python310Packages.pyopenssl 0 -> 1 attrpath: python310Packages.pyopenssl Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/da7rdaq4aadv3rlhbbl6xima50bq32dj-packages.json.drv building '/nix/store/da7rdaq4aadv3rlhbbl6xima50bq32dj-packages.json.drv'... Going to be running update for following packages: - python3.10-pyopenssl-22.1.0 Press Enter key to continue... Running update for: - python3.10-pyopenssl-22.1.0: UPDATING ... - python3.10-pyopenssl-22.1.0: DONE. Packages updated! [quotedUrls] [quotedUrls] nothing found to replace Diff after rewrites: diff --git a/pkgs/development/python-modules/pyopenssl/default.nix b/pkgs/development/python-modules/pyopenssl/default.nix index 048c47184d1..7331941b862 100644 --- a/pkgs/development/python-modules/pyopenssl/default.nix +++ b/pkgs/development/python-modules/pyopenssl/default.nix @@ -12,14 +12,14 @@ buildPythonPackage rec { pname = "pyopenssl"; - version = "22.1.0"; + version = "23.0.0"; outputs = [ "out" "dev" ]; src = fetchPypi { pname = "pyOpenSSL"; inherit version; - sha256 = "sha256-eoO3snLdWVIi1nL1zimqAw8fuDdjDvIp9i5y45XOiWg="; + sha256 = "sha256-wcxfhrys78hNrafTEXXK4bFRjV9g09C7WVpngiqGim8="; }; patches = [ No auto update branch exists Old version 22.1.0" not present in staging derivation file with contents: { lib , stdenv , buildPythonPackage , fetchPypi , openssl , cryptography , pytestCheckHook , pretend , sphinxHook , sphinx-rtd-theme , flaky }: buildPythonPackage rec { pname = "pyopenssl"; version = "23.0.0"; format = "setuptools"; src = fetchPypi { pname = "pyOpenSSL"; inherit version; hash = "sha256-wcxfhrys78hNrafTEXXK4bFRjV9g09C7WVpngiqGim8="; }; outputs = [ "out" "dev" "doc" ]; nativeBuildInputs = [ openssl sphinxHook sphinx-rtd-theme ]; postPatch = '' # remove cryptography pin sed "/cryptography/ s/,<[0-9]*//g" setup.py ''; propagatedBuildInputs = [ cryptography ]; nativeCheckInputs = [ flaky pretend pytestCheckHook ]; __darwinAllowLocalNetworking = true; preCheck = '' export LANG="en_US.UTF-8" ''; disabledTests = [ # https://github.com/pyca/pyopenssl/issues/692 # These tests, we disable always. "test_set_default_verify_paths" "test_fallback_default_verify_paths" # https://github.com/pyca/pyopenssl/issues/768 "test_wantWriteError" # https://github.com/pyca/pyopenssl/issues/1043 "test_alpn_call_failure" ] ++ lib.optionals (lib.hasPrefix "libressl" openssl.meta.name) [ # https://github.com/pyca/pyopenssl/issues/791 # These tests, we disable in the case that libressl is passed in as openssl. "test_op_no_compression" "test_npn_advertise_error" "test_npn_select_error" "test_npn_client_fail" "test_npn_success" "test_use_certificate_chain_file_unicode" "test_use_certificate_chain_file_bytes" "test_add_extra_chain_cert" "test_set_session_id_fail" "test_verify_with_revoked" "test_set_notAfter" "test_set_notBefore" ] ++ lib.optionals (lib.versionAtLeast (lib.getVersion openssl.name) "1.1") [ # these tests are extremely tightly wed to the exact output of the openssl cli tool, including exact punctuation. "test_dump_certificate" "test_dump_privatekey_text" "test_dump_certificate_request" "test_export_text" ] ++ lib.optionals stdenv.is32bit [ # https://github.com/pyca/pyopenssl/issues/974 "test_verify_with_time" ]; meta = with lib; { description = "Python wrapper around the OpenSSL library"; homepage = "https://github.com/pyca/pyopenssl"; changelog = "https://github.com/pyca/pyopenssl/blob/${version}/CHANGELOG.rst"; license = licenses.asl20; maintainers = with maintainers; [ SuperSandro2000 ]; }; }