Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package cryptsetup for openSUSE:Factory checked in at 2022-08-25 15:33:10 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/cryptsetup (Old) and /work/SRC/openSUSE:Factory/.cryptsetup.new.2083 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cryptsetup" Thu Aug 25 15:33:10 2022 rev:118 rq:999047 version:2.5.0 Changes: -------- --- /work/SRC/openSUSE:Factory/cryptsetup/cryptsetup.changes 2022-01-20 00:12:30.474587561 +0100 +++ /work/SRC/openSUSE:Factory/.cryptsetup.new.2083/cryptsetup.changes 2022-08-25 15:33:16.887948648 +0200 @@ -1,0 +2,48 @@ +Mon Aug 22 08:38:16 UTC 2022 - Ludwig Nussel <lnus...@suse.de> + +- cryptsetup 2.5.0: + * Split manual pages into per-action pages and use AsciiDoc format. + * Remove cryptsetup-reencrypt tool from the project and move reencryption + to already existing "cryptsetup reencrypt" command. + If you need to emulate the old cryptsetup-reencrypt binary, use simple + wrappers script running "exec cryptsetup reencrypt $@". + * LUKS2: implement --decryption option that allows LUKS removal. + * Fix decryption operation with --active-name option and restrict + it to be used only with LUKS2. + * Do not refresh reencryption digest when not needed. + This should speed up the reencryption resume process. + * Store proper resilience data in LUKS2 reencrypt initialization. + Resuming reencryption now does not require specification of resilience + type parameters if these are the same as during initialization. + * Properly wipe the unused area after reencryption with datashift in + the forward direction. + * Check datashift value against larger sector size. + For example, it could cause an issue if misaligned 4K sector appears + during decryption. + * Do not allow sector size increase reencryption in offline mode. + * Do not allow dangerous sector size change during reencryption. + * Ask the user for confirmation before resuming reencryption. + * Do not resume reencryption with conflicting parameters. + * Add --force-offline-reencrypt option. + * Do not allow nested encryption in LUKS reencrypt. + * Support all options allowed with luksFormat with encrypt action. + * Add resize action to integritysetup. + * Remove obsolete dracut plugin reencryption example. + * Fix possible keyslot area size overflow during conversion to LUKS2. + * Allow use of --header option for cryptsetup close. + * Fix activation of LUKS2 device with integrity and detached header. + * Add ZEROOUT IOCTL support for crypt_wipe API call. + * VERITY: set loopback sector size according to dm-verity block sizes. + * veritysetup: dump device sizes. + * LUKS2 token: prefer token PIN query before passphrase in some cases. + When a user provides --token-type or specific --token-id, a token PIN + query is preferred to a passphrase query. + * LUKS2 token: allow tokens to be replaced with --token-replace option + for cryptsetup token command. + * LUKS2 token: do not continue operation when interrupted in PIN prompt. + * Add --progress-json parameter to utilities. + * Add support for --key-slot option in luksResume action. +- move man pages to separate subpackage +- drop backports handling + +------------------------------------------------------------------- Old: ---- cryptsetup-2.4.3.tar.sign cryptsetup-2.4.3.tar.xz New: ---- cryptsetup-2.5.0.tar.sign cryptsetup-2.5.0.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cryptsetup.spec ++++++ --- /var/tmp/diff_new_pack.mGUYhV/_old 2022-08-25 15:33:18.191951495 +0200 +++ /var/tmp/diff_new_pack.mGUYhV/_new 2022-08-25 15:33:18.195951503 +0200 @@ -1,5 +1,5 @@ # -# spec file for package cryptsetup2 +# spec file for package cryptsetup # # Copyright (c) 2022 SUSE LLC # @@ -16,22 +16,18 @@ # -%define tar_version 2.4.3 +%define tar_version 2.5.0 %define so_ver 12 -%if 0%{?is_backports} -Name: cryptsetup2 -%else Name: cryptsetup -%endif -Version: 2.4.3 +Version: 2.5.0 Release: 0 Summary: Setup program for dm-crypt Based Encrypted Block Devices License: LGPL-2.0-or-later AND SUSE-GPL-2.0-with-openssl-exception Group: System/Base URL: https://gitlab.com/cryptsetup/cryptsetup/ -Source0: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.4/cryptsetup-%{tar_version}.tar.xz +Source0: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.5/cryptsetup-%{tar_version}.tar.xz # GPG signature of the uncompressed tarball. -Source1: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.4/cryptsetup-%{tar_version}.tar.sign +Source1: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.5/cryptsetup-%{tar_version}.tar.sign Source2: baselibs.conf Source3: cryptsetup.keyring Source4: %{name}-rpmlintrc @@ -51,13 +47,9 @@ BuildRequires: pkgconfig(libargon2) BuildRequires: pkgconfig(libssh) BuildRequires: pkgconfig(openssl) +BuildRequires: rubygem(asciidoctor) Requires(post): coreutils Requires(postun):coreutils -%if 0%{?is_backports} -BuildRequires: autoconf -BuildRequires: automake -BuildRequires: libtool -%endif %if %{?suse_version} >= 1550 # LUKS2 used as default format, which GRUB < 2.06 can't read Conflicts: grub2 < 2.06 @@ -80,6 +72,15 @@ Experimental cryptsetup plugin for unlocking LUKS2 devices with token connected to an SSH server. +%package doc +Summary: Cryptsetup Documentation +Group: Documentation/Man +Supplements: (cryptsetup and man) +Supplements: (cryptsetup and patterns-base-documentation) + +%description doc +Documentation and man pages for cryptsetup + %package -n libcryptsetup%{so_ver} Summary: Library for setting up dm-crypt Based Encrypted Block Devices Group: System/Libraries @@ -109,10 +110,6 @@ # cryptsetup-devel last used 11.1 Provides: cryptsetup-devel = %{version} Obsoletes: cryptsetup-devel < %{version} -%if 0%{?is_backports} -# have to conflict with main package that is in SLE -Conflicts: cryptsetup-devel < %{version} -%endif %description -n lib%{name}-devel cryptsetup is used to conveniently set up dm-crypt based device-mapper @@ -123,14 +120,9 @@ %prep %autosetup -n cryptsetup-%{tar_version} -%if 0%{?is_backports} -sed -i -e '/AC_INIT/s/cryptsetup/cryptsetup2/' configure.ac -autoreconf -f -i -%endif %build %configure \ - --enable-cryptsetup-reencrypt \ --enable-selinux \ --enable-fips \ --enable-pwquality \ @@ -153,25 +145,15 @@ %{nil} %make_install -%if 0%{?is_backports} -# need to rename a files to avoid file conflict -for i in cryptsetup integritysetup veritysetup cryptsetup-reencrypt; do - mv %{buildroot}%{_sbindir}/$i %{buildroot}%{_sbindir}/${i}2 - mv %{buildroot}%{_mandir}/man8/$i.8 %{buildroot}%{_mandir}/man8/${i}2.8 -done -rm -f %{buildroot}%{_tmpfilesdir}/cryptsetup.conf -%endif %if !0%{?usrmerged} install -dm 0755 %{buildroot}/sbin -ln -s ..