Control: tags 1081366 + patch
Control: tags 1081366 + pending

Dear maintainer,

I've prepared an NMU for python-pgpy (versioned as 0.6.0-1.3) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

Regards.


-- 
WBR, wRAR
diff -Nru python-pgpy-0.6.0/debian/changelog python-pgpy-0.6.0/debian/changelog
--- python-pgpy-0.6.0/debian/changelog	2024-06-30 22:27:00.000000000 +0500
+++ python-pgpy-0.6.0/debian/changelog	2024-09-16 22:24:21.000000000 +0500
@@ -1,3 +1,10 @@
+python-pgpy (0.6.0-1.3) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix tests with python3-cryptography >= 43 (Closes: #1081366).
+
+ -- Andrey Rakhmatullin <w...@debian.org>  Mon, 16 Sep 2024 22:24:21 +0500
+
 python-pgpy (0.6.0-1.2) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru python-pgpy-0.6.0/debian/patches/series python-pgpy-0.6.0/debian/patches/series
--- python-pgpy-0.6.0/debian/patches/series	2024-06-30 22:19:34.000000000 +0500
+++ python-pgpy-0.6.0/debian/patches/series	2024-09-16 22:19:28.000000000 +0500
@@ -1,2 +1,3 @@
 0008-Avoid-using-the-better-sphinx-theme.patch
 don-t-use-html4_writer-True.patch
+tests-key-size.patch
diff -Nru python-pgpy-0.6.0/debian/patches/tests-key-size.patch python-pgpy-0.6.0/debian/patches/tests-key-size.patch
--- python-pgpy-0.6.0/debian/patches/tests-key-size.patch	1970-01-01 05:00:00.000000000 +0500
+++ python-pgpy-0.6.0/debian/patches/tests-key-size.patch	2024-09-16 22:21:38.000000000 +0500
@@ -0,0 +1,38 @@
+Description: Increase key sizes from 512 to 1024 as required by cryptography 43.
+Bug-Debian: https://bugs.debian.org/1081366
+Author: Andrey Rakhmatullin <w...@debian.org>
+Last-Update: 2024-09-16
+
+Index: python-pgpy-0.6.0/tests/test_10_exceptions.py
+===================================================================
+--- python-pgpy-0.6.0.orig/tests/test_10_exceptions.py
++++ python-pgpy-0.6.0/tests/test_10_exceptions.py
+@@ -57,16 +57,16 @@ def targette_pub():
+ 
+ @pytest.fixture(scope='module')
+ def temp_subkey():
+-    return PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 512)
++    return PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 1024)
+ 
+ 
+ @pytest.fixture(scope='module')
+ def temp_key():
+     u = PGPUID.new('User')
+-    k = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 512)
++    k = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 1024)
+     k.add_uid(u, usage={KeyFlags.Certify, KeyFlags.Sign}, hashes=[HashAlgorithm.SHA1])
+ 
+-    sk = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 512)
++    sk = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 1024)
+     k.add_subkey(sk, usage={KeyFlags.EncryptCommunications})
+ 
+     return k
+@@ -300,7 +300,7 @@ class TestPGPKey(object):
+ 
+     @pytest.mark.parametrize('key_alg_rsa_depr', key_algs_rsa_depr, ids=[alg.name for alg in key_algs_rsa_depr])
+     def test_new_key_deprecated_rsa_alg(self, key_alg_rsa_depr, recwarn):
+-        k = PGPKey.new(key_alg_rsa_depr, 512)
++        k = PGPKey.new(key_alg_rsa_depr, 1024)
+ 
+         w = recwarn.pop()
+         assert str(w.message) == '{:s} is deprecated - generating key using RSAEncryptOrSign'.format(key_alg_rsa_depr.name)

Attachment: signature.asc
Description: PGP signature

Reply via email to