Sync from SUSE:SLFO:Main python-service_identity revision 44d27606b88cdf13385aa3a387262094

This commit is contained in:
Adrian Schröter 2024-12-13 12:22:33 +01:00
parent a25d55840a
commit edc9544aa0
4 changed files with 26 additions and 14 deletions

BIN
23.1.0.tar.gz (Stored with Git LFS)

Binary file not shown.

BIN
24.1.0.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@ -1,3 +1,17 @@
-------------------------------------------------------------------
Sat Jan 20 20:31:18 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 24.1.0:
* If a certificate doesn't contain any `subjectAltName`s, we
now raise `service_identity.CertificateError` instead of
`service_identity.VerificationError` to make the problem
easier to debug.
-------------------------------------------------------------------
Mon Sep 18 09:42:13 UTC 2023 - pgajdos@suse.com
- python-six is not required
-------------------------------------------------------------------
Wed Jun 21 13:47:12 UTC 2023 - ecsos <ecsos@opensuse.org>
@ -110,19 +124,19 @@ Mon Sep 24 13:16:17 UTC 2018 - ecsos@opensuse.org
- Update to 17.0.0:
* Deprecations:
- Since Chrome 58 and Firefox 48 both dont accept certificates
that contain only a Common Name, its usage is hereby
deprecated in service_identity too. We have been raising
a warning since 16.0.0 and the support will be removed in
- Since Chrome 58 and Firefox 48 both dont accept certificates
that contain only a Common Name, its usage is hereby
deprecated in service_identity too. We have been raising
a warning since 16.0.0 and the support will be removed in
mid-2018 for good.
* Changes:
- When service_identity.SubjectAltNameWarning is raised, the
- When service_identity.SubjectAltNameWarning is raised, the
Common Name of the certificate is now included in the warning
message. #17
- Added cryptography.x509 backend for verifying certificates.
#18
- Wildcards (*) are now only allowed if they are the leftmost
label in a certificate. This is common practice by all major
- Wildcards (*) are now only allowed if they are the leftmost
label in a certificate. This is common practice by all major
browsers. #19
-------------------------------------------------------------------

View File

@ -1,7 +1,7 @@
#
# spec file for package python-service_identity
#
# Copyright (c) 2023 SUSE LLC
# Copyright (c) 2024 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@ -19,7 +19,7 @@
%define oname service_identity
%{?sle15_python_module_pythons}
Name: python-service_identity
Version: 23.1.0
Version: 24.1.0
Release: 0
Summary: Service identity verification for pyOpenSSL
License: MIT
@ -38,7 +38,6 @@ BuildRequires: %{python_module pyOpenSSL >= 17.0.0}
BuildRequires: %{python_module pyasn1-modules}
BuildRequires: %{python_module pyasn1}
BuildRequires: %{python_module pytest}
BuildRequires: %{python_module six}
BuildRequires: %{python_module wheel}
BuildRequires: fdupes
BuildRequires: python-rpm-macros
@ -46,7 +45,6 @@ Requires: python-attrs >= 19.1.0
Requires: python-cryptography
Requires: python-pyasn1
Requires: python-pyasn1-modules
Requires: python-six
Recommends: python-idna
Recommends: python-pyOpenSSL
BuildArch: noarch