Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make extract_patterns along with patterns public #55

Merged
merged 8 commits into from
Jun 10, 2023

Conversation

hynek
Copy link
Collaborator

@hynek hynek commented Jun 9, 2023

There's a ton of code that probably won't ever be used for verification anymore, so let's expose it for people to easily introspect certificates.

@hynek hynek changed the title Make extract_ids along with patterns public Make extract_patterns along with patterns public Jun 10, 2023
@hynek hynek merged commit 836b87f into main Jun 10, 2023
@hynek hynek deleted the Make-extract_ids-public branch June 10, 2023 05:30
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Jul 3, 2023
## [23.1.0](pyca/service-identity@21.1.0...23.1.0) - 2023-06-14

### Removed

- All Python versions up to and including 3.7 have been dropped.
- Support for `commonName` in certificates has been dropped.
  It has been deprecated since 2017 and isn't supported by any major browser.
- The oldest supported pyOpenSSL version (when using the `pyopenssl` backend) is now 17.0.0.
  When using such an old pyOpenSSL version, you have to pin *cryptography* yourself to ensure compatibility between them.
  Please check out [`contraints/oldest-pyopenssl.txt`](https://github.com/pyca/service-identity/blob/main/tests/constraints/oldest-pyopenssl.txt) to verify what we are testing against.


### Deprecated

- If you've used `service_identity.(cryptography|pyopenssl).extract_ids()`, please switch to the new names `extract_patterns()`.
  [#56](pyca/service-identity#56)


### Added

- `service_identity.(cryptography|pyopenssl).extract_patterns()` are now public APIs (FKA `extract_ids()`).
  You can use them to extract the patterns from a certificate without verifying anything.
  [#55](pyca/service-identity#55)
- *service-identity* is now fully typed.
  [#57](pyca/service-identity#57)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant