Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-certbot-dns-rfc2136 for 
openSUSE:Factory checked in at 2022-04-08 22:46:08
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-certbot-dns-rfc2136 (Old)
 and      /work/SRC/openSUSE:Factory/.python-certbot-dns-rfc2136.new.1900 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-certbot-dns-rfc2136"

Fri Apr  8 22:46:08 2022 rev:33 rq:967771 version:1.26.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/python-certbot-dns-rfc2136/python-certbot-dns-rfc2136.changes
    2021-12-21 20:42:28.490018373 +0100
+++ 
/work/SRC/openSUSE:Factory/.python-certbot-dns-rfc2136.new.1900/python-certbot-dns-rfc2136.changes
  2022-04-08 22:46:31.618600898 +0200
@@ -1,0 +2,6 @@
+Fri Apr  8 11:08:26 UTC 2022 - Mark??ta Machov?? <[email protected]>
+
+- update to version 1.26.0
+  * sync with the main certbot package
+
+-------------------------------------------------------------------

Old:
----
  certbot-dns-rfc2136-1.22.0.tar.gz

New:
----
  certbot-dns-rfc2136-1.26.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-certbot-dns-rfc2136.spec ++++++
--- /var/tmp/diff_new_pack.elPb3v/_old  2022-04-08 22:46:32.282593528 +0200
+++ /var/tmp/diff_new_pack.elPb3v/_new  2022-04-08 22:46:32.286593484 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package python-certbot-dns-rfc2136
 #
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -19,7 +19,7 @@
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
 %define skip_python2 1
 Name:           python-certbot-dns-rfc2136
-Version:        1.22.0
+Version:        1.26.0
 Release:        0
 Summary:        RFC 2136 DNS Authenticator plugin for Certbot
 License:        Apache-2.0

++++++ certbot-dns-rfc2136-1.22.0.tar.gz -> certbot-dns-rfc2136-1.26.0.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/certbot-dns-rfc2136-1.22.0/MANIFEST.in 
new/certbot-dns-rfc2136-1.26.0/MANIFEST.in
--- old/certbot-dns-rfc2136-1.22.0/MANIFEST.in  2021-12-07 23:02:45.000000000 
+0100
+++ new/certbot-dns-rfc2136-1.26.0/MANIFEST.in  2022-04-05 19:41:26.000000000 
+0200
@@ -2,5 +2,6 @@
 include README.rst
 recursive-include docs *
 recursive-include tests *
+include certbot_dns_rfc2136/py.typed
 global-exclude __pycache__
 global-exclude *.py[cod]
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/certbot-dns-rfc2136-1.22.0/PKG-INFO 
new/certbot-dns-rfc2136-1.26.0/PKG-INFO
--- old/certbot-dns-rfc2136-1.22.0/PKG-INFO     2021-12-07 23:03:15.878674300 
+0100
+++ new/certbot-dns-rfc2136-1.26.0/PKG-INFO     2022-04-05 19:42:18.794939500 
+0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.1
 Name: certbot-dns-rfc2136
-Version: 1.22.0
+Version: 1.26.0
 Summary: RFC 2136 DNS Authenticator plugin for Certbot
 Home-page: https://github.com/certbot/certbot
 Author: Certbot Project
@@ -14,7 +14,6 @@
 Classifier: Operating System :: POSIX :: Linux
 Classifier: Programming Language :: Python
 Classifier: Programming Language :: Python :: 3
-Classifier: Programming Language :: Python :: 3.6
 Classifier: Programming Language :: Python :: 3.7
 Classifier: Programming Language :: Python :: 3.8
 Classifier: Programming Language :: Python :: 3.9
@@ -25,7 +24,7 @@
 Classifier: Topic :: System :: Networking
 Classifier: Topic :: System :: Systems Administration
 Classifier: Topic :: Utilities
-Requires-Python: >=3.6
+Requires-Python: >=3.7
 Provides-Extra: docs
 License-File: LICENSE.txt
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136/_internal/dns_rfc2136.py 
new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136/_internal/dns_rfc2136.py
--- old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136/_internal/dns_rfc2136.py 
2021-12-07 23:02:45.000000000 +0100
+++ new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136/_internal/dns_rfc2136.py 
2022-04-05 19:41:26.000000000 +0200
@@ -1,5 +1,7 @@
 """DNS Authenticator using RFC 2136 Dynamic Updates."""
 import logging
+from typing import Any
+from typing import Callable
 from typing import Optional
 
 import dns.flags
@@ -42,20 +44,21 @@
     description = 'Obtain certificates using a DNS TXT record (if you are 
using BIND for DNS).'
     ttl = 120
 
