Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package keylime for openSUSE:Factory checked 
in at 2021-07-29 21:31:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/keylime (Old)
 and      /work/SRC/openSUSE:Factory/.keylime.new.1899 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "keylime"

Thu Jul 29 21:31:05 2021 rev:4 rq:908385 version:6.1.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/keylime/keylime.changes  2021-07-22 
22:43:06.943218942 +0200
+++ /work/SRC/openSUSE:Factory/.keylime.new.1899/keylime.changes        
2021-07-29 21:31:35.952798018 +0200
@@ -1,0 +2,21 @@
+Mon Jul 26 09:31:01 UTC 2021 - Alberto Planas Dominguez <apla...@suse.com>
+
+- Update to Keylime 6.1.1
+  + keylime_tenant add crash with TypeError: Object of type 'bytes' is
+    not JSON serializable
+  + Whenever Keylime agent starts and cannot contact the registrar, it
+    fails and quits without flushing create EK handles
+  + keylime_tenant -c reglist now requires a "-t" parameter for no
+    reason
+  + Duplicated API calls to verifier in webapp backend
+  + Installer deletes tpm_cert_store files
+  + agent_uuid set to dmidecode crashes Keylime
+  + Copying of tpm_cert_store fails during installation
+  + If the PCR belong to a measured boot list, it is not validated
+  + keylime_tenant --c update fails with a race condition
+- Drop patches already present in the new version
+  + webapp-fix-tls-certs-paths.patch
+  + check_pcrs-match-PCR-if-no-mb_refstate-is-provided.patch
+  + tenant-do_cvdelete-wait-until-404.patch
+
+-------------------------------------------------------------------

Old:
----
  check_pcrs-match-PCR-if-no-mb_refstate-is-provided.patch
  keylime-6.1.0.tar.xz
  tenant-do_cvdelete-wait-until-404.patch
  webapp-fix-tls-certs-paths.patch

New:
----
  keylime-6.1.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ keylime.spec ++++++
--- /var/tmp/diff_new_pack.CMteEL/_old  2021-07-29 21:31:36.564797264 +0200
+++ /var/tmp/diff_new_pack.CMteEL/_new  2021-07-29 21:31:36.568797259 +0200
@@ -20,12 +20,12 @@
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
 %define skip_python2 1
 Name:           keylime
-Version:        6.1.0
+Version:        6.1.1
 Release:        0
 Summary:        Open source TPM software for Bootstrapping and Maintaining 
Trust
 License:        Apache-2.0 AND MIT
 URL:            https://github.com/keylime/keylime
-Source0:        %{name}-%{version}.tar.xz
+Source0:        %{name}-%{version}.tar.gz
 Source1:        keylime.xml
 # PATCH-FIX-OPENSUSE version.diff
 Patch1:         version.diff
@@ -33,12 +33,6 @@
 Patch2:         keylime.conf.diff
 # PATCH-FIX-OPENSUSE config-libefivars.diff
 Patch3:         config-libefivars.diff
-# PATCH-FIX-UPSTREAM webapp-fix-tls-certs-paths.patch gh#keylime/keylime!659
-Patch4:         webapp-fix-tls-certs-paths.patch
-# PATCH-FIX-UPSTREAM check_pcrs-match-PCR-if-no-mb_refstate-is-provided.patch 
gh#keylime/keylime!695
-Patch5:         check_pcrs-match-PCR-if-no-mb_refstate-is-provided.patch
-# PATCH-FIX-UPSTREAM tenant-do_cvdelete-wait-until-404.patch 
gh#keylime/keylime!711
-Patch6:         tenant-do_cvdelete-wait-until-404.patch
 BuildRequires:  %{python_module setuptools}
 BuildRequires:  fdupes
 BuildRequires:  firewall-macros

++++++ keylime.conf.diff ++++++
--- /var/tmp/diff_new_pack.CMteEL/_old  2021-07-29 21:31:36.624797190 +0200
+++ /var/tmp/diff_new_pack.CMteEL/_new  2021-07-29 21:31:36.628797185 +0200
@@ -1,7 +1,7 @@
-Index: keylime-6.1.0/keylime.conf
+Index: keylime-6.1.1/keylime.conf
 ===================================================================
---- keylime-6.1.0.orig/keylime.conf
-+++ keylime-6.1.0/keylime.conf
+--- keylime-6.1.1.orig/keylime.conf
++++ keylime-6.1.1/keylime.conf
 @@ -12,11 +12,13 @@ tls_check_hostnames = False
  # Valid values are "cfssl" or "openssl". For cfssl to work, you must have the
  # go binary installed in your path or in /usr/local/.
@@ -18,7 +18,7 @@
  receive_revocation_port = 8992
  
  #=============================================================================
-@@ -24,11 +26,13 @@ receive_revocation_port = 8992
+@@ -24,7 +26,8 @@ receive_revocation_port = 8992
  #=============================================================================
  
  # The binding address and port for the agent server
@@ -27,6 +27,10 @@
 +cloudagent_ip = 0.0.0.0
  cloudagent_port = 9002
  
+ # Address and port where the verifier and tenant can connect to reach the 
agent.
+@@ -33,7 +36,8 @@ agent_contact_ip = 127.0.0.1
+ agent_contact_port = 9002
+ 
  # The address and port of registrar server which agent communicate with
 -registrar_ip = 127.0.0.1
 +# registrar_ip = 127.0.0.1
@@ -34,7 +38,7 @@
  registrar_port = 8890
  
  # The name of the RSA key that Keylime should use for protecting shares of 
U/V.
-@@ -68,7 +72,8 @@ extract_payload_zip = True
+@@ -73,7 +77,8 @@ extract_payload_zip = True
  # 'dmidecode -s system-uuid'.
  # If you set this to "hostname", Keylime will use the full qualified domain
  # name of current host as the agent id.
@@ -44,8 +48,8 @@
  
  # Whether to listen for revocation notifications from the verifier or not.
  listen_notfications = True
-@@ -129,7 +134,8 @@ ek_handle = generate
- #=============================================================================
+@@ -137,7 +142,8 @@ ek_handle = generate
+ cloudverifier_id = default
  
  # The IP address and port of verifier server binds to
 -cloudverifier_ip = 127.0.0.1
@@ -54,7 +58,7 @@
  cloudverifier_port = 8881
  
  # The address and port of registrar server that verifier communicates with
-@@ -241,7 +247,8 @@ revocation_notifier = True
+@@ -250,7 +256,8 @@ revocation_notifier = True
  # The revocation notifier IP address and port used to start the revocation 
service.
  # If the 'revocation_notifier' option is set to "true", then the verifier
  # automatically starts the revocation service.
@@ -64,7 +68,7 @@
  revocation_notifier_port = 8992
  
  # The verifier limits the size of upload payloads (allowlists) which defaults 
to
-@@ -380,7 +387,8 @@ max_retries = 10
+@@ -389,7 +396,8 @@ max_retries = 10
  # might provide a signed list of EK public key hashes.  Then you could write
  # an ek_check_script that checks the signature of the allowlist and then
  # compares the hash of the given EK with the allowlist.
@@ -74,7 +78,7 @@
  
  # Optional script to execute to check the EK and/or EK certificate against a
  # allowlist or any other additional EK processing you want to do. Runs in
-@@ -406,7 +414,8 @@ ek_check_script=
+@@ -415,7 +423,8 @@ ek_check_script=
  
  # The registrar's IP address and port used to communicate with other services
  # as well as the bind address for the registrar server.

++++++ version.diff ++++++
--- /var/tmp/diff_new_pack.CMteEL/_old  2021-07-29 21:31:36.644797166 +0200
+++ /var/tmp/diff_new_pack.CMteEL/_new  2021-07-29 21:31:36.644797166 +0200
@@ -1,8 +1,8 @@
-Index: keylime-6.1.0/setup.py
+Index: keylime-6.1.1/setup.py
 ===================================================================
---- keylime-6.1.0.orig/setup.py
-+++ keylime-6.1.0/setup.py
-@@ -32,6 +32,7 @@ setuptools.setup(
+--- keylime-6.1.1.orig/setup.py
++++ keylime-6.1.1/setup.py
+@@ -13,6 +13,7 @@ setuptools.setup(
      description=(
          'TPM-based key bootstrapping and system '
          'integrity measurement system for cloud'),

Reply via email to