Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package keylime for openSUSE:Factory checked 
in at 2021-09-20 23:32:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/keylime (Old)
 and      /work/SRC/openSUSE:Factory/.keylime.new.1899 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "keylime"

Mon Sep 20 23:32:16 2021 rev:5 rq:919475 version:6.2.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/keylime/keylime.changes  2021-07-29 
21:31:35.952798018 +0200
+++ /work/SRC/openSUSE:Factory/.keylime.new.1899/keylime.changes        
2021-09-20 23:33:06.439170178 +0200
@@ -1,0 +2,130 @@
+Thu Sep 16 08:39:35 UTC 2021 - apla...@suse.com
+
+- Update to version 6.2.0:
+  * Fix bug #757 where revoc cert was treated as text
+  * Code improvement: removal of extra dependencies in measured boot 
attestation (#755)
+  * Sanitize the exclude list while it is ingested at `tenant` by removing 
comments (^#) and empty lines.
+  * tenant: show severity level and last event id in status
+  * verifier: move to new failure architecture
+  * pcr validation: move to new failure architecture
+  * measured boot: move to new failure architecture
+  * ima: move to new failure architecture
+  * failure: add infrastructure to tag and collect revocation events in Keylime
+  * Simulating use of SSLContext.minimum_version on ssl v3.6
+  * verifier: fix minor typos
+  * Add tests for ca_impl_cfssl and ca_util
+  * Replace M2Crypto with python-cryptography
+  * tenant: status now shows if a agent was added to the registrar
+  * tenant: open file to send utf-8 encoded
+  * Correct some comments about and remove vestige in MB policy
+  * fixing a small bug that resulted in malformed refstates not failing MBA
+  * agent: ensure that EK is in PEM format when used as uuid
+  * Solves #703 by adding a "non-trivial" example of a "measured boot policy" 
(#734)
+  * ci: build and publish container images
+  * codestyle: fix W0612 and R1735 pylint errors
+  * codestyle: fix W1514 pylint error
+  * systemd: Add KillSignal=SIGINT to keylime_agent.service
+  * One-liner to set the minimum version of TLS to v1.2
+  * pylint fix
+  * Typo fix: return list order confusion between measured_boot.py and 
tpm_abstract.py
+  * Refactor keylime_logging module
+  * ima: Implement ima-buf validator and validate keys on keyrings (#725)
+  * Remove Python 2 leftovers
+  * Additional fix for the processing of "tpm_policy"
+  * ima: Return an empty allowlist rather than a plain empty list
+  * verifier: convert (v)tpm_policy in DB from string to JSONPickleType
+  * verifier: Create AgentAttestState objects from entries in the db
+  * verifier: Persist the IMA attestation state after running the log 
verification
+  * db: Add DB migration file for boottime, ima_pcrs, pcr10, and 
next_ima_ml_entries
+  * verifier: Skip attestation one time if agent's boottime changed
+  * test: Add test case simulating iterative attestation
+  * verifier: Delete an AgentAttestState when deleting an agent
+  * ima: Remember the number of lines successfully processed and last IMA PCR 
value(s)
+  * ima: Reset the attestation if processing the measurement list fails
+  * debug: Show line number when PCR match occurs
+  * verifier: Extend AgentAttestState with state of the IMA PCR
+  * Consult the AgentAttestState for the next measurement list entry
+  * Introduce an AgentAttestState class for passing state through the APIs
+  * verifier: Request IMA log at entry 0 for now
+  * agent: Get boottime and transfer to verifier
+  * agent: Add support for optional IMA log offset parameter
+  * tests: Add a unit test for the IMA function and run it
+  * agent: Move IMA measurement list reading function to ima.py
+  * Add default verifier-check value
+  * Use tox for pylint
+  * Use Fedora 34 as base image for CI container
+  * Run ci jobs only when needed
+  * config: merge convert and list_convert into the same function
+  * Versioned APIs
+  * Refacator of check_pcrs to parse then validate (#716)
+  * Automatically calculates the boot_aggregate from the measured boot log. 
(#713)
+  * Set default UUID as lowercase (#699)
+  * tenant: do_cvdelete wait until 404
+  * Ensures the output of `bulkinfo` command in `keylime_tenant` is JSON
+  * ima: Convert pcrval to bytes to increase efficiency
+  * tests: extend ima tests for signature validation and exclude lists
+  * Allow agents to specify a contact ip address and port for the tenant and 
CV  (#690)
+  * verifer: Fix signature and allowlist evaluation bahavior change
+  * ima: Fix runtime error due to wrong datatype
+  * tenant: add the option to specify the registrar ip and port
+  * measured_boot: drop process_refstate
+  * check_pcrs: match PCR if no mb_refstate is provided
+  * ci: make run_local.sh work with newer docker versions
+  * Fixing pylint errors (#698)
+  * tests: add IMA test where validation should be ignored
+  * ima: Use ima_ast for parsing and validation
+  * tests: Add test for ima AST parser
+  * ima: Introducing a AST for parsing and validation
+  * Make stalebot a bit nicer
+  * enable tenant to fetch all (or verifier specific) agents info in a single 
call from the verifier
+  * Flush all sessions from TPM device (#682)
+  * multiple named verifiers sharing a single database
+  * webapp: fix tls certs paths (#659)
+  * Corrects markdown to have proper rendering (#673)
+  * ima_file_signatures: Extract keyidv2 from x509 certs
+  * installer: Add '-r' option to cp to copy directory (issue #671)
+  * config: Add optional fallback parameter to get()
+  * agent: Fix the usage of dmidecode during the agent startup (issue #664)
+  * agent: Rename allowlist to ima_allowlist in keylime.conf
+  * Fix decoding error in user_data_encrypt
+  * agent: Fix issue #667 by testing for an empty ima_sign_verification_keys 
list
+  * Addresses issue #660 (database path while running local tests) (#665)
+  * ima: Return 'None' when ImaKeyring.from_string() called with emtpy string
+  * tests: Move unittests into files with suffix _test.py
+  * Fixes and improvements for database configuration (#654)
+  * Add signature verification support for local and remote IMA signature 
verification keys (#597)
+  * install: Remove TPM 1.2 support from installer and bundeling scripts
+  * CI/CD: Remove tpm1.2 testing support
+  * Remove duplicated calls to verifier
+  * Remove adding entropy to system rng
+  * Cleanup and fix error case in encryptAIK (#648)
+  * Move measured boot related code into functions to make check_pcrs readable 
(#642)
+  * Move code related to tpm2_checkquote into its own function (#639)
+  * scripts: Cleanup shell script formatting
+  * installer.sh: Do not delete the local copy of the certificates.
+  * Fix user_data_encrypt to UTF8 decode before print
+  * tpm_abstract: Fix adding of entropy
+  * codestyle: Ignore R1732 implemented by pylint >=2.8.0
+  * a fix for letting JSON encoding bytes correctly
+  * Adding back reglist to the list of commands that don't need a -t argument
+  * Invoke tpm2_evictcontrol for 4.0 and 4.2 tools if aik_handle exists (#624)
+  * Addresses #436 (#611)
+  * Fixes #620
+  * Include PCR16 in the quote only when needed
+  * Close leaking file descriptors (#622)
+  * installer.sh: Add missing spaces when efivar is added
+  * More ima_emulator_adapter cleanups (#616)
+  * installer: Add json-c-devel/json-c-dev to BUILD_TOOLS for tpm2-tss build
+  * Remove more commented code in ca_util.py
+  * installer: Only install efi library on x86_64 systems
+  * Create allowlist table and basic API support
+  * installer: Add libuuid-devel/uuid-dev to BUILD_TOOLS for tpm2_tools build
+  * WIP: Some cleanups (#612)
+  * Remove _cLime.c
+  * config: Document the measured boot PCRs and what is using them
+  * Very simple fix for the agent (re: measured boot) The agent code does not 
need to import "measured boot policies"
+  * ima_emulator_adapater: Remove unnecessary global statement
+  * webapp: Fix private key and certificate path (issue #604)
+  * Add support for keylime_webapp service to read intervals from keylime.conf
+
+-------------------------------------------------------------------

