Skip to content

build(deps): Bump tempfile from 3.26.0 to 3.27.0 in /functional-tests in the rust group#2105

Merged
felixfontein merged 1 commit intomainfrom
dependabot/cargo/functional-tests/rust-6d176684b6
Mar 17, 2026
Merged

build(deps): Bump tempfile from 3.26.0 to 3.27.0 in /functional-tests in the rust group#2105
felixfontein merged 1 commit intomainfrom
dependabot/cargo/functional-tests/rust-6d176684b6

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Mar 16, 2026

Bumps the rust group in /functional-tests with 1 update: tempfile.

Updates tempfile from 3.26.0 to 3.27.0

Changelog

Sourced from tempfile's changelog.

3.27.0

This release adds TempPath::try_from_path and deprecates TempPath::from_path.

Prior to this release, TempPath::from_path made no attempts to convert relative paths into absolute paths. The following code would have deleted the wrong file:

let tmp_path = TempPath::from_path("foo")
std::env::set_current_dir("/some/other/path").unwrap();
drop(tmp_path);

Now:

  1. TempPath::from_path will attempt to convert relative paths into absolute paths. However, this isn't always possible as we need to call std::env::current_dir, which can fail. If we fail to convert the relative path to an absolute path, we simply keep the relative path.
  2. The TempPath::try_from_path behaves exactly like TempPath::from_path, except that it returns an error if we fail to convert a relative path into an absolute path (or if the passed path is empty).

Neither function attempt to verify the existence of the file in question.

Thanks to @​meng-xu-cs for reporting this issue.

Commits
  • 5c8fa12 chore: release 3.27.0
  • e34e574 test: disable uds conflict test on redox
  • 772c795 test: add CWD guards
  • 2632fb9 fix: resolve relative paths when constructing TempPath
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

@dependabot dependabot bot added area/CI dependencies Pull requests that update a dependency file labels Mar 16, 2026
@felixfontein
Copy link
Copy Markdown
Contributor

@dependabot rebase

@felixfontein
Copy link
Copy Markdown
Contributor

Looks like the GitHub UI to rebase branches is broken. I've tried this multiple times over the last days in different PRs and repos, and I always get "Rebase conflict between head and base.".

Bumps the rust group in /functional-tests with 1 update: [tempfile](https://github.com/Stebalien/tempfile).


Updates `tempfile` from 3.26.0 to 3.27.0
- [Changelog](https://github.com/Stebalien/tempfile/blob/master/CHANGELOG.md)
- [Commits](Stebalien/tempfile@v3.26.0...v3.27.0)

---
updated-dependencies:
- dependency-name: tempfile
  dependency-version: 3.27.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: rust
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/cargo/functional-tests/rust-6d176684b6 branch from fa30378 to f3cd56e Compare March 16, 2026 17:43
@felixfontein felixfontein merged commit c48a98a into main Mar 17, 2026
22 of 54 checks passed
@felixfontein felixfontein deleted the dependabot/cargo/functional-tests/rust-6d176684b6 branch March 17, 2026 06:09
tmeijn pushed a commit to tmeijn/dotfiles that referenced this pull request Mar 25, 2026
This MR contains the following updates:

| Package | Update | Change |
|---|---|---|
| [getsops/sops](https://github.com/getsops/sops) | patch | `v3.12.1` → `v3.12.2` |

MR created with the help of [el-capitano/tools/renovate-bot](https://gitlab.com/el-capitano/tools/renovate-bot).

**Proposed changes to behavior should be submitted there as MRs.**

---

### Release Notes

<details>
<summary>getsops/sops (getsops/sops)</summary>

### [`v3.12.2`](https://github.com/getsops/sops/releases/tag/v3.12.2)

[Compare Source](getsops/sops@v3.12.1...v3.12.2)

#### Installation

To install `sops`, download one of the pre-built binaries provided for your platform from the artifacts attached to this release.

For instance, if you are using Linux on an AMD64 architecture:

```shell

# Download the binary
curl -LO https://github.com/getsops/sops/releases/download/v3.12.2/sops-v3.12.2.linux.amd64

# Move the binary in to your PATH
mv sops-v3.12.2.linux.amd64 /usr/local/bin/sops

# Make the binary executable
chmod +x /usr/local/bin/sops
```

##### Verify checksums file signature

The checksums file provided within the artifacts attached to this release is signed using [Cosign](https://docs.sigstore.dev/cosign/overview/) with GitHub OIDC. To validate the signature of this file, run the following commands:

```shell

# Download the checksums file, certificate and signature
curl -LO https://github.com/getsops/sops/releases/download/v3.12.2/sops-v3.12.2.checksums.txt
curl -LO https://github.com/getsops/sops/releases/download/v3.12.2/sops-v3.12.2.checksums.pem
curl -LO https://github.com/getsops/sops/releases/download/v3.12.2/sops-v3.12.2.checksums.sig

# Verify the checksums file
cosign verify-blob sops-v3.12.2.checksums.txt \
  --certificate sops-v3.12.2.checksums.pem \
  --signature sops-v3.12.2.checksums.sig \
  --certificate-identity-regexp=https://github.com/getsops \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com
```

##### Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature:

```shell

# Verify the binary using the checksums file
sha256sum -c sops-v3.12.2.checksums.txt --ignore-missing
```

