Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump the minimum-runtime-dependencies group across 2 directories with 4 updates #479

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 25, 2024

Updates the requirements on securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore], tuf, ruff and securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore] to permit the latest version.
Updates securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore] to 1.1.0

Release notes

Sourced from securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore]'s releases.

v1.1.0

See CHANGELOG.md for details.

Changelog

Sourced from securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore]'s changelog.

securesystemslib v1.1.0

This is a small release that only re-enables the use of SigstoreSigner. Note that SigstoreSigner and SigstoreKey are still not part of the default set of supported signers & keys but now they can be enabled.

Changed

  • SigstoreSigner: Re-enable compatibility with Sigstore (#781)

securesystemslib v1.0.0

Securesystemslib API is now considered stable. The core functionality is provided in the Signer interface and the half a dozen integrated Signer implementations that can be found in the signer module. Smaller helper modules dsse, formats, hash and storage are also part of the API. Several legacy modules have been removed.

Added

  • Signer: add public_key attribute to interface (#756)
  • VaultSigner: Signer implementation for HashiCorp Vault (#800)
  • CryptoSigner: support ecdsa keytype that is no longer in spec (#711)
  • CryptoSigner: add private_bytes property (#799)
  • CryptoSigner: add "file2" signer uri (#759)
  • test: use localstack to test AWSSigner (#777)

Removed

  • CryptoSigner: remove "file" signer uri (#759)
  • migration script for legacy keys (#770)
  • SSlibSigner class and *_securesystemslib_key methods (#771)
  • legacy key key*, interface, util and schema modules (#772, #773, #776)
  • unused functions in hash, and formats module (#774, #776)
  • unused global key constants (#806)

Changed

  • SSlibKey: strengthen input validation (#780, #795)
  • AWSSigner: support default scheme and add stronger input validation (#724, #778)
  • dsse: change Envelope.signatures type to dict (#743)
  • vendor: update ed25519 copy (#793)
  • docs: improve user and contributor docs (#744, #745, #746, #749, #759, #796)
  • test: improve and temporarily disable SigstoreSigner test (#779, #785)
  • ci: use dependabot groups, update weekly (#735)
  • ci: test macOS and Windows on latest Python only (#797)
  • Make securessystemslib.gpg internal (#792)

Fixed

  • Fix check-upstream-ed25519 workflow permission (#706)
  • SSlibKey: fix default scheme and test for ecdsa nistp384 key (#763 #794)

securesystemslib v0.31.0

... (truncated)

Commits
  • c70d7be Merge pull request #821 from jku/release-v1.1.0
  • 9d4a99e Prepare v1.1
  • 08e64be Merge pull request #819 from secure-systems-lab/dependabot/pip/dependencies-2...
  • 7058f55 Bump the dependencies group across 1 directory with 4 updates
  • 5e734e4 Merge pull request #813 from jku/upgrade-sigstore
  • bc6f882 Merge pull request #814 from secure-systems-lab/dependabot/pip/test-and-lint-...
  • f61cf1a GCPSigner: Add exception for unsupported keys
  • 323d572 Merge pull request #816 from secure-systems-lab/dependabot/github_actions/act...
  • 3b7b7e6 ---
  • 603b461 ---
  • Additional commits viewable in compare view

Updates tuf to 5.1.0

Release notes

Sourced from tuf's releases.

v5.1.0

Changed

  • ngclient: default user-agent was updated from "tuf/x.y.z" to "python-tuf/x.y.z" (#2632)
  • ngclient: max_root_rotations default value was bumped to 256 to prevent a too small value from creating issues in actual deployments were the embedded root is not easily updateable (#2675)
  • repository: do_snapshot() and do_timestamp() now always create new versions if current version is not correctly signed (#2650)
  • Various infrastructure and documentation improvements
Changelog

Sourced from tuf's changelog.

v5.1.0

Changed

  • ngclient: default user-agent was updated from "tuf/x.y.z" to "python-tuf/x.y.z" (#2632)
  • ngclient: max_root_rotations default value was bumped to 256 to prevent a too small value from creating issues in actual deployments were the embedded root is not easily updateable (#2675)
  • repository: do_snapshot() and do_timestamp() now always create new versions if current version is not correctly signed (#2650)
  • Various infrastructure and documentation improvements

v5.0.0

This release, most notably, marks stable securesystemslib v1.0.0 as minimum requirement. The update causes a minor break in the new DSSE API (see below) and affects users who also directly depend on securesystemslib. See the securesystemslib release notes and the updated python-tuf examples (#2617) for details. ngclient API remains backwards-compatible.

