python311-service_identity-23.1.0-150400.8.7.1<>,8<f;p9|fŲwYiGnbYeBO?2{([Ѣm†9®'gdM F-$} C6 {+}=b#wqԐ"DEin@R9ǛͩHwQXISvm0tC/ٜ<2QC}Ioɳy7qb`gV[)8 J pRm<] A}m ߞ2ܬ,D4"X\ >A.?.d$ 1 ]| *08  (      T    , H  t  ^ ( 8 9 :VF$G$H%TI%X%Y%\&]&|^( b*fc+d+e+f+l+u+v,8w-x-|y-z.0.@.D.g.l.t.z.Cpython311-service_identity23.1.0150400.8.7.1Service identity verification for pyOpenSSLservice_identity aspires to give you all the tools you need for verifying whether a certificate is valid for the intended purposes. In the simplest case, this means host name verification. However, service_identity implements RFC 6125 fully and plans to add other relevant RFCs too.f;h01-ch3a,,SUSE Linux Enterprise 15SUSE LLC MIThttps://www.suse.com/Development/Languages/Pythonhttps://github.com/pyca/service_identitylinuxnoarch#W_tVV QoQo]]0M _AA큤A큤A큤A큤A큤f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;f;dr;f;dr;ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f15088bcaf587b5d870ad1549615f61e009e93a79371cf62fdf6be0c7fec990e1d750aebf991c1a16c2a4f0a45e4549ec524e9ee229e2146593343e48171276691fc7e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855cb56d20aae2be62e27326a5779424caacde2a4abe464e6eb2174af2479b5a82251f7c647190e74d19f9f24f1b19645b425eb8f30f049196053686bff188505cf7c1dca48e700cbf4678761887cb0469fba5bd7c80a84a03b3f99e647d5cb2612c78e1c754b7bbab2965f6f8b9c8b0d7797facc8cfea20ccda615306b8bc35913c78e1c754b7bbab2965f6f8b9c8b0d7797facc8cfea20ccda615306b8bc35913e156ab56309e3dfd381b60cb371f2afbaadb0ed5a1b5e137f1ee13442cb66753e156ab56309e3dfd381b60cb371f2afbaadb0ed5a1b5e137f1ee13442cb6675394948be4227db9f3481e236530f7ec9a870f14e66ea4a957bb44f5b2584cbc0694948be4227db9f3481e236530f7ec9a870f14e66ea4a957bb44f5b2584cbc06af7e5944ea2f47bef6ee8444b33fecd883679ce70274e8237bc8131d06ded2faaf7e5944ea2f47bef6ee8444b33fecd883679ce70274e8237bc8131d06ded2fa81edefbe8164944e02f2b1d034b77d61df0c49214b4de6aa41ad89e80b63973381edefbe8164944e02f2b1d034b77d61df0c49214b4de6aa41ad89e80b639733fde18b918776219b0a2b81ff1c52e5e3c51600e5e12e8ef9de39428ea5960e1075f78ca1cefa05294e7a496f3c27370b0e980d56dc9fb6f0f880edd9611fcfec1748ab32dffad4a68f6992056e853a49afda978eacb92791f51f578b7e83c5f4e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e36f0e2739482c52f667fb23240c35967578cfcc081b0414668852e4c6deaab8f140103925529f4d9c89a94d0a96d2110b872123fb405092b61a58f453f35d9551f7c647190e74d19f9f24f1b19645b425eb8f30f049196053686bff188505cfrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpython-service_identity-23.1.0-150400.8.7.1.src.rpmpython311-service_identity@      python(abi)python311-attrspython311-cryptographypython311-pyasn1python311-pyasn1-modulespython311-sixrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.1119.1.03.0.4-14.6.0-14.0.4-14.0-15.2-14.14.3d@dBzd7cb ^j$@^,\y\s\X)@\l@[ @[#@[YWWPU4@UUUecsos@opensuse.orgdmueller@suse.commcepl@suse.commcepl@suse.commcepl@suse.comtchvatal@suse.comtchvatal@suse.commimi.vx@gmail.comtoddrme2178@gmail.comhpj@urpla.netmcepl@suse.combwiedemann@suse.comtchvatal@suse.comecsos@opensuse.orgokurz@suse.comjacobwinski@gmail.comnemysis@gmx.chjacobwinski@gmail.comjacobwinski@gmail.comjacobwinski@gmail.com- Update to 23.1.0 * Removed - All Python versions up to and including 3.7 have been dropped. - Support for commonName in certificates has been dropped. It has been deprecated since 2017 and isn't supported by any major browser. - The oldest supported pyOpenSSL version (when using the pyopenssl backend) is now 17.0.0. When using such an old pyOpenSSL version, you have to pin cryptography yourself to ensure compatibility between them. Please check out contraints/oldest-pyopenssl.txt to verify what we are testing against. * Deprecated - If you've used service_identity.(cryptography|pyopenssl).extract_ids(), please switch to the new names extract_patterns(). #56 * Added - service_identity.(cryptography|pyopenssl).extract_patterns() are now public APIs (FKA extract_ids()). You can use them to extract the patterns from a certificate without verifying anything. #55 - service-identity is now fully typed. #57- add sle15_python_module_pythons (jsc#PED-68)- Make calling of %{sle15modernpython} optional.- Clean up the SPEC file.- Update to 21.1.0: - Python 3.4 is not supported anymore. It has been unsupported by the Python core team for a while now, its PyPI downloads are negligible, and our CI provider removed it as a supported option. - It's very unlikely that service-identity will break under 3.4 anytime soon, which is why we do not block its installation on Python 3.4. But we don't test it anymore and will block it once someone reports breakage. - service_identity.exceptions.VerificationError can now be pickled and is overall more well-behaved as an exception. This raises the requirement of attrs to 19.1.0. - This package actually truly requires six (it is expected to work with Python 2.7 as well).- Fix build without python2- Format with spec-cleaner - Upstream seems to rebase the tarball, refetch it- update to 18.1.0 - drop fetch-intersphinx-inventories.sh - drop local-intersphinx-inventories.patch - cleanup spec + enable tests * pyOpenSSL is optional now if you use service_identity.cryptography.* only. * Added support for iPAddress subjectAltNames.- add fetch-intersphinx-inventories.sh to the sources- add local-intersphinx-inventories.patch for generating the docs correctly - add fetch-intersphinx-inventories.sh to fetch the inventories- Remove superfluous devel dependency for noarch package- Reduce parallelism of sphinx-build to ensure reproducible builds (boo#1102408)- Drop some SLE11 code that is quite useless today- Update to 17.0.0: * Deprecations: - Since Chrome 58 and Firefox 48 both don’t accept certificates that contain only a Common Name, its usage is hereby deprecated in service_identity too. We have been raising a warning since 16.0.0 and the support will be removed in mid-2018 for good. * Changes: - When service_identity.SubjectAltNameWarning is raised, the Common Name of the certificate is now included in the warning message. #17 - Added cryptography.x509 backend for verifying certificates. [#18] - Wildcards (*) are now only allowed if they are the leftmost label in a certificate. This is common practice by all major browsers. #19- Convert to singlespec- Update to 16.0.0: * Changes: + Officially support Python 3.5. + service_identity.SubjectAltNameWarning is now raised if the server certicate lacks a proper SubjectAltName. [#9] + Add a __str__ method to VerificationError. + Port from characteristic to its spiritual successor attrs. * Backward-incompatible changes: + Python 3.3 and 2.6 aren't supported anymore. They may work by chance but any effort to keep them working has ceased. + pyOpenSSL versions older than 0.14 are not tested anymore. They don't even build with recent OpenSSL versions. - Update spec file with new upstream package requirements.- Change URL - Use %{oname} instead of service_identity - Add BuildRequires for python-Sphinx for Documentation - Change Description - Change Documentation add index.html - Add Man Page- update pkg description to reflect upstream - rm warnings in description about this pkg being alpha / possibly broken- alphabetize BuildRequires & Requires - remove no longer needed commented out test fail workaround- update to 14.0.0: * update spec file with new requirements per instructions by upstream * update spec file comment out no longer needed test fail workaround * upstream changes: + Switch to year-based version numbers. + Port to characteristic 14.0 (get rid of deprecation warnings). + Package docs with sdist. -update to 1.0.0: * Backward-incompatible changes: + Drop support for Python 3.2. There is no justification to add complexity and unnecessary function calls for a Python version that nobody uses. * changes: + Move into the Python Cryptography Authority’s GitHub account. + Move exceptions into service_identity.exceptions so tracebacks don’t contain private module names. + Promoting to stable since Twisted 14.0 is optionally depending on service_identity now. + Use characteristic instead of a home-grown solution. + idna 0.6 did some backward-incompatible fixes that broke Python 3 support. This has been fixed now therefore service_identity only works with idna 0.6 and later. Unfortunately since idna doesn’t offer version introspection, service_identity can’t warn about it.h01-ch3a 1715148672 23.1.0-150400.8.7.1service_identityservice_identity-23.1.0.dist-infoINSTALLERMETADATARECORDREQUESTEDWHEELlicensesLICENSE__init__.py__pycache____init__.cpython-311.opt-1.pyc__init__.cpython-311.pyccryptography.cpython-311.opt-1.pyccryptography.cpython-311.pycexceptions.cpython-311.opt-1.pycexceptions.cpython-311.pychazmat.cpython-311.opt-1.pychazmat.cpython-311.pycpyopenssl.cpython-311.opt-1.pycpyopenssl.cpython-311.pyccryptography.pyexceptions.pyhazmat.pypy.typedpyopenssl.pypython311-service_identityREADME.mdpython311-service_identityLICENSE/usr/lib/python3.11/site-packages//usr/lib/python3.11/site-packages/service_identity-23.1.0.dist-info//usr/lib/python3.11/site-packages/service_identity-23.1.0.dist-info/licenses//usr/lib/python3.11/site-packages/service_identity//usr/lib/python3.11/site-packages/service_identity/__pycache__//usr/share/doc/packages//usr/share/doc/packages/python311-service_identity//usr/share/licenses//usr/share/licenses/python311-service_identity/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33743/SUSE_SLE-15-SP4_Update/8a7218a781d2ba788edf6842f2ff3eba-python-service_identity.SUSE_SLE-15-SP4_Updatedrpmxz5noarch-suse-linuxdirectoryASCII textUTF-8 Unicode text, with very long linesASCII text, with CRLF line terminatorsemptyPython script, ASCII text executableHTML document, UTF-8 Unicode text, with very long lines RRRRRRRRRRRRRRRDt?python311-idnapython311-pyOpenSSLutf-81f7529e0b8e3e55ab00f23e5c032776370f9d6a685fe6a3fde2ab99a94fdfdd6?7zXZ !t/m]"k%˹0a LT52l%k\ ޜr9 {mJ]CC;Ũ:EnYٯ k{l%wlhۮ'/Z Hs{ǀcr=f[[{oXUnWEm \iXӥB*i(?-fb1D֣ `맃bg-\fKr$dBW3qn5<!Qտ#7Fx]6{\n/Tx|`_:X?mNQtó6\/;>!r9Jȶɖ@qz422늞> ##:t!{Vmfnmh9]fߴ뺮@,m3WhNt 80|J=+$R2 (௢MEZ2/(7tS48;eD8jxsM؝GN㳒䦥<=+j$lŔGxUK$ UӨi-u:7Y;^U?fQ:LL.p.[Au-Ѧ"|j*qM3&');`ДRf2#^|=cC2KJ)$skݓ>? )q,,IΘV+ EwIE2PL6pquAgS^*]2ވ]PX}׆!aK_tg 92xsA&M~t֏_/MfyVɾQxaQ+?'L:т)Ne.q%5Fÿ2)yX7g0Hƙ-ķpo6nh49U~x p=E '͒t¥6[mbDqslNjug$Y(kw><Ֆ&MJrOS8:@ cjo] ` aZH_ 1Xր7\[sÚ&ibHaw9m8\,8TWxRJTg QMWhCgWT%h/[~\շ IQqѹ8κlT pv r5ITjQݝљ:_J! @J/[ӫq^t9v{cمq("k,+-6zqȪZ-r>+N>VQΓ!wd =r iw)Ԕ9L;e%0_=Ca&\ ,p]{ YZ