Hello community,

here is the log from the commit of package suse-module-tools for 
openSUSE:Factory checked in at 2019-08-27 11:59:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/suse-module-tools (Old)
 and      /work/SRC/openSUSE:Factory/.suse-module-tools.new.7948 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "suse-module-tools"

Tue Aug 27 11:59:52 2019 rev:31 rq:723940 version:15.2.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/suse-module-tools/suse-module-tools.changes      
2019-07-21 11:28:36.516835440 +0200
+++ 
/work/SRC/openSUSE:Factory/.suse-module-tools.new.7948/suse-module-tools.changes
    2019-08-27 11:59:57.451662855 +0200
@@ -1,0 +2,6 @@
+Fri Aug 16 08:46:15 UTC 2019 - [email protected]
+
+- Update to version 15.2.5:
+  * remove 'modhash' - moved to mokutil package (jsc#SLE-6094)
+
+-------------------------------------------------------------------

Old:
----
  suse-module-tools-15.2.4.tar.xz

New:
----
  suse-module-tools-15.2.5.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ suse-module-tools.spec ++++++
--- /var/tmp/diff_new_pack.KxHCxe/_old  2019-08-27 11:59:59.131662622 +0200
+++ /var/tmp/diff_new_pack.KxHCxe/_new  2019-08-27 11:59:59.131662622 +0200
@@ -29,7 +29,7 @@
 %endif
 
 Name:           suse-module-tools
-Version:        15.2.4
+Version:        15.2.5
 Release:        0
 Summary:        Configuration for module loading and SUSE-specific utilities 
for KMPs
 License:        GPL-2.0-or-later
@@ -116,8 +116,6 @@
 
 install -d -m 755 "%{buildroot}%{_prefix}/bin"
 install -pm 755 kmp-install "%{buildroot}%{_bindir}/"
-# modhash for calculating hash of signed kernel module
-install -pm 755 modhash "%{buildroot}%{_bindir}/"
 
 # systemd service to load /boot/sysctl.conf-`uname -r`
 install -d -m 755 
"%{buildroot}%{_libexecdir}/systemd/system/systemd-sysctl.service.d"
@@ -258,7 +256,6 @@
 %if 0%{?suse_version} < 1550
 %{_rpmmacrodir}/macros.initrd
 %endif
-%{_bindir}/modhash
 %{_bindir}/kmp-install
 %{_libexecdir}/module-init-tools
 %exclude %{_libexecdir}/module-init-tools/weak-modules

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.KxHCxe/_old  2019-08-27 11:59:59.159662618 +0200
+++ /var/tmp/diff_new_pack.KxHCxe/_new  2019-08-27 11:59:59.159662618 +0200
@@ -1,4 +1,4 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/openSUSE/suse-module-tools.git</param>
-              <param 
name="changesrevision">cff4830822fe2ba4e40649b58c70e3b178d003fc</param></service></servicedata>
\ No newline at end of file
+              <param 
name="changesrevision">c60957409705d36e749e9543e9889483b1115774</param></service></servicedata>
\ No newline at end of file

