Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package cryptsetup for openSUSE:Factory checked in at 2025-06-30 13:03:54 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/cryptsetup (Old) and /work/SRC/openSUSE:Factory/.cryptsetup.new.7067 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cryptsetup" Mon Jun 30 13:03:54 2025 rev:133 rq:1288922 version:2.8.0 Changes: -------- --- /work/SRC/openSUSE:Factory/cryptsetup/cryptsetup.changes 2025-06-01 21:36:23.492885647 +0200 +++ /work/SRC/openSUSE:Factory/.cryptsetup.new.7067/cryptsetup.changes 2025-06-30 13:04:55.222003860 +0200 @@ -1,0 +2,75 @@ +Thu Jun 26 07:58:52 UTC 2025 - Pedro Monreal <[email protected]> + +- Update to 2.8.0: + * Full release notes in: + - https://cdn.kernel.org/pub/linux/utils/cryptsetup/v2.8/v2.8.0-ReleaseNotes + * Introduce support for inline mode (use HW sectors with additional hardware + metadata space). + * Finalize use of keyslot context API. + * Make all keyslot context types fully self-contained. + * Add --key-description and --new-key-description cryptsetup options. + * Support more precise keyslot selection in reencryption initialization. + * Allow reencryption to resume using token and volume keys. + * Cryptsetup repair command now tries to check LUKS keyslot areas for corruption. + * Opal2 SED: PSID keyfile is now expected to be 32 alphanumeric characters. + * Opal2: Avoid the Erase method and use Secure Erase for locking range. + * Opal2: Fix some error description (in debug only). + * Opal2: Do not allow deferred deactivation. + * Allow --reduce-device-size and --device-size combination for reencryption + (encrypt) action. + * Fix the userspace storage backend to support kernel "capi:" cipher specification format. + * Disallow conversion from LUKS2 to LUKS1 if kernel "capi:" cipher specification is used. + * Explicitly disallow kernel "capi:" cipher specification format for LUKS2 + keyslot encryption. + * Do not allow conversion of LUKS2 to LUKS1 if an unbound keyslot is present. + * cryptsetup: Adjust the XTS key size for kernel "capi:" cipher specification. + * Remove keyslot warning about possible failure due to low memory. + * Do not limit Argon2 KDF memory cost on systems with more than 4GB of available memory. + * Properly report out of memory error for cryptographic backends implementing Argon2. + * Avoid KDF2 memory cost overflow on 32-bit platforms. + * Do not use page size as a fallback for device block size. + * veritysetup: Check hash device size in advance. + * Print a better error message for unsupported LUKS2 AEAD device resize. + * Optimize LUKS2 metadata writes. + * veritysetup: support --error-as-corruption option. + * Report all sizes in status and dump command output in the correct units. + * Add --integrity-key-size option to cryptsetup. + * Support trusted & encrypted keyrings for plain devices. + * Support plain format resize with a keyring key. + * TCRYPT: Clear mapping of system-encrypted partitions. + * TCRYPT: Print all information from the decrypted metadata header in + the tcryptDump command. + * Always lock the volume key structure in memory. + * Do not run direct-io read check on block devices. + * Fix a possible segfault in deferred deactivation. + * Exclude cipher allocation time from the cryptsetup benchmark. + * Add Mbed-TLS optional crypto backend. + * Fix the wrong preprocessor use of #ifdef for config.h processed by Meson. + * Reorganize license files. The license text files are now in docs/licenses. + The COPYING file in the root directory is the default license. + * Remove cc-by-sa-4.0.txt as already shipped now in docs/licenses + and named as COPYING.CC-BY-SA-4.0. + * Libcryptsetup API extensions. The libcryptsetup API is backward compatible + with all existing symbols. Due to the self-contained memory allocation, + these symbols have the new version: + - crypt_keyslot_context_init_by_passphrase; + - crypt_keyslot_context_init_by_keyfile; + - crypt_keyslot_context_init_by_token; + - crypt_keyslot_context_init_by_volume_key; + - crypt_keyslot_context_init_by_signed_key; + - crypt_keyslot_context_init_by_keyring; + - crypt_keyslot_context_init_by_vk_in_keyring; + * New symbols: + - crypt_format_inline + - crypt_get_old_volume_key_size + - crypt_reencrypt_init_by_keyslot_context + - crypt_safe_memcpy + * New defines: + - CRYPT_ACTIVATE_HIGH_PRIORITY + - CRYPT_ACTIVATE_ERROR_AS_CORRUPTION + - CRYPT_ACTIVATE_INLINE_MODE + - CRYPT_REENCRYPT_CREATE_NEW_DIGEST + * New requirement flag: + - CRYPT_REQUIREMENT_INLINE_HW_TAGS + +------------------------------------------------------------------- Old: ---- cc-by-sa-4.0.txt cryptsetup-2.7.5.tar.sign cryptsetup-2.7.5.tar.xz New: ---- cryptsetup-2.8.0.tar.sign cryptsetup-2.8.0.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cryptsetup.spec ++++++ --- /var/tmp/diff_new_pack.9IQcR9/_old 2025-06-30 13:04:56.454055208 +0200 +++ /var/tmp/diff_new_pack.9IQcR9/_new 2025-06-30 13:04:56.458055375 +0200 @@ -18,19 +18,17 @@ %define so_ver 12 Name: cryptsetup -Version: 2.7.5 +Version: 2.8.0 Release: 0 Summary: Setup program for dm-crypt Based Encrypted Block Devices License: CC-BY-SA-4.0 AND LGPL-2.0-or-later WITH cryptsetup-OpenSSL-exception Group: System/Base URL: https://gitlab.com/cryptsetup/cryptsetup/ -Source0: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.7/cryptsetup-%{version}.tar.xz +Source0: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.8/cryptsetup-%{version}.tar.xz # GPG signature of the uncompressed tarball. -Source1: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.7/cryptsetup-%{version}.tar.sign +Source1: https://www.kernel.org/pub/linux/utils/cryptsetup/v2.8/cryptsetup-%{version}.tar.sign Source2: baselibs.conf Source3: cryptsetup.keyring -# FAQ.md is CC-BY-SA-4.0 -Source4: https://creativecommons.org/licenses/by-sa/4.0/legalcode.txt#/cc-by-sa-4.0.txt Patch0: cryptsetup-fips140-3.patch # 2.6.38 has the required if_alg.h BuildRequires: linux-glibc-devel >= 2.6.38 @@ -119,7 +117,6 @@ %prep %autosetup -p1 -cp -v %{SOURCE4} . %build # force regeneration of manual pages from AsciiDoc @@ -169,7 +166,7 @@ %ldconfig_scriptlets -n libcryptsetup%{so_ver} %files -%license COPYING* +%license docs/licenses/COPYING* %if 0%{?suse_version} < 1550 /sbin/cryptsetup %endif @@ -180,29 +177,28 @@ %ghost %attr(700, -, -) %dir /run/cryptsetup %files lang -f %{name}.lang -%license COPYING* +%license docs/licenses/COPYING* %files -n libcryptsetup%{so_ver} -%license COPYING* +%license docs/licenses/COPYING* %{_libdir}/libcryptsetup.so.%{so_ver}* %files -n lib%{name}-devel -%license COPYING* +%license docs/licenses/COPYING* %doc docs/examples/ %{_includedir}/libcryptsetup.h %{_libdir}/libcryptsetup.so %{_libdir}/pkgconfig/* %files ssh -%license COPYING* +%license docs/licenses/COPYING* %dir %{_libdir}/%{name} %{_libdir}/%{name}/libcryptsetup-token-ssh.so %{_mandir}/man8/cryptsetup-ssh.8%{?ext_man} %{_sbindir}/cryptsetup-ssh %files doc -%license COPYING* -%license cc-by-sa-4.0.txt +%license docs/licenses/COPYING* %doc AUTHORS FAQ.md README.md docs/*ReleaseNotes docs/on-disk-format*.pdf %{_mandir}/man8/cryptsetup.8%{?ext_man} %{_mandir}/man8/cryptsetup-benchmark.8%{?ext_man} ++++++ cryptsetup-2.7.5.tar.xz -> cryptsetup-2.8.0.tar.xz ++++++ /work/SRC/openSUSE:Factory/cryptsetup/cryptsetup-2.7.5.tar.xz /work/SRC/openSUSE:Factory/.cryptsetup.new.7067/cryptsetup-2.8.0.tar.xz differ: char 15, line 1
