Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-cryptography for
openSUSE:Factory checked in at 2025-02-06 22:01:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
and /work/SRC/openSUSE:Factory/.python-cryptography.new.2316 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography"
Thu Feb 6 22:01:51 2025 rev:98 rq:1242838 version:44.0.0
Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes
2024-11-09 20:57:34.092416773 +0100
+++
/work/SRC/openSUSE:Factory/.python-cryptography.new.2316/python-cryptography.changes
2025-02-06 22:01:53.185388354 +0100
@@ -1,0 +2,28 @@
+Sun Jan 26 10:59:13 UTC 2025 - Soc Virnyl Estela
<[email protected]>
+
+- Update to version 44.0.0:
+ * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.9.
+ * Deprecated Python 3.7 support. Python 3.7 is no longer supported by
+ the Python core team. Support for Python 3.7 will be removed in a future
+ cryptography release.
+ * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.0.
+ * macOS wheels are now built against the macOS 10.13 SDK. Users on older
+ versions of macOS should upgrade, or they will need to build cryptography
+ themselves.
+ * Enforce the RFC 5280 requirement that extended key usage extensions must
not be empty.
+ * Added support for timestamp extraction to the
:class:`~cryptography.fernet.MultiFernet` class.
+ * Relax the Authority Key Identifier requirements on root CA certificates
+ during X.509 verification to allow fields permitted by RFC 5280 but
+ forbidden by the CA/Browser BRs.
+ * Added support for
+ :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using
+ OpenSSL 3.2.0+.
+ * Added support for the :class:`~cryptography.x509.Admissions` certificate
extension.
+ * Added basic support for PKCS7 decryption (including S/MIME 3.2) via
+
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`,
+
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`,
+ and
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`.
+- Update specfile to accommodate new project structure at version 44.0.0
+- Update no-pytest_benchmark.patch
+
+-------------------------------------------------------------------
Old:
----
cryptography-43.0.3.tar.gz
New:
----
cryptography-44.0.0.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.0fNivm/_old 2025-02-06 22:01:54.709450917 +0100
+++ /var/tmp/diff_new_pack.0fNivm/_new 2025-02-06 22:01:54.713451081 +0100
@@ -1,7 +1,7 @@
#
# spec file for package python-cryptography
#
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -28,7 +28,7 @@
%{?sle15_python_module_pythons}
Name: python-cryptography%{psuffix}
# ALWAYS KEEP IN SYNC WITH python-cryptography-vectors!
-Version: 43.0.3
+Version: 44.0.0
Release: 0
Summary: Python library which exposes cryptographic recipes and
primitives
License: Apache-2.0 OR BSD-3-Clause
@@ -93,13 +93,6 @@
export CARGO_PROFILE_RELEASE_SPLIT_DEBUGINFO=off
# https://pyo3.rs/main/building-and-distribution#configuring-the-python-version
%python_expand export PYO3_PYTHON="%{_bindir}/$python"
-cd src/rust
-tar xfv %{S:2}
-rm -v Cargo.lock
-%cargo_build
-cd -
-
-# https://github.com/pyca/cryptography/issues/9023
%global _lto_cflags %{nil}
export RUSTFLAGS=%{rustflags}
export CFLAGS="%{optflags} -fno-strict-aliasing"
@@ -122,6 +115,7 @@
# fails with OverflowError on 32bit platform
%ifarch %ix86 %arm ppc
rm -v tests/hazmat/primitives/test_aead.py
+rm -v tests/hazmat/primitives/test_ciphers.py
# imports test_aead so we need to remove also these
rm -v tests/wycheproof/test_aes.py
rm -v tests/wycheproof/test_chacha20poly1305.py
@@ -134,6 +128,7 @@
%license LICENSE LICENSE.APACHE LICENSE.BSD
%doc CONTRIBUTING.rst CHANGELOG.rst README.rst
%{python_sitearch}/cryptography
+%{python_sitearch}/rust
%{python_sitearch}/cryptography-%{version}.dist-info
%endif
++++++ _service ++++++
--- /var/tmp/diff_new_pack.0fNivm/_old 2025-02-06 22:01:54.801454693 +0100
+++ /var/tmp/diff_new_pack.0fNivm/_new 2025-02-06 22:01:54.805454858 +0100
@@ -2,7 +2,6 @@
<service name="download_files" mode="manual"/>
<service name="cargo_vendor" mode="manual">
<param name="srcdir">cryptography-*</param>
- <param name="cargotoml">src/rust/Cargo.toml</param>
<param name="compression">zst</param>
</service>
</services>
++++++ cryptography-43.0.3.tar.gz -> cryptography-44.0.0.tar.gz ++++++
++++ 14430 lines of diff (skipped)
++++++ no-pytest_benchmark.patch ++++++
--- /var/tmp/diff_new_pack.0fNivm/_old 2025-02-06 22:01:55.105467173 +0100
+++ /var/tmp/diff_new_pack.0fNivm/_new 2025-02-06 22:01:55.109467337 +0100
@@ -1,26 +1,16 @@
----
- pyproject.toml | 31 -------------------------
- tests/bench/test_aead.py | 40
++++++++++++++++-----------------
- tests/bench/test_ec_load.py | 8 +++---
- tests/bench/test_hashes.py | 4 +--
- tests/bench/test_hmac.py | 4 +--
- tests/bench/test_x509.py | 16 ++++++-------
- 7 files changed, 37 insertions(+), 68 deletions(-)
-
-Index: cryptography-43.0.3/pyproject.toml
-===================================================================
---- cryptography-43.0.3.orig/pyproject.toml
-+++ cryptography-43.0.3/pyproject.toml
-@@ -66,8 +66,6 @@ nox = ["nox"]
+diff -ruN cryptography-44.0.0.orig/pyproject.toml
cryptography-44.0.0/pyproject.toml
+--- cryptography-44.0.0.orig/pyproject.toml 2025-01-26 18:48:58.157318687
+0800
++++ cryptography-44.0.0/pyproject.toml 2025-01-26 18:56:46.010819868 +0800
+@@ -67,8 +67,6 @@
test = [
- "cryptography_vectors==43.0.3",
- "pytest >=6.2.0",
-- "pytest-benchmark",
-- "pytest-cov",
- "pytest-xdist",
- "pretend",
- "certifi",
-@@ -117,7 +115,7 @@ exclude = [
+ "cryptography_vectors==44.0.0",
+ "pytest >=7.4.0",
+- "pytest-benchmark >=4.0",
+- "pytest-cov >=2.10.1",
+ "pytest-xdist >=3.5.0",
+ "pretend >=0.7",
+ "certifi >=2024",
+@@ -118,7 +116,7 @@
]
[tool.pytest.ini_options]
@@ -29,7 +19,7 @@
console_output_style = "progress-even-when-capture-no"
markers = [
"skip_fips: this test is not executed in FIPS mode",
-@@ -139,33 +137,6 @@ module = [
+@@ -140,33 +138,6 @@
]
ignore_missing_imports = true
@@ -43,14 +33,14 @@
-
-[tool.coverage.paths]
-source = [
-- "src/cryptography",
-- "*.nox/*/lib*/python*/site-packages/cryptography",
-- "*.nox\\*\\Lib\\site-packages\\cryptography",
-- "*.nox/pypy/site-packages/cryptography",
+- "src/cryptography",
+- "*.nox/*/lib*/python*/site-packages/cryptography",
+- "*.nox\\*\\Lib\\site-packages\\cryptography",
+- "*.nox/pypy/site-packages/cryptography",
-]
--tests =[
-- "tests/",
-- "*tests\\",
+-tests = [
+- "tests/",
+- "*tests\\",
-]
-
-[tool.coverage.report]
@@ -63,11 +53,10 @@
[tool.ruff]
line-length = 79
-Index: cryptography-43.0.3/tests/bench/test_aead.py
-===================================================================
---- cryptography-43.0.3.orig/tests/bench/test_aead.py
-+++ cryptography-43.0.3/tests/bench/test_aead.py
-@@ -26,84 +26,84 @@ def _aead_supported(cls):
+diff -ruN cryptography-44.0.0.orig/tests/bench/test_aead.py
cryptography-44.0.0/tests/bench/test_aead.py
+--- cryptography-44.0.0.orig/tests/bench/test_aead.py 2025-01-26
18:48:58.218037106 +0800
++++ cryptography-44.0.0/tests/bench/test_aead.py 2025-01-26
18:57:45.747649958 +0800
+@@ -26,84 +26,84 @@
not _aead_supported(ChaCha20Poly1305),
reason="Requires OpenSSL with ChaCha20Poly1305 support",
)
@@ -172,10 +161,9 @@
ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
- benchmark(aes.decrypt, b"\x00" * 12, ct, None)
+ aes.decrypt(b"\x00" * 12, ct, None)
-Index: cryptography-43.0.3/tests/bench/test_ec_load.py
-===================================================================
---- cryptography-43.0.3.orig/tests/bench/test_ec_load.py
-+++ cryptography-43.0.3/tests/bench/test_ec_load.py
+diff -ruN cryptography-44.0.0.orig/tests/bench/test_ec_load.py
cryptography-44.0.0/tests/bench/test_ec_load.py
+--- cryptography-44.0.0.orig/tests/bench/test_ec_load.py 2025-01-26
18:48:58.218037106 +0800
++++ cryptography-44.0.0/tests/bench/test_ec_load.py 2025-01-26
18:57:45.748641371 +0800
@@ -5,9 +5,9 @@
from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
@@ -190,10 +178,9 @@
- benchmark(EC_KEY_SECP256R1.private_key)
+def test_load_ec_private_numbers():
+ EC_KEY_SECP256R1.private_key()
-Index: cryptography-43.0.3/tests/bench/test_hashes.py
-===================================================================
---- cryptography-43.0.3.orig/tests/bench/test_hashes.py
-+++ cryptography-43.0.3/tests/bench/test_hashes.py
+diff -ruN cryptography-44.0.0.orig/tests/bench/test_hashes.py
cryptography-44.0.0/tests/bench/test_hashes.py
+--- cryptography-44.0.0.orig/tests/bench/test_hashes.py 2025-01-26
18:48:58.218037106 +0800
++++ cryptography-44.0.0/tests/bench/test_hashes.py 2025-01-26
18:57:45.748943321 +0800
@@ -5,10 +5,10 @@
from cryptography.hazmat.primitives import hashes
@@ -207,10 +194,9 @@
- benchmark(bench)
+ bench()
-Index: cryptography-43.0.3/tests/bench/test_hmac.py
-===================================================================
---- cryptography-43.0.3.orig/tests/bench/test_hmac.py
-+++ cryptography-43.0.3/tests/bench/test_hmac.py
+diff -ruN cryptography-44.0.0.orig/tests/bench/test_hmac.py
cryptography-44.0.0/tests/bench/test_hmac.py
+--- cryptography-44.0.0.orig/tests/bench/test_hmac.py 2025-01-26
18:48:58.218037106 +0800
++++ cryptography-44.0.0/tests/bench/test_hmac.py 2025-01-26
18:57:45.749219559 +0800
@@ -5,10 +5,10 @@
from cryptography.hazmat.primitives import hashes, hmac
@@ -224,11 +210,10 @@
- benchmark(bench)
+ bench()
-Index: cryptography-43.0.3/tests/bench/test_x509.py
-===================================================================
---- cryptography-43.0.3.orig/tests/bench/test_x509.py
-+++ cryptography-43.0.3/tests/bench/test_x509.py
-@@ -13,40 +13,40 @@ from cryptography import x509
+diff -ruN cryptography-44.0.0.orig/tests/bench/test_x509.py
cryptography-44.0.0/tests/bench/test_x509.py
+--- cryptography-44.0.0.orig/tests/bench/test_x509.py 2025-01-26
18:48:58.218037106 +0800
++++ cryptography-44.0.0/tests/bench/test_x509.py 2025-01-26
18:57:45.749471922 +0800
+@@ -13,40 +13,40 @@
from ..utils import load_vectors_from_file
@@ -278,7 +263,7 @@
limbo_root = pytestconfig.getoption("--x509-limbo-root", skip=True)
with open(os.path.join(limbo_root, "limbo.json"), "rb") as f:
[testcase] = [
-@@ -78,4 +78,4 @@ def test_verify_docs_python_org(benchmar
+@@ -78,4 +78,4 @@
)
verifier.verify(leaf, intermediates)
++++++ vendor.tar.zst ++++++
++++ 980453 lines of diff (skipped)