++++++ suse-module-tools-15.2.4.tar.xz -> suse-module-tools-15.2.5.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/suse-module-tools-15.2.4/modhash 
new/suse-module-tools-15.2.5/modhash
--- old/suse-module-tools-15.2.4/modhash        2019-07-15 13:55:54.000000000 
+0200
+++ new/suse-module-tools-15.2.5/modhash        1970-01-01 01:00:00.000000000 
+0100
@@ -1,149 +0,0 @@
-#!/usr/bin/perl
-# 
-# Calculate the digest of the kernel module
-# It will strip kernel modules signature before calculation.
-# 
-# Based on modsign-verify, written by Michal Marek
-# Authors:
-#      Gary Lin <[email protected]>
-#      Joey Lee <[email protected]>
-#
-
-my $USAGE = "Usage: modhash [-v] [-q] [-d <digest algorithm>] <module>\n";
-
-use strict;
-use warnings;
-use IPC::Open2;
-use Getopt::Long;
-use File::Temp qw(tempfile);
-
-my $verbose = 1;
-my $dgst = "sha256";
-GetOptions(
-       "d=s" => \$dgst,
-       "q|quiet" => sub { $verbose-- if $verbose; },
-       "v|verbose" => sub { $verbose++; },
-       "h|help" => sub {
-               print $USAGE;
-               exit(0);
-       }
-) or die($USAGE);
-
-sub _verbose {
-       my $level = shift;
-
-       return if $verbose < $level;
-       print STDERR @_;
-}
-
-sub info    { _verbose(1, @_); }
-sub verbose { _verbose(2, @_); }
-sub debug   { _verbose(3, @_); }
-
-if (@ARGV > 1) {
-       print STDERR "Excess arguments\n";
-       die($USAGE);
-} elsif (@ARGV < 1) {
-       print STDERR "No module supplied\n";
-       die($USAGE);
-}
-my $module_name = shift(@ARGV);
-
-if ($dgst ne "sha"    and $dgst ne "sha1"   and $dgst ne "sha256" and
-    $dgst ne "sha384" and $dgst ne "sha512") {
-       die("unsupported algorithm: $dgst");
-}
-
-#
-# Function to read the contents of a file into a variable.
-#
-sub read_file($)
-{
-    my ($file) = @_;
-    my $contents;
-    my $len;
-
-    open(FD, "<$file") || die $file;
-    binmode FD;
-    my @st = stat(FD);
-    die $file if (!@st);
-    $len = read(FD, $contents, $st[7]) || die $file;
-    close(FD) || die $file;
-    die "$file: Wanted length ", $st[7], ", got ", $len, "\n"
-       if ($len != $st[7]);
-    return $contents;
-}
-
-sub openssl_pipe($$) {
-       my ($input, $cmd) = @_;
-       my ($pid, $res);
-
-       $pid = open2(*read_from, *write_to, $cmd) || die $cmd;
-       binmode write_to;
-       if (defined($input) && $input ne "") {
-               print write_to $input || die "$cmd: $!";
-       }
-       close(write_to) || die "$cmd: $!";
-
-       binmode read_from;
-       read(read_from, $res, 4096) || die "$cmd: $!";
-       close(read_from) || die "$cmd: $!";
-       waitpid($pid, 0) || die;
-       die "$cmd died: $?" if ($? >> 8);
-       return $res;
-}
-
-my $module = read_file($module_name);
-my $module_len = length($module);
-my $magic_number = "~Module signature appended~\n";
-my $magic_len = length($magic_number);
-my $info_len = 12;
-
-if ($module_len < $magic_len) {
-       die "Module size too short\n";
-}
-
-sub eat
-{
-       my $length = shift;
-       if ($module_len < $length) {
-               die "Module size too short\n";
-       }
-       my $res = substr($module, -$length);
-       $module = substr($module, 0, $module_len - $length);
-       $module_len -= $length;
-       return $res;
-}
-
-if (substr($module, -$magic_len) eq $magic_number) {
-       $module = substr($module, 0, $module_len - $magic_len);
-       $module_len -= $magic_len;
-       my $info = eat($info_len);
-       my ($algo, $hash, $id_type, $name_len, $key_len, $sig_len) =
-               unpack("CCCCCxxxN", $info);
-       my $signature = eat($sig_len);
-       if ($id_type == 1) {
-               if (unpack("n", $signature) == $sig_len - 2) {
-                       verbose ("signed module (X.509)\n");
-               } else {
-                       die "Invalid signature format\n";
-               }
-               if ($algo != 1) {
-                       die "Unsupported signature algorithm\n";
-               }
-               $signature = substr($signature, 2);
-               my $key_id = eat($key_len);
-               my $name = eat($name_len);
-       } elsif ($id_type == 2) {
-               verbose ("signed module (PKCS#7)\n");
-       }
-} else {
-       verbose ("unsigned module\n");
-}
-
-verbose("Hash algorithm: $dgst\n");
-
-my $digest = openssl_pipe($module, "openssl dgst -$dgst");
-$digest =~ s/\(stdin\)= //;
-
-print "$module_name: $digest"


Reply via email to