Routine dependency scan found outdated direct dependencies.
Outdated direct dependencies
| Package |
Current |
Latest |
Kind |
pg-core |
0.5.10 |
0.6.0 |
Normal (major) |
rand |
0.8.6 |
0.10.1 |
Normal + dev |
The pg-core major bump tracks the corresponding encryption4all/postguard 0.6.0 release; coordinate with whatever pg-core 0.6.0 exposes (check release notes / breaking changes in pg-core/CHANGELOG.md). rand 0.9/0.10 is a breaking bump.
Security advisories (informational, from cargo audit)
RUSTSEC-2025-0141 — bincode 1.3.3 unmaintained. Do NOT bump to 3.x (tombstone) and bumping to 2.x does NOT clear the advisory (the advisory covers all versions). Either allowlist in .cargo/audit.toml or migrate off bincode (postcard / bincode-next). Out of scope for this PR unless trivial.
RUSTSEC-2025-0134 — rustls-pemfile 1.0.4 unmaintained, pulled in transitively via reqwest 0.11 → irma. Resolves naturally if reqwest is bumped to 0.12+, but irma constrains this.
Instructions for the worker
- Pull the repo.
- Update all listed dependencies. Security fixes first; then minor/patch; then major (pg-core, rand).
- For
pg-core 0.6.0: read the upstream postguard 0.6.0 CHANGELOG and adapt call sites.
- For
rand 0.8 → 0.10: follow the rand 0.9 migration guide (thread_rng() → rng(), gen() → random(), etc.). The same change is being worked in ibe#29 — check there for a recipe.
- Build (
cargo build) and run the full test suite (cargo test) before pushing. Run cargo fmt (see rules/rust-run-cargo-fmt-before-push.md).
- Open a draft PR with conventional-commit title
chore: update dependencies. Closes #ISSUENUMBER.
- Assign
@rubenhensen as reviewer.
- Mark ready (
gh pr ready) once CI passes.
If pg-core 0.6.0 has breaking changes that bleed into cryptify's runtime surface and the scope balloons, split: ship the rand bump alone and leave a follow-up for pg-core.
Routine dependency scan found outdated direct dependencies.
Outdated direct dependencies
pg-corerandThe
pg-coremajor bump tracks the correspondingencryption4all/postguard0.6.0 release; coordinate with whatever pg-core 0.6.0 exposes (check release notes / breaking changes inpg-core/CHANGELOG.md).rand0.9/0.10 is a breaking bump.Security advisories (informational, from
cargo audit)RUSTSEC-2025-0141—bincode 1.3.3unmaintained. Do NOT bump to 3.x (tombstone) and bumping to 2.x does NOT clear the advisory (the advisory covers all versions). Either allowlist in.cargo/audit.tomlor migrate off bincode (postcard / bincode-next). Out of scope for this PR unless trivial.RUSTSEC-2025-0134—rustls-pemfile 1.0.4unmaintained, pulled in transitively viareqwest 0.11→irma. Resolves naturally ifreqwestis bumped to 0.12+, butirmaconstrains this.Instructions for the worker
pg-core0.6.0: read the upstreampostguard0.6.0 CHANGELOG and adapt call sites.rand0.8 → 0.10: follow the rand 0.9 migration guide (thread_rng()→rng(),gen()→random(), etc.). The same change is being worked in ibe#29 — check there for a recipe.cargo build) and run the full test suite (cargo test) before pushing. Runcargo fmt(see rules/rust-run-cargo-fmt-before-push.md).chore: update dependencies. Closes #ISSUENUMBER.@rubenhensenas reviewer.gh pr ready) once CI passes.If
pg-core0.6.0 has breaking changes that bleed into cryptify's runtime surface and the scope balloons, split: ship the rand bump alone and leave a follow-up for pg-core.