Bug 1818780

Summary: Rebase clevis to the latest upstream version
Product: Red Hat Enterprise Linux 8 Reporter: Sergio Correia <scorreia>
Component: clevisAssignee: Sergio Correia <scorreia>
Status: CLOSED ERRATA QA Contact: Martin Zelený <mzeleny>
Severity: high Docs Contact: Prerana Sharma <presharm>
Priority: high    
Version: 8.3CC: dapospis, jafiala, lmanasko, mjahoda, mzeleny, presharm, tjaros
Target Milestone: rcKeywords: FutureFeature, Rebase, Triaged
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: clevis-13-1.el8 Doc Type: Enhancement
Doc Text:
.`clevis` rebased to version 13 The `clevis` packages have been rebased to version 13, which provides multiple bug fixes and enhancements. Notable changes include: * `clevis luks unlock` can be used in the device with a key file in the non-interactive mode. * `clevis encrypt tpm2` parses the `pcr_ids` field if the input is given as a JSON array. * The `clevis-luks-unbind(1)` man page no longer refers only to LUKS v1. * `clevis luks bind` does not write to an inactive slot anymore, if the password given is incorrect. * `clevis luks bind` now works while the system uses the non-English locale. * Added support for `tpm2-tools` 4.x.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-04 03:09:18 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Sergio Correia 2020-03-30 11:05:14 UTC

Comment 18 errata-xmlrpc 2020-11-04 03:09:18 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (clevis bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:4701