Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-Flask-Security-Too for
openSUSE:Factory checked in at 2023-03-03 22:28:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-Flask-Security-Too (Old)
and /work/SRC/openSUSE:Factory/.python-Flask-Security-Too.new.31432 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-Flask-Security-Too"
Fri Mar 3 22:28:27 2023 rev:14 rq:1069082 version:5.1.1
Changes:
--------
---
/work/SRC/openSUSE:Factory/python-Flask-Security-Too/python-Flask-Security-Too.changes
2023-01-06 17:06:39.264551588 +0100
+++
/work/SRC/openSUSE:Factory/.python-Flask-Security-Too.new.31432/python-Flask-Security-Too.changes
2023-03-03 22:31:34.092072436 +0100
@@ -1,0 +2,31 @@
+Fri Mar 3 06:08:25 UTC 2023 - Steve Kowalik <[email protected]>
+
+- Update to 5.1.1:
+ * Fix 2 Flask apps in same thread with USERNAME_ENABLE set. There was a
+ too aggressive config check.
+ * Fix json/flask backwards compatibility hack.
+ * Fix unified signup when two-factor not enabled. (sebdroid)
+ * Add dependency on setuptools (pkg_resources). (hroncok)
+ * Option to encrypt recovery codes.
+ * Support for authentication via 'social' oauth.
+ * Support for Python 3.11
+ * Fixes for Flask-SQLAlchemy 3.0.0. (jrast)
+ * Fixes for sqlalchemy 2.0.0 (jrast)
+ * Webauthn and Unified signin features now properly take into account
+ blueprint prefixes.
+ * Properly propagate ?next=/xx - the verify, webauthn, and unified signin
+ endpoints, that had multiple redirects, needed fixes.
+ * Two factor redirects ignored url_prefix. Added a
+ SECURITY_TWO_FACTOR_ERROR_VIEW configuration option.
+ * Add configurations for static folder/URL and make sure templates
+ reference blueprint relative static folder.
+ * Send entire context to MailUtil::send_mail (patrickyan)
+ * Support for Flask-Babel 3.0.0
+ * Add configuration option SECURITY_TWO_FACTOR_POST_SETUP_VIEW which is
+ redirected to upon successful change of a two factor method.
+ * The ability to pass in a LoginManager instance which was deprecated in
+ 5.0 has been removed.
+- Drop patch support-Flask-SQLAlchemy-3.0.patch, now included upstream.
+- Refresh all other patches.
+
+-------------------------------------------------------------------
Old:
----
Flask-Security-Too-5.0.2.tar.gz
support-Flask-SQLAlchemy-3.0.patch
New:
----
Flask-Security-Too-5.1.1.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-Flask-Security-Too.spec ++++++
--- /var/tmp/diff_new_pack.nAFhrb/_old 2023-03-03 22:31:34.776075353 +0100
+++ /var/tmp/diff_new_pack.nAFhrb/_new 2023-03-03 22:31:34.780075370 +0100
@@ -16,10 +16,8 @@
#
-%define skip_python2 1
-%{?!python_module:%define python_module() python-%{**} python3-%{**}}
Name: python-Flask-Security-Too
-Version: 5.0.2
+Version: 5.1.1
Release: 0
Summary: Security for Flask apps
License: MIT
@@ -28,27 +26,25 @@
Patch0: no-mongodb.patch
# PATCH-FIX-OPENSUSE Use pyqrcodeng, we do not ship qrcode in OpenSUSE.
Patch1: use-pyqrcodeng.patch
-# PATCH-FIX-UPSTREAM
gh#Flask-Middleware/flask-security#9632a0eab5d3be4280c185e7e934a57fc24057a2
-Patch2: support-Flask-SQLAlchemy-3.0.patch
-BuildRequires: %{python_module Babel >= 2.9.1}
+BuildRequires: %{python_module Babel >= 2.10.0}
BuildRequires: %{python_module Flask >= 1.1.1}
BuildRequires: %{python_module Flask-Babel >= 2.0.0}
BuildRequires: %{python_module Flask-Login >= 0.4.1}
BuildRequires: %{python_module Flask-Mailman >= 0.3.0}
BuildRequires: %{python_module Flask-Principal >= 0.4.0}
-BuildRequires: %{python_module Flask-SQLAlchemy >= 2.5.1}
+BuildRequires: %{python_module Flask-SQLAlchemy >= 3.0.2}
BuildRequires: %{python_module Flask-WTF >= 0.14.3}
BuildRequires: %{python_module PyQRCode >= 1.2}
-BuildRequires: %{python_module SQLAlchemy >= 1.3.24}
+BuildRequires: %{python_module SQLAlchemy >= 1.4.35}
BuildRequires: %{python_module WTForms-lang}
