Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package python-cryptography for openSUSE:Factory checked in at 2022-05-25 20:33:52 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old) and /work/SRC/openSUSE:Factory/.python-cryptography.new.2254 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography" Wed May 25 20:33:52 2022 rev:64 rq:978871 version:37.0.2 Changes: -------- --- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes 2022-04-20 17:03:50.955182069 +0200 +++ /work/SRC/openSUSE:Factory/.python-cryptography.new.2254/python-cryptography.changes 2022-05-25 20:33:56.212175283 +0200 @@ -1,0 +2,80 @@ +Tue May 24 06:57:55 UTC 2022 - Dirk M??ller <dmuel...@suse.com> + +- update to 37.0.2: + * Fixed an issue where parsing an encrypted private key with the public + loader functions would hang waiting for console input on OpenSSL 3.0.x rather + than raising an error. + * Restored some legacy symbols for older ``pyOpenSSL`` users. These will be + removed again in the future, so ``pyOpenSSL`` users should still upgrade + to the latest version of that package when they upgrade ``cryptography``. + * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2. + * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x. + The new minimum LibreSSL version is 3.1+. + * **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods + from the public key and private key classes. These methods were originally + deprecated in version 2.0, but had an extended deprecation timeline due + to usage. Any remaining users should transition to ``sign`` and ``verify``. + * Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by + the OpenSSL project. The next release of ``cryptography`` will be the last + to support compiling with OpenSSL 1.1.0. + * Deprecated Python 3.6 support. Python 3.6 is no longer supported by the + Python core team. Support for Python 3.6 will be removed in a future + ``cryptography`` release. + * Deprecated the current minimum supported Rust version (MSRV) of 1.41.0. + In the next release we will raise MSRV to 1.48.0. Users with the latest + ``pip`` will typically get a wheel and not need Rust installed, but check + :doc:`/installation` for documentation on installing a newer ``rustc`` if + required. + * Deprecated + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`, + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`, + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because + they are legacy algorithms with extremely low usage. These will be removed + in a future version of ``cryptography``. + * Added limited support for distinguished names containing a bit string. + * We now ship ``universal2`` wheels on macOS, which contain both ``arm64`` + and ``x86_64`` architectures. Users on macOS should upgrade to the latest + ``pip`` to ensure they can use this wheel, although we will continue to + ship ``x86_64`` specific wheels for now to ease the transition. + * This will be the final release for which we ship ``manylinux2010`` wheels. + Going forward the minimum supported ``manylinux`` ABI for our wheels will + be ``manylinux2014``. The vast majority of users will continue to receive + ``manylinux`` wheels provided they have an up to date ``pip``. For PyPy + wheels this release already requires ``manylinux2014`` for compatibility + with binaries distributed by upstream. + * Added support for multiple + :class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a + :class:`~cryptography.x509.ocsp.OCSPResponse`. + * Restored support for signing certificates and other structures in + :doc:`/x509/index` with SHA3 hash algorithms. + * :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is + disabled in FIPS mode. + * Added support for serialization of PKCS#12 CA friendly names/aliases in + :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates` + * Added support for 12-15 byte (96 to 120 bit) nonces to + :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class + previously supported only 12 byte (96 bit). + * Added support for + :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using + OpenSSL 3.0.0+. + * Added support for serializing PKCS7 structures from a list of + certificates with + :class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`. + * Added support for parsing :rfc:`4514` strings with + :meth:`~cryptography.x509.Name.from_rfc4514_string`. + * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to + :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can + be used to verify a signature where the salt length is not already known. + * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH` + to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This + constant will set the salt length to the same length as the ``PSS`` hash + algorithm. + * Added support for loading RSA-PSS key types with + :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key` + and + :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`. + This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a + normal RSA private key, discarding the PSS constraint information. + +------------------------------------------------------------------- Old: ---- cryptography-36.0.2.tar.gz cryptography-36.0.2.tar.gz.asc vendor.tar.xz New: ---- cryptography-37.0.2.tar.gz cryptography-37.0.2.tar.gz.asc vendor.tar.zst ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-cryptography.spec ++++++ --- /var/tmp/diff_new_pack.t7Knbj/_old 2022-05-25 20:33:57.572177181 +0200 +++ /var/tmp/diff_new_pack.t7Knbj/_new 2022-05-25 20:33:57.576177187 +0200 @@ -28,7 +28,7 @@ %bcond_with test %endif Name: python-cryptography%{psuffix} -Version: 36.0.2 +Version: 37.0.2 Release: 0 Summary: Python library which exposes cryptographic recipes and primitives License: Apache-2.0 OR BSD-3-Clause @@ -37,7 +37,7 @@ Source0: https://files.pythonhosted.org/packages/source/c/cryptography/cryptography-%{version}.tar.gz Source1: https://files.pythonhosted.org/packages/source/c/cryptography/cryptography-%{version}.tar.gz.asc # use `osc service disabledrun` to regenerate -Source2: vendor.tar.xz +Source2: vendor.tar.zst # use `osc service disabledrun` to regenerate Source3: cargo_config Source4: python-cryptography.keyring @@ -52,6 +52,7 @@ BuildRequires: pkgconfig BuildRequires: python-rpm-macros BuildRequires: rust >= 1.41.0 +BuildRequires: zstd BuildRequires: pkgconfig(libffi) # python-base is not enough, we need the _ssl module Requires: python @@ -63,6 +64,7 @@ BuildRequires: %{python_module iso8601} BuildRequires: %{python_module pretend} BuildRequires: %{python_module pytest > 6.0} +BuildRequires: %{python_module pytest-benchmark} BuildRequires: %{python_module pytest-subtests} BuildRequires: %{python_module pytest-xdist} BuildRequires: %{python_module pytz} @@ -84,6 +86,7 @@ %autosetup -a2 -p1 -n cryptography-%{version} mkdir .cargo cp %{SOURCE3} .cargo/config +rm -v src/rust/Cargo.lock %build export RUSTFLAGS=%{rustflags} ++++++ _service ++++++ --- /var/tmp/diff_new_pack.t7Knbj/_old 2022-05-25 20:33:57.644177282 +0200 +++ /var/tmp/diff_new_pack.t7Knbj/_new 2022-05-25 20:33:57.652177293 +0200 @@ -1,6 +1,6 @@ <services> <service name="cargo_vendor" mode="disabled"> - <param name="srcdir">cryptography-36.0.2/src/rust</param> + <param name="srcdir">cryptography-37.0.2/src/rust</param> </service> <service name="cargo_audit" mode="disabled"> </service> ++++++ cryptography-36.0.2.tar.gz -> cryptography-37.0.2.tar.gz ++++++ ++++ 17395 lines of diff (skipped)