Hello community,
here is the log from the commit of package python-requests-kerberos for
openSUSE:Factory checked in at 2017-08-23 11:54:32
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-requests-kerberos (Old)
and /work/SRC/openSUSE:Factory/.python-requests-kerberos.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-requests-kerberos"
Wed Aug 23 11:54:32 2017 rev:3 rq:517984 version:0.11.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/python-requests-kerberos/python-requests-kerberos.changes
2016-11-15 18:02:34.000000000 +0100
+++
/work/SRC/openSUSE:Factory/.python-requests-kerberos.new/python-requests-kerberos.changes
2017-08-23 11:54:35.491594865 +0200
@@ -1,0 +2,14 @@
+Mon Aug 21 17:02:14 UTC 2017 - [email protected]
+
+- update to 0.11.0:
+ * add license title
+ * Swap kerberos-sspi with winkerberos.
+ * Add WinKerberos-specific blurb for custom principal.
+ * v0.11.0
+ * Revert "Merge pull request #73 from
rbcarson/windows-principal-workaround-71"
+ * Require at least WinKerberos 0.4.0.
+ * Require at least WinKerberos 0.5.0.
+ * Bring back reverted fixes.
+- convert to singlespec
+
+-------------------------------------------------------------------
Old:
----
requests-kerberos-0.10.0.tar.gz
New:
----
requests-kerberos-0.11.0.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-requests-kerberos.spec ++++++
--- /var/tmp/diff_new_pack.McdcAM/_old 2017-08-23 11:54:36.343474946 +0200
+++ /var/tmp/diff_new_pack.McdcAM/_new 2017-08-23 11:54:36.363472131 +0200
@@ -1,7 +1,7 @@
#
# spec file for package python-requests-kerberos
#
-# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -16,25 +16,25 @@
#
+%{?!python_module:%define python_module() python-%{**} python3-%{**}}
Name: python-requests-kerberos
-Version: 0.10.0
+Version: 0.11.0
Release: 0
Summary: A Kerberos authentication handler for python-requests
License: ISC
Group: Development/Languages/Python
Url: https://github.com/requests/requests-kerberos
Source:
https://pypi.io/packages/source/r/requests-kerberos/requests-kerberos-%{version}.tar.gz
-BuildRequires: python-devel
-BuildRequires: python-requests
-BuildRequires: python-setuptools
+BuildRequires: %{python_module devel}
+BuildRequires: %{python_module requests}
+BuildRequires: %{python_module setuptools}
+BuildRequires: python-rpm-macros
Requires: python-pykerberos >= 1.1.8
Requires: python-requests >= 1.1.0
BuildRoot: %{_tmppath}/%{name}-%{version}-build
-%if 0%{?suse_version} && 0%{?suse_version} <= 1110
-%{!?python_sitelib: %global python_sitelib %(python -c "from
distutils.sysconfig import get_python_lib; print get_python_lib()")}
-%else
BuildArch: noarch
-%endif
+
+%python_subpackages
%description
Requests is an HTTP library, written in Python, for human beings. This library
@@ -45,12 +45,12 @@
%setup -q -n requests-kerberos-%{version}
%build
-python setup.py build
+%python_build
%install
-python setup.py install --prefix=%{_prefix} --root=%{buildroot}
+%python_install
-%files
+%files %{python_files}
%defattr(-,root,root,-)
%doc AUTHORS LICENSE README.rst
%{python_sitelib}/*
++++++ requests-kerberos-0.10.0.tar.gz -> requests-kerberos-0.11.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/requests-kerberos-0.10.0/HISTORY.rst
new/requests-kerberos-0.11.0/HISTORY.rst
--- old/requests-kerberos-0.10.0/HISTORY.rst 2016-05-18 14:20:14.000000000
+0200
+++ new/requests-kerberos-0.11.0/HISTORY.rst 2016-11-02 21:30:09.000000000
+0100
@@ -1,6 +1,12 @@
History
=======
+0.11.0: 2016-11-02
+------------------
+
+- Switch dependency on Windows from kerberos-sspi/pywin32 to WinKerberos.
+ This brings Custom Principal support to Windows users.
+
0.10.0: 2016-05-18
------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/requests-kerberos-0.10.0/LICENSE
new/requests-kerberos-0.11.0/LICENSE
--- old/requests-kerberos-0.10.0/LICENSE 2014-02-15 20:37:58.000000000
+0100
+++ new/requests-kerberos-0.11.0/LICENSE 2016-11-02 21:30:09.000000000
+0100
@@ -1,3 +1,5 @@
+ISC License
+
Copyright (c) 2012 Kenneth Reitz
Permission to use, copy, modify and/or distribute this software for any
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/requests-kerberos-0.10.0/PKG-INFO
new/requests-kerberos-0.11.0/PKG-INFO
--- old/requests-kerberos-0.10.0/PKG-INFO 2016-05-18 14:20:59.000000000
+0200
+++ new/requests-kerberos-0.11.0/PKG-INFO 2016-11-02 21:32:18.000000000
+0100
@@ -1,6 +1,6 @@
Metadata-Version: 1.0
Name: requests-kerberos
-Version: 0.10.0
+Version: 0.11.0
Summary: A Kerberos authentication handler for python-requests
Home-page: https://github.com/requests/requests-kerberos
Author: Ian Cordasco, Cory Benfield, Michael Komitee
@@ -129,7 +129,7 @@
applicable). However, an explicit principal can be specified, which
will
cause Kerberos to look for a matching credential cache for the named
user.