-    def __init__(self, *args, **kwargs):
+    def __init__(self, *args: Any, **kwargs: Any) -> None:
         super().__init__(*args, **kwargs)
         self.credentials: Optional[CredentialsConfiguration] = None
 
     @classmethod
-    def add_parser_arguments(cls, add):  # pylint: disable=arguments-differ
+    def add_parser_arguments(cls, add: Callable[..., None],
+                             default_propagation_seconds: int = 60) -> None:
         super().add_parser_arguments(add, default_propagation_seconds=60)
         add('credentials', help='RFC 2136 credentials INI file.')
 
-    def more_info(self):  # pylint: disable=missing-function-docstring
+    def more_info(self) -> str:
         return 'This plugin configures a DNS TXT record to respond to a dns-01 
challenge using ' + \
                'RFC 2136 Dynamic Updates.'
 
-    def _validate_credentials(self, credentials):
+    def _validate_credentials(self, credentials: CredentialsConfiguration) -> 
None:
         server = credentials.conf('server')
         if not is_ipaddress(server):
             raise errors.PluginError("The configured target DNS server ({0}) 
is not a valid IPv4 "
@@ -65,7 +68,7 @@
             if not self.ALGORITHMS.get(algorithm.upper()):
                 raise errors.PluginError("Unknown algorithm: 
{0}.".format(algorithm))
 
-    def _setup_credentials(self):
+    def _setup_credentials(self) -> None:
         self.credentials = self._configure_credentials(
             'credentials',
             'RFC 2136 credentials INI file',
@@ -77,13 +80,13 @@
             self._validate_credentials
         )
 
-    def _perform(self, _domain, validation_name, validation):
+    def _perform(self, _domain: str, validation_name: str, validation: str) -> 
None:
         self._get_rfc2136_client().add_txt_record(validation_name, validation, 
self.ttl)
 
-    def _cleanup(self, _domain, validation_name, validation):
+    def _cleanup(self, _domain: str, validation_name: str, validation: str) -> 
None:
         self._get_rfc2136_client().del_txt_record(validation_name, validation)
 
-    def _get_rfc2136_client(self):
+    def _get_rfc2136_client(self) -> "_RFC2136Client":
         if not self.credentials:  # pragma: no cover
             raise errors.Error("Plugin has not been prepared.")
         return _RFC2136Client(self.credentials.conf('server'),
@@ -98,8 +101,8 @@
     """
     Encapsulates all communication with the target DNS server.
     """
-    def __init__(self, server, port, key_name, key_secret, key_algorithm,
-        timeout=DEFAULT_NETWORK_TIMEOUT):
+    def __init__(self, server: str, port: int, key_name: str, key_secret: str,
+                 key_algorithm: dns.name.Name, timeout: int = 
DEFAULT_NETWORK_TIMEOUT) -> None:
         self.server = server
         self.port = port
         self.keyring = dns.tsigkeyring.from_text({
@@ -108,7 +111,7 @@
         self.algorithm = key_algorithm
         self._default_timeout = timeout
 
-    def add_txt_record(self, record_name, record_content, record_ttl):
+    def add_txt_record(self, record_name: str, record_content: str, 
record_ttl: int) -> None:
         """
         Add a TXT record using the supplied information.
 
@@ -135,7 +138,7 @@
         except Exception as e:
             raise errors.PluginError('Encountered error adding TXT record: {0}'
                                      .format(e))
-        rcode = response.rcode()
+        rcode = response.rcode()  # type: ignore[attr-defined]
 
         if rcode == dns.rcode.NOERROR:
             logger.debug('Successfully added TXT record %s', record_name)
@@ -143,7 +146,7 @@
             raise errors.PluginError('Received response from server: {0}'
                                      .format(dns.rcode.to_text(rcode)))
 
-    def del_txt_record(self, record_name, record_content):
+    def del_txt_record(self, record_name: str, record_content: str) -> None:
         """
         Delete a TXT record using the supplied information.
 
@@ -170,7 +173,7 @@
         except Exception as e:
             raise errors.PluginError('Encountered error deleting TXT record: 
{0}'
                                      .format(e))
-        rcode = response.rcode()
+        rcode = response.rcode()  # type: ignore[attr-defined]
 
         if rcode == dns.rcode.NOERROR:
             logger.debug('Successfully deleted TXT record %s', record_name)
@@ -178,7 +181,7 @@
             raise errors.PluginError('Received response from server: {0}'
                                      .format(dns.rcode.to_text(rcode)))
 
-    def _find_domain(self, record_name):
+    def _find_domain(self, record_name: str) -> str:
         """
         Find the closest domain with an SOA record for a given domain name.
 
@@ -198,7 +201,7 @@
         raise errors.PluginError('Unable to determine base domain for {0} 
using names: {1}.'
                                  .format(record_name, domain_name_guesses))
 
-    def _query_soa(self, domain_name):
+    def _query_soa(self, domain_name: str) -> bool:
         """
         Query a domain name for an authoritative SOA record.
 
@@ -220,11 +223,13 @@
             except (OSError, dns.exception.Timeout) as e:
                 logger.debug('TCP query failed, fallback to UDP: %s', e)
                 response = dns.query.udp(request, self.server, 
self._default_timeout, self.port)
-            rcode = response.rcode()
+            rcode = response.rcode()  # type: ignore[attr-defined]
 
             # Authoritative Answer bit should be set
-            if (rcode == dns.rcode.NOERROR and 
response.get_rrset(response.answer,
-                domain, dns.rdataclass.IN, dns.rdatatype.SOA) and 
response.flags & dns.flags.AA):
+            if (rcode == dns.rcode.NOERROR
+                    and response.get_rrset(response.answer,  # type: 
ignore[attr-defined]
+                                           domain, dns.rdataclass.IN, 
dns.rdatatype.SOA)
+                    and response.flags & dns.flags.AA):
                 logger.debug('Received authoritative SOA response for %s', 
domain_name)
                 return True
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/PKG-INFO 
new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/PKG-INFO
--- old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/PKG-INFO        
2021-12-07 23:03:15.000000000 +0100
+++ new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/PKG-INFO        
2022-04-05 19:42:18.000000000 +0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.1
 Name: certbot-dns-rfc2136
-Version: 1.22.0
+Version: 1.26.0
 Summary: RFC 2136 DNS Authenticator plugin for Certbot
 Home-page: https://github.com/certbot/certbot
 Author: Certbot Project
@@ -14,7 +14,6 @@
 Classifier: Operating System :: POSIX :: Linux
 Classifier: Programming Language :: Python
 Classifier: Programming Language :: Python :: 3
-Classifier: Programming Language :: Python :: 3.6
 Classifier: Programming Language :: Python :: 3.7
 Classifier: Programming Language :: Python :: 3.8
 Classifier: Programming Language :: Python :: 3.9
@@ -25,7 +24,7 @@
 Classifier: Topic :: System :: Networking
 Classifier: Topic :: System :: Systems Administration
 Classifier: Topic :: Utilities
-Requires-Python: >=3.6
+Requires-Python: >=3.7
 Provides-Extra: docs
 License-File: LICENSE.txt
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/SOURCES.txt 
new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/SOURCES.txt
--- old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/SOURCES.txt     
2021-12-07 23:03:15.000000000 +0100
+++ new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/SOURCES.txt     
2022-04-05 19:42:18.000000000 +0200
@@ -1,9 +1,9 @@
 LICENSE.txt
 MANIFEST.in
 README.rst
-setup.cfg
 setup.py
 certbot_dns_rfc2136/__init__.py
+certbot_dns_rfc2136/py.typed
 certbot_dns_rfc2136.egg-info/PKG-INFO
 certbot_dns_rfc2136.egg-info/SOURCES.txt
 certbot_dns_rfc2136.egg-info/dependency_links.txt
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/entry_points.txt 
new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/entry_points.txt
--- 
old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/entry_points.txt    
    2021-12-07 23:03:15.000000000 +0100
+++ 
new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/entry_points.txt    
    2022-04-05 19:42:18.000000000 +0200
@@ -1,3 +1,2 @@
 [certbot.plugins]
 dns-rfc2136 = certbot_dns_rfc2136._internal.dns_rfc2136:Authenticator
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/requires.txt 
new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/requires.txt
--- old/certbot-dns-rfc2136-1.22.0/certbot_dns_rfc2136.egg-info/requires.txt    
2021-12-07 23:03:15.000000000 +0100
+++ new/certbot-dns-rfc2136-1.26.0/certbot_dns_rfc2136.egg-info/requires.txt    
2022-04-05 19:42:18.000000000 +0200
@@ -1,7 +1,7 @@
 dnspython>=1.15.0
-setuptools>=39.0.1
-acme>=1.22.0
-certbot>=1.22.0
+setuptools>=41.6.0
+acme>=1.26.0
+certbot>=1.26.0
 
 [docs]
 Sphinx>=1.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/certbot-dns-rfc2136-1.22.0/setup.cfg 
new/certbot-dns-rfc2136-1.26.0/setup.cfg
--- old/certbot-dns-rfc2136-1.22.0/setup.cfg    2021-12-07 23:03:15.878674300 
+0100
+++ new/certbot-dns-rfc2136-1.26.0/setup.cfg    2022-04-05 19:42:18.795086000 
+0200
@@ -1,6 +1,3 @@
-[bdist_wheel]
-universal = 1
-
 [egg_info]
 tag_build = 
 tag_date = 0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/certbot-dns-rfc2136-1.22.0/setup.py 
new/certbot-dns-rfc2136-1.26.0/setup.py
--- old/certbot-dns-rfc2136-1.22.0/setup.py     2021-12-07 23:02:46.000000000 
+0100
+++ new/certbot-dns-rfc2136-1.26.0/setup.py     2022-04-05 19:41:27.000000000 
+0200
@@ -4,11 +4,11 @@
 from setuptools import find_packages
 from setuptools import setup
 
-version = '1.22.0'
+version = '1.26.0'
 
 install_requires = [
     'dnspython>=1.15.0',
-    'setuptools>=39.0.1',
+    'setuptools>=41.6.0',
 ]
 
 if not os.environ.get('SNAP_BUILD'):
@@ -38,7 +38,7 @@
     author="Certbot Project",
     author_email='[email protected]',
     license='Apache License 2.0',
-    python_requires='>=3.6',
+    python_requires='>=3.7',
     classifiers=[
         'Development Status :: 5 - Production/Stable',
         'Environment :: Plugins',
@@ -47,7 +47,6 @@
         'Operating System :: POSIX :: Linux',
         'Programming Language :: Python',
         'Programming Language :: Python :: 3',
-        'Programming Language :: Python :: 3.6',
         'Programming Language :: Python :: 3.7',
         'Programming Language :: Python :: 3.8',
         'Programming Language :: Python :: 3.9',
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/certbot-dns-rfc2136-1.22.0/tests/dns_rfc2136_test.py 
new/certbot-dns-rfc2136-1.26.0/tests/dns_rfc2136_test.py
--- old/certbot-dns-rfc2136-1.22.0/tests/dns_rfc2136_test.py    2021-12-07 
23:02:45.000000000 +0100
+++ new/certbot-dns-rfc2136-1.26.0/tests/dns_rfc2136_test.py    2022-04-05 
19:41:26.000000000 +0200
@@ -23,6 +23,7 @@
 VALID_CONFIG = {"rfc2136_server": SERVER, "rfc2136_name": NAME, 
"rfc2136_secret": SECRET}
 TIMEOUT = 45
 
+
 class AuthenticatorTest(test_util.TempDirTestCase, 
dns_test_common.BaseAuthenticatorTest):
 
     def setUp(self):
@@ -113,7 +114,7 @@
         self.rfc2136_client.add_txt_record("bar", "baz", 42)
 
         query_mock.assert_called_with(mock.ANY, SERVER, TIMEOUT, PORT)
-        self.assertTrue("bar. 42 IN TXT \"baz\"" in 
str(query_mock.call_args[0][0]))
+        self.assertIn('bar. 42 IN TXT "baz"', str(query_mock.call_args[0][0]))
 
     @mock.patch("dns.query.tcp")
     def test_add_txt_record_wraps_errors(self, query_mock):
@@ -146,7 +147,7 @@
         self.rfc2136_client.del_txt_record("bar", "baz")
 
         query_mock.assert_called_with(mock.ANY, SERVER, TIMEOUT, PORT)
-        self.assertTrue("bar. 0 NONE TXT \"baz\"" in 
str(query_mock.call_args[0][0]))
+        self.assertIn('bar. 0 NONE TXT "baz"', str(query_mock.call_args[0][0]))
 
     @mock.patch("dns.query.tcp")
     def test_del_txt_record_wraps_errors(self, query_mock):

Reply via email to