Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package python-cryptography for openSUSE:Factory checked in at 2022-10-03 13:44:15 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old) and /work/SRC/openSUSE:Factory/.python-cryptography.new.2275 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-cryptography" Mon Oct 3 13:44:15 2022 rev:67 rq:1007100 version:38.0.1 Changes: -------- --- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes 2022-08-04 13:23:30.592506560 +0200 +++ /work/SRC/openSUSE:Factory/.python-cryptography.new.2275/python-cryptography.changes 2022-10-03 13:44:24.265302231 +0200 @@ -1,0 +2,60 @@ +Thu Sep 29 19:42:06 UTC 2022 - Dirk M??ller <dmuel...@suse.com> + +- update to 38.0.1: + * Fixed parsing TLVs in ASN.1 with length greater than 65535 bytes (typically + seen in large CRLs). + * Final deprecation of OpenSSL 1.1.0. The next release of ``cryptography`` + will drop support. + * We no longer ship ``manylinux2010`` wheels. Users should upgrade to the + latest ``pip`` to ensure this doesn't cause issues downloading wheels on + their platform. We now ship ``manylinux_2_28`` wheels for users on new + enough platforms. + * Updated the minimum supported Rust version (MSRV) to 1.48.0, from 1.41.0. + Users with the latest ``pip`` will typically get a wheel and not need Rust + installed, but check :doc:`/installation` for documentation on installing a + newer ``rustc`` if required. + * :meth:`~cryptography.fernet.Fernet.decrypt` and related methods now accept + both ``str`` and ``bytes`` tokens. + * Parsing ``CertificateSigningRequest`` restores the behavior of enforcing + that the ``Extension`` ``critical`` field must be correctly encoded DER. See + `the issue <https://github.com/pyca/cryptography/issues/6368>`_ for complete + details. + * Added two new OpenSSL functions to the bindings to support an upcoming + ``pyOpenSSL`` release. + * When parsing :class:`~cryptography.x509.CertificateRevocationList` and + :class:`~cryptography.x509.CertificateSigningRequest` values, it is now + enforced that the ``version`` value in the input must be valid according to + the rules of :rfc:`2986` and :rfc:`5280`. + * Using MD5 or SHA1 in :class:`~cryptography.x509.CertificateBuilder` and + other X.509 builders is deprecated and support will be removed in the next + version. + * Added additional APIs to + :class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp`, including + :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_hash_algorithm`, + :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_algorithm`, + :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature`, and + :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.extension_bytes`. + * Added :attr:`~cryptography.x509.Certificate.tbs_precertificate_bytes`, allowing + users to access the to-be-signed pre-certificate data needed for signed + certificate timestamp verification. + * :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC` and + :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC` now support + :attr:`~cryptography.hazmat.primitives.kdf.kbkdf.CounterLocation.MiddleFixed` + counter location. + * Fixed :rfc:`4514` name parsing to reverse the order of the RDNs according + to the section 2.1 of the RFC, affecting method + :meth:`~cryptography.x509.Name.from_rfc4514_string`. + * It is now possible to customize some aspects of encryption when serializing + private keys, using + :meth:`~cryptography.hazmat.primitives.serialization.PrivateFormat.encryption_builder`. + * Removed several legacy symbols from our OpenSSL bindings. Users of pyOpenSSL + versions older than 22.0 will need to upgrade. + * Added + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES128` and + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES256` classes. + These classes do not replace + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` (which + allows all AES key lengths), but are intended for applications where + developers want to be explicit about key length. + +------------------------------------------------------------------- Old: ---- cryptography-37.0.4.tar.gz New: ---- cryptography-38.0.1.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-cryptography.spec ++++++ --- /var/tmp/diff_new_pack.ewMQd0/_old 2022-10-03 13:44:25.985306014 +0200 +++ /var/tmp/diff_new_pack.ewMQd0/_new 2022-10-03 13:44:25.989306023 +0200 @@ -28,7 +28,7 @@ %bcond_with test %endif Name: python-cryptography%{psuffix} -Version: 37.0.4 +Version: 38.0.1 Release: 0 Summary: Python library which exposes cryptographic recipes and primitives License: Apache-2.0 OR BSD-3-Clause ++++++ _service ++++++ --- /var/tmp/diff_new_pack.ewMQd0/_old 2022-10-03 13:44:26.037306129 +0200 +++ /var/tmp/diff_new_pack.ewMQd0/_new 2022-10-03 13:44:26.041306138 +0200 @@ -1,7 +1,8 @@ <services> <service name="download_files" mode="disabled"/> <service name="cargo_vendor" mode="disabled"> - <param name="srcdir">cryptography-37.0.4/src/rust</param> + <param name="srcdir">cryptography-38.0.1/src/rust</param> + <param name="compression">zst</param> </service> <service name="cargo_audit" mode="disabled"> </service> ++++++ cryptography-37.0.4.tar.gz -> cryptography-38.0.1.tar.gz ++++++ ++++ 9820 lines of diff (skipped) ++++++ vendor.tar.zst ++++++ Binary files /var/tmp/diff_new_pack.ewMQd0/_old and /var/tmp/diff_new_pack.ewMQd0/_new differ