infinitelambda / dbt-tags

Tag-based masking policies management in Snowflake ❄️ 🏷️
https://dbt-tags.iflambda.com/latest
Apache License 2.0
12 stars 3 forks source link

chore(deps): bump the pip group across 1 directory with 2 updates #17

Closed dependabot[bot] closed 1 week ago

dependabot[bot] commented 3 weeks ago

Bumps the pip group with 1 update in the / directory: cryptography.

Updates cryptography from 42.0.8 to 43.0.1

Changelog

Sourced from cryptography's changelog.

43.0.1 - 2024-09-03


* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.3.2.

.. _v43-0-0:

43.0.0 - 2024-07-20

  • BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1e has been removed. Users on older version of OpenSSL will need to upgrade.
  • BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.8.
  • Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.3.1.
  • Updated the minimum supported Rust version (MSRV) to 1.65.0, from 1.63.0.
  • :func:~cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key now enforces a minimum RSA key size of 1024-bit. Note that 1024-bit is still considered insecure, users should generally use a key size of 2048-bits.
  • :func:~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates now emits ASN.1 that more closely follows the recommendations in :rfc:2315.
  • Added new :doc:/hazmat/decrepit/index module which contains outdated and insecure cryptographic primitives. :class:~cryptography.hazmat.primitives.ciphers.algorithms.CAST5, :class:~cryptography.hazmat.primitives.ciphers.algorithms.SEED, :class:~cryptography.hazmat.primitives.ciphers.algorithms.IDEA, and :class:~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish, which were deprecated in 37.0.0, have been added to this module. They will be removed from the cipher module in 45.0.0.
  • Moved :class:~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES and :class:~cryptography.hazmat.primitives.ciphers.algorithms.ARC4 into :doc:/hazmat/decrepit/index and deprecated them in the cipher module. They will be removed from the cipher module in 48.0.0.
  • Added support for deterministic :class:~cryptography.hazmat.primitives.asymmetric.ec.ECDSA (:rfc:6979)
  • Added support for client certificate verification to the :mod:X.509 path validation <cryptography.x509.verification> APIs in the form of :class:~cryptography.x509.verification.ClientVerifier, :class:~cryptography.x509.verification.VerifiedClient, and PolicyBuilder :meth:~cryptography.x509.verification.PolicyBuilder.build_client_verifier.
  • Added Certificate :attr:~cryptography.x509.Certificate.public_key_algorithm_oid and Certificate Signing Request :attr:~cryptography.x509.CertificateSigningRequest.public_key_algorithm_oid to determine the :class:~cryptography.hazmat._oid.PublicKeyAlgorithmOID Object Identifier of the public key found inside the certificate.
  • Added :attr:~cryptography.x509.InvalidityDate.invalidity_date_utc, a timezone-aware alternative to the naïve datetime attribute :attr:~cryptography.x509.InvalidityDate.invalidity_date.
  • Added support for parsing empty DN string in

... (truncated)

Commits


Updates snowflake-connector-python from 3.11.0 to 3.12.3

Release notes

Sourced from snowflake-connector-python's releases.

3.12.3

  • v3.12.3(October 25,2024)
    • Improved the error message for SSL-related issues to provide clearer guidance when an SSL error occurs.
    • Improved error message for SQL execution cancellations caused by timeout.

3.12.2

  • v3.12.2(September 11,2024)
    • Improved error handling for asynchronous queries, providing more detailed and informative error messages when an async query fails.
    • Improved inference of top-level domains for accounts specifying a region in China, now defaulting to snowflakecomputing.cn.
    • Improved implementation of the snowflake.connector.util_text.random_string to reduce the likelihood of collisions.
    • Updated the log level for OCSP fail-open warning messages from ERROR to WARNING.

3.12.1

  • v3.12.1(August 20,2024)
    • Fixed a bug that logged the session token when renewing a session.
    • Fixed a bug where disabling client telemetry did not work.
    • Fixed a bug where passing login_timeout as a string raised a TypeError during the login retry step.
    • Use pathlib instead of os for default config file location resolution.
    • Removed upper cryptogaphy version pin.
    • Removed reference to script snowflake-export-certs (its backing module was already removed long ago)
    • Enhanced retry mechanism for handling transient network failures during query result polling when no server response is received.

3.12.0

  • v3.12.0(July 24,2024)
    • Set default connection timeout of 10 seconds and socket read timeout of 10 minutes for HTTP calls in file transfer.
    • Optimized to_pandas() performance by fully parallel downloading logic.
    • Fixed a bug that specifying client_session_keep_alive_heartbeat_frequency in snowflake-sqlalchemy could crash the connector.
    • Fixed incorrect type hint of connection parameter private_key.
    • Added support for connectivity to multiple domains.
    • Bumped keyring dependency from >=23.1.0,=23.1.0,<26.0.0.
    • Disabled OOB Telemetry.
Commits
  • 9f9c71e Patch python connector version bump (#2079)
  • c965070 SNOW-1760173: fix test failure (#2078)
  • d73afee SNOW-1650124: Pass Azure SAS Token via params (#2060)
  • dbc9284 SNOW-1657037: Remove secrets from debug logs. (#2058)
  • 7ddbf31 SNOW-799381: improve error message when hitting ssl related error (#2074)
  • 8e2b757 SNOW-802436: improve error message for sql execution cancellation due to time...
  • b55531b SNOW-1540289: add test for max policy backoff time (#2072)
  • a959fc6 SNOW-1325701: Use scoped temp object in write pandas (#2068)
  • aeb771c Fix a test to align with server side BCR (#2065)
  • 3c82559 SNOW-1659123: fix mac regression ci (#2051)
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/infinitelambda/dbt-tags/network/alerts).