Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package permissions for openSUSE:Factory checked in at 2021-09-06 15:57:50 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/permissions (Old) and /work/SRC/openSUSE:Factory/.permissions.new.1899 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "permissions" Mon Sep 6 15:57:50 2021 rev:149 rq:915438 version:unknown Changes: -------- --- /work/SRC/openSUSE:Factory/permissions/permissions.changes 2021-05-21 21:49:48.230286200 +0200 +++ /work/SRC/openSUSE:Factory/.permissions.new.1899/permissions.changes 2021-09-06 15:57:51.957297476 +0200 @@ -1,0 +2,16 @@ +Wed Sep 01 07:33:41 UTC 2021 - matthias.gerst...@suse.com + +- Update to version 20210901: + * libksysguard5: Updated path for ksgrd_network_helper + * kdesu: Updated path for kdesud + * sbin_dirs cleanup: these binaries have already been moved to /usr/sbin + * mariadb: revert auth_pam_tool to /usr/lib{,64} again + * cleanup: revert virtualbox back to plain /usr/lib + * cleanup: remove deprecated /etc/ssh/sshd_config + * hawk_invoke is not part of newer hawk2 packages anymore + * cleanup: texlive-filesystem: public now resides in libexec + * cleanup: authbind: helper now resides in libexec + * cleanup: polkit: the agent now also resides in libexec + * libexec cleanup: 'inn' news binaries now reside in libexec + +------------------------------------------------------------------- Old: ---- permissions-20210518.tar.xz New: ---- permissions-20210901.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ permissions.spec ++++++ --- /var/tmp/diff_new_pack.HQgjTd/_old 2021-09-06 15:57:52.797297283 +0200 +++ /var/tmp/diff_new_pack.HQgjTd/_new 2021-09-06 15:57:52.801297282 +0200 @@ -16,7 +16,7 @@ # -%define VERSION_DATE 20210518 +%define VERSION_DATE 20210901 Name: permissions Version: %{VERSION_DATE}.%{suse_version} ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.HQgjTd/_old 2021-09-06 15:57:52.845297272 +0200 +++ /var/tmp/diff_new_pack.HQgjTd/_new 2021-09-06 15:57:52.845297272 +0200 @@ -1,4 +1,4 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/openSUSE/permissions.git</param> - <param name="changesrevision">85e23aea644b52c8ef2ec21881b9acbac7606747</param></service></servicedata> \ No newline at end of file + <param name="changesrevision">cda0681b1cf15a3ecc3e0b08dab7105192860b47</param></service></servicedata> \ No newline at end of file ++++++ permissions-20210518.tar.xz -> permissions-20210901.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20210518/profiles/permissions.easy new/permissions-20210901/profiles/permissions.easy --- old/permissions-20210518/profiles/permissions.easy 2021-05-18 13:15:47.000000000 +0200 +++ new/permissions-20210901/profiles/permissions.easy 2021-09-01 09:24:09.000000000 +0200 @@ -23,7 +23,6 @@ /etc/ftpusers root:root 644 /var/lib/nfs/rmtab root:root 644 /etc/syslog.conf root:root 644 -/etc/ssh/sshd_config root:root 640 /etc/cron.d/ root:root 755 /etc/cron.daily/ root:root 755 /etc/cron.hourly/ root:root 755 @@ -54,8 +53,8 @@ /usr/bin/fusermount root:trusted 4755 # needs setuid root when using shadow via NIS: # #216816 -%{sbin_dirs}/unix_chkpwd root:shadow 4755 -%{sbin_dirs}/unix2_chkpwd root:shadow 4755 +/usr/sbin/unix_chkpwd root:shadow 4755 +/usr/sbin/unix2_chkpwd root:shadow 4755 # squid changes from bnc#891268 # - adjusted paths in bsc#1171569 @@ -123,6 +122,7 @@ # kdesud (bsc#872276) %{lib_dirs}/libexec/kf5/kdesud root:nogroup 2755 +/usr/libexec/kf5/kdesud root:nogroup 2755 # # amanda @@ -145,9 +145,9 @@ # anyone else, therefore the strange permissions 4554 are required # for operation. (#67032, #594393) # -%{libexec_dirs}/news/bin/rnews news:uucp 4550 -%{libexec_dirs}/news/bin/inews news:news 2555 -%{libexec_dirs}/news/bin/innbind root:news 4550 +/usr/libexec/news/bin/rnews news:uucp 4550 +/usr/libexec/news/bin/inews news:news 2555 +/usr/libexec/news/bin/innbind root:news 4550 # # sendfax @@ -167,7 +167,7 @@ /usr/libexec/uucp/uuxqt uucp:uucp 6555 # polkit new (bnc#523377) -%{libexec_dirs}/polkit-1/polkit-agent-helper-1 root:root 4755 +/usr/libexec/polkit-1/polkit-agent-helper-1 root:root 4755 /usr/bin/pkexec root:root 4755 # dbus-1 (#333361, #1056764, bsc#1171164) @@ -177,15 +177,15 @@ /usr/bin/newrole root:root 4755 # VirtualBox (#429725, bsc#1120650) -%{libexec_dirs}/virtualbox/VirtualBoxVM root:vboxusers 4750 -%{libexec_dirs}/virtualbox/VBoxHeadless root:vboxusers 4750 -%{libexec_dirs}/virtualbox/VBoxSDL root:vboxusers 4750 +/usr/lib/virtualbox/VirtualBoxVM root:vboxusers 4750 +/usr/lib/virtualbox/VBoxHeadless root:vboxusers 4750 +/usr/lib/virtualbox/VBoxSDL root:vboxusers 4750 # (bnc#533550) -%{libexec_dirs}/virtualbox/VBoxNetAdpCtl root:vboxusers 4750 +/usr/lib/virtualbox/VBoxNetAdpCtl root:vboxusers 4750 # bnc#669055 -%{libexec_dirs}/virtualbox/VBoxNetDHCP root:vboxusers 4750 +/usr/lib/virtualbox/VBoxNetDHCP root:vboxusers 4750 # bsc#1033425 -%{libexec_dirs}/virtualbox/VBoxNetNAT root:vboxusers 4750 +/usr/lib/virtualbox/VBoxNetNAT root:vboxusers 4750 # open-vm-tools (bnc#474285) /usr/bin/vmware-user-suid-wrapper root:root 4755 @@ -195,10 +195,9 @@ # hawk (bnc#665045) /usr/sbin/hawk_chkpwd root:haclient 4750 -/usr/sbin/hawk_invoke root:haclient 4750 # ecryptfs-utils (bnc#740110) -%{sbin_dirs}/mount.ecryptfs_private root:root 4755 +/usr/sbin/mount.ecryptfs_private root:root 4755 # wireshark (bsc#957624) /usr/bin/dumpcap root:wireshark 0750 @@ -275,7 +274,7 @@ /usr/bin/firejail root:firejail 04750 # authbind (bsc#1111251) -%{libexec_dirs}/authbind/helper root:root 04755 +/usr/libexec/authbind/helper root:root 04755 # fuse3 (bsc#1111230) /usr/bin/fusermount3 root:trusted 04755 @@ -290,9 +289,11 @@ # ksysguard network helper (bsc#1151190) %{lib_dirs}/libexec/ksysguard/ksgrd_network_helper root:root 0755 +capabilities cap_net_raw=ep +/usr/libexec/ksysguard/ksgrd_network_helper root:root 0755 + +capabilities cap_net_raw=ep # mariadb auth_pam_tool (bsc#1160285) -%{lib_libexec_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root 4755 +%{lib_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root 4755 # Workload Memory Protection (bsc#1161335) %{libexec_dirs}/sapwmp/sapwmp-capture root:sapsys 4750 @@ -304,7 +305,7 @@ /usr/libexec/cockpit-session root:cockpit-wsinstance 4750 # binary that launches texlive tools with group "mktex" (bsc#1171686) -%{libexec_dirs}/mktex/public root:mktex 2755 +/usr/libexec/mktex/public root:mktex 2755 # enlightenment privileged desktop operations (bsc#1169238) %{lib_dirs}/enlightenment/utils/enlightenment_system root:root 4755 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20210518/profiles/permissions.paranoid new/permissions-20210901/profiles/permissions.paranoid --- old/permissions-20210518/profiles/permissions.paranoid 2021-05-18 13:15:47.000000000 +0200 +++ new/permissions-20210901/profiles/permissions.paranoid 2021-09-01 09:24:09.000000000 +0200 @@ -40,7 +40,6 @@ /etc/ftpusers root:root 600 /var/lib/nfs/rmtab root:root 600 /etc/syslog.conf root:root 600 -/etc/ssh/sshd_config root:root 600 /etc/cron.d/ root:root 700 /etc/cron.daily/ root:root 700 /etc/cron.hourly/ root:root 700 @@ -72,8 +71,8 @@ /usr/bin/fusermount root:trusted 0755 # needs setuid root when using shadow via NIS: # #216816 -%{sbin_dirs}/unix_chkpwd root:shadow 0755 -%{sbin_dirs}/unix2_chkpwd root:shadow 0755 +/usr/sbin/unix_chkpwd root:shadow 0755 +/usr/sbin/unix2_chkpwd root:shadow 0755 # squid changes from bnc#891268 # - adjusted paths in bsc#1171569 @@ -137,6 +136,7 @@ # kdesud (bsc#872276) %{lib_dirs}/libexec/kf5/kdesud root:nogroup 0755 +/usr/libexec/kf5/kdesud root:nogroup 0755 # # amanda @@ -159,9 +159,9 @@ # anyone else, therefore the strange permissions 4554 are required # for operation. (#67032, #594393) # -%{libexec_dirs}/news/bin/rnews news:uucp 0555 -%{libexec_dirs}/news/bin/inews news:news 0555 -%{libexec_dirs}/news/bin/innbind root:news 0555 +/usr/libexec/news/bin/rnews news:uucp 0555 +/usr/libexec/news/bin/inews news:news 0555 +/usr/libexec/news/bin/innbind root:news 0555 # # sendfax @@ -181,7 +181,7 @@ /usr/libexec/uucp/uuxqt uucp:uucp 0555 # polkit new (bnc#523377) -%{libexec_dirs}/polkit-1/polkit-agent-helper-1 root:root 0755 +/usr/libexec/polkit-1/polkit-agent-helper-1 root:root 0755 /usr/bin/pkexec root:root 0755 # dbus-1 (#333361, #1056764, bsc#1171164) @@ -191,15 +191,15 @@ /usr/bin/newrole root:root 0755 # VirtualBox (#429725, bsc#1120650) -%{libexec_dirs}/virtualbox/VirtualBoxVM root:vboxusers 0750 -%{libexec_dirs}/virtualbox/VBoxHeadless root:vboxusers 0755 -%{libexec_dirs}/virtualbox/VBoxSDL root:vboxusers 0755 +/usr/lib/virtualbox/VirtualBoxVM root:vboxusers 0750 +/usr/lib/virtualbox/VBoxHeadless root:vboxusers 0755 +/usr/lib/virtualbox/VBoxSDL root:vboxusers 0755 # (bnc#533550) -%{libexec_dirs}/virtualbox/VBoxNetAdpCtl root:vboxusers 0755 +/usr/lib/virtualbox/VBoxNetAdpCtl root:vboxusers 0755 # bnc#669055 -%{libexec_dirs}/virtualbox/VBoxNetDHCP root:vboxusers 0755 +/usr/lib/virtualbox/VBoxNetDHCP root:vboxusers 0755 # bsc#1033425 -%{libexec_dirs}/virtualbox/VBoxNetNAT root:vboxusers 0755 +/usr/lib/virtualbox/VBoxNetNAT root:vboxusers 0755 # open-vm-tools (bnc#474285) @@ -210,10 +210,9 @@ # hawk (bnc#665045) /usr/sbin/hawk_chkpwd root:haclient 0755 -/usr/sbin/hawk_invoke root:haclient 0755 # ecryptfs-utils (bnc#740110) -%{sbin_dirs}/mount.ecryptfs_private root:root 0755 +/usr/sbin/mount.ecryptfs_private root:root 0755 # wireshark (bsc#957624) /usr/bin/dumpcap root:root 0755 @@ -285,7 +284,7 @@ /usr/bin/firejail root:firejail 0750 # authbind (bsc#1111251) -%{libexec_dirs}/authbind/helper root:root 0755 +/usr/libexec/authbind/helper root:root 0755 # fuse3 (bsc#1111230) /usr/bin/fusermount3 root:trusted 0755 @@ -298,9 +297,10 @@ # ksysguard network helper (bsc#1151190) %{lib_dirs}/libexec/ksysguard/ksgrd_network_helper root:root 0755 +/usr/libexec/ksysguard/ksgrd_network_helper root:root 0755 # mariadb auth_pam_tool (bsc#1160285) -%{lib_libexec_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root 0755 +%{lib_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root 0755 # Workload Memory Protection (bsc#1161335) %{libexec_dirs}/sapwmp/sapwmp-capture root:sapsys 0750 @@ -312,7 +312,7 @@ /usr/libexec/cockpit-session root:cockpit-wsinstance 0750 # binary that launches texlive tools with group "mktex" (bsc#1171686) -%{libexec_dirs}/mktex/public root:mktex 0755 +/usr/libexec/mktex/public root:mktex 0755 # enlightenment privileged desktop operations (bsc#1169238) %{lib_dirs}/enlightenment/utils/enlightenment_system root:root 0755 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20210518/profiles/permissions.secure new/permissions-20210901/profiles/permissions.secure --- old/permissions-20210518/profiles/permissions.secure 2021-05-18 13:15:47.000000000 +0200 +++ new/permissions-20210901/profiles/permissions.secure 2021-09-01 09:24:09.000000000 +0200 @@ -62,7 +62,6 @@ /etc/ftpusers root:root 644 /var/lib/nfs/rmtab root:root 644 /etc/syslog.conf root:root 600 -/etc/ssh/sshd_config root:root 600 # we might want to tighten that up in the future in this profile (remove the # ability for others to read/enter) /etc/cron.d/ root:root 755 @@ -96,8 +95,8 @@ /usr/bin/fusermount root:trusted 4750 # needs setuid root when using shadow via NIS: # #216816 -%{sbin_dirs}/unix_chkpwd root:shadow 4755 -%{sbin_dirs}/unix2_chkpwd root:shadow 4755 +/usr/sbin/unix_chkpwd root:shadow 4755 +/usr/sbin/unix2_chkpwd root:shadow 4755 # squid changes from bnc#891268 # - adjusted paths in bsc#1171569 @@ -163,6 +162,7 @@ # kdesud (bsc#872276) %{lib_dirs}/libexec/kf5/kdesud root:nogroup 2755 +/usr/libexec/kf5/kdesud root:nogroup 2755 # # amanda @@ -185,9 +185,9 @@ # anyone else, therefore the strange permissions 4554 are required # for operation. (#67032, #594393) # -%{libexec_dirs}/news/bin/rnews news:uucp 4550 -%{libexec_dirs}/news/bin/inews news:news 2555 -%{libexec_dirs}/news/bin/innbind root:news 4550 +/usr/libexec/news/bin/rnews news:uucp 4550 +/usr/libexec/news/bin/inews news:news 2555 +/usr/libexec/news/bin/innbind root:news 4550 # # sendfax @@ -208,7 +208,7 @@ # polkit new (bnc#523377) -%{libexec_dirs}/polkit-1/polkit-agent-helper-1 root:root 4755 +/usr/libexec/polkit-1/polkit-agent-helper-1 root:root 4755 /usr/bin/pkexec root:root 4755 # dbus-1 (#333361 #1056764, bsc#1171164) @@ -218,15 +218,15 @@ /usr/bin/newrole root:root 0755 # VirtualBox (#429725, bsc#1120650) -%{libexec_dirs}/virtualbox/VirtualBoxVM root:vboxusers 0750 -%{libexec_dirs}/virtualbox/VBoxHeadless root:vboxusers 0755 -%{libexec_dirs}/virtualbox/VBoxSDL root:vboxusers 0755 +/usr/lib/virtualbox/VirtualBoxVM root:vboxusers 0750 +/usr/lib/virtualbox/VBoxHeadless root:vboxusers 0755 +/usr/lib/virtualbox/VBoxSDL root:vboxusers 0755 # (bnc#533550) -%{libexec_dirs}/virtualbox/VBoxNetAdpCtl root:vboxusers 0755 +/usr/lib/virtualbox/VBoxNetAdpCtl root:vboxusers 0755 # bnc#669055 -%{libexec_dirs}/virtualbox/VBoxNetDHCP root:vboxusers 0755 +/usr/lib/virtualbox/VBoxNetDHCP root:vboxusers 0755 # bsc#1033425 -%{libexec_dirs}/virtualbox/VBoxNetNAT root:vboxusers 0755 +/usr/lib/virtualbox/VBoxNetNAT root:vboxusers 0755 # open-vm-tools (bnc#474285) @@ -237,10 +237,9 @@ # hawk (bnc#665045) /usr/sbin/hawk_chkpwd root:haclient 4750 -/usr/sbin/hawk_invoke root:haclient 4750 # ecryptfs-utils (bnc#740110) -%{sbin_dirs}/mount.ecryptfs_private root:root 0755 +/usr/sbin/mount.ecryptfs_private root:root 0755 # wireshark (bsc#957624) /usr/bin/dumpcap root:wireshark 0750 @@ -314,7 +313,7 @@ /usr/bin/firejail root:firejail 04750 # authbind (bsc#1111251) -%{libexec_dirs}/authbind/helper root:root 04755 +/usr/libexec/authbind/helper root:root 04755 # fuse3 (bsc#1111230) /usr/bin/fusermount3 root:trusted 04750 @@ -329,9 +328,11 @@ # ksysguard network helper (bsc#1151190) %{lib_dirs}/libexec/ksysguard/ksgrd_network_helper root:root 0755 +capabilities cap_net_raw=ep +/usr/libexec/ksysguard/ksgrd_network_helper root:root 0755 + +capabilities cap_net_raw=ep # mariadb auth_pam_tool (bsc#1160285) -%{lib_libexec_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root 4755 +%{lib_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root 4755 # Workload Memory Protection (bsc#1161335) %{libexec_dirs}/sapwmp/sapwmp-capture root:sapsys 4750 @@ -343,7 +344,7 @@ /usr/libexec/cockpit-session root:cockpit-wsinstance 4750 # binary that launches texlive tools with group "mktex" (bsc#1171686) -%{libexec_dirs}/mktex/public root:mktex 2755 +/usr/libexec/mktex/public root:mktex 2755 # enlightenment privileged desktop operations (bsc#1169238) %{lib_dirs}/enlightenment/utils/enlightenment_system root:root 4755