Old:
----
  keylime-6.1.1.tar.gz

New:
----
  keylime-6.2.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ keylime.spec ++++++
--- /var/tmp/diff_new_pack.qZl74v/_old  2021-09-20 23:33:08.451172663 +0200
+++ /var/tmp/diff_new_pack.qZl74v/_new  2021-09-20 23:33:08.455172668 +0200
@@ -20,7 +20,7 @@
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
 %define skip_python2 1
 Name:           keylime
-Version:        6.1.1
+Version:        6.2.0
 Release:        0
 Summary:        Open source TPM software for Bootstrapping and Maintaining 
Trust
 License:        Apache-2.0 AND MIT

++++++ _service ++++++
--- /var/tmp/diff_new_pack.qZl74v/_old  2021-09-20 23:33:08.491172712 +0200
+++ /var/tmp/diff_new_pack.qZl74v/_new  2021-09-20 23:33:08.491172712 +0200
@@ -1,7 +1,7 @@
 <services>
   <service name="tar_scm" mode="disabled">
     <param name="versionformat">@PARENT_TAG@</param>
-    <param name="revision">refs/tags/6.1.0</param>
+    <param name="revision">refs/tags/v6.2.0</param>
     <param name="url">https://github.com/keylime/keylime.git</param>
     <param name="scm">git</param>
     <param name="changesgenerate">enable</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.qZl74v/_old  2021-09-20 23:33:08.511172737 +0200
+++ /var/tmp/diff_new_pack.qZl74v/_new  2021-09-20 23:33:08.515172742 +0200
@@ -1,4 +1,4 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/keylime/keylime.git</param>
-              <param 
name="changesrevision">00fe135c1f2c0973947f38102ce0310a0cb283fc</param></service></servicedata>
\ No newline at end of file
+              <param 
name="changesrevision">d9ddb2dac6312983ca172df390fcce45da6d00da</param></service></servicedata>
\ No newline at end of file

++++++ config-libefivars.diff ++++++
--- /var/tmp/diff_new_pack.qZl74v/_old  2021-09-20 23:33:08.523172752 +0200
+++ /var/tmp/diff_new_pack.qZl74v/_new  2021-09-20 23:33:08.523172752 +0200
@@ -1,8 +1,8 @@
-Index: keylime-6.1.0/keylime/config.py
+Index: keylime-6.2.0/keylime/config.py
 ===================================================================
---- keylime-6.1.0.orig/keylime/config.py
-+++ keylime-6.1.0/keylime/config.py
-@@ -318,7 +318,7 @@ MEASUREDBOOT_ML = '/sys/kernel/security/
+--- keylime-6.2.0.orig/keylime/config.py
++++ keylime-6.2.0/keylime/config.py
+@@ -311,7 +311,7 @@ MEASUREDBOOT_ML = '/sys/kernel/security/
  MEASUREDBOOT_IMPORTS = get_config().get('cloud_verifier', 
'measured_boot_imports', fallback='').split(',')
  MEASUREDBOOT_POLICYNAME = get_config().get('cloud_verifier', 
'measured_boot_policy_name', fallback='accept-all')
  

++++++ keylime-6.1.1.tar.gz -> keylime-6.2.0.tar.gz ++++++
/work/SRC/openSUSE:Factory/keylime/keylime-6.1.1.tar.gz 
/work/SRC/openSUSE:Factory/.keylime.new.1899/keylime-6.2.0.tar.gz differ: char 
13, line 1

++++++ keylime.conf.diff ++++++
--- /var/tmp/diff_new_pack.qZl74v/_old  2021-09-20 23:33:08.551172786 +0200
+++ /var/tmp/diff_new_pack.qZl74v/_new  2021-09-20 23:33:08.551172786 +0200
@@ -1,7 +1,7 @@
-Index: keylime-6.1.1/keylime.conf
+Index: keylime-6.2.0/keylime.conf
 ===================================================================
---- keylime-6.1.1.orig/keylime.conf
-+++ keylime-6.1.1/keylime.conf
+--- keylime-6.2.0.orig/keylime.conf
++++ keylime-6.2.0/keylime.conf
 @@ -12,11 +12,13 @@ tls_check_hostnames = False
  # Valid values are "cfssl" or "openssl". For cfssl to work, you must have the
  # go binary installed in your path or in /usr/local/.
@@ -42,8 +42,8 @@
  # 'dmidecode -s system-uuid'.
  # If you set this to "hostname", Keylime will use the full qualified domain
  # name of current host as the agent id.
--agent_uuid = D432FBB3-D2F1-4A97-9EF7-75BD81C00000
-+# agent_uuid = D432FBB3-D2F1-4A97-9EF7-75BD81C00000
+-agent_uuid = d432fbb3-d2f1-4a97-9ef7-75bd81c00000
++# agent_uuid = d432fbb3-d2f1-4a97-9ef7-75bd81c00000
 +agent_uuid = hostname
  
  # Whether to listen for revocation notifications from the verifier or not.
@@ -68,7 +68,22 @@
  revocation_notifier_port = 8992
  
  # The verifier limits the size of upload payloads (allowlists) which defaults 
to
-@@ -389,7 +396,8 @@ max_retries = 10
+@@ -354,10 +361,12 @@ max_payload_size = 1048576
+ # and SHA-512).
+ # Note that you can't set a policy on PCR10 and PCR16 because Keylime uses
+ # them internally.
+-tpm_policy = 
{"22":["0000000000000000000000000000000000000001","0000000000000000000000000000000000000000000000000000000000000001","000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001","ffffffffffffffffffffffffffffffffffffffff","ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff","ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"],"15":["0000000000000000000000000000000000000000","0000000000000000000000000000000000000000000000000000000000000000","000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]}
++# tpm_policy = 
{"22":["0000000000000000000000000000000000000001","0000000000000000000000000000000000000000000000000000000000000001","000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001","ffffffffffffffffffffffffffffffffffffffff","ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff","ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"],"15":["0000000000000000000000000000000000000000","0000000000000000000000000000000000000000000000000000000000000000","000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]}
++tpm_policy = {}
+ 
+ # Same as 'tpm_policy' but for virtual PCRs.
+-vtpm_policy = 
{"23":["ffffffffffffffffffffffffffffffffffffffff","0000000000000000000000000000000000000000"],"15":"0000000000000000000000000000000000000000"}
++# vtpm_policy = 
{"23":["ffffffffffffffffffffffffffffffffffffffff","0000000000000000000000000000000000000000"],"15":"0000000000000000000000000000000000000000"}
++vtpm_policy = {}
+ 
+ # Specify the file containing allowlists for processing Linux IMA measurements
+ # this file is used if tenant provides "default" as the allowlist file
+@@ -409,7 +418,8 @@ max_retries = 10
  # might provide a signed list of EK public key hashes.  Then you could write
  # an ek_check_script that checks the signature of the allowlist and then
  # compares the hash of the given EK with the allowlist.
@@ -78,7 +93,7 @@
  
  # Optional script to execute to check the EK and/or EK certificate against a
  # allowlist or any other additional EK processing you want to do. Runs in
-@@ -415,7 +423,8 @@ ek_check_script=
+@@ -435,7 +445,8 @@ ek_check_script=
  
  # The registrar's IP address and port used to communicate with other services
  # as well as the bind address for the registrar server.

Reply via email to