##### Verify artifact provenance

The [SLSA provenance](https://slsa.dev/provenance/v0.2) of the binaries, packages, and SBOMs can be found within the artifacts associated with this release. It is presented through an [in-toto](https://in-toto.io/) link metadata file named `sops-v3.12.2.intoto.jsonl`. To verify the provenance of an artifact, you can utilize the [`slsa-verifier`](https://github.com/slsa-framework/slsa-verifier#artifacts) tool:

```shell

# Download the metadata file
curl -LO  https://github.com/getsops/sops/releases/download/v3.12.2/sops-v3.12.2.intoto.jsonl

# Verify the provenance of the artifact
slsa-verifier verify-artifact <artifact> \
  --provenance-path sops-v3.12.2.intoto.jsonl \
  --source-uri github.com/getsops/sops \
  --source-tag v3.12.2
```

#### Container Images

The `sops` binaries are also available as container images, based on Debian (slim) and Alpine Linux. The Debian-based container images include any dependencies which may be required to make use of certain key services, such as GnuPG, AWS KMS, Azure Key Vault, and Google Cloud KMS. The Alpine-based container images are smaller in size, but do not include these dependencies.

These container images are available for the following architectures: `linux/amd64` and `linux/arm64`.

##### GitHub Container Registry

- `ghcr.io/getsops/sops:v3.12.2`
- `ghcr.io/getsops/sops:v3.12.2-alpine`

##### Quay.io

- `quay.io/getsops/sops:v3.12.2`
- `quay.io/getsops/sops:v3.12.2-alpine`

##### Verify container image signature

The container images are signed using [Cosign](https://docs.sigstore.dev/cosign/overview/) with GitHub OIDC. To validate the signature of an image, run the following command:

```shell
cosign verify ghcr.io/getsops/sops:v3.12.2 \
  --certificate-identity-regexp=https://github.com/getsops \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  -o text
```

##### Verify container image provenance

The container images include [SLSA provenance](https://slsa.dev/provenance/v0.2) attestations. For more information around the verification of this, please refer to the [`slsa-verifier` documentation](https://github.com/slsa-framework/slsa-verifier#containers).

#### Software Bill of Materials

The Software Bill of Materials (SBOM) for each binary is accessible within the artifacts enclosed with this release. It is presented as an [SPDX](https://spdx.dev/) JSON file, formatted as `<binary>.spdx.sbom.json`.

#### What's Changed

- CI: Rearrange steps; disable setup-go's caching by [@&#8203;felixfontein](https://github.com/felixfontein) in [#&#8203;2081](getsops/sops#2081)
- build(deps): Bump the go group with 6 updates by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2085](getsops/sops#2085)
- build(deps): Bump the ci group with 2 updates by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2084](getsops/sops#2084)
- build(deps): Bump github.com/cloudflare/circl from 1.6.1 to 1.6.3 by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2087](getsops/sops#2087)
- build(deps): Bump go.opentelemetry.io/otel/sdk from 1.39.0 to 1.40.0 by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2089](getsops/sops#2089)
- build(deps): Bump the ci group with 4 updates by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2091](getsops/sops#2091)
- build(deps): Bump tempfile from 3.25.0 to 3.26.0 in /functional-tests in the rust group by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2090](getsops/sops#2090)
- build(deps): Bump github.com/docker/cli from 28.0.4+incompatible to 29.2.0+incompatible by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2095](getsops/sops#2095)
- build(deps): Bump the ci group with 4 updates by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2101](getsops/sops#2101)
- Check for metadata key(s) before re-encrypting file by [@&#8203;felixfontein](https://github.com/felixfontein) in [#&#8203;2098](getsops/sops#2098)
- fix: handle mac only encrypted flag in global by [@&#8203;CzBiX](https://github.com/CzBiX) in [#&#8203;2100](getsops/sops#2100)
- sops edit: delete temporary file on termination by [@&#8203;felixfontein](https://github.com/felixfontein) in [#&#8203;2104](getsops/sops#2104)
- build(deps): Bump the ci group with 4 updates by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2106](getsops/sops#2106)
- build(deps): Bump tempfile from 3.26.0 to 3.27.0 in /functional-tests in the rust group by [@&#8203;dependabot](https://github.com/dependabot)\[bot] in [#&#8203;2105](getsops/sops#2105)
- Revert "Merge pull request [#&#8203;1697](getsops/sops#1697) from onjen/fix-1142" by [@&#8203;felixfontein](https://github.com/felixfontein) in [#&#8203;2099](getsops/sops#2099)
- Release 3.12.2 by [@&#8203;felixfontein](https://github.com/felixfontein) in [#&#8203;2109](getsops/sops#2109)

#### New Contributors

- [@&#8203;CzBiX](https://github.com/CzBiX) made their first contribution in [#&#8203;2100](getsops/sops#2100)

**Full Changelog**: <getsops/sops@v3.12.1...v3.12.2>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 **Automerge**: Enabled.

♻ **Rebasing**: Whenever MR is behind base branch, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this MR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this MR, check this box

---

This MR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My44Ny4xIiwidXBkYXRlZEluVmVyIjoiNDMuODcuMSIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiUmVub3ZhdGUgQm90IiwiYXV0b21hdGlvbjpib3QtYXV0aG9yZWQiLCJkZXBlbmRlbmN5LXR5cGU6OnBhdGNoIl19-->
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/CI dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant