From cda862f8b31c2678d5691ee55797a1cf6d44fe42 Mon Sep 17 00:00:00 2001 From: Vinay Sajip Date: Tue, 12 Dec 2023 07:58:50 +0000 Subject: [PATCH] Changes for 0.5.2. --- README.rst | 9 ++++++++- gnupg.py | 8 ++++---- test_gnupg.py | 2 +- 3 files changed, 13 insertions(+), 6 deletions(-) diff --git a/README.rst b/README.rst index ac16de0..e9930ac 100644 --- a/README.rst +++ b/README.rst @@ -72,15 +72,22 @@ Change log .. note:: GCnn refers to an issue nn on Google Code. -0.5.2 (future) +0.5.3 (future) -------------- Released: Not yet + +0.5.2 +----- + +Released: 2023-12-12 + * Fix #228: Clarify documentation for encryption/decryption. * Make I/O buffer size configurable via ``buffer_size`` attribute on a ``GPG`` instance. + 0.5.1 ----- diff --git a/gnupg.py b/gnupg.py index cd184a2..e4c36ab 100644 --- a/gnupg.py +++ b/gnupg.py @@ -43,9 +43,9 @@ import sys import threading -__version__ = '0.5.2.dev0' +__version__ = '0.5.2' __author__ = 'Vinay Sajip' -__date__ = '$22-Jul-2023 16:36:40$' +__date__ = '$12-Dec-2023 07:52:07$' STARTUPINFO = None if os.name == 'nt': # pragma: no cover @@ -1342,8 +1342,8 @@ def set_output_without_confirmation(self, args, output): def is_valid_passphrase(self, passphrase): """ - Confirm that the passphrase doesn't contain newline-type characters - it is passed in a pipe to `gpg`, and so not - checking could lead to spoofing attacks by passing arbitrary text after passphrase and newline. + Confirm that the passphrase doesn't contain newline-type characters - it is passed in a pipe to `gpg`, + and so not checking could lead to spoofing attacks by passing arbitrary text after passphrase and newline. Args: passphrase (str): The passphrase to test. diff --git a/test_gnupg.py b/test_gnupg.py index d85d133..8b97343 100644 --- a/test_gnupg.py +++ b/test_gnupg.py @@ -35,7 +35,7 @@ def skipIf(condition, message): import gnupg __author__ = 'Vinay Sajip' -__date__ = '$22-Jul-2023 16:37:02$' +__date__ = '$12-Dec-2023 07:57:43$' ALL_TESTS = True