Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package python-cryptography for openSUSE:Factory checked in at 2025-02-06 22:01:51 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old) and /work/SRC/openSUSE:Factory/.python-cryptography.new.2316 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography" Thu Feb 6 22:01:51 2025 rev:98 rq:1242838 version:44.0.0 Changes: -------- --- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes 2024-11-09 20:57:34.092416773 +0100 +++ /work/SRC/openSUSE:Factory/.python-cryptography.new.2316/python-cryptography.changes 2025-02-06 22:01:53.185388354 +0100 @@ -1,0 +2,28 @@ +Sun Jan 26 10:59:13 UTC 2025 - Soc Virnyl Estela <uncomfyhaloma...@opensuse.org> + +- Update to version 44.0.0: + * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.9. + * Deprecated Python 3.7 support. Python 3.7 is no longer supported by + the Python core team. Support for Python 3.7 will be removed in a future + cryptography release. + * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.0. + * macOS wheels are now built against the macOS 10.13 SDK. Users on older + versions of macOS should upgrade, or they will need to build cryptography + themselves. + * Enforce the RFC 5280 requirement that extended key usage extensions must not be empty. + * Added support for timestamp extraction to the :class:`~cryptography.fernet.MultiFernet` class. + * Relax the Authority Key Identifier requirements on root CA certificates + during X.509 verification to allow fields permitted by RFC 5280 but + forbidden by the CA/Browser BRs. + * Added support for + :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using + OpenSSL 3.2.0+. + * Added support for the :class:`~cryptography.x509.Admissions` certificate extension. + * Added basic support for PKCS7 decryption (including S/MIME 3.2) via + :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`, + :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`, + and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`. +- Update specfile to accommodate new project structure at version 44.0.0 +- Update no-pytest_benchmark.patch + +------------------------------------------------------------------- Old: ---- cryptography-43.0.3.tar.gz New: ---- cryptography-44.0.0.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-cryptography.spec ++++++ --- /var/tmp/diff_new_pack.0fNivm/_old 2025-02-06 22:01:54.709450917 +0100 +++ /var/tmp/diff_new_pack.0fNivm/_new 2025-02-06 22:01:54.713451081 +0100 @@ -1,7 +1,7 @@ # # spec file for package python-cryptography # -# Copyright (c) 2024 SUSE LLC +# Copyright (c) 2025 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -28,7 +28,7 @@ %{?sle15_python_module_pythons} Name: python-cryptography%{psuffix} # ALWAYS KEEP IN SYNC WITH python-cryptography-vectors! -Version: 43.0.3 +Version: 44.0.0 Release: 0 Summary: Python library which exposes cryptographic recipes and primitives License: Apache-2.0 OR BSD-3-Clause @@ -93,13 +93,6 @@ export CARGO_PROFILE_RELEASE_SPLIT_DEBUGINFO=off # https://pyo3.rs/main/building-and-distribution#configuring-the-python-version %python_expand export PYO3_PYTHON="%{_bindir}/$python" -cd src/rust -tar xfv %{S:2} -rm -v Cargo.lock -%cargo_build -cd - - -# https://github.com/pyca/cryptography/issues/9023 %global _lto_cflags %{nil} export RUSTFLAGS=%{rustflags} export CFLAGS="%{optflags} -fno-strict-aliasing" @@ -122,6 +115,7 @@ # fails with OverflowError on 32bit platform %ifarch %ix86 %arm ppc rm -v tests/hazmat/primitives/test_aead.py +rm -v tests/hazmat/primitives/test_ciphers.py # imports test_aead so we need to remove also these rm -v tests/wycheproof/test_aes.py rm -v tests/wycheproof/test_chacha20poly1305.py @@ -134,6 +128,7 @@ %license LICENSE LICENSE.APACHE LICENSE.BSD %doc CONTRIBUTING.rst CHANGELOG.rst README.rst %{python_sitearch}/cryptography +%{python_sitearch}/rust %{python_sitearch}/cryptography-%{version}.dist-info %endif ++++++ _service ++++++ --- /var/tmp/diff_new_pack.0fNivm/_old 2025-02-06 22:01:54.801454693 +0100 +++ /var/tmp/diff_new_pack.0fNivm/_new 2025-02-06 22:01:54.805454858 +0100 @@ -2,7 +2,6 @@ <service name="download_files" mode="manual"/> <service name="cargo_vendor" mode="manual"> <param name="srcdir">cryptography-*</param> - <param name="cargotoml">src/rust/Cargo.toml</param> <param name="compression">zst</param> </service> </services> ++++++ cryptography-43.0.3.tar.gz -> cryptography-44.0.0.tar.gz ++++++ ++++ 14430 lines of diff (skipped) ++++++ no-pytest_benchmark.patch ++++++ --- /var/tmp/diff_new_pack.0fNivm/_old 2025-02-06 22:01:55.105467173 +0100 +++ /var/tmp/diff_new_pack.0fNivm/_new 2025-02-06 22:01:55.109467337 +0100 @@ -1,26 +1,16 @@ ---- - pyproject.toml | 31 ------------------------- - tests/bench/test_aead.py | 40 ++++++++++++++++----------------- - tests/bench/test_ec_load.py | 8 +++--- - tests/bench/test_hashes.py | 4 +-- - tests/bench/test_hmac.py | 4 +-- - tests/bench/test_x509.py | 16 ++++++------- - 7 files changed, 37 insertions(+), 68 deletions(-) - -Index: cryptography-43.0.3/pyproject.toml -=================================================================== ---- cryptography-43.0.3.orig/pyproject.toml -+++ cryptography-43.0.3/pyproject.toml -@@ -66,8 +66,6 @@ nox = ["nox"] +diff -ruN cryptography-44.0.0.orig/pyproject.toml cryptography-44.0.0/pyproject.toml +--- cryptography-44.0.0.orig/pyproject.toml 2025-01-26 18:48:58.157318687 +0800 ++++ cryptography-44.0.0/pyproject.toml 2025-01-26 18:56:46.010819868 +0800 +@@ -67,8 +67,6 @@ test = [ - "cryptography_vectors==43.0.3", - "pytest >=6.2.0", -- "pytest-benchmark", -- "pytest-cov", - "pytest-xdist", - "pretend", - "certifi", -@@ -117,7 +115,7 @@ exclude = [ + "cryptography_vectors==44.0.0", + "pytest >=7.4.0", +- "pytest-benchmark >=4.0", +- "pytest-cov >=2.10.1", + "pytest-xdist >=3.5.0", + "pretend >=0.7", + "certifi >=2024", +@@ -118,7 +116,7 @@ ] [tool.pytest.ini_options] @@ -29,7 +19,7 @@ console_output_style = "progress-even-when-capture-no" markers = [ "skip_fips: this test is not executed in FIPS mode", -@@ -139,33 +137,6 @@ module = [ +@@ -140,33 +138,6 @@ ] ignore_missing_imports = true @@ -43,14 +33,14 @@ - -[tool.coverage.paths] -source = [ -- "src/cryptography", -- "*.nox/*/lib*/python*/site-packages/cryptography", -- "*.nox\\*\\Lib\\site-packages\\cryptography", -- "*.nox/pypy/site-packages/cryptography", +- "src/cryptography", +- "*.nox/*/lib*/python*/site-packages/cryptography", +- "*.nox\\*\\Lib\\site-packages\\cryptography", +- "*.nox/pypy/site-packages/cryptography", -] --tests =[ -- "tests/", -- "*tests\\", +-tests = [ +- "tests/", +- "*tests\\", -] - -[tool.coverage.report] @@ -63,11 +53,10 @@ [tool.ruff] line-length = 79 -Index: cryptography-43.0.3/tests/bench/test_aead.py -=================================================================== ---- cryptography-43.0.3.orig/tests/bench/test_aead.py -+++ cryptography-43.0.3/tests/bench/test_aead.py -@@ -26,84 +26,84 @@ def _aead_supported(cls): +diff -ruN cryptography-44.0.0.orig/tests/bench/test_aead.py