Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-cryptography for 
openSUSE:Factory checked in at 2023-03-29 23:26:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
 and      /work/SRC/openSUSE:Factory/.python-cryptography.new.31432 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-cryptography"

Wed Mar 29 23:26:11 2023 rev:74 rq:1074512 version:40.0.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes  
2023-03-15 18:52:58.987896825 +0100
+++ 
/work/SRC/openSUSE:Factory/.python-cryptography.new.31432/python-cryptography.changes
       2023-03-29 23:26:17.659201031 +0200
@@ -1,0 +2,48 @@
+Sun Mar 26 19:56:32 UTC 2023 - Dirk Müller <[email protected]>
+
+- update to 40.0.1:
+  * Support for Python 3.6 is deprecated and will be removed in
+    the next release.
+  * Deprecated the current minimum supported Rust version (MSRV)
+    of 1.48.0. In the next release we will raise MSRV to 1.56.0.
+    Users with the latest ``pip`` will typically get a wheel
+    and not need Rust installed
+  * Deprecated support for OpenSSL less than 1.1.1d. The next
+    release of ``cryptography`` will drop support for older versions.
+  * Deprecated support for DSA keys in
+    :func:`~cryptography.hazmat.primitives.serialization.load_s
+    sh_public_key`
+    and
+    :func:`~cryptography.hazmat.primitives.serialization.load_s
+    sh_private_key`.
+  * Deprecated support for OpenSSH serialization in
+    :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
+    ublicKey`
+    and
+    :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
+    rivateKey`.
+  * Added support for parsing SSH certificates in addition to
+    public keys with
+    :func:`~cryptography.hazmat.primitives.serialization.load_s
+    sh_public_identity`.
+    :func:`~cryptography.hazmat.primitives.serialization.load_s
+    sh_public_key` continues to support only public keys.
+  * Added support for generating SSH certificates with
+    :class:`~cryptography.hazmat.primitives.serialization.SSHCe
+    rtificateBuilder`.
+  * Added :meth:`~cryptography.x509.Certificate.verify_directly_i
+    ssued_by` to
+   :class:`~cryptography.x509.Certificate`.
+  * Added a check to :class:`~cryptography.x509.NameConstraints`
+    to ensure that :class:`~cryptography.x509.DNSName` constraints
+    do not contain any ``*`` wildcards.
+  * Removed many unused CFFI OpenSSL bindings. This will not
+    impact you unless you are using ``cryptography`` to directly
+    invoke OpenSSL's C API. Note that
+    these have never been considered a stable, supported,
+    public API by ``cryptography``, this note is included as a courtesy.
+  * The X.509 builder classes now raise ``UnsupportedAlgorithm``
+    instead of ``ValueError`` if an unsupported hash algorithm is passed.
+  * Added public union type aliases for type hinting
+
+-------------------------------------------------------------------

Old:
----
  cryptography-39.0.2.tar.gz

New:
----
  cryptography-40.0.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.5lyPrh/_old  2023-03-29 23:26:19.391209168 +0200
+++ /var/tmp/diff_new_pack.5lyPrh/_new  2023-03-29 23:26:19.395209186 +0200
@@ -28,7 +28,7 @@
 %bcond_with test
 %endif
 Name:           python-cryptography%{psuffix}
-Version:        39.0.2
+Version:        40.0.1
 Release:        0
 Summary:        Python library which exposes cryptographic recipes and 
primitives
 License:        Apache-2.0 OR BSD-3-Clause

++++++ _service ++++++
--- /var/tmp/diff_new_pack.5lyPrh/_old  2023-03-29 23:26:19.435209374 +0200
+++ /var/tmp/diff_new_pack.5lyPrh/_new  2023-03-29 23:26:19.439209394 +0200
@@ -1,7 +1,7 @@
 <services>
   <service name="download_files" mode="disabled"/>
   <service name="cargo_vendor" mode="disabled">
-    <param name="srcdir">cryptography-39.0.0/src/rust</param>
+    <param name="srcdir">cryptography-40.0.1/src/rust</param>
     <param name="compression">zst</param>
   </service>
   <service name="cargo_audit" mode="disabled">

++++++ cryptography-39.0.2.tar.gz -> cryptography-40.0.1.tar.gz ++++++
++++ 20048 lines of diff (skipped)

++++++ skip_openssl_memleak_test.patch ++++++
--- /var/tmp/diff_new_pack.5lyPrh/_old  2023-03-29 23:26:19.687210558 +0200
+++ /var/tmp/diff_new_pack.5lyPrh/_new  2023-03-29 23:26:19.687210558 +0200
@@ -2,20 +2,25 @@
  tests/hazmat/backends/test_openssl_memleak.py |    7 +++----
  1 file changed, 3 insertions(+), 4 deletions(-)
 
---- a/tests/hazmat/backends/test_openssl_memleak.py
-+++ b/tests/hazmat/backends/test_openssl_memleak.py
-@@ -174,10 +174,9 @@ def assert_no_memory_leaks(s, argv=[]):
+Index: cryptography-40.0.1/tests/hazmat/backends/test_openssl_memleak.py
+===================================================================
+--- cryptography-40.0.1.orig/tests/hazmat/backends/test_openssl_memleak.py
++++ cryptography-40.0.1/tests/hazmat/backends/test_openssl_memleak.py
+@@ -204,12 +204,10 @@ def assert_no_memory_leaks(s, argv=[]):
  
  
  def skip_if_memtesting_not_supported():
 -    return pytest.mark.skipif(
--        not Binding().lib.Cryptography_HAS_MEM_FUNCTIONS,
--        reason="Requires OpenSSL memory functions (>=1.1.0)",
+-        not Binding().lib.Cryptography_HAS_MEM_FUNCTIONS
+-        or platform.python_implementation() == "PyPy",
+-        reason="Requires OpenSSL memory functions (>=1.1.0) and not PyPy",
 -    )
+-
 +    return pytest.mark.skip(
 +        reason="Our FIPS openssl startup code invokes CRYPTO_malloc() which 
prevents later debugging via CRYPTO_set_mem_functions()"
 +     )
- 
++ 
  
  @pytest.mark.skip_fips(reason="FIPS self-test sets allow_customize = 0")
+ @skip_if_memtesting_not_supported()
 

++++++ vendor.tar.zst ++++++
Binary files /var/tmp/diff_new_pack.5lyPrh/_old and 
/var/tmp/diff_new_pack.5lyPrh/_new differ

Reply via email to