Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package keylime for openSUSE:Factory checked 
in at 2022-11-12 17:40:28
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/keylime (Old)
 and      /work/SRC/openSUSE:Factory/.keylime.new.1597 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "keylime"

Sat Nov 12 17:40:28 2022 rev:28 rq:1035197 version:6.5.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/keylime/keylime.changes  2022-11-03 
19:13:46.347862143 +0100
+++ /work/SRC/openSUSE:Factory/.keylime.new.1597/keylime.changes        
2022-11-12 17:40:37.741975064 +0100
@@ -2 +2 @@
-Wed Nov 02 15:38:00 UTC 2022 - apla...@suse.com
+Fri Nov 11 09:40:46 UTC 2022 - apla...@suse.com
@@ -4 +4,31 @@
-- Update to version v6.5.3:
+- Update to version v6.5.2:
+  * cloud_verifier: This is the first PR to address the scalability problems 
uncovered in #1167, starting with `agent` status.
+  * Bump version number
+  * Add --retry 5 parameter to curl
+  * create_mb_refstate: Check tpm2-tools version before running
+  * create_mb_refstate: Print error messages
+  * test_tpm: Skip event log parsing test if tpm2-tools is too old
+  * installer: Enable installation on RHEL-9
+  * Move the execution of external EK check script to cert_utils
+  * Move EK cert verification to cert_utils
+  * Make the tpm cert store path configurable
+  * ima-policy-converter: Implement a basic test suite for conversion script
+  * ima-policy-converter: Implement IMA policy conversion script
+  * ima-policy-converter: Add empty reference IMA policy
+  * ima: Accept x509 certificates if no Subject Key Identifier is available
+  * test_tpm: Use doc strings for tests description
+  * Test binary measured boot event log parsing
+  * alpha renaming
+  * shallow type fixes
+  * ima_emulator_adapter: Print readable error if reading a PCR fails
+  * tpm: Check whether hash_alg is in jsonout
+  * Very limited code fixup/cleanup on keylime_tenant CLI
+  * Set permissions of keylime_agent_secure.mount to 664
+  * Disable dnf-makecache.timer to save RAM
+  * tpm_bootlog_enrich: Get DevicePath length from LengthOfDevicePath
+  * Disable dnf-makecache.service to save RAM
+  * Fix for writing the same allow list twice during agent activation (#1150)
+  * Fix improper handling of IMA policy bundle when none is provided
+  * ima: Fix log evaluation on quick-succession execution of scripts
+  * Add new tests to packit CI
+  * Remove semantic-release action to stop erroneous releases
@@ -8,5 +37,0 @@
-
--------------------------------------------------------------------
-Wed Oct 26 14:10:21 UTC 2022 - apla...@suse.com
-
-- Update to version v6.5.2:

Old:
----
  keylime-v6.5.3.tar.xz

New:
----
  keylime-v6.5.2.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ keylime.spec ++++++
--- /var/tmp/diff_new_pack.N1UXkt/_old  2022-11-12 17:40:38.361978755 +0100
+++ /var/tmp/diff_new_pack.N1UXkt/_new  2022-11-12 17:40:38.369978802 +0100
@@ -27,7 +27,7 @@
   %define _config_norepl %config(noreplace)
 %endif
 Name:           keylime
-Version:        6.5.3
+Version:        6.5.2
 Release:        0
 Summary:        Open source TPM software for Bootstrapping and Maintaining 
Trust
 License:        Apache-2.0 AND MIT
@@ -181,6 +181,7 @@
 %python_clone -a %{buildroot}%{_bindir}/%{srcname}_migrations_apply
 %python_clone -a %{buildroot}%{_bindir}/%{srcname}_userdata_encrypt
 %python_clone -a %{buildroot}%{_bindir}/%{srcname}_ima_emulator
+%python_clone -a %{buildroot}%{_bindir}/%{srcname}_convert_ima_policy
 
 %python_expand %fdupes %{buildroot}%{$python_sitelib}
 
@@ -215,6 +216,7 @@
 %python_install_alternative %{srcname}_migrations_apply
 %python_install_alternative %{srcname}_userdata_encrypt
 %python_install_alternative %{srcname}_ima_emulator
+%python_install_alternative %{srcname}_convert_ima_policy
 
 %postun
 %python_uninstall_alternative %{srcname}_verifier
@@ -225,6 +227,7 @@
 %python_uninstall_alternative %{srcname}_migrations_apply
 %python_uninstall_alternative %{srcname}_userdata_encrypt
 %python_uninstall_alternative %{srcname}_ima_emulator
+%python_uninstall_alternative %{srcname}_convert_ima_policy
 
 %post -n %{srcname}-firewalld
 %firewalld_reload
@@ -285,6 +288,7 @@
 %python_alternative %{_bindir}/%{srcname}_migrations_apply
 %python_alternative %{_bindir}/%{srcname}_userdata_encrypt
 %python_alternative %{_bindir}/%{srcname}_ima_emulator
+%python_alternative %{_bindir}/%{srcname}_convert_ima_policy
 %{python_sitelib}/*
 
 %files -n %{srcname}-config

++++++ _service ++++++
--- /var/tmp/diff_new_pack.N1UXkt/_old  2022-11-12 17:40:38.409979041 +0100
+++ /var/tmp/diff_new_pack.N1UXkt/_new  2022-11-12 17:40:38.413979065 +0100
@@ -1,7 +1,7 @@
 <services>
   <service name="tar_scm" mode="disabled">
     <param name="versionformat">@PARENT_TAG@</param>
-    <param name="revision">refs/tags/v6.5.3</param>
+    <param name="revision">refs/tags/v6.5.2</param>
     <param name="url">https://github.com/keylime/keylime.git</param>
     <param name="scm">git</param>
     <param name="changesgenerate">enable</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.N1UXkt/_old  2022-11-12 17:40:38.429979160 +0100
+++ /var/tmp/diff_new_pack.N1UXkt/_new  2022-11-12 17:40:38.433979183 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/keylime/keylime.git</param>
-              <param 
name="changesrevision">7c03d2ada63e21c4c184d7f46d9c2e4602354bef</param></service></servicedata>
+              <param 
name="changesrevision">56e951a851b9a12a58fa473da94d1c1bf1415676</param></service></servicedata>
 (No newline at EOF)
 

++++++ keylime-v6.5.3.tar.xz -> keylime-v6.5.2.tar.xz ++++++
/work/SRC/openSUSE:Factory/keylime/keylime-v6.5.3.tar.xz 
/work/SRC/openSUSE:Factory/.keylime.new.1597/keylime-v6.5.2.tar.xz differ: char 
15, line 1

Reply via email to