Accepting request 979467 from devel:languages:python
OBS-URL: https://build.opensuse.org/request/show/979467 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-paramiko?expand=0&rev=55
This commit is contained in:
commit
a7a27ba192
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:3d2e650b6812ce6d160abff701d6ef4434ec97934b13e95cf1ad3da70ffb5c58
|
|
||||||
size 1068156
|
|
3
paramiko-2.11.0.tar.gz
Normal file
3
paramiko-2.11.0.tar.gz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:003e6bee7c034c21fbb051bf83dc0a9ee4106204dd3c53054c71452cc4ec3938
|
||||||
|
size 1075390
|
@ -15,11 +15,11 @@ on the system. It has been banned from Gentoo for this reason.
|
|||||||
tests/test_client.py | 20 ++++++++++----------
|
tests/test_client.py | 20 ++++++++++----------
|
||||||
3 files changed, 10 insertions(+), 14 deletions(-)
|
3 files changed, 10 insertions(+), 14 deletions(-)
|
||||||
|
|
||||||
Index: paramiko-2.8.0/tests/test_client.py
|
Index: paramiko-2.11.0/tests/test_client.py
|
||||||
===================================================================
|
===================================================================
|
||||||
--- paramiko-2.8.0.orig/tests/test_client.py
|
--- paramiko-2.11.0.orig/tests/test_client.py 2022-05-17 03:04:13.000000000 +0200
|
||||||
+++ paramiko-2.8.0/tests/test_client.py
|
+++ paramiko-2.11.0/tests/test_client.py 2022-05-26 22:57:20.216831045 +0200
|
||||||
@@ -33,7 +33,7 @@ import warnings
|
@@ -33,7 +33,7 @@
|
||||||
import weakref
|
import weakref
|
||||||
from tempfile import mkstemp
|
from tempfile import mkstemp
|
||||||
|
|
||||||
@ -28,11 +28,12 @@ Index: paramiko-2.8.0/tests/test_client.py
|
|||||||
from mock import patch, Mock
|
from mock import patch, Mock
|
||||||
|
|
||||||
import paramiko
|
import paramiko
|
||||||
@@ -687,10 +687,10 @@ class PasswordPassphraseTests(ClientTest
|
@@ -733,11 +733,11 @@
|
||||||
|
|
||||||
# TODO: more granular exception pending #387; should be signaling "no auth
|
# TODO: more granular exception pending #387; should be signaling "no auth
|
||||||
# methods available" because no key and no password
|
# methods available" because no key and no password
|
||||||
- @raises(SSHException)
|
- @raises(SSHException)
|
||||||
|
@requires_sha1_signing
|
||||||
def test_passphrase_kwarg_not_used_for_password_auth(self):
|
def test_passphrase_kwarg_not_used_for_password_auth(self):
|
||||||
- # Using the "right" password in the "wrong" field shouldn't work.
|
- # Using the "right" password in the "wrong" field shouldn't work.
|
||||||
- self._test_connection(passphrase="pygmalion")
|
- self._test_connection(passphrase="pygmalion")
|
||||||
@ -40,13 +41,14 @@ Index: paramiko-2.8.0/tests/test_client.py
|
|||||||
+ # Using the "right" password in the "wrong" field shouldn't work.
|
+ # Using the "right" password in the "wrong" field shouldn't work.
|
||||||
+ self._test_connection(passphrase="pygmalion")
|
+ self._test_connection(passphrase="pygmalion")
|
||||||
|
|
||||||
|
@requires_sha1_signing
|
||||||
def test_passphrase_kwarg_used_for_key_passphrase(self):
|
def test_passphrase_kwarg_used_for_key_passphrase(self):
|
||||||
# Straightforward again, with new passphrase kwarg.
|
@@ -757,15 +757,15 @@
|
||||||
@@ -708,14 +708,14 @@ class PasswordPassphraseTests(ClientTest
|
|
||||||
password="television",
|
password="television",
|
||||||
)
|
)
|
||||||
|
|
||||||
- @raises(AuthenticationException) # TODO: more granular
|
- @raises(AuthenticationException) # TODO: more granular
|
||||||
|
@requires_sha1_signing
|
||||||
def test_password_kwarg_not_used_for_passphrase_when_passphrase_kwarg_given( # noqa
|
def test_password_kwarg_not_used_for_passphrase_when_passphrase_kwarg_given( # noqa
|
||||||
self
|
self
|
||||||
):
|
):
|
||||||
|
@ -1,3 +1,37 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu May 26 20:43:45 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||||||
|
|
||||||
|
- update to 2.11.0
|
||||||
|
* [Feature] #1951: Add SSH config token expansion (eg %h, %p) when
|
||||||
|
parsing ProxyJump directives.
|
||||||
|
* [Support] #2004: (via #2011) Apply unittest skipIf to tests currently
|
||||||
|
using SHA1 in their critical path, to avoid failures on systems starting
|
||||||
|
to disable SHA1 outright in their crypto backends (eg RHEL 9).
|
||||||
|
* [Support] #1838: (via #1870/#2028) Update camelCase method calls
|
||||||
|
against the threading module to be snake_case; this and related tweaks
|
||||||
|
should fix some deprecation warnings under Python 3.10.
|
||||||
|
* [Support] #2038: (via #2039) Recent versions of Cryptography have
|
||||||
|
deprecated Blowfish algorithm support; in lieu of an easy method for
|
||||||
|
users to remove it from the list of algorithms Paramiko tries to import
|
||||||
|
and use, we’ve decided to remove it from our “preferred algorithms” list.
|
||||||
|
This will both discourage use of a weak algorithm, and avoid warnings.
|
||||||
|
- update to 2.10.5
|
||||||
|
* [Bug] #2008: (via #2010) Windows-native SSH agent support as merged in
|
||||||
|
2.10 could encounter Errno 22 OSError exceptions in some scenarios
|
||||||
|
(eg server not cleanly closing a relevant named pipe).
|
||||||
|
This has been worked around and should be less problematic.
|
||||||
|
* [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from
|
||||||
|
understanding how to perform SHA2 signature verification for RSA
|
||||||
|
certificates (specifically certs - not keys), so when we added SHA2
|
||||||
|
support it broke all clients using RSA certificates with these servers.
|
||||||
|
This has been fixed in a manner similar to what OpenSSH’s own client
|
||||||
|
does: a version check is performed and the algorithm used is downgraded
|
||||||
|
if needed.
|
||||||
|
* [Bug] #1933: Align signature verification algorithm with OpenSSH re:
|
||||||
|
zero-padding signatures which don’t match their nominal size/length. This
|
||||||
|
shouldn’t affect most users, but will help Paramiko-implemented SSH
|
||||||
|
servers handle poorly behaved clients such as PuTTY.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Apr 28 21:26:08 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
Thu Apr 28 21:26:08 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
|
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
|
||||||
%define skip_python2 1
|
%define skip_python2 1
|
||||||
Name: python-paramiko
|
Name: python-paramiko
|
||||||
Version: 2.10.4
|
Version: 2.11.0
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: SSH2 protocol library
|
Summary: SSH2 protocol library
|
||||||
License: LGPL-2.1-or-later
|
License: LGPL-2.1-or-later
|
||||||
|
Loading…
x
Reference in New Issue
Block a user