Skip to content

chore(deps): bump cryptography from 46.0.6 to 46.0.7 in /agent#10

Closed
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/uv/agent/cryptography-46.0.7
Closed

chore(deps): bump cryptography from 46.0.6 to 46.0.7 in /agent#10
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/uv/agent/cryptography-46.0.7

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Apr 8, 2026

⚠️ Dependabot is rebasing this PR ⚠️

Rebasing might not happen immediately, so don't worry if this takes some time.

Note: if you make any changes to this PR yourself, they will take precedence over the rebase.


Bumps cryptography from 46.0.6 to 46.0.7.

Changelog

Sourced from cryptography's changelog.

46.0.7 - 2026-04-07


* **SECURITY ISSUE**: Fixed an issue where non-contiguous buffers could be
  passed to APIs that accept Python buffers, which could lead to buffer
  overflow. **CVE-2026-39892**
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.6.

.. _v46-0-6:

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [cryptography](https://github.com/pyca/cryptography) from 46.0.6 to 46.0.7.
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](pyca/cryptography@46.0.6...46.0.7)

---
updated-dependencies:
- dependency-name: cryptography
  dependency-version: 46.0.7
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file python:uv Pull requests that update python:uv code labels Apr 8, 2026
@dependabot dependabot Bot requested a review from a team as a code owner April 8, 2026 22:52
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file python:uv Pull requests that update python:uv code labels Apr 8, 2026
@krokoko
Copy link
Copy Markdown
Contributor

krokoko commented Apr 9, 2026

fixed in main already

@krokoko krokoko closed this Apr 9, 2026
@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot Bot commented on behalf of github Apr 9, 2026

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@dependabot dependabot Bot deleted the dependabot/uv/agent/cryptography-46.0.7 branch April 9, 2026 01:43
scoropeza pushed a commit to scoropeza/sample-autonomous-cloud-coding-agents that referenced this pull request May 5, 2026
…al union (krokoko review aws-samples#2, aws-samples#4, aws-samples#10)

Three related type-safety fixes from the code review on PR aws-samples#52. Grouped
because they all touch the same contract surface
(``TaskDetail`` on both sides of the wire) and share the theme "honest
types at the DDB + API boundary".

## Findings addressed

**aws-samples#2 — turns_attempted / turns_completed bypass coerceNumericOrNull**

``toTaskDetail`` at ``cdk/src/handlers/shared/types.ts`` was passing
``record.turns_attempted`` and ``record.turns_completed`` through
with only ``?? null`` — same bug class as the
``costUsd.toFixed is not a function`` crash fixed at the fanout
boundary in commit ``9fe704e`` / consolidated in ``c09bfd7``. The
DDB Document-client deserializes ``Number`` attributes as ``string``
on some code paths; any downstream caller doing arithmetic on these
fields would crash at runtime.

Fix extends beyond the two fields the review called out — ALL
numeric fields sourced from the DDB record now route through
``coerceNumericOrNull``: ``duration_s``, ``cost_usd``, ``max_turns``,
``max_budget_usd``, ``turns_attempted``, ``turns_completed``. A new
JSDoc block on ``toTaskDetail`` documents the contract ("all numeric
fields coerced through shared helper; do not bypass") so a future
field addition has a clear pattern to follow. Scope-bounded: the
non-numeric fields (``task_description``, ``pr_url``, …) and
request-body-validated ints (``issue_number``, ``pr_number``) stay
untouched.

**aws-samples#4 — CLI/CDK type drift on turns_attempted / turns_completed**

Per AGENTS.md the CDK and CLI ``TaskDetail`` declarations must stay
in sync. CDK declared both fields as required (``number | null``);
CLI marked them optional (``number | null | undefined``). The
tightening means the server's guarantee (``toTaskDetail`` always
emits both fields, defaulting to ``null`` when absent on the record)
now flows honestly to the CLI type.

**aws-samples#10 — channel_source typed as string instead of literal union**

Added an exported ``ChannelSource = 'api' | 'webhook'`` literal union
in both CDK and CLI ``types.ts``. ``TaskRecord.channel_source`` and
``TaskDetail.channel_source`` on both sides now use the narrow type.
Downstream switches/predicates that read ``channel_source`` get
exhaustiveness checking at compile time, matching the internal
``CreateTaskContext.channelSource`` literal already in use at
``create-task-core.ts``. Reviewer's comment: "the internal
CreateTaskContext correctly narrows it but the external types don't"
— now they do.

## Tests

+3 regression tests in
``cdk/test/handlers/shared/error-classifier.test.ts`` under the
``toTaskDetail integration`` block:

  - String-typed DDB numeric fields coerce to finite numbers on
    the ``TaskDetail`` output (``typeof === 'number'`` + exact value
    for all six coerced fields).
  - Unparseable numeric strings collapse to ``null`` without crash
    (defence test for the non-finite branch in ``coerceNumericOrNull``).
  - ``channel_source`` narrows to the literal union — uses
    ``@ts-expect-error`` to pin that a widened ``'slack'`` fails to
    compile, so a future ``ChannelSource`` regression surfaces in CI
    immediately.

CLI test fixtures updated to include ``channel_source: 'api'`` and
``turns_attempted: null`` / ``turns_completed: null`` where the
non-optional fields were previously omitted. No CLI test count
change — the fixture additions satisfy the stricter contract
without requiring new test bodies.

CDK suite: 1032 passing (was 1029). CLI suite: 190 passing.

Refs: krokoko code review on PR aws-samples#52 (findings 2, 4, 10)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file python:uv Pull requests that update python:uv code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant