Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=microos&groupid=1&version…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
NetworkManager
gnome-keyring (40.0 -> 42.1)
keylime (6.3.2 -> 6.4.0)
mobile-broadband-provider-info (20220315 -> 20220511)
polkit-default-privs (1550+20220404.7b4bea2 -> 1550+20220524.0345bd9)
python-cryptography (36.0.2 -> 37.0.2)
yast2 (4.5.3 -> 4.5.4)
=== Details ===
==== NetworkManager ====
Subpackages: NetworkManager-wwan libnm0 typelib-1_0-NM-1_0
- Fold NetworkManager-wifi back into the main package: The dep
chain is not really different and it causes too many problems for
users having that split. Not worth the pain (boo#1199710,
boo#1199706).
- As a consequence, also drop the recommends fro the main package
to -wifi.
==== gnome-keyring ====
Version update (40.0 -> 42.1)
Subpackages: gnome-keyring-pam libgck-modules-gnome-keyring
- Update to version 42.1:
+ daemon: Add files to EXTRA_DIST to fix distcheck.
- Changes from version 42.0:
+ secret-portal: Properly check the default keyring.
+ Build fixes.
+ ssh-agent: Fix crash by uninitialized GMutex.
+ fix looping off the end of the operations array.
+ readme: Mention libsecret instead of deprecated
libgnome-keyring.
+ daemon: Make it systemd-activatable through the control socket.
+ Updated translations.
- Add pkgcondfig(systemd) and pkgconfig(libsystemd) BuildRequires:
new dependencies.
==== keylime ====
Version update (6.3.2 -> 6.4.0)
Subpackages: keylime-agent keylime-config keylime-firewalld keylime-registrar keylime-tpm_cert_store keylime-verifier python38-keylime
- Update to version v6.4.0 (CVE-2022-1053, boo#1199253):
* general: bump Keylime version to 6.4.0
* tests: adjust tests to reflect latest API changes
* api: bump version to 2.1
* config: remove unused registrar mTLS options in cloud_verifier section
* tenant, verifier: let the tenant provide the AK and mTLS certificate
* Fix exit call in scripts/download_packit_coverage.sh
* Added codecov.io description to TESTING.md
* ci: only run CodeQL on the keylime directory and disable it for the webapp
* Enable GitHub workflow integrating codecov.io
* README: Fix and cleanup the install instructions
* ima: add backport for dataclasses support for Python 3.6
* ima: add info that device mapper validation is still experimental
* add lark as a dependency
* ima: integrate dm validator into gernal IMA validation
* agentstates: add the option to load and store dm validator state
* ima: add parser and validator for device mapper entries
* ima_file_signatures: rename to file_signatures
* ima_ast: rename to ast
* ima: move IMA components into their own module
* failure: add function to get current event ids
* config: add more details for tpm_cert_store option
* Deprecate API version 1.0
* config, webapp: remove tls_check_hostnames option
* ci: add CodeQL analysis
* agent, tpm: remove is_vtpm() check
* tests: update to reflect vTPM removal
* remove vTPM related helper files and documentation
* config: remove vTPM related options
* tenant: remove vtpm_policy
* verifier: remove vtpm_policy
* remove REQUIRE_ROOT environment option
* Remove Testing farm tag-repository
* Bump required packaging module version to 20.0
* Remove last traces of M2Crypto
* Workaround for mock_open not supporting iteration in Python 3.6
- Fix "run_as" configuration parameter and set it to keylime:tss
- Improve downgrade user migration during package update
==== mobile-broadband-provider-info ====
Version update (20220315 -> 20220511)
- Update to version 20220511:
* us: update verizon MCCMNC
* us: Verizon Wirleess had been awarded 301 012
* us: Verizon Wireless MMS settings
* us: declare AT&T MCC MNC
* at: declare lyca mobile MMS config
* al: add AMC internet APN config
* af: add MMS settings for AWCC
* ad: add andorra telecom MMS settings
* za: mtn mms
* za: cell-c MMS setting
* es: Add Euskaltel MMS settings
* il: youphone mms (same APN for data and mms)
* il: cellcom balance test
* il: Rami Levi MMS settings
* serviceproviders: fix indentation
* il: Partner (previously known as Orange) MMS config
==== polkit-default-privs ====
Version update (1550+20220404.7b4bea2 -> 1550+20220524.0345bd9)
- Update to version 1550+20220524.0345bd9:
* Add kinfocenter5 whitelisting (bsc#1199735).
* gconf: cleanup rules used by dropped gconf2 package
==== python-cryptography ====
Version update (36.0.2 -> 37.0.2)
- update to 37.0.2:
* Fixed an issue where parsing an encrypted private key with the public
loader functions would hang waiting for console input on OpenSSL 3.0.x rather
than raising an error.
* Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
removed again in the future, so ``pyOpenSSL`` users should still upgrade
to the latest version of that package when they upgrade ``cryptography``.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
The new minimum LibreSSL version is 3.1+.
* **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
from the public key and private key classes. These methods were originally
deprecated in version 2.0, but had an extended deprecation timeline due
to usage. Any remaining users should transition to ``sign`` and ``verify``.
* Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
the OpenSSL project. The next release of ``cryptography`` will be the last
to support compiling with OpenSSL 1.1.0.
* Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
Python core team. Support for Python 3.6 will be removed in a future
``cryptography`` release.
* Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
In the next release we will raise MSRV to 1.48.0. Users with the latest
``pip`` will typically get a wheel and not need Rust installed, but check
:doc:`/installation` for documentation on installing a newer ``rustc`` if
required.
* Deprecated
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because
they are legacy algorithms with extremely low usage. These will be removed
in a future version of ``cryptography``.
* Added limited support for distinguished names containing a bit string.
* We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
and ``x86_64`` architectures. Users on macOS should upgrade to the latest
``pip`` to ensure they can use this wheel, although we will continue to
ship ``x86_64`` specific wheels for now to ease the transition.
* This will be the final release for which we ship ``manylinux2010`` wheels.
Going forward the minimum supported ``manylinux`` ABI for our wheels will
be ``manylinux2014``. The vast majority of users will continue to receive
``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
wheels this release already requires ``manylinux2014`` for compatibility
with binaries distributed by upstream.
* Added support for multiple
:class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
:class:`~cryptography.x509.ocsp.OCSPResponse`.
* Restored support for signing certificates and other structures in
:doc:`/x509/index` with SHA3 hash algorithms.
* :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
disabled in FIPS mode.
* Added support for serialization of PKCS#12 CA friendly names/aliases in
:func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
* Added support for 12-15 byte (96 to 120 bit) nonces to
:class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
previously supported only 12 byte (96 bit).
* Added support for
:class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
OpenSSL 3.0.0+.
* Added support for serializing PKCS7 structures from a list of
certificates with
:class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
* Added support for parsing :rfc:`4514` strings with
:meth:`~cryptography.x509.Name.from_rfc4514_string`.
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to
:class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
be used to verify a signature where the salt length is not already known.
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
constant will set the salt length to the same length as the ``PSS`` hash
algorithm.
* Added support for loading RSA-PSS key types with
:func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
and
:func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
normal RSA private key, discarding the PSS constraint information.
==== yast2 ====
Version update (4.5.3 -> 4.5.4)
- Added experimental infrastructure for managing system in
a chroot (bsc#1199840)
- 4.5.4
Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=kubic&groupid=1&version=T…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
NetworkManager
keylime (6.3.2 -> 6.4.0)
python-cryptography (36.0.2 -> 37.0.2)
yast2 (4.5.3 -> 4.5.4)
=== Details ===
==== NetworkManager ====
Subpackages: NetworkManager-wwan libnm0
- Fold NetworkManager-wifi back into the main package: The dep
chain is not really different and it causes too many problems for
users having that split. Not worth the pain (boo#1199710,
boo#1199706).
- As a consequence, also drop the recommends fro the main package
to -wifi.
==== keylime ====
Version update (6.3.2 -> 6.4.0)
Subpackages: keylime-agent keylime-config keylime-firewalld keylime-registrar keylime-tpm_cert_store keylime-verifier python38-keylime
- Update to version v6.4.0 (CVE-2022-1053, boo#1199253):
* general: bump Keylime version to 6.4.0
* tests: adjust tests to reflect latest API changes
* api: bump version to 2.1
* config: remove unused registrar mTLS options in cloud_verifier section
* tenant, verifier: let the tenant provide the AK and mTLS certificate
* Fix exit call in scripts/download_packit_coverage.sh
* Added codecov.io description to TESTING.md
* ci: only run CodeQL on the keylime directory and disable it for the webapp
* Enable GitHub workflow integrating codecov.io
* README: Fix and cleanup the install instructions
* ima: add backport for dataclasses support for Python 3.6
* ima: add info that device mapper validation is still experimental
* add lark as a dependency
* ima: integrate dm validator into gernal IMA validation
* agentstates: add the option to load and store dm validator state
* ima: add parser and validator for device mapper entries
* ima_file_signatures: rename to file_signatures
* ima_ast: rename to ast
* ima: move IMA components into their own module
* failure: add function to get current event ids
* config: add more details for tpm_cert_store option
* Deprecate API version 1.0
* config, webapp: remove tls_check_hostnames option
* ci: add CodeQL analysis
* agent, tpm: remove is_vtpm() check
* tests: update to reflect vTPM removal
* remove vTPM related helper files and documentation
* config: remove vTPM related options
* tenant: remove vtpm_policy
* verifier: remove vtpm_policy
* remove REQUIRE_ROOT environment option
* Remove Testing farm tag-repository
* Bump required packaging module version to 20.0
* Remove last traces of M2Crypto
* Workaround for mock_open not supporting iteration in Python 3.6
- Fix "run_as" configuration parameter and set it to keylime:tss
- Improve downgrade user migration during package update
==== python-cryptography ====
Version update (36.0.2 -> 37.0.2)
- update to 37.0.2:
* Fixed an issue where parsing an encrypted private key with the public
loader functions would hang waiting for console input on OpenSSL 3.0.x rather
than raising an error.
* Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
removed again in the future, so ``pyOpenSSL`` users should still upgrade
to the latest version of that package when they upgrade ``cryptography``.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
The new minimum LibreSSL version is 3.1+.
* **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
from the public key and private key classes. These methods were originally
deprecated in version 2.0, but had an extended deprecation timeline due
to usage. Any remaining users should transition to ``sign`` and ``verify``.
* Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
the OpenSSL project. The next release of ``cryptography`` will be the last
to support compiling with OpenSSL 1.1.0.
* Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
Python core team. Support for Python 3.6 will be removed in a future
``cryptography`` release.
* Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
In the next release we will raise MSRV to 1.48.0. Users with the latest
``pip`` will typically get a wheel and not need Rust installed, but check
:doc:`/installation` for documentation on installing a newer ``rustc`` if
required.
* Deprecated
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because
they are legacy algorithms with extremely low usage. These will be removed
in a future version of ``cryptography``.
* Added limited support for distinguished names containing a bit string.
