'll receive a maximum of 5 PRs for your first few update runs. Once an update run creates fewer than 5 PRs we'll remove that limit.

You can always request more updates by clicking Bump now in your Dependabot dashboard.

Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language - `@dependabot badge me` will comment on this PR with code to add a "Dependabot enabled" badge to your readme Additionally, you can set the following in your Dependabot [dashboard](https://app.dependabot.com): - Update frequency (including time of day and day of week) - Pull request limits (per update run and/or open at any time) - Out-of-range updates (receive only lockfile updates, if desired) - Security updates (receive only security updates, if desired)
codecov[bot] commented 5 years ago

Codecov Report

Merging #411 into master will not change coverage. The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #411   +/-   ##
=======================================
  Coverage   52.54%   52.54%           
=======================================
  Files          43       43           
  Lines        4121     4121           
=======================================
  Hits         2165     2165           
  Misses       1472     1472           
  Partials      484      484

Continue to review full report at Codecov.

Legend - Click here to learn more Δ = absolute <relative> (impact), ø = not affected, ? = missing data Powered by Codecov. Last update 27c9602...2b3093c. Read the comment docs.