google / sxg-rs

A set of tools for generating signed exchanges at serve time.
Apache License 2.0
84 stars 20 forks source link

Bump the cargo group with 10 updates #464

Open dependabot[bot] opened 3 months ago

dependabot[bot] commented 3 months ago

Bumps the cargo group with 10 updates:

Package From To
tls-listener 0.5.1 0.7.0
tokio 1.23.0 1.24.2
bumpalo 3.6.1 3.16.0
bzip2 0.4.3 0.4.4
h2 0.3.11 0.3.26
openssl 0.10.36 0.10.66
openssl-src 111.22.0+1.1.1q 300.3.1+3.3.1
time 0.1.44 0.1.45
unsafe-libyaml 0.2.4 0.2.11
webpki 0.22.0 0.22.4

Updates tls-listener from 0.5.1 to 0.7.0

Release notes

Sourced from tls-listener's releases.

0.6.0

Added

  • Added additional tests and examples
  • Re-export tls engine crates as public modules.

Changed

  • Increased default handshake timeout to 10 seconds (technically a breaking change)
Changelog

Sourced from tls-listener's changelog.

0.7.0 - 2023-03-31

Changed

  • Increase tokio-rustls version to 0.24.0

0.6.0 - 2022-12-30

Added

  • Added additional tests and examples
  • Re-export tls engine crates as public modules.

Changed

  • Increased default handshake timeout to 10 seconds (technically a breaking change)
Commits
  • 55fa405 Bump version
  • 526b49f Merge pull request #33 from lperlaki/rustls-21-update
  • dd624dc Create .github/dependabot.yml
  • 7b5296a deps: update tokio-rustls v0.23.0 -> v0.24.0
  • 380d3e6 Update to 0.6.0
  • b519f9e Merge pull request #32 from tmccombs/increase-timeout
  • b9e666d Increase handshake timeout
  • f90e672 Merge pull request #27 from ravenclaw900/main
  • 85b58b7 Export internal crates
  • 72c179a Merge pull request #25 from jacob-pro/main
  • Additional commits viewable in compare view


Updates tokio from 1.23.0 to 1.24.2

Release notes

Sourced from tokio's releases.

Tokio v1.24.1

This release fixes a compilation failure on targets without AtomicU64 when using rustc older than 1.63. (#5356)

#5356: tokio-rs/tokio#5356

Tokio v1.24.0

The highlight of this release is the reduction of lock contention for all I/O operations (#5300). We have received reports of up to a 20% improvement in CPU utilization and increased throughput for real-world I/O heavy applications.

Fixed

  • rt: improve native AtomicU64 support detection (#5284)

Added

  • rt: add configuration option for max number of I/O events polled from the OS per tick (#5186)
  • rt: add an environment variable for configuring the default number of worker threads per runtime instance (#4250)

Changed

  • sync: reduce MPSC channel stack usage (#5294)
  • io: reduce lock contention in I/O operations (#5300)
  • fs: speed up read_dir() by chunking operations (#5309)
  • rt: use internal ThreadId implementation (#5329)
  • test: don't auto-advance time when a spawn_blocking task is running (#5115)

#5186: tokio-rs/tokio#5186 #5294: tokio-rs/tokio#5294 #5284: tokio-rs/tokio#5284 #4250: tokio-rs/tokio#4250 #5300: tokio-rs/tokio#5300 #5329: tokio-rs/tokio#5329 #5115: tokio-rs/tokio#5115 #5309: tokio-rs/tokio#5309

Tokio v1.23.1

This release forward ports changes from 1.18.4.

Fixed

  • net: fix Windows named pipe server builder to maintain option when toggling pipe mode (#5336).

#5336: tokio-rs/tokio#5336

Commits


Updates bumpalo from 3.6.1 to 3.16.0

Changelog

Sourced from bumpalo's changelog.

3.16.0

Released 2024-04-08.

Added

  • Added an optional, off-by-default dependency on the serde crate. Enabling this dependency allows you to serialize Bumpalo's collection and box types. Deserialization is not implemented, due to constraints of the deserialization trait.

3.15.4

Released 2024-03-07.

Added

  • Added the bumpalo::collections::Vec::extend_from_slices_copy method, which is a faster way to extend a vec from multiple slices when the element is Copy than calling extend_from_slice_copy N times.

3.15.3

Released 2024-02-22.

Added

  • Added additional performance improvements to bumpalo::collections::Vec related to reserving capacity.

3.15.2

Released 2024-02-21.

Added

  • Add a bumpalo::collections::Vec::extend_from_slice_copy method. This doesn't exist on the standard library's Vec but they have access to specialization, so their regular extend_from_slice has a specialization for Copy types. Using this new method for Copy types is a ~80x performance improvement over the plain extend_from_slice method.

... (truncated)

Commits
  • 4eeab88 Bump to version 3.16.0
  • d746a56 add serde serialization support (#210)
  • 49c5a71 Bump to version 3.15.4
  • 6a91333 Adds Vec::extend_from_slices_copy that accepts multiple slices (#240)
  • 2ed8718 Bump to 3.15.3
  • 1803cca Modifies RawVec reserve fn structure to improve inlining (#239)
  • 2ffdfb3 Bump to version 3.15.2
  • 54c88f0 Provides implementation of Vec::extend_from_slice optimized for T: Copy (...
  • f8597ce Fix MSRV in Cargo.toml; bump to version 3.15.1
  • bb660a3 Bump to version 3.15.0
  • Additional commits viewable in compare view


Updates bzip2 from 0.4.3 to 0.4.4

Commits


Updates h2 from 0.3.11 to 0.3.26

Release notes

Sourced from h2's releases.

v0.3.26

What's Changed

  • Limit number of CONTINUATION frames for misbehaving connections.