BuildRequires: %{python_module WTForms}
BuildRequires: %{python_module Werkzeug >= 0.14.1}
BuildRequires: %{python_module argon2_cffi >= 19.1.0}
-BuildRequires: %{python_module bcrypt >= 3.1.4}
-BuildRequires: %{python_module bleach >= 3.3.1}
+BuildRequires: %{python_module bcrypt >= 4.0.1}
+BuildRequires: %{python_module bleach >= 5.0.0}
BuildRequires: %{python_module blinker >= 1.4}
BuildRequires: %{python_module cachetools >= 3.1.0}
-BuildRequires: %{python_module cryptography >= 3.4.8}
+BuildRequires: %{python_module cryptography >= 37.0.4}
BuildRequires: %{python_module dateutil}
BuildRequires: %{python_module email-validator >= 1.1.1}
BuildRequires: %{python_module itsdangerous >= 1.1.0}
@@ -67,15 +63,15 @@
Requires: python-Flask-Principal >= 0.4.0
Requires: python-Flask-WTF >= 0.14.3
Requires: python-Werkzeug >= 0.14.1
-Requires: python-bcrypt >= 3.1.4
-Requires: python-bleach >= 3.3.1
+Requires: python-bcrypt >= 4.0.1
+Requires: python-bleach >= 5.0.0
Requires: python-blinker >= 1.4
-Requires: python-cryptography >= 3.4.8
+Requires: python-cryptography >= 37.0.4
Requires: python-email-validator >= 1.1.1
Requires: python-itsdangerous >= 1.1.0
Requires: python-passlib >= 1.7.2
Recommends: python-PyQRCode >= 1.2
-Recommends: python-SQLAlchemy >= 1.3.24
+Recommends: python-SQLAlchemy >= 1.4.35
Recommends: python-zxcvbn >= 4.4.28
Suggests: python-argon2_cffi >= 19.1.0
Suggests: python-phonenumbers >= 8.12.18
++++++ Flask-Security-Too-5.0.2.tar.gz -> Flask-Security-Too-5.1.1.tar.gz ++++++
++++ 24283 lines of diff (skipped)
++++++ no-mongodb.patch ++++++
--- /var/tmp/diff_new_pack.nAFhrb/_old 2023-03-03 22:31:35.124076837 +0100
+++ /var/tmp/diff_new_pack.nAFhrb/_new 2023-03-03 22:31:35.128076854 +0100
@@ -1,8 +1,8 @@
-Index: Flask-Security-Too-5.0.2/tests/conftest.py
+Index: Flask-Security-Too-5.1.1/tests/conftest.py
===================================================================
---- Flask-Security-Too-5.0.2.orig/tests/conftest.py
-+++ Flask-Security-Too-5.0.2/tests/conftest.py
-@@ -862,7 +862,7 @@ def client_nc(request, sqlalchemy_app):
+--- Flask-Security-Too-5.1.1.orig/tests/conftest.py
++++ Flask-Security-Too-5.1.1/tests/conftest.py
+@@ -879,7 +879,7 @@ def client_nc(request, sqlalchemy_app):
return app.test_client(use_cookies=False)
@@ -11,7 +11,7 @@
def clients(request, app, tmpdir, realdburl, realmongodburl):
if request.param == "cl-sqlalchemy":
ds = sqlalchemy_setup(request, app, tmpdir, realdburl)
-@@ -908,7 +908,7 @@ def get_message_local(app):
+@@ -925,7 +925,7 @@ def get_message_local(app):
@pytest.fixture(
++++++ use-pyqrcodeng.patch ++++++
--- /var/tmp/diff_new_pack.nAFhrb/_old 2023-03-03 22:31:35.148076940 +0100
+++ /var/tmp/diff_new_pack.nAFhrb/_new 2023-03-03 22:31:35.160076991 +0100
@@ -1,8 +1,8 @@
-Index: Flask-Security-Too-5.0.2/flask_security/core.py
+Index: Flask-Security-Too-5.1.1/flask_security/core.py
===================================================================
---- Flask-Security-Too-5.0.2.orig/flask_security/core.py
-+++ Flask-Security-Too-5.0.2/flask_security/core.py
-@@ -1523,7 +1523,7 @@ class Security:
+--- Flask-Security-Too-5.1.1.orig/flask_security/core.py
++++ Flask-Security-Too-5.1.1/flask_security/core.py
+@@ -1579,7 +1579,7 @@ class Security:
and "authenticator" in cv("TWO_FACTOR_ENABLED_METHODS",
app=app)
)
if need_qrcode:
@@ -11,10 +11,10 @@
need_sms = (
cv("UNIFIED_SIGNIN", app=app)
-Index: Flask-Security-Too-5.0.2/flask_security/totp.py
+Index: Flask-Security-Too-5.1.1/flask_security/totp.py
===================================================================
---- Flask-Security-Too-5.0.2.orig/flask_security/totp.py
-+++ Flask-Security-Too-5.0.2/flask_security/totp.py
+--- Flask-Security-Too-5.1.1.orig/flask_security/totp.py
++++ Flask-Security-Too-5.1.1/flask_security/totp.py
@@ -140,15 +140,11 @@ class Totp:
.. versionadded:: 4.0.0
"""