diff --git a/aioquic-0.9.17.tar.gz b/aioquic-0.9.17.tar.gz deleted file mode 100644 index b14c00f..0000000 --- a/aioquic-0.9.17.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:6b295424e8458393370591c28db45a6a007d9c5b6829a0467f68036674eb7c41 -size 153158 diff --git a/aioquic-0.9.20.tar.gz b/aioquic-0.9.20.tar.gz new file mode 100644 index 0000000..7fe1554 --- /dev/null +++ b/aioquic-0.9.20.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ec436aaace997b846b01e5200edbf7e3e56b91826a144efb9748fd8ddd332bbe +size 153457 diff --git a/cryptography.patch b/cryptography.patch index 1d22e1c..29a88b6 100644 --- a/cryptography.patch +++ b/cryptography.patch @@ -1,75 +1,35 @@ -Index: aioquic-0.9.17/tests/test_asyncio.py +Index: aioquic-0.9.20/tests/test_tls.py =================================================================== ---- aioquic-0.9.17.orig/tests/test_asyncio.py -+++ aioquic-0.9.17/tests/test_asyncio.py -@@ -182,8 +182,8 @@ class HighLevelTest(TestCase): - await client.ping() +--- aioquic-0.9.20.orig/tests/test_tls.py ++++ aioquic-0.9.20/tests/test_tls.py +@@ -430,7 +430,7 @@ class ContextTest(TestCase): - run(self.run_server()) -- with self.assertRaises(ConnectionError): -- run(run_client_without_config()) -+ # with self.assertRaises(ConnectionError): -+ run(run_client_without_config()) - - def test_connect_and_serve_writelines(self): - async def run_client_writelines(): -Index: aioquic-0.9.17/tests/test_tls.py -=================================================================== ---- aioquic-0.9.17.orig/tests/test_tls.py -+++ aioquic-0.9.17/tests/test_tls.py -@@ -428,9 +428,9 @@ class ContextTest(TestCase): - client = self.create_client(cafile=None) - server = self.create_server() - -- with self.assertRaises(tls.AlertBadCertificate) as cm: -- self._handshake(client, server) + with self.assertRaises(tls.AlertBadCertificate) as cm: + self._handshake(client, server) - self.assertEqual(str(cm.exception), "unable to get local issuer certificate") -+ # with self.assertRaises(tls.AlertBadCertificate) as cm: -+ self._handshake(client, server) -+ # self.assertEqual(str(cm.exception), "unable to get local issuer certificate") ++ self.assertEqual(str(cm.exception), "unable to get local issuer certificate") def test_handshake_with_certificate_no_verify(self): client = self.create_client(cafile=None, verify_mode=ssl.CERT_NONE) -@@ -1263,11 +1263,11 @@ class VerifyCertificateTest(TestCase): - mock_utcnow.return_value = certificate.not_valid_before - +@@ -1265,9 +1265,9 @@ class VerifyCertificateTest(TestCase): # fail -- with self.assertRaises(tls.AlertBadCertificate) as cm: -- verify_certificate(certificate=certificate, server_name="localhost") + with self.assertRaises(tls.AlertBadCertificate) as cm: + verify_certificate(certificate=certificate, server_name="localhost") - self.assertEqual( - str(cm.exception), "unable to get local issuer certificate" - ) -+ # with self.assertRaises(tls.AlertBadCertificate) as cm: -+ verify_certificate(certificate=certificate, server_name="localhost") -+ # self.assertEqual( -+ # str(cm.exception), "unable to get local issuer certificate" -+ # ) ++ self.assertEqual( ++ str(cm.exception), "unable to get local issuer certificate" ++ ) # ok verify_certificate( -@@ -1285,9 +1285,9 @@ class VerifyCertificateTest(TestCase): - mock_utcnow.return_value = certificate.not_valid_before - +@@ -1287,7 +1287,7 @@ class VerifyCertificateTest(TestCase): # fail -- with self.assertRaises(tls.AlertBadCertificate) as cm: -- verify_certificate(certificate=certificate, server_name="localhost") + with self.assertRaises(tls.AlertBadCertificate) as cm: + verify_certificate(certificate=certificate, server_name="localhost") - self.assertEqual(str(cm.exception), "self signed certificate") -+ # with self.assertRaises(tls.AlertBadCertificate) as cm: -+ verify_certificate(certificate=certificate, server_name="localhost") -+ # self.assertEqual(str(cm.exception), "self signed certificate") ++ self.assertEqual(str(cm.exception), "self signed certificate") # ok verify_certificate( -Index: aioquic-0.9.17/setup.py -=================================================================== ---- aioquic-0.9.17.orig/setup.py -+++ aioquic-0.9.17/setup.py -@@ -63,7 +63,7 @@ setuptools.setup( - packages=["aioquic", "aioquic.asyncio", "aioquic.h0", "aioquic.h3", "aioquic.quic"], - install_requires=[ - "certifi", -- "cryptography >= 2.5, < 4", -+ "cryptography >= 2.5", - 'dataclasses; python_version < "3.7"', - "pylsqpack >= 0.3.3, < 0.4.0", - ], diff --git a/python-aioquic.changes b/python-aioquic.changes index 0c9ac47..302e274 100644 --- a/python-aioquic.changes +++ b/python-aioquic.changes @@ -1,3 +1,37 @@ +------------------------------------------------------------------- +Wed Jan 25 08:33:15 UTC 2023 - Daniel Garcia + +- Update to v0.9.20 + * free AEADObject's and HeaderProtectionObject's memory + * free BufferObject’s memory + * Enable IPv4/IPv6 dual stack support on Windows + * [docs] add a logo, stop mocking libraries + * [docs] test that documentation can be built without warnings + * [tests] clarify the various handshake loss test cases + * [connection] retransmit CRYPTO to speedup handshake completion + * [examples] update DoQ examples for more recent drafts (fixes: #224) + * [lint] run mypy on each CI run +- 0.9.19 + * [tls] use PyOpenSSL to validate certificate + * [qa] set better names for our C modules + * [package] drop dependency on "dataclasses" package + * [package] update cryptography requirement to >= 3.1 + * [qa] fix some type annotations + * [http3] advertise support for extended CONNECT + * [examples] make HTTP/3 client set content-length (fixes: #241) + * [package] fix macosx arm64 wheels +- 0.9.18 + * [examples] add sec-webtransport-http3-draft to server response + * [package] update OpenSSL to 1.1.1m + * [tests] rewrite asyncio tests as coroutines + * [qa] reformat code using updated `black` + * [qa] tell git to ignore virtual environments + * http3_client.py: correct error code for connection close + * [webtransport] make H3_DATAGRAM value uppercase + * [webtransport] update H3_DATAGRAM value + * [readme] update minimal Python version + * [examples] don't sent HTTP/3 DATA if there is no request body + ------------------------------------------------------------------- Thu Jan 6 15:35:16 UTC 2022 - Ben Greiner diff --git a/python-aioquic.spec b/python-aioquic.spec index 8ee73c4..3d42ef7 100644 --- a/python-aioquic.spec +++ b/python-aioquic.spec @@ -1,7 +1,7 @@ # # spec file for package python-aioquic # -# Copyright (c) 2022 SUSE LLC +# Copyright (c) 2023 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -16,11 +16,10 @@ # -%{?!python_module:%define python_module() python3-%{**}} %define skip_python2 1 %define skip_python36 1 Name: python-aioquic -Version: 0.9.17 +Version: 0.9.20 Release: 0 Summary: Python implementation of QUIC and HTTP/3 License: BSD-3-Clause @@ -36,11 +35,13 @@ BuildRequires: pkgconfig BuildRequires: python-rpm-macros BuildRequires: pkgconfig(openssl) Requires: python-certifi -Requires: python-cryptography >= 2.5 +Requires: python-cryptography >= 3.1 +Requires: python-pyOpenSSL >= 20 Requires: python-pylsqpack >= 0.3.3 # SECTION test requirements BuildRequires: %{python_module certifi} BuildRequires: %{python_module cryptography >= 2.5} +BuildRequires: %{python_module pyOpenSSL >= 20} BuildRequires: %{python_module pylsqpack >= 0.3.3} # /SECTION %python_subpackages