-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency pyopenssl to v24.3.0 #410
base: main
Are you sure you want to change the base?
Conversation
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
@cbartz there are some lint errors here, can you verify it please? |
Test coverage for e7080e6
Static code analysis report
|
@amandahla it seems you fixed the lint errors , but I can take over here. Thx. |
This PR contains the following updates:
==24.2.1
->==24.3.0
Release Notes
pyca/pyopenssl (pyOpenSSL)
v24.3.0
Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
OpenSSL.crypto.CRL
,OpenSSL.crypto.Revoked
,OpenSSL.crypto.dump_crl
, andOpenSSL.crypto.load_crl
.cryptography.x509
's CRL functionality should be used instead.OpenSSL.crypto.sign
andOpenSSL.crypto.verify
.cryptography.hazmat.primitives.asymmetric
's signature APIs should be used instead.Deprecations:
^^^^^^^^^^^^^
OpenSSL.rand
- callers should useos.urandom()
instead.add_extensions
andget_extensions
onOpenSSL.crypto.X509Req
andOpenSSL.crypto.X509
. These should have been deprecated at the same timeX509Extension
was. Users should use pyca/cryptography's X.509 APIs instead.OpenSSL.crypto.get_elliptic_curves
andOpenSSL.crypto.get_elliptic_curve
, as well as passing the reult of them toOpenSSL.SSL.Context.set_tmp_ecdh
, users should instead pass curves fromcryptography
.X509
objects toOpenSSL.SSL.Context.use_certificate
,OpenSSL.SSL.Connection.use_certificate
,OpenSSL.SSL.Context.add_extra_chain_cert
, andOpenSSL.SSL.Context.add_client_ca
, users should instead passcryptography.x509.Certificate
instances. This is in preparation for deprecating pyOpenSSL'sX509
entirely.PKey
objects toOpenSSL.SSL.Context.use_privatekey
andOpenSSL.SSL.Connection.use_privatekey
, users should instead passcryptography
priate key instances. This is in preparation for deprecating pyOpenSSL'sPKey
entirely.Changes:
^^^^^^^^
cryptography
maximum version has been increased to 44.0.x.OpenSSL.SSL.Connection.get_certificate
,OpenSSL.SSL.Connection.get_peer_certificate
,OpenSSL.SSL.Connection.get_peer_cert_chain
, andOpenSSL.SSL.Connection.get_verified_chain
now take anas_cryptography
keyword-argument. WhenTrue
is passed thencryptography.x509.Certificate
are returned, instead ofOpenSSL.crypto.X509
. In the future, passingFalse
(the default) will be deprecated.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.