%{_sbindir}/cryptsetup%{?is_backports:2} %{buildroot}/sbin +ln -s ..%{_sbindir}/cryptsetup %{buildroot}/sbin %endif # don't want this file in /lib (FHS compat check), and can't move it to /usr/lib find %{buildroot} -type f -name "*.la" -delete -print # %find_lang %{name} --all-name -%if !0%{?is_backports} -# %post %{?regenerate_initrd_post} %tmpfiles_create %{_tmpfilesdir}/cryptsetup.conf @@ -181,30 +163,20 @@ %posttrans %{?regenerate_initrd_posttrans} -# -%endif %post -n libcryptsetup%{so_ver} -p /sbin/ldconfig + %postun -n libcryptsetup%{so_ver} -p /sbin/ldconfig %files %license COPYING* -%doc AUTHORS FAQ README.md docs/*ReleaseNotes %if !0%{?usrmerged} -/sbin/cryptsetup%{?is_backports:2} +/sbin/cryptsetup %endif -%{_sbindir}/cryptsetup%{?is_backports:2} -%{_sbindir}/veritysetup%{?is_backports:2} -%{_sbindir}/integritysetup%{?is_backports:2} -%{_sbindir}/cryptsetup-reencrypt%{?is_backports:2} -%{_mandir}/man8/cryptsetup%{?is_backports:2}.8%{?ext_man} -%{_mandir}/man8/cryptsetup-reencrypt%{?is_backports:2}.8%{?ext_man} -%{_mandir}/man8/veritysetup%{?is_backports:2}.8%{?ext_man} -%{_mandir}/man8/integritysetup%{?is_backports:2}.8%{?ext_man} -%if !0%{?is_backports} +%{_sbindir}/cryptsetup +%{_sbindir}/veritysetup +%{_sbindir}/integritysetup %{_tmpfilesdir}/cryptsetup.conf -%ghost %dir /run/cryptsetup -%endif %files lang -f %{name}.lang @@ -227,4 +199,44 @@ %{_mandir}/man8/cryptsetup-ssh.8.gz %{_sbindir}/cryptsetup-ssh +%files doc +%doc AUTHORS FAQ.md README.md docs/*ReleaseNotes +%{_mandir}/man8/cryptsetup.8.gz +%{_mandir}/man8/cryptsetup-benchmark.8.gz +%{_mandir}/man8/cryptsetup-bitlkDump.8.gz +%{_mandir}/man8/cryptsetup-bitlkOpen.8.gz +%{_mandir}/man8/cryptsetup-close.8.gz +%{_mandir}/man8/cryptsetup-config.8.gz +%{_mandir}/man8/cryptsetup-convert.8.gz +%{_mandir}/man8/cryptsetup-create.8.gz +%{_mandir}/man8/cryptsetup-erase.8.gz +%{_mandir}/man8/cryptsetup-isLuks.8.gz +%{_mandir}/man8/cryptsetup-loopaesOpen.8.gz +%{_mandir}/man8/cryptsetup-luksAddKey.8.gz +%{_mandir}/man8/cryptsetup-luksChangeKey.8.gz +%{_mandir}/man8/cryptsetup-luksConvertKey.8.gz +%{_mandir}/man8/cryptsetup-luksDump.8.gz +%{_mandir}/man8/cryptsetup-luksErase.8.gz +%{_mandir}/man8/cryptsetup-luksFormat.8.gz +%{_mandir}/man8/cryptsetup-luksHeaderBackup.8.gz +%{_mandir}/man8/cryptsetup-luksHeaderRestore.8.gz +%{_mandir}/man8/cryptsetup-luksKillSlot.8.gz +%{_mandir}/man8/cryptsetup-luksOpen.8.gz +%{_mandir}/man8/cryptsetup-luksRemoveKey.8.gz +%{_mandir}/man8/cryptsetup-luksResume.8.gz +%{_mandir}/man8/cryptsetup-luksSuspend.8.gz +%{_mandir}/man8/cryptsetup-luksUUID.8.gz +%{_mandir}/man8/cryptsetup-open.8.gz +%{_mandir}/man8/cryptsetup-plainOpen.8.gz +%{_mandir}/man8/cryptsetup-reencrypt.8.gz +%{_mandir}/man8/cryptsetup-refresh.8.gz +%{_mandir}/man8/cryptsetup-repair.8.gz +%{_mandir}/man8/cryptsetup-resize.8.gz +%{_mandir}/man8/cryptsetup-status.8.gz +%{_mandir}/man8/cryptsetup-tcryptDump.8.gz +%{_mandir}/man8/cryptsetup-tcryptOpen.8.gz +%{_mandir}/man8/cryptsetup-token.8.gz +%{_mandir}/man8/integritysetup.8.gz +%{_mandir}/man8/veritysetup.8.gz + %changelog ++++++ cryptsetup-2.4.3.tar.xz -> cryptsetup-2.5.0.tar.xz ++++++ /work/SRC/openSUSE:Factory/cryptsetup/cryptsetup-2.4.3.tar.xz /work/SRC/openSUSE:Factory/.cryptsetup.new.2083/cryptsetup-2.5.0.tar.xz differ: char 15, line 1