See https://seanmonstar.com/blog/hyper-http2-continuation-flood/ for more info.

v0.3.25

What's Changed

Full Changelog: https://github.com/hyperium/h2/compare/v0.3.24...v0.3.25

v0.3.24

Fixed

  • Limit error resets for misbehaving connections.

v0.3.23

What's Changed

v0.3.22

What's Changed

  • Add header_table_size(usize) option to client and server builders.
  • Improve throughput when vectored IO is not available.
  • Update indexmap to 2.

New Contributors

v0.3.21

What's Changed

  • Fix opening of new streams over peer's max concurrent limit.
  • Fix RecvStream to return data even if it has received a CANCEL stream error.
  • Update MSRV to 1.63.

New Contributors

v0.3.20

Bug Fixes

... (truncated)

Changelog

Sourced from h2's changelog.

0.3.26 (April 3, 2024)

  • Limit number of CONTINUATION frames for misbehaving connections.

0.3.25 (March 15, 2024)

  • Improve performance decoding many headers.

0.3.24 (January 17, 2024)

  • Limit error resets for misbehaving connections.

0.3.23 (January 10, 2024)

  • Backport fix from 0.4.1 for stream capacity assignment.

0.3.22 (November 15, 2023)

  • Add header_table_size(usize) option to client and server builders.
  • Improve throughput when vectored IO is not available.
  • Update indexmap to 2.

0.3.21 (August 21, 2023)

  • Fix opening of new streams over peer's max concurrent limit.
  • Fix RecvStream to return data even if it has received a CANCEL stream error.
  • Update MSRV to 1.63.

0.3.20 (June 26, 2023)

  • Fix panic if a server received a request with a :status pseudo header in the 1xx range.
  • Fix panic if a reset stream had pending push promises that were more than allowed.
  • Fix potential flow control overflow by subtraction, instead returning a connection error.

0.3.19 (May 12, 2023)

  • Fix counting reset streams when triggered by a GOAWAY.
  • Send too_many_resets in opaque debug data of GOAWAY when too many resets received.

0.3.18 (April 17, 2023)

  • Fix panic because of opposite check in is_remote_local().

0.3.17 (April 13, 2023)

  • Add Error::is_library() method to check if the originated inside h2.
  • Add max_pending_accept_reset_streams(usize) option to client and server builders.
  • Fix theoretical memory growth when receiving too many HEADERS and then RST_STREAM frames faster than an application can accept them off the queue.

... (truncated)

Commits


Updates openssl from 0.10.36 to 0.10.66

Release notes

Sourced from openssl's releases.

openssl-v0.10.66

What's Changed

Full Changelog: https://github.com/sfackler/rust-openssl/compare/openssl-v0.10.65...openssl-v0.10.66

openssl-v0.10.65

What's Changed

New Contributors

Full Changelog: https://github.com/sfackler/rust-openssl/compare/openssl-v0.10.64...openssl-v0.10.65

openssl-v0.10.64

What's Changed

... (truncated)

Commits
  • ad70a0b Merge pull request #2267 from alex/bump-for-release
  • 5ce473b Release openssl v0.10.66
  • aef36e0 Merge pull request #2266 from alex/mem-bio-invariant
  • 142deef Fixed invariant violation in MemBio::get_buf with empty results
  • 32f150b Merge pull request #2265 from alex/bump-for-release
  • 98addd2 Release openssl v0.10.65 and openssl-sys v0.9.103
  • 7c7958d Merge pull request #2262 from alex/pkey-api
  • d7b12cc Switch Pkey::from_ to use set1 functions
  • 22ffa9a Merge pull request #2258 from sfackler/init-md
  • 9de3794 Initialize OpenSSL in MD constructors
  • Additional commits viewable in compare view


Updates openssl-src from 111.22.0+1.1.1q to 300.3.1+3.3.1

Commits


Updates time from 0.1.44 to 0.1.45

Commits


Updates unsafe-libyaml from 0.2.4 to 0.2.11

Release notes

Sourced from unsafe-libyaml's releases.

0.2.11

  • Fix quadratic parse time for YAML containing deeply nested flow collections (#26)

0.2.10

  • Fix write to improperly aligned pointer in 32-bit targets (#21)

0.2.9

  • Documentation improvements

0.2.8

No release notes provided.

0.2.7

  • Adding support for emitting Unicode characters over codepoint U+FFFF (#20)

0.2.6

  • Documentation improvements

0.2.5

  • Documentation improvements
Commits
  • a7b8d1f Release 0.2.11
  • 7c42792 Merge pull request #27 from dtolnay/simplekeys
  • eb7de7e Fix quadratic behavior in yaml_parser_fetch_more_tokens
  • 7440d58 Merge pull request #25 from jayvdb/typos
  • b3496ce fix typos
  • 63131f5 Explicitly disable unsafe_op_in_unsafe_fn lint
  • 61f3ab8 Release 0.2.10
  • d90d7ab Clean up some redundant casts
  • 7755559 Merge pull request #24 from dtolnay/mallocalign
  • b8a0863 Fix insufficient alignment of malloc's return value on 32-bit
  • Additional commits viewable in compare view


Updates webpki from 0.22.0 to 0.22.4

Commits


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/google/sxg-rs/network/alerts).