chore(deps): update dependency pyopenssl to v24.3.0 #1544
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
24.2.1->24.3.0Release Notes
pyca/pyopenssl (pyOpenSSL)
v24.3.0Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
OpenSSL.crypto.CRL,OpenSSL.crypto.Revoked,OpenSSL.crypto.dump_crl, andOpenSSL.crypto.load_crl.cryptography.x509's CRL functionality should be used instead.OpenSSL.crypto.signandOpenSSL.crypto.verify.cryptography.hazmat.primitives.asymmetric's signature APIs should be used instead.Deprecations:
^^^^^^^^^^^^^
OpenSSL.rand- callers should useos.urandom()instead.add_extensionsandget_extensionsonOpenSSL.crypto.X509ReqandOpenSSL.crypto.X509. These should have been deprecated at the same timeX509Extensionwas. Users should use pyca/cryptography's X.509 APIs instead.OpenSSL.crypto.get_elliptic_curvesandOpenSSL.crypto.get_elliptic_curve, as well as passing the reult of them toOpenSSL.SSL.Context.set_tmp_ecdh, users should instead pass curves fromcryptography.X509objects toOpenSSL.SSL.Context.use_certificate,OpenSSL.SSL.Connection.use_certificate,OpenSSL.SSL.Context.add_extra_chain_cert, andOpenSSL.SSL.Context.add_client_ca, users should instead passcryptography.x509.Certificateinstances. This is in preparation for deprecating pyOpenSSL'sX509entirely.PKeyobjects toOpenSSL.SSL.Context.use_privatekeyandOpenSSL.SSL.Connection.use_privatekey, users should instead passcryptographyprivate key instances. This is in preparation for deprecating pyOpenSSL'sPKeyentirely.Changes:
^^^^^^^^
cryptographymaximum version has been increased to 44.0.x.OpenSSL.SSL.Connection.get_certificate,OpenSSL.SSL.Connection.get_peer_certificate,OpenSSL.SSL.Connection.get_peer_cert_chain, andOpenSSL.SSL.Connection.get_verified_chainnow take anas_cryptographykeyword-argument. WhenTrueis passed thencryptography.x509.Certificateare returned, instead ofOpenSSL.crypto.X509. In the future, passingFalse(the default) will be deprecated.Configuration
📅 Schedule: Branch creation - "every weekend" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.