Changed

  • DSSE API: change SimpleEnvelope.signatures type to dict, remove SimpleEnvelope.signatures_dict (#2617)
  • ngclient: support app-specific user-agents (#2612)
  • Various build, test and lint improvements

v4.0.0

This release is a small API change for Metadata API users (see below). ngclient API is compatible but optional DSSE support has been added.

Added

  • Added optional DSSE support to Metadata API and ngclient (#2436)

Changed

  • Metadata API: Improved verification functionality for repository users (#2551):
    • This is an API change for Metadata API users ( Root.get_verification_result() and Targets.get_verification_result() specifically)
    • Root.get_root_verification_result() has been added to handle the special case of root verification
  • Started using UTC datetimes instead of naive datetimes internally (#2573)
  • Constrain securesystemslib dependency to <0.32.0 in preparation for future securesystemslib API changes
  • Various build, test and lint improvements

v3.1.1

... (truncated)

Commits
  • dd4caf4 Merge pull request #2712 from jku/prepare-v5.1
  • 72d0cea Prepare v5.1.0 release
  • 4fbcfa0 build(deps): bump theupdateframework/tuf-conformance (#2711)
  • 22b82d5 build(deps): bump ruff in the test-and-lint-dependencies group (#2709)
  • 4ec49e2 build(deps): bump actions/checkout in the action-dependencies group (#2710)
  • d77ab75 build(deps): bump pypa/gh-action-pypi-publish (#2706)
  • 42240dc build(deps): bump ruff in the test-and-lint-dependencies group (#2705)
  • 9f7db14 Merge pull request #2707 from kairoaraujo/add-kairoaraujo-maintainers
  • 107cd2a docs: include kairoaraujo info in MAINTAINERS.txt
  • 5971b09 build(deps): bump theupdateframework/tuf-conformance (#2704)
  • Additional commits viewable in compare view

Updates ruff from 0.7.1 to 0.8.0

Release notes

Sourced from ruff's releases.

0.8.0

Release Notes

Check out the blog post for a migration guide and overview of the changes!

Breaking changes

See also, the "Remapped rules" section which may result in disabled rules.

  • Default to Python 3.9

    Ruff now defaults to Python 3.9 instead of 3.8 if no explicit Python version is configured using ruff.target-version or project.requires-python (#13896)

  • Changed location of pydoclint diagnostics

    pydoclint diagnostics now point to the first-line of the problematic docstring. Previously, this was not the case.

    If you've opted into these preview rules but have them suppressed using noqa comments in some places, this change may mean that you need to move the noqa suppression comments. Most users should be unaffected by this change.

  • Use XDG (i.e. ~/.local/bin) instead of the Cargo home directory in the standalone installer

    Previously, Ruff's installer used $CARGO_HOME or ~/.cargo/bin for its target install directory. Now, Ruff will be installed into $XDG_BIN_HOME, $XDG_DATA_HOME/../bin, or ~/.local/bin (in that order).

    This change is only relevant to users of the standalone Ruff installer (using the shell or PowerShell script). If you installed Ruff using uv or pip, you should be unaffected.

  • Changes to the line width calculation

    Ruff now uses a new version of the unicode-width Rust crate to calculate the line width. In very rare cases, this may lead to lines containing Unicode characters being reformatted, or being considered too long when they were not before (E501).

Removed Rules

The following deprecated rules have been removed:

Remapped rules

The following rules have been remapped to new rule codes:

Stabilization

... (truncated)

Changelog

Sourced from ruff's changelog.

0.8.0

Check out the blog post for a migration guide and overview of the changes!

Breaking changes

See also, the "Remapped rules" section which may result in disabled rules.

  • Default to Python 3.9

    Ruff now defaults to Python 3.9 instead of 3.8 if no explicit Python version is configured using ruff.target-version or project.requires-python (#13896)

  • Changed location of pydoclint diagnostics

    pydoclint diagnostics now point to the first-line of the problematic docstring. Previously, this was not the case.

    If you've opted into these preview rules but have them suppressed using noqa comments in some places, this change may mean that you need to move the noqa suppression comments. Most users should be unaffected by this change.

  • Use XDG (i.e. ~/.local/bin) instead of the Cargo home directory in the standalone installer

    Previously, Ruff's installer used $CARGO_HOME or ~/.cargo/bin for its target install directory. Now, Ruff will be installed into $XDG_BIN_HOME, $XDG_DATA_HOME/../bin, or ~/.local/bin (in that order).

    This change is only relevant to users of the standalone Ruff installer (using the shell or PowerShell script). If you installed Ruff using uv or pip, you should be unaffected.

  • Changes to the line width calculation

    Ruff now uses a new version of the unicode-width Rust crate to calculate the line width. In very rare cases, this may lead to lines containing Unicode characters being reformatted, or being considered too long when they were not before (E501).

Removed Rules

The following deprecated rules have been removed:

Remapped rules

The following rules have been remapped to new rule codes:

Stabilization

... (truncated)

Commits

Updates tuf to 5.1.0

Release notes

Sourced from tuf's releases.

v5.1.0

Changed

  • ngclient: default user-agent was updated from "tuf/x.y.z" to "python-tuf/x.y.z" (#2632)
  • ngclient: max_root_rotations default value was bumped to 256 to prevent a too small value from creating issues in actual deployments were the embedded root is not easily updateable (#2675)
  • repository: do_snapshot() and do_timestamp() now always create new versions if current version is not correctly signed (#2650)
  • Various infrastructure and documentation improvements
Changelog

Sourced from tuf's changelog.

v5.1.0

Changed

  • ngclient: default user-agent was updated from "tuf/x.y.z" to "python-tuf/x.y.z" (#2632)
  • ngclient: max_root_rotations default value was bumped to 256 to prevent a too small value from creating issues in actual deployments were the embedded root is not easily updateable (#2675)
  • repository: do_snapshot() and do_timestamp() now always create new versions if current version is not correctly signed (#2650)
  • Various infrastructure and documentation improvements

v5.0.0

This release, most notably, marks stable securesystemslib v1.0.0 as minimum requirement. The update causes a minor break in the new DSSE API (see below) and affects users who also directly depend on securesystemslib. See the securesystemslib release notes and the updated python-tuf examples (#2617) for details. ngclient API remains backwards-compatible.

Changed

  • DSSE API: change SimpleEnvelope.signatures type to dict, remove SimpleEnvelope.signatures_dict (#2617)
  • ngclient: support app-specific user-agents (#2612)
  • Various build, test and lint improvements

v4.0.0

This release is a small API change for Metadata API users (see below). ngclient API is compatible but optional DSSE support has been added.

Added

  • Added optional DSSE support to Metadata API and ngclient (#2436)

Changed

  • Metadata API: Improved verification functionality for repository users (#2551):
    • This is an API change for Metadata API users ( Root.get_verification_result() and Targets.get_verification_result() specifically)
    • Root.get_root_verification_result() has been added to handle the special case of root verification
  • Started using UTC datetimes instead of naive datetimes internally (#2573)
  • Constrain securesystemslib dependency to <0.32.0 in preparation for future securesystemslib API changes
  • Various build, test and lint improvements

v3.1.1

... (truncated)

Commits
  • dd4caf4 Merge pull request #2712 from jku/prepare-v5.1
  • 72d0cea Prepare v5.1.0 release
  • 4fbcfa0 build(deps): bump theupdateframework/tuf-conformance (#2711)
  • 22b82d5 build(deps): bump ruff in the test-and-lint-dependencies group (#2709)
  • 4ec49e2 build(deps): bump actions/checkout in the action-dependencies group (#2710)
  • d77ab75 build(deps): bump pypa/gh-action-pypi-publish (#2706)
  • 42240dc build(deps): bump ruff in the test-and-lint-dependencies group (#2705)
  • 9f7db14 Merge pull request #2707 from kairoaraujo/add-kairoaraujo-maintainers
  • 107cd2a docs: include kairoaraujo info in MAINTAINERS.txt
  • 5971b09 build(deps): bump theupdateframework/tuf-conformance (#2704)
  • Additional commits viewable in compare view

Updates ruff from 0.7.1 to 0.8.0

Release notes

Sourced from ruff's releases.

0.8.0

Release Notes

Check out the blog post for a migration guide and overview of the changes!

Breaking changes

See also, the "Remapped rules" section which may result in disabled rules.

  • Default to Python 3.9

    Ruff now defaults to Python 3.9 instead of 3.8 if no explicit Python version is configured using ruff.target-version or project.requires-python (#13896)

  • Changed location of pydoclint diagnostics

    pydoclint diagnostics now point to the first-line of the problematic docstring. Previously, this was not the case.

