Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package python-asyncssh for openSUSE:Factory checked in at 2023-01-25 17:44:23 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-asyncssh (Old) and /work/SRC/openSUSE:Factory/.python-asyncssh.new.32243 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-asyncssh" Wed Jan 25 17:44:23 2023 rev:21 rq:1060882 version:2.13.0 Changes: -------- --- /work/SRC/openSUSE:Factory/python-asyncssh/python-asyncssh.changes 2023-01-06 17:06:35.416529978 +0100 +++ /work/SRC/openSUSE:Factory/.python-asyncssh.new.32243/python-asyncssh.changes 2023-01-25 17:54:09.111578837 +0100 @@ -1,0 +2,6 @@ +Wed Jan 25 12:18:38 UTC 2023 - Daniel Garcia <daniel.gar...@suse.com> + +- Add remove-sha1.patch to make it compatible with latests versions of + cryptography gh#ronf/asyncssh@fae5a9e8baad + +------------------------------------------------------------------- New: ---- remove-sha1.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-asyncssh.spec ++++++ --- /var/tmp/diff_new_pack.ilOmCr/_old 2023-01-25 17:54:09.823582637 +0100 +++ /var/tmp/diff_new_pack.ilOmCr/_new 2023-01-25 17:54:09.835582701 +0100 @@ -16,7 +16,6 @@ # -%{?!python_module:%define python_module() python-%{**} python3-%{**}} %define skip_python2 1 %define skip_python36 1 Name: python-asyncssh @@ -28,6 +27,8 @@ URL: https://github.com/ronf/asyncssh Source: https://files.pythonhosted.org/packages/source/a/asyncssh/asyncssh-%{version}.tar.gz Patch0: gss_test.patch +# PATCH-FIX-UPSTREAM remove-sha1.patch gh#ronf/asyncssh@fae5a9e8baad +Patch1: remove-sha1.patch # SECTION test requirements BuildRequires: %{python_module bcrypt >= 3.1.3} BuildRequires: %{python_module cryptography >= 2.8} @@ -75,6 +76,7 @@ %files %{python_files} %license LICENSE COPYRIGHT %doc README.rst -%{python_sitelib}/* +%{python_sitelib}/asyncssh +%{python_sitelib}/asyncssh-%{version}*-info %changelog ++++++ gss_test.patch ++++++ --- /var/tmp/diff_new_pack.ilOmCr/_old 2023-01-25 17:54:09.871582893 +0100 +++ /var/tmp/diff_new_pack.ilOmCr/_new 2023-01-25 17:54:09.915583129 +0100 @@ -2,9 +2,11 @@ tests/test_connection.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) ---- a/tests/test_connection.py -+++ b/tests/test_connection.py -@@ -1470,7 +1470,7 @@ class _TestConnectionAsyncAcceptor(Serve +Index: asyncssh-2.13.0/tests/test_connection.py +=================================================================== +--- asyncssh-2.13.0.orig/tests/test_connection.py ++++ asyncssh-2.13.0/tests/test_connection.py +@@ -1546,7 +1546,7 @@ class _TestConnectionAsyncAcceptor(Serve conn.logger.info('Acceptor called') ++++++ remove-sha1.patch ++++++ >From fae5a9e8baad8bd505b43e14fc13b9010789865c Mon Sep 17 00:00:00 2001 From: Ron Frederick <r...@timeheart.net> Date: Sat, 7 Jan 2023 21:02:01 -0800 Subject: [PATCH] Handle elimination of SHA-1 for digital signatures in cryptograhy 39.0.0 This commit changes the default X.509 signature algorithm for DSA and some unit test code to avoid attempting to use SHA-1 for X.509 certificate signing, as this is no longer allowed in cryptography 39.0.0. --- asyncssh/dsa.py | 2 +- asyncssh/ecdsa.py | 2 +- asyncssh/public_key.py | 4 ++-- asyncssh/rsa.py | 2 +- tests/test_public_key.py | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/asyncssh/dsa.py b/asyncssh/dsa.py index d3f95196..1972e1d0 100644 --- a/asyncssh/dsa.py +++ b/asyncssh/dsa.py @@ -41,7 +41,7 @@ class _DSAKey(SSHKey): _key: Union[DSAPrivateKey, DSAPublicKey] algorithm = b'ssh-dss' - default_hash_name = 'sha1' + default_x509_hash = 'sha256' pem_name = b'DSA' pkcs8_oid = ObjectIdentifier('1.2.840.10040.4.1') sig_algorithms = (algorithm,) diff --git a/asyncssh/ecdsa.py b/asyncssh/ecdsa.py index 25bad399..57d8d821 100644 --- a/asyncssh/ecdsa.py +++ b/asyncssh/ecdsa.py @@ -54,7 +54,7 @@ class _ECKey(SSHKey): _key: Union[ECDSAPrivateKey, ECDSAPublicKey] - default_hash_name = 'sha256' + default_x509_hash = 'sha256' pem_name = b'EC' pkcs8_oid = ObjectIdentifier('1.2.840.10045.2.1') diff --git a/asyncssh/public_key.py b/asyncssh/public_key.py index 75672ed4..a744b3d7 100644 --- a/asyncssh/public_key.py +++ b/asyncssh/public_key.py @@ -240,7 +240,7 @@ class SSHKey: sig_algorithms: Sequence[bytes] = () x509_algorithms: Sequence[bytes] = () all_sig_algorithms: Set[bytes] = set() - default_hash_name: str = '' + default_x509_hash: str = '' pem_name: bytes = b'' pkcs8_oid: Optional[ObjectIdentifier] = None use_executor: bool = False @@ -385,7 +385,7 @@ def _generate_x509_certificate(self, key: 'SSHKey', subject: str, 'valid after time') if hash_name == (): - hash_name = key.default_hash_name + hash_name = key.default_x509_hash if comment == (): comment = key.get_comment_bytes() diff --git a/asyncssh/rsa.py b/asyncssh/rsa.py index 09edc59d..ccfbaa2d 100644 --- a/asyncssh/rsa.py +++ b/asyncssh/rsa.py @@ -52,7 +52,7 @@ class RSAKey(SSHKey): _key: Union[RSAPrivateKey, RSAPublicKey] algorithm = b'ssh-rsa' - default_hash_name = 'sha256' + default_x509_hash = 'sha256' pem_name = b'RSA' pkcs8_oid = ObjectIdentifier('1.2.840.113549.1.1.1') sig_algorithms = (b'rsa-sha2-256', b'rsa-sha2-512', diff --git a/tests/test_public_key.py b/tests/test_public_key.py index ad288203..091531a4 100644 --- a/tests/test_public_key.py +++ b/tests/test_public_key.py @@ -2358,7 +2358,7 @@ def test_x509_certificate_hashes(self): privkey = get_test_key('ssh-rsa') pubkey = privkey.convert_to_public() - for hash_alg in ('sha1', 'sha256', 'sha512'): + for hash_alg in ('sha256', 'sha512'): cert = privkey.generate_x509_user_certificate( pubkey, 'OU=user', hash_alg=hash_alg)