Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-cryptography for 
openSUSE:Factory checked in at 2024-02-23 16:41:42
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
 and      /work/SRC/openSUSE:Factory/.python-cryptography.new.1770 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-cryptography"

Fri Feb 23 16:41:42 2024 rev:86 rq:1149625 version:42.0.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes  
2023-11-29 21:18:42.324692578 +0100
+++ 
/work/SRC/openSUSE:Factory/.python-cryptography.new.1770/python-cryptography.changes
        2024-02-23 16:41:53.903874692 +0100
@@ -1,0 +2,121 @@
+Thu Feb 22 17:10:39 UTC 2024 - Daniel Garcia <daniel.gar...@suse.com>
+
+- update to 42.0.4 (bsc#1220210, CVE-2024-26130):
+  * Fixed a null-pointer-dereference and segfault that could occur
+    when creating a PKCS#12 bundle. Credit to Alexander-Programming
+    for reporting the issue. CVE-2024-26130
+  * Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields
+    SMIMECapabilities and SignatureAlgorithmIdentifier should now be
+    correctly encoded according to the definitions in :rfc:2633
+    :rfc:3370.
+- update to 42.0.3:
+  * Fixed an initialization issue that caused key loading failures for some
+    users.
+- Drop patch skip_openssl_memleak_test.patch not needed anymore.
+
+-------------------------------------------------------------------
+Wed Jan 31 17:24:29 UTC 2024 - Dirk Müller <dmuel...@suse.com>
+
+- update to 42.0.2:
+  * Updated Windows, macOS, and Linux wheels to be compiled with
+    OpenSSL 3.2.1.
+  * Fixed an issue that prevented the use of Python buffer
+    protocol objects in sign and verify methods on asymmetric
+    keys.
+  * Fixed an issue with incorrect keyword-argument naming with
+    EllipticCurvePrivateKey :meth:`~cryptography.hazmat.primitive
+    s.asymmetric.ec.EllipticCurvePrivateKey.exchange`,
+    X25519PrivateKey :meth:`~cryptography.hazmat.primitives.asymm
+    etric.x25519.X25519PrivateKey.exchange`, X448PrivateKey :meth
+    :`~cryptography.hazmat.primitives.asymmetric.x448.X448Private
+    Key.exchange`, and DHPrivateKey :meth:`~cryptography.hazmat.p
+    rimitives.asymmetric.dh.DHPrivateKey.exchange`.
+
+-------------------------------------------------------------------
+Mon Jan 29 14:01:49 UTC 2024 - Dirk Müller <dmuel...@suse.com>
+
+- update to 42.0.1:
+  * Fixed an issue with incorrect keyword-argument naming with
+    EllipticCurvePrivateKey :meth:`~cryptography.hazmat.primitive
+    s.asymmetric.ec.EllipticCurvePrivateKey.sign`.
+  * Resolved compatibility issue with loading certain RSA public
+    keys in :func:`~cryptography.hazmat.primitives.serialization.
+    load_pem_public_key`.
+  * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.7.
+  * BACKWARDS INCOMPATIBLE: Loading a PKCS7 with no content field
+    using :func:`~cryptography.hazmat.primitives.serialization.pk
+    cs7.load_pem_pkcs7_certificates` or :func:`~cryptography.hazm
+    at.primitives.serialization.pkcs7.load_der_pkcs7_certificates
+    ` will now raise a ValueError rather than return an empty
+    list.
+  * Parsing SSH certificates no longer permits malformed critical
+    options with values, as documented in the 41.0.2 release
+    notes.
+  * Updated Windows, macOS, and Linux wheels to be compiled with
+    OpenSSL 3.2.0.
+  * Updated the minimum supported Rust version (MSRV) to 1.63.0,
+    from 1.56.0.
