Commit graph

13 commits

Author SHA1 Message Date
David Murphy
784dea3884 Restored support for Python 3.9 to test if build now completes successfully 2025-02-20 14:40:58 -07:00
David Murphy
17d2ceb2e8 Removing support for Python 3.7, 3.8 nd 3.9 from pre-commit 2025-02-20 14:40:58 -07:00
Pedro Algarvio
3ec5b91bbd Bump to `jinja2==3.1.4` due to https://github.com/advisories/GHSA-h75v-3vvj-5mfj 2024-05-08 17:42:06 +01:00
Pedro Algarvio
71b68d722c Bump to jinja2==3.1.3 due to https://github.com/advisories/GHSA-h5c8-rqwp-cp95
Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2024-01-16 09:23:16 +00:00
Pedro Algarvio
6dff22e227 Properly constraint CI requirements from PKG requirements
Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2023-09-29 16:12:59 +01:00
Daniel A. Wozniak
16eb2efa10 Drop python 3.6 and 3.7 from changelog requirements 2023-01-23 13:06:05 -07:00
Daniel A. Wozniak
55f2ce8bb7 Upgrade towncrier
Running towncrier now requires use of the 'build' sub-command.
2023-01-23 13:06:05 -07:00
Pedro Algarvio
6acef263b1 Stop triggering the jinja2.contextfunction deprecation warning
Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2023-01-18 11:54:43 +00:00
Pedro Algarvio
75ed972d72 Update requirements to address know security vulnerabilities
Closes #61516
Closes #61515
Closes #61514
Closes #61513
Closes #61520
Closes #61096
Closes #60944
Closes #61558
Closes #61559
Closes #61560
Closes #61561

Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2022-02-08 06:34:43 -08:00
Pedro Algarvio
2ed6d1a974 Enforce requirements and their versions consistency
Use use the packaging requirements as version constraints to all other
requirements files which should include Salt's base requirements.

The nox sessions now don't install the base requirements since the "top"
requirements file includes the base requirements.

All of this, ensuring that the same versions are used on all of them.
2021-09-21 13:42:53 -07:00
Pedro Algarvio
8ebaf76106 Update Jinja2 and lxml due to security related bugfix releases
Jinja2
------

CVE-2020-28493
moderate severity
Vulnerable versions: < 2.11.3
Patched version: 2.11.3

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9.-]+.[a-zA-Z0-9.-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

lxml
----

CVE-2021-28957
moderate severity
Vulnerable versions: < 4.6.3
Patched version: 4.6.3

An XSS vulnerability was discovered in the python lxml clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
2021-05-24 08:19:57 -04:00
Pedro Algarvio
2ea5ad81a9 Compile the requirements 2021-05-05 06:48:41 -07:00
Pedro Algarvio
7efd60131b
Move CI static requirements to it's own subdirectory 2020-09-30 09:31:48 +01:00