Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

python311-keyring-24.2.0-150400.5.3.1 RPM for noarch

From OpenSuSE Leap 15.6 for noarch

Name: python311-keyring Distribution: SUSE Linux Enterprise 15
Version: 24.2.0 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150400.5.3.1 Build date: Wed Oct 25 11:18:37 2023
Group: Unspecified Build host: h01-ch2d
Size: 306302 Source RPM: python-keyring-24.2.0-150400.5.3.1.src.rpm
Packager: https://www.suse.com/
Url: https://github.com/jaraco/keyring
Summary: System keyring service access from Python
The Python keyring lib provides a way to access the system keyring service
from python. It can be used in any application that needs safe password storage.

Provides

Requires

License

MIT

Changelog

* Wed Jul 19 2023 ecsos@opensuse.org
  - %{?sle15_python_module_pythons} must at the beginning to work.
* Wed Jul 12 2023 arun@gmx.de
  - specfile:
    * require python >=3.8
    * Changelog got renamed to NEWS
  - update to version 24.2.0:
    * Features
      + Require Python 3.8 or later.
  - changes from version 24.1.1:
    * Bugfixes
      + Restore support for reading from a config file (with regression
      test). (#638)
  - changes from version 24.1.0:
    * Bugfixes
      + Avoid logging warning when no config file is present. (#635)
      + Include all operations in the error message if no operation was
      supplied. (#636)
    * Improved Documentation
      + Correct name of macOS backend in README. (#637)
  - changes from version 24.0.0:
    * #633: Added diagnose command with basic support.
    * #487: Removed keyring.backends.OS_X module.
    * #593: Removed keyring.util.properties module.
  - changes from version 23.14.0:
    * #623: On macOS, warn the user when keychain property is indicated,
      as that value can't be honored (macOS API no longer supports
      indicating the target keychain).
* Fri Apr 21 2023 dmueller@suse.com
  - add sle15_python_module_pythons (jsc#PED-68)
* Thu Apr 13 2023 mcepl@suse.com
  - Make calling of %{sle15modernpython} optional.
* Mon Jan 02 2023 dmueller@suse.com
  - update to 23.13.1:
    * #608: Added support for tab completion on the ``keyring`` command
    if the ``completion`` extra is installed (``keyring[completion]``).
    * #612: Prevent installation of ``pywin32-ctypes 0.1.2`` with broken
    ``use2to3`` directive.
    * #607: Removed PSF license as it was unused and confusing. Project
    remains MIT licensed as always.
* Wed Nov 09 2022 code@bnavigator.de
  - Fix dependencies, remove workaround for gh#jaraco/keyring#526
* Tue Nov 08 2022 yarunachalam@suse.com
  - Update to version 23.11.0
    [#603]: In libsecret, check that the service is available before declaring viability.
  - Update to version 23.10.0
    [#526]: Bump requirement on importlib_metadata to pull in fix for improperly-normalized names on egg-info.
* Sun Oct 30 2022 code@bnavigator.de
  - Drop support-new-importlib.patch
    * "New" importlib 5.0 dropped deprecated indexing support
      gh#python/importlib_metadata#405
    * See also gh#jaraco/keyring#526
* Fri Sep 23 2022 code@bnavigator.de
  - Clean specfile from setuptools cruft, this is a PEP517 package
  - Only python >= 3.7 is supported
  - Fix more runtime requirements
* Tue Sep 20 2022 sor.alexei@meowr.ru
  - Update to version 23.9.3 (changes since 23.9.1):
    * Fix wrong name in compatibility logic for properties
      (masked by the compatibility fallback).
    * Add workaround for devpi_client hook with wrapped
      implementation.
  - Add the missing python-jaraco.classes dependency (bsc#1203659)
* Sat Sep 17 2022 dmueller@suse.com
  - update to 23.9.1:
    * #593: Restore ``keyring.util.properties`` with deprecation warning for
      backward compatibility.
    * #588: Project now depends on ``jaraco.classes`` for class property support.
    * #581: Corrected regression in ``libsecret`` tests (``.collection`` property).
    * #587: Fix regression in ``libsecret``.
    * #448: ``SecretService`` and ``libsecret`` backends now support a
      new ``SelectableScheme``, allowing the keys for "username" and
      "service" to be overridden for compatibility with other schemes
      such as KeePassXC.
    * Introduced a new ``.with_properties`` method on backends to
      produce a new keyring with different properties. Use for example
      to get a keyring with a different ``keychain`` (macOS) or
      ``scheme`` (SecretService/libsecret). e.g.::
      keypass = keyring.get_keyring().with_properties(scheme='KeePassXC')
    * ``.with_keychain`` method on macOS is superseded by ``.with_properties``
      and so is now deprecated.
* Mon Aug 29 2022 steven.kowalik@suse.com
  - Inject multibuild to prevent a build cycle
* Sun Jul 24 2022 dmueller@suse.com
  - update to 23.7.0:
    * #582: Suppress KeyringErrors for devpi client.
* Wed Jun 15 2022 yarunachalam@suse.com
  - update to 23.6.0
    [#575]: Only require importlib_metadata on older Pythons.
    [#579]: Add .with_keychain method on macOS for easy reference to alternate keychains.
* Wed Jun 08 2022 dmueller@suse.com
  - update to 23.5.1:
    * The correct config root is now used on Windows
* Mon Jan 10 2022 dmueller@suse.com
  - update to 23.5.0:
    * Require Python 3.7 or later.
    * #551: Fixed docs warnings.
    * #549: EnvironCredential now allows for equality
      comparison.
    * #529: macOS backend is no longer viable if the API module
      cannot be loaded. Prevents "symbol not found" errors on
      macOS 11 (Big Sur) and later when a "universal2" binary
      is not used (available for Python 3.8.7 and later).
    * #547: Tests no longer attempt to run macOS backends even
      on macOS when the backend is non-viable.
    * #542: Change get_credential to return generic Credential.
* Fri Sep 24 2021 steven.kowalik@suse.com
  - Update to 23.2.1:
    * #530: In libsecret tests, use a session collection to allow tests
      to pass on Debian.
    * #521: Add libsecret backend.
    * #519: macOS backend APIs updated to newer, non-legacy APIs.
  - Add patch support-new-importlib.patch:
    * Support new importlib-metadata.
* Thu Jun 17 2021 mcepl@suse.com
  - Update to 23.0.1 (bsc#1184133):
    * #504: Better error with invalid parameter to init_keyring.
    * #505: Nicer documentation for headless Docker.
    * Backends now all invoke ``set_properties_from_env`` on
      self in the initializer. Derived backends should be sure
      to invoke ``super().__init__()``.
    * Use new entry points API from importlib_metadata 3.6.
    * Added redundant type declarations for accessor functions
      in ``keyring.core``.
    * Added type declaration for ``keyring.core.get_keyring()``.
    * #438: For better interoperability with other
      applications, ``Windows`` backend now attempts to
      decode passwords using UTF-8 if UTF-16 decoding fails.
      Passwords are still stored as UTF-16.
    * #437: Package now declares typing support.
    * #403: Keyring no longer eagerly initializes the backend
      on import, but instead defers the backend initialization
      until a keyring is accessed. Any callers reliant on this
      early intialization behavior may need to call
      ``keyring.core.init_backend()`` to explicitly initialize
      the detected backend.
    * #474: SecretService and KWallet backends are now
      disabled if the relevant names are not available on
      D-Bus. Keyring should now be much more responsive
      in these environments.
    * #463: Fixed regression in KWallet ``get_credential``
      where a simple string was returned instead of a
      SimpleCredential.
    * #431: KWallet backend now supports ``get_credential``.
    * #445: Suppress errors when ``sys.argv`` is not
      a list of at least one element.
    * #440: Keyring now honors XDG_CONFIG_HOME as
      ``~/.config``.
    * #452: SecretService ``get_credential`` now returns
      ``None`` for unmatched query.
  - Remove fix-kwallet-tests.patch, it doesn't seem to be necessary
    anymore.
* Tue Feb 16 2021 alarrosa@suse.com
  - On SLE/Leap, set the egg version on %prep to the package version
    since it's not being set automatically.
* Wed Sep 30 2020 hpj@urpla.net
  - Fold -tests package into mail package again
* Mon Sep 21 2020 hpj@urpla.net
  - Apply fix-kwallet-tests.patch
* Tue Jun 02 2020 dmueller@suse.com
  - update to 21.2.1:
    * #426: Restored lenience on startup when entry point
      metadata is missing.
    * #423: Avoid RecursionError when initializing backends
      when a limit is supplied.
* Thu May 28 2020 tchvatal@suse.com
  - Fix the requirements to match reality of setup.cfg
* Mon May 25 2020 pgajdos@suse.com
  - %python3_only -> %python_alternative
* Sat May 02 2020 hpj@urpla.net
  - fix packaging tests
* Thu Apr 16 2020 pgajdos@suse.com
  - version update to 21.2.0
    v21.2.0
    - ------
    * #372: Chainer now deterministically resolves at a lower
      priority than the Fail keyring (when there are no backends
      to chain).
    * #372: Fail keyring now raises a ``NoKeyringError`` for
      easier selectability.
    * #405: Keyring now logs at DEBUG rather than INFO during
      backend startup.
    v21.1.1
    - ------
    * Refreshed package metadata.
    v21.1.0
    - ------
    * #380: In SecretService backend, close connections after
      using them.
    v21.0.0
    - ------
    * Require Python 3.6 or later.
    v20.0.1
    - ------
    * #417: Fix TypeError when backend fails to initialize.
    v20.0.0
    - ------
    * Extracted ``keyring.testing`` package to contain supporting
      functionality for plugin backends. ``keyring.tests`` has been
      removed from the package.
    v19.3.0
    - ------
    * Switch to `importlib.metadata
      <https://docs.python.org/3/library/importlib.metadata.html>`_
      for loading entry points. Removes one dependency on Python 3.8.
    * Added new ``KeyringBackend.set_properties_from_env``.
    * #382: Add support for alternate persistence scopes for Windows
      backend. Set ``.persist`` to "local machine" or "session"
      to enable the alternate scopes or "enterprise" to use the
      default scope.
    * #404: Improve import times when a backend is specifically
      configured by lazily calling ``get_all_keyring``.
    19.2.0
    - -----
    * Add support for get_credential() with the SecretService backend.
    19.1.0
    - -----
    * #369: macOS Keyring now honors a ``KEYCHAIN_PATH``
      environment variable. If set, Keyring will use that
      keychain instead of the default.
    19.0.2
    - -----
    * Refresh package skeleton.
    * Adopt `black <https://pypi.org/project/black>`_ code style.
    19.0.1
    - -----
    * Merge with 18.0.1.
* Thu Mar 28 2019 jengelh@inai.de
  - Use noun phrase in summary.
* Thu Mar 28 2019 tchvatal@suse.com
  - Update to 18.0.1:
    * #386: ExceptionInfo no longer retains a reference to the traceback.
* Wed Mar 06 2019 tchvatal@suse.com
  - Revert the test removal pending fix of upstream bug:
    https://github.com/jaraco/keyrings.alt/issues/33
* Sat Mar 02 2019 hpj@urpla.net
  - Package tests in separate package $flavor-tests
    Allows packages, that depend on these tests, to build successfully
    e.g. keyrings.cryptfile
* Tue Feb 26 2019 jayvdb@gmail.com
  - Add LICENSE
  - Remove tests from runtime package
  - Fix test failure occurring in test_packaging.py
  - Use pytest --ignore to avoid removing build directories in %check
  - Remove unnecessary build dependency pytest-sugar
  - Update to v18.0.0
    * On macOS, the backend now raises a ``KeyringLocked``
      when access to the keyring is denied (on get or set) instead
      of ``PasswordSetError`` or ``KeyringError``. Any API users
      may need to account for this change, probably by catching
      the parent ``KeyringError``.
      Additionally, the error message from the underying error is
      now included in any errors that occur.
  - from 17.1.1
    * Update packaging technique to avoid 0.0.0 releases.
  - from 17.1.0
    * When calling ``keyring.core.init_backend``, if any limit function is
      supplied, it is saved and later honored by the ``ChainerBackend`` as well.
  - from 17.0.0
    * Remove application attribute from stored passwords
      using SecretService, addressing regression introduced in
      10.5.0 (#292). Impacted Linux keyrings will once again
      prompt for a password for "Python program".
  - from 16.1.1
    * Fix error on import due to circular imports on Python 3.4.
  - from 16.1.0
    * Refactor ChainerBackend, introduced in 16.0 to function
      as any other backend, activating when relevant.
  - 16.0.2
    * In Windows backend, trap all exceptions when attempting to import pywin32.
  - from 16.0.1
    * Once again allow all positive, non-zero priority keyrings to participate.
  - from 16.0.0
    * Fix race condition in delete_password on Windows.
    * All suitable backends (priority 1 and greater) are
      allowed to participate.
  - from 15.2.0
    * Added new API for ``get_credentials``, for backends
      that can resolve both a username and password for a service.
* Fri Oct 12 2018 arun@gmx.de
  - specfile:
    * removed devel from noarch
  - update to version 15.1.0:
    * #340: Add the Null keyring, disabled by default.
    * #340: Added --disable option to command-line interface.
    * #340: Now honor a PYTHON_KEYRING_BACKEND environment variable to
      select a backend. Environments may set to
      keyring.backends.null.Keyring to disable keyring.
  - changes from version 15.0.0:
    * Removed deprecated keyring.util.escape module.
    * Fixed warning about using deprecated Abstract Base Classes from
      collections module.
  - changes from version 14.0.0:
    * Removed getpassbackend module and alias in
      keyring.get_pass_get_password. Instead, just use:
    * keyring.get_password(getpass.getuser(), 'Python')
* Wed Sep 05 2018 dmueller@suse.com
  - drop flake8 dependency
* Mon Jul 09 2018 dmueller@suse.com
  - Update to 13.2.1:
    * #335: Fix regression in command line client.
    * Keyring command-line interface now reads the password
    directly from stdin if stdin is connected to a pipe.
    * #329: Improve output of ``keyring --list-backends``.
* Sat Jun 23 2018 tchvatal@suse.com
  - Version update to 13.0.0:
    * #327: In kwallet backend, if the collection or item is
      locked, a ``KeyringLocked`` exception is raised. Clients
      expecting a None response from ``get_password`` under
      this condition will need to catch this exception.
      Additionally, an ``InitError`` is now raised if the
      connection cannot be established to the DBus.
    * #298: In kwallet backend, when checking an existing
      handle, verify that it is still valid or create a new
      connection.
    * Fixed issue in SecretService. Ref #226.
    * #322: Fix AttributeError when ``escape.__builtins__``
      is a dict.
    * Deprecated ``keyring.util.escape`` module. If you use
      this module or encounter the warning (on the latest
      release of your packages), please `file a ticket
      <https://github.com/jaraco/keyring/issues/new>`_.
    * Unpin SecretStorage on Python 3.5+. Requires that
      Setuptools 17.1 be used. Note that the special
      handling will be unnecessary once Pip 9 can be
      assumed (as it will exclude SecretStorage 3 in
      non-viable environments).
    * #310: Keyring now loads all backends through entry
      points.
    * #312: Use ``entrypoints`` instead of pkg_resources to
      avoid performance hit loading pkg_resources. Adds
      a dependency on ``entrypoints``.
    * #294: No longer expose ``keyring.__version__`` (added
      in 8.1) to avoid performance hit loading pkg_resources.