* We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
and ``x86_64`` architectures. Users on macOS should upgrade to the latest
``pip`` to ensure they can use this wheel, although we will continue to
ship ``x86_64`` specific wheels for now to ease the transition.
* This will be the final release for which we ship ``manylinux2010`` wheels.
Going forward the minimum supported ``manylinux`` ABI for our wheels will
be ``manylinux2014``. The vast majority of users will continue to receive
``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
wheels this release already requires ``manylinux2014`` for compatibility
with binaries distributed by upstream.
* Added support for multiple
:class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
:class:`~cryptography.x509.ocsp.OCSPResponse`.
* Restored support for signing certificates and other structures in
:doc:`/x509/index` with SHA3 hash algorithms.
* :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
disabled in FIPS mode.
* Added support for serialization of PKCS#12 CA friendly names/aliases in
:func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
* Added support for 12-15 byte (96 to 120 bit) nonces to
:class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
previously supported only 12 byte (96 bit).
* Added support for
:class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
OpenSSL 3.0.0+.
* Added support for serializing PKCS7 structures from a list of
certificates with
:class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
* Added support for parsing :rfc:`4514` strings with
:meth:`~cryptography.x509.Name.from_rfc4514_string`.
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to
:class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
be used to verify a signature where the salt length is not already known.
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
constant will set the salt length to the same length as the ``PSS`` hash
algorithm.
* Added support for loading RSA-PSS key types with
:func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
and
:func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
normal RSA private key, discarding the PSS constraint information.
==== yast2 ====
Version update (4.5.3 -> 4.5.4)
- Added experimental infrastructure for managing system in
a chroot (bsc#1199840)
- 4.5.4
Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=microos&groupid=1&version…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
PackageKit (1.2.4 -> 1.2.5)
augeas
bash-completion
chrony
gpg2
grub2
harfbuzz (4.2.1 -> 4.3.0)
libopenmpt (0.6.2 -> 0.6.3)
libunwind
osinfo-db (20220214 -> 20220516)
qemu
runc
webkit2gtk3 (2.36.1 -> 2.36.2)
webkit2gtk3-soup2 (2.36.1 -> 2.36.2)
xmlsec1 (1.2.33 -> 1.2.34)
=== Details ===
==== PackageKit ====
Version update (1.2.4 -> 1.2.5)
Subpackages: PackageKit-backend-dnf libpackagekit-glib2-18 typelib-1_0-PackageKitGlib-1_0
- Update to version 1.2.5:
+ Backends:
- dnf:
. Add support for autoremove flag when removing packages.
. Searches by name and package details should be case
insensitive.
. Update appstream xml files if dnf_sack_add_repos() does
the download.
- zypp:
. Add -std=c++1z cpp flags.
. Fix crash when search string is NULL.
. Fix package installation using undefined data.
- Changes to alpm, apttcc, nix, and slack.
+ Bugfixes:
- Install offline-update enablement symlink if Meson is new
enough.
- Move Wants= line for network-online.target.
- Add flags to D-Bus offline invoking methods.
- Properly handle allow-reinstall flag for installations.
- Provide better error message if trying to install an
installed package.
- Wait until online to activate systemd service.
- Drop 505.patch, PackageKit-zypp-c++17.patch, and
PackageKit-zypp-fix-crash-with-empty-search-string.patch: fixed
upstream.
==== augeas ====
- Employ shared library packaging guideline and resolve this
rpmlint report: "libaugeas0.x86_64: E: shlib-policy-name-error
SONAME: libfa.so.1, expected package suffix: 1" [boo#1191749]
==== bash-completion ====
- Add patch bsc1199724-modules.patch (bsc#1199724)
* Enable upstream commit to list ko.zst modules as well
==== chrony ====
Subpackages: chrony-pool-openSUSE
- Moved 20-chrony file from user specif directory
/etc/NetworkManager/dispatcher.d to vendor specific directory
/usr/lib/NetworkManager/dispatcher.d. So, users changes can
still be done in /etc and will not be overwritten by an update.
==== gpg2 ====
- added tpm support, added a new subpackage gpg2-tpm
==== grub2 ====
Subpackages: grub2-i386-pc grub2-snapper-plugin grub2-x86_64-efi
- Fix installation over serial console ends up in infinite boot loop
(bsc#1187810)
* 0001-Fix-infinite-boot-loop-on-headless-system-in-qemu.patch
- Fix ppc64le build error for new IEEE long double ABI
* 0001-libc-config-merge-from-glibc.patch
==== harfbuzz ====
Version update (4.2.1 -> 4.3.0)
Subpackages: libharfbuzz-gobject0 libharfbuzz-icu0 libharfbuzz-subset0 libharfbuzz0 typelib-1_0-HarfBuzz-0_0
- Update to version 4.3.0:
+ Major speed up in loading and subsetting fonts, especially in
handling CFF table. Subsetting some fonts is now 3 times faster
+ Speed up blending CFF2 table
+ Speed up hb_ot_tags_from_language()
+ Fix USE classification of U+10A38 to fix multiple marks on
single Kharoshthi base
+ Fix parsing of empty CFF Index
+ Fix subsetting CPAL table with partial palette overlaps
==== libopenmpt ====
Version update (0.6.2 -> 0.6.3)
- Update to 0.6.3:
* Pitch / Pan Separation and Random Variation instrument properties
were not resetting properly when seeking, potentially causing
instruments to be played e.g. at a vastly different pan position
compared to playing the module continuously.
* MED: Stereo samples were not imported correctly.
==== libunwind ====
- Fix dependencies
- Fix file list
==== osinfo-db ====
Version update (20220214 -> 20220516)
- Update to database version 20220516
osinfo-db-20220516.tar.xz
==== qemu ====
- Backport a GCC 12 aarch64 build fix (bsc#1199625)
* Patches added:
block-qdict-Fix-Werror-maybe-uninitializ.patch
==== runc ====
- Backport <https://github.com/opencontainers/runc/pull/3474> to fix issues
with newer syscalls (namely faccessat2) on older kernels on s390(x) caused by
that platform's syscall multiplexing semantics. bsc#1192051 bsc#1199565
+ bsc1192051-0001-seccomp-enosys-always-return-ENOSYS-for-setup-2-on-s390x.patch
- Add ExcludeArch for s390 (not s390x) since we've never supported it.
==== webkit2gtk3 ====
Version update (2.36.1 -> 2.36.2)
Subpackages: libjavascriptcoregtk-4_1-0 libwebkit2gtk-4_1-0 webkit2gtk-4_1-injected-bundles
- Update to version 2.36.2:
+ Fix some pages showing empty content boxes when using GTK4.
+ Fix the build with accessibility disabled.
+ Fix the build with newer Ruby versions.
+ Fix several crashes and rendering issues.
==== webkit2gtk3-soup2 ====
Version update (2.36.1 -> 2.36.2)
Subpackages: libjavascriptcoregtk-4_0-18 libwebkit2gtk-4_0-37 webkit2gtk-4_0-injected-bundles
- Update to version 2.36.2:
+ Fix some pages showing empty content boxes when using GTK4.
+ Fix the build with accessibility disabled.
+ Fix the build with newer Ruby versions.
+ Fix several crashes and rendering issues.
==== xmlsec1 ====
Version update (1.2.33 -> 1.2.34)
Subpackages: libxmlsec1-1 libxmlsec1-openssl1
- update to 1.2.34:
* Support for OpenSSL compiled with OPENSSL_NO_ERR.
* Full support for LibreSSL 3.5.0 and above
* Several other small fixes
Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=kubic&groupid=1&version=T…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
PackageKit (1.2.4 -> 1.2.5)
augeas
autofs
chrony
gpg2
grub2
harfbuzz (4.2.1 -> 4.3.0)
libunwind
qemu
runc
xmlsec1 (1.2.33 -> 1.2.34)
=== Details ===
==== PackageKit ====
Version update (1.2.4 -> 1.2.5)
Subpackages: PackageKit-backend-dnf libpackagekit-glib2-18
- Update to version 1.2.5:
+ Backends:
- dnf:
. Add support for autoremove flag when removing packages.
. Searches by name and package details should be case
insensitive.
. Update appstream xml files if dnf_sack_add_repos() does
the download.
- zypp:
. Add -std=c++1z cpp flags.
. Fix crash when search string is NULL.
. Fix package installation using undefined data.
- Changes to alpm, apttcc, nix, and slack.
+ Bugfixes:
- Install offline-update enablement symlink if Meson is new
enough.
- Move Wants= line for network-online.target.
- Add flags to D-Bus offline invoking methods.
- Properly handle allow-reinstall flag for installations.
- Provide better error message if trying to install an
installed package.
- Wait until online to activate systemd service.
- Drop 505.patch, PackageKit-zypp-c++17.patch, and
PackageKit-zypp-fix-crash-with-empty-search-string.patch: fixed
upstream.
==== augeas ====
- Employ shared library packaging guideline and resolve this
rpmlint report: "libaugeas0.x86_64: E: shlib-policy-name-error
SONAME: libfa.so.1, expected package suffix: 1" [boo#1191749]
==== autofs ====
- Moved -autofs- file from user specif directory
/etc/NetworkManager/dispatcher.d to vendor specific directory
/usr/lib/NetworkManager/dispatcher.d. So, users changes can
still be done in /etc and will not be overwritten by an update.
==== chrony ====
Subpackages: chrony-pool-openSUSE
- Moved 20-chrony file from user specif directory
/etc/NetworkManager/dispatcher.d to vendor specific directory
/usr/lib/NetworkManager/dispatcher.d. So, users changes can
still be done in /etc and will not be overwritten by an update.
==== gpg2 ====
- added tpm support, added a new subpackage gpg2-tpm
==== grub2 ====
Subpackages: grub2-i386-pc grub2-snapper-plugin grub2-x86_64-efi
- Fix installation over serial console ends up in infinite boot loop
(bsc#1187810)
* 0001-Fix-infinite-boot-loop-on-headless-system-in-qemu.patch
- Fix ppc64le build error for new IEEE long double ABI
* 0001-libc-config-merge-from-glibc.patch
==== harfbuzz ====
Version update (4.2.1 -> 4.3.0)
- Update to version 4.3.0:
+ Major speed up in loading and subsetting fonts, especially in
handling CFF table. Subsetting some fonts is now 3 times faster
+ Speed up blending CFF2 table
+ Speed up hb_ot_tags_from_language()
+ Fix USE classification of U+10A38 to fix multiple marks on
single Kharoshthi base
+ Fix parsing of empty CFF Index
+ Fix subsetting CPAL table with partial palette overlaps
==== libunwind ====
- Fix dependencies
- Fix file list
==== qemu ====
- Backport a GCC 12 aarch64 build fix (bsc#1199625)
* Patches added:
block-qdict-Fix-Werror-maybe-uninitializ.patch
==== runc ====
- Backport <https://github.com/opencontainers/runc/pull/3474> to fix issues
with newer syscalls (namely faccessat2) on older kernels on s390(x) caused by
that platform's syscall multiplexing semantics. bsc#1192051 bsc#1199565
+ bsc1192051-0001-seccomp-enosys-always-return-ENOSYS-for-setup-2-on-s390x.patch
- Add ExcludeArch for s390 (not s390x) since we've never supported it.
