Hello community,

here is the log from the commit of package python-pyOpenSSL for 
openSUSE:Factory checked in at 2016-05-23 16:37:43
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-pyOpenSSL (Old)
 and      /work/SRC/openSUSE:Factory/.python-pyOpenSSL.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-pyOpenSSL"

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-pyOpenSSL/python-pyOpenSSL.changes        
2015-07-20 15:13:33.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.python-pyOpenSSL.new/python-pyOpenSSL.changes   
2016-05-23 16:37:44.000000000 +0200
@@ -1,0 +2,60 @@
+Mon May 16 15:29:16 UTC 2016 - [email protected]
+
+- added %check section with testsuite
+- skip-networked-test.patch - mark a test as networked so that we can
+  specify non-network test run
+- rsa128-i586.patch - sidestep a crasher bug on 32bit platforms
+  by generating reasonably-sized RSA keys instead of small 128bit ones
+
+-------------------------------------------------------------------
+Mon May  9 09:54:12 UTC 2016 - [email protected]
+
+- update to 16.0.0
+  Backward-incompatible changes:
+  * Python 3.2 support has been dropped. It never had significant real world
+    usage and has been dropped by our main dependency cryptography. Affected
+    users should upgrade to Python 3.3 or later.
+  Deprecations:
+  * The support for EGD has been removed. The only affected function
+    OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead.
+    Please see pyca/cryptography#1636 for more background information on this
+    decision. In accordance with our backward compatibility policy
+    OpenSSL.rand.egd() will be removed no sooner than a year from the release 
of
+    16.0.0.
+  * Please note that you should use urandom for all your secure random number
+    needs.
+  * Python 2.6 support has been deprecated. Our main dependency cryptography
+    deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually
+    dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does.
+  Changes:
+  * Fixed OpenSSL.SSL.Context.set_session_id, 
OpenSSL.SSL.Connection.renegotiate,
+    OpenSSL.SSL.Connection.renegotiate_pending, and
+    OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation 
since
+    0.14. #422
+  * Fixed segmentation fault when using keys larger than 4096-bit to sign data.
+    #428
+  * Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called
+    before setting any app data. #304
+  * Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects
+    that represent public keys, and OpenSSL.crypto.load_publickey() to load 
such
+    objects from serialized representations. #382
+  * Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out 
to
+    a string buffer. #368
+  * Added OpenSSL.SSL.Connection.get_state_string() using the OpenSSL binding
+    state_string_long. #358
+  * Added support for the socket.MSG_PEEK flag to OpenSSL.SSL.Connection.recv()
+    and OpenSSL.SSL.Connection.recv_into(). #294
+  * Added OpenSSL.SSL.Connection.get_protocol_version() and
+    OpenSSL.SSL.Connection.get_protocol_version_name(). #244
+  * Switched to utf8string mask by default. OpenSSL formerly defaulted to a
+    T61String if there were UTF-8 characters present. This was changed to
+    default to UTF8String in the config around 2005, but the actual code didn’t
+    change it until late last year. This will default us to the setting that
+    actually works. To revert this you can call
+    OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default"). #234
+
+- fixed paths in bug-lp-1265482.diff
+- fixed doc generation 
+- spec clean up
+
+-------------------------------------------------------------------

Old:
----
  pyOpenSSL-0.15.1.tar.gz

New:
----
  pyOpenSSL-16.0.0.tar.gz
  rsa128-i586.patch
  skip-networked-test.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-pyOpenSSL.spec ++++++
--- /var/tmp/diff_new_pack.hiW5jw/_old  2016-05-23 16:37:45.000000000 +0200
+++ /var/tmp/diff_new_pack.hiW5jw/_new  2016-05-23 16:37:45.000000000 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package python-pyOpenSSL
 #
-# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           python-pyOpenSSL
-Version:        0.15.1
+Version:        16.0.0
 Release:        0
 Url:            https://github.com/pyca/pyopenssl
 Summary:        Python wrapper module around the OpenSSL library
@@ -25,12 +25,16 @@
 Group:          Development/Languages/Python
 Source:         
http://pypi.python.org/packages/source/p/pyOpenSSL/pyOpenSSL-%{version}.tar.gz
 Patch0:         bug-lp-1265482.diff
+Patch1:         skip-networked-test.patch
+Patch2:         rsa128-i586.patch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
+BuildRequires:  openssl-devel
 BuildRequires:  python-Sphinx
-BuildRequires:  python-cryptography >= 0.2
+BuildRequires:  python-cryptography >= 1.3.1
 BuildRequires:  python-devel
+BuildRequires:  python-pytest
 BuildRequires:  python-setuptools
-Requires:       python-cryptography >= 0.2
+Requires:       python-cryptography >= 1.3.1
 Provides:       pyOpenSSL = %{version}
 Provides:       python-openssl = %{version}
 Obsoletes:      python-openssl < %{version}
@@ -58,19 +62,26 @@
 
