Compare commits

2 Commits
main ... 1.1

7 changed files with 87 additions and 246 deletions

View File

@@ -1,7 +1,7 @@
<services> <services>
<service name="download_files" mode="manual"/> <service name="download_files" mode="manual"/>
<service name="cargo_vendor" mode="manual"> <service name="cargo_vendor" mode="manual">
<param name="srcdir">cryptography-*</param> <param name="srcdir">cryptography-42.0.4/src/rust</param>
<param name="compression">zst</param> <param name="compression">zst</param>
</service> </service>
</services> </services>

BIN
cryptography-42.0.4.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

BIN
cryptography-44.0.0.tar.gz (Stored with Git LFS)

Binary file not shown.

View File

@@ -1,17 +1,28 @@
diff -ruN cryptography-44.0.0.orig/pyproject.toml cryptography-44.0.0/pyproject.toml ---
--- cryptography-44.0.0.orig/pyproject.toml 2025-01-26 18:48:58.157318687 +0800 pyproject.toml | 31 -------------------------
+++ cryptography-44.0.0/pyproject.toml 2025-01-26 18:56:46.010819868 +0800 src/cryptography.egg-info/requires.txt | 2 -
@@ -67,8 +67,6 @@ tests/bench/test_aead.py | 40 ++++++++++++++++-----------------
tests/bench/test_ec_load.py | 8 +++---
tests/bench/test_hashes.py | 4 +--
tests/bench/test_hmac.py | 4 +--
tests/bench/test_x509.py | 16 ++++++-------
7 files changed, 37 insertions(+), 68 deletions(-)
Index: cryptography-42.0.1/pyproject.toml
===================================================================
--- cryptography-42.0.1.orig/pyproject.toml
+++ cryptography-42.0.1/pyproject.toml
@@ -71,8 +71,6 @@ ssh = ["bcrypt >=3.1.5"]
nox = ["nox"]
test = [ test = [
"cryptography_vectors==44.0.0", "pytest >=6.2.0",
"pytest >=7.4.0", - "pytest-benchmark",
- "pytest-benchmark >=4.0", - "pytest-cov",
- "pytest-cov >=2.10.1", "pytest-xdist",
"pytest-xdist >=3.5.0", "pretend",
"pretend >=0.7", "certifi",
"certifi >=2024", @@ -92,7 +90,7 @@ rust-version = ">=1.63.0"
@@ -118,7 +116,7 @@
]
[tool.pytest.ini_options] [tool.pytest.ini_options]
-addopts = "-r s --capture=no --strict-markers --benchmark-disable" -addopts = "-r s --capture=no --strict-markers --benchmark-disable"
@@ -19,7 +30,7 @@ diff -ruN cryptography-44.0.0.orig/pyproject.toml cryptography-44.0.0/pyproject.
console_output_style = "progress-even-when-capture-no" console_output_style = "progress-even-when-capture-no"
markers = [ markers = [
"skip_fips: this test is not executed in FIPS mode", "skip_fips: this test is not executed in FIPS mode",
@@ -140,33 +138,6 @@ @@ -114,33 +112,6 @@ module = [
] ]
ignore_missing_imports = true ignore_missing_imports = true
@@ -38,7 +49,7 @@ diff -ruN cryptography-44.0.0.orig/pyproject.toml cryptography-44.0.0/pyproject.
- "*.nox\\*\\Lib\\site-packages\\cryptography", - "*.nox\\*\\Lib\\site-packages\\cryptography",
- "*.nox/pypy/site-packages/cryptography", - "*.nox/pypy/site-packages/cryptography",
-] -]
-tests = [ -tests =[
- "tests/", - "tests/",
- "*tests\\", - "*tests\\",
-] -]
@@ -51,12 +62,26 @@ diff -ruN cryptography-44.0.0.orig/pyproject.toml cryptography-44.0.0/pyproject.
-] -]
- -
[tool.ruff] [tool.ruff]
line-length = 79 ignore = ['N818']
select = ['E', 'F', 'I', 'N', 'W', 'UP', 'RUF']
Index: cryptography-42.0.1/src/cryptography.egg-info/requires.txt
===================================================================
--- cryptography-42.0.1.orig/src/cryptography.egg-info/requires.txt
+++ cryptography-42.0.1/src/cryptography.egg-info/requires.txt
@@ -28,8 +28,6 @@ bcrypt>=3.1.5
diff -ruN cryptography-44.0.0.orig/tests/bench/test_aead.py cryptography-44.0.0/tests/bench/test_aead.py [test]
--- cryptography-44.0.0.orig/tests/bench/test_aead.py 2025-01-26 18:48:58.218037106 +0800 pytest>=6.2.0
+++ cryptography-44.0.0/tests/bench/test_aead.py 2025-01-26 18:57:45.747649958 +0800 -pytest-benchmark
@@ -26,84 +26,84 @@ -pytest-cov
pytest-xdist
pretend
certifi
Index: cryptography-42.0.1/tests/bench/test_aead.py
===================================================================
--- cryptography-42.0.1.orig/tests/bench/test_aead.py
+++ cryptography-42.0.1/tests/bench/test_aead.py
@@ -26,84 +26,84 @@ def _aead_supported(cls):
not _aead_supported(ChaCha20Poly1305), not _aead_supported(ChaCha20Poly1305),
reason="Requires OpenSSL with ChaCha20Poly1305 support", reason="Requires OpenSSL with ChaCha20Poly1305 support",
) )
@@ -161,9 +186,10 @@ diff -ruN cryptography-44.0.0.orig/tests/bench/test_aead.py cryptography-44.0.0/
ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None) ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
- benchmark(aes.decrypt, b"\x00" * 12, ct, None) - benchmark(aes.decrypt, b"\x00" * 12, ct, None)
+ aes.decrypt(b"\x00" * 12, ct, None) + aes.decrypt(b"\x00" * 12, ct, None)
diff -ruN cryptography-44.0.0.orig/tests/bench/test_ec_load.py cryptography-44.0.0/tests/bench/test_ec_load.py Index: cryptography-42.0.1/tests/bench/test_ec_load.py
--- cryptography-44.0.0.orig/tests/bench/test_ec_load.py 2025-01-26 18:48:58.218037106 +0800 ===================================================================
+++ cryptography-44.0.0/tests/bench/test_ec_load.py 2025-01-26 18:57:45.748641371 +0800 --- cryptography-42.0.1.orig/tests/bench/test_ec_load.py
+++ cryptography-42.0.1/tests/bench/test_ec_load.py
@@ -5,9 +5,9 @@ @@ -5,9 +5,9 @@
from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1 from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
@@ -178,9 +204,10 @@ diff -ruN cryptography-44.0.0.orig/tests/bench/test_ec_load.py cryptography-44.0
- benchmark(EC_KEY_SECP256R1.private_key) - benchmark(EC_KEY_SECP256R1.private_key)
+def test_load_ec_private_numbers(): +def test_load_ec_private_numbers():
+ EC_KEY_SECP256R1.private_key() + EC_KEY_SECP256R1.private_key()
diff -ruN cryptography-44.0.0.orig/tests/bench/test_hashes.py cryptography-44.0.0/tests/bench/test_hashes.py Index: cryptography-42.0.1/tests/bench/test_hashes.py
--- cryptography-44.0.0.orig/tests/bench/test_hashes.py 2025-01-26 18:48:58.218037106 +0800 ===================================================================
+++ cryptography-44.0.0/tests/bench/test_hashes.py 2025-01-26 18:57:45.748943321 +0800 --- cryptography-42.0.1.orig/tests/bench/test_hashes.py
+++ cryptography-42.0.1/tests/bench/test_hashes.py
@@ -5,10 +5,10 @@ @@ -5,10 +5,10 @@
from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives import hashes
@@ -194,9 +221,10 @@ diff -ruN cryptography-44.0.0.orig/tests/bench/test_hashes.py cryptography-44.0.
- benchmark(bench) - benchmark(bench)
+ bench() + bench()
diff -ruN cryptography-44.0.0.orig/tests/bench/test_hmac.py cryptography-44.0.0/tests/bench/test_hmac.py Index: cryptography-42.0.1/tests/bench/test_hmac.py
--- cryptography-44.0.0.orig/tests/bench/test_hmac.py 2025-01-26 18:48:58.218037106 +0800 ===================================================================
+++ cryptography-44.0.0/tests/bench/test_hmac.py 2025-01-26 18:57:45.749219559 +0800 --- cryptography-42.0.1.orig/tests/bench/test_hmac.py
+++ cryptography-42.0.1/tests/bench/test_hmac.py
@@ -5,10 +5,10 @@ @@ -5,10 +5,10 @@
from cryptography.hazmat.primitives import hashes, hmac from cryptography.hazmat.primitives import hashes, hmac
@@ -210,10 +238,11 @@ diff -ruN cryptography-44.0.0.orig/tests/bench/test_hmac.py cryptography-44.0.0/
- benchmark(bench) - benchmark(bench)
+ bench() + bench()
diff -ruN cryptography-44.0.0.orig/tests/bench/test_x509.py cryptography-44.0.0/tests/bench/test_x509.py Index: cryptography-42.0.1/tests/bench/test_x509.py
--- cryptography-44.0.0.orig/tests/bench/test_x509.py 2025-01-26 18:48:58.218037106 +0800 ===================================================================
+++ cryptography-44.0.0/tests/bench/test_x509.py 2025-01-26 18:57:45.749471922 +0800 --- cryptography-42.0.1.orig/tests/bench/test_x509.py
@@ -13,40 +13,40 @@ +++ cryptography-42.0.1/tests/bench/test_x509.py
@@ -13,40 +13,40 @@ from cryptography import x509
from ..utils import load_vectors_from_file from ..utils import load_vectors_from_file
@@ -263,7 +292,7 @@ diff -ruN cryptography-44.0.0.orig/tests/bench/test_x509.py cryptography-44.0.0/
limbo_root = pytestconfig.getoption("--x509-limbo-root", skip=True) limbo_root = pytestconfig.getoption("--x509-limbo-root", skip=True)
with open(os.path.join(limbo_root, "limbo.json"), "rb") as f: with open(os.path.join(limbo_root, "limbo.json"), "rb") as f:
[testcase] = [ [testcase] = [
@@ -78,4 +78,4 @@ @@ -78,4 +78,4 @@ def test_verify_docs_python_org(benchmar
) )
verifier.verify(leaf, intermediates) verifier.verify(leaf, intermediates)

View File

@@ -1,189 +1,7 @@
------------------------------------------------------------------- -------------------------------------------------------------------
Sun Jan 26 10:59:13 UTC 2025 - Soc Virnyl Estela <uncomfyhalomacro@opensuse.org> Wed May 14 11:04:35 UTC 2025 - Nico Krapp <nico.krapp@suse.com>
- Update to version 44.0.0: - Update vendor tarball to fix CVE-2025-3416 (bsc#1242631)
* BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.9.
* Deprecated Python 3.7 support. Python 3.7 is no longer supported by
the Python core team. Support for Python 3.7 will be removed in a future
cryptography release.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.0.
* macOS wheels are now built against the macOS 10.13 SDK. Users on older
versions of macOS should upgrade, or they will need to build cryptography
themselves.
* Enforce the RFC 5280 requirement that extended key usage extensions must not be empty.
* Added support for timestamp extraction to the :class:`~cryptography.fernet.MultiFernet` class.
* Relax the Authority Key Identifier requirements on root CA certificates
during X.509 verification to allow fields permitted by RFC 5280 but
forbidden by the CA/Browser BRs.
* Added support for
:class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using
OpenSSL 3.2.0+.
* Added support for the :class:`~cryptography.x509.Admissions` certificate extension.
* Added basic support for PKCS7 decryption (including S/MIME 3.2) via
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`,
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`,
and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`.
- Update specfile to accommodate new project structure at version 44.0.0
- Update no-pytest_benchmark.patch
-------------------------------------------------------------------
Fri Nov 8 10:08:46 UTC 2024 - Ben Greiner <code@bnavigator.de>
- Fix requires_eq replacement for distributions which do not have
python3-cffi installed (such as SLE15 python module pythons)
* gh#openSUSE/python-rpm-macros#185
- Remove outdated section in description
-------------------------------------------------------------------
Tue Nov 5 08:03:40 UTC 2024 - Dominique Leuenberger <dimstar@opensuse.org>
- Avoid using requires_eq, which after the last modifications
conflicts with python singlespec (order of expansion).
-------------------------------------------------------------------
Tue Oct 22 13:26:21 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 43.0.3:
* Fixed release metadata for cryptography-vectors
* Fixed compilation when using LibreSSL 4.0.0.
-------------------------------------------------------------------
Sat Sep 28 19:45:04 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 43.0.1:
* Updated Windows, macOS, and Linux wheels to be compiled with
OpenSSL 3.3.2.
-------------------------------------------------------------------
Sun Sep 15 08:51:52 UTC 2024 - Andreas Schneider <asn@cryptomilk.org>
- Fix building on SLE based distributions
-------------------------------------------------------------------
Mon Aug 12 20:36:00 UTC 2024 - Matej Cepl <mcepl@cepl.eu>
- Fix building optimized binaries with debuginfo.
-------------------------------------------------------------------
Wed Jul 31 21:45:43 UTC 2024 - Matej Cepl <mcepl@cepl.eu>
- Update building of Rust modules to use modern cargo_vendor
service
- Remove unneeded use-offline-build.patch
-------------------------------------------------------------------
Fri Jul 26 10:33:45 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 43.0.0:
* BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1e
has been removed. Users on older version of OpenSSL will
need to upgrade.
* BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.8.
* Updated Windows, macOS, and Linux wheels to be compiled with
OpenSSL 3.3.1.
* Updated the minimum supported Rust version (MSRV) to 1.65.0,
from 1.63.0.
* :func:`~cryptography.hazmat.primitives.asymmetric.rsa.generat
e_private_key` now enforces a minimum RSA key size of
1024-bit. Note that 1024-bit is still considered insecure,
users should generally use a key size of 2048-bits.
* :func:`~cryptography.hazmat.primitives.serialization.pkcs7.se
rialize_certificates` now emits ASN.1 that more closely
follows the recommendations in RFC 2315.
* Added new :doc:`/hazmat/decrepit/index` module which contains
outdated and insecure cryptographic primitives. :class:`~cryp
tography.hazmat.primitives.ciphers.algorithms.CAST5`, :class:
`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`, :c
lass:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA
`, and :class:`~cryptography.hazmat.primitives.ciphers.algori
thms.Blowfish`, which were deprecated in 37.0.0, have been
added to this module. They will be removed from the cipher
module in 45.0.0.
* Moved :class:`~cryptography.hazmat.primitives.ciphers.algorit
hms.TripleDES` and :class:`~cryptography.hazmat.primitives.ci
phers.algorithms.ARC4` into :doc:`/hazmat/decrepit/index` and
deprecated them in the cipher module. They will be removed
from the cipher module in 48.0.0.
* Added support for deterministic
:class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDSA`
(RFC 6979)
* Added support for client certificate verification to the
:mod:`X.509 path validation <cryptography.x509.verification>`
APIs in the form of
:class:`~cryptography.x509.verification.ClientVerifier`,
:class:`~cryptography.x509.verification.VerifiedClient`, and
PolicyBuilder :meth:`~cryptography.x509.verification.PolicyBu
ilder.build_client_verifier`.
* Added Certificate :attr:`~cryptography.x509.Certificate.publi
c_key_algorithm_oid` and Certificate Signing Request :attr:`~
cryptography.x509.CertificateSigningRequest.public_key_algori
thm_oid` to determine the
:class:`~cryptography.hazmat._oid.PublicKeyAlgorithmOID`
Object Identifier of the public key found inside the
certificate.
* Added :attr:`~cryptography.x509.InvalidityDate.invalidity_dat
e_utc`, a timezone-aware alternative to the naïve datetime
attribute
:attr:`~cryptography.x509.InvalidityDate.invalidity_date`.
* Added support for parsing empty DN string in
:meth:`~cryptography.x509.Name.from_rfc4514_string`.
* Added the following properties that return timezone-aware
datetime objects:
:meth:`~cryptography.x509.ocsp.OCSPResponse.produced_at_utc`,
:meth:`~cryptography.x509.ocsp.OCSPResponse.revocation_time_u
tc`,
:meth:`~cryptography.x509.ocsp.OCSPResponse.this_update_utc`,
:meth:`~cryptography.x509.ocsp.OCSPResponse.next_update_utc`,
:meth:`~cryptography.x509.ocsp.OCSPSingleResponse.revocation_
time_utc`, :meth:`~cryptography.x509.ocsp.OCSPSingleResponse.
this_update_utc`, :meth:`~cryptography.x509.ocsp.OCSPSingleRe
sponse.next_update_utc`, These are timezone-aware variants of
existing properties that return naïve datetime objects.
* Added :func:`~cryptography.hazmat.primitives.asymmetric.rsa.r
sa_recover_private_exponent`
* Added :meth:`~cryptography.hazmat.primitives.ciphers.CipherCo
ntext.reset_nonce` for altering the nonce of a cipher context
without initializing a new instance. See the docs for
additional restrictions.
* :class:`~cryptography.x509.NameAttribute` now raises an
exception when attempting to create a common name whose
length is shorter or longer than RFC 5280 permits.
* Added basic support for PKCS7 encryption (including SMIME)
via :class:`~cryptography.hazmat.primitives.serialization.pkc
s7.PKCS7EnvelopeBuilder`.
- add use-offline-build.patch
-------------------------------------------------------------------
Sat Jun 8 12:04:15 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 42.0.8:
* Updated Windows, macOS, and Linux wheels to be compiled with
OpenSSL 3.2.2.
-------------------------------------------------------------------
Tue May 7 16:14:05 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 42.0.7:
* Restored Windows 7 compatibility for our pre-built wheels.
Note that we do not test on Windows 7 and wheels for our next
release will not support it. Microsoft no longer provides
support for Windows 7 and users are encouraged to upgrade.
-------------------------------------------------------------------
Tue May 7 07:34:43 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 42.0.6:
* Fixed compilation when using LibreSSL 3.9.1.
-------------------------------------------------------------------
Tue Apr 2 13:19:19 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 42.0.5:
* Limit the number of name constraint checks that will be
performed in :mod:`X.509 path validation
<cryptography.x509.verification>` to protect against denial
of service attacks.
* Upgrade pyo3 version, which fixes building on PowerPC.
------------------------------------------------------------------- -------------------------------------------------------------------
Thu Feb 22 17:10:39 UTC 2024 - Daniel Garcia <daniel.garcia@suse.com> Thu Feb 22 17:10:39 UTC 2024 - Daniel Garcia <daniel.garcia@suse.com>

View File

@@ -1,7 +1,7 @@
# #
# spec file for package python-cryptography # spec file for package python-cryptography
# #
# Copyright (c) 2025 SUSE LLC # Copyright (c) 2024 SUSE LLC
# #
# All modifications and additions to the file contributed by third parties # All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed # remain the property of their copyright owners, unless otherwise agreed
@@ -27,8 +27,7 @@
%endif %endif
%{?sle15_python_module_pythons} %{?sle15_python_module_pythons}
Name: python-cryptography%{psuffix} Name: python-cryptography%{psuffix}
# ALWAYS KEEP IN SYNC WITH python-cryptography-vectors! Version: 42.0.4
Version: 44.0.0
Release: 0 Release: 0
Summary: Python library which exposes cryptographic recipes and primitives Summary: Python library which exposes cryptographic recipes and primitives
License: Apache-2.0 OR BSD-3-Clause License: Apache-2.0 OR BSD-3-Clause
@@ -44,13 +43,11 @@ Patch4: no-pytest_benchmark.patch
BuildRequires: %{python_module cffi >= 1.12} BuildRequires: %{python_module cffi >= 1.12}
BuildRequires: %{python_module devel} BuildRequires: %{python_module devel}
BuildRequires: %{python_module exceptiongroup} BuildRequires: %{python_module exceptiongroup}
BuildRequires: %{python_module maturin}
BuildRequires: %{python_module pip} BuildRequires: %{python_module pip}
BuildRequires: %{python_module setuptools-rust >= 1.7.0} BuildRequires: %{python_module setuptools-rust >= 1.7.0}
BuildRequires: %{python_module setuptools} BuildRequires: %{python_module setuptools}
BuildRequires: %{python_module wheel} BuildRequires: %{python_module wheel}
BuildRequires: cargo >= 1.56.0 BuildRequires: cargo >= 1.56.0
BuildRequires: cargo-packaging
BuildRequires: fdupes BuildRequires: fdupes
BuildRequires: libopenssl-devel BuildRequires: libopenssl-devel
BuildRequires: pkgconfig BuildRequires: pkgconfig
@@ -60,10 +57,8 @@ BuildRequires: zstd
BuildRequires: pkgconfig(libffi) BuildRequires: pkgconfig(libffi)
# python-base is not enough, we need the _ssl module # python-base is not enough, we need the _ssl module
Requires: python Requires: python
Requires: python-bcrypt %requires_eq python-cffi
Requires: python-cffi = %(rpm -q --whatprovides python-cffi --qf "%%{version}")
%if %{with test} %if %{with test}
BuildRequires: %{python_module bcrypt}
BuildRequires: %{python_module certifi} BuildRequires: %{python_module certifi}
BuildRequires: %{python_module cryptography >= %{version}} BuildRequires: %{python_module cryptography >= %{version}}
BuildRequires: %{python_module cryptography-vectors = %{version}} BuildRequires: %{python_module cryptography-vectors = %{version}}
@@ -71,7 +66,6 @@ BuildRequires: %{python_module hypothesis >= 1.11.4}
BuildRequires: %{python_module iso8601} BuildRequires: %{python_module iso8601}
BuildRequires: %{python_module pretend} BuildRequires: %{python_module pretend}
BuildRequires: %{python_module pytest > 6.0} BuildRequires: %{python_module pytest > 6.0}
BuildRequires: %{python_module pytest-benchmark}
BuildRequires: %{python_module pytest-subtests} BuildRequires: %{python_module pytest-subtests}
BuildRequires: %{python_module pytest-xdist} BuildRequires: %{python_module pytest-xdist}
BuildRequires: %{python_module pytz} BuildRequires: %{python_module pytz}
@@ -79,6 +73,11 @@ BuildRequires: %{python_module pytz}
%python_subpackages %python_subpackages
%description %description
cryptography is a package designed to expose cryptographic
recipes and primitives to Python developers. Our goal is
for it to be your "cryptographic standard library". It
supports Python 2.7, Python 3.4+, and PyPy-5.3+.
cryptography includes both high level recipes, and low cryptography includes both high level recipes, and low
level interfaces to common cryptographic algorithms such as level interfaces to common cryptographic algorithms such as
symmetric ciphers, message digests and key derivation symmetric ciphers, message digests and key derivation
@@ -86,13 +85,10 @@ functions.
%prep %prep
%autosetup -a2 -p1 -n cryptography-%{version} %autosetup -a2 -p1 -n cryptography-%{version}
rm -v src/rust/Cargo.lock
%build %build
export CARGO_NET_OFFLINE=true # https://github.com/pyca/cryptography/issues/9023
export CARGO_PROFILE_RELEASE_DEBUG=true
export CARGO_PROFILE_RELEASE_SPLIT_DEBUGINFO=off
# https://pyo3.rs/main/building-and-distribution#configuring-the-python-version
%python_expand export PYO3_PYTHON="%{_bindir}/$python"
%global _lto_cflags %{nil} %global _lto_cflags %{nil}
export RUSTFLAGS=%{rustflags} export RUSTFLAGS=%{rustflags}
export CFLAGS="%{optflags} -fno-strict-aliasing" export CFLAGS="%{optflags} -fno-strict-aliasing"
@@ -115,7 +111,6 @@ find . -name .keep -print -delete
# fails with OverflowError on 32bit platform # fails with OverflowError on 32bit platform
%ifarch %ix86 %arm ppc %ifarch %ix86 %arm ppc
rm -v tests/hazmat/primitives/test_aead.py rm -v tests/hazmat/primitives/test_aead.py
rm -v tests/hazmat/primitives/test_ciphers.py
# imports test_aead so we need to remove also these # imports test_aead so we need to remove also these
rm -v tests/wycheproof/test_aes.py rm -v tests/wycheproof/test_aes.py
rm -v tests/wycheproof/test_chacha20poly1305.py rm -v tests/wycheproof/test_chacha20poly1305.py
@@ -128,7 +123,6 @@ rm -v tests/wycheproof/test_chacha20poly1305.py
%license LICENSE LICENSE.APACHE LICENSE.BSD %license LICENSE LICENSE.APACHE LICENSE.BSD
%doc CONTRIBUTING.rst CHANGELOG.rst README.rst %doc CONTRIBUTING.rst CHANGELOG.rst README.rst
%{python_sitearch}/cryptography %{python_sitearch}/cryptography
%{python_sitearch}/rust
%{python_sitearch}/cryptography-%{version}.dist-info %{python_sitearch}/cryptography-%{version}.dist-info
%endif %endif

BIN
vendor.tar.zst (Stored with Git LFS)

Binary file not shown.