Skip to content

[PR #6613/2d453c09 backport][3.79] Update cryptography requirement from <45.0.3,>=38.0.1 to >=38.0.1,<45.0.4#6623

Merged
mdellweg merged 1 commit into3.79from
patchback/backports/3.79/2d453c09e95a6b393e59437084e84b21fed31ed3/pr-6613
May 27, 2025
Merged

[PR #6613/2d453c09 backport][3.79] Update cryptography requirement from <45.0.3,>=38.0.1 to >=38.0.1,<45.0.4#6623
mdellweg merged 1 commit into3.79from
patchback/backports/3.79/2d453c09e95a6b393e59437084e84b21fed31ed3/pr-6613

Conversation

@patchback
Copy link
Copy Markdown

@patchback patchback bot commented May 27, 2025

This is a backport of PR #6613 as merged into main (2d453c0).

Updates the requirements on cryptography to permit the latest version.

Changelog

Sourced from cryptography's changelog.

45.0.3 - 2025-05-25


* Fixed decrypting PKCS#8 files encrypted with long salts (this impacts keys
  encrypted by Bouncy Castle).
* Fixed decrypting PKCS#8 files encrypted with DES-CBC-MD5. While wildly
  insecure, this remains prevalent.

.. _v45-0-2:

45.0.2 - 2025-05-17

  • Fixed using mypy with cryptography on older versions of Python.

.. _v45-0-1:

45.0.1 - 2025-05-17


* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.0.

.. _v45-0-0:

45.0.0 - 2025-05-17 (YANKED)

  • Support for Python 3.7 is deprecated and will be removed in the next cryptography release.
  • Updated the minimum supported Rust version (MSRV) to 1.74.0, from 1.65.0.
  • Added support for serialization of PKCS#12 Java truststores in :func:~cryptography.hazmat.primitives.serialization.pkcs12.serialize_java_truststore
  • Added :meth:~cryptography.hazmat.primitives.kdf.argon2.Argon2id.derive_phc_encoded and :meth:~cryptography.hazmat.primitives.kdf.argon2.Argon2id.verify_phc_encoded methods to support password hashing in the PHC string format
  • Added support for PKCS7 decryption and encryption using AES-256 as the content algorithm, in addition to AES-128.
  • BACKWARDS INCOMPATIBLE: Made SSH private key loading more consistent with other private key loading: :func:~cryptography.hazmat.primitives.serialization.load_ssh_private_key now raises a TypeError if the key is unencrypted but a password is provided (previously no exception was raised), and raises a TypeError if the key is encrypted but no password is provided (previously a ValueError was raised).
  • Added __copy__ to the :class:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey, :class:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, :class:~cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, :class:~cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, :class:~cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey,

... (truncated)

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Updates the requirements on [cryptography](https://github.com/pyca/cryptography) to permit the latest version.
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](pyca/cryptography@38.0.1...45.0.3)

---
updated-dependencies:
- dependency-name: cryptography
  dependency-version: 45.0.3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
(cherry picked from commit 2d453c0)
@mdellweg mdellweg merged commit a362ec2 into 3.79 May 27, 2025
12 checks passed
@mdellweg mdellweg deleted the patchback/backports/3.79/2d453c09e95a6b393e59437084e84b21fed31ed3/pr-6613 branch May 27, 2025 20:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant