Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package permissions for openSUSE:Factory 
checked in at 2021-09-06 15:57:50
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/permissions (Old)
 and      /work/SRC/openSUSE:Factory/.permissions.new.1899 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "permissions"

Mon Sep  6 15:57:50 2021 rev:149 rq:915438 version:unknown

Changes:
--------
--- /work/SRC/openSUSE:Factory/permissions/permissions.changes  2021-05-21 
21:49:48.230286200 +0200
+++ /work/SRC/openSUSE:Factory/.permissions.new.1899/permissions.changes        
2021-09-06 15:57:51.957297476 +0200
@@ -1,0 +2,16 @@
+Wed Sep 01 07:33:41 UTC 2021 - matthias.gerst...@suse.com
+
+- Update to version 20210901:
+  * libksysguard5: Updated path for ksgrd_network_helper
+  * kdesu: Updated path for kdesud
+  * sbin_dirs cleanup: these binaries have already been moved to /usr/sbin
+  * mariadb: revert auth_pam_tool to /usr/lib{,64} again
+  * cleanup: revert virtualbox back to plain /usr/lib
+  * cleanup: remove deprecated /etc/ssh/sshd_config
+  * hawk_invoke is not part of newer hawk2 packages anymore
+  * cleanup: texlive-filesystem: public now resides in libexec
+  * cleanup: authbind: helper now resides in libexec
+  * cleanup: polkit: the agent now also resides in libexec
+  * libexec cleanup: 'inn' news binaries now reside in libexec
+
+-------------------------------------------------------------------

Old:
----
  permissions-20210518.tar.xz

New:
----
  permissions-20210901.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ permissions.spec ++++++
--- /var/tmp/diff_new_pack.HQgjTd/_old  2021-09-06 15:57:52.797297283 +0200
+++ /var/tmp/diff_new_pack.HQgjTd/_new  2021-09-06 15:57:52.801297282 +0200
@@ -16,7 +16,7 @@
 #
 
 
-%define VERSION_DATE 20210518
+%define VERSION_DATE 20210901
 
 Name:           permissions
 Version:        %{VERSION_DATE}.%{suse_version}

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.HQgjTd/_old  2021-09-06 15:57:52.845297272 +0200
+++ /var/tmp/diff_new_pack.HQgjTd/_new  2021-09-06 15:57:52.845297272 +0200
@@ -1,4 +1,4 @@
 <servicedata>
 <service name="tar_scm">
             <param 
name="url">https://github.com/openSUSE/permissions.git</param>
-          <param 
name="changesrevision">85e23aea644b52c8ef2ec21881b9acbac7606747</param></service></servicedata>
\ No newline at end of file
+          <param 
name="changesrevision">cda0681b1cf15a3ecc3e0b08dab7105192860b47</param></service></servicedata>
\ No newline at end of file

++++++ permissions-20210518.tar.xz -> permissions-20210901.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/permissions-20210518/profiles/permissions.easy 
new/permissions-20210901/profiles/permissions.easy
--- old/permissions-20210518/profiles/permissions.easy  2021-05-18 
13:15:47.000000000 +0200
+++ new/permissions-20210901/profiles/permissions.easy  2021-09-01 
09:24:09.000000000 +0200
@@ -23,7 +23,6 @@
 /etc/ftpusers                                           root:root          644
 /var/lib/nfs/rmtab                                      root:root          644
 /etc/syslog.conf                                        root:root          644
-/etc/ssh/sshd_config                                    root:root          640
 /etc/cron.d/                                            root:root          755
 /etc/cron.daily/                                        root:root          755
 /etc/cron.hourly/                                       root:root          755
@@ -54,8 +53,8 @@
 /usr/bin/fusermount                                     root:trusted      4755
 # needs setuid root when using shadow via NIS:
 # #216816
-%{sbin_dirs}/unix_chkpwd                                root:shadow       4755
-%{sbin_dirs}/unix2_chkpwd                               root:shadow       4755
+/usr/sbin/unix_chkpwd                                   root:shadow       4755
+/usr/sbin/unix2_chkpwd                                  root:shadow       4755
 
 # squid changes from bnc#891268
 # - adjusted paths in bsc#1171569
@@ -123,6 +122,7 @@
 
 # kdesud (bsc#872276)
 %{lib_dirs}/libexec/kf5/kdesud                          root:nogroup      2755
+/usr/libexec/kf5/kdesud                                 root:nogroup      2755
 
 #
 # amanda
@@ -145,9 +145,9 @@
 # anyone else, therefore the strange permissions 4554 are required
 # for operation. (#67032, #594393)
 #
-%{libexec_dirs}/news/bin/rnews                          news:uucp         4550
-%{libexec_dirs}/news/bin/inews                          news:news         2555
-%{libexec_dirs}/news/bin/innbind                        root:news         4550
+/usr/libexec/news/bin/rnews                             news:uucp         4550
+/usr/libexec/news/bin/inews                             news:news         2555
+/usr/libexec/news/bin/innbind                           root:news         4550
 
 #
 # sendfax
@@ -167,7 +167,7 @@
 /usr/libexec/uucp/uuxqt                                 uucp:uucp         6555
 
 # polkit new (bnc#523377)
-%{libexec_dirs}/polkit-1/polkit-agent-helper-1          root:root         4755
+/usr/libexec/polkit-1/polkit-agent-helper-1             root:root         4755
 /usr/bin/pkexec                                         root:root         4755
 
 # dbus-1 (#333361, #1056764, bsc#1171164)
@@ -177,15 +177,15 @@
 /usr/bin/newrole                                        root:root         4755
 
 # VirtualBox (#429725, bsc#1120650)
-%{libexec_dirs}/virtualbox/VirtualBoxVM                 root:vboxusers    4750
-%{libexec_dirs}/virtualbox/VBoxHeadless                 root:vboxusers    4750
-%{libexec_dirs}/virtualbox/VBoxSDL                      root:vboxusers    4750
+/usr/lib/virtualbox/VirtualBoxVM                        root:vboxusers    4750
+/usr/lib/virtualbox/VBoxHeadless                        root:vboxusers    4750
+/usr/lib/virtualbox/VBoxSDL                             root:vboxusers    4750
 # (bnc#533550)
-%{libexec_dirs}/virtualbox/VBoxNetAdpCtl                root:vboxusers    4750
+/usr/lib/virtualbox/VBoxNetAdpCtl                       root:vboxusers    4750
 # bnc#669055
-%{libexec_dirs}/virtualbox/VBoxNetDHCP                  root:vboxusers    4750
+/usr/lib/virtualbox/VBoxNetDHCP                         root:vboxusers    4750
 # bsc#1033425
-%{libexec_dirs}/virtualbox/VBoxNetNAT                   root:vboxusers    4750
+/usr/lib/virtualbox/VBoxNetNAT                          root:vboxusers    4750
 
 # open-vm-tools (bnc#474285)
 /usr/bin/vmware-user-suid-wrapper                      root:root         4755
@@ -195,10 +195,9 @@
 
 # hawk (bnc#665045)
 /usr/sbin/hawk_chkpwd                                   root:haclient     4750
-/usr/sbin/hawk_invoke                                   root:haclient     4750
 
 # ecryptfs-utils (bnc#740110)
-%{sbin_dirs}/mount.ecryptfs_private                     root:root         4755
+/usr/sbin/mount.ecryptfs_private                        root:root         4755
 
 # wireshark (bsc#957624)
 /usr/bin/dumpcap                                       root:wireshark    0750
@@ -275,7 +274,7 @@
 /usr/bin/firejail                                       root:firejail   04750
 
 # authbind (bsc#1111251)
-%{libexec_dirs}/authbind/helper                         root:root       04755
+/usr/libexec/authbind/helper                            root:root       04755
 
 # fuse3 (bsc#1111230)
 /usr/bin/fusermount3                                    root:trusted    04755
@@ -290,9 +289,11 @@
 # ksysguard network helper (bsc#1151190)
 %{lib_dirs}/libexec/ksysguard/ksgrd_network_helper      root:root       0755
  +capabilities cap_net_raw=ep
+/usr/libexec/ksysguard/ksgrd_network_helper             root:root       0755
+ +capabilities cap_net_raw=ep
 
 # mariadb auth_pam_tool (bsc#1160285)
-%{lib_libexec_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root     
    4755
+%{lib_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root      4755
 
 # Workload Memory Protection (bsc#1161335)
 %{libexec_dirs}/sapwmp/sapwmp-capture                   root:sapsys    4750
@@ -304,7 +305,7 @@
 /usr/libexec/cockpit-session                            
root:cockpit-wsinstance  4750
 
 # binary that launches texlive tools with group "mktex" (bsc#1171686)
-%{libexec_dirs}/mktex/public                            root:mktex 2755
+/usr/libexec/mktex/public                               root:mktex 2755
 
 # enlightenment privileged desktop operations (bsc#1169238)
 %{lib_dirs}/enlightenment/utils/enlightenment_system     root:root  4755
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/permissions-20210518/profiles/permissions.paranoid 
new/permissions-20210901/profiles/permissions.paranoid
--- old/permissions-20210518/profiles/permissions.paranoid      2021-05-18 
13:15:47.000000000 +0200
+++ new/permissions-20210901/profiles/permissions.paranoid      2021-09-01 
09:24:09.000000000 +0200
@@ -40,7 +40,6 @@
 /etc/ftpusers                                           root:root          600
 /var/lib/nfs/rmtab                                      root:root          600
 /etc/syslog.conf                                        root:root          600
-/etc/ssh/sshd_config                                    root:root          600
 /etc/cron.d/                                            root:root          700
 /etc/cron.daily/                                        root:root          700
 /etc/cron.hourly/                                       root:root          700
@@ -72,8 +71,8 @@
 /usr/bin/fusermount                                     root:trusted      0755
 # needs setuid root when using shadow via NIS:
 # #216816
-%{sbin_dirs}/unix_chkpwd                                root:shadow       0755
-%{sbin_dirs}/unix2_chkpwd                               root:shadow       0755
+/usr/sbin/unix_chkpwd                                   root:shadow       0755
+/usr/sbin/unix2_chkpwd                                  root:shadow       0755
 
 # squid changes from bnc#891268
 # - adjusted paths in bsc#1171569
@@ -137,6 +136,7 @@
 
 # kdesud (bsc#872276)
 %{lib_dirs}/libexec/kf5/kdesud                          root:nogroup      0755
+/usr/libexec/kf5/kdesud                                 root:nogroup      0755
 
 #
 # amanda
@@ -159,9 +159,9 @@
 # anyone else, therefore the strange permissions 4554 are required
 # for operation. (#67032, #594393)
 #
-%{libexec_dirs}/news/bin/rnews                          news:uucp         0555
-%{libexec_dirs}/news/bin/inews                          news:news         0555
-%{libexec_dirs}/news/bin/innbind                        root:news         0555
+/usr/libexec/news/bin/rnews                             news:uucp         0555
+/usr/libexec/news/bin/inews                             news:news         0555
+/usr/libexec/news/bin/innbind                           root:news         0555
 
 #
 # sendfax
@@ -181,7 +181,7 @@
 /usr/libexec/uucp/uuxqt                                 uucp:uucp         0555
 
 # polkit new (bnc#523377)
-%{libexec_dirs}/polkit-1/polkit-agent-helper-1          root:root         0755
+/usr/libexec/polkit-1/polkit-agent-helper-1             root:root         0755
 /usr/bin/pkexec                                         root:root         0755
 
 # dbus-1 (#333361, #1056764, bsc#1171164)
@@ -191,15 +191,15 @@
 /usr/bin/newrole                                        root:root         0755
 
 # VirtualBox (#429725, bsc#1120650)
-%{libexec_dirs}/virtualbox/VirtualBoxVM                 root:vboxusers    0750
-%{libexec_dirs}/virtualbox/VBoxHeadless                 root:vboxusers    0755
-%{libexec_dirs}/virtualbox/VBoxSDL                      root:vboxusers    0755
+/usr/lib/virtualbox/VirtualBoxVM                        root:vboxusers    0750
+/usr/lib/virtualbox/VBoxHeadless                        root:vboxusers    0755
+/usr/lib/virtualbox/VBoxSDL                             root:vboxusers    0755
 # (bnc#533550)
-%{libexec_dirs}/virtualbox/VBoxNetAdpCtl                root:vboxusers    0755
+/usr/lib/virtualbox/VBoxNetAdpCtl                       root:vboxusers    0755
 # bnc#669055
-%{libexec_dirs}/virtualbox/VBoxNetDHCP                  root:vboxusers    0755
+/usr/lib/virtualbox/VBoxNetDHCP                         root:vboxusers    0755
 # bsc#1033425
-%