forked from pool/python-asyncssh
Accepting request 874533 from devel:languages:python
OBS-URL: https://build.opensuse.org/request/show/874533 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-asyncssh?expand=0&rev=14
This commit is contained in:
@@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:44bda34c7123f00c3df95d24e2dc8d43c4d17b456fbb8c434ef4f4a7ebb5265e
|
||||
size 353998
|
||||
3
asyncssh-2.5.0.tar.gz
Normal file
3
asyncssh-2.5.0.tar.gz
Normal file
@@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0b65e2af73a2e39a271bd627abbe4f7e4b0345486ed403e65987d79c72fcb70b
|
||||
size 414437
|
||||
@@ -1,3 +1,91 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 22 13:21:14 UTC 2021 - John Vandenberg <jayvdb@gmail.com>
|
||||
|
||||
- Update URL
|
||||
- Add missing test dependencis fido2 and libnettle8
|
||||
- Recommend libnettle8
|
||||
- Update to v2.5.0
|
||||
* Added support for limiting which identities in an SSH agent
|
||||
will be used when making a connection, via a new
|
||||
"agent_identities" config option. This change also adds
|
||||
compatibility with the OpenSSL config file option "IdentitiesOnly".
|
||||
* Added support for including Subject Key Identifier and
|
||||
Authority Key Identifier extensions in generated
|
||||
X.509 certificates to better comply with RFC 5280.
|
||||
* Added support for makedirs() and rmtree() methods in the
|
||||
AsyncSSH SFTP client, as well as a new scandir() method
|
||||
which returns an async iterator to more efficiently process
|
||||
very large directories.
|
||||
* Significantly reworked AsyncSSH line editor support to
|
||||
improve its performance by several orders of magnitude on
|
||||
long input lines, and added a configurable maximum line
|
||||
length when the editor is in use to avoid potential
|
||||
denial-of-service attacks. This limit defaults to 1024 bytes,
|
||||
but with the improvements it can reasonably handle lines
|
||||
which are megabytes in size if needed.
|
||||
* Changed AsyncSSH to allow SSH agent identities to still be
|
||||
used when an explicit list of client keys is specified, for
|
||||
better compatibility with OpenSSH. The previous behavior
|
||||
can still be achieved by explicitly setting the agent_path
|
||||
option to None when setting client_keys.
|
||||
* Changed AsyncSSH to enforce a limit of 1024 characters on
|
||||
usernames when acting as a server to avoid a potential
|
||||
denial-of-service issue related to SASLprep username
|
||||
normalization.
|
||||
* Changed SCP implementation to explicitly yield to other
|
||||
coroutines when sending a large file to better share an
|
||||
event loop.
|
||||
* Fixed a few potential race conditions related to cleanup of
|
||||
objects during connection close.
|
||||
* Re-applied a previous fix which was unintentionally lost to
|
||||
allow Pageant to be used by default on Windows.
|
||||
- from v2.4.2
|
||||
* Fixed a potential race condition when receiving EOF right
|
||||
after a channel is opened.
|
||||
* Fixed a couple of issues related to the error_handler and
|
||||
progress_handler callbacks in AsyncSSH SFTP/SCP.
|
||||
* Fixed a couple of issues related to using pathlib objects
|
||||
with AsyncSSH SCP.
|
||||
- from v2.4.1
|
||||
* Fixed SCP server to send back an exit status when closing the
|
||||
SSH channel, since the OpenSSH scp client returns this status
|
||||
to the shell which executed it.
|
||||
* Fixed listeners created by forward_local_port(),
|
||||
forward_local_path(), and forward_socks() to automatically
|
||||
close when the SSH connection closes, unblocking any
|
||||
wait_closed() calls which are in progress.
|
||||
* Fixed a potential exception that could trigger when the SSH
|
||||
connection is closed while authentication is in progress.
|
||||
* Fixed tunnel connect code to properly clean up an implicitly
|
||||
created tunnel when a failure occurs in trying to open a
|
||||
connection over that tunnel.
|
||||
- from v2.4.0
|
||||
* Added support for accessing keys through a PKCS#11 provider,
|
||||
allowing keys on PIV security tokens to be used directly by
|
||||
AsyncSSH without the need to run an SSH agent. X.509
|
||||
certificates can also be retrieved from the security token
|
||||
and used with SSH servers which support that.
|
||||
* Added support for using Ed25519 and Ed448 keys in X.509
|
||||
certificates, and the corresponding SSH certificate and
|
||||
signature algorithms. Certificates can use these keys as
|
||||
either subject keys or signing keys, and certificates can
|
||||
be generated by either AsyncSSH or by OpenSSL version 1.1.1
|
||||
or later.
|
||||
* Added support for feed_data() and feed_eof() methods in
|
||||
SSHReader, mirroring methods of the same name in asyncio's
|
||||
StreamReader to improve interoperability between the two APIs.
|
||||
* Updated unit tests to test interoperability with OpenSSL 1.1.1
|
||||
when reading and writing Ed25519 and Ed448 public and private
|
||||
key files. Previously, due to lack of support in OpenSSL,
|
||||
AsyncSSH could only test against OpenSSH, and only in OpenSSH
|
||||
key formats. With OpenSSL 1.1.1, testing is now also done
|
||||
using PKCS#8 format.
|
||||
* Fixed config file parser to properly ignore all comment lines,
|
||||
even if the lines contain unbalanced quotes.
|
||||
* Removed a note about the lack of a timeout parameter in the
|
||||
AsyncSSH connect() method, now that it supports a login_timeout
|
||||
argument.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 28 16:49:45 UTC 2020 - Ondřej Súkup <mimi.vx@gmail.com>
|
||||
|
||||
@@ -129,31 +217,35 @@ Fri Sep 13 11:36:14 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>
|
||||
Thu Aug 8 12:49:50 UTC 2019 - Ondřej Súkup <mimi.vx@gmail.com>
|
||||
|
||||
- update to 1.17.1
|
||||
* Improved construction of file paths in SFTP to better handle native Windows
|
||||
source paths containing backslashes or drive letters.
|
||||
* Improved SFTP parallel I/O for large reads and file copies to better handle
|
||||
the case where a read returns less data than what was requested when not
|
||||
at the end of the file, allowing AsyncSSH to get back the right result even
|
||||
if the requested block size is larger than the SFTP server can handle.
|
||||
* Fixed an issue where the requested SFTP block_size wasn’t used in the get,
|
||||
copy, mget, and mcopy functions if it was larger than the default size of 16 KB.
|
||||
* Fixed a problem where the list of client keys provided in
|
||||
an SSHClientConnectionOptions object wasn’t always preserved properly across
|
||||
the opening of multiple SSH connections.
|
||||
* Made AsyncSSH tolerant of unexpected authentication success/failure messages
|
||||
sent after authentication completes. AsyncSSH previously treated this as
|
||||
a protocol error and dropped the connection, while most other SSH implementations
|
||||
ignored these messages and allowed the connection to continue.
|
||||
* Made AsyncSSH tolerant of SFTP status responses which are missing error message
|
||||
and language tag fields, improving interoperability with servers that omit
|
||||
these fields. When missing, AsyncSSH treats these fields as if they were
|
||||
set to empty strings.
|
||||
* Improved construction of file paths in SFTP to better handle
|
||||
native Windows source paths containing backslashes or drive
|
||||
letters.
|
||||
* Improved SFTP parallel I/O for large reads and file copies to
|
||||
better handle the case where a read returns less data than what
|
||||
was requested when not at the end of the file, allowing AsyncSSH
|
||||
to get back the right result even if the requested block size is
|
||||
larger than the SFTP server can handle.
|
||||
* Fixed an issue where the requested SFTP block_size wasn’t used in
|
||||
the get, copy, mget, and mcopy functions if it was larger than
|
||||
the default size of 16 KB.
|
||||
* Fixed a problem where the list of client keys provided in an
|
||||
SSHClientConnectionOptions object wasn’t always preserved properly
|
||||
across the opening of multiple SSH connections.
|
||||
* Made AsyncSSH tolerant of unexpected authentication success/failure
|
||||
messages sent after authentication completes. AsyncSSH previously
|
||||
treated this as a protocol error and dropped the connection,
|
||||
while most other SSH implementations ignored these messages and
|
||||
allowed the connection to continue.
|
||||
* Made AsyncSSH tolerant of SFTP status responses which are missing
|
||||
error message and language tag fields, improving interoperability
|
||||
with servers that omit these fields. When missing, AsyncSSH
|
||||
treats these fields as if they were set to empty strings.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 4 13:07:40 UTC 2019 - Ondřej Súkup <mimi.vx@gmail.com>
|
||||
|
||||
- update to 1.17.0
|
||||
- drop old_openssl.patch
|
||||
- update to 1.17.0
|
||||
* Added support for “reverse direction” SSH connections, useful to support
|
||||
applications like NETCONF Call Home, described in RFC 8071.
|
||||
* Added support for the PyCA implementation of Chacha20-Poly1305, eliminating
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package python-asyncssh
|
||||
#
|
||||
# Copyright (c) 2020 SUSE LLC
|
||||
# Copyright (c) 2021 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@@ -19,23 +19,27 @@
|
||||
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
|
||||
%define skip_python2 1
|
||||
Name: python-asyncssh
|
||||
Version: 2.3.0
|
||||
Version: 2.5.0
|
||||
Release: 0
|
||||
Summary: Asynchronous SSHv2 client and server library
|
||||
License: EPL-2.0 OR GPL-2.0-or-later
|
||||
Group: Development/Languages/Python
|
||||
URL: http://asyncssh.timeheart.net
|
||||
URL: https://github.com/ronf/asyncssh
|
||||
Source: https://files.pythonhosted.org/packages/source/a/asyncssh/asyncssh-%{version}.tar.gz
|
||||
Patch0: gss_test.patch
|
||||
# SECTION test requirements
|
||||
BuildRequires: %{python_module bcrypt >= 3.1.3}
|
||||
BuildRequires: %{python_module cryptography >= 2.8}
|
||||
BuildRequires: %{python_module fido2 >= 0.8.1}
|
||||
BuildRequires: %{python_module gssapi >= 1.2.0}
|
||||
BuildRequires: %{python_module pyOpenSSL >= 17.0.0}
|
||||
BuildRequires: %{python_module setuptools}
|
||||
BuildRequires: %{python_module uvloop >= 0.9.1}
|
||||
BuildRequires: fdupes
|
||||
BuildRequires: (libnettle8 if python38-base)
|
||||
BuildRequires: openssh
|
||||
BuildRequires: openssl
|
||||
# /SECTION
|
||||
BuildRequires: fdupes
|
||||
BuildRequires: python-rpm-macros
|
||||
Requires: python-bcrypt >= 3.1.3
|
||||
Requires: python-cryptography >= 2.8
|
||||
@@ -43,6 +47,7 @@ Requires: python-gssapi >= 1.2.0
|
||||
Requires: python-libnacl >= 1.4.2
|
||||
Requires: python-pyOpenSSL >= 17.0.0
|
||||
Recommends: python-fido2 >= 0.8.1
|
||||
Recommends: libnettle8
|
||||
BuildArch: noarch
|
||||
|
||||
%python_subpackages
|
||||
|
||||
Reference in New Issue
Block a user