Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package crypto-policies for openSUSE:Factory 
checked in at 2021-10-01 22:28:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/crypto-policies (Old)
 and      /work/SRC/openSUSE:Factory/.crypto-policies.new.2443 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "crypto-policies"

Fri Oct  1 22:28:56 2021 rev:2 rq:921687 version:20210917.c9d86d1

Changes:
--------
--- /work/SRC/openSUSE:Factory/crypto-policies/crypto-policies.changes  
2021-03-03 18:33:55.555336339 +0100
+++ 
/work/SRC/openSUSE:Factory/.crypto-policies.new.2443/crypto-policies.changes    
    2021-10-01 22:29:00.233368559 +0200
@@ -1,0 +2,53 @@
+Fri Sep 24 11:30:21 UTC 2021 - Pedro Monreal <pmonr...@suse.com>
+
+- Remove the scripts and documentation regarding
+  fips-finish-install and test-fips-setup
+  * Add crypto-policies-FIPS.patch
+
+-------------------------------------------------------------------
+Fri Sep 24 09:34:03 UTC 2021 - Pedro Monreal <pmonr...@suse.com>
+
+- Update to version 20210917.c9d86d1:
+  * openssl: fix disabling ChaCha20
+  * pacify pylint 2.11: use format strings
+  * pacify pylint 2.11: specify explicit encoding
+  * fix minor things found by new pylint
+  * update-crypto-policies: --check against regenerated
+  * update-crypto-policies: fix --check's walking order
+  * policygenerators/gnutls: revert disabling DTLS0.9...
+  * policygenerators/java: add javasystem backend
+  * LEGACY: bump 1023 key size to 1024
+  * cryptopolicies: fix 'and' in deprecation warnings
+  * *ssh: condition ecdh-sha2-nistp384 on SECP384R1
+  * nss: hopefully the last fix for nss sigalgs check
+  * cryptopolicies: Python 3.10 compatibility
+  * nss: postponing check + testing at least something
+  * Rename 'policy modules' to 'subpolicies'
+  * validation.rules: fix a missing word in error
+  * cryptopolicies: raise errors right after warnings
+  * update-crypto-policies: capitalize warnings
+  * cryptopolicies: syntax-precheck scope errors
+  * .gitlab-ci.yml, Makefile: enable codespell
+  * all: fix several typos
+  * docs: don't leave zero TLS/DTLS protocols on
+  * openssl: separate TLS/DTLS MinProtocol/MaxProtocol
+  * alg_lists: order protocols new-to-old for consistency
+  * alg_lists: max_{d,}tls_version
+  * update-crypto-policies: fix pregenerated + local.d
+  * openssh: allow validation with pre-8.5
+  * .gitlab-ci.yml: run commit-range against upstream
+  * openssh: Use the new name for PubkeyAcceptedKeyTypes
+  * sha1_in_dnssec: deprecate
+  * .gitlab-ci.yml: test commit ranges
+  * FIPS:OSPP: sign = -*-SHA2-224
+  * scoped policies: documentation update
+  * scoped policies: use new features to the fullest...
+  * scoped policies: rewrite + minimal policy changes
+  * scoped policies: rewrite preparations
+  * nss: postponing the version check again, to 3.64
+- Remove patches fixed upstream: crypto-policies-typos.patch
+- Rebase: crypto-policies-test_supported_modules_only.patch
+- Merge crypto-policies-asciidoc.patch into
+    crypto-policies-no-build-manpages.patch
+
+-------------------------------------------------------------------

Old:
----
  crypto-policies-asciidoc.patch
  crypto-policies-typos.patch
  fedora-crypto-policies-20210225.05203d2.tar.gz

New:
----
  crypto-policies-FIPS.patch
  fedora-crypto-policies-20210917.c9d86d1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ crypto-policies.spec ++++++
--- /var/tmp/diff_new_pack.iS424I/_old  2021-10-01 22:29:00.825369652 +0200
+++ /var/tmp/diff_new_pack.iS424I/_new  2021-10-01 22:29:00.825369652 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package crypto-policies
 #
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2021 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -18,7 +18,7 @@
 
 %global _python_bytecompile_extra 0
 Name:           crypto-policies
-Version:        20210225.05203d2
+Version:        20210917.c9d86d1
 Release:        0
 Summary:        System-wide crypto policies
 License:        LGPL-2.1-or-later
@@ -28,18 +28,23 @@
 Source1:        README.SUSE
 Source2:        crypto-policies.7.gz
 Source3:        update-crypto-policies.8.gz
-Patch0:         crypto-policies-asciidoc.patch
-Patch1:         crypto-policies-typos.patch
-Patch2:         crypto-policies-test_supported_modules_only.patch
-Patch3:         crypto-policies-no-build-manpages.patch
+Patch0:         crypto-policies-test_supported_modules_only.patch
+Patch1:         crypto-policies-no-build-manpages.patch
+Patch2:         crypto-policies-FIPS.patch
 BuildRequires:  python3-base
+# For testing, the following buildrequires need to be uncommented.
 # BuildRequires:  asciidoc
+# BuildRequires:  bind
 # BuildRequires:  gnutls >= 3.6.0
 # BuildRequires:  java-devel
 # BuildRequires:  libxslt
 # BuildRequires:  openssl
 # BuildRequires:  perl
+# BuildRequires:  python3-coverage
 # BuildRequires:  python3-devel >= 3.6
+# BuildRequires:  python3-flake8
+# BuildRequires:  python3-pylint
+# BuildRequires:  python3-pytest
 # BuildRequires:  perl(File::Copy)
 # BuildRequires:  perl(File::Temp)
 # BuildRequires:  perl(File::Which)
@@ -102,6 +107,11 @@
 # Drop pre-generated GOST-ONLY policy, we do not need to ship the files
 rm -rf %{buildroot}%{_datarootdir}/crypto-policies/GOST-ONLY
 
+# Remove fips-finish-install and test-fips-setup scripts and man
+find -type f -name fips-finish-install -delete
+find -type f -name fips-finish-install.8.txt -delete
+find -type f -name test-fips-setup.sh -delete
+
 # Create back-end configs for mounting with read-only /etc/
 for d in LEGACY DEFAULT FUTURE FIPS ; do
     mkdir -p -m 755 %{buildroot}%{_datarootdir}/crypto-policies/back-ends/$d
@@ -119,7 +129,7 @@
 cp %{SOURCE1} %{buildroot}%{_sysconfdir}/crypto-policies
 
 %check
-%make_build check || :
+%make_build test || :
 
 %post -p <lua>
 if not posix.access("%{_sysconfdir}/crypto-policies/config") then
@@ -175,6 +185,7 @@
 %ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/nss.config
 %ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/bind.config
 %ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/java.config
+%ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/javasystem.config
 %ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/krb5.config
 %ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/libreswan.config
 %ghost %config(missingok,noreplace) 
%{_sysconfdir}/crypto-policies/back-ends/libssh.config

++++++ README.SUSE ++++++
--- /var/tmp/diff_new_pack.iS424I/_old  2021-10-01 22:29:00.857369711 +0200
+++ /var/tmp/diff_new_pack.iS424I/_new  2021-10-01 22:29:00.857369711 +0200
@@ -1,2 +1,2 @@
-Currently only OpenSSL, GnuTLS, and NSS policies are supported.
+Currently only OpenSSL and GnuTLS policies are supported.
 The rest of the modules ignore the policy settings for the time being.

++++++ _service ++++++
--- /var/tmp/diff_new_pack.iS424I/_old  2021-10-01 22:29:00.877369749 +0200
+++ /var/tmp/diff_new_pack.iS424I/_new  2021-10-01 22:29:00.877369749 +0200
@@ -4,7 +4,7 @@
     <param name="scm">git</param>
     <param name="versionformat">%cd.%h</param>
     <param name="changesgenerate">enable</param>
-    <param name="revision">05203d21f6d0ea9bbdb351e4600f1e273720bb8e</param>
+    <param name="revision">c9d86d1154c4b286c9be3d5e9e32451df6f64e19</param>
   </service>
   <service name="recompress" mode="disabled">
     <param name="file">*.tar</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.iS424I/_old  2021-10-01 22:29:00.893369778 +0200
+++ /var/tmp/diff_new_pack.iS424I/_new  2021-10-01 22:29:00.897369785 +0200
@@ -1,4 +1,4 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://gitlab.com/redhat-crypto/fedora-crypto-policies.git</param>
-              <param 
name="changesrevision">05203d21f6d0ea9bbdb351e4600f1e273720bb8e</param></service></servicedata>
\ No newline at end of file
+              <param 
name="changesrevision">c9d86d1154c4b286c9be3d5e9e32451df6f64e19</param></service></servicedata>
\ No newline at end of file

++++++ crypto-policies-FIPS.patch ++++++
Index: fedora-crypto-policies/Makefile
===================================================================
--- fedora-crypto-policies.orig/Makefile
+++ fedora-crypto-policies/Makefile
@@ -5,8 +5,8 @@ MANDIR?=/usr/share/man
 CONFDIR?=/etc/crypto-policies
 DESTDIR?=
 MAN7PAGES=crypto-policies.7
-MAN8PAGES=update-crypto-policies.8 fips-finish-install.8 fips-mode-setup.8
-SCRIPTS=update-crypto-policies fips-finish-install fips-mode-setup
+MAN8PAGES=update-crypto-policies.8 fips-finish-install.8
+SCRIPTS=update-crypto-policies fips-finish-install
 NUM_PROCS = $$(getconf _NPROCESSORS_ONLN)
 PYVERSION = -3
 DIFFTOOL?=meld
Index: fedora-crypto-policies/crypto-policies.7.txt
===================================================================
--- fedora-crypto-policies.orig/crypto-policies.7.txt
+++ fedora-crypto-policies/crypto-policies.7.txt
@@ -144,9 +144,6 @@ PROVIDED POLICIES
 
 *FIPS*::
   A policy to aid conformance to the *FIPS 140-2* requirements.
-  This policy is used internally by the *fips-mode-setup(8)* tool
-  which can switch the system into the *FIPS 140-2* mode.
-  This policy provides at least 112-bit security.
 
   * MACs: all *HMAC* with *SHA1* or better
   * Curves: all prime >= 256 bits
@@ -255,12 +252,6 @@ COMMANDS
   back ends and allows the system administrator to change the active
   cryptographic policy.
 
-*fips-mode-setup(8)*::
-  This command allows the system administrator to enable, or disable the
-  system FIPS mode and also apply the *FIPS* cryptographic policy
-  which limits the allowed algorithms and protocols to these allowed by
-  the FIPS 140-2 requirements.
-
 
 NOTES
 -----
@@ -427,7 +418,7 @@ FILES
 
 SEE ALSO
 --------
-update-crypto-policies(8), fips-mode-setup(8)
+update-crypto-policies(8)
 
 
 AUTHOR
Index: fedora-crypto-policies/python/update-crypto-policies.py
===================================================================
--- fedora-crypto-policies.orig/python/update-crypto-policies.py
+++ fedora-crypto-policies/python/update-crypto-policies.py
@@ -344,16 +344,12 @@ def apply_policy(pconfig, profile=None,
                 eprint("Warning: Using 'update-crypto-policies --set FIPS' "
                        "is not sufficient for")
                 eprint("         FIPS compliance.")
-                eprint("         Use 'fips-mode-setup --enable' "
-                       "command instead.")
             elif fips_mode():
                 eprint("Warning: Using 'update-crypto-policies --set' "
                        "in FIPS mode will make the system")
                 eprint("         non-compliant with FIPS.")
                 eprint("         It can also break "
                        "the ssh access to the system.")
-                eprint("         Use 'fips-mode-setup --disable' "
-                       "to disable the system FIPS mode.")
 
     if base_dir == DEFAULT_BASE_DIR:
         if not os.geteuid() == 0:
++++++ crypto-policies-no-build-manpages.patch ++++++
--- /var/tmp/diff_new_pack.iS424I/_old  2021-10-01 22:29:00.909369808 +0200
+++ /var/tmp/diff_new_pack.iS424I/_new  2021-10-01 22:29:00.913369815 +0200
@@ -1,23 +1,8 @@
-Index: fedora-crypto-policies-master/Makefile
+Index: fedora-crypto-policies/Makefile
 ===================================================================
---- fedora-crypto-policies-master.orig/Makefile        2020-09-23 
08:49:28.000000000 +0200
-+++ fedora-crypto-policies-master/Makefile     2020-11-12 10:00:52.418204054 
+0100
-@@ -60,8 +60,8 @@ clean:
-       rm -rf output
- 
- %: %.txt
--      asciidoc -v -d manpage -b docbook $<
--      xsltproc --nonet -o $@ /etc/asciidoc/docbook-xsl/manpage.xsl $@.xml
-+      # asciidoc -v -d manpage -b docbook $<
-+      # xsltproc --nonet -o $@ /etc/asciidoc/docbook-xsl/manpage.xsl $@.xml
- 
- dist:
-       rm -rf crypto-policies && git clone . crypto-policies && rm -rf 
crypto-policies/.git/ && tar -czf crypto-policies-git$(VERSION).tar.gz 
crypto-policies && rm -rf crypto-policies
-Index: fedora-crypto-policies-master
-===================================================================
---- fedora-crypto-policies-master.orig/Makefile
-+++ fedora-crypto-policies-master/Makefile
-@@ -21,9 +21,9 @@ install: $(MANPAGES)
+--- fedora-crypto-policies.orig/Makefile
++++ fedora-crypto-policies/Makefile
+@@ -22,9 +22,9 @@ install: $(MANPAGES)
        mkdir -p $(DESTDIR)$(MANDIR)/man7
        mkdir -p $(DESTDIR)$(MANDIR)/man8
        mkdir -p $(DESTDIR)$(BINDIR)
@@ -30,3 +15,14 @@
        mkdir -p $(DESTDIR)$(DIR)/
        install -p -m 644 default-config $(DESTDIR)$(DIR)
        install -p -m 644 output/reload-cmds.sh $(DESTDIR)$(DIR)
+@@ -106,8 +106,8 @@ clean:
+       rm -rf output
+ 
+ %: %.txt
+-      asciidoc.py -v -d manpage -b docbook $<
+-      xsltproc --nonet -o $@ /usr/share/asciidoc/docbook-xsl/manpage.xsl 
$@.xml
++      # asciidoc -v -d manpage -b docbook $<
++      # xsltproc --nonet -o $@ /etc/asciidoc/docbook-xsl/manpage.xsl $@.xml
+ 
+ dist:
+       rm -rf crypto-policies && git clone . crypto-policies && rm -rf 
crypto-policies/.git/ && tar -czf crypto-policies-git$(VERSION).tar.gz 
crypto-policies && rm -rf crypto-policies

++++++ crypto-policies-test_supported_modules_only.patch ++++++
--- /var/tmp/diff_new_pack.iS424I/_old  2021-10-01 22:29:00.917369823 +0200
+++ /var/tmp/diff_new_pack.iS424I/_new  2021-10-01 22:29:00.921369830 +0200
@@ -1,8 +1,8 @@
-Index: fedora-crypto-policies-master/Makefile
+Index: fedora-crypto-policies/Makefile
 ===================================================================
---- fedora-crypto-policies-master.orig/Makefile
-+++ fedora-crypto-policies-master/Makefile
-@@ -45,8 +45,6 @@ check:
+--- fedora-crypto-policies.orig/Makefile
++++ fedora-crypto-policies/Makefile
+@@ -56,8 +56,6 @@ check:
        tests/openssl.pl
        tests/gnutls.pl
        tests/nss.py
@@ -10,4 +10,4 @@
 -      tests/krb5.py
        top_srcdir=. tests/update-crypto-policies.sh
  
- test: check runpylint
+ # Alternative, equivalent ways to write the same policies


++++++ fedora-crypto-policies-20210225.05203d2.tar.gz -> 
fedora-crypto-policies-20210917.c9d86d1.tar.gz ++++++
++++ 5686 lines of diff (skipped)

Reply via email to