==== xmlsec1 ====
Version update (1.2.33 -> 1.2.34)
Subpackages: libxmlsec1-1 libxmlsec1-openssl1
- update to 1.2.34:
* Support for OpenSSL compiled with OPENSSL_NO_ERR.
* Full support for LibreSSL 3.5.0 and above
* Several other small fixes
Hi everyone,
After the announcement that we'll be winding down Kubic, I asked for
volunteers to possibly take on maintaining some aspects that would
otherwise be stopping with the end of the Kubic Project.
Jeff Kowalczyk has volunteered to take on packaging Kubernetes (and the
related containers/dependencies) going forward.
The scope Jeff plans is basically to provide a vanilla kubernetes
packages for Tumbleweed/MicroOS as before with Kubic, but we'll no
longer be providing any custom Kubic tooling, patterns, etc.
Just to set everyones expectations appropriately, Jeff is doing this on
an entirely voluntary basis. He'll be providing the packages and
supporting them on a best effort basis, just like any other volunteer
package maintainer.
We may repurpose some of the openQA testing previously used for Kubic
to keep an eye on the status of the packages, but we're unlikely to
gate Tumbleweed releases on the status of those packages, at least
initially for sure.
These kubernetes packages will continue to be developed in devel:kubic,
whereas the MicroOS specific packages have already moved to
devel:microos
If it works out as well as it does in my head, existing Kubic users
will probably need to do very little different to keep their machines
updated, with the kubeadm upgrade process likely staying the same.
Jeff has already submitted kubernetes1.24 packages for consideration,
but they're likely to be a little delayed while I tidy up the remaining
Kubic plumbing so we can use k8s 1.24 as the first shot at doing things
this new way.
Many Thanks to Jeff for stepping up,
--
Richard Brown
Linux Distribution Engineer - Future Technology Team
SUSE Software Solutions Germany GmbH, Maxfeldstr. 5, D-90409
Nuremberg, Germany
(HRB 36809, AG Nürnberg)
Managing Directors/Geschäftsführer: Ivo Totev, Andrew Myers, Andrew
McDonald, Martje Boudien Moerman
Please note that this mail was generated by a script.
The described changes are computed based on the aarch64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=kubic&groupid=3&version=T…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
gnutls (3.7.4 -> 3.7.5)
gtk3 (3.24.33+12 -> 3.24.34)
haproxy (2.5.6+git0.ba44b4312 -> 2.5.7+git0.2ef551d02)
iptables (1.8.7 -> 1.8.8)
libxkbcommon (1.4.0 -> 1.4.1)
lsof
openldap2
patterns-microos
=== Details ===
==== gnutls ====
Version update (3.7.4 -> 3.7.5)
- update to 3.7.5:
* add options disable session ticket usage in TLS 1.2 because
it does not provide forward secrecy
* For TLS 1.3 where session tickets do provide forward secrecy,
the PFS priority string now only disables session tickets in
TLS 1.2.
* Future backward incompatibility: in the next major release of
GnuTLS those flag and modifier are planned to be removed
* gnutls-cli, gnutls-serv: Channel binding for printing
information has been changed from tls-unique to tls-exporter
as tls-unique is not supported in TLS 1.3.
* Certificate sanity checks has been enhanced to make gnutls
more RFC 5280 compliant:
* Removed 3DES from FIPS approved algorithms
* Optimized support for AES-SIV-CMAC algorithms
* libgnutls: HKDF and AES-GCM algorithms are now approved in
FIPS-140 mode when used in TLS
==== gtk3 ====
Version update (3.24.33+12 -> 3.24.34)
Subpackages: gtk3-data gtk3-schema gtk3-tools libgtk-3-0
- Update to version 3.24.34:
+ Include legacy hicolor icons.
+ Fix the build with gcc 12.
+ X11: Trap errors when getting output properties.
+ Wayland: Ignore empty preedit updates. This fixes a problem
with textview scrolling.
+ Updated translations.
==== haproxy ====
Version update (2.5.6+git0.ba44b4312 -> 2.5.7+git0.2ef551d02)
- Update to version 2.5.7+git0.2ef551d02:
* [RELEASE] Released version 2.5.7
* CLEANUP: mux-h1: Fix comments and error messages for global options
* MINOR: mux-h1: Add global option accpet payload for any HTTP/1.0 requests
* BUG/MEDIUM: wdt: don't trigger the watchdog when p is unitialized
* CLEANUP: applet: make appctx_new() initialize the whole appctx
* BUG/MINOR: conn_stream: do not confirm a connection from the frontend path
* DOC/MINOR: fix typos in the lua-api document
* BUG/MEDIUM: lua: fix argument handling in data removal functions
* BUG/MINOR: server: Make SRV_STATE_LINE_MAXLEN value from 512 to 2kB (2000 bytes).
* DOC: install: update gcc version requirements
* BUG/MEDIUM: ssl: fix the gcc-12 broken fix :-(
* BUILD: listener: shut report of possible null-deref in listener_accept()
* BUILD: debug: work around gcc-12 excessive -Warray-bounds warnings
* BUILD: ssl: work around bogus warning in gcc 12's -Wformat-truncation
* BUG/MINOR: ssl: Fix typos in crl-file related CLI commands
* CI: dynamically determine actual version of h2spec
* DOC: fix typo "ant" for "and" in INSTALL
* BUG/MINOR: ssl/cli: fix "show ssl cert" not to mix cli+ssl contexts
* BUG/MINOR: ssl/cli: fix "show ssl crl-file" not to mix cli+ssl contexts
* BUG/MINOR: ssl/cli: fix "show ssl ca-file <name>" not to mix cli+ssl contexts
* BUG/MINOR: ssl/cli: fix "show ssl ca-file/crl-file" not to mix cli+ssl contexts
* BUG/MEDIUM: ssl/cli: fix yielding in show_cafile_detail
* BUG/MINOR: map/cli: make sure patterns don't vanish under "show map"'s init
* BUG/MINOR: map/cli: protect the backref list during "show map" errors
* BUG/MINOR: proxy/cli: don't enumerate internal proxies on "show backend"
* BUG/MEDIUM: cli: make "show cli sockets" really yield
* BUG/MEDIUM: resolvers: make "show resolvers" properly yield
* BUG/MINOR: startup: usage() when no -cc arguments
* BUG/MINOR: tcp/http: release the expr of set-{src,dst}[-port]
* DOC: config: Update doc for PR/PH session states to warn about rewrite failures
* MINOR: mux-h2: report a trace event when failing to create a new stream
* BUG/MINOR: mux-h2: mark the stream as open before processing it not after
* BUG/MAJOR: dns: multi-thread concurrency issue on UDP socket
* BUG/MEDIUM: mux-h1: Be able to handle trailers when C-L header was specified
* BUG/MEDIUM: mux-fcgi: Be sure to never set EOM flag on an empty HTX message
* SCRIPTS: announce-release: add URL of dev packages
* CI: github actions: update LibreSSL to 3.5.2
* BUG/MEDIUM: httpclient: Fix loop consuming HTX blocks from the response channel
* MINOR: ssl: add a new global option "tune.ssl.hard-maxrecord"
* BUG/MINOR: pools: make sure to also destroy shared pools in pool_destroy_all()
* BUG/MINOR: resolvers: Fix memory leak in resolvers_deinit()
* BUG/MEDIUM: http-ana: Fix memleak in redirect rules with ignore-empty option
* MINOR: connection: Add way to disable active connection closing during soft-stop
* BUILD: compiler: properly distinguish weak and global symbols
==== iptables ====
Version update (1.8.7 -> 1.8.8)
Subpackages: libip4tc2 libip6tc2 libxtables12 xtables-plugins
- Update to release 1.8.8
* Add iptables-translate support for: sctp match's
- -chunk-types option, connlimit match, multiport match's
- -ports option, and the tcpmss match.
* Reject setuid executables in libxtables for safety reasons
* Extended arptables-nft with -C, -I, -R, -S cmomands and the
"-c N,M" counter syntax.
* Debug output in iptables-restore (all variants), iptables-nft
and ebtables-nft when specifying -v multiple times
* Improved performance of iptables-save and -restore
==== libxkbcommon ====
Version update (1.4.0 -> 1.4.1)
- Update to release 1.4.1
* Fix compose sequence overriding (common prefix) not working
correctly. Regressed in 1.2.0.
* Remove various bogus currency sign (particulary Euro and
Korean Won) entries from the keysym <-> Unicode mappings.
They prevented the real keysyms/codepoints for these from
mapping correctly.
==== lsof ====
- Fix hostname in reproducible builds, bsc#1199709
* remove-hostname.patch
==== openldap2 ====
- bsc#1199277 - Resolve segfault when calling new ctx with global ctx
* 0017-Resolve-error-handling-in-new-ctx-when-global.patch
==== patterns-microos ====
Subpackages: patterns-microos-alt_onlyDVD patterns-microos-apparmor patterns-microos-base patterns-microos-base-microdnf patterns-microos-base-packagekit patterns-microos-base-zypper patterns-microos-basesystem patterns-microos-cloud patterns-microos-cockpit patterns-microos-defaults patterns-microos-hardware patterns-microos-ima_evm patterns-microos-onlyDVD patterns-microos-ra_agent patterns-microos-ra_verifier patterns-microos-selinux patterns-microos-sssd_ldap
- NetworkManager 1.38.0 is split into different packages and doesn't
require the wifi and wwan module, therefore added here as required.
added NetworkManager-wifi to common and NetworkManager-wwan to DVD
Please note that this mail was generated by a script.
The described changes are computed based on the aarch64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=microos&groupid=3&version…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
Mesa (22.0.3 -> 22.1.0)
Mesa-drivers (22.0.3 -> 22.1.0)
bluez
gcc
gnutls (3.7.4 -> 3.7.5)
google-noto-fonts (20170919 -> 20220516)
gtk3 (3.24.33+12 -> 3.24.34)
iptables (1.8.7 -> 1.8.8)
libxkbcommon (1.4.0 -> 1.4.1)
lsof
openldap2
patterns-microos
plasma5-workspace
=== Details ===
==== Mesa ====
Version update (22.0.3 -> 22.1.0)
Subpackages: Mesa-libEGL1 Mesa-libGL1 Mesa-libglapi0 libgbm1
- Update to 22.1.0
* lot of great featurres, including (since rc5) additional
kopper backports for zink, and support for Intel's Alchemist
DG2 platform.
==== Mesa-drivers ====
Version update (22.0.3 -> 22.1.0)
Subpackages: Mesa-dri Mesa-gallium
- Update to 22.1.0
* lot of great featurres, including (since rc5) additional
kopper backports for zink, and support for Intel's Alchemist
DG2 platform.
==== bluez ====
Subpackages: bluez-auto-enable-devices bluez-cups libbluetooth3
- Upgrade bluez-test requirement of PyGObject from ancient version
2 to current version. (bluez/test is at least able to use it
since 2014)
- Move the dbus-1 system.d file to /usr (bsc#1199207)
- Fix self-obsoletion issues
- Add supplements to cups subpackage
- Split zsh completion into subpackage
- Don't tell the user to write to /usr (in README-mesh.SUSE)
==== gcc ====
- Add lto-dump binary and link it similarly to e.g. gcov-dump.
==== gnutls ====
Version update (3.7.4 -> 3.7.5)
- update to 3.7.5:
* add options disable session ticket usage in TLS 1.2 because
it does not provide forward secrecy
* For TLS 1.3 where session tickets do provide forward secrecy,
the PFS priority string now only disables session tickets in
TLS 1.2.
* Future backward incompatibility: in the next major release of
GnuTLS those flag and modifier are planned to be removed
* gnutls-cli, gnutls-serv: Channel binding for printing
information has been changed from tls-unique to tls-exporter
as tls-unique is not supported in TLS 1.3.
* Certificate sanity checks has been enhanced to make gnutls
more RFC 5280 compliant:
* Removed 3DES from FIPS approved algorithms
* Optimized support for AES-SIV-CMAC algorithms
* libgnutls: HKDF and AES-GCM algorithms are now approved in
FIPS-140 mode when used in TLS
==== google-noto-fonts ====
Version update (20170919 -> 20220516)
- Clarify sources
- Fix unversioned obsoletes
- Merge noto-sans-display-fonts into noto-sans-fonts
- Fixes inconsistent font family names see Github issue #2315
- Bump version to 20220516
- Start using OTF fonts to be in-line with Noto CJK and Emoji
- No new fonts
- Update URL and source for zips
- Update to version 20220509
- 96 new fonts, details at https://pastebin.com/ycnpAn88
==== gtk3 ====
Version update (3.24.33+12 -> 3.24.34)
Subpackages: gtk3-data gtk3-schema gtk3-tools libgtk-3-0 typelib-1_0-Gtk-3_0
- Update to version 3.24.34:
+ Include legacy hicolor icons.
+ Fix the build with gcc 12.
+ X11: Trap errors when getting output properties.
+ Wayland: Ignore empty preedit updates. This fixes a problem
with textview scrolling.
+ Updated translations.
==== iptables ====
Version update (1.8.7 -> 1.8.8)
Subpackages: libip4tc2 libip6tc2 libxtables12 xtables-plugins
- Update to release 1.8.8
* Add iptables-translate support for: sctp match's
- -chunk-types option, connlimit match, multiport match's
- -ports option, and the tcpmss match.
* Reject setuid executables in libxtables for safety reasons
* Extended arptables-nft with -C, -I, -R, -S cmomands and the
"-c N,M" counter syntax.
* Debug output in iptables-restore (all variants), iptables-nft
and ebtables-nft when specifying -v multiple times
* Improved performance of iptables-save and -restore
==== libxkbcommon ====
Version update (1.4.0 -> 1.4.1)
Subpackages: libxkbcommon-x11-0 libxkbcommon0 libxkbregistry0
- Update to release 1.4.1
* Fix compose sequence overriding (common prefix) not working
correctly. Regressed in 1.2.0.
* Remove various bogus currency sign (particulary Euro and
Korean Won) entries from the keysym <-> Unicode mappings.
They prevented the real keysyms/codepoints for these from
mapping correctly.
==== lsof ====
- Fix hostname in reproducible builds, bsc#1199709
* remove-hostname.patch
==== openldap2 ====
- bsc#1199277 - Resolve segfault when calling new ctx with global ctx
* 0017-Resolve-error-handling-in-new-ctx-when-global.patch
==== patterns-microos ====
Subpackages: patterns-microos-alt_onlyDVD patterns-microos-apparmor patterns-microos-base patterns-microos-base-microdnf patterns-microos-base-packagekit patterns-microos-base-zypper patterns-microos-basesystem patterns-microos-cloud patterns-microos-cockpit patterns-microos-defaults patterns-microos-desktop-common patterns-microos-desktop-gnome patterns-microos-desktop-kde patterns-microos-hardware patterns-microos-ima_evm patterns-microos-onlyDVD patterns-microos-ra_agent patterns-microos-ra_verifier patterns-microos-selinux patterns-microos-sssd_ldap
- NetworkManager 1.38.0 is split into different packages and doesn't
require the wifi and wwan module, therefore added here as required.
added NetworkManager-wifi to common and NetworkManager-wwan to DVD
==== plasma5-workspace ====
Subpackages: gmenudbusmenuproxy plasma5-session plasma5-session-wayland plasma5-workspace-libs xembedsniproxy
- Add patch to fix appmenu text with certain themes (kde#453348):
* 0001-applets-appmenu-fix-top-level-menu-text-coloration.patch
- Add patch to also show themes with a newer metadata format (kde#453830):
* 0001-kcms-desktoptheme-find-metadata.json-when-loading-Th.patch
Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=microos&groupid=1&version…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
gnutls (3.7.4 -> 3.7.5)
libxkbcommon (1.4.0 -> 1.4.1)
mutter
openldap2
plasma5-workspace
=== Details ===
==== gnutls ====
Version update (3.7.4 -> 3.7.5)
- update to 3.7.5:
* add options disable session ticket usage in TLS 1.2 because
it does not provide forward secrecy
* For TLS 1.3 where session tickets do provide forward secrecy,
the PFS priority string now only disables session tickets in
TLS 1.2.
* Future backward incompatibility: in the next major release of
GnuTLS those flag and modifier are planned to be removed
* gnutls-cli, gnutls-serv: Channel binding for printing
information has been changed from tls-unique to tls-exporter
as tls-unique is not supported in TLS 1.3.