    * #299: Keyring exceptions are now derived from a base
      ``keyring.errors.KeyringError``.
    * #296: Prevent AttributeError on import when Debian has
      created broken dbus installs.
* Wed Jan 24 2018 tchvatal@suse.com
  - Fix building in py3 only enviroment
  - Remove the test conditional which was always on anyway
* Tue Nov 28 2017 mimi.vx@gmail.com
  - update to 10.5.0:
    * Added --list-backends option to command-line interface.
    * Removed logger from keyring
    * Set the appid for SecretService & KWallet to something meaningful
* Wed Aug 23 2017 tbechtold@suse.com
  - update to 10.4.0:
    * #279: In Kwallet, pass mainloop to SessionBus.
    * #278: Unpin pywin32-ctypes, but blacklist known
      incompatible versions.
    * #278: Pin to pywin32-ctypes 0.0.1 to avoid apparent
      breakage introduced in 0.1.0.
* Wed May 03 2017 toddrme2178@gmail.com
  - Implement single-spec version.
  - Fix source URL.
  - Update to version 10.3.2
    * #267: More leniently unescape lowercased characters as
      they get re-cased by ConfigParser.
  - Update to version 10.3.1
    * #266: Use private compatibity model rather than six to
      avoid the dependency.
  - Update to version 10.3
    * #264: Implement devpi hook for supplying a password when
      logging in with `devpi <https://pypi.org/project/devpi>`_
      client.
    * #260: For macOS, added initial API support for internet
      passwords.
* Mon Jan 16 2017 michael@stroeder.com
  - update copyright year
  - update to 10.2 (requires python-setuptools_scm>=1.15.0)
    10.2
  ----
    * #259: Allow to set a custom application attribute for
    SecretService backend.
    10.1
  ----
    * #253: Backends now expose a '.name' attribute suitable
    for identifying each backend to users.
* Sat Nov 12 2016 michael@stroeder.com
  - update to 10.0.2
  - build requires python-tox instead of python-pytest-runner
    10.0.2
  -----
    * #247: Restored console script.
    10.0.1
  ------
    * Update readme to reflect test recommendations.
    10.0
  ----
    * Drop support for Python 3.2.
    * Test suite now uses tox instead of pytest-runner.
    Test requirements are now defined in tests/requirements.txt.
* Fri Aug 12 2016 michael@stroeder.com
  - updated project URL
  - update to 9.3.1:
    * Link to the new Gitter chat room is now in the
      readme.
    * Issue #235: ``kwallet`` backend now returns
      string objects instead of ``dbus.String`` objects,
      for less surprising reprs.
    * Minor doc fixes.
* Wed Jun 29 2016 tbechtold@suse.com
  - update to 9.3:
    9.3
  ---
    * Pull Request #226: In SecretService backend, unlock
    individual entries.
    9.2.1
  -----
    * Issue #230: Don't rely on dbus-python and instead
    defer to SecretStorage to describe the installation
    requirements.
    9.2
  ---
    * Issue #231 via #233: On Linux, ``secretstorage``
    is now a declared dependency, allowing recommended
    keyring to work simply after installation.
    9.1
  ---
    * Issue #83 via #229: ``kwallet`` backend now stores
    the service name as a folder name in the backend rather
    than storing all passwords in a Python folder.
  - Adjust Requires
  - Use pypi.io for Source url
* Sat Jun 04 2016 michael@stroeder.com
  - require python-setuptools (see bsc#983147)
* Thu May 05 2016 michael@stroeder.com
  - update to upstream release 9.0
    9.0
  ---
    * Issue #217: Once again, the OS X backend uses the
    Framework API for invoking the Keychain service.
    As a result, applications utilizing this API will be
    authorized per application, rather than relying on the
    authorization of the 'security' application. Consequently,
    users will be prompted to authorize the system Python
    executable and also new Python executables, such as
    those created by virtualenv.
    8.7
  ---
    * Changelog now links to issues and provides dates of
    releases.
    8.6
  ---
    * Issue #217: Add warning in OS Keyring when 'store'
    is set to 'internet' to determine if this feature is
    used in the wild.
    8.5.1
  -----
    * Pull Request #216: Kwallet backend now has lower
    priority than the preferred SecretService backend,
    now that the desktop check is no longer in place.
    8.5
  ---
    * Issue #168: Now prefer KF5 Kwallet to KF4. Users relying
    on KF4 must use prior releases.
    8.4
  ---
    * Pull Request #209: Better error message when no backend is
    available (indicating keyrings.alt as a quick workaround).
    * Pull Request #208: Fix pywin32-ctypes package name in
    requirements.
    8.3
  ---
    * Issue #207: Library now requires win32ctypes on Windows
    systems, which will be installed automatically by
    Setuptools 0.7 or Pip 6 (or later).
    * Actually removed QtKwallet, which was meant to be dropped in
    8.0 but somehow remained.
    8.2
  ---
    * Update readme to include how-to use with Linux
    non-graphical environments.
    8.1
  ---
    * Issue #197: Add ``__version__`` attribute to keyring module.
    8.0
  ---
    * Issue #117: Removed all but the preferred keyring backends
    for each of the major desktop platforms:
    - keyring.backends.kwallet.DBusKeyring
    - keyring.backends.OS_X.Keyring
    - keyring.backends.SecretService.Keyring
    - keyring.backends.Windows.WinVaultKeyring
    All other keyrings
    have been moved to a new package, `keyrings.alt
    <https://pypi.python.org/pypi/keyrings.alt>`_ and
    backward-compatibility aliases removed.
    To retain
    availability of these less preferred keyrings, include
    that package in your installation (install both keyring
    and keyrings.alt).
    As these keyrings have moved, any keyrings indicated
    explicitly in configuration will need to be updated to
    replace "keyring.backends." with "keyrings.alt.". For
    example, "keyring.backends.file.PlaintextKeyring"
    becomes "keyrings.alt.file.PlaintextKeyring".
    7.3.1
  -----
    * Issue #194: Redirect away from docs until they have something
    more than the changelog. Users seeking the changelog will
    want to follow the `direct link
    <https://pythonhosted.org/keyring/history.html>`_.
    7.3
  ---
    * Issue #117: Added support for filtering which
    backends are acceptable. To limit to only loading recommended
    keyrings (those with priority >= 1), call::
      keyring.core.init_backend(limit=keyring.core.recommended)
    7.2
  ---
    * Pull Request #190: OS X backend now exposes a ``keychain``
    attribute, which if set will be used by ``get_password`` when
    retrieving passwords. Useful in environments such as when
    running under cron where the default keychain is not the same
    as the default keychain in a login session. Example usage::
      keyring.get_keyring().keychain = '/path/to/login.keychain'
      pw = keyring.get_password(...)
* Tue Jan 12 2016 michael@stroeder.com
  - update to upstream release 7.1.2
  - require Python 2.7+
  - require python-setuptools_scm 1.9+
    7.1
    * Issue #186: Removed preference for keyrings based on
    ``XDG_CURRENT_DESKTOP`` as these values are to varied
    to be a reliable indicator of which keyring implementation
    might be preferable.
    7.0.2
    * Issue #187: Restore ``Keyring`` name in ``kwallet`` backend.
    Users of keyring 6.1 or later should prefer an explicit reference
    to DBusKeyring or QtKeyring instead.
    7.0.1
    * Issue #183 and Issue #185: Gnome keyring no longer relies
    on environment variables, but instead relies on the GnomeKeyring
    library to determine viability.
    7.0
    * Issue #99: Keyring now expects the config file to be located
    in the XDG_CONFIG_HOME rather than XDG_DATA_HOME and will
    fail to start if the config is found in the old location but not
    the new. On systems where the two locations are distinct,
    simply copy or symlink the config to remain compatible with
    older versions or move the file to work only with 7.0 and later.
    * Replaced Pull Request #182 with a conditional SessionBus
    construction, based on subsequent discussion.
