Skip to content

chore(deps): update dependency cryptography to v46#13993

Open
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/cryptography-46.x
Open

chore(deps): update dependency cryptography to v46#13993
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/cryptography-46.x

Conversation

@renovate-bot
Copy link
Copy Markdown
Contributor

This PR contains the following updates:

Package Change Age Confidence
cryptography (changelog) ==45.0.1==46.0.6 age confidence

Release Notes

pyca/cryptography (cryptography)

v46.0.6

Compare Source

v46.0.5

Compare Source

v46.0.4

Compare Source

v46.0.3

Compare Source

v46.0.2

Compare Source

v46.0.1

Compare Source

v46.0.0

Compare Source

v45.0.7

Compare Source

v45.0.6

Compare Source

v45.0.5

Compare Source

v45.0.4

Compare Source

v45.0.3

Compare Source

v45.0.2

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Never, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot requested review from a team as code owners April 8, 2026 00:51
@trusted-contributions-gcf trusted-contributions-gcf bot added kokoro:force-run Add this label to force Kokoro to re-run the tests. owlbot:run Add this label to trigger the Owlbot post processor. labels Apr 8, 2026
@product-auto-label product-auto-label bot added samples Issues that are directly related to samples. api: cloudkms Issues related to the Cloud Key Management Service API. api: security-privateca Issues related to the Certificate Authority Service API. labels Apr 8, 2026
@kokoro-team kokoro-team removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Apr 8, 2026
Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the cryptography dependency to version 46.0.6 across several requirements files. Feedback indicates that this update introduces a breaking change in the kms/attestations module, as the new version of the library changes the signature of the public_bytes method, which will cause a runtime TypeError.

@@ -1,4 +1,4 @@
cryptography==45.0.1
cryptography==46.0.6
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

Updating to cryptography v46 is a breaking change for the code in this directory. Specifically, in kms/attestations/verify_attestation_chains.py on line 227, the call mfr_root_cert.subject.public_bytes(backends.default_backend()) will fail.

In cryptography 46.0.0, the public_bytes method on Name objects (returned by the .subject property) was updated to require an encoding argument (e.g., serialization.Encoding.DER) and the backend argument was removed. This will result in a TypeError at runtime because the backend object is no longer accepted.

Please update the code in verify_attestation_chains.py to use mfr_root_cert.subject.public_bytes(serialization.Encoding.DER) or pin the dependency to <46.0.0 until the code can be updated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

api: cloudkms Issues related to the Cloud Key Management Service API. api: security-privateca Issues related to the Certificate Authority Service API. owlbot:run Add this label to trigger the Owlbot post processor. samples Issues that are directly related to samples.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants