Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package python-cryptography for openSUSE:Factory checked in at 2025-08-08 15:10:10 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old) and /work/SRC/openSUSE:Factory/.python-cryptography.new.1085 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography" Fri Aug 8 15:10:10 2025 rev:102 rq:1292428 version:45.0.5 Changes: -------- --- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes 2025-05-13 20:12:05.411509313 +0200 +++ /work/SRC/openSUSE:Factory/.python-cryptography.new.1085/python-cryptography.changes 2025-08-08 15:10:24.352477799 +0200 @@ -1,0 +2,120 @@ +Sat Jul 12 08:36:08 UTC 2025 - Dirk Müller <dmuel...@suse.com> + +- update to 45.0.5: + * Updated Windows, macOS, and Linux wheels to be compiled with + OpenSSL 3.5.1. + * Fixed decrypting PKCS#8 files encrypted with SHA1-RC4. (This + is not considered secure, and is supported only for backwards + compatibility.) + * Fixed decrypting PKCS#8 files encrypted with long salts (this + impacts keys encrypted by Bouncy Castle). + * Fixed decrypting PKCS#8 files encrypted with DES-CBC-MD5. + While wildly insecure, this remains prevalent. + * Fixed using mypy with cryptography on older versions of + Python. + * Updated Windows, macOS, and Linux wheels to be compiled with + OpenSSL 3.5.0. + * Support for Python 3.7 is deprecated and will be removed in + the next cryptography release. + * Updated the minimum supported Rust version (MSRV) to 1.74.0, + from 1.65.0. + * Added support for serialization of PKCS#12 Java truststores + in :func:`~cryptography.hazmat.primitives.serialization.pkcs1 + 2.serialize_java_truststore` + * Added :meth:`~cryptography.hazmat.primitives.kdf.argon2.Argon + 2id.derive_phc_encoded` and :meth:`~cryptography.hazmat.primi + tives.kdf.argon2.Argon2id.verify_phc_encoded` methods to + support password hashing in the PHC string format + * Added support for PKCS7 decryption and encryption using + AES-256 as the content algorithm, in addition to AES-128. + * BACKWARDS INCOMPATIBLE: Made SSH private key loading more + consistent with other private key loading: :func:`~cryptograp + hy.hazmat.primitives.serialization.load_ssh_private_key` now + raises a TypeError if the key is unencrypted but a password + is provided (previously no exception was raised), and raises + a TypeError if the key is encrypted but no password is + provided (previously a ValueError was raised). + * Added __copy__ to the :class:`~cryptography.hazmat.primitives + .asymmetric.ec.EllipticCurvePrivateKey`, :class:`~cryptograph + y.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`, :c + lass:`~cryptography.hazmat.primitives.asymmetric.ed25519.Ed25 + 519PublicKey`, :class:`~cryptography.hazmat.primitives.asymme + tric.ed25519.Ed25519PrivateKey`, :class:`~cryptography.hazmat + .primitives.asymmetric.ed448.Ed448PublicKey`, :class:`~crypto + graphy.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey`, : + class:`~cryptography.hazmat.primitives.asymmetric.x25519.X255 + 19PublicKey`, :class:`~cryptography.hazmat.primitives.asymmet + ric.x25519.X25519PrivateKey`, :class:`~cryptography.hazmat.pr + imitives.asymmetric.x448.X448PublicKey`, :class:`~cryptograph + y.hazmat.primitives.asymmetric.x448.X448PrivateKey`, :class:` + ~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey` + , :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAP + ublicKey`, :class:`~cryptography.hazmat.primitives.asymmetric + .dsa.DSAPrivateKey`, :class:`~cryptography.hazmat.primitives. + asymmetric.dsa.DSAPublicKey`, :class:`~cryptography.hazmat.pr + imitives.asymmetric.dh.DHPrivateKey`, and :class:`~cryptograp + hy.hazmat.primitives.asymmetric.dh.DHPublicKey` abstract base + classes. + * We significantly refactored how private key loading ( :func:` + ~cryptography.hazmat.primitives.serialization.load_pem_privat + e_key` and :func:`~cryptography.hazmat.primitives.serializati + on.load_der_private_key`) works. This is intended to be + backwards compatible for all well-formed keys, therefore if + you discover a key that now raises an exception, please file + a bug with instructions for reproducing. + * Added unsafe_skip_rsa_key_validation keyword-argument to :fun + c:`~cryptography.hazmat.primitives.serialization.load_ssh_pri + vate_key`. + * Added :class:`~cryptography.hazmat.primitives.hashes.XOFHash` + to support repeated :meth:`~cryptography.hazmat.primitives.ha + shes.XOFHash.squeeze` operations on extendable output + functions. + * Added :meth:`~cryptography.x509.ocsp.OCSPResponseBuilder.add_ + response_by_hash` method to allow creating OCSP responses + using certificate hash values rather than full certificates. + * Extended the :mod:`X.509 path validation + <cryptography.x509.verification>` API to support user- + configured extension policies via the + :meth:`PolicyBuilder.extension_policies <cryptography.x509.ve + rification.PolicyBuilder.extension_policies>` method. + * Deprecated the subject, verification_time and max_chain_depth + properties on + :class:`~cryptography.x509.verification.ClientVerifier` and + :class:`~cryptography.x509.verification.ServerVerifier` in + favor of a new policy property. These properties will be + removed in the next release of cryptography. + * BACKWARDS INCOMPATIBLE: The :meth:`VerifiedClient.subject + <cryptography.x509.verification.VerifiedClient.subjects>` + property can now be None since a custom extension policy may + allow certificates without a Subject Alternative Name + extension. + * Changed the behavior when the OpenSSL 3 legacy provider fails + to load. Instead of raising an exception, a warning is now + emitted. The CRYPTOGRAPHY_OPENSSL_NO_LEGACY environment + variable can still be used to disable the legacy provider at + runtime. + * Added support for the CRYPTOGRAPHY_BUILD_OPENSSL_NO_LEGACY + environment variable during build time, which prevents the + library from ever attempting to load the legacy provider. + * Added support for the + :class:`~cryptography.x509.PrivateKeyUsagePeriod` X.509 + extension. This extension defines the period during which the + private key corresponding to the certificate's public key may + be used. + * Added support for compiling against `aws-lc`_. + * Parsing X.509 structures now more strictly enforces that Name + structures do not have malformed ASN.1. + * We now publish py311 wheels that utilize the faster + pyo3::buffer::PyBuffer interface, resulting in significantly + improved performance for operations involving small buffers. + * Added :func:`~cryptography.hazmat.primitives.serialization.ss + h_key_fingerprint` for computing fingerprints of SSH public + keys. + * Added support for deterministic ECDSA signing via the new + keyword-only argument ecdsa_deterministic in + :meth:`~cryptography.x509.CertificateBuilder.sign`, :meth:`~c + ryptography.x509.CertificateRevocationListBuilder.sign` and : + meth:`~cryptography.x509.CertificateSigningRequestBuilder.sig + n`. + +------------------------------------------------------------------- Old: ---- cryptography-44.0.3.tar.gz New: ---- cryptography-45.0.5.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-cryptography.spec ++++++ --- /var/tmp/diff_new_pack.NplDy5/_old 2025-08-08 15:10:28.500651518 +0200 +++ /var/tmp/diff_new_pack.NplDy5/_new 2025-08-08 15:10:28.516652187 +0200 @@ -28,7 +28,7 @@ %{?sle15_python_module_pythons} Name: python-cryptography%{psuffix} # ALWAYS KEEP IN SYNC WITH python-cryptography-vectors! -Version: 44.0.3 +Version: 45.0.5 Release: 0 Summary: Python library which exposes cryptographic recipes and primitives License: Apache-2.0 OR BSD-3-Clause @@ -128,7 +128,6 @@ %license LICENSE LICENSE.APACHE LICENSE.BSD %doc CONTRIBUTING.rst CHANGELOG.rst README.rst %{python_sitearch}/cryptography -%{python_sitearch}/rust %{python_sitearch}/cryptography-%{version}.dist-info %endif ++++++ cryptography-44.0.3.tar.gz -> cryptography-45.0.5.tar.gz ++++++ ++++ 18497 lines of diff (skipped) ++++++ no-pytest_benchmark.patch ++++++ --- /var/tmp/diff_new_pack.NplDy5/_old 2025-08-08 15:10:30.192722379 +0200 +++ /var/tmp/diff_new_pack.NplDy5/_new 2025-08-08 15:10:30.236724221 +0200 @@ -1,17 +1,17 @@ -Index: cryptography-44.0.3/pyproject.toml +Index: cryptography-45.0.5/pyproject.toml =================================================================== ---- cryptography-44.0.3.orig/pyproject.toml -+++ cryptography-44.0.3/pyproject.toml +--- cryptography-45.0.5.orig/pyproject.toml ++++ cryptography-45.0.5/pyproject.toml @@ -67,8 +67,6 @@ nox = ["nox >=2024.04.15", "nox[uv] >=20 test = [ - "cryptography_vectors==44.0.3", + "cryptography_vectors==45.0.5", "pytest >=7.4.0", - "pytest-benchmark >=4.0", - "pytest-cov >=2.10.1", "pytest-xdist >=3.5.0", "pretend >=0.7", "certifi >=2024", -@@ -118,7 +116,7 @@ exclude = [ +@@ -129,7 +127,7 @@ exclude = [ ] [tool.pytest.ini_options] @@ -20,17 +20,14 @@ console_output_style = "progress-even-when-capture-no" markers = [ "skip_fips: this test is not executed in FIPS mode", -@@ -140,33 +138,6 @@ module = [ - ] +@@ -150,30 +148,6 @@ strict_bytes = true + module = ["pretend"] ignore_missing_imports = true -[tool.coverage.run] -branch = true -relative_files = true --source = [ -- "cryptography", -- "tests/", --] +-source = ["cryptography", "tests/"] - -[tool.coverage.paths] -source = [ @@ -39,10 +36,7 @@ - "*.nox\\*\\Lib\\site-packages\\cryptography", - "*.nox/pypy/site-packages/cryptography", -] --tests = [ -- "tests/", -- "*tests\\", --] +-tests = ["tests/", "*tests\\"] - -[tool.coverage.report] -exclude_lines = [ @@ -51,13 +45,16 @@ - "if typing.TYPE_CHECKING", -] - +-[tool.coverage.html] +-show_contexts = true +- [tool.ruff] line-length = 79 -Index: cryptography-44.0.3/tests/bench/test_aead.py +Index: cryptography-45.0.5/tests/bench/test_aead.py =================================================================== ---- cryptography-44.0.3.orig/tests/bench/test_aead.py -+++ cryptography-44.0.3/tests/bench/test_aead.py +--- cryptography-45.0.5.orig/tests/bench/test_aead.py ++++ cryptography-45.0.5/tests/bench/test_aead.py @@ -26,84 +26,84 @@ def _aead_supported(cls): not _aead_supported(ChaCha20Poly1305), reason="Requires OpenSSL with ChaCha20Poly1305 support", @@ -163,10 +160,10 @@ ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None) - benchmark(aes.decrypt, b"\x00" * 12, ct, None) + aes.decrypt(b"\x00" * 12, ct, None) -Index: cryptography-44.0.3/tests/bench/test_ec_load.py +Index: cryptography-45.0.5/tests/bench/test_ec_load.py =================================================================== ---- cryptography-44.0.3.orig/tests/bench/test_ec_load.py -+++ cryptography-44.0.3/tests/bench/test_ec_load.py +--- cryptography-45.0.5.orig/tests/bench/test_ec_load.py ++++ cryptography-45.0.5/tests/bench/test_ec_load.py @@ -5,9 +5,9 @@ from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1 @@ -181,10 +178,10 @@ - benchmark(EC_KEY_SECP256R1.private_key) +def test_load_ec_private_numbers(): + EC_KEY_SECP256R1.private_key() -Index: cryptography-44.0.3/tests/bench/test_hashes.py +Index: cryptography-45.0.5/tests/bench/test_hashes.py =================================================================== ---- cryptography-44.0.3.orig/tests/bench/test_hashes.py -+++ cryptography-44.0.3/tests/bench/test_hashes.py +--- cryptography-45.0.5.orig/tests/bench/test_hashes.py ++++ cryptography-45.0.5/tests/bench/test_hashes.py @@ -5,10 +5,10 @@ from cryptography.hazmat.primitives import hashes @@ -198,10 +195,10 @@ - benchmark(bench) + bench() -Index: cryptography-44.0.3/tests/bench/test_hmac.py +Index: cryptography-45.0.5/tests/bench/test_hmac.py =================================================================== ---- cryptography-44.0.3.orig/tests/bench/test_hmac.py -+++ cryptography-44.0.3/tests/bench/test_hmac.py +--- cryptography-45.0.5.orig/tests/bench/test_hmac.py ++++ cryptography-45.0.5/tests/bench/test_hmac.py @@ -5,10 +5,10 @@ from cryptography.hazmat.primitives import hashes, hmac @@ -215,10 +212,10 @@ - benchmark(bench) + bench() -Index: cryptography-44.0.3/tests/bench/test_x509.py +Index: cryptography-45.0.5/tests/bench/test_x509.py =================================================================== ---- cryptography-44.0.3.orig/tests/bench/test_x509.py -+++ cryptography-44.0.3/tests/bench/test_x509.py +--- cryptography-45.0.5.orig/tests/bench/test_x509.py ++++ cryptography-45.0.5/tests/bench/test_x509.py @@ -13,40 +13,40 @@ from cryptography import x509 from ..utils import load_vectors_from_file ++++++ vendor.tar.zst ++++++ ++++ 837891 lines of diff (skipped)