 %prep
 %setup -q -n pyOpenSSL-%{version}
-%patch0
+%patch0 -p1
+%patch1 -p1
+%patch2 -p1
 
 %build
-CFLAGS="%{optflags} -fno-strict-aliasing" python setup.py build
+python setup.py build
 
-python setup.py build_sphinx && rm build/sphinx/html/.buildinfo
+PYTHONPATH="build/lib" python setup.py build_sphinx && rm 
build/sphinx/html/.buildinfo
 
 %install
 python setup.py install --prefix=%{_prefix} --root=%{buildroot}
 
+%check
+export LC_ALL=en_US.UTF-8
+export PYTHONPATH=src
+py.test -m "not network"
+
 %files
 %defattr(0644,root,root,0755)
-%doc LICENSE README.rst TODO
+%doc LICENSE *.rst
 %{python_sitelib}/OpenSSL/
 %{python_sitelib}/pyOpenSSL-%{version}-py*.egg-info/
 

++++++ bug-lp-1265482.diff ++++++
--- /var/tmp/diff_new_pack.hiW5jw/_old  2016-05-23 16:37:45.000000000 +0200
+++ /var/tmp/diff_new_pack.hiW5jw/_new  2016-05-23 16:37:45.000000000 +0200
@@ -1,7 +1,7 @@
 Index: OpenSSL/test/test_crypto.py
 ===================================================================
---- OpenSSL/test/test_crypto.py.orig
-+++ OpenSSL/test/test_crypto.py
+--- OpenSSL/tests/test_crypto.py.orig
++++ OpenSSL/tests/test_crypto.py
 @@ -627,7 +627,7 @@ class PKeyTests(TestCase):
          :py:meth:`PKeyType.generate_key` generates an RSA key when passed
          :py:data:`TYPE_RSA` as a type and a reasonable number of bits.

++++++ pyOpenSSL-0.15.1.tar.gz -> pyOpenSSL-16.0.0.tar.gz ++++++
++++ 32013 lines of diff (skipped)

++++++ rsa128-i586.patch ++++++
Index: pyOpenSSL-16.0.0/tests/test_ssl.py
===================================================================
--- pyOpenSSL-16.0.0.orig/tests/test_ssl.py
+++ pyOpenSSL-16.0.0/tests/test_ssl.py
@@ -549,7 +549,7 @@ class ContextTests(TestCase, _LoopbackMi
         instance.
         """
         key = PKey()
-        key.generate_key(TYPE_RSA, 128)
+        key.generate_key(TYPE_RSA, 2048)
         ctx = Context(TLSv1_METHOD)
         ctx.use_privatekey(key)
         self.assertRaises(TypeError, ctx.use_privatekey, "")
@@ -569,7 +569,7 @@ class ContextTests(TestCase, _LoopbackMi
         arguments does not raise an exception.
         """
         key = PKey()
-        key.generate_key(TYPE_RSA, 128)
+        key.generate_key(TYPE_RSA, 2048)
 
         with open(pemfile, "wt") as pem:
             pem.write(
@@ -920,7 +920,7 @@ class ContextTests(TestCase, _LoopbackMi
         passphrase.  Return the path to the new file.
         """
         key = PKey()
-        key.generate_key(TYPE_RSA, 128)
+        key.generate_key(TYPE_RSA, 2048)
         pemFile = self.mktemp()
         fObj = open(pemFile, 'w')
         pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
++++++ skip-networked-test.patch ++++++
Index: pyOpenSSL-16.0.0/tests/test_ssl.py
===================================================================
--- pyOpenSSL-16.0.0.orig/tests/test_ssl.py
+++ pyOpenSSL-16.0.0/tests/test_ssl.py
@@ -1198,6 +1198,7 @@ class ContextTests(TestCase, _LoopbackMi
         reason="set_default_verify_paths appears not to work on Windows.  "
         "See LP#404343 and LP#404344."
     )
+    @pytest.mark.network
     def test_set_default_verify_paths(self):
         """
         :py:obj:`Context.set_default_verify_paths` causes the

Reply via email to