summaryrefslogtreecommitdiffstats
path: root/org.eclipse.jgit.packaging/org.eclipse.jgit.target/jgit-4.30.target
Commit message (Collapse)AuthorAgeFilesLines
* Update jetty to 10.0.20Matthias Sohn2024-02-201-8/+8
| | | | Change-Id: Ic79c5ce718fe1345f75c4254a9ee2aa7d91af359
* Update org.assertj:assertj-core to 3.25.3Matthias Sohn2024-02-201-2/+2
| | | | Change-Id: I3fd8adf3c1cc3f2c8826602b11d1d11fdfe29bfb
* Update org.mockito:mockito-core to 5.10.0Matthias Sohn2024-02-201-2/+2
| | | | Change-Id: I35dbb2402e65753e10bef4617b7e1683f9900406
* Update org.apache.commons:commons-compress to 1.26.0Matthias Sohn2024-02-201-2/+8
| | | | | | | The new version now requires commons-io for the tests. Hence adding dependency to commons-io:commons-io:2.15.1. Change-Id: Ieb50ef559a119c89f90d700ab95a73c0fcae85a8
* Update byte-buddy to 1.14.12Matthias Sohn2024-02-201-3/+3
| | | | Change-Id: Idc56efd1ee6d9d1e039ccfffd5e16803b727f6dc
* [ssh] Bump Apache MINA sshd 2.11.0 -> 2.12.0Thomas Wolf2024-01-201-3/+3
| | | | | | | | | | | This includes the upstream fix for CVE-2023-48795[1] ("strict KEX" protocol extension mitigating the "Terrapin attack"[2]) in JGit. [1] https://nvd.nist.gov/vuln/detail/CVE-2023-48795 [2] https://www.terrapin-attack.com/ Bug: jgit-16 Change-Id: Ie9aa5b903ea6795bd1511afea0bebdb537b56148 Signed-off-by: Thomas Wolf <twolf@apache.org>
* Update jna to 5.14.0Matthias Sohn2024-01-121-3/+3
| | | | Change-Id: Ie60f618fabd1c35815a7fe2775b7fe059baba8b4
* Update mockito to 5.8.0Matthias Sohn2023-12-221-2/+2
| | | | Change-Id: I70d33b7af25fcb4754fb048dd9054eef7356f00c
* Add 4.31 target platform and update orbit to 4.31Matthias Sohn2023-12-221-3/+3
| | | | | | and update bytebuddy to 1.14.10. Change-Id: I145776a31d806f7e6dcc90263650109b3eb19067
* Update Orbit to orbit-aggregation/2023-12Matthias Sohn2023-11-281-2/+2
| | | | Change-Id: Ifde28f60461e0a9d7b1278f8f178ceb2c4e1db7a
* Update org.apache.commons:commons-compress to 1.25.0Matthias Sohn2023-11-171-2/+2
| | | | Change-Id: Ic9c6910853ad00075501aa3e03888fefbe634bf6
* Update bouncycastle to 1.77Matthias Sohn2023-11-161-5/+5
| | | | Change-Id: I2dc011247ace2eeea8c46587cae55a39be086f36
* Update jetty to 10.0.18Matthias Sohn2023-11-151-8/+8
| | | | Change-Id: I34c9f7c062400bb69849812d57390dd2e7b04cac
* SSH: bump org.apache.sshd to 2.11.0Thomas Wolf2023-11-151-3/+3
| | | | | | | | | | Update maven build, bazel build, and target platform. Also remove a file in a ./bin directory that got committed by mistake in commit f5f4bf0ad. Change-Id: Ia653c71643f8fad290874d723dacdafbef25c13f Signed-off-by: Thomas Wolf <twolf@apache.org>
* Update mockito to 5.7.0 and bytebuddy to 1.14.9Matthias Sohn2023-11-091-4/+4
| | | | Change-Id: I7c93847054050a0af0d2c16e724e5755f9fa33bf
* Use net.i2p.crypto.eddsa 0.3.0 from new Orbit buildMatthias Sohn2023-10-131-4/+4
| | | | | | | | | | | | | | | | | | | | | | consuming it directly from Maven Central. The bundle net.i2p.crypto.eddsa 0.3.0 contains bad OSGi metadata, earlier it was repackaged in Orbit tweaking its mandatory dependency to sun.security.x509 to an optional dependency. This project seems to be orphaned, probably because Java 15 added support for eddsa with JEP339 [1]. This repackaged bundle is no longer available after Orbit was renovated [2] to consume the vast majority of bundles directly from Maven Central without repacking them. Hence we have to workaround this (probably false) mandatory dependency. For that export an empty dummy package "sun.security.x509" to satisfy OSGi. [1] https://openjdk.org/jeps/339 [2] https://github.com/eclipse-orbit/orbit-simrel/issues/15 Change-Id: I2267e15823ebce6cf1d448e1e16a129f703e0f80
* Update orbit to orbit-aggregation/2023-12Matthias Sohn2023-10-051-0/+272
- add target platform for Eclipse 4.30 (2023-12) - update org.apache.ant to 1.10.14 Change-Id: Ib7fa7cb79e93ecd6009784bc0ad4269bfa71cb29