    6.1.1
    * Pull Request #182: Prevent DBus from indicating as a viable
    backend when no viable X DISPLAY variable is present.
    6.1
    * Pull Request #174: Add DBus backend for KWallet, preferred to Qt
    backend. Theoretically, it should be auto-detected based on
    available libraries and interchangeable with the Qt backend.
    6.0
    * Drop support for Python 2.6.
    5.7.1
    * Updated project metadata to match Github hosting and
    generally refreshed the metadata structure to match
    practices with other projects.
* Fri Dec 11 2015 michael@stroeder.com
  - Update to version 5.7
  - Removed CONTRIBUTORS.txt because not available in upstream
    source anymore.
  - dropped patches keyring-import-gi.patch and keyring-gnome-3.18.patch
    because they were obsoleted by fixes in upstream source
    5.7
  ---
    * Issue #177: Resolve default keyring name on Gnome using the API.
    * Issue #145: Add workaround for password exposure through
    process status for most passwords containing simple
    characters.
    5.6
  ---
    * Allow keyring to be invoked from command-line with
    ``python -m keyring``.
    5.5.1
  -----
    * Issue #156: Fixed test failures in ``pyfs`` keyring related to
    0.5 release.
    5.5
  ---
    * Pull Request #176: Use recommended mechanism for checking
    GnomeKeyring version.
* Thu Sep 17 2015 m0ses@samaxi.de
  - Added keyring-import-gi.patch: gi.require_version is called and not
    found if gi is not imported
* Mon Sep 07 2015 dimstar@opensuse.org
  - Update to version 5.4:
    + Prefer setuptools_scm to hgtools.
  - Replace python-hgtools BuildRequires with python-setuptools_scm,
    following upstreams change back to setuptools_scm.
  - Add keyring-gnome-3.18.patch: Silence a warning: on GNOME 3.18,
    it is mandatory to specify the version to be imported.
* Tue Apr 28 2015 mimi.vx@gmail.com
  - update to version 5.3
    + changed licence to Python-2.0 and MIT
    * Prefer setuptools_scm to hgtools.
    * Version numbering is now derived from the code repository tags via hgtools.
    * Build and install now requires setuptools.
    * The entry point group must look like a module name, so the group is now “keyring.backends”.
    * Added preliminary support for loading keyring backends through setuptools entry points, specifically “keyring backends”.
* Tue Nov 11 2014 i@marguerite.su
  - use update-alternatives for /usr/bin/keyring because there'll be
    a python3-keyring package
* Tue Oct 14 2014 kgronlund@suse.com
  - Update to version 4.0 (boo#901066):
    * Removed ``keyring_path`` parameter from ``load_keyring``. See release notes
      for 3.0.3 for more details.
    * Issue #22: Removed support for loading the config from the current
      directory. The config file must now be located in the platform-specific
      config location.
  - Changes from version 3.7:
    * Issue #22: Deprecated loading of config from current directory. Support for
      loading the config in this manner will be removed in a future version.
    * Issue #131: Keyring now will prefer ``pywin32-ctypes
      <https://pypi.python.org/pypi/pywin32-ctypes>``_ to pywin32 if available.
  - Changes from version 3.6:
    * Gnome keyring no longer relies on the GNOME_KEYRING_CONTROL environment
      variable.
    * Issue #140: Restore compatibility for older versions of PyWin32.
