15
0

Accepting request 979399 from home:stroeder:python

update to 2.11.0

OBS-URL: https://build.opensuse.org/request/show/979399
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-paramiko?expand=0&rev=105
This commit is contained in:
2022-05-27 11:39:44 +00:00
committed by Git OBS Bridge
parent cc75e79748
commit 9d0dfec45a
5 changed files with 47 additions and 11 deletions

View File

@@ -1,3 +1,37 @@
-------------------------------------------------------------------
Thu May 26 20:43:45 UTC 2022 - Michael Ströder <michael@stroeder.com>
- update to 2.11.0
* [Feature] #1951: Add SSH config token expansion (eg %h, %p) when
parsing ProxyJump directives.
* [Support] #2004: (via #2011) Apply unittest skipIf to tests currently
using SHA1 in their critical path, to avoid failures on systems starting
to disable SHA1 outright in their crypto backends (eg RHEL 9).
* [Support] #1838: (via #1870/#2028) Update camelCase method calls
against the threading module to be snake_case; this and related tweaks
should fix some deprecation warnings under Python 3.10.
* [Support] #2038: (via #2039) Recent versions of Cryptography have
deprecated Blowfish algorithm support; in lieu of an easy method for
users to remove it from the list of algorithms Paramiko tries to import
and use, weve decided to remove it from our “preferred algorithms” list.
This will both discourage use of a weak algorithm, and avoid warnings.
- update to 2.10.5
* [Bug] #2008: (via #2010) Windows-native SSH agent support as merged in
2.10 could encounter Errno 22 OSError exceptions in some scenarios
(eg server not cleanly closing a relevant named pipe).
This has been worked around and should be less problematic.
* [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from
understanding how to perform SHA2 signature verification for RSA
certificates (specifically certs - not keys), so when we added SHA2
support it broke all clients using RSA certificates with these servers.
This has been fixed in a manner similar to what OpenSSHs own client
does: a version check is performed and the algorithm used is downgraded
if needed.
* [Bug] #1933: Align signature verification algorithm with OpenSSH re:
zero-padding signatures which dont match their nominal size/length. This
shouldnt affect most users, but will help Paramiko-implemented SSH
servers handle poorly behaved clients such as PuTTY.
-------------------------------------------------------------------
Thu Apr 28 21:26:08 UTC 2022 - Dirk Müller <dmueller@suse.com>