chore(deps): update dependency pyopenssl to v24.3.0 #12957
+2
−2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==24.0.0
->==24.3.0
==24.0.0
->==24.3.0
Release Notes
pyca/pyopenssl (pyOpenSSL)
v24.3.0
Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
OpenSSL.crypto.CRL
,OpenSSL.crypto.Revoked
,OpenSSL.crypto.dump_crl
, andOpenSSL.crypto.load_crl
.cryptography.x509
's CRL functionality should be used instead.OpenSSL.crypto.sign
andOpenSSL.crypto.verify
.cryptography.hazmat.primitives.asymmetric
's signature APIs should be used instead.Deprecations:
^^^^^^^^^^^^^
OpenSSL.rand
- callers should useos.urandom()
instead.add_extensions
andget_extensions
onOpenSSL.crypto.X509Req
andOpenSSL.crypto.X509
. These should have been deprecated at the same timeX509Extension
was. Users should use pyca/cryptography's X.509 APIs instead.OpenSSL.crypto.get_elliptic_curves
andOpenSSL.crypto.get_elliptic_curve
, as well as passing the reult of them toOpenSSL.SSL.Context.set_tmp_ecdh
, users should instead pass curves fromcryptography
.X509
objects toOpenSSL.SSL.Context.use_certificate
,OpenSSL.SSL.Connection.use_certificate
,OpenSSL.SSL.Context.add_extra_chain_cert
, andOpenSSL.SSL.Context.add_client_ca
, users should instead passcryptography.x509.Certificate
instances. This is in preparation for deprecating pyOpenSSL'sX509
entirely.PKey
objects toOpenSSL.SSL.Context.use_privatekey
andOpenSSL.SSL.Connection.use_privatekey
, users should instead passcryptography
priate key instances. This is in preparation for deprecating pyOpenSSL'sPKey
entirely.Changes:
^^^^^^^^
cryptography
maximum version has been increased to 44.0.x.OpenSSL.SSL.Connection.get_certificate
,OpenSSL.SSL.Connection.get_peer_certificate
,OpenSSL.SSL.Connection.get_peer_cert_chain
, andOpenSSL.SSL.Connection.get_verified_chain
now take anas_cryptography
keyword-argument. WhenTrue
is passed thencryptography.x509.Certificate
are returned, instead ofOpenSSL.crypto.X509
. In the future, passingFalse
(the default) will be deprecated.v24.2.1
Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Deprecations:
^^^^^^^^^^^^^
Changes:
^^^^^^^^
v24.1.0
Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
OpenSSL.crypto.PKCS12
andOpenSSL.crypto.NetscapeSPKI
.OpenSSL.crypto.PKCS12
may be replacedby the PKCS#12 APIs in the
cryptography
package.Deprecations:
^^^^^^^^^^^^^
Changes:
^^^^^^^^
Configuration
📅 Schedule: Branch creation - "* 0-3 1 * *" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.