Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-cryptography for 
openSUSE:Factory checked in at 2023-06-27 23:15:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
 and      /work/SRC/openSUSE:Factory/.python-cryptography.new.15902 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-cryptography"

Tue Jun 27 23:15:52 2023 rev:78 rq:1095411 version:41.0.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes  
2023-04-23 22:44:34.369731455 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-cryptography.new.15902/python-cryptography.changes
       2023-06-27 23:16:04.243181186 +0200
@@ -1,0 +2,32 @@
+Mon Jun 19 20:41:45 UTC 2023 - Dirk Müller <dmuel...@suse.com>
+
+- update to 41.0.1 (bsc#1212568):
+  * Temporarily allow invalid ECDSA signature algorithm
+    parameters in X.509 certificates, which are 
+    generated by older versions of Java.
+  * Allow null bytes in pass phrases when serializing private
+    keys.
+  * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than
+    1.1.1d has been removed.  Users on older version of
+    OpenSSL will need to upgrade.
+  * **BACKWARDS INCOMPATIBLE:** Support for Python 3.6 has been
+    removed.
+  * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL <
+    3.6.
+  * Updated the minimum supported Rust version (MSRV) to 1.56.0,
+    from 1.48.0.
+  * Added support for the
+    :class:`~cryptography.x509.OCSPAcceptableResponses`
+    OCSP extension.
+  * Added support for the
+    :class:`~cryptography.x509.MSCertificateTemplate`
+    proprietary Microsoft certificate extension.
+  * Implemented support for equality checks on all asymmetric
+    public key types.
+  * Added support for ``aes256-...@openssh.com`` encrypted keys
+    in :func:`~cryptography.hazmat.primitives.serialization.load_ssh
+    _private_key`.
+  * Added support for obtaining X.509 certificate signature
+    algorithm parameters (including PSS)
+
+-------------------------------------------------------------------

Old:
----
  cryptography-40.0.2.tar.gz

New:
----
  cryptography-41.0.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.hNjoj3/_old  2023-06-27 23:16:05.463188365 +0200
+++ /var/tmp/diff_new_pack.hNjoj3/_new  2023-06-27 23:16:05.467188389 +0200
@@ -16,8 +16,6 @@
 #
 
 
-%{?!python_module:%define python_module() python3-%{**}}
-%define skip_python2 1
 %global rustflags '-Clink-arg=-Wl,-z,relro,-z,now'
 %global flavor @BUILD_FLAVOR@%{nil}
 %if "%{flavor}" == "test"
@@ -29,7 +27,7 @@
 %endif
 %{?sle15_python_module_pythons}
 Name:           python-cryptography%{psuffix}
-Version:        40.0.2
+Version:        41.0.1
 Release:        0
 Summary:        Python library which exposes cryptographic recipes and 
primitives
 License:        Apache-2.0 OR BSD-3-Clause
@@ -50,12 +48,12 @@
 BuildRequires:  %{python_module exceptiongroup}
 BuildRequires:  %{python_module setuptools-rust}
 BuildRequires:  %{python_module setuptools}
-BuildRequires:  cargo >= 1.41.0
+BuildRequires:  cargo >= 1.56.0
 BuildRequires:  fdupes
 BuildRequires:  libopenssl-devel
 BuildRequires:  pkgconfig
 BuildRequires:  python-rpm-macros
-BuildRequires:  rust >= 1.41.0
+BuildRequires:  rust >= 1.56.0
 BuildRequires:  zstd
 BuildRequires:  pkgconfig(libffi)
 # python-base is not enough, we need the _ssl module
@@ -93,6 +91,8 @@
 rm -v src/rust/Cargo.lock
 
 %build
+# https://github.com/pyca/cryptography/issues/9023
+%global _lto_cflags %{nil}
 export RUSTFLAGS=%{rustflags}
 export CFLAGS="%{optflags} -fno-strict-aliasing"
 %python_build

++++++ _service ++++++
--- /var/tmp/diff_new_pack.hNjoj3/_old  2023-06-27 23:16:05.547188859 +0200
+++ /var/tmp/diff_new_pack.hNjoj3/_new  2023-06-27 23:16:05.555188907 +0200
@@ -1,7 +1,7 @@
 <services>
   <service name="download_files" mode="disabled"/>
   <service name="cargo_vendor" mode="disabled">
-    <param name="srcdir">cryptography-40.0.2/src/rust</param>
+    <param name="srcdir">cryptography-41.0.1/src/rust</param>
     <param name="compression">zst</param>
   </service>
   <service name="cargo_audit" mode="disabled">

++++++ cryptography-40.0.2.tar.gz -> cryptography-41.0.1.tar.gz ++++++
++++ 24447 lines of diff (skipped)

++++++ vendor.tar.zst ++++++
Binary files /var/tmp/diff_new_pack.hNjoj3/_old and 
/var/tmp/diff_new_pack.hNjoj3/_new differ

Reply via email to