This feature depends on OS support for collection-type credential
caches,
- as well as working principal support in pykerberos (it is broken in
many
+ as well as working principal support in PyKerberos (it is broken in
many
builds). An explicit principal can be specified with the ``principal``
arg:
.. code-block:: python
@@ -139,10 +139,10 @@
>>> kerberos_auth = HTTPKerberosAuth(principal="user@REALM")
>>> r = requests.get("http://example.org", auth=kerberos_auth)
...
-
- **Windows users:** Explicit Principal is currently not supported when
using
- ``kerberos-sspi``. Providing a value for ``principal`` in this
scenario will raise
- ``NotImplementedError``.
+
+ On Windows, WinKerberos is used instead of PyKerberos. WinKerberos
allows the
+ use of arbitrary principals instead of a credential cache. Passwords
can be
+ specified by following the form ``user@realm:password`` for
``principal``.
Logging
-------
@@ -161,6 +161,12 @@
History
=======
+ 0.11.0: 2016-11-02
+ ------------------
+
+ - Switch dependency on Windows from kerberos-sspi/pywin32 to
WinKerberos.
+ This brings Custom Principal support to Windows users.
+
0.10.0: 2016-05-18
------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/requests-kerberos-0.10.0/README.rst
new/requests-kerberos-0.11.0/README.rst
--- old/requests-kerberos-0.10.0/README.rst 2016-05-18 14:16:11.000000000
+0200
+++ new/requests-kerberos-0.11.0/README.rst 2016-11-02 21:30:09.000000000
+0100
@@ -121,7 +121,7 @@
applicable). However, an explicit principal can be specified, which will
cause Kerberos to look for a matching credential cache for the named user.
This feature depends on OS support for collection-type credential caches,
-as well as working principal support in pykerberos (it is broken in many
+as well as working principal support in PyKerberos (it is broken in many
builds). An explicit principal can be specified with the ``principal`` arg:
.. code-block:: python
@@ -131,10 +131,10 @@
>>> kerberos_auth = HTTPKerberosAuth(principal="user@REALM")
>>> r = requests.get("http://example.org", auth=kerberos_auth)
...
-
-**Windows users:** Explicit Principal is currently not supported when using
-``kerberos-sspi``. Providing a value for ``principal`` in this scenario will
raise
-``NotImplementedError``.
+
+On Windows, WinKerberos is used instead of PyKerberos. WinKerberos allows the
+use of arbitrary principals instead of a credential cache. Passwords can be
+specified by following the form ``user@realm:password`` for ``principal``.
Logging
-------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/requests-kerberos-0.10.0/requests_kerberos/__init__.py
new/requests-kerberos-0.11.0/requests_kerberos/__init__.py
--- old/requests-kerberos-0.10.0/requests_kerberos/__init__.py 2016-05-18
14:20:22.000000000 +0200
+++ new/requests-kerberos-0.11.0/requests_kerberos/__init__.py 2016-11-02
21:30:09.000000000 +0100
@@ -22,4 +22,4 @@
__all__ = ('HTTPKerberosAuth', 'MutualAuthenticationError', 'REQUIRED',
'OPTIONAL', 'DISABLED')
-__version__ = '0.10.0'
+__version__ = '0.11.0'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/requests-kerberos-0.10.0/requests_kerberos/kerberos_.py
new/requests-kerberos-0.11.0/requests_kerberos/kerberos_.py
--- old/requests-kerberos-0.10.0/requests_kerberos/kerberos_.py 2016-05-18
14:16:11.000000000 +0200
+++ new/requests-kerberos-0.11.0/requests_kerberos/kerberos_.py 2016-11-02
21:30:09.000000000 +0100
@@ -1,9 +1,7 @@
try:
import kerberos
- using_kerberos_sspi = False
except ImportError:
- import kerberos_sspi as kerberos
- using_kerberos_sspi = True
+ import winkerberos as kerberos
import re
import logging
@@ -97,7 +95,6 @@
self.principal = principal
self.hostname_override = hostname_override
self.sanitize_mutual_error_response = sanitize_mutual_error_response
- self._using_kerberos_sspi = using_kerberos_sspi
def generate_request_header(self, response, host, is_preemptive=False):
"""
@@ -121,16 +118,9 @@
# w/ name-based HTTP hosting)
kerb_host = self.hostname_override if self.hostname_override is
not None else host
kerb_spn = "{0}@{1}".format(self.service, kerb_host)
-
- kwargs = {}
- # kerberos-sspi: Never pass principal. Raise if user tries to
specify one.