* Certificate sanity checks has been enhanced to make gnutls
more RFC 5280 compliant:
* Removed 3DES from FIPS approved algorithms
* Optimized support for AES-SIV-CMAC algorithms
* libgnutls: HKDF and AES-GCM algorithms are now approved in
FIPS-140 mode when used in TLS
==== libxkbcommon ====
Version update (1.4.0 -> 1.4.1)
Subpackages: libxkbcommon-x11-0 libxkbcommon0 libxkbregistry0
- Update to release 1.4.1
* Fix compose sequence overriding (common prefix) not working
correctly. Regressed in 1.2.0.
* Remove various bogus currency sign (particulary Euro and
Korean Won) entries from the keysym <-> Unicode mappings.
They prevented the real keysyms/codepoints for these from
mapping correctly.
==== mutter ====
- Add mutter-crash-meta_context_terminate.patch: Fix SIGSEGV in
meta_context_terminate (bsc#1199382 glgo#GNOME/mutter#2267).
==== openldap2 ====
- bsc#1199277 - Resolve segfault when calling new ctx with global ctx
* 0017-Resolve-error-handling-in-new-ctx-when-global.patch
==== plasma5-workspace ====
Subpackages: gmenudbusmenuproxy plasma5-session plasma5-session-wayland plasma5-workspace-libs xembedsniproxy
- Add patch to fix appmenu text with certain themes (kde#453348):
* 0001-applets-appmenu-fix-top-level-menu-text-coloration.patch
- Add patch to also show themes with a newer metadata format (kde#453830):
* 0001-kcms-desktoptheme-find-metadata.json-when-loading-Th.patch
Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading:
https://openqa.opensuse.org/tests/overview?distri=kubic&groupid=1&version=T…https://bugzilla.opensuse.org/buglist.cgi?product=openSUSE%20Tumbleweed&com…
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org.
For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed:
gnutls (3.7.4 -> 3.7.5)
libxkbcommon (1.4.0 -> 1.4.1)
openldap2
=== Details ===
==== gnutls ====
Version update (3.7.4 -> 3.7.5)
- update to 3.7.5:
* add options disable session ticket usage in TLS 1.2 because
it does not provide forward secrecy
* For TLS 1.3 where session tickets do provide forward secrecy,
the PFS priority string now only disables session tickets in
TLS 1.2.
* Future backward incompatibility: in the next major release of
GnuTLS those flag and modifier are planned to be removed
* gnutls-cli, gnutls-serv: Channel binding for printing
information has been changed from tls-unique to tls-exporter
as tls-unique is not supported in TLS 1.3.
* Certificate sanity checks has been enhanced to make gnutls
more RFC 5280 compliant:
* Removed 3DES from FIPS approved algorithms
* Optimized support for AES-SIV-CMAC algorithms
* libgnutls: HKDF and AES-GCM algorithms are now approved in
FIPS-140 mode when used in TLS
==== libxkbcommon ====
Version update (1.4.0 -> 1.4.1)
- Update to release 1.4.1
* Fix compose sequence overriding (common prefix) not working
correctly. Regressed in 1.2.0.
* Remove various bogus currency sign (particulary Euro and
Korean Won) entries from the keysym <-> Unicode mappings.
They prevented the real keysyms/codepoints for these from
mapping correctly.
==== openldap2 ====
- bsc#1199277 - Resolve segfault when calling new ctx with global ctx
* 0017-Resolve-error-handling-in-new-ctx-when-global.patch
Hello!
I'd be curious if I'm the only one running into the following, when
doing, for instance, `transactional-update dup`, or similar):
[zypper downloading and installing packages]
There are running programs which still use files and libraries deleted or updated by recent upgrades. They should be restarted to benefit from the latest updates. Run 'zypper ps -s' to list these programs.
Since the last system boot core libraries or services have been updated.
Reboot is suggested to ensure that your system benefits from these updates.
2022-05-16 10:23:35 Application returned with exit status 107.
ERROR: zypper --no-cd dup on /.snapshots/269/snapshot failed with exit code 107!
Use '--interactive' for manual problem resolution.
Warning: The following files were changed in the snapshot, but are shadowed by
other mounts and will not be visible to the system:
/.snapshots/269/snapshot/var/lib/systemd/catalog/database
/.snapshots/269/snapshot/var/lib/systemd/random-seed
/.snapshots/269/snapshot/var/lib/dbus/machine-id
/.snapshots/269/snapshot/var/lib/sgml/CATALOG.iso_ent
/.snapshots/269/snapshot/var/mail
Removing snapshot #269...
2022-05-16 10:23:37 tukit 4.0.0~rc2 started
2022-05-16 10:23:37 Options: abort 269
2022-05-16 10:23:38 Discarding snapshot 269.
2022-05-16 10:23:41 Transaction completed.
transactional-update finished
Basically, the dup went well, but zypper is informing us that some
service reload and/or a reboot is necessary.
Now, this is of course not particularly useful as a message, on a t-u
based system, as we're going to reboot anyway. But the real problem
seems to me to be that zypper itself returns 107, when printing that
message.
And it also seems to me that t-u interpret such return code as failure
and destroys the snapshot, which does not seem right.
FTR, this is happening to me on my MicroOS Desktop box, but it looks a
t-u general issue to me. Or is it me that am missing something or doing
something wrong?
Thanks and Regards
--
Dario Faggioli, Ph.D
http://about.me/dario.faggioli
Virtualization Software Engineer
SUSE Labs, SUSE https://www.suse.com/
-------------------------------------------------------------------
<<This happens because _I_ choose it to happen!>> (Raistlin Majere)