Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-cryptography for
openSUSE:Factory checked in at 2022-05-25 20:33:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
and /work/SRC/openSUSE:Factory/.python-cryptography.new.2254 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography"
Wed May 25 20:33:52 2022 rev:64 rq:978871 version:37.0.2
Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes
2022-04-20 17:03:50.955182069 +0200
+++
/work/SRC/openSUSE:Factory/.python-cryptography.new.2254/python-cryptography.changes
2022-05-25 20:33:56.212175283 +0200
@@ -1,0 +2,80 @@
+Tue May 24 06:57:55 UTC 2022 - Dirk M??ller <[email protected]>
+
+- update to 37.0.2:
+ * Fixed an issue where parsing an encrypted private key with the public
+ loader functions would hang waiting for console input on OpenSSL 3.0.x
rather
+ than raising an error.
+ * Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
+ removed again in the future, so ``pyOpenSSL`` users should still upgrade
+ to the latest version of that package when they upgrade ``cryptography``.
+ * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
+ * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
+ The new minimum LibreSSL version is 3.1+.
+ * **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
+ from the public key and private key classes. These methods were originally
+ deprecated in version 2.0, but had an extended deprecation timeline due
+ to usage. Any remaining users should transition to ``sign`` and ``verify``.
+ * Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
+ the OpenSSL project. The next release of ``cryptography`` will be the last
+ to support compiling with OpenSSL 1.1.0.
+ * Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
+ Python core team. Support for Python 3.6 will be removed in a future
+ ``cryptography`` release.
+ * Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
+ In the next release we will raise MSRV to 1.48.0. Users with the latest
+ ``pip`` will typically get a wheel and not need Rust installed, but check
+ :doc:`/installation` for documentation on installing a newer ``rustc`` if
+ required.
+ * Deprecated
+ :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
+ :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
+ :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
+ :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish`
because
+ they are legacy algorithms with extremely low usage. These will be removed
+ in a future version of ``cryptography``.
+ * Added limited support for distinguished names containing a bit string.
+ * We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
+ and ``x86_64`` architectures. Users on macOS should upgrade to the latest
+ ``pip`` to ensure they can use this wheel, although we will continue to
+ ship ``x86_64`` specific wheels for now to ease the transition.
+ * This will be the final release for which we ship ``manylinux2010`` wheels.
+ Going forward the minimum supported ``manylinux`` ABI for our wheels will
+ be ``manylinux2014``. The vast majority of users will continue to receive
+ ``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
+ wheels this release already requires ``manylinux2014`` for compatibility
+ with binaries distributed by upstream.
+ * Added support for multiple
+ :class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
+ :class:`~cryptography.x509.ocsp.OCSPResponse`.
+ * Restored support for signing certificates and other structures in
+ :doc:`/x509/index` with SHA3 hash algorithms.
+ * :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
+ disabled in FIPS mode.
+ * Added support for serialization of PKCS#12 CA friendly names/aliases in
+
:func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
+ * Added support for 12-15 byte (96 to 120 bit) nonces to
+ :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
+ previously supported only 12 byte (96 bit).
+ * Added support for
+ :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
+ OpenSSL 3.0.0+.
+ * Added support for serializing PKCS7 structures from a list of
+ certificates with
+
:class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
+ * Added support for parsing :rfc:`4514` strings with
+ :meth:`~cryptography.x509.Name.from_rfc4514_string`.
+ * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO`
to
+ :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
+ be used to verify a signature where the salt length is not already known.
+ * Added
:attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
+ to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
+ constant will set the salt length to the same length as the ``PSS`` hash
+ algorithm.
+ * Added support for loading RSA-PSS key types with
+ :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
+ and
+ :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
+ This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
+ normal RSA private key, discarding the PSS constraint information.
+
+-------------------------------------------------------------------
Old:
----
cryptography-36.0.2.tar.gz
cryptography-36.0.2.tar.gz.asc
vendor.tar.xz
New:
----
cryptography-37.0.2.tar.gz
cryptography-37.0.2.tar.gz.asc
vendor.tar.zst
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.t7Knbj/_old 2022-05-25 20:33:57.572177181 +0200
+++ /var/tmp/diff_new_pack.t7Knbj/_new 2022-05-25 20:33:57.576177187 +0200
@@ -28,7 +28,7 @@
%bcond_with test
%endif
Name: python-cryptography%{psuffix}
-Version: 36.0.2
+Version: 37.0.2
Release: 0
Summary: Python library which exposes cryptographic recipes and
primitives
License: Apache-2.0 OR BSD-3-Clause
@@ -37,7 +37,7 @@
Source0:
https://files.pythonhosted.org/packages/source/c/cryptography/cryptography-%{version}.tar.gz
Source1:
https://files.pythonhosted.org/packages/source/c/cryptography/cryptography-%{version}.tar.gz.asc
# use `osc service disabledrun` to regenerate
-Source2: vendor.tar.xz
+Source2: vendor.tar.zst
# use `osc service disabledrun` to regenerate
Source3: cargo_config
Source4: python-cryptography.keyring
@@ -52,6 +52,7 @@
BuildRequires: pkgconfig
BuildRequires: python-rpm-macros
BuildRequires: rust >= 1.41.0
+BuildRequires: zstd
BuildRequires: pkgconfig(libffi)
# python-base is not enough, we need the _ssl module
Requires: python
@@ -63,6 +64,7 @@
BuildRequires: %{python_module iso8601}
BuildRequires: %{python_module pretend}
BuildRequires: %{python_module pytest > 6.0}
+BuildRequires: %{python_module pytest-benchmark}
BuildRequires: %{python_module pytest-subtests}
BuildRequires: %{python_module pytest-xdist}
BuildRequires: %{python_module pytz}
@@ -84,6 +86,7 @@
%autosetup -a2 -p1 -n cryptography-%{version}
mkdir .cargo
cp %{SOURCE3} .cargo/config
+rm -v src/rust/Cargo.lock
%build
export RUSTFLAGS=%{rustflags}
++++++ _service ++++++
--- /var/tmp/diff_new_pack.t7Knbj/_old 2022-05-25 20:33:57.644177282 +0200
+++ /var/tmp/diff_new_pack.t7Knbj/_new 2022-05-25 20:33:57.652177293 +0200
@@ -1,6 +1,6 @@
<services>
<service name="cargo_vendor" mode="disabled">
- <param name="srcdir">cryptography-36.0.2/src/rust</param>
+ <param name="srcdir">cryptography-37.0.2/src/rust</param>
</service>
<service name="cargo_audit" mode="disabled">
</service>
++++++ cryptography-36.0.2.tar.gz -> cryptography-37.0.2.tar.gz ++++++
++++ 17395 lines of diff (skipped)