Received: by mail.netbsd.org (Postfix, from userid 605) id CD3D084D82; Thu, 18 Aug 2022 16:45:31 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 14D6684D24 for ; Thu, 18 Aug 2022 16:45:31 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id vUQeskgEpofc for ; Thu, 18 Aug 2022 16:45:30 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 385E984D6A for ; Thu, 18 Aug 2022 16:45:30 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 31037FB1A; Thu, 18 Aug 2022 16:45:30 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_166084113058120" MIME-Version: 1.0 Date: Thu, 18 Aug 2022 16:45:30 +0000 From: "Adam Ciarcinski" Subject: CVS commit: pkgsrc/security/py-asyncssh To: pkgsrc-changes@NetBSD.org Reply-To: adam@netbsd.org X-Mailer: log_accum Message-Id: <20220818164530.31037FB1A@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_166084113058120 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: adam Date: Thu Aug 18 16:45:30 UTC 2022 Modified Files: pkgsrc/security/py-asyncssh: Makefile PLIST distinfo Log Message: py-asyncssh: updated to 2.12.0 Release 2.12.0 (10 Aug 2022) ---------------------------- * Added top-level functions run_client() and run_server() which allow you to begin running an SSH client or server on an already-connected socket. This capability is also available via a new "sock" argument in the existing connect(), connect_reverse(), get_server_host_key(), and get_server_auth_methods() functions. * Added "sock" argument to listen() and listen_reverse() functions which takes an already-bound listening socket instead of a host and port to bind a new socket to. * Added support for forwarding break, signal, and terminal size updates when redirection of stdin is set up between two SSHProcess instances. * Added support for sntrup761x25519-sha512@openssh.com post-quantum key exchange algorithm. For this to be available, the Open Quantum Safe (liboqs) dynamic library must be installed. * Added "sig_alg" argument to set a signature algorithm when creating OpenSSH certificates, allowing a choice between ssh-rsa, rsa-sha2-256, and rsa-sha2-512 for certificates signed by RSA keys. * Added new read_parallel() method in SFTPClientFile which allows parallel reads to be performed from a remote file, delivering incremental results as these reads complete. Previously, large reads would automatically be parallelized, but a result was only returned after all reads completed. * Added definition of __all__ for public symbols in AsyncSSH to make pyright autocompletion work better. Thanks go to Nicolas Riebesel for providing this change. * Updated SFTP and SCP glob and copy functions to use scandir() instead of listdir() to improve efficiency. * Updated default for "ignore_encrypted" client connection option to ignore encrypted keys specified in an OpenSSH config file when no passphrase is provided, similar to what was previosuly done for keys with default names. * Fixed an issue when using an SSH agent with RSA keys and an X.509 certificate while requesting SHA-2 signatures. * Fixed an issue with use of expanduser() in unit tests on newer versions of Python. Thanks go to Georg Sauthoff for providing an initial version of this fix. * Fixed an issue with fallback to a Pageant agent not working properly on Windows when no agent_path or SSH_AUTH_SOCK was set. * Fixed improper escaping in readuntil(), causing certain punctuation in separator to not match properly. Thanks go to Github user MazokuMaxy for reporting this issue. * Fixed the connection close handler to properly mark channels as fully closed when the peer unexpected closes the connection, allowing exceptions to fire if an application continues to try and use the channel. Thanks go to Taha Jahangir for reporting this issue and suggesting a possible fix. * Eliminated unit testing against OpenSSH for tests involving DSA and RSA keys using SHA-1 signatures, since this support is being dropped in some distributions of OpenSSH. These tests are still performed, but using only AsyncSSH code. Thanks go to Ken Dreyer and Georg Sauthoff for reporting this issue and helping me to reproduce it. To generate a diff of this commit: cvs rdiff -u -r1.31 -r1.32 pkgsrc/security/py-asyncssh/Makefile cvs rdiff -u -r1.12 -r1.13 pkgsrc/security/py-asyncssh/PLIST cvs rdiff -u -r1.32 -r1.33 pkgsrc/security/py-asyncssh/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_166084113058120 Content-Disposition: inline Content-Length: 3037 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/security/py-asyncssh/Makefile diff -u pkgsrc/security/py-asyncssh/Makefile:1.31 pkgsrc/security/py-asyncssh/Makefile:1.32 --- pkgsrc/security/py-asyncssh/Makefile:1.31 Fri Jul 8 08:00:42 2022 +++ pkgsrc/security/py-asyncssh/Makefile Thu Aug 18 16:45:30 2022 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.31 2022/07/08 08:00:42 adam Exp $ +# $NetBSD: Makefile,v 1.32 2022/08/18 16:45:30 adam Exp $ -DISTNAME= asyncssh-2.11.0 +DISTNAME= asyncssh-2.12.0 PKGNAME= ${PYPKGPREFIX}-${DISTNAME} CATEGORIES= security python MASTER_SITES= ${MASTER_SITE_PYPI:=a/asyncssh/} @@ -12,7 +12,7 @@ LICENSE= eclipse-license DEPENDS+= ${PYPKGPREFIX}-OpenSSL>=17.0.0:../../security/py-OpenSSL DEPENDS+= ${PYPKGPREFIX}-bcrypt>=3.1.3:../../security/py-bcrypt -DEPENDS+= ${PYPKGPREFIX}-cryptography>=2.8:../../security/py-cryptography +DEPENDS+= ${PYPKGPREFIX}-cryptography>=3.1:../../security/py-cryptography DEPENDS+= ${PYPKGPREFIX}-gssapi>=1.2.0:../../security/py-gssapi DEPENDS+= ${PYPKGPREFIX}-typing-extensions>=3.6:../../devel/py-typing-extensions Index: pkgsrc/security/py-asyncssh/PLIST diff -u pkgsrc/security/py-asyncssh/PLIST:1.12 pkgsrc/security/py-asyncssh/PLIST:1.13 --- pkgsrc/security/py-asyncssh/PLIST:1.12 Fri Jul 8 08:00:42 2022 +++ pkgsrc/security/py-asyncssh/PLIST Thu Aug 18 16:45:30 2022 @@ -1,4 +1,4 @@ -@comment $NetBSD: PLIST,v 1.12 2022/07/08 08:00:42 adam Exp $ +@comment $NetBSD: PLIST,v 1.13 2022/08/18 16:45:30 adam Exp $ ${PYSITELIB}/${EGG_INFODIR}/PKG-INFO ${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt ${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt @@ -76,6 +76,9 @@ ${PYSITELIB}/asyncssh/crypto/misc.pyo ${PYSITELIB}/asyncssh/crypto/rsa.py ${PYSITELIB}/asyncssh/crypto/rsa.pyc ${PYSITELIB}/asyncssh/crypto/rsa.pyo +${PYSITELIB}/asyncssh/crypto/sntrup.py +${PYSITELIB}/asyncssh/crypto/sntrup.pyc +${PYSITELIB}/asyncssh/crypto/sntrup.pyo ${PYSITELIB}/asyncssh/crypto/umac.py ${PYSITELIB}/asyncssh/crypto/umac.pyc ${PYSITELIB}/asyncssh/crypto/umac.pyo Index: pkgsrc/security/py-asyncssh/distinfo diff -u pkgsrc/security/py-asyncssh/distinfo:1.32 pkgsrc/security/py-asyncssh/distinfo:1.33 --- pkgsrc/security/py-asyncssh/distinfo:1.32 Fri Jul 8 08:00:42 2022 +++ pkgsrc/security/py-asyncssh/distinfo Thu Aug 18 16:45:30 2022 @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.32 2022/07/08 08:00:42 adam Exp $ +$NetBSD: distinfo,v 1.33 2022/08/18 16:45:30 adam Exp $ -BLAKE2s (asyncssh-2.11.0.tar.gz) = fe092cda85dd0289e7c0c57246e8c6b956bf6db9121ebe69f44db9bb743ad24b -SHA512 (asyncssh-2.11.0.tar.gz) = d9736d0d9e486c4a062fbf493d28f2c5b1074baa32879430750115a686600fa97c947ea34b47a1d9962cc44cc32ce6b31fdb0baa455fbde9b63660c5b8454810 -Size (asyncssh-2.11.0.tar.gz) = 482916 bytes +BLAKE2s (asyncssh-2.12.0.tar.gz) = 8113a199e8203c913a0a67ad1399e70efe1c4b9a5302ae6777228709554c3462 +SHA512 (asyncssh-2.12.0.tar.gz) = b7772fc7fe0a0d101ce1542b8e149e265dde0fdc3e824936f7b2db799f7580bbda5128501a6d51e6090c071014bac96897c2787442c53e333aa38bb231d66ccf +Size (asyncssh-2.12.0.tar.gz) = 488045 bytes --_----------=_166084113058120--