Commit Graph

13 Commits

Author SHA1 Message Date
Fabrice Fontaine 5afe5c9031 treewide: assign PKG_CPE_ID
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
2024-02-04 16:16:10 -08:00
Jeffery To b1b008f42f
python-packages: Clean up build variables
* Rename PYTHON3_PKG_SETUP_VARS to PYTHON3_PKG_BUILD_VARS, and
  PYTHON3_PKG_SETUP_DIR to PYTHON3_PKG_BUILD_PATH

  The new variable names emphasize that these values apply to the new
  build process.

* Remove PYTHON3_PKG_SETUP_ARGS set to the empty string

  These were set to override the default arguments in the old build
  process and not applicable to the new build process.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-04-24 16:22:03 +08:00
Javier Marcet 2ee0f893e3 python3-paramiko: update to version 2.12.0
Signed-off-by: Javier Marcet <javier@marcet.info>
2023-01-01 16:35:40 +08:00
Javier Marcet 117e3d6a18 python3-paramiko: update to version 2.11.0
2.11.0:

 - [Feature] Add SSH config token expansion (eg %h, %p) when parsing
 ProxyJump directives. Patch courtesy of Bruno Inec.

 - [Support] (via #2011) Apply unittest skipIf to tests currently
 using SHA1 in their critical path, to avoid failures on systems
 starting to disable SHA1 outright in their crypto backends (eg RHEL
 9). Report & patch via Paul Howarth.

 - [Support] Update camelCase method calls against the threading
 module to be snake_case; this and related tweaks should fix some
 deprecation warnings under Python 3.10. Thanks to Karthikeyan
 Singaravelan for the report, @Narendra-Neerukonda for the patch,
 and to Thomas Grainger and Jun Omae for patch workshopping.

 - [Support] Recent versions of Cryptography have deprecated Blowfish
 algorithm support; in lieu of an easy method for users to remove it
 from the list of algorithms Paramiko tries to import and use, we’ve
 decided to remove it from our “preferred algorithms” list. This will
 both discourage use of a weak algorithm, and avoid warnings. Credit
 for report/patch goes to Mike Roest.

2.10.5:

 - [Bug] Windows-native SSH agent support as merged in 2.10 could
 encounter Errno 22 OSError exceptions in some scenarios (eg server
 not cleanly closing a relevant named pipe). This has been worked
 around and should be less problematic. Reported by Danilo Campana
 Fuchs and patched by Jun Omae.

 - [Bug] OpenSSH 7.7 and older has a bug preventing it from
 understanding how to perform SHA2 signature verification for RSA
 certificates (specifically certs - not keys), so when we added SHA2
 support it broke all clients using RSA certificates with these
 servers. This has been fixed in a manner similar to what OpenSSH’s
 own client does: a version check is performed and the algorithm used
 is downgraded if needed. Reported by Adarsh Chauhan, with fix
 suggested by Jun Omae.

 - [Bug] Align signature verification algorithm with OpenSSH re:
 zero-padding signatures which don’t match their nominal size/length.
 This shouldn’t affect most users, but will help Paramiko-implemented
 SSH servers handle poorly behaved clients such as PuTTY. Thanks to
 Jun Omae for catch & patch.

Signed-off-by: Javier Marcet <javier@marcet.info>
2022-05-25 17:03:28 -07:00
Javier Marcet b1159e8764 python3-paramiko: update to version 2.10.4
- [Bug] Servers offering certificate variants of hostkey algorithms
 (eg ssh-rsa-cert-v01@openssh.com) could not have their host keys
 verified by Paramiko clients, as it only ever considered non-cert key
 types for that part of connection handshaking. This has been fixed.

 - [Bug] PKey instances’ __eq__ did not have the usual safety guard in
 place to ensure they were being compared to another PKey object,
 causing occasional spurious BadHostKeyException (among other things).
 This has been fixed. Thanks to Shengdun Hua for the original report
 /patch and to Christopher Papke for the final version of the fix.

 - [Support] Update camelCase method calls against the threading
 module to be snake_case; this and related tweaks should fix some
 deprecation warnings under Python 3.10. Thanks to Karthikeyan
 Singaravelan for the report, @Narendra-Neerukonda for the patch, and
 to Thomas Grainger and Jun Omae for patch workshopping.

Signed-off-by: Javier Marcet <javier@marcet.info>
2022-05-02 12:48:21 -07:00
Javier Marcet 539f9d07a1 python3-paramiko: update to version 2.10.3
2.10.2:

 - [Bug] Fix Python 2 compatibility breakage introduced in 2.10.1.
 Spotted by Christian Hammond.

2.10.3:

 - [Bug] Switch from module-global to thread-local storage when
 recording thread IDs for a logging helper; this should avoid one
 flavor of memory leak for long-running processes. Catch & patch via
 Richard Kojedzinszky.

 - [Bug] Certificate-based pubkey auth was inadvertently broken when
 adding SHA2 support; this has been fixed. Reported by Erik Forsberg
 and fixed by Jun Omae.

Signed-off-by: Javier Marcet <javier@marcet.info>
2022-03-30 09:05:07 +03:00
Javier Marcet d09e1b23b2 python3-paramiko: update to version 2.10.1
2.10.1:

 - [Bug]: (CVE-2022-24302) Creation of new private key files using
 PKey subclasses was subject to a race condition between file creation
 & mode modification, which could be exploited by an attacker with
 knowledge of where the Paramiko-using code would write out such
 files.

 - This has been patched by using os.open and os.fdopen to ensure new
 files are opened with the correct mode immediately. We’ve left the
 subsequent explicit chmod in place to minimize any possible
 disruption, though it may get removed in future backwards-
 incompatible updates.

 - Thanks to Jan Schejbal for the report & feedback on the solution,
 and to Jeremy Katz at Tidelift for coordinating the disclosure.

2.10.0:

 - [Feature] Add support for OpenSSH’s Windows agent as a fallback
 when Putty/WinPageant isn’t available or functional. Reported by
 @benj56 with patches/PRs from @lewgordon and Patrick Spendrin.

 - [Feature] Add support for the %C token when parsing SSH config
 files. Foundational PR submitted by @jbrand42.

 - [Bug] Significantly speed up low-level read/write actions on
 SFTPFile objects by using bytearray/memoryview. This is unlikely to
 change anything for users of the higher level methods like
 SFTPClient.get or SFTPClient.getfo, but users of SFTPClient.open will
 likely see orders of magnitude improvements for files larger than a
 few megabytes in size.

 - Thanks to @jkji for the original report and to Sevastian Tchernov
 for the patch.

 - [Support] Add six explicitly to install-requires; it snuck into
 active use at some point but has only been indicated by transitive
 dependency on bcrypt until they somewhat-recently dropped it. This
 will be short-lived until we drop Python 2 support. Thanks to
 Sondre Lillebø Gundersen for catch & patch.

Signed-off-by: Javier Marcet <javier@marcet.info>
2022-03-16 19:45:42 -07:00
Javier Marcet 9121756e92 python3-paramiko: update to version 2.9.2
- [Bug]: Enhanced log output when connecting to servers that do not
 support server-sig-algs extensions, making the new-as-of-2.9
 defaulting to SHA2 pubkey algorithms more obvious when it kicks in.

 - [Bug]: Connecting to servers which support server-sig-algs but
 which have no overlap between that list and what a Paramiko client
 supports, now raise an exception instead of defaulting to
 rsa-sha2-512 (since the use of server-sig-algs allows us to know
 what the server supports).

Signed-off-by: Javier Marcet <javier@marcet.info>
2022-01-09 13:47:42 -08:00
Javier Marcet 6bdc4038fa python3-paramiko: update to version 2.9.1
Signed-off-by: Javier Marcet <javier@marcet.info>
2021-12-26 23:15:49 +01:00
Javier Marcet 70138a4ff5 python3-paramiko: update to version 2.8.0
Signed-off-by: Javier Marcet <javier@marcet.info>
2021-10-13 17:07:25 -07:00
Javier Marcet 94eea60367 python3-paramiko: update to version 2.7.2
Signed-off-by: Javier Marcet <javier@marcet.info>
2020-09-07 13:36:38 +02:00
Jeffery To 836b67db90
python-packages: Remove variants
These packages were in the PR stage when the cleanup occurred and so
still had VARIANT:=python3.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2020-06-14 03:29:59 +08:00
Javier Marcet 2770f477f7 python3-paramiko: add a new package
Signed-off-by: Javier Marcet <javier@marcet.info>
2020-06-08 13:57:26 +02:00