Control: tags 1081366 + patch Control: tags 1081366 + pending Dear maintainer,
I've prepared an NMU for python-pgpy (versioned as 0.6.0-1.3) and uploaded it to DELAYED/5. Please feel free to tell me if I should delay it longer. Regards. -- WBR, wRAR
diff -Nru python-pgpy-0.6.0/debian/changelog python-pgpy-0.6.0/debian/changelog --- python-pgpy-0.6.0/debian/changelog 2024-06-30 22:27:00.000000000 +0500 +++ python-pgpy-0.6.0/debian/changelog 2024-09-16 22:24:21.000000000 +0500 @@ -1,3 +1,10 @@ +python-pgpy (0.6.0-1.3) unstable; urgency=medium + + * Non-maintainer upload. + * Fix tests with python3-cryptography >= 43 (Closes: #1081366). + + -- Andrey Rakhmatullin <w...@debian.org> Mon, 16 Sep 2024 22:24:21 +0500 + python-pgpy (0.6.0-1.2) unstable; urgency=medium * Non-maintainer upload. diff -Nru python-pgpy-0.6.0/debian/patches/series python-pgpy-0.6.0/debian/patches/series --- python-pgpy-0.6.0/debian/patches/series 2024-06-30 22:19:34.000000000 +0500 +++ python-pgpy-0.6.0/debian/patches/series 2024-09-16 22:19:28.000000000 +0500 @@ -1,2 +1,3 @@ 0008-Avoid-using-the-better-sphinx-theme.patch don-t-use-html4_writer-True.patch +tests-key-size.patch diff -Nru python-pgpy-0.6.0/debian/patches/tests-key-size.patch python-pgpy-0.6.0/debian/patches/tests-key-size.patch --- python-pgpy-0.6.0/debian/patches/tests-key-size.patch 1970-01-01 05:00:00.000000000 +0500 +++ python-pgpy-0.6.0/debian/patches/tests-key-size.patch 2024-09-16 22:21:38.000000000 +0500 @@ -0,0 +1,38 @@ +Description: Increase key sizes from 512 to 1024 as required by cryptography 43. +Bug-Debian: https://bugs.debian.org/1081366 +Author: Andrey Rakhmatullin <w...@debian.org> +Last-Update: 2024-09-16 + +Index: python-pgpy-0.6.0/tests/test_10_exceptions.py +=================================================================== +--- python-pgpy-0.6.0.orig/tests/test_10_exceptions.py ++++ python-pgpy-0.6.0/tests/test_10_exceptions.py +@@ -57,16 +57,16 @@ def targette_pub(): + + @pytest.fixture(scope='module') + def temp_subkey(): +- return PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 512) ++ return PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 1024) + + + @pytest.fixture(scope='module') + def temp_key(): + u = PGPUID.new('User') +- k = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 512) ++ k = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 1024) + k.add_uid(u, usage={KeyFlags.Certify, KeyFlags.Sign}, hashes=[HashAlgorithm.SHA1]) + +- sk = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 512) ++ sk = PGPKey.new(PubKeyAlgorithm.RSAEncryptOrSign, 1024) + k.add_subkey(sk, usage={KeyFlags.EncryptCommunications}) + + return k +@@ -300,7 +300,7 @@ class TestPGPKey(object): + + @pytest.mark.parametrize('key_alg_rsa_depr', key_algs_rsa_depr, ids=[alg.name for alg in key_algs_rsa_depr]) + def test_new_key_deprecated_rsa_alg(self, key_alg_rsa_depr, recwarn): +- k = PGPKey.new(key_alg_rsa_depr, 512) ++ k = PGPKey.new(key_alg_rsa_depr, 1024) + + w = recwarn.pop() + assert str(w.message) == '{:s} is deprecated - generating key using RSAEncryptOrSign'.format(key_alg_rsa_depr.name)
signature.asc
Description: PGP signature