Accepting request 979467 from devel:languages:python
OBS-URL: https://build.opensuse.org/request/show/979467 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-paramiko?expand=0&rev=55
This commit is contained in:
commit
a7a27ba192
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3d2e650b6812ce6d160abff701d6ef4434ec97934b13e95cf1ad3da70ffb5c58
|
||||
size 1068156
|
3
paramiko-2.11.0.tar.gz
Normal file
3
paramiko-2.11.0.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:003e6bee7c034c21fbb051bf83dc0a9ee4106204dd3c53054c71452cc4ec3938
|
||||
size 1075390
|
@ -15,11 +15,11 @@ on the system. It has been banned from Gentoo for this reason.
|
||||
tests/test_client.py | 20 ++++++++++----------
|
||||
3 files changed, 10 insertions(+), 14 deletions(-)
|
||||
|
||||
Index: paramiko-2.8.0/tests/test_client.py
|
||||
Index: paramiko-2.11.0/tests/test_client.py
|
||||
===================================================================
|
||||
--- paramiko-2.8.0.orig/tests/test_client.py
|
||||
+++ paramiko-2.8.0/tests/test_client.py
|
||||
@@ -33,7 +33,7 @@ import warnings
|
||||
--- paramiko-2.11.0.orig/tests/test_client.py 2022-05-17 03:04:13.000000000 +0200
|
||||
+++ paramiko-2.11.0/tests/test_client.py 2022-05-26 22:57:20.216831045 +0200
|
||||
@@ -33,7 +33,7 @@
|
||||
import weakref
|
||||
from tempfile import mkstemp
|
||||
|
||||
@ -28,11 +28,12 @@ Index: paramiko-2.8.0/tests/test_client.py
|
||||
from mock import patch, Mock
|
||||
|
||||
import paramiko
|
||||
@@ -687,10 +687,10 @@ class PasswordPassphraseTests(ClientTest
|
||||
@@ -733,11 +733,11 @@
|
||||
|
||||
# TODO: more granular exception pending #387; should be signaling "no auth
|
||||
# methods available" because no key and no password
|
||||
- @raises(SSHException)
|
||||
@requires_sha1_signing
|
||||
def test_passphrase_kwarg_not_used_for_password_auth(self):
|
||||
- # Using the "right" password in the "wrong" field shouldn't work.
|
||||
- self._test_connection(passphrase="pygmalion")
|
||||
@ -40,13 +41,14 @@ Index: paramiko-2.8.0/tests/test_client.py
|
||||
+ # Using the "right" password in the "wrong" field shouldn't work.
|
||||
+ self._test_connection(passphrase="pygmalion")
|
||||
|
||||
@requires_sha1_signing
|
||||
def test_passphrase_kwarg_used_for_key_passphrase(self):
|
||||
# Straightforward again, with new passphrase kwarg.
|
||||
@@ -708,14 +708,14 @@ class PasswordPassphraseTests(ClientTest
|
||||
@@ -757,15 +757,15 @@
|
||||
password="television",
|
||||
)
|
||||
|
||||
- @raises(AuthenticationException) # TODO: more granular
|
||||
@requires_sha1_signing
|
||||
def test_password_kwarg_not_used_for_passphrase_when_passphrase_kwarg_given( # noqa
|
||||
self
|
||||
):
|
||||
|
@ -1,3 +1,37 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu May 26 20:43:45 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||||
|
||||
- update to 2.11.0
|
||||
* [Feature] #1951: Add SSH config token expansion (eg %h, %p) when
|
||||
parsing ProxyJump directives.
|
||||
* [Support] #2004: (via #2011) Apply unittest skipIf to tests currently
|
||||
using SHA1 in their critical path, to avoid failures on systems starting
|
||||
to disable SHA1 outright in their crypto backends (eg RHEL 9).
|
||||
* [Support] #1838: (via #1870/#2028) Update camelCase method calls
|
||||
against the threading module to be snake_case; this and related tweaks
|
||||
should fix some deprecation warnings under Python 3.10.
|
||||
* [Support] #2038: (via #2039) Recent versions of Cryptography have
|
||||
deprecated Blowfish algorithm support; in lieu of an easy method for
|
||||
users to remove it from the list of algorithms Paramiko tries to import
|
||||
and use, we’ve decided to remove it from our “preferred algorithms” list.
|
||||
This will both discourage use of a weak algorithm, and avoid warnings.
|
||||
- update to 2.10.5
|
||||
* [Bug] #2008: (via #2010) Windows-native SSH agent support as merged in
|
||||
2.10 could encounter Errno 22 OSError exceptions in some scenarios
|
||||
(eg server not cleanly closing a relevant named pipe).
|
||||
This has been worked around and should be less problematic.
|
||||
* [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from
|
||||
understanding how to perform SHA2 signature verification for RSA
|
||||
certificates (specifically certs - not keys), so when we added SHA2
|
||||
support it broke all clients using RSA certificates with these servers.
|
||||
This has been fixed in a manner similar to what OpenSSH’s own client
|
||||
does: a version check is performed and the algorithm used is downgraded
|
||||
if needed.
|
||||
* [Bug] #1933: Align signature verification algorithm with OpenSSH re:
|
||||
zero-padding signatures which don’t match their nominal size/length. This
|
||||
shouldn’t affect most users, but will help Paramiko-implemented SSH
|
||||
servers handle poorly behaved clients such as PuTTY.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Apr 28 21:26:08 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
||||
|
||||
|
@ -19,7 +19,7 @@
|
||||
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
|
||||
%define skip_python2 1
|
||||
Name: python-paramiko
|
||||
Version: 2.10.4
|
||||
Version: 2.11.0
|
||||
Release: 0
|
||||
Summary: SSH2 protocol library
|
||||
License: LGPL-2.1-or-later
|
||||
|
Loading…
x
Reference in New Issue
Block a user