  - Switch to pytest since nose doesn't support test fixtures and fails:
    - Add BuildRequires: python-pytest
    - Remove BuildRequires: python-nose

Files

/etc/alternatives/keyring
/usr/bin/keyring
/usr/bin/keyring-3.11
/usr/lib/python3.11/site-packages/keyring
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/INSTALLER
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/LICENSE
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/METADATA
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/RECORD
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/REQUESTED
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/WHEEL
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/entry_points.txt
/usr/lib/python3.11/site-packages/keyring-24.2.0.dist-info/top_level.txt
/usr/lib/python3.11/site-packages/keyring/__init__.py
/usr/lib/python3.11/site-packages/keyring/__main__.py
/usr/lib/python3.11/site-packages/keyring/__pycache__
/usr/lib/python3.11/site-packages/keyring/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/__init__.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/__main__.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/__main__.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/_compat.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/_compat.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/_properties_compat.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/_properties_compat.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/backend.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/backend.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/cli.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/cli.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/completion.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/completion.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/core.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/core.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/credentials.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/credentials.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/devpi_client.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/devpi_client.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/errors.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/errors.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/http.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/http.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/py312compat.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/__pycache__/py312compat.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/_compat.py
/usr/lib/python3.11/site-packages/keyring/_properties_compat.py
/usr/lib/python3.11/site-packages/keyring/backend.py
/usr/lib/python3.11/site-packages/keyring/backend_complete.zsh
/usr/lib/python3.11/site-packages/keyring/backends
/usr/lib/python3.11/site-packages/keyring/backends/SecretService.py
/usr/lib/python3.11/site-packages/keyring/backends/Windows.py
/usr/lib/python3.11/site-packages/keyring/backends/__init__.py
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/SecretService.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/SecretService.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/Windows.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/Windows.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/__init__.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/chainer.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/chainer.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/fail.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/fail.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/kwallet.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/kwallet.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/libsecret.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/libsecret.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/null.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/__pycache__/null.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/chainer.py
/usr/lib/python3.11/site-packages/keyring/backends/fail.py
/usr/lib/python3.11/site-packages/keyring/backends/kwallet.py
/usr/lib/python3.11/site-packages/keyring/backends/libsecret.py
/usr/lib/python3.11/site-packages/keyring/backends/macOS
/usr/lib/python3.11/site-packages/keyring/backends/macOS/__init__.py
/usr/lib/python3.11/site-packages/keyring/backends/macOS/__pycache__
/usr/lib/python3.11/site-packages/keyring/backends/macOS/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/macOS/__pycache__/__init__.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/macOS/__pycache__/api.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/backends/macOS/__pycache__/api.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/backends/macOS/api.py
/usr/lib/python3.11/site-packages/keyring/backends/null.py
/usr/lib/python3.11/site-packages/keyring/cli.py
/usr/lib/python3.11/site-packages/keyring/completion.py
/usr/lib/python3.11/site-packages/keyring/core.py
/usr/lib/python3.11/site-packages/keyring/credentials.py
/usr/lib/python3.11/site-packages/keyring/devpi_client.py
/usr/lib/python3.11/site-packages/keyring/errors.py
/usr/lib/python3.11/site-packages/keyring/http.py
/usr/lib/python3.11/site-packages/keyring/py.typed
/usr/lib/python3.11/site-packages/keyring/py312compat.py
/usr/lib/python3.11/site-packages/keyring/testing
/usr/lib/python3.11/site-packages/keyring/testing/__init__.py
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__/__init__.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__/backend.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__/backend.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__/util.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/testing/__pycache__/util.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/testing/backend.py
/usr/lib/python3.11/site-packages/keyring/testing/util.py
/usr/lib/python3.11/site-packages/keyring/util
/usr/lib/python3.11/site-packages/keyring/util/__init__.py
/usr/lib/python3.11/site-packages/keyring/util/__pycache__
/usr/lib/python3.11/site-packages/keyring/util/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/util/__pycache__/__init__.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/util/__pycache__/platform_.cpython-311.opt-1.pyc
/usr/lib/python3.11/site-packages/keyring/util/__pycache__/platform_.cpython-311.pyc
/usr/lib/python3.11/site-packages/keyring/util/platform_.py
/usr/share/doc/packages/python311-keyring
/usr/share/doc/packages/python311-keyring/NEWS.rst
/usr/share/doc/packages/python311-keyring/README.rst
/usr/share/licenses/python311-keyring
/usr/share/licenses/python311-keyring/LICENSE


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Apr 26 23:30:45 2024