Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-cryptography for
openSUSE:Factory checked in at 2025-09-15 19:50:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
and /work/SRC/openSUSE:Factory/.python-cryptography.new.1977 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography"
Mon Sep 15 19:50:26 2025 rev:104 rq:1304683 version:45.0.7
Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes
2025-09-03 21:07:25.828634395 +0200
+++
/work/SRC/openSUSE:Factory/.python-cryptography.new.1977/python-cryptography.changes
2025-09-15 19:54:27.034995827 +0200
@@ -1,0 +2,6 @@
+Sun Sep 14 20:45:39 UTC 2025 - Dirk Müller <[email protected]>
+
+- update to 45.0.7:
+ * Added a function to support an upcoming pyOpenSSL release.
+
+-------------------------------------------------------------------
Old:
----
cryptography-45.0.5.tar.gz
New:
----
cryptography-45.0.7.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.6KXXW4/_old 2025-09-15 19:54:27.727024842 +0200
+++ /var/tmp/diff_new_pack.6KXXW4/_new 2025-09-15 19:54:27.727024842 +0200
@@ -28,7 +28,7 @@
%{?sle15_python_module_pythons}
Name: python-cryptography%{psuffix}
# ALWAYS KEEP IN SYNC WITH python-cryptography-vectors!
-Version: 45.0.5
+Version: 45.0.7
Release: 0
Summary: Python library which exposes cryptographic recipes and
primitives
License: Apache-2.0 OR BSD-3-Clause
++++++ Make-unsafe-subinterpreter-support-available-via-cfg.patch ++++++
--- /var/tmp/diff_new_pack.6KXXW4/_old 2025-09-15 19:54:27.763026352 +0200
+++ /var/tmp/diff_new_pack.6KXXW4/_new 2025-09-15 19:54:27.767026520 +0200
@@ -7,8 +7,10 @@
src/impl_/pymodule.rs | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
---- a/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
-+++ b/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
+Index: cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
+===================================================================
+--- cryptography-45.0.7.orig/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
++++ cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
@@ -100,7 +100,7 @@ impl ModuleDef {
// that static data is not reused across interpreters.
//
@@ -18,8 +20,10 @@
{
// PyInterpreterState_Get is only available on 3.9 and later, but
is missing
// from python3.dll for Windows stable API on 3.9
---- a/Cargo.toml
-+++ b/Cargo.toml
+Index: cryptography-45.0.7/Cargo.toml
+===================================================================
+--- cryptography-45.0.7.orig/Cargo.toml
++++ cryptography-45.0.7/Cargo.toml
@@ -29,3 +29,6 @@ openssl-sys = "0.9.108"
[profile.release]
@@ -27,9 +31,11 @@
+
+[patch.crates-io]
+pyo3 = { path="vendor/pyo3-0.25.1" }
---- a/Cargo.lock
-+++ b/Cargo.lock
-@@ -269,8 +269,6 @@ dependencies = [
+Index: cryptography-45.0.7/Cargo.lock
+===================================================================
+--- cryptography-45.0.7.orig/Cargo.lock
++++ cryptography-45.0.7/Cargo.lock
+@@ -276,8 +276,6 @@ dependencies = [
[[package]]
name = "pyo3"
version = "0.25.1"
++++++ cryptography-45.0.5.tar.gz -> cryptography-45.0.7.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/CHANGELOG.rst
new/cryptography-45.0.7/CHANGELOG.rst
--- old/cryptography-45.0.5/CHANGELOG.rst 2025-07-02 15:00:14.000000000
+0200
+++ new/cryptography-45.0.7/CHANGELOG.rst 2025-09-01 13:05:40.000000000
+0200
@@ -1,6 +1,20 @@
Changelog
=========
+.. _v45-0-7:
+
+45.0.7 - 2025-09-01
+~~~~~~~~~~~~~~~~~~~
+
+* Added a function to support an upcoming ``pyOpenSSL`` release.
+
+.. _v45-0-6:
+
+45.0.6 - 2025-08-05
+~~~~~~~~~~~~~~~~~~~
+
+* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.2.
+
.. _v45-0-5:
45.0.5 - 2025-07-02
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/PKG-INFO
new/cryptography-45.0.7/PKG-INFO
--- old/cryptography-45.0.5/PKG-INFO 1970-01-01 01:00:00.000000000 +0100
+++ new/cryptography-45.0.7/PKG-INFO 1970-01-01 01:00:00.000000000 +0100
@@ -1,6 +1,6 @@
Metadata-Version: 2.4
Name: cryptography
-Version: 45.0.5
+Version: 45.0.7
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Developers
Classifier: Natural Language :: English
@@ -26,7 +26,7 @@
Requires-Dist: bcrypt>=3.1.5 ; extra == 'ssh'
Requires-Dist: nox>=2024.4.15 ; extra == 'nox'
Requires-Dist: nox[uv]>=2024.3.2 ; python_full_version >= '3.8' and extra ==
'nox'
-Requires-Dist: cryptography-vectors==45.0.5 ; extra == 'test'
+Requires-Dist: cryptography-vectors==45.0.7 ; extra == 'test'
Requires-Dist: pytest>=7.4.0 ; extra == 'test'
Requires-Dist: pytest-benchmark>=4.0 ; extra == 'test'
Requires-Dist: pytest-cov>=2.10.1 ; extra == 'test'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/pyproject.toml
new/cryptography-45.0.7/pyproject.toml
--- old/cryptography-45.0.5/pyproject.toml 2025-07-02 15:00:14.000000000
+0200
+++ new/cryptography-45.0.7/pyproject.toml 2025-09-01 13:05:40.000000000
+0200
@@ -15,7 +15,7 @@
[project]
name = "cryptography"
-version = "45.0.5"
+version = "45.0.7"
authors = [
{ name = "The Python Cryptographic Authority and individual contributors",
email = "[email protected]" },
]
@@ -65,7 +65,7 @@
# All the following are used for our own testing.
nox = ["nox >=2024.04.15", "nox[uv] >=2024.03.02; python_version >= '3.8'"]
test = [
- "cryptography_vectors==45.0.5",
+ "cryptography_vectors==45.0.7",
"pytest >=7.4.0",
"pytest-benchmark >=4.0",
"pytest-cov >=2.10.1",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/src/_cffi_src/openssl/ssl.py
new/cryptography-45.0.7/src/_cffi_src/openssl/ssl.py
--- old/cryptography-45.0.5/src/_cffi_src/openssl/ssl.py 2025-07-02
15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/_cffi_src/openssl/ssl.py 2025-09-01
13:05:40.000000000 +0200
@@ -263,6 +263,7 @@
void SSL_CTX_set_client_CA_list(SSL_CTX *, Cryptography_STACK_OF_X509_NAME *);
void SSL_CTX_set_info_callback(SSL_CTX *, void (*)(const SSL *, int, int));
+void SSL_set_info_callback(SSL *, void (*) (const SSL *, int, int));
void SSL_CTX_set_msg_callback(SSL_CTX *,
void (*)(
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/src/cryptography/__about__.py
new/cryptography-45.0.7/src/cryptography/__about__.py
--- old/cryptography-45.0.5/src/cryptography/__about__.py 2025-07-02
15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/cryptography/__about__.py 2025-09-01
13:05:40.000000000 +0200
@@ -10,7 +10,7 @@
"__version__",
]
-__version__ = "45.0.5"
+__version__ = "45.0.7"
__author__ = "The Python Cryptographic Authority and individual contributors"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/cryptography-45.0.5/src/rust/cryptography-openssl/src/aead.rs
new/cryptography-45.0.7/src/rust/cryptography-openssl/src/aead.rs
--- old/cryptography-45.0.5/src/rust/cryptography-openssl/src/aead.rs
2025-07-02 15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/rust/cryptography-openssl/src/aead.rs
2025-09-01 13:05:40.000000000 +0200
@@ -37,14 +37,11 @@
AeadType::Aes256GcmSiv => unsafe { ffi::EVP_aead_aes_256_gcm_siv()
},
};
+ let key_ptr = key.as_ptr();
+ let tag_len = ffi::EVP_AEAD_DEFAULT_TAG_LENGTH as usize;
// SAFETY: We're passing a valid key and aead.
unsafe {
- let ctx = cvt_p(ffi::EVP_AEAD_CTX_new(
- aead,
- key.as_ptr(),
- key.len(),
- ffi::EVP_AEAD_DEFAULT_TAG_LENGTH as usize,
- ))?;
+ let ctx = cvt_p(ffi::EVP_AEAD_CTX_new(aead, key_ptr, key.len(),
tag_len))?;
Ok(AeadCtx::from_ptr(ctx))
}
}
@@ -61,7 +58,7 @@
let mut out_len = out.len();
// SAFETY: All the lengths and pointers are known valid.
unsafe {
- cvt(ffi::EVP_AEAD_CTX_seal(
+ let res = ffi::EVP_AEAD_CTX_seal(
self.as_ptr(),
out.as_mut_ptr(),
&mut out_len,
@@ -72,7 +69,8 @@
data.len(),
ad.as_ptr(),
ad.len(),
- ))?;
+ );
+ cvt(res)?;
}
Ok(())
}
@@ -87,7 +85,7 @@
let mut out_len = out.len();
// SAFETY: All the lengths and pointers are known valid.
unsafe {
- cvt(ffi::EVP_AEAD_CTX_open(
+ let res = ffi::EVP_AEAD_CTX_open(
self.as_ptr(),
out.as_mut_ptr(),
&mut out_len,
@@ -98,7 +96,8 @@
data.len(),
ad.as_ptr(),
ad.len(),
- ))?;
+ );
+ cvt(res)?;
}
Ok(())
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/src/rust/src/backend/aead.rs
new/cryptography-45.0.7/src/rust/src/backend/aead.rs
--- old/cryptography-45.0.5/src/rust/src/backend/aead.rs 2025-07-02
15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/rust/src/backend/aead.rs 2025-09-01
13:05:40.000000000 +0200
@@ -400,16 +400,13 @@
assert!(aad.is_none());
b""
};
- Ok(pyo3::types::PyBytes::new_with(
- py,
- plaintext.len() + self.tag_len,
- |b| {
- self.ctx
- .encrypt(plaintext, nonce.unwrap_or(b""), ad, b)
- .map_err(CryptographyError::from)?;
- Ok(())
- },
- )?)
+ let out_len = plaintext.len() + self.tag_len;
+ Ok(pyo3::types::PyBytes::new_with(py, out_len, |b| {
+ self.ctx
+ .encrypt(plaintext, nonce.unwrap_or(b""), ad, b)
+ .map_err(CryptographyError::from)?;
+ Ok(())
+ })?)
}
fn decrypt<'p>(
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/cryptography-45.0.5/src/rust/src/buf.rs
new/cryptography-45.0.7/src/rust/src/buf.rs
--- old/cryptography-45.0.5/src/rust/src/buf.rs 2025-07-02 15:00:14.000000000
+0200
+++ new/cryptography-45.0.7/src/rust/src/buf.rs 2025-09-01 13:05:40.000000000
+0200
@@ -48,10 +48,8 @@
) -> pyo3::PyResult<(pyo3::Bound<'p, pyo3::PyAny>, usize, usize)> {
let py = pyobj.py();
let bufobj = if mutable {
- let kwargs = pyo3::types::IntoPyDict::into_py_dict(
- [(pyo3::intern!(py, "require_writable"), true)],
- py,
- )?;
+ let kwargs = [(pyo3::intern!(py, "require_writable"), true)];
+ let kwargs = pyo3::types::IntoPyDict::into_py_dict(kwargs, py)?;
types::FFI_FROM_BUFFER
.get(py)?
.call((pyobj,), Some(&kwargs))
++++++ no-pytest_benchmark.patch ++++++
--- /var/tmp/diff_new_pack.6KXXW4/_old 2025-09-15 19:54:28.071039266 +0200
+++ /var/tmp/diff_new_pack.6KXXW4/_new 2025-09-15 19:54:28.075039434 +0200
@@ -1,10 +1,10 @@
-Index: cryptography-45.0.5/pyproject.toml
+Index: cryptography-45.0.7/pyproject.toml
===================================================================
---- cryptography-45.0.5.orig/pyproject.toml
-+++ cryptography-45.0.5/pyproject.toml
+--- cryptography-45.0.7.orig/pyproject.toml
++++ cryptography-45.0.7/pyproject.toml
@@ -67,8 +67,6 @@ nox = ["nox >=2024.04.15", "nox[uv] >=20
test = [
- "cryptography_vectors==45.0.5",
+ "cryptography_vectors==45.0.7",
"pytest >=7.4.0",
- "pytest-benchmark >=4.0",
- "pytest-cov >=2.10.1",
@@ -51,10 +51,10 @@
[tool.ruff]
line-length = 79
-Index: cryptography-45.0.5/tests/bench/test_aead.py
+Index: cryptography-45.0.7/tests/bench/test_aead.py
===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_aead.py
-+++ cryptography-45.0.5/tests/bench/test_aead.py
+--- cryptography-45.0.7.orig/tests/bench/test_aead.py
++++ cryptography-45.0.7/tests/bench/test_aead.py
@@ -26,84 +26,84 @@ def _aead_supported(cls):
not _aead_supported(ChaCha20Poly1305),
reason="Requires OpenSSL with ChaCha20Poly1305 support",
@@ -160,10 +160,10 @@
ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
- benchmark(aes.decrypt, b"\x00" * 12, ct, None)
+ aes.decrypt(b"\x00" * 12, ct, None)
-Index: cryptography-45.0.5/tests/bench/test_ec_load.py
+Index: cryptography-45.0.7/tests/bench/test_ec_load.py
===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_ec_load.py
-+++ cryptography-45.0.5/tests/bench/test_ec_load.py
+--- cryptography-45.0.7.orig/tests/bench/test_ec_load.py
++++ cryptography-45.0.7/tests/bench/test_ec_load.py
@@ -5,9 +5,9 @@
from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
@@ -178,10 +178,10 @@
- benchmark(EC_KEY_SECP256R1.private_key)
+def test_load_ec_private_numbers():
+ EC_KEY_SECP256R1.private_key()
-Index: cryptography-45.0.5/tests/bench/test_hashes.py
+Index: cryptography-45.0.7/tests/bench/test_hashes.py
===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_hashes.py
-+++ cryptography-45.0.5/tests/bench/test_hashes.py
+--- cryptography-45.0.7.orig/tests/bench/test_hashes.py
++++ cryptography-45.0.7/tests/bench/test_hashes.py
@@ -5,10 +5,10 @@
from cryptography.hazmat.primitives import hashes
@@ -195,10 +195,10 @@
- benchmark(bench)
+ bench()
-Index: cryptography-45.0.5/tests/bench/test_hmac.py
+Index: cryptography-45.0.7/tests/bench/test_hmac.py
===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_hmac.py
-+++ cryptography-45.0.5/tests/bench/test_hmac.py
+--- cryptography-45.0.7.orig/tests/bench/test_hmac.py
++++ cryptography-45.0.7/tests/bench/test_hmac.py
@@ -5,10 +5,10 @@
from cryptography.hazmat.primitives import hashes, hmac
@@ -212,10 +212,10 @@
- benchmark(bench)
+ bench()
-Index: cryptography-45.0.5/tests/bench/test_x509.py
+Index: cryptography-45.0.7/tests/bench/test_x509.py
===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_x509.py
-+++ cryptography-45.0.5/tests/bench/test_x509.py
+--- cryptography-45.0.7.orig/tests/bench/test_x509.py
++++ cryptography-45.0.7/tests/bench/test_x509.py
@@ -13,40 +13,40 @@ from cryptography import x509
from ..utils import load_vectors_from_file
++++++ vendor.tar.zst ++++++
++++ 54808 lines of diff (skipped)