Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-cryptography for
openSUSE:Factory checked in at 2023-03-29 23:26:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
and /work/SRC/openSUSE:Factory/.python-cryptography.new.31432 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography"
Wed Mar 29 23:26:11 2023 rev:74 rq:1074512 version:40.0.1
Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes
2023-03-15 18:52:58.987896825 +0100
+++
/work/SRC/openSUSE:Factory/.python-cryptography.new.31432/python-cryptography.changes
2023-03-29 23:26:17.659201031 +0200
@@ -1,0 +2,48 @@
+Sun Mar 26 19:56:32 UTC 2023 - Dirk Müller <[email protected]>
+
+- update to 40.0.1:
+ * Support for Python 3.6 is deprecated and will be removed in
+ the next release.
+ * Deprecated the current minimum supported Rust version (MSRV)
+ of 1.48.0. In the next release we will raise MSRV to 1.56.0.
+ Users with the latest ``pip`` will typically get a wheel
+ and not need Rust installed
+ * Deprecated support for OpenSSL less than 1.1.1d. The next
+ release of ``cryptography`` will drop support for older versions.
+ * Deprecated support for DSA keys in
+ :func:`~cryptography.hazmat.primitives.serialization.load_s
+ sh_public_key`
+ and
+ :func:`~cryptography.hazmat.primitives.serialization.load_s
+ sh_private_key`.
+ * Deprecated support for OpenSSH serialization in
+ :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
+ ublicKey`
+ and
+ :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
+ rivateKey`.
+ * Added support for parsing SSH certificates in addition to
+ public keys with
+ :func:`~cryptography.hazmat.primitives.serialization.load_s
+ sh_public_identity`.
+ :func:`~cryptography.hazmat.primitives.serialization.load_s
+ sh_public_key` continues to support only public keys.
+ * Added support for generating SSH certificates with
+ :class:`~cryptography.hazmat.primitives.serialization.SSHCe
+ rtificateBuilder`.
+ * Added :meth:`~cryptography.x509.Certificate.verify_directly_i
+ ssued_by` to
+ :class:`~cryptography.x509.Certificate`.
+ * Added a check to :class:`~cryptography.x509.NameConstraints`
+ to ensure that :class:`~cryptography.x509.DNSName` constraints
+ do not contain any ``*`` wildcards.
+ * Removed many unused CFFI OpenSSL bindings. This will not
+ impact you unless you are using ``cryptography`` to directly
+ invoke OpenSSL's C API. Note that
+ these have never been considered a stable, supported,
+ public API by ``cryptography``, this note is included as a courtesy.
+ * The X.509 builder classes now raise ``UnsupportedAlgorithm``
+ instead of ``ValueError`` if an unsupported hash algorithm is passed.
+ * Added public union type aliases for type hinting
+
+-------------------------------------------------------------------
Old:
----
cryptography-39.0.2.tar.gz
New:
----
cryptography-40.0.1.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.5lyPrh/_old 2023-03-29 23:26:19.391209168 +0200
+++ /var/tmp/diff_new_pack.5lyPrh/_new 2023-03-29 23:26:19.395209186 +0200
@@ -28,7 +28,7 @@
%bcond_with test
%endif
Name: python-cryptography%{psuffix}
-Version: 39.0.2
+Version: 40.0.1
Release: 0
Summary: Python library which exposes cryptographic recipes and
primitives
License: Apache-2.0 OR BSD-3-Clause
++++++ _service ++++++
--- /var/tmp/diff_new_pack.5lyPrh/_old 2023-03-29 23:26:19.435209374 +0200
+++ /var/tmp/diff_new_pack.5lyPrh/_new 2023-03-29 23:26:19.439209394 +0200
@@ -1,7 +1,7 @@
<services>
<service name="download_files" mode="disabled"/>
<service name="cargo_vendor" mode="disabled">
- <param name="srcdir">cryptography-39.0.0/src/rust</param>
+ <param name="srcdir">cryptography-40.0.1/src/rust</param>
<param name="compression">zst</param>
</service>
<service name="cargo_audit" mode="disabled">
++++++ cryptography-39.0.2.tar.gz -> cryptography-40.0.1.tar.gz ++++++
++++ 20048 lines of diff (skipped)
++++++ skip_openssl_memleak_test.patch ++++++
--- /var/tmp/diff_new_pack.5lyPrh/_old 2023-03-29 23:26:19.687210558 +0200
+++ /var/tmp/diff_new_pack.5lyPrh/_new 2023-03-29 23:26:19.687210558 +0200
@@ -2,20 +2,25 @@
tests/hazmat/backends/test_openssl_memleak.py | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
---- a/tests/hazmat/backends/test_openssl_memleak.py
-+++ b/tests/hazmat/backends/test_openssl_memleak.py
-@@ -174,10 +174,9 @@ def assert_no_memory_leaks(s, argv=[]):
+Index: cryptography-40.0.1/tests/hazmat/backends/test_openssl_memleak.py
+===================================================================
+--- cryptography-40.0.1.orig/tests/hazmat/backends/test_openssl_memleak.py
++++ cryptography-40.0.1/tests/hazmat/backends/test_openssl_memleak.py
+@@ -204,12 +204,10 @@ def assert_no_memory_leaks(s, argv=[]):
def skip_if_memtesting_not_supported():
- return pytest.mark.skipif(
-- not Binding().lib.Cryptography_HAS_MEM_FUNCTIONS,
-- reason="Requires OpenSSL memory functions (>=1.1.0)",
+- not Binding().lib.Cryptography_HAS_MEM_FUNCTIONS
+- or platform.python_implementation() == "PyPy",
+- reason="Requires OpenSSL memory functions (>=1.1.0) and not PyPy",
- )
+-
+ return pytest.mark.skip(
+ reason="Our FIPS openssl startup code invokes CRYPTO_malloc() which
prevents later debugging via CRYPTO_set_mem_functions()"
+ )
-
++
@pytest.mark.skip_fips(reason="FIPS self-test sets allow_customize = 0")
+ @skip_if_memtesting_not_supported()
++++++ vendor.tar.zst ++++++
Binary files /var/tmp/diff_new_pack.5lyPrh/_old and
/var/tmp/diff_new_pack.5lyPrh/_new differ