Hello community, here is the log from the commit of package password-store for openSUSE:Factory checked in at 2017-11-15 17:01:40 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/password-store (Old) and /work/SRC/openSUSE:Factory/.password-store.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "password-store" Wed Nov 15 17:01:40 2017 rev:6 rq:541849 version:1.7.1 Changes: -------- --- /work/SRC/openSUSE:Factory/password-store/password-store.changes 2017-03-21 22:51:09.825086800 +0100 +++ /work/SRC/openSUSE:Factory/.password-store.new/password-store.changes 2017-11-15 17:01:46.183311519 +0100 @@ -1,0 +2,14 @@ +Thu Nov 9 19:00:02 UTC 2017 - [email protected] + +- Version bump 1.7.1 + * Bug Fixes + * Add compatibility with GnuPG 2.2.19 + * Uniformly use the $GPG variable + * Do the correct thing with subkeys when reencrypting + * Fix test suite on OS X +- Drop password-store-gpg-2.1.patch + * merged in 6f867674272a03273212259b9039c9356a6ed90 +- clean spec file with spec-cleaner +- use %make_install macro + +------------------------------------------------------------------- Old: ---- password-store-1.7.tar.xz password-store-gpg-2.1.patch New: ---- password-store-1.7.1.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ password-store.spec ++++++ --- /var/tmp/diff_new_pack.nRafKJ/_old 2017-11-15 17:01:46.791289257 +0100 +++ /var/tmp/diff_new_pack.nRafKJ/_new 2017-11-15 17:01:46.795289111 +0100 @@ -1,7 +1,7 @@ # # spec file for package password-store # -# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany. +# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -15,33 +15,32 @@ # Please submit bugfixes or comments via http://bugs.opensuse.org/ # + Name: password-store -Version: 1.7 +Version: 1.7.1 Release: 0 Summary: Stores, retrieves, generates, and synchronizes passwords License: GPL-2.0+ Group: Productivity/Other -Url: http://zx2c4.com/projects/password-store/ +URL: http://zx2c4.com/projects/password-store/ Source: http://git.zx2c4.com/password-store/snapshot/%{name}-%{version}.tar.xz -Patch0: password-store-gpg-2.1.patch +BuildRequires: bash-completion BuildRequires: git BuildRequires: gpg2 BuildRequires: qrencode BuildRequires: tree BuildRequires: xz -BuildRequires: bash-completion BuildRequires: zsh -%if 0%{?suse_version} > 1320 -BuildRequires: fish -%endif Requires: gpg2 Requires: qrencode Requires: tree -Recommends: xclip Recommends: pwgen +Recommends: xclip Suggests: git -BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildArch: noarch +%if 0%{?suse_version} > 1320 +BuildRequires: fish +%endif %description With password-store, each password lives inside of a gpg encrypted file whose @@ -52,7 +51,6 @@ %package dmenu Summary: A dmenu interface to pass -License: GPL-2.0+ Group: Productivity/Other Requires: dmenu Recommends: xdotool @@ -63,12 +61,11 @@ %prep %setup -q -%patch0 -p1 %build %install -make DESTDIR=%{buildroot} FISHCOMP_PATH=%{buildroot}%{_datadir}/fish/completions WITH_ALLCOMP="yes" install %{?_smp_mflags} +%make_install FISHCOMP_PATH=%{buildroot}%{_datadir}/fish/completions WITH_ALLCOMP="yes" install -D -m 0755 contrib/dmenu/passmenu %{buildroot}%{_bindir}/passmenu %check @@ -77,11 +74,10 @@ %endif %files -%defattr(-,root,root) %doc README COPYING -%{_mandir}/man1/pass.1.gz +%{_mandir}/man1/pass.1%{ext_man} %{_bindir}/pass -%if 0%{suse_version} <= 1320 +%if 0%{?suse_version} <= 1320 %dir %{_datadir}/fish %dir %{_datadir}/fish/vendor_completions.d %endif @@ -90,7 +86,6 @@ %{_datadir}/zsh/site-functions/_pass %files dmenu -%defattr(-,root,root) %doc contrib/dmenu/README.md %{_bindir}/passmenu ++++++ password-store-1.7.tar.xz -> password-store-1.7.1.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/password-store-1.7/src/password-store.sh new/password-store-1.7.1/src/password-store.sh --- old/password-store-1.7/src/password-store.sh 2017-02-26 18:52:16.000000000 +0100 +++ new/password-store-1.7.1/src/password-store.sh 2017-04-13 12:11:14.000000000 +0200 @@ -58,7 +58,7 @@ verify_file() { [[ -n $PASSWORD_STORE_SIGNING_KEY ]] || return 0 [[ -f $1.sig ]] || die "Signature for $1 does not exist." - local fingerprints="$(gpg $PASSWORD_STORE_GPG_OPTS --verify --status-fd=1 "$1.sig" "$1" 2>/dev/null | sed -n 's/\[GNUPG:\] VALIDSIG \([A-F0-9]\{40\}\) .* \([A-F0-9]\{40\}\)$/\1\n\2/p')" + local fingerprints="$($GPG $PASSWORD_STORE_GPG_OPTS --verify --status-fd=1 "$1.sig" "$1" 2>/dev/null | sed -n 's/\[GNUPG:\] VALIDSIG \([A-F0-9]\{40\}\) .* \([A-F0-9]\{40\}\)$/\1\n\2/p')" local fingerprint found=0 for fingerprint in $PASSWORD_STORE_SIGNING_KEY; do [[ $fingerprint =~ ^[A-F0-9]{40}$ ]] || continue @@ -125,7 +125,7 @@ done gpg_keys="$($GPG $PASSWORD_STORE_GPG_OPTS --list-keys --with-colons "${GPG_RECIPIENTS[@]}" | sed -n 's/sub:[^:]*:[^:]*:[^:]*:\([^:]*\):[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[a-zA-Z]*e[a-zA-Z]*:.*/\1/p' | LC_ALL=C sort -u)" fi - current_keys="$($GPG $PASSWORD_STORE_GPG_OPTS -v --no-secmem-warning --no-permission-warning --list-only --keyid-format long "$passfile" 2>&1 | cut -d ' ' -f 5 | LC_ALL=C sort -u)" + current_keys="$(LC_ALL=C $GPG $PASSWORD_STORE_GPG_OPTS -v --no-secmem-warning --no-permission-warning --decrypt --list-only --keyid-format long "$passfile" 2>&1 | sed -n 's/^gpg: public key is \([A-F0-9]\+\)$/\1/p' | LC_ALL=C sort -u)" if [[ $gpg_keys != "$current_keys" ]]; then echo "$passfile_display: reencrypting to ${gpg_keys//$'\n'/ }" @@ -241,7 +241,7 @@ ============================================ = pass: the standard unix password manager = = = - = v1.7 = + = v1.7.1 = = = = Jason A. Donenfeld = = [email protected] = @@ -333,8 +333,8 @@ for key in $PASSWORD_STORE_SIGNING_KEY; do signing_keys+=( --default-key $key ) done - gpg "${GPG_OPTS[@]}" "${signing_keys[@]}" --detach-sign "$gpg_id" || die "Could not sign .gpg_id." - key="$(gpg --verify --status-fd=1 "$gpg_id.sig" "$gpg_id" 2>/dev/null | sed -n 's/\[GNUPG:\] VALIDSIG [A-F0-9]\{40\} .* \([A-F0-9]\{40\}\)$/\1/p')" + $GPG "${GPG_OPTS[@]}" "${signing_keys[@]}" --detach-sign "$gpg_id" || die "Could not sign .gpg_id." + key="$($GPG --verify --status-fd=1 "$gpg_id.sig" "$gpg_id" 2>/dev/null | sed -n 's/\[GNUPG:\] VALIDSIG [A-F0-9]\{40\} .* \([A-F0-9]\{40\}\)$/\1/p')" [[ -n $key ]] || die "Signing of .gpg_id unsuccessful." git_add_file "$gpg_id.sig" "Signing new GPG id with ${key//[$IFS]/,}." fi diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/password-store-1.7/tests/TODO.txt new/password-store-1.7.1/tests/TODO.txt --- old/password-store-1.7/tests/TODO.txt 2017-02-26 18:52:16.000000000 +0100 +++ new/password-store-1.7.1/tests/TODO.txt 2017-04-13 12:11:14.000000000 +0200 @@ -2,7 +2,6 @@ * pass insert, pass ls * pass insert [with -e, with -m, without either] * pass insert, cp, mv, rm, generate [with -f, without -f, on existing] - * pass generate [with -n vs without -n] * git operations on all commands * Are empty folders pruned for rm, cp, mv, init (when "" is the argument) [with git, and without git] * Are git commits happening as planned? Are they being signed when signing is enabled? diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/password-store-1.7/tests/t0010-generate-tests.sh new/password-store-1.7.1/tests/t0010-generate-tests.sh --- old/password-store-1.7/tests/t0010-generate-tests.sh 2017-02-26 18:52:16.000000000 +0100 +++ new/password-store-1.7.1/tests/t0010-generate-tests.sh 2017-04-13 12:11:14.000000000 +0200 @@ -12,8 +12,8 @@ test_expect_success 'Test replacement of first line' ' "$PASS" insert -m cred2 <<<"$(printf "this is a big\\npassword\\nwith\\nmany\\nlines\\nin it bla bla")" && - PATH="$TEST_HOME:$PATH" FAKE_PWGEN_PASSWORD="This is a fake password" "$PASS" generate -i cred2 23 && - [[ $("$PASS" show cred2) == "$(printf "This is a fake password\\npassword\\nwith\\nmany\\nlines\\nin it bla bla")" ]] + "$PASS" generate -i cred2 23 && + [[ $("$PASS" show cred2) == "$(printf "%s\\npassword\\nwith\\nmany\\nlines\\nin it bla bla" "$("$PASS" show cred2 | head -n 1)")" ]] ' test_done diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/password-store-1.7/tests/t0300-reencryption.sh new/password-store-1.7.1/tests/t0300-reencryption.sh --- old/password-store-1.7/tests/t0300-reencryption.sh 2017-02-26 18:52:16.000000000 +0100 +++ new/password-store-1.7.1/tests/t0300-reencryption.sh 2017-04-13 12:11:14.000000000 +0200 @@ -10,7 +10,7 @@ $GPG --list-keys --with-colons "$@" | sed -n 's/sub:[^:]*:[^:]*:[^:]*:\([^:]*\):[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[a-zA-Z]*e[a-zA-Z]*:.*/\1/p' | LC_ALL=C sort -u } gpg_keys_from_encrypted_file() { - $GPG -v --no-secmem-warning --no-permission-warning --list-only --keyid-format long "$1" 2>&1 | cut -d ' ' -f 5 | LC_ALL=C sort -u + $GPG -v --no-secmem-warning --no-permission-warning --decrypt --list-only --keyid-format long "$1" 2>&1 | cut -d ' ' -f 5 | LC_ALL=C sort -u } gpg_keys_from_group() { local output="$($GPG --list-config --with-colons | sed -n "s/^cfg:group:$1:\\(.*\\)/\\1/p" | head -n 1)" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/password-store-1.7/tests/tr new/password-store-1.7.1/tests/tr --- old/password-store-1.7/tests/tr 2017-02-26 18:52:16.000000000 +0100 +++ new/password-store-1.7.1/tests/tr 1970-01-01 01:00:00.000000000 +0100 @@ -1,2 +0,0 @@ -#!/usr/bin/env bash -echo "${FAKE_PWGEN_PASSWORD:-Hello World}"
