Hello community, here is the log from the commit of package python-pyOpenSSL for openSUSE:Factory checked in at 2016-05-23 16:37:43 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-pyOpenSSL (Old) and /work/SRC/openSUSE:Factory/.python-pyOpenSSL.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-pyOpenSSL" Changes: -------- --- /work/SRC/openSUSE:Factory/python-pyOpenSSL/python-pyOpenSSL.changes 2015-07-20 15:13:33.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.python-pyOpenSSL.new/python-pyOpenSSL.changes 2016-05-23 16:37:44.000000000 +0200 @@ -1,0 +2,60 @@ +Mon May 16 15:29:16 UTC 2016 - [email protected] + +- added %check section with testsuite +- skip-networked-test.patch - mark a test as networked so that we can + specify non-network test run +- rsa128-i586.patch - sidestep a crasher bug on 32bit platforms + by generating reasonably-sized RSA keys instead of small 128bit ones + +------------------------------------------------------------------- +Mon May 9 09:54:12 UTC 2016 - [email protected] + +- update to 16.0.0 + Backward-incompatible changes: + * Python 3.2 support has been dropped. It never had significant real world + usage and has been dropped by our main dependency cryptography. Affected + users should upgrade to Python 3.3 or later. + Deprecations: + * The support for EGD has been removed. The only affected function + OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead. + Please see pyca/cryptography#1636 for more background information on this + decision. In accordance with our backward compatibility policy + OpenSSL.rand.egd() will be removed no sooner than a year from the release of + 16.0.0. + * Please note that you should use urandom for all your secure random number + needs. + * Python 2.6 support has been deprecated. Our main dependency cryptography + deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually + dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does. + Changes: + * Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate, + OpenSSL.SSL.Connection.renegotiate_pending, and + OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since + 0.14. #422 + * Fixed segmentation fault when using keys larger than 4096-bit to sign data. + #428 + * Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called + before setting any app data. #304 + * Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects + that represent public keys, and OpenSSL.crypto.load_publickey() to load such + objects from serialized representations. #382 + * Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to + a string buffer. #368 + * Added OpenSSL.SSL.Connection.get_state_string() using the OpenSSL binding + state_string_long. #358 + * Added support for the socket.MSG_PEEK flag to OpenSSL.SSL.Connection.recv() + and OpenSSL.SSL.Connection.recv_into(). #294 + * Added OpenSSL.SSL.Connection.get_protocol_version() and + OpenSSL.SSL.Connection.get_protocol_version_name(). #244 + * Switched to utf8string mask by default. OpenSSL formerly defaulted to a + T61String if there were UTF-8 characters present. This was changed to + default to UTF8String in the config around 2005, but the actual code didn’t + change it until late last year. This will default us to the setting that + actually works. To revert this you can call + OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default"). #234 + +- fixed paths in bug-lp-1265482.diff +- fixed doc generation +- spec clean up + +------------------------------------------------------------------- Old: ---- pyOpenSSL-0.15.1.tar.gz New: ---- pyOpenSSL-16.0.0.tar.gz rsa128-i586.patch skip-networked-test.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-pyOpenSSL.spec ++++++ --- /var/tmp/diff_new_pack.hiW5jw/_old 2016-05-23 16:37:45.000000000 +0200 +++ /var/tmp/diff_new_pack.hiW5jw/_new 2016-05-23 16:37:45.000000000 +0200 @@ -1,7 +1,7 @@ # # spec file for package python-pyOpenSSL # -# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: python-pyOpenSSL -Version: 0.15.1 +Version: 16.0.0 Release: 0 Url: https://github.com/pyca/pyopenssl Summary: Python wrapper module around the OpenSSL library @@ -25,12 +25,16 @@ Group: Development/Languages/Python Source: http://pypi.python.org/packages/source/p/pyOpenSSL/pyOpenSSL-%{version}.tar.gz Patch0: bug-lp-1265482.diff +Patch1: skip-networked-test.patch +Patch2: rsa128-i586.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build +BuildRequires: openssl-devel BuildRequires: python-Sphinx -BuildRequires: python-cryptography >= 0.2 +BuildRequires: python-cryptography >= 1.3.1 BuildRequires: python-devel +BuildRequires: python-pytest BuildRequires: python-setuptools -Requires: python-cryptography >= 0.2 +Requires: python-cryptography >= 1.3.1 Provides: pyOpenSSL = %{version} Provides: python-openssl = %{version} Obsoletes: python-openssl < %{version} @@ -58,19 +62,26 @@ %prep %setup -q -n pyOpenSSL-%{version} -%patch0 +%patch0 -p1 +%patch1 -p1 +%patch2 -p1 %build -CFLAGS="%{optflags} -fno-strict-aliasing" python setup.py build +python setup.py build -python setup.py build_sphinx && rm build/sphinx/html/.buildinfo +PYTHONPATH="build/lib" python setup.py build_sphinx && rm build/sphinx/html/.buildinfo %install python setup.py install --prefix=%{_prefix} --root=%{buildroot} +%check +export LC_ALL=en_US.UTF-8 +export PYTHONPATH=src +py.test -m "not network" + %files %defattr(0644,root,root,0755) -%doc LICENSE README.rst TODO +%doc LICENSE *.rst %{python_sitelib}/OpenSSL/ %{python_sitelib}/pyOpenSSL-%{version}-py*.egg-info/ ++++++ bug-lp-1265482.diff ++++++ --- /var/tmp/diff_new_pack.hiW5jw/_old 2016-05-23 16:37:45.000000000 +0200 +++ /var/tmp/diff_new_pack.hiW5jw/_new 2016-05-23 16:37:45.000000000 +0200 @@ -1,7 +1,7 @@ Index: OpenSSL/test/test_crypto.py =================================================================== ---- OpenSSL/test/test_crypto.py.orig -+++ OpenSSL/test/test_crypto.py +--- OpenSSL/tests/test_crypto.py.orig ++++ OpenSSL/tests/test_crypto.py @@ -627,7 +627,7 @@ class PKeyTests(TestCase): :py:meth:`PKeyType.generate_key` generates an RSA key when passed :py:data:`TYPE_RSA` as a type and a reasonable number of bits. ++++++ pyOpenSSL-0.15.1.tar.gz -> pyOpenSSL-16.0.0.tar.gz ++++++ ++++ 32013 lines of diff (skipped) ++++++ rsa128-i586.patch ++++++ Index: pyOpenSSL-16.0.0/tests/test_ssl.py =================================================================== --- pyOpenSSL-16.0.0.orig/tests/test_ssl.py +++ pyOpenSSL-16.0.0/tests/test_ssl.py @@ -549,7 +549,7 @@ class ContextTests(TestCase, _LoopbackMi instance. """ key = PKey() - key.generate_key(TYPE_RSA, 128) + key.generate_key(TYPE_RSA, 2048) ctx = Context(TLSv1_METHOD) ctx.use_privatekey(key) self.assertRaises(TypeError, ctx.use_privatekey, "") @@ -569,7 +569,7 @@ class ContextTests(TestCase, _LoopbackMi arguments does not raise an exception. """ key = PKey() - key.generate_key(TYPE_RSA, 128) + key.generate_key(TYPE_RSA, 2048) with open(pemfile, "wt") as pem: pem.write( @@ -920,7 +920,7 @@ class ContextTests(TestCase, _LoopbackMi passphrase. Return the path to the new file. """ key = PKey() - key.generate_key(TYPE_RSA, 128) + key.generate_key(TYPE_RSA, 2048) pemFile = self.mktemp() fObj = open(pemFile, 'w') pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase) ++++++ skip-networked-test.patch ++++++ Index: pyOpenSSL-16.0.0/tests/test_ssl.py =================================================================== --- pyOpenSSL-16.0.0.orig/tests/test_ssl.py +++ pyOpenSSL-16.0.0/tests/test_ssl.py @@ -1198,6 +1198,7 @@ class ContextTests(TestCase, _LoopbackMi reason="set_default_verify_paths appears not to work on Windows. " "See LP#404343 and LP#404344." ) + @pytest.mark.network def test_set_default_verify_paths(self): """ :py:obj:`Context.set_default_verify_paths` causes the
