Changelog for
python312-dkimpy-1.1.8-1.1.noarch.rpm :
* Sat Aug 31 2024 Dirk Müller
- update to 1.1.8:
* Correctly handle verification of signatures without t= (timestamp) and with x= (expiration); both are optional
* Fix error in validate_signature_fields which prevented signature expiration from being properly evaluated
* Correct ARC signing for AR headers with authres-version or comments before resinfo
* Correct line separtor after AAR header field
* Correct signature in ARC-Seal on LF as linesep
* Sat Apr 20 2024 Dirk Müller - update to 1.1.6:
* Use raw byte string for regex; fixes SyntaxWarning in Python 3.12 due to invalid escape sequence
* Thu Feb 29 2024 Steve Kowalik - Switch to autosetup and pyproject macros.- No more greedy globs in %files.
* Sat Jan 06 2024 Dirk Müller - update to 1.1.5:
* Use dns.resolver.resolve instead of dns.resolver.query due to deprecation
* Treat dns.resolver.NoNameservers like NXDOMAIN (not an error)
* Confine errors from dnspython to dnsplug and use dkim errors, since dkim.__init__.py doesn\'t import dns and needs dkim errors
* Catch nacl.exceptions.ValueError and raise KeyFormatError, similar to how RSA key errors are treated
* Create ed25519 key files with secure permissions to avoid risk of insecure chmode call/race condition
* Properly cleanup temporary directories in tests
* Verify correct AMS header is used for ARC seal verification (André Cruz)
* Document dropping of Python 2 support
* Fix traceback when attempting to verify an unsigned message using async verify
* Add domain validity check for ascii domains (no specials)
* Add option to specify index number of signature to verify to dkimverify
* Correct signature indexing error introduced in 1.0.0 that prevents verification of multiple signatures in a single message
* Correct dkim.verify processing to avoid errors when verifying messages with no DKIM signatures
* Update dnsplug for DNS Python (dns) 2.0 compatibility
* Provide more specific error message when ed25519 private key is invalid
* Add support for PKCS#8 for private keys, openssl 3 default
* Add limitations section to README to document current IDN status
* Add USE_ASYNC flag to allow async to be disabled when aiodns is installed (LP: #1954331)
* Add new dkim.DnsTimeoutError class to report queried domain and selector along with timeout error from dnspython
* Invalid Authentication-Results header fields are ignored for ARC signing
* Sun Jun 18 2023 Andreas Schneider - Use sle15_python_module_pythons
* Tue Dec 08 2020 Jiri Slaby - update to 1.0.5 - Update dnsplug for DNS Python (dns) 2.0 compatibility (LP: #1888583) - Fix AATTparam srv_id typos (LP: #1890532) - Correct dkim.verify processing to avoid errors when verifying messages with no DKIM signatures
* Tue May 26 2020 Petr Gajdos - %python3_only -> %python_alternative
* Fri Apr 03 2020 Marketa Calabkova - update to 1.0.3
* dknewkey: On posix operating systems set file permissions to 600 for ed25519 private key files (as is already done for RSA) (LP: #1857827)
* Set minimum dnspython version to 1.16 because previous versions can not support the timeout parameter (LP: #1856546)
* Follow CNAMES when looking up key records when using DNS (pydns)
* Add support for RFC 8460 tlsrpt DKIM signature processing (LP: #1847020)
* Add async support with aiodns for DKIM verification (ARC not supported)
* Add new timeout parameter to enable DNS lookup timeouts to be adjusted
* Add new DKIM.present function to allow applications to test if a DKIM signature is present without doing validation (LP: #1851141)
* Support signature verification with RSAPublicKey formatted keys since, although rare, they are RFC 6376 specified (LP: #1851862)
* Drop usage of pymilter Milter.dns in dnsplug since it doesn\'t support having a timeout passed to it
* Catch binascii related key format errors (LP: #1854477)
* Ignore unknown service types in key records (LP: #1847020)
* Add LICENSE to MANIFEST.in so it is included in the tarball- Drop shipped LICENSE file- Reapplied patch no-optional.patch
* Mon Dec 02 2019 pgajdosAATTsuse.com- call spec-cleaner
* Wed Sep 25 2019 Tomáš Chvátal - Drop the pynacl workaround as fix was submitted to the TW integration