Changelog for
python312-pyOpenSSL-24.2.1-1.1.noarch.rpm :
* Tue Jul 23 2024 Adrian Schröter
- 24.2.1:
* Deprecated OpenSSL.crypto.X509Req, OpenSSL.crypto.load_certificate_request, OpenSSL.crypto.dump_certificate_request. Instead, cryptography.x509.CertificateSigningRequest,s cryptography.x509.CertificateSigningRequestBuilder,s cryptography.x509.load_der_x509_csr,s or cryptography.x509.load_pem_x509_csr should be used.
* Added type hints for the SSL module. #1308.
* Changed OpenSSL.crypto.PKey.from_cryptography_key to accept public and private EC, ED25519, ED448 keys
* Sat Mar 16 2024 Dirk Müller - update to 24.1.0:
* Removed the deprecated OpenSSL.crypto.PKCS12 and OpenSSL.crypto.NetscapeSPKI. OpenSSL.crypto.PKCS12 may be replaced by the PKCS#12 APIs in the cryptography package.
* Mon Jan 29 2024 Dirk Müller - update to 24.0.0:
* Added OpenSSL.SSL.Connection.get_selected_srtp_profile to determine which SRTP profile was negotiated. #1279.
* Mon Nov 27 2023 Dirk Müller - update to 23.3.0:
* Dropped support for Python 3.6.
* The minimum ``cryptography`` version is now 41.0.5.
* Removed ``OpenSSL.crypto.loads_pkcs7`` and ``OpenSSL.crypto.loads_pkcs12`` which had been deprecated for 3 years.
* Added ``OpenSSL.SSL.OP_LEGACY_SERVER_CONNECT`` to allow legacy insecure renegotiation between OpenSSL and unpatched servers.
* Deprecated ``OpenSSL.crypto.PKCS12`` (which was intended to have been deprecated at the same time as ``OpenSSL.crypto.load_pkcs12``).
* Deprecated ``OpenSSL.crypto.NetscapeSPKI``.
* Deprecated ``OpenSSL.crypto.CRL``
* Deprecated ``OpenSSL.crypto.Revoked``
* Deprecated ``OpenSSL.crypto.load_crl`` and ``OpenSSL.crypto.dump_crl``
* Deprecated ``OpenSSL.crypto.sign`` and ``OpenSSL.crypto.verify``
* Deprecated ``OpenSSL.crypto.X509Extension``
* Changed ``OpenSSL.crypto.X509Store.add_crl`` to also accept
* ``cryptography``\'s ``x509.CertificateRevocationList`` arguments in addition
* to the now deprecated ``OpenSSL.crypto.CRL`` arguments.
* Fixed ``test_set_default_verify_paths`` test so that it is skipped if no network connection is available.
* Mon Jun 19 2023 Dirk Müller - update to 23.2.0:
* Removed ``X509StoreFlags.NOTIFY_POLICY``.
* ``cryptography`` maximum version has been increased to 41.0.x.
* Invalid versions are now rejected in ``OpenSSL.crypto.X509Req.set_version``.
* Added ``X509VerificationCodes`` to ``OpenSSL.SSL``.
* Fri Apr 21 2023 Dirk Müller - add sle15_python_module_pythons (jsc#PED-68)
* Thu Apr 13 2023 Matej Cepl - Make calling of %{sle15modernpython} optional.
* Tue Mar 28 2023 Dirk Müller - update to 23.1.1:
* Worked around an issue in OpenSSL 3.1.0 which caused `X509Extension.get_short_name` to raise an exception when no short name was known to OpenSSL.
* Mon Mar 27 2023 Dirk Müller - update to 23.1.0:
* ``cryptography`` maximum version has been increased to 40.0.x.
* Add ``OpenSSL.SSL.Connection.DTLSv1_get_timeout`` and ``OpenSSL.SSL.Connection.DTLSv1_handle_timeout`` to support DTLS timeouts `#1180
* Mon Jan 02 2023 Dirk Müller - update to 23.0.0:
* Add ``OpenSSL.SSL.X509StoreFlags.PARTIAL_CHAIN`` constant to allow for users to perform certificate verification on partial certificate chains.
* ``cryptography`` maximum version has been increased to 39.0.x.- drop pyOpenSSL-pr1158-conditional-__all__.patch (upstream)
* Fri Oct 21 2022 Ben Greiner - Upstream post-release doc fix (gh#pyca/pyopenssl#1150)
* The minimum cryptography version is now 38.0.x (and we now pin releases against cryptography major versions to prevent future breakage)- Add pyOpenSSL-pr1158-conditional-__all__.patch gh#pyca/pyopenssl#1158
* Thu Sep 29 2022 Dirk Müller - update to 22.1.0:
* Remove support for SSLv2 and SSLv3.
* The minimum ``cryptography`` version is now 37.0.2.
* The ``OpenSSL.crypto.X509StoreContextError`` exception has been refactored, changing its internal attributes.
* Add ``OpenSSL.SSL.Connection.set_verify`` and ``OpenSSL.SSL.Connection.get_verify_mode`` to override the context object\'s verification flags.
* Add ``OpenSSL.SSL.Connection.use_certificate`` and ``OpenSSL.SSL.Connection.use_privatekey`` to set a certificate per connection (and not just per context)
* Wed Jun 01 2022 Steve Kowalik - Shift BuildRequires on openssl, it\'s only required for tests.
* Fri Feb 04 2022 Dirk Müller - update to 22.0.0: - Drop support for Python 2.7. - The minimum ``cryptography`` version is now 35.0. - Expose wrappers for some `DTLS `_ primitives.- drop check_inv_ALPN_lists.patch: upstream
* Thu Dec 09 2021 Steve Kowalik - Inject multibuild to avoid a build loop.
* Sat Oct 30 2021 Matej Cepl - Add check_inv_ALPN_lists.patch checks for invalid ALPN lists before calling OpenSSL (gh#pyca/pyopenssl#1056).
* Tue Oct 26 2021 Dirk Müller - update to 21.0.0 (bsc#1200771, jsc#SLE-24519): - The minimum ``cryptography`` version is now 3.3. - Drop support for Python 3.5 - Raise an error when an invalid ALPN value is set. - Added ``OpenSSL.SSL.Context.set_min_proto_version`` and ``OpenSSL.SSL.Context.set_max_proto_version`` - Updated ``to_cryptography`` and ``from_cryptography`` methods to support an upcoming release of ``cryptography`` without raising deprecation warnings.
* Mon Feb 01 2021 Dirk Müller - update to 20.0.1: - Fixed compatibility with OpenSSL 1.1.0.