Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

python-paramiko-doc-2.4.2-lp152.3.6.1 RPM for noarch

From OpenSuSE Ports Leap 15.2 updates for noarch

Name: python-paramiko-doc Distribution: openSUSE Leap 15.2
Version: 2.4.2 Vendor: openSUSE
Release: lp152.3.6.1 Build date: Wed May 12 12:16:32 2021
Group: Documentation/Other Build host: obs-arm-8
Size: 68218 Source RPM: python-paramiko-2.4.2-lp152.3.6.1.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.paramiko.org/
Summary: Documentation for python-paramiko
This is a library for making SSH2 connections (client or server).
Emphasis is on using SSH2 as an alternative to SSL for making secure
connections between python scripts.  All major ciphers and hash methods
are supported.  SFTP client and server mode are both supported too.

This package contains the documentation.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Mon Apr 12 2021 Steve Kowalik <steven.kowalik@suse.com>
  - Add support-cryptography-25-and-above.patch:
    * Since SLE15 SP1 and above have cryptography 2.8, stop using deprecated
      methods, and update the required version. (bsc#1178341)
* Wed Apr 22 2020 Marcus Meissner <meissner@suse.com>
  - paramiko-fix-1169489.patch: fixed fallout from last patch (bsc#1169489)
* Tue Mar 24 2020 Ali Abdallah <ali.abdallah@suse.com>
  - add-support-for-new-OpenSSH-private-key-format.patch:
    Add support for new OpenSSH >= 7.8p1 private key format  (bsc#1166758)
* Tue Nov 13 2018 Ondřej Súkup <mimi.vx@gmail.com>
  - add disable-gssapi.patch - workaround for boo#1115769
* Fri Oct 05 2018 Ondřej Súkup <mimi.vx@gmail.com>
  - update to 2.4.2
  - refresh paramiko-test_extend_timeout.patch
    * Fix exploit (CVE pending) in Paramiko's server mode (not client mode)
      where hostile clients could trick the server into thinking they were
      authenticated without actually submitting valid authentication.
    * Modify protocol message handling such that Transport does not respond
      to MSG_UNIMPLEMENTED with its own MSG_UNIMPLEMENTED
    * Updated SSHConfig.lookup <paramiko.config.SSHConfig.lookup> so it returns
      a new, type-casting-friendly dict subclass (~paramiko.config.SSHConfigDict)
      in lieu of dict literals.
* Thu Mar 15 2018 ro@suse.de
  - add paramiko-test_extend_timeout.patch (bsc#1085529)
    extend timeout in testsuite to pass on ppc64le
* Thu Mar 15 2018 tbechtold@suse.com
  update to version 2.4.1 (bsc#1085276, CVE-2018-7750):
    * changelog: update for #1039 / #1051
    * Screen off dev version of Python from test matrix
    * ensure ed25519 password is bytes
    * Cut 2.0.8
    * Cut 2.3.2
    * Initial tests proving CVE-2018-7750 / #1175
    * Guess something else added this prior to the merge
    * Fixes CVE-2018-7750 / #1175
    * Uncaught typo in test suite
    * Initial tests proving CVE-2018-7750 / #XXX
    * Test proving #1039 / efficacy of #1051
    * Changelog closes #1175
    * Cut 2.1.5
    * Allow overriding test client connect kwargs in Transport test suite
    * Cut 2.4.1
    * Fixes CVE-2018-7750 / #XXX
    * Cut 2.2.3
    * flake8
* Thu Nov 16 2017 mimi.vx@gmail.com
  - update to 2.4.0
    + new pytest based testsuite
    * dd a new passphrase kwarg to SSHClient.connect so users may disambiguate
      key-decryption passphrases from password-auth passwords.
    * Drop Python 2.6 and Python 3.3 support
* Thu Oct 05 2017 mimi.vx@gmail.com
  - update to 2.3.1
    + cert_support.tar.gz - missing test certificates for testsuite
    * Certificate support broke the no-certificate case for Ed25519 keys
      (symptom is an AttributeError about public_blob.) This went uncaught
      due to cert autoload behavior (i.e. our test suite never actually ran
      the no-cert case, because the cert existed!) Both issues have been fixed.
    * Implement basic client-side certificate authentication
      (as per the OpenSSH vendor extension.)
    * Added pre-authentication banner support for the server interface
      (ServerInterface.get_banner plus related support in Transport/AuthHandler.)
    * Update Ed25519Key so its constructor offers the same file_obj parameter
      as its sibling key classes.
    * Add a gss_trust_dns option to Client and Transport to allow explicitly
      setting whether or not DNS canonicalization should occur when using GSSAPI.
    * Paramiko originally defaulted to zlib compression level 9
      (when one connects with compression=True; it defaults to off.) This has been
      found to be quite wasteful and tends to cause much longer transfers in most
      cases, than is necessar
    * Enhance documentation around the new SFTP.posix_rename method
      so it’s referenced in the ‘standard’ rename method for increased visibility.
    * Modify logic around explicit disconnect messages, and unknown-channel situations,
      so that they rely on centralized shutdown code instead of running their own.
      This is at worst removing some unnecessary code, and may help with some
      situations where Paramiko hangs at the end of a session.
    * Display exception type and message when logging auth-rejection messages
      (ones reading Auth rejected: unsupported or mangled public key); previously
      this error case had a bare except and did not display exactly why the key
      failed.
    * Ed25519 keys never got proper API documentation support; this has been fixed.
    * Update how we use Cryptography‘s signature/verification methods
      so we aren’t relying on a deprecated API.
* Thu Oct 05 2017 mimi.vx@gmail.com
  - update to 2.2.2:
    * SSHClient now requests the type of host key it has (e.g. from known_hosts)
      and does not consider a different type to be a “Missing” host key.
      This fixes a common case where an ECDSA key is in known_hosts and the server
      also has an RSA host key.
    * Fix up host-key checking in our GSSAPI support, which was previously
      using an incorrect API call
    * Fix key exchange (kex) algorithm list for GSSAPI authentication;
      reviously, the list used solely out-of-date algorithms, and now contains
      newer ones listed preferentially before the old
    * Clean up GSSAPI authentication procedures so they do not prevent normal
      fallback to other authentication methods on failure.
    * Add rekeying support to GSSAPI connections, which was erroneously missing.
* Thu Aug 10 2017 tbechtold@suse.com
  - update to 2.2.1:
    * Missed a spot
    * Update .travis.yml
    * Whitespace
    * Having this in a mini-toctree made the nav look funny and is also just unintuitive
    * Changelog re #471, re #65
    * these are bytes
    * changelog: update for #990 and #993
    * ecdh kex support
    * flake8/whitespace
    * Trailing comma
    * Add test for posix-rename@openssh.com extension for SFTP client
    * Changelog re #921
    * Add a note about new Python-level deps to changelog re: Ed25519 support
    * Add method for "posix-rename@openssh.com" extension for SFTP client.
    * Add IOError in posix-rename@openssh.com test for python 2 support.
    * this isnt bytes
    * Added a auth_timeout to handle situations where SSH server stops responding during auth.
    * small cleanups
    * More changelog flimflammery
    * Added changelog entry
    * python 3 compatibility
    * Incorrect comparison, should be <=
    * DDD re #857
    * Improve __hash__ functions
    * Hrm that should always have been an h1
    * No idea how this got past all the earlier flake8 work...
    * comments
    * Fixed test to support python 2.6
    * Note ecdh-sha2 preferred-kex placement in changelog entry for #951, re #983
    * Changelog language tweaks
    * Reorder cipher and key preferences to make more sense
    * Added a test to check that the auth_timeout argument is passed through and applied.
    * Changelog tweak
    * Cut 2.2.1
    * transport: change order of preferred kex and hmac algorithms
    * need bcrypt >= 3.1.3 for kdf() ignore_few_rounds kwarg
    * Changelog re #972, re #325, closes #325
    * cleanup/simplify auth_timeout tests
    * Missed a merge conflict lolol
    * flake8
    * Changelog re #951
    * Perplexed at why flake8 did not report this earlier
    * Add Python 3.6 to classifiers
    * Add support for posix-rename@openssh.com for the SFTP server side and fix tests accordingly.
    * sphinx nitpick fixes
    * Fixed encoding/decoding of the public key on the wire
    * Added test for authentication timeout from a non-responsive server
    * refactor files
    * fixed comment + consistency
    * Changelog re #857
    * Cut 2.2.0
    * integration test, with ourselves
    * TODO
    * That was easy. Closes #857
    * Add sanity note to changelog re #869
    * Unit tests
    * Fixes #325 -- add support for Ed25519 keys
    * Happy New Year
    * implement __hash__() method for Ed25519Key
    * pep8
    * Increased auth_timeout to 30 seconds
    * py3k
    * fixed long line
    * Link to the spec
    * set a minimum version
    * Support decrypting keys
    * Failing test proving need for #857
  - move demos/ to extra -doc package
* Sun Jun 11 2017 mimi.vx@gmail.com
  - update to 2.1.3
    * Make util.log_to_file append instead of replace.
    * SSHClient and Transport could cause a memory leak if there’s a connection
    problem or protocol error, even if Transport.close() is called.
    * Prior support for ecdsa-sha2-nistp(384|521) algorithms didn’t fully extend
    to covering host keys, preventing connection to hosts which only offer
    these key types and no others. This is now fixed.
    * Prefer newer ecdsa-sha2-nistp keys over RSA and DSA keys during host key
    selection. This improves compatibility with OpenSSH, both in terms of general
    behavior, and also re: ability to properly leverage OpenSSH-modified
    known_hosts files.
    * The RC4/arcfour family of ciphers has been broken since version 2.0; but since
    the algorithm is now known to be completely insecure, we are opting
    to remove support outright instead of fixing it.
    * Move sha1 above the now-arguably-broken md5 in the list of preferred MAC
    algorithms, as an incremental security improvement for users whose target
    systems offer both.
    * Writing encrypted/password-protected private key files was silently broken
    since 2.0 due to an incorrect API call
      Includes a directly related fix, namely adding the ability to read AES-256-CBC
    ciphered private keys (which is now what we tend to write out as it is
    Cryptography’s default private key cipher.)
    * Allow any type implementing the buffer API to be used with BufferedFile,
    Channel, and SFTPFile. This resolves a regression introduced in 1.13
    with the Python 3 porting changes, when using types such as memoryview.
    * Enhance default cipher preference order such that aes(192|256)-cbc are preferred
    over blowfish-cbc.
    * SSHClient now requests the type of host key it has (e.g. from known_hosts)
    and does not consider a different type to be a “Missing” host key. This fixes
    a common case where an ECDSA key is in known_hosts and the server also has
    an RSA host key.
    * Overhaul the codebase to be PEP-8
* Wed Apr 19 2017 toddrme2178@gmail.com
  - Implement single-spec version.
* Fri Mar 17 2017 rjschwei@suse.com
  - Fix version setting for cryptography for build
* Thu Mar 16 2017 rjschwei@suse.com
  - Add python-pyasn1 as Buildrequires for testing
* Fri Feb 24 2017 mimi.vx@gmail.com
  - update to 2.1.2
    * Fix a bug in server-mode concerning multiple interactive auth steps
    * SSHClient now gives its internal Transport a handle on itself, preventing
      garbage collection of the client until the session is closed. Without this,
      some code which returns stream or transport objects without the client that
      generated them, would result in premature session closure
      when the client was GCd
    * Avoid test suite exceptions on platforms lacking errno.ETIME
    * weak how RSAKey.__str__ behaves so it doesn’t cause TypeError under Python 3.
* Tue Dec 13 2016 mimi.vx@gmail.com
  - update to 2.1.1
    * A tweak to the original patch implementing gh#398 was not fully applied,
      causing calls to ~paramiko.client.SSHClient.invoke_shell to fail with
      AttributeError. This has been fixed.
    * Fix the implementation of PKey.write_private_key_file (this method is only
      publicly defined on subclasses; the fix was in the private real
      implementation) so it passes the correct params to open()
    * Add an optional timeout parameter to Transport.start_clienti
      <paramiko.transport.Transport.start_client> (and feed it the value of the
      configured connection timeout when used within SSHClient
      <paramiko.client.SSHClient>.)
    * Catch AssertionError thrown by Cryptography when attempting to load bad
      ECDSA keys, turning it into an SSHException.
    * Add a missing .closed attribute (plus ._closed because reasons) to
      ProxyCommand <paramiko.proxy.ProxyCommand>
    * Make the subprocess import in proxy.py lazy so users on platforms without
      it (such as Google App Engine) can import Paramiko successfully
    * Fix incorrect docstring/param-list for Transport.auth_gssapi_keyex
      <paramiko.transport.Transport.auth_gssapi_keyex> so it matches
      the real signature.
    * Add an environment dict argument to Client.exec_command
* Fri Oct 07 2016 tbechtold@suse.com
  - Fix Requires for python-cryptography
  - Add missing Requires for python-pyasn1
* Sun Jul 31 2016 michael@stroeder.com
  - update to 2.0.2
    * [Bug] #758: Apply type definitions to _winapi module from
      jaraco.windows 3.6.1. This should address issues on Windows platforms
      that often result in errors like ArgumentError: [...] int too long to
      convert. Thanks to @swohlerLL for the report and Jason R. Coombs for the
      patch.
    * [Bug] #774: Add a _closed private attribute to Channel objects so that
      they continue functioning when used as proxy sockets under Python 3 (e.g.
      as direct-tcpip gateways for other Paramiko connections.)
    * [Bug] #673: (via #681) Fix protocol banner read errors (SSHException)
      which would occasionally pop up when using ProxyCommand gatewaying.
      Thanks to @Depado for the initial report and Paul Kapp for the fix.
* Sat Jul 23 2016 michael@stroeder.com
  - updated homepage URL
  - update to 2.0.1:
    * [Bug] #537: Fix a bug in BufferedPipe.set_event which could cause
      deadlocks/hangs when one uses select.select against Channel objects (or
      otherwise calls Channel.fileno after the channel has closed).
    * [Bug] #520: (Partial fix) Fix at least one instance of race condition
      driven threading hangs at end of the Python interpreter session.
      (Includes a docs update as well - always make sure to .close() your
      clients!)
* Fri Jul 08 2016 dmueller@suse.com
  - fix build
* Mon Jun 06 2016 dmueller@suse.com
  - fix source url
* Sun May 08 2016 hpj@urpla.net
  - update to 2.0.0:
    * Add support for 384- and 512-bit elliptic curve groups in ECDSA
      key types (aka ecdsa-sha2-nistp384 / ecdsa-sha2-nistp521).
    * Due to an earlier bugfix, less-specific Host blocks' ProxyCommand
      values were overriding ProxyCommand none in more-specific Host
      blocks. This has been fixed in a backwards compatible manner (i.e.
      ProxyCommand none continues to appear as a total lack of any
      proxycommand key in parsed config structures).
    * Fix a backwards incompatibility issue that cropped up in
      SFTPFile.prefetch <~paramiko.sftp_file.prefetch> re: the
      erroneously non-optional file_size parameter. Should only affect
      users who manually call prefetch.
    * Replace PyCrypto with the Python Cryptographic Authority (PyCA)
      'Cryptography' library suite. This improves security,
      installability, and performance; adds PyPy support; and much more.
    * Fix stalled/hung SFTP downloads by cleaning up some threading lock
      issues.
    * Fix a Python 3 compatibility issue when handling two-factor
      authentication.
    * Clean up setup.py to always use setuptools, not doing so was a
      historical artifact from bygone days.
    * Update the module in charge of handling SSH moduli so it's
      consistent with OpenSSH behavior re: prime number selection.
    * Fix up ~paramiko.ssh_exception.NoValidConnectionsError so it
      pickles correctly, and fix a related Python 3 compatibility issue.
    * Update to jaraco.windows 3.4.1 to fix some errors related to
      ctypes on Windows platforms.
    * Annotate some public attributes on ~paramiko.channel.Channel such
      as .closed.
    * Fix logic bug in the SFTP client's callback-calling functionality;
      previously there was a chance the given callback would fire twice
      at the end of a transfer.
    * Identify & work around a race condition in the test for handshake
      timeouts, which was causing frequent test failures for a subset of
      contributors as well as Travis-CI (usually, but not always,
      limited to Python 3.5).
    * Remove whitespace in our setup.py's install_requires as it
      triggers occasional bugs in some versions of setuptools.
    * Strip trailing/leading whitespace from lines when parsing SSH
      config files - this brings things in line with OpenSSH behavior.
    * Fix behavior of gssapi-with-mic auth requests so they fail
      gracefully (allowing followup via other auth methods) instead of
      raising an exception.
    * Add missing file-like object methods for ~paramiko.file.BufferedFile
      and ~paramiko.sftp_file.SFTPFile.
    * Clean up and enhance the README (and rename it to README.rst from
      just README).
* Mon Feb 01 2016 toddrme2178@gmail.com
  - Add --no-transport to fix a known issue with the tests
    https://github.com/paramiko/paramiko/issues/574
    Check if still failing on next release.
    The tests is currently failing on Python 3.5, but it is not
    actually Python 3.5 specific, it is just more likely to be
    encountered on Python 3.5
  - update to version 1.16.0:
    * Streamline use of stat when downloading SFTP files via
      SFTPClient.get <paramiko.sftp_client.SFTPClient.get>; this avoids
      triggering bugs in some off-spec SFTP servers such as IBM
      Sterling. Thanks to @muraleee for the initial report and to Torkil
      Gustavsen for the patch.
    * Fully enable two-factor authentication (e.g. when a server
      requires AuthenticationMethods
      pubkey,keyboard-interactive). Thanks to @perryjrandall for the
      patch and to @nevins-b and Matt Robenolt for additional support.
    * Fix 'exec' requests in server mode to use get_string instead of
      get_text to avoid UnicodeDecodeError on non-UTF-8 input. Thanks to
      Anselm Kruis for the patch & discussion.
    * Fix line number reporting in log output regarding invalid
      known_hosts line entries. Thanks to Dylan Thacker-Smith for catch
      & patch.
    * Update the vendored Windows API addon to a more recent
      edition. Also fixes :issue:`193`, :issue:`488`,
      :issue:`498`. Thanks to Jason Coombs.
* Thu Feb 26 2015 tbechtold@suse.com
  - update to version 1.15.2 (bsc#962291)
    * [Bug] #320: Update our win_pageant module to be Python 3 compatible
    * [Bug] #429: Server-level debug message logging was overlooked during the
      Python 3 compatibility update; Python 3 clients attempting to log SSH
      debug packets encountered type errors. This is now fixed
    * [Bug] #459: Tighten up agent connection closure behavior to avoid
      spurious ResourceWarning display in some situations
    * [Bug] #266: Change numbering of Transport channels to start at 0
      instead of 1 for better compatibility with OpenSSH & certain server
      implementations which break on 1-indexed channels
    * [Support] #419: Modernize a bunch of the codebase internals to
      leverage decorators. Props to @beckjake for realizing we’re no longer
      on Python 2.2 :D
    * [Support] #421: Modernize threading calls to user newer API
    * [Support] #422: Clean up some unused imports
    * [Support] #431: Replace handrolled ssh_config parsing code with
      use of the shlex module
    * [Bug] #415: Fix ssh_config parsing to correctly interpret ProxyCommand
      none as the lack of a proxy command, instead of as a literal command
      string of "none"
    * [Bug] #428: Fix an issue in BufferedFile (primarily used in the SFTP
      modules) concerning incorrect behavior by readlines on files whose
      size exceeds the buffer size
    * [Bug] #455: Tweak packet size handling to conform better to the
      OpenSSH RFCs; this helps address issues with interactive program cursors
    * [Bug] #413: (also #414, #420, #454) Be significantly smarter about polling
      & timing behavior when running proxy commands, to avoid unnecessary
      (often 100%!) CPU usage

Files

/usr/share/doc/packages/python-paramiko-doc
/usr/share/doc/packages/python-paramiko-doc/demos
/usr/share/doc/packages/python-paramiko-doc/demos/demo.py
/usr/share/doc/packages/python-paramiko-doc/demos/demo_keygen.py
/usr/share/doc/packages/python-paramiko-doc/demos/demo_server.py
/usr/share/doc/packages/python-paramiko-doc/demos/demo_sftp.py
/usr/share/doc/packages/python-paramiko-doc/demos/demo_simple.py
/usr/share/doc/packages/python-paramiko-doc/demos/forward.py
/usr/share/doc/packages/python-paramiko-doc/demos/interactive.py
/usr/share/doc/packages/python-paramiko-doc/demos/rforward.py
/usr/share/doc/packages/python-paramiko-doc/demos/test_rsa.key
/usr/share/doc/packages/python-paramiko-doc/demos/user_rsa_key
/usr/share/doc/packages/python-paramiko-doc/demos/user_rsa_key.pub
/usr/share/licenses/python-paramiko-doc
/usr/share/licenses/python-paramiko-doc/LICENSE


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 14:22:45 2024