Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cryptsetup for openSUSE:Factory 
checked in at 2025-06-30 13:03:54
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cryptsetup (Old)
 and      /work/SRC/openSUSE:Factory/.cryptsetup.new.7067 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cryptsetup"

Mon Jun 30 13:03:54 2025 rev:133 rq:1288922 version:2.8.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/cryptsetup/cryptsetup.changes    2025-06-01 
21:36:23.492885647 +0200
+++ /work/SRC/openSUSE:Factory/.cryptsetup.new.7067/cryptsetup.changes  
2025-06-30 13:04:55.222003860 +0200
@@ -1,0 +2,75 @@
+Thu Jun 26 07:58:52 UTC 2025 - Pedro Monreal <[email protected]>
+
+- Update to 2.8.0:
+  * Full release notes in:
+    - 
https://cdn.kernel.org/pub/linux/utils/cryptsetup/v2.8/v2.8.0-ReleaseNotes
+  * Introduce support for inline mode (use HW sectors with additional hardware
+    metadata space).
+  * Finalize use of keyslot context API.
+  * Make all keyslot context types fully self-contained.
+  * Add --key-description and --new-key-description cryptsetup options.
+  * Support more precise keyslot selection in reencryption initialization.
+  * Allow reencryption to resume using token and volume keys.
+  * Cryptsetup repair command now tries to check LUKS keyslot areas for 
corruption.
+  * Opal2 SED: PSID keyfile is now expected to be 32 alphanumeric characters.
+  * Opal2: Avoid the Erase method and use Secure Erase for locking range.
+  * Opal2: Fix some error description (in debug only).
+  * Opal2: Do not allow deferred deactivation.
+  * Allow --reduce-device-size and --device-size combination for reencryption
+    (encrypt) action.
+  * Fix the userspace storage backend to support kernel "capi:" cipher 
specification format.
+  * Disallow conversion from LUKS2 to LUKS1 if kernel "capi:" cipher 
specification is used.
+  * Explicitly disallow kernel "capi:" cipher specification format for LUKS2
+    keyslot encryption.
+  * Do not allow conversion of LUKS2 to LUKS1 if an unbound keyslot is present.
+  * cryptsetup: Adjust the XTS key size for kernel "capi:" cipher 
specification.
+  * Remove keyslot warning about possible failure due to low memory.
+  * Do not limit Argon2 KDF memory cost on systems with more than 4GB of 
available memory.
+  * Properly report out of memory error for cryptographic backends 
implementing Argon2.
+  * Avoid KDF2 memory cost overflow on 32-bit platforms.
+  * Do not use page size as a fallback for device block size.
+  * veritysetup: Check hash device size in advance.
+  * Print a better error message for unsupported LUKS2 AEAD device resize.
+  * Optimize LUKS2 metadata writes.
+  * veritysetup: support --error-as-corruption option.
+  * Report all sizes in status and dump command output in the correct units.
+  * Add --integrity-key-size option to cryptsetup.
+  * Support trusted & encrypted keyrings for plain devices.
+  * Support plain format resize with a keyring key.
+  * TCRYPT: Clear mapping of system-encrypted partitions.
+  * TCRYPT: Print all information from the decrypted metadata header in
+    the tcryptDump command.
+  * Always lock the volume key structure in memory.
+  * Do not run direct-io read check on block devices.
+  * Fix a possible segfault in deferred deactivation.
+  * Exclude cipher allocation time from the cryptsetup benchmark.
+  * Add Mbed-TLS optional crypto backend.
+  * Fix the wrong preprocessor use of #ifdef for config.h processed by Meson.
+  * Reorganize license files. The license text files are now in docs/licenses.
+    The COPYING file in the root directory is the default license.
+  * Remove cc-by-sa-4.0.txt as already shipped now in docs/licenses
+    and named as COPYING.CC-BY-SA-4.0.
+  * Libcryptsetup API extensions. The libcryptsetup API is backward compatible
+    with all existing symbols. Due to the self-contained memory allocation,
+    these symbols have the new version:
+    - crypt_keyslot_context_init_by_passphrase;
+    - crypt_keyslot_context_init_by_keyfile;
+    - crypt_keyslot_context_init_by_token;
+    - crypt_keyslot_context_init_by_volume_key;
+    - crypt_keyslot_context_init_by_signed_key;
+    - crypt_keyslot_context_init_by_keyring;
+    - crypt_keyslot_context_init_by_vk_in_keyring;
+  * New symbols:
+    - crypt_format_inline
+    - crypt_get_old_volume_key_size
+    - crypt_reencrypt_init_by_keyslot_context
+    - crypt_safe_memcpy
+  * New defines:
+    - CRYPT_ACTIVATE_HIGH_PRIORITY
+    - CRYPT_ACTIVATE_ERROR_AS_CORRUPTION
+    - CRYPT_ACTIVATE_INLINE_MODE
+    - CRYPT_REENCRYPT_CREATE_NEW_DIGEST
+  * New requirement flag:
+    - CRYPT_REQUIREMENT_INLINE_HW_TAGS
+
+-------------------------------------------------------------------

Old:
----
  cc-by-sa-4.0.txt
  cryptsetup-2.7.5.tar.sign
  cryptsetup-2.7.5.tar.xz

New:
----
  cryptsetup-2.8.0.tar.sign
  cryptsetup-2.8.0.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cryptsetup.spec ++++++
--- /var/tmp/diff_new_pack.9IQcR9/_old  2025-06-30 13:04:56.454055208 +0200
+++ /var/tmp/diff_new_pack.9IQcR9/_new  2025-06-30 13:04:56.458055375 +0200
@@ -18,19 +18,17 @@
 
 %define so_ver 12
 Name:           cryptsetup
-Version:        2.7.5
+Version:        2.8.0
 Release:        0
 Summary:        Setup program for dm-crypt Based Encrypted Block Devices
 License:        CC-BY-SA-4.0 AND LGPL-2.0-or-later WITH 
cryptsetup-OpenSSL-exception
 Group:          System/Base
 URL:            https://gitlab.com/cryptsetup/cryptsetup/
-Source0:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.7/cryptsetup-%{version}.tar.xz
+Source0:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.8/cryptsetup-%{version}.tar.xz
 # GPG signature of the uncompressed tarball.
-Source1:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.7/cryptsetup-%{version}.tar.sign
+Source1:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.8/cryptsetup-%{version}.tar.sign
 Source2:        baselibs.conf
 Source3:        cryptsetup.keyring
-# FAQ.md is CC-BY-SA-4.0
-Source4:        
https://creativecommons.org/licenses/by-sa/4.0/legalcode.txt#/cc-by-sa-4.0.txt
 Patch0:         cryptsetup-fips140-3.patch
 # 2.6.38 has the required if_alg.h
 BuildRequires:  linux-glibc-devel >= 2.6.38
@@ -119,7 +117,6 @@
 
 %prep
 %autosetup -p1
-cp -v %{SOURCE4} .
 
 %build
 # force regeneration of manual pages from AsciiDoc
@@ -169,7 +166,7 @@
 %ldconfig_scriptlets -n libcryptsetup%{so_ver}
 
 %files
-%license COPYING*
+%license docs/licenses/COPYING*
 %if 0%{?suse_version} < 1550
 /sbin/cryptsetup
 %endif
@@ -180,29 +177,28 @@
 %ghost %attr(700, -, -) %dir /run/cryptsetup
 
 %files lang -f %{name}.lang
-%license COPYING*
+%license docs/licenses/COPYING*
 
 %files -n libcryptsetup%{so_ver}
-%license COPYING*
+%license docs/licenses/COPYING*
 %{_libdir}/libcryptsetup.so.%{so_ver}*
 
 %files -n lib%{name}-devel
-%license COPYING*
+%license docs/licenses/COPYING*
 %doc docs/examples/
 %{_includedir}/libcryptsetup.h
 %{_libdir}/libcryptsetup.so
 %{_libdir}/pkgconfig/*
 
 %files ssh
-%license COPYING*
+%license docs/licenses/COPYING*
 %dir %{_libdir}/%{name}
 %{_libdir}/%{name}/libcryptsetup-token-ssh.so
 %{_mandir}/man8/cryptsetup-ssh.8%{?ext_man}
 %{_sbindir}/cryptsetup-ssh
 
 %files doc
-%license COPYING*
-%license cc-by-sa-4.0.txt
+%license docs/licenses/COPYING*
 %doc AUTHORS FAQ.md README.md docs/*ReleaseNotes docs/on-disk-format*.pdf
 %{_mandir}/man8/cryptsetup.8%{?ext_man}
 %{_mandir}/man8/cryptsetup-benchmark.8%{?ext_man}

++++++ cryptsetup-2.7.5.tar.xz -> cryptsetup-2.8.0.tar.xz ++++++
/work/SRC/openSUSE:Factory/cryptsetup/cryptsetup-2.7.5.tar.xz 
/work/SRC/openSUSE:Factory/.cryptsetup.new.7067/cryptsetup-2.8.0.tar.xz differ: 
char 15, line 1

Reply via email to