- if not self._using_kerberos_sspi:
- kwargs['principal'] = self.principal
- elif self.principal:
- raise NotImplementedError("Can't use 'principal' argument with
kerberos-sspi.")
result, self.context[host] = kerberos.authGSSClientInit(kerb_spn,
- gssflags=gssflags, **kwargs)
+ gssflags=gssflags, principal=self.principal)
if result < 1:
raise EnvironmentError(result, kerb_stage)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/requests-kerberos-0.10.0/requests_kerberos.egg-info/PKG-INFO
new/requests-kerberos-0.11.0/requests_kerberos.egg-info/PKG-INFO
--- old/requests-kerberos-0.10.0/requests_kerberos.egg-info/PKG-INFO
2016-05-18 14:20:59.000000000 +0200
+++ new/requests-kerberos-0.11.0/requests_kerberos.egg-info/PKG-INFO
2016-11-02 21:32:17.000000000 +0100
@@ -1,6 +1,6 @@
Metadata-Version: 1.0
Name: requests-kerberos
-Version: 0.10.0
+Version: 0.11.0
Summary: A Kerberos authentication handler for python-requests
Home-page: https://github.com/requests/requests-kerberos
Author: Ian Cordasco, Cory Benfield, Michael Komitee
@@ -129,7 +129,7 @@
applicable). However, an explicit principal can be specified, which
will
cause Kerberos to look for a matching credential cache for the named
user.
This feature depends on OS support for collection-type credential
caches,
- as well as working principal support in pykerberos (it is broken in
many
+ as well as working principal support in PyKerberos (it is broken in
many
builds). An explicit principal can be specified with the ``principal``
arg:
.. code-block:: python
@@ -139,10 +139,10 @@
>>> kerberos_auth = HTTPKerberosAuth(principal="user@REALM")
>>> r = requests.get("http://example.org", auth=kerberos_auth)
...
-
- **Windows users:** Explicit Principal is currently not supported when
using
- ``kerberos-sspi``. Providing a value for ``principal`` in this
scenario will raise
- ``NotImplementedError``.
+
+ On Windows, WinKerberos is used instead of PyKerberos. WinKerberos
allows the
+ use of arbitrary principals instead of a credential cache. Passwords
can be
+ specified by following the form ``user@realm:password`` for
``principal``.
Logging
-------
@@ -161,6 +161,12 @@
History
=======
+ 0.11.0: 2016-11-02
+ ------------------
+
+ - Switch dependency on Windows from kerberos-sspi/pywin32 to
WinKerberos.
+ This brings Custom Principal support to Windows users.
+
0.10.0: 2016-05-18
------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/requests-kerberos-0.10.0/requests_kerberos.egg-info/requires.txt
new/requests-kerberos-0.11.0/requests_kerberos.egg-info/requires.txt
--- old/requests-kerberos-0.10.0/requests_kerberos.egg-info/requires.txt
2016-05-18 14:20:59.000000000 +0200
+++ new/requests-kerberos-0.11.0/requests_kerberos.egg-info/requires.txt
2016-11-02 21:32:17.000000000 +0100
@@ -4,4 +4,4 @@
pykerberos>=1.1.8,<2.0.0
[:sys_platform=="win32"]
-kerberos-sspi>=0.2
+winkerberos>=0.5.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/requests-kerberos-0.10.0/requirements.txt
new/requests-kerberos-0.11.0/requirements.txt
--- old/requests-kerberos-0.10.0/requirements.txt 2016-01-07
19:08:46.000000000 +0100
+++ new/requests-kerberos-0.11.0/requirements.txt 2016-11-02
21:30:09.000000000 +0100
@@ -1,3 +1,3 @@
requests>=1.1.0
-kerberos-sspi >= 0.2; sys.platform == 'win32'
+winkerberos >= 0.5.0; sys.platform == 'win32'
pykerberos >= 1.1.8, < 2.0.0; sys.platform != 'win32'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/requests-kerberos-0.10.0/setup.py
new/requests-kerberos-0.11.0/setup.py
--- old/requests-kerberos-0.10.0/setup.py 2016-01-07 19:08:46.000000000
+0100
+++ new/requests-kerberos-0.11.0/setup.py 2016-11-02 21:30:09.000000000
+0100
@@ -51,7 +51,7 @@
'requests>=1.1.0',
],
extras_require={
- ':sys_platform=="win32"': ['kerberos-sspi>=0.2'],
+ ':sys_platform=="win32"': ['winkerberos>=0.5.0'],
':sys_platform!="win32"': ['pykerberos>=1.1.8,<2.0.0'],
},
test_suite='test_requests_kerberos',