    If you've opted into these preview rules but have them suppressed using noqa comments in some places, this change may mean that you need to move the noqa suppression comments. Most users should be unaffected by this change.

  • Use XDG (i.e. ~/.local/bin) instead of the Cargo home directory in the standalone installer

    Previously, Ruff's installer used $CARGO_HOME or ~/.cargo/bin for its target install directory. Now, Ruff will be installed into $XDG_BIN_HOME, $XDG_DATA_HOME/../bin, or ~/.local/bin (in that order).

    This change is only relevant to users of the standalone Ruff installer (using the shell or PowerShell script). If you installed Ruff using uv or pip, you should be unaffected.

  • Changes to the line width calculation

    Ruff now uses a new version of the unicode-width Rust crate to calculate the line width. In very rare cases, this may lead to lines containing Unicode characters being reformatted, or being considered too long when they were not before (E501).

Removed Rules

The following deprecated rules have been removed:

Remapped rules

The following rules have been remapped to new rule codes:

Stabilization

... (truncated)

Changelog

Sourced from ruff's changelog.

0.8.0

Check out the blog post for a migration guide and overview of the changes!

Breaking changes

See also, the "Remapped rules" section which may result in disabled rules.

  • Default to Python 3.9

    Ruff now defaults to Python 3.9 instead of 3.8 if no explicit Python version is configured using ruff.target-version or project.requires-python (#13896)

  • Changed location of pydoclint diagnostics

    pydoclint diagnostics now point to the first-line of the problematic docstring. Previously, this was not the case.

    If you've opted into these preview rules but have them suppressed using noqa comments in some places, this change may mean that you need to move the noqa suppression comments. Most users should be unaffected by this change.

  • Use XDG (i.e. ~/.local/bin) instead of the Cargo home directory in the standalone installer

    Previously, Ruff's installer used $CARGO_HOME or ~/.cargo/bin for its target install directory. Now, Ruff will be installed into $XDG_BIN_HOME, $XDG_DATA_HOME/../bin, or ~/.local/bin (in that order).

    This change is only relevant to users of the standalone Ruff installer (using the shell or PowerShell script). If you installed Ruff using uv or pip, you should be unaffected.

  • Changes to the line width calculation

    Ruff now uses a new version of the unicode-width Rust crate to calculate the line width. In very rare cases, this may lead to lines containing Unicode characters being reformatted, or being considered too long when they were not before (E501).

Removed Rules

The following deprecated rules have been removed:

Remapped rules

The following rules have been remapped to new rule codes:

Stabilization

... (truncated)

Commits

Updates securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore] to 1.1.0

Release notes

Sourced from securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore]'s releases.

v1.1.0

See CHANGELOG.md for details.

Changelog

Sourced from securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore]'s changelog.

securesystemslib v1.1.0

This is a small release that only re-enables the use of SigstoreSigner. Note that SigstoreSigner and SigstoreKey are still not part of the default set of supported signers & keys but now they can be enabled.

Changed

  • SigstoreSigner: Re-enable compatibility with Sigstore (#781)

securesystemslib v1.0.0

Securesystemslib API is now considered stable. The core functionality is provided in the Signer interface and the half a dozen integrated Signer implementations that can be found in the signer module. Smaller helper modules dsse, formats, hash and storage are also part of the API. Several legacy modules have been removed.

Added

  • Signer: add public_key attribute to interface (#756)
  • VaultSigner: Signer implementation for HashiCorp Vault (#800)
  • CryptoSigner: support ecdsa keytype that is no longer in spec (#711)
  • CryptoSigner: add private_bytes property (#799)
  • CryptoSigner: add "file2" signer uri (#759)
  • test: use localstack to test AWSSigner (#777)

Removed

  • CryptoSigner: remove "file" signer uri (#759)
  • migration script for legacy keys (#770)
  • SSlibSigner class and *_securesystemslib_key methods (#771)
  • legacy key key*, interface, util and schema modules (#772, #773, #776)
  • unused functions in hash, and formats module (#774, #776)
  • unused global key constants (#806)

Changed

  • SSlibKey: strengthen input validation (#780, #795)
  • AWSSigner: support default scheme and add stronger input validation (#724, #778)
  • dsse: change Envelope.signatures type to dict (#743)
  • vendor: update ed25519 copy (#793)
  • docs: improve user and contributor docs (#744, #745, #746, #749, #759, #796)
  • test: improve and temporarily disable SigstoreSigner test (#779, #785)
  • ci: use dependabot groups, update weekly (#735)
  • ci: test macOS and Windows on latest Python only (#797)
  • Make securessystemslib.gpg internal (#792)

