Next | Query returned 19 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2024-02-09 15:24:20 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-service_identity: updated to 24.1.0

24.1.0

Changed

- If a certificate doesn't contain any `subjectAltName`s, we now raise \ 
`service_identity.CertificateError` instead of \ 
`service_identity.VerificationError` to make the problem easier to debug.
   2023-10-28 21:57:26 by Thomas Klausner | Files touched by this commit (516) | Package updated
Log message:
python/wheel.mk: simplify a lot, and switch to 'installer' for installation

This follows the recommended bootstrap method (flit_core, build, installer).

However, installer installs different files than pip, so update PLISTs
for all packages using wheel.mk and bump their PKGREVISIONs.
   2023-08-02 01:20:57 by Thomas Klausner | Files touched by this commit (158)
Log message:
*: remove more references to Python 3.7
   2023-07-01 14:20:24 by Thomas Klausner | Files touched by this commit (1)
Log message:
py-service_identity: restore PKGNAME
   2023-07-01 13:29:20 by Thomas Klausner | Files touched by this commit (3) | Package updated
Log message:
service_identity: update to 23.1.0.

## [23.1.0](https://github.com/pyca/service-identity/compare/21.1.0...23.1.0) - \ 
2023-06-14

### Removed

- All Python versions up to and including 3.7 have been dropped.
- Support for `commonName` in certificates has been dropped.
  It has been deprecated since 2017 and isn't supported by any major browser.
- The oldest supported pyOpenSSL version (when using the `pyopenssl` backend) is \ 
now 17.0.0.
  When using such an old pyOpenSSL version, you have to pin *cryptography* \ 
yourself to ensure compatibility between them.
  Please check out \ 
[`contraints/oldest-pyopenssl.txt`](https://github.com/pyca/service-identity/blob/main/tests/constraints/oldest-pyopenssl.txt) \ 
to verify what we are testing against.

### Deprecated

- If you've used `service_identity.(cryptography|pyopenssl).extract_ids()`, \ 
please switch to the new names `extract_patterns()`.
  [#56](https://github.com/pyca/service-identity/pull/56)

### Added

- `service_identity.(cryptography|pyopenssl).extract_patterns()` are now public \ 
APIs (FKA `extract_ids()`).
  You can use them to extract the patterns from a certificate without verifying \ 
anything.
  [#55](https://github.com/pyca/service-identity/pull/55)
- *service-identity* is now fully typed.
  [#57](https://github.com/pyca/service-identity/pull/57)
   2023-05-05 11:02:12 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
py-service_identity: update to 21.1.0.

21.1.0 (2021-05-09)
-------------------

Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

- Python 3.4 is not supported anymore.
  It has been unsupported by the Python core team for a while now, its PyPI \ 
downloads are negligible, and our CI provider removed it as a supported option.

  It's very unlikely that ``service-identity`` will break under 3.4 anytime \ 
soon, which is why we do *not* block its installation on Python 3.4.
  But we don't test it anymore and will block it once someone reports breakage.

Changes:
^^^^^^^^

- ``service_identity.exceptions.VerificationError`` can now be pickled and is \ 
overall more well-behaved as an exception.
  This raises the requirement of ``attrs`` to 19.1.0.
   2022-10-19 16:25:20 by Nia Alarie | Files touched by this commit (21)
Log message:
fighting a losing battle against the py-cryptography rustification, part 5

Convert py-OpenSSL users to versioned_dependencies.mk
   2022-09-11 20:12:05 by Thomas Klausner | Files touched by this commit (1)
Log message:
py-service_identity: mark as not for python 2.x
   2022-01-04 21:55:40 by Thomas Klausner | Files touched by this commit (1595)
Log message:
*: bump PKGREVISION for egg.mk users

They now have a tool dependency on py-setuptools instead of a DEPENDS
   2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605)
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \ 
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2

Next | Query returned 19 messages, browsing 1 to 10 | Previous