Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cryptsetup for openSUSE:Factory 
checked in at 2024-01-30 18:24:12
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cryptsetup (Old)
 and      /work/SRC/openSUSE:Factory/.cryptsetup.new.1815 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cryptsetup"

Tue Jan 30 18:24:12 2024 rev:125 rq:1142597 version:2.7.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/cryptsetup/cryptsetup.changes    2023-07-15 
23:14:28.871276312 +0200
+++ /work/SRC/openSUSE:Factory/.cryptsetup.new.1815/cryptsetup.changes  
2024-01-30 18:24:17.351504997 +0100
@@ -1,0 +2,66 @@
+Mon Jan 29 16:40:40 UTC 2024 - Pedro Monreal <pmonr...@suse.com>
+
+- Update to 2.7.0:
+  * Full changelog in:
+    mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.7/v2.7.0-ReleaseNotes
+  * Introduce support for hardware OPAL disk encryption.
+  * plain mode: Set default cipher to aes-xts-plain64 and password hashing
+    to sha256.
+  * Allow activation (open), luksResume, and luksAddKey to use the volume
+    key stored in a keyring.
+  * Allow to store volume key to a user-specified keyring in open and
+    luksResume commands.
+  * Do not flush IO operations if resize grows the device.
+    This can help performance in specific cases where the encrypted device
+    is extended automatically while running many IO operations.
+  * Use only half of detected free memory for Argon2 PBKDF on systems
+    without swap (for LUKS2 new keyslot or format operations).
+  * Add the possibility to specify a directory for external LUKS2 token
+    handlers (plugins).
+  * Do not allow reencryption/decryption on LUKS2 devices with
+    authenticated encryption or hardware (OPAL) encryption.
+  * Do not fail LUKS format if the operation was interrupted on subsequent
+    device wipe.
+  * Fix the LUKS2 keyslot option to be used while activating the device
+    by a token.
+  * Properly report if the dm-verity device cannot be activated due to
+    the inability to verify the signed root hash (ENOKEY).
+  * Fix to check passphrase for selected keyslot only when adding
+    new keyslot.
+  * Fix to not wipe the keyslot area before in-place overwrite.
+  * bitlk: Fix segfaults when attempting to verify the volume key.
+  * Add --disable-blkid command line option to avoid blkid device check.
+  * Add support for the meson build system.
+  * Fix wipe operation that overwrites the whole device if used for LUKS2
+    header with no keyslot area.
+  * Fix luksErase to work with detached LUKS header.
+  * Disallow the use of internal kernel crypto driver names in "capi"
+    specification.
+  * Fix reencryption to fail early for unknown cipher.
+  * tcrypt: Support new Blake2 hash for VeraCrypt.
+  * tcrypt: use hash values as substring for limiting KDF check.
+  * Add Aria cipher support and block size info.
+  * Do not decrease PBKDF parameters if the user forces them.
+  * Support OpenSSL 3.2 Argon2 implementation.
+  * Add support for Argon2 from libgcrypt
+    (requires yet unreleased gcrypt 1.11).
+  * Used Argon2 PBKDF implementation is now reported in debug mode
+    in the cryptographic backend version. For native support in
+    OpenSSL 3.2 or libgcrypt 1.11, "argon2" is displayed.
+    If libargon2 is used, "cryptsetup libargon2" (for embedded
+    library) or "external libargon2" is displayed.
+  * Link only libcrypto from OpenSSL.
+  * Disable reencryption for Direct-Access (DAX) devices.
+  * Print a warning message if the device is not aligned to sector size.
+  * Fix sector size and integrity fields display for non-LUKS2 crypt
+    devices for the status command.
+  * Fix suspend for LUKS2 with authenticated encryption (also suspend
+    dm-integrity device underneath).
+  * Update keyring and locking documentation and LUKS2 specification
+    for OPAL2 support.
+  * Remove patches fixed upstream:
+    - cryptsetup-Check-for-physical-memory-available-also-in-PBKDF-be.patch
+    - cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
+    - cryptsetup-Use-only-half-of-detected-free-memory-on-systems-wit.patch
+
+-------------------------------------------------------------------

Old:
----
  cryptsetup-2.6.1.tar.sign
  cryptsetup-2.6.1.tar.xz
  cryptsetup-Check-for-physical-memory-available-also-in-PBKDF-be.patch
  cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
  cryptsetup-Use-only-half-of-detected-free-memory-on-systems-wit.patch

New:
----
  cryptsetup-2.7.0.tar.sign
  cryptsetup-2.7.0.tar.xz

BETA DEBUG BEGIN:
  Old:  * Remove patches fixed upstream:
    - cryptsetup-Check-for-physical-memory-available-also-in-PBKDF-be.patch
    - cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
  Old:    - 
cryptsetup-Check-for-physical-memory-available-also-in-PBKDF-be.patch
    - cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
    - cryptsetup-Use-only-half-of-detected-free-memory-on-systems-wit.patch
  Old:    - 
cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
    - cryptsetup-Use-only-half-of-detected-free-memory-on-systems-wit.patch
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cryptsetup.spec ++++++
--- /var/tmp/diff_new_pack.93JNxq/_old  2024-01-30 18:24:17.999528376 +0100
+++ /var/tmp/diff_new_pack.93JNxq/_new  2024-01-30 18:24:17.999528376 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package cryptsetup
 #
-# Copyright (c) 2023 SUSE LLC
+# Copyright (c) 2024 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -18,21 +18,17 @@
 
 %define so_ver 12
 Name:           cryptsetup
-Version:        2.6.1
+Version:        2.7.0
 Release:        0
 Summary:        Setup program for dm-crypt Based Encrypted Block Devices
 License:        LGPL-2.0-or-later AND SUSE-GPL-2.0-with-openssl-exception
 Group:          System/Base
 URL:            https://gitlab.com/cryptsetup/cryptsetup/
-Source0:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.6/cryptsetup-%{version}.tar.xz
+Source0:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.7/cryptsetup-%{version}.tar.xz
 # GPG signature of the uncompressed tarball.
-Source1:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.6/cryptsetup-%{version}.tar.sign
+Source1:        
https://www.kernel.org/pub/linux/utils/cryptsetup/v2.7/cryptsetup-%{version}.tar.sign
 Source2:        baselibs.conf
 Source3:        cryptsetup.keyring
-#PATCH-FIX-UPSTREAM bsc#1211079 luksFormat: handle system with low memory and 
no swap space
-Patch0:         
cryptsetup-Check-for-physical-memory-available-also-in-PBKDF-be.patch
-Patch1:         
cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
-Patch2:         
cryptsetup-Use-only-half-of-detected-free-memory-on-systems-wit.patch
 BuildRequires:  device-mapper-devel
 BuildRequires:  libjson-c-devel
 BuildRequires:  libpwquality-devel

++++++ cryptsetup-2.6.1.tar.xz -> cryptsetup-2.7.0.tar.xz ++++++
/work/SRC/openSUSE:Factory/cryptsetup/cryptsetup-2.6.1.tar.xz 
/work/SRC/openSUSE:Factory/.cryptsetup.new.1815/cryptsetup-2.7.0.tar.xz differ: 
char 15, line 1

Reply via email to