Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-cryptography for 
openSUSE:Factory checked in at 2026-04-28 11:53:40
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
 and      /work/SRC/openSUSE:Factory/.python-cryptography.new.11940 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-cryptography"

Tue Apr 28 11:53:40 2026 rev:111 rq:1349381 version:47.0.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes  
2026-04-11 22:23:29.873315402 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-cryptography.new.11940/python-cryptography.changes
       2026-04-28 11:54:02.303692832 +0200
@@ -1,0 +2,138 @@
+Sun Apr 26 11:02:19 UTC 2026 - Dirk Müller <[email protected]>
+
+- update to 47.0.0:
+  * Support for Python 3.8 is deprecated and will be removed in
+    the next cryptography release.
+  * BACKWARDS INCOMPATIBLE: Support for binary elliptic curves
+    (SECT* classes) has been removed. These curves are rarely
+    used and have additional security considerations that make
+    them undesirable.
+  * BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.1.x has been
+    removed. OpenSSL 3.0.0 or later is now required. LibreSSL,
+    BoringSSL, and AWS-LC continue to be supported.
+  * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 4.1.
+  * BACKWARDS INCOMPATIBLE: Loading keys with unsupported
+    algorithms or keys with unsupported explicit curve encodings
+    now raises
+    :class:`~cryptography.exceptions.UnsupportedAlgorithm`
+    instead of ValueError. This change affects :func:`~cryptograp
+    hy.hazmat.primitives.serialization.load_pem_private_key`, :fu
+    nc:`~cryptography.hazmat.primitives.serialization.load_der_pr
+    ivate_key`, :func:`~cryptography.hazmat.primitives.serializat
+    ion.load_pem_public_key`, :func:`~cryptography.hazmat.primiti
+    ves.serialization.load_der_public_key`, and
+    :meth:`~cryptography.x509.Certificate.public_key` when called
+    on certificates with unsupported public key algorithms.
+  * BACKWARDS INCOMPATIBLE: When parsing elliptic curve private
+    keys, we now reject keys that incorrectly encode a private
+    key of the wrong length because such keys are impossible to
+    process in a constant-time manner. We do not believe keys
+    with this problem are in wide use, however we may revert this
+    change based on the feedback we receive.
+  * Deprecated passing 64-bit (8-byte) and 128-bit (16-byte) keys
+    to :class:`~cryptography.hazmat.decrepit.ciphers.algorithms.T
+    ripleDES`. In a future release, only 192-bit (24-byte) keys
+    will be accepted. Users should expand shorter keys themselves
+    (e.g., for single DES: key + key + key, for two-key: key +
+    key[:8]).
+  * Updated the minimum supported Rust version (MSRV) to 1.83.0,
+    from 1.74.0.
+  * Support for x86_64 macOS (including publishing wheels) is
+    deprecated and will be removed in the next release. We will
+    switch to publishing an arm64 only wheel for macOS.
+  * Support for 32-bit Windows (including publishing wheels) is
+    deprecated and will be removed in the next release. Users
+    should move to a 64-bit Python installation.
+  * public_bytes and private_bytes methods on keys now raise
+    TypeError (instead of ValueError) if an invalid encoding is
+    provided for the given format.
+  * Moved
+    :class:`~cryptography.hazmat.decrepit.ciphers.modes.CFB`,
+    :class:`~cryptography.hazmat.decrepit.ciphers.modes.OFB`, and
+    :class:`~cryptography.hazmat.decrepit.ciphers.modes.CFB8`
+    into :doc:`/hazmat/decrepit/index` and deprecated them in the
+    modes module. They will be removed from the modes module in
+    49.0.0.
+  * Moved :class:`~cryptography.hazmat.primitives.ciphers.algorit
+    hms.Camellia` into  :doc:`/hazmat/decrepit/index` and
+    deprecated it in the cipher module. It will be removed from
+    the cipher module in 49.0.0.
+  * Added
+    :meth:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF.extract`
+    to :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF`.
+    The previous private implementation will be removed in
+    49.0.0.
+  * Added support for loading elliptic curve keys that contain
+    explicit encodings of the curves secp256r1, secp384r1, and
+    secp521r1.
+  * Added support for
+    :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2d`
+    and
+    :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2i`
+    when using OpenSSL 3.2.0+.
+  * Added derive_into methods to
+    :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF`,
+    :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDFExpand`,
+    :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatK
+    DFHash`, :class:`~cryptography.hazmat.primitives.kdf.concatkd
+    f.ConcatKDFHMAC`,
+    :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id`,
+    :class:`~cryptography.hazmat.primitives.kdf.pbkdf2.PBKDF2HMAC
+    `,
+    :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC`,
+    :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC`,
+    :class:`~cryptography.hazmat.primitives.kdf.scrypt.Scrypt`,
+    and
+    :class:`~cryptography.hazmat.primitives.kdf.x963kdf.X963KDF`
+    to allow deriving keys directly into pre-allocated buffers.
+  * Added encrypt_into and decrypt_into methods to
+    :class:`~cryptography.hazmat.primitives.ciphers.aead.AESCCM`,
+    :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM`,
+    :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCMSI
+    V`, :class:`~cryptography.hazmat.primitives.ciphers.aead.AESO
+    CB3`,
+    :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV`,
+    and :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaC
+    ha20Poly1305` to allow encrypting directly into a pre-
+    allocated buffer.
+  * Added support for PKCS1v15 signing without DigestInfo using :
+    class:`~cryptography.hazmat.primitives.asymmetric.utils.NoDig
+    estInfo`.
+  * Added
+    :meth:`~cryptography.hazmat.primitives.hashes.Hash.hash`, a
+    one-shot method for computing hashes.
+  * Added :doc:`/hazmat/primitives/hpke` support implementing RFC
+    9180 for hybrid authenticated encryption.
+  * Added new :doc:`/hazmat/primitives/asymmetric/mlkem` module
+    with support for ML-KEM key encapsulation with AWS-LC and
+    BoringSSL. Note: Post-quantum algorithm support requires AWS-
+    LC or BoringSSL. As we ship our wheels with OpenSSL, most
+    users will not have access to these APIs yet. See
+    :doc:`/statements/state-of-openssl` for more information on
+    OpenSSL support.
+  * Note: Post-quantum algorithm support requires AWS-LC or
+    BoringSSL. As we ship our wheels with OpenSSL, most users
+    will not have access to these APIs yet. See
+    :doc:`/statements/state-of-openssl` for more information on
+    OpenSSL support.
+  * Added new :doc:`/hazmat/primitives/asymmetric/mldsa` module
+    with support for ML-DSA signing and verification with AWS-LC
+    and BoringSSL. Note: Post-quantum algorithm support requires
+    AWS-LC or BoringSSL. As we ship our wheels with OpenSSL, most
+    users will not have access to these APIs yet. See
+    :doc:`/statements/state-of-openssl` for more information on
+    OpenSSL support.
+  * Note: Post-quantum algorithm support requires AWS-LC or
+    BoringSSL. As we ship our wheels with OpenSSL, most users
+    will not have access to these APIs yet. See
+    :doc:`/statements/state-of-openssl` for more information on
+    OpenSSL support.
+  * Added new :doc:`/hazmat/asn1/index` module with support for
+    declaratively defining custom ASN.1 types and
+    encoding/decoding them.
+  * Fixed compilation when using LibreSSL 4.3.0 and OpenSSL
+    4.0.0.
+  * Updated Windows, macOS, and Linux wheels to be compiled with
+    OpenSSL 4.0.0.
+
+-------------------------------------------------------------------
@@ -8,0 +147,4 @@
+- drop support-maturin-1.12.patch (upstream)
+- drop no-pytest_benchmark.patch,
+  Make-unsafe-subinterpreter-support-available-via-cfg.patch:
+  obsolete