Fixed

  • Fix check-upstream-ed25519 workflow permission (#706)
  • SSlibKey: fix default scheme and test for ecdsa nistp384 key (#763 #794)

securesystemslib v0.31.0

... (truncated)

Commits
  • c70d7be Merge pull request #821 from jku/release-v1.1.0
  • 9d4a99e Prepare v1.1
  • 08e64be Merge pull request #819 from secure-systems-lab/dependabot/pip/dependencies-2...
  • 7058f55 Bump the dependencies group across 1 directory with 4 updates
  • 5e734e4 Merge pull request #813 from jku/upgrade-sigstore
  • bc6f882 Merge pull request #814 from secure-systems-lab/dependabot/pip/test-and-lint-...
  • f61cf1a GCPSigner: Add exception for unsupported keys
  • 323d572 Merge pull request #816 from secure-systems-lab/dependabot/github_actions/act...
  • 3b7b7e6 ---
  • 603b461 ---
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

…ectories with 4 updates

Updates the requirements on [securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore]](https://github.com/secure-systems-lab/securesystemslib), [tuf](https://github.com/theupdateframework/python-tuf), [ruff](https://github.com/astral-sh/ruff) and [securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore]](https://github.com/secure-systems-lab/securesystemslib) to permit the latest version.

Updates `securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore]` to 1.1.0
- [Release notes](https://github.com/secure-systems-lab/securesystemslib/releases)
- [Changelog](https://github.com/secure-systems-lab/securesystemslib/blob/main/CHANGELOG.md)
- [Commits](secure-systems-lab/securesystemslib@v0.31.0...v1.1.0)

Updates `tuf` to 5.1.0
- [Release notes](https://github.com/theupdateframework/python-tuf/releases)
- [Changelog](https://github.com/theupdateframework/python-tuf/blob/develop/docs/CHANGELOG.md)
- [Commits](theupdateframework/python-tuf@v3.1.0...v5.1.0)

Updates `ruff` from 0.7.1 to 0.8.0
- [Release notes](https://github.com/astral-sh/ruff/releases)
- [Changelog](https://github.com/astral-sh/ruff/blob/main/CHANGELOG.md)
- [Commits](astral-sh/ruff@0.7.1...0.8.0)

Updates `tuf` to 5.1.0
- [Release notes](https://github.com/theupdateframework/python-tuf/releases)
- [Changelog](https://github.com/theupdateframework/python-tuf/blob/develop/docs/CHANGELOG.md)
- [Commits](theupdateframework/python-tuf@v3.1.0...v5.1.0)

Updates `ruff` from 0.7.1 to 0.8.0
- [Release notes](https://github.com/astral-sh/ruff/releases)
- [Changelog](https://github.com/astral-sh/ruff/blob/main/CHANGELOG.md)
- [Commits](astral-sh/ruff@0.7.1...0.8.0)

Updates `securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore]` to 1.1.0
- [Release notes](https://github.com/secure-systems-lab/securesystemslib/releases)
- [Changelog](https://github.com/secure-systems-lab/securesystemslib/blob/main/CHANGELOG.md)
- [Commits](secure-systems-lab/securesystemslib@v0.31.0...v1.1.0)

---
updated-dependencies:
- dependency-name: securesystemslib[awskms,azurekms,gcpkms,pynacl,sigstore]
  dependency-type: direct:production
  dependency-group: minimum-runtime-dependencies
- dependency-name: tuf
  dependency-type: direct:production
  dependency-group: minimum-runtime-dependencies
- dependency-name: ruff
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minimum-runtime-dependencies
- dependency-name: tuf
  dependency-type: direct:production
  dependency-group: minimum-runtime-dependencies
- dependency-name: ruff
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minimum-runtime-dependencies
- dependency-name: securesystemslib[awskms,azurekms,gcpkms,hsm,sigstore]
  dependency-type: direct:production
  dependency-group: minimum-runtime-dependencies
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Nov 25, 2024
Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 2, 2024

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 2, 2024

Superseded by #484.

@dependabot dependabot bot closed this Dec 2, 2024
@dependabot dependabot bot deleted the dependabot/pip/repo/minimum-runtime-dependencies-b9048bc96b branch December 2, 2024 23:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants