From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka <adolf.belka@ipfire.org> To: development@lists.ipfire.org Subject: Re: [PATCH 01/23] python3-cryptography: Update to version 36.0.2 Date: Fri, 17 Jun 2022 13:10:09 +0200 Message-ID: <07306f51-8b53-70fa-cca5-167160d00f59@ipfire.org> In-Reply-To: <38C1743E-FF5E-4640-BB2C-CFF9A7F00D94@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============4092454495351202283==" List-Id: <development.lists.ipfire.org> --===============4092454495351202283== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable On 17/06/2022 12:14, Michael Tremer wrote: > Oh wow. 23 patches. and would have been 26 patches without your help on removing the windows requ= irements. >=20 > That looks like a lot of work! >=20 > Thank you for this. I will not tag them all individually if that is okay :) That is fine by me :-) >=20 > -Michael >=20 >> On 17 Jun 2022, at 11:00, Adolf Belka <adolf.belka(a)ipfire.org> wrote: >> >> Dear All, >> >> For information this patch series can wait till CU170. It is not an urgent= need to update in CU169. >> >> Regards, >> Adolf. >> >> On 17/06/2022 11:42, Adolf Belka wrote: >>> - Update from version 3.4.7 to 36.0.2 >>> After version 3.4.8 the numbering scheme changed to 35.0.0 in Sept 20= 21 >>> See Chanelog section 35.0.0 below >>> - New release requires a lot of rust packages - see Changelog sections 35= .0.0 & 36.0.0 >>> below. The required rust packages are installed in separate patches i= n this series >>> - Update of rootfile >>> - Changelog >>> 36.0.2 - 2022-03-15=C2=B6 >>> Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL= 1.1.1n. >>> 36.0.1 - 2021-12-14=C2=B6 >>> Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL= 1.1.1m. >>> 36.0.0 - 2021-11-21=C2=B6 >>> FINAL DEPRECATION Support for verifier and signer on our asymmetric = key >>> classes was deprecated in version 2.0. These functions had = an extended >>> deprecation due to usage, however the next version of crypt= ography will drop >>> support. Users should migrate to sign and verify. >>> The entire X.509 layer is now written in Rust. This allows alternate >>> asymmetric key implementations that can support cloud key m= anagement >>> services or hardware security modules provided they impleme= nt the necessary >>> interface (for example: EllipticCurvePrivateKey). >>> Deprecated the backend argument for all functions. >>> Added support for AESOCB3. >>> Added support for iterating over arbitrary request attributes. >>> Deprecated the get_attribute_for_oid method on CertificateSigningReq= uest in >>> favor of get_attribute_for_oid() on the new Attributes obje= ct. >>> Fixed handling of PEM files to allow loading when certificate and ke= y are in >>> the same file. >>> Fixed parsing of CertificatePolicies extensions containing legacy BM= PString >>> values in their explicitText. >>> Allow parsing of negative serial numbers in certificates. Negative s= erial >>> numbers are prohibited by RFC 5280 so a deprecation warning= will be raised >>> whenever they are encountered. A future version of cryptogr= aphy will drop >>> support for parsing them. >>> Added support for parsing PKCS12 files with friendly names for all >>> certificates with load_pkcs12(), which will return an objec= t of type >>> PKCS12KeyAndCertificates. >>> rfc4514_string() and related methods now have an optional attr_name_= overrides >>> parameter to supply custom OID to name mappings, which can = be used to match >>> vendor-specific extensions. >>> BACKWARDS INCOMPATIBLE: Reverted the nonstandard formatting of email= address >>> fields as E in rfc4514_string() methods from version 35.0. >>> The previous behavior can be restored with: >>> name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"}) >>> Allow X25519PublicKey and X448PublicKey to be used as public keys wh= en >>> parsing certificates or creating them with CertificateBuild= er. These key >>> types must be signed with a different signing algorithm as = X25519 and X448 >>> do not support signing. >>> Extension values can now be serialized to a DER byte string by calli= ng >>> public_bytes(). >>> Added experimental support for compiling against BoringSSL. As Borin= gSSL >>> does not commit to a stable API, cryptography tests against= the latest >>> commit only. Please note that several features are not avai= lable when >>> building against BoringSSL. >>> Parsing CertificateSigningRequest from DER and PEM now, for a limite= d time >>> period, allows the Extension critical field to be incorrect= ly encoded. See >>> the issue for complete details. This will be reverted in a = future >>> cryptography release. >>> When OCSPNonce are parsed and generated their value is now correctly= wrapped >>> in an ASN.1 OCTET STRING. This conforms to RFC 6960 but con= flicts with the >>> original behavior specified in RFC 2560. For a temporary pe= riod for >>> backwards compatibility, we will also parse values that are= encoded as >>> specified in RFC 2560 but this behavior will be removed in = a future release. >>> 35.0.0 - 2021-09-29=C2=B6 >>> Changed the version scheme. This will result in us incrementing the = major >>> version more frequently, but does not change our existing b= ackwards >>> compatibility policy. >>> BACKWARDS INCOMPATIBLE: The X.509 PEM parsers now require that the P= EM >>> string passed have PEM delimiters of the correct type. For = example, parsing >>> a private key PEM concatenated with a certificate PEM will = no longer be >>> accepted by the PEM certificate parser. >>> BACKWARDS INCOMPATIBLE: The X.509 certificate parser no longer allows >>> negative serial numbers. RFC 5280 has always prohibited the= se. >>> BACKWARDS INCOMPATIBLE: Additional forms of invalid ASN.1 found duri= ng X.509 >>> parsing will raise an error on initial parse rather than wh= en the malformed >>> field is accessed. >>> Rust is now required for building cryptography, the >>> CRYPTOGRAPHY_DONT_BUILD_RUST environment variable is no lon= ger respected. >>> Parsers for X.509 no longer use OpenSSL and have been rewritten in R= ust. >>> This should be backwards compatible (modulo the items liste= d above) and >>> improve both security and performance. >>> Added support for OpenSSL 3.0.0 as a compilation target. >>> Added support for SM3 and SM4, when using OpenSSL 1.1.1. These algor= ithms >>> are provided for compatibility in regions where they may be= required, and >>> are not generally recommended. >>> We now ship manylinux_2_24 and musllinux_1_1 wheels, in addition to = our >>> manylinux2010 and manylinux2014 wheels. Users on distributi= ons like Alpine >>> Linux should ensure they upgrade to the latest pip to corre= ctly receive >>> wheels. >>> Added rfc4514_attribute_name attribute to x509.NameAttribute. >>> Added KBKDFCMAC. >>> 3.4.8 - 2021-08-24=C2=B6 >>> Updated Windows, macOS, and manylinux wheels to be compiled with >>> OpenSSL 1.1.1l. >>> Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org> >>> --- >>> .../rootfiles/packages/python3-cryptography | 25 ++++++++++--------- >>> lfs/python3-cryptography | 6 ++--- >>> 2 files changed, 16 insertions(+), 15 deletions(-) >>> diff --git a/config/rootfiles/packages/python3-cryptography b/config/root= files/packages/python3-cryptography >>> index 9f63606fb..a9ee32faf 100644 >>> --- a/config/rootfiles/packages/python3-cryptography >>> +++ b/config/rootfiles/packages/python3-cryptography >>> @@ -1,20 +1,18 @@ >>> usr/lib/python3.10/site-packages/cryptography >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/PKG= -INFO >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/SOU= RCES.txt >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/dep= endency_links.txt >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/not= -zip-safe >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/req= uires.txt >>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/top= _level.txt >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/PK= G-INFO >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/SO= URCES.txt >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/de= pendency_links.txt >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/no= t-zip-safe >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/re= quires.txt >>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/to= p_level.txt >>> usr/lib/python3.10/site-packages/cryptography/__about__.py >>> usr/lib/python3.10/site-packages/cryptography/__init__.py >>> usr/lib/python3.10/site-packages/cryptography/exceptions.py >>> usr/lib/python3.10/site-packages/cryptography/fernet.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat >>> usr/lib/python3.10/site-packages/cryptography/hazmat/__init__.py >>> -usr/lib/python3.10/site-packages/cryptography/hazmat/_der.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/_oid.py >>> -usr/lib/python3.10/site-packages/cryptography/hazmat/_types.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/__init__.= py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/interface= s.py >>> @@ -33,7 +31,6 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/ba= ckends/openssl/ed448.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/e= ncode_asn1.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/h= ashes.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/h= mac.py >>> -usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/oc= sp.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/p= oly1305.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/r= sa.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/u= tils.py >>> @@ -43,8 +40,12 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/b= ackends/openssl/x509.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/__init__.= py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_openssl.= abi3.so >>> -usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_padding.a= bi3.so >>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust.abi= 3.so >>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/__in= it__.pyi >>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/asn1= .pyi >>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/ocsp= .pyi >>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/x509= .pyi >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/openssl >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/openssl/_= _init__.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/openssl/_= conditional.py >>> @@ -63,6 +64,7 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/pr= imitives/asymmetric/ed255 >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmet= ric/ed448.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmet= ric/padding.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmet= ric/rsa.py >>> +usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmetr= ic/types.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmet= ric/utils.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmet= ric/x25519.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymmet= ric/x448.py >>> @@ -97,7 +99,6 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/pr= imitives/twofactor >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/twofact= or/__init__.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/twofact= or/hotp.py >>> usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/twofact= or/totp.py >>> -usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/twofacto= r/utils.py >>> usr/lib/python3.10/site-packages/cryptography/py.typed >>> usr/lib/python3.10/site-packages/cryptography/utils.py >>> usr/lib/python3.10/site-packages/cryptography/x509 >>> diff --git a/lfs/python3-cryptography b/lfs/python3-cryptography >>> index f3090bc6a..77e5f06b0 100644 >>> --- a/lfs/python3-cryptography >>> +++ b/lfs/python3-cryptography >>> @@ -24,7 +24,7 @@ >>> include Config >>> -VER =3D 3.4.7 >>> +VER =3D 36.0.2 >>> THISAPP =3D cryptography-$(VER) >>> DL_FILE =3D $(THISAPP).tar.gz >>> @@ -32,7 +32,7 @@ DL_FROM =3D $(URL_IPFIRE) >>> DIR_APP =3D $(DIR_SRC)/$(THISAPP) >>> TARGET =3D $(DIR_INFO)/$(THISAPP) >>> PROG =3D python3-cryptography >>> -PAK_VER =3D 1 >>> +PAK_VER =3D 2 >>> DEPS =3D python3-cffi >>> @@ -46,7 +46,7 @@ objects =3D $(DL_FILE) >>> $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) >>> -$(DL_FILE)_BLAKE2 =3D 49bc1e098ed1ba0181059b645f6668cda6332d196eaca552= 70ebce6e07e5bb6ab6724c5050fde20e89b7025773960d74ec782bb875badbbd5dc9a04db0a53= 6f1 >>> +$(DL_FILE)_BLAKE2 =3D b34b994e44b1ccd099a56fba4a167d563a29652f86ab0f0000= ef78b4093a15cbfb82a9cebecdcaf6bca782a5fdd20f6c7d2206d68a219626a9fe8ae13e9aec5e >>> install : $(TARGET) >>> =20 >=20 --===============4092454495351202283==--