cryptography-44.0.0/tests/bench/test_aead.py +--- cryptography-44.0.0.orig/tests/bench/test_aead.py 2025-01-26 18:48:58.218037106 +0800 ++++ cryptography-44.0.0/tests/bench/test_aead.py 2025-01-26 18:57:45.747649958 +0800 +@@ -26,84 +26,84 @@ not _aead_supported(ChaCha20Poly1305), reason="Requires OpenSSL with ChaCha20Poly1305 support", ) @@ -172,10 +161,9 @@ ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None) - benchmark(aes.decrypt, b"\x00" * 12, ct, None) + aes.decrypt(b"\x00" * 12, ct, None) -Index: cryptography-43.0.3/tests/bench/test_ec_load.py -=================================================================== ---- cryptography-43.0.3.orig/tests/bench/test_ec_load.py -+++ cryptography-43.0.3/tests/bench/test_ec_load.py +diff -ruN cryptography-44.0.0.orig/tests/bench/test_ec_load.py cryptography-44.0.0/tests/bench/test_ec_load.py +--- cryptography-44.0.0.orig/tests/bench/test_ec_load.py 2025-01-26 18:48:58.218037106 +0800 ++++ cryptography-44.0.0/tests/bench/test_ec_load.py 2025-01-26 18:57:45.748641371 +0800 @@ -5,9 +5,9 @@ from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1 @@ -190,10 +178,9 @@ - benchmark(EC_KEY_SECP256R1.private_key) +def test_load_ec_private_numbers(): + EC_KEY_SECP256R1.private_key() -Index: cryptography-43.0.3/tests/bench/test_hashes.py -=================================================================== ---- cryptography-43.0.3.orig/tests/bench/test_hashes.py -+++ cryptography-43.0.3/tests/bench/test_hashes.py +diff -ruN cryptography-44.0.0.orig/tests/bench/test_hashes.py cryptography-44.0.0/tests/bench/test_hashes.py +--- cryptography-44.0.0.orig/tests/bench/test_hashes.py 2025-01-26 18:48:58.218037106 +0800 ++++ cryptography-44.0.0/tests/bench/test_hashes.py 2025-01-26 18:57:45.748943321 +0800 @@ -5,10 +5,10 @@ from cryptography.hazmat.primitives import hashes @@ -207,10 +194,9 @@ - benchmark(bench) + bench() -Index: cryptography-43.0.3/tests/bench/test_hmac.py -=================================================================== ---- cryptography-43.0.3.orig/tests/bench/test_hmac.py -+++ cryptography-43.0.3/tests/bench/test_hmac.py +diff -ruN cryptography-44.0.0.orig/tests/bench/test_hmac.py cryptography-44.0.0/tests/bench/test_hmac.py +--- cryptography-44.0.0.orig/tests/bench/test_hmac.py 2025-01-26 18:48:58.218037106 +0800 ++++ cryptography-44.0.0/tests/bench/test_hmac.py 2025-01-26 18:57:45.749219559 +0800 @@ -5,10 +5,10 @@ from cryptography.hazmat.primitives import hashes, hmac @@ -224,11 +210,10 @@ - benchmark(bench) + bench() -Index: cryptography-43.0.3/tests/bench/test_x509.py -=================================================================== ---- cryptography-43.0.3.orig/tests/bench/test_x509.py -+++ cryptography-43.0.3/tests/bench/test_x509.py -@@ -13,40 +13,40 @@ from cryptography import x509 +diff -ruN cryptography-44.0.0.orig/tests/bench/test_x509.py cryptography-44.0.0/tests/bench/test_x509.py +--- cryptography-44.0.0.orig/tests/bench/test_x509.py 2025-01-26 18:48:58.218037106 +0800 ++++ cryptography-44.0.0/tests/bench/test_x509.py 2025-01-26 18:57:45.749471922 +0800 +@@ -13,40 +13,40 @@ from ..utils import load_vectors_from_file @@ -278,7 +263,7 @@ limbo_root = pytestconfig.getoption("--x509-limbo-root", skip=True) with open(os.path.join(limbo_root, "limbo.json"), "rb") as f: [testcase] = [ -@@ -78,4 +78,4 @@ def test_verify_docs_python_org(benchmar +@@ -78,4 +78,4 @@ ) verifier.verify(leaf, intermediates) ++++++ vendor.tar.zst ++++++ ++++ 980453 lines of diff (skipped)