fix(deps): update dependency paragonie/halite to v5#325
fix(deps): update dependency paragonie/halite to v5#325renovate[bot] wants to merge 1 commit intomainfrom
Conversation
Greptile OverviewGreptile Summary
Confidence Score: 2/5
Important Files Changed
Sequence DiagramsequenceDiagram
participant Dev as Developer/CI
participant Composer as Composer
participant Repo as Packagist/Dependency Resolver
participant Halite as paragonie/halite v5
Dev->>Composer: composer update paragonie/halite
Composer->>Repo: Resolve dependencies (^5.0)
Repo-->>Composer: Select halite v5.x + transitive deps
Composer-->>Dev: Update composer.lock + install vendor
Dev->>Dev: Run tests/static analysis
note over Dev,Halite: Runtime behavior depends on how Halite APIs are used
Dev-->>Dev: Merge once compatibility verified
|
Additional Comments (1)
|
6e65934 to
098dc56
Compare
f8144d6 to
5780604
Compare
5780604 to
15c62ff
Compare
Renovate Ignore NotificationBecause you closed this PR without merging, Renovate will ignore this update. You will not get PRs for any future If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR. |
This PR contains the following updates:
^4.0→^5.0Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
paragonie/halite (paragonie/halite)
v5.1.4Compare Source
http://links with thehttps://URL they redirect to by @GrahamCampbell in #196finalfrom private methods by @junaidbinfarooq in #204v5.1.3Compare Source
v5.1.2Compare Source
#[SensitiveParameter]annotation on some inputsHiddenStringv5.1.1Compare Source
Learn more here.
v5.1.0Compare Source
and sodium_compat, and the functions we use in 5.x aren't available until
PHP 8.1. See #178.
not guaranteed.
v5.0.0Compare Source
encryption key, rather than using the raw X25519 output directly as an encryption key. This is important because
Elliptic Curve Diffie-Hellman results in a random group element, but that isn't necessarily a uniformly random bit
string.
Cheon's attack. This reduces the effective security
from 125 bits (Pollard's rho) to 123 bits, but neither is a practical concern today.
strategy from PASETO to prevent canonicalization attacks.
infoparameter instead ofthe
saltparameter. This allows us to meet the KDF Security Definition (which isstronger than a mere Pseudo-Random Function).
Fileclass no longer supports theresourcetype. To migrate code, wrap yourresourcearguments in aReadOnlyFileorMutableFileobject.File::asymmetricEncrypt()andFile::asymmetricDecrypt().Configuration
📅 Schedule: Branch creation - "on the 15th day of the month before 12pm" in timezone UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.