+  * We now publish both py37 and py39 abi3 wheels. This should
+    resolve some errors relating to initializing a module
+    multiple times per process.
+  * Support :class:`~cryptography.hazmat.primitives.asymmetric.pa
+    dding.PSS` for X.509 certificate signing requests and
+    certificate revocation lists with the keyword-only argument
+    rsa_padding on the sign methods for
+    :class:`~cryptography.x509.CertificateSigningRequestBuilder`
+    and
+    :class:`~cryptography.x509.CertificateRevocationListBuilder`.
+  * Added support for obtaining X.509 certificate signing request
+    signature algorithm parameters (including PSS) via :meth:`~cr
+    yptography.x509.CertificateSigningRequest.signature_algorithm
+    _parameters`.
+  * Added support for obtaining X.509 certificate revocation list
+    signature algorithm parameters (including PSS) via :meth:`~cr
+    yptography.x509.CertificateRevocationList.signature_algorithm
+    _parameters`.
+  * Added mgf property to :class:`~cryptography.hazmat.primitives
+    .asymmetric.padding.PSS`.
+  * Added algorithm and mgf properties to :class:`~cryptography.h
+    azmat.primitives.asymmetric.padding.OAEP`.
+  * Added the following properties that return timezone-aware
+    datetime objects:
+    :meth:`~cryptography.x509.Certificate.not_valid_before_utc`,
+    :meth:`~cryptography.x509.Certificate.not_valid_after_utc`, :
+    meth:`~cryptography.x509.RevokedCertificate.revocation_date_u
+    tc`, :meth:`~cryptography.x509.CertificateRevocationList.next
+    _update_utc`, :meth:`~cryptography.x509.CertificateRevocation
+    List.last_update_utc`. These are timezone-aware variants of
+    existing properties that return naïve datetime objects.
+  * Deprecated the following properties that return naïve
+    datetime objects:
+    :meth:`~cryptography.x509.Certificate.not_valid_before`,
+    :meth:`~cryptography.x509.Certificate.not_valid_after`, :meth
+    :`~cryptography.x509.RevokedCertificate.revocation_date`, :me
+    th:`~cryptography.x509.CertificateRevocationList.next_update`
+    , :meth:`~cryptography.x509.CertificateRevocationList.last_up
+    date` in favor of the new timezone-aware variants mentioned
+    above.
+  * Added support for :class:`~cryptography.hazmat.primitives.cip
+    hers.algorithms.ChaCha20` on LibreSSL.
+  * Added support for RSA PSS signatures in PKCS7 with :meth:`~cr
+    yptography.hazmat.primitives.serialization.pkcs7.PKCS7Signatu
+    reBuilder.add_signer`.
+  * In the next release (43.0.0) of cryptography, loading an
+    X.509 certificate with a negative serial number will raise an
+    exception. This has been deprecated since 36.0.0.
+  * Added support for :class:`~cryptography.hazmat.primitives.cip
+    hers.aead.AESGCMSIV` when using OpenSSL 3.2.0+.
+  * Added the :mod:`X.509 path validation
+    <cryptography.x509.verification>` APIs for
+    :class:`~cryptography.x509.Certificate` chains. These APIs
+    should be considered unstable and not subject to our
+    stability guarantees until documented as such in a future
+    release.
+  * Added support for :class:`~cryptography.hazmat.primitives.cip
+    hers.algorithms.SM4`
+    :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM`
+    when using OpenSSL 3.0 or greater.
+- use PEP517 build
+- switch to new cargo-vendor
+
+-------------------------------------------------------------------

Old:
----
  cargo_config
  cryptography-41.0.7.tar.gz
  skip_openssl_memleak_test.patch

New:
----
  cryptography-42.0.4.tar.gz

BETA DEBUG BEGIN:
  Old:    users.
- Drop patch skip_openssl_memleak_test.patch not needed anymore.
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.vz01HA/_old  2024-02-23 16:41:54.843908768 +0100
+++ /var/tmp/diff_new_pack.vz01HA/_new  2024-02-23 16:41:54.843908768 +0100
@@ -1,7 +1,7 @@
 #
-# spec file
+# spec file for package python-cryptography
 #
-# Copyright (c) 2023 SUSE LLC
+# Copyright (c) 2024 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -27,27 +27,26 @@
 %endif
 %{?sle15_python_module_pythons}
 Name:           python-cryptography%{psuffix}
-Version:        41.0.7
+Version:        42.0.4
 Release:        0
 Summary:        Python library which exposes cryptographic recipes and 
primitives
 License:        Apache-2.0 OR BSD-3-Clause
 Group:          Development/Languages/Python
 URL:            https://cryptography.io/en/latest/
 Source0:        
https://files.pythonhosted.org/packages/source/c/cryptography/cryptography-%{version}.tar.gz
-# use `osc service disabledrun` to regenerate
+# use `osc service manualrun` to regenerate
 Source2:        vendor.tar.zst
-# use `osc service disabledrun` to regenerate
-Source3:        cargo_config
 Source4:        python-cryptography.keyring
-Patch2:         skip_openssl_memleak_test.patch
 # PATCH-FEATURE-OPENSUSE no-pytest_benchmark.patch mc...@suse.com
 # We don't need no benchmarking and coverage measurement
 Patch4:         no-pytest_benchmark.patch
 BuildRequires:  %{python_module cffi >= 1.12}
 BuildRequires:  %{python_module devel}
 BuildRequires:  %{python_module exceptiongroup}
-BuildRequires:  %{python_module setuptools-rust}
+BuildRequires:  %{python_module pip}
+BuildRequires:  %{python_module setuptools-rust >= 1.7.0}
 BuildRequires:  %{python_module setuptools}
+BuildRequires:  %{python_module wheel}
 BuildRequires:  cargo >= 1.56.0
 BuildRequires:  fdupes
 BuildRequires:  libopenssl-devel
@@ -60,6 +59,7 @@
 Requires:       python
 %requires_eq    python-cffi
 %if %{with test}
+BuildRequires:  %{python_module certifi}
 BuildRequires:  %{python_module cryptography >= %{version}}
 BuildRequires:  %{python_module cryptography-vectors = %{version}}
 BuildRequires:  %{python_module hypothesis >= 1.11.4}
@@ -85,7 +85,6 @@
 
 %prep
 %autosetup -a2 -p1 -n cryptography-%{version}
-cp %{SOURCE3} .cargo/config
 rm -v src/rust/Cargo.lock
 
 %build
@@ -93,7 +92,7 @@
 %global _lto_cflags %{nil}
 export RUSTFLAGS=%{rustflags}
 export CFLAGS="%{optflags} -fno-strict-aliasing"
-%python_build
+%pyproject_wheel
 
 %install
 %if !%{with test}
@@ -102,13 +101,20 @@
 # see https://github.com/pyca/cryptography/issues/1463
 find . -name .keep -print -delete
 
-%python_install
+%pyproject_install
 %python_expand %fdupes %{buildroot}%{$python_sitearch}
 %endif
 
 %if %{with test}
 %check
 # won't work for cryptography
+# fails with OverflowError on 32bit platform
+%ifarch %ix86 %arm ppc
+rm -v tests/hazmat/primitives/test_aead.py
+# imports test_aead so we need to remove also these
+rm -v tests/wycheproof/test_aes.py
+rm -v tests/wycheproof/test_chacha20poly1305.py
+%endif
 %pytest_arch -n auto --ignore-glob=vendor/*
 %endif
 
@@ -117,6 +123,6 @@
 %license LICENSE LICENSE.APACHE LICENSE.BSD
 %doc CONTRIBUTING.rst CHANGELOG.rst README.rst
 %{python_sitearch}/cryptography
-%{python_sitearch}/cryptography-%{version}*-info
+%{python_sitearch}/cryptography-%{version}.dist-info
 %endif
 

++++++ _service ++++++
--- /var/tmp/diff_new_pack.vz01HA/_old  2024-02-23 16:41:54.879910073 +0100
+++ /var/tmp/diff_new_pack.vz01HA/_new  2024-02-23 16:41:54.883910218 +0100
@@ -1,10 +1,8 @@
 <services>
   <service name="download_files" mode="manual"/>
   <service name="cargo_vendor" mode="manual">
-    <param name="srcdir">cryptography-41.0.7/src/rust</param>
+    <param name="srcdir">cryptography-42.0.2/src/rust</param>
     <param name="compression">zst</param>
   </service>
-  <service name="cargo_audit" mode="manual">
-  </service>
 </services>
 

++++++ cryptography-41.0.7.tar.gz -> cryptography-42.0.4.tar.gz ++++++
++++ 34882 lines of diff (skipped)

++++++ no-pytest_benchmark.patch ++++++
--- /var/tmp/diff_new_pack.vz01HA/_old  2024-02-23 16:41:55.111918483 +0100
+++ /var/tmp/diff_new_pack.vz01HA/_new  2024-02-23 16:41:55.115918628 +0100
@@ -8,9 +8,11 @@
  tests/bench/test_x509.py               |   16 ++++++-------
  7 files changed, 37 insertions(+), 68 deletions(-)
 
---- a/pyproject.toml
-+++ b/pyproject.toml
-@@ -69,8 +69,6 @@ ssh = ["bcrypt >=3.1.5"]
+Index: cryptography-42.0.1/pyproject.toml
+===================================================================
+--- cryptography-42.0.1.orig/pyproject.toml
++++ cryptography-42.0.1/pyproject.toml
+@@ -71,8 +71,6 @@ ssh = ["bcrypt >=3.1.5"]
  nox = ["nox"]
  test = [
      "pytest >=6.2.0",
@@ -18,9 +20,9 @@
 -    "pytest-cov",
      "pytest-xdist",
      "pretend",
- ]
-@@ -85,7 +83,7 @@ line-length = 79
- target-version = ["py37"]
+     "certifi",
+@@ -92,7 +90,7 @@ rust-version = ">=1.63.0"
+ 
  
  [tool.pytest.ini_options]
 -addopts = "-r s --capture=no --strict-markers --benchmark-disable"
@@ -28,7 +30,7 @@
  console_output_style = "progress-even-when-capture-no"
  markers = [
      "skip_fips: this test is not executed in FIPS mode",
-@@ -107,33 +105,6 @@ module = [
+@@ -114,33 +112,6 @@ module = [
  ]
  ignore_missing_imports = true
  
@@ -60,11 +62,13 @@
 -]
 -
  [tool.ruff]
- # UP006: Minimum Python 3.9
- # UP007, UP038: Minimum Python 3.10
---- a/src/cryptography.egg-info/requires.txt
-+++ b/src/cryptography.egg-info/requires.txt
-@@ -26,8 +26,6 @@ bcrypt>=3.1.5
+ ignore = ['N818']
+ select = ['E', 'F', 'I', 'N', 'W', 'UP', 'RUF']
+Index: cryptography-42.0.1/src/cryptography.egg-info/requires.txt
+===================================================================
+--- cryptography-42.0.1.orig/src/cryptography.egg-info/requires.txt
++++ cryptography-42.0.1/src/cryptography.egg-info/requires.txt
+@@ -28,8 +28,6 @@ bcrypt>=3.1.5
  
  [test]
  pytest>=6.2.0
@@ -72,10 +76,12 @@
 -pytest-cov
  pytest-xdist
  pretend
- 
---- a/tests/bench/test_aead.py
-+++ b/tests/bench/test_aead.py
-@@ -19,84 +19,84 @@ from ..hazmat.primitives.test_aead impor
+ certifi
+Index: cryptography-42.0.1/tests/bench/test_aead.py
+===================================================================
+--- cryptography-42.0.1.orig/tests/bench/test_aead.py
++++ cryptography-42.0.1/tests/bench/test_aead.py
+@@ -26,84 +26,84 @@ def _aead_supported(cls):
      not _aead_supported(ChaCha20Poly1305),
      reason="Requires OpenSSL with ChaCha20Poly1305 support",
  )
@@ -180,8 +186,10 @@
      ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
 -    benchmark(aes.decrypt, b"\x00" * 12, ct, None)
 +    aes.decrypt(b"\x00" * 12, ct, None)
---- a/tests/bench/test_ec_load.py
-+++ b/tests/bench/test_ec_load.py
+Index: cryptography-42.0.1/tests/bench/test_ec_load.py
+===================================================================
+--- cryptography-42.0.1.orig/tests/bench/test_ec_load.py
++++ cryptography-42.0.1/tests/bench/test_ec_load.py
 @@ -5,9 +5,9 @@
  from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
  
@@ -196,8 +204,10 @@
 -    benchmark(EC_KEY_SECP256R1.private_key)
 +def test_load_ec_private_numbers():
 +    EC_KEY_SECP256R1.private_key()
---- a/tests/bench/test_hashes.py
-+++ b/tests/bench/test_hashes.py
+Index: cryptography-42.0.1/tests/bench/test_hashes.py
+===================================================================
+--- cryptography-42.0.1.orig/tests/bench/test_hashes.py
++++ cryptography-42.0.1/tests/bench/test_hashes.py
 @@ -5,10 +5,10 @@
  from cryptography.hazmat.primitives import hashes
  
@@ -211,8 +221,10 @@
  
 -    benchmark(bench)
 +    bench()
---- a/tests/bench/test_hmac.py
-+++ b/tests/bench/test_hmac.py
+Index: cryptography-42.0.1/tests/bench/test_hmac.py
+===================================================================
+--- cryptography-42.0.1.orig/tests/bench/test_hmac.py
++++ cryptography-42.0.1/tests/bench/test_hmac.py
 @@ -5,10 +5,10 @@
  from cryptography.hazmat.primitives import hashes, hmac
  
@@ -226,16 +238,18 @@
  
 -    benchmark(bench)
 +    bench()
---- a/tests/bench/test_x509.py
-+++ b/tests/bench/test_x509.py
-@@ -9,34 +9,34 @@ from cryptography import x509
+Index: cryptography-42.0.1/tests/bench/test_x509.py
+===================================================================
+--- cryptography-42.0.1.orig/tests/bench/test_x509.py
++++ cryptography-42.0.1/tests/bench/test_x509.py
+@@ -13,40 +13,40 @@ from cryptography import x509
  from ..utils import load_vectors_from_file
  
  
--def test_object_identier_constructor(benchmark):
+-def test_object_identifier_constructor(benchmark):
 -    benchmark(x509.ObjectIdentifier, "1.3.6.1.4.1.11129.2.4.5")
-+def test_object_identier_constructor():
-+    x509.ObjectIdentifier("1.3.6.1.4.1.11129.2.4.5")
++def test_object_identifier_constructor():
++    x509.ObjectIdentifier, "1.3.6.1.4.1.11129.2.4.5"
  
  
 -def test_aki_public_bytes(benchmark):
@@ -246,7 +260,7 @@
          authority_cert_serial_number=None,
      )
 -    benchmark(aki.public_bytes)
-+    aki.public_bytes()
++    aki.public_bytes
  
  
 -def test_load_der_certificate(benchmark):
@@ -258,7 +272,7 @@
      )
  
 -    benchmark(x509.load_der_x509_certificate, cert_bytes)
-+    x509.load_der_x509_certificate(cert_bytes)
++    x509.load_der_x509_certificate, cert_bytes
  
  
 -def test_load_pem_certificate(benchmark):
@@ -270,5 +284,18 @@
      )
  
 -    benchmark(x509.load_pem_x509_certificate, cert_bytes)
-+    x509.load_pem_x509_certificate(cert_bytes)
++    x509.load_pem_x509_certificate, cert_bytes
+ 
+ 
+-def test_verify_docs_python_org(benchmark, pytestconfig):
++def test_verify_docs_python_org(pytestconfig):
+     limbo_root = pytestconfig.getoption("--x509-limbo-root", skip=True)
+     with open(os.path.join(limbo_root, "limbo.json"), "rb") as f:
+         [testcase] = [
+@@ -78,4 +78,4 @@ def test_verify_docs_python_org(benchmar
+         )
+         verifier.verify(leaf, intermediates)
+ 
+-    benchmark(bench)
++    bench
 

++++++ vendor.tar.zst ++++++
Binary files /var/tmp/diff_new_pack.vz01HA/_old and 
/var/tmp/diff_new_pack.vz01HA/_new differ

Reply via email to