Old:
----
  Make-unsafe-subinterpreter-support-available-via-cfg.patch
  cryptography-46.0.7.tar.gz
  no-pytest_benchmark.patch
  support-maturin-1.12.patch

New:
----
  cryptography-47.0.0.tar.gz

----------(Old B)----------
  Old:- drop no-pytest_benchmark.patch,
  Make-unsafe-subinterpreter-support-available-via-cfg.patch:
  obsolete
  Old:- drop support-maturin-1.12.patch (upstream)
- drop no-pytest_benchmark.patch,
  Make-unsafe-subinterpreter-support-available-via-cfg.patch:
  Old:  * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 
3.5.6.
- drop support-maturin-1.12.patch (upstream)
- drop no-pytest_benchmark.patch,
----------(Old E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.4o2CMo/_old  2026-04-28 11:54:03.127726858 +0200
+++ /var/tmp/diff_new_pack.4o2CMo/_new  2026-04-28 11:54:03.127726858 +0200
@@ -28,7 +28,7 @@
 %{?sle15_python_module_pythons}
 Name:           python-cryptography%{psuffix}
 # ALWAYS KEEP IN SYNC WITH python-cryptography-vectors!
-Version:        46.0.7
+Version:        47.0.0
 Release:        0
 Summary:        Python library which exposes cryptographic recipes and 
primitives
 License:        Apache-2.0 OR BSD-3-Clause
@@ -37,13 +37,6 @@
 # use `osc service manualrun` to regenerate
 Source2:        vendor.tar.zst
 Source4:        python-cryptography.keyring
-# PATCH-FEATURE-OPENSUSE no-pytest_benchmark.patch [email protected]
-# We don't need no benchmarking and coverage measurement
-Patch4:         no-pytest_benchmark.patch
-# PATCH-FIX-OPENSUSE 
Make-unsafe-subinterpreter-support-available-via-cfg.patch boo#1248987
-Patch5:         Make-unsafe-subinterpreter-support-available-via-cfg.patch
-# PATCH-FIX-UPSTREAM gh#pyca/cryptography#14319
-Patch6:         support-maturin-1.12.patch
 BuildRequires:  %{python_module cffi >= 1.12}
 BuildRequires:  %{python_module devel}
 BuildRequires:  %{python_module exceptiongroup}

++++++ cryptography-46.0.7.tar.gz -> cryptography-47.0.0.tar.gz ++++++
++++ 35078 lines of diff (skipped)

++++++ vendor.tar.zst ++++++
++++ 679114 lines of diff (skipped)

Reply via email to