Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssh for openSUSE:Factory checked 
in at 2025-04-08 17:50:42
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssh (Old)
 and      /work/SRC/openSUSE:Factory/.openssh.new.1907 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssh"

Tue Apr  8 17:50:42 2025 rev:192 rq:1267606 version:9.9p2

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssh/openssh.changes  2025-02-20 
16:27:32.633816176 +0100
+++ /work/SRC/openSUSE:Factory/.openssh.new.1907/openssh.changes        
2025-04-08 17:51:16.526607060 +0200
@@ -1,0 +2,6 @@
+Tue Mar 18 08:51:16 UTC 2025 - Hillwood Yang <hillw...@opensuse.org>
+
+- Disable seccomp_filter and rlimitsandbox sandbox for loongarch. 
+  seccomp_filter and rlimitsandbox not supported on loongarch64 yet.
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssh.spec ++++++
--- /var/tmp/diff_new_pack.ZGRFFp/_old  2025-04-08 17:51:17.770659203 +0200
+++ /var/tmp/diff_new_pack.ZGRFFp/_new  2025-04-08 17:51:17.774659370 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package openssh
 #
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -15,10 +15,18 @@
 # Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
+
 %define sandbox_seccomp 0
-%ifnarch ppc
+%ifnarch ppc loongarch64
 %define sandbox_seccomp 1
 %endif
+%if !%{sandbox_seccomp}
+%ifarch loongarch64
+%define sandbox_rlimit 0
+%else
+%define sandbox_rlimit 1
+%endif
+%endif
 %define _fwdir      %{_sysconfdir}/sysconfig/SuSEfirewall2.d
 %define _fwdefdir   %{_fwdir}/services
 %define _appdefdir  %( grep "configdirspec=" $( which xmkmf ) | sed -r 
's,^[^=]+=.*-I(.*)/config.*$,\\1/app-defaults,' )
@@ -172,11 +180,11 @@
 %endif
 BuildRequires:  pam-devel
 BuildRequires:  pkgconfig
+BuildRequires:  sysuser-shadow
+BuildRequires:  sysuser-tools
 BuildRequires:  zlib-devel
 BuildRequires:  pkgconfig(libfido2) >= 1.2.0
 BuildRequires:  pkgconfig(libsystemd)
-BuildRequires:  sysuser-shadow
-BuildRequires:  sysuser-tools
 Requires:       %{name}-clients = %{version}-%{release}
 Requires:       %{name}-server = %{version}-%{release}
 %if 0%{?suse_version} >= 1550 || 0%{?suse_version} < 1500 
@@ -267,6 +275,7 @@
 to log in using the passwor. It's useful to secure your system
 preventing password attacks on the root account over ssh.
 %else
+
 %package server-config-rootlogin
 Summary:        Config to permit root logins to sshd
 Group:          Productivity/Networking/SSH
@@ -369,8 +378,10 @@
 %if %{sandbox_seccomp}
     --with-sandbox=seccomp_filter \
 %else
+%if %{sandbox_rlimit}
     --with-sandbox=rlimit \
 %endif
+%endif
     --disable-strip \
     --with-audit=linux \
 %if %{with ldap}
@@ -640,6 +651,7 @@
 %config(noreplace) %{_sysconfdir}/ssh/sshd_config.d/51-permit-root-login.conf
 %endif
 %else
+
 %files server-config-rootlogin
 %if %{defined _distconfdir}
 %{_distconfdir}/ssh/sshd_config.d/50-permit-root-login.conf

Reply via email to