Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package keylime for openSUSE:Factory checked in at 2022-01-11 00:01:57 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/keylime (Old) and /work/SRC/openSUSE:Factory/.keylime.new.1892 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "keylime" Tue Jan 11 00:01:57 2022 rev:9 rq:945320 version:6.2.1 Changes: -------- --- /work/SRC/openSUSE:Factory/keylime/keylime.changes 2021-12-21 18:40:19.125856991 +0100 +++ /work/SRC/openSUSE:Factory/.keylime.new.1892/keylime.changes 2022-01-11 00:02:32.397274330 +0100 @@ -1,0 +2,51 @@ +Mon Jan 10 12:05:37 UTC 2022 - apla...@suse.com + +- Update to version v6.2.1: + * Another addition to gitignore + * Update .gitignore with more Keylime-specific files + * json: add support for sqlalchemy.engine.row.Row in newer sqlalchemy + * ima_ast: check if the PCR is the same as in the config + * Fix permissions issue on volume mount in run_local.sh + * Make run_local.sh use a local copy of the repo + * Small updates to GOVERNANCE.md + * Move cargo-tarpaulin install to separate command + * config: drop registrar_* TLS options in [registrar] section + * Fix missing && in Dockerfile + * Remove simplejson from scripts and docs + * Replace simplejson with built-in json module + * Add rust-keylime container dependencies + * config: fix getboolean with fallback + * Clean up CI scripts and rewrite run_local.sh + * ima: for ToMToU errors skip template content validation + * ima: Use a set of entry numbers and file offsets to remember multiple positions + * Rename CONTRIBUTORS.md to CONTRIBUTING.md + * Update GOVERNANCE.md to match MAINTAINERS.md rename + * Update MAINTAINERS + * Update README: remove Gitter, Travis CI + * ca: Use UTC when setting certificate validity + * Tenant commands return json + * scripts: Allow passing a base policy to create_policy tool + * ima: Handle the case of ima-sig with a path with spaces in them + * add length to string object + * scripts: Implement create_policy to create the JSON allowlist from files + * ima: Also add a sha256 default boot_aggregate hash with 64 '0's + * ima: Use seek() to get to the last known last entry + * ima: Extend allowlist to be able to handle generic ima-buf entries + * ima: Extend JSON allowlist with 'ima' entry and 'ignored_keyrings' + * ima: Populate verifier keyrings with keys taken from ima-buf log line + * ima: Remove methods from ImaKeyring that are now in ImaKeyrings + * ima: Start passing ima_keyrings through APIs replacing ima_keyring + * Extend AgentAttestState with ima_keyrings field and use it + * ima: Implement ImaKeyrings class to support multiple keyrings + * verifier: Extend verifier DB to persist learned keyrings + * Fix a couple of pylint errors + * ima: Fix spurious attestation failures + * ima: make ToMToU errors not a failure by default + * Simple fix for tenant error message printout. + * pylint: Fix errors related to R1714 + * pylint: Suppress C0201, C0209 and W0602 newly reported errors + * installer: do not install tpm2-abrmd + * tpm: by default use /dev/tpmrm0 instead of tpm2-abrmd + * verifier: add option to send revocation messages via webhook + +------------------------------------------------------------------- Old: ---- keylime-6.2.0.tar.gz New: ---- keylime-v6.2.1.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ keylime.spec ++++++ --- /var/tmp/diff_new_pack.w0WyVn/_old 2022-01-11 00:02:32.961274825 +0100 +++ /var/tmp/diff_new_pack.w0WyVn/_new 2022-01-11 00:02:32.961274825 +0100 @@ -1,7 +1,7 @@ # # spec file for package keylime # -# Copyright (c) 2021 SUSE LLC +# Copyright (c) 2022 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -25,12 +25,12 @@ %bcond_with cfssl %endif Name: keylime -Version: 6.2.0 +Version: 6.2.1 Release: 0 Summary: Open source TPM software for Bootstrapping and Maintaining Trust License: Apache-2.0 AND MIT URL: https://github.com/keylime/keylime -Source0: %{name}-%{version}.tar.gz +Source0: %{name}-v%{version}.tar.xz Source1: keylime.xml # PATCH-FIX-OPENSUSE version.diff Patch1: version.diff @@ -123,7 +123,7 @@ Subpackage of %{name} for verifier service. %prep -%autosetup -p1 +%autosetup -p1 -n %{name}-v%{version} %if %{with cfssl} sed -i "s/ca_implementation = cfssl/ca_implementation = openssl/g" keylime.conf %endif ++++++ _service ++++++ --- /var/tmp/diff_new_pack.w0WyVn/_old 2022-01-11 00:02:33.001274860 +0100 +++ /var/tmp/diff_new_pack.w0WyVn/_new 2022-01-11 00:02:33.001274860 +0100 @@ -1,7 +1,7 @@ <services> <service name="tar_scm" mode="disabled"> <param name="versionformat">@PARENT_TAG@</param> - <param name="revision">refs/tags/v6.2.0</param> + <param name="revision">refs/tags/v6.2.1</param> <param name="url">https://github.com/keylime/keylime.git</param> <param name="scm">git</param> <param name="changesgenerate">enable</param> @@ -12,5 +12,4 @@ </service> <service name="set_version" mode="disabled"/> </services> -(No newline at EOF) ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.w0WyVn/_old 2022-01-11 00:02:33.021274877 +0100 +++ /var/tmp/diff_new_pack.w0WyVn/_new 2022-01-11 00:02:33.025274881 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/keylime/keylime.git</param> - <param name="changesrevision">d9ddb2dac6312983ca172df390fcce45da6d00da</param></service></servicedata> + <param name="changesrevision">53b47c5cfa29023138abe24e5464a3a7e24089d6</param></service></servicedata> (No newline at EOF) ++++++ keylime.conf.diff ++++++ --- /var/tmp/diff_new_pack.w0WyVn/_old 2022-01-11 00:02:33.041274895 +0100 +++ /var/tmp/diff_new_pack.w0WyVn/_new 2022-01-11 00:02:33.045274898 +0100 @@ -1,7 +1,7 @@ -Index: keylime-6.2.0/keylime.conf +Index: keylime-v6.2.1/keylime.conf =================================================================== ---- keylime-6.2.0.orig/keylime.conf -+++ keylime-6.2.0/keylime.conf +--- keylime-v6.2.1.orig/keylime.conf ++++ keylime-v6.2.1/keylime.conf @@ -12,11 +12,13 @@ tls_check_hostnames = False # Valid values are "cfssl" or "openssl". For cfssl to work, you must have the # go binary installed in your path or in /usr/local/. @@ -77,8 +77,8 @@ +revocation_notifier_ip = 0.0.0.0 revocation_notifier_port = 8992 - # The verifier limits the size of upload payloads (allowlists) which defaults to -@@ -354,10 +362,12 @@ max_payload_size = 1048576 + # Enable revocation notifications via webhook. This can be used to notify other +@@ -377,10 +385,12 @@ max_payload_size = 1048576 # and SHA-512). # Note that you can't set a policy on PCR10 and PCR16 because Keylime uses # them internally. @@ -93,7 +93,7 @@ # Specify the file containing allowlists for processing Linux IMA measurements # this file is used if tenant provides "default" as the allowlist file -@@ -409,7 +419,8 @@ max_retries = 10 +@@ -432,7 +442,8 @@ max_retries = 10 # might provide a signed list of EK public key hashes. Then you could write # an ek_check_script that checks the signature of the allowlist and then # compares the hash of the given EK with the allowlist. @@ -103,7 +103,7 @@ # Optional script to execute to check the EK and/or EK certificate against a # allowlist or any other additional EK processing you want to do. Runs in -@@ -435,7 +446,8 @@ ek_check_script= +@@ -458,7 +469,8 @@ ek_check_script= # The registrar's IP address and port used to communicate with other services # as well as the bind address for the registrar server. ++++++ version.diff ++++++ --- /var/tmp/diff_new_pack.w0WyVn/_old 2022-01-11 00:02:33.065274916 +0100 +++ /var/tmp/diff_new_pack.w0WyVn/_new 2022-01-11 00:02:33.069274920 +0100 @@ -1,12 +1,12 @@ -Index: keylime-6.1.1/setup.py +Index: keylime-v6.2.1/setup.py =================================================================== ---- keylime-6.1.1.orig/setup.py -+++ keylime-6.1.1/setup.py +--- keylime-v6.2.1.orig/setup.py ++++ keylime-v6.2.1/setup.py @@ -13,6 +13,7 @@ setuptools.setup( description=( 'TPM-based key bootstrapping and system ' 'integrity measurement system for cloud'), -+ version='6.1.0', ++ version='6.2.1', long_description=long_description, long_description_content_type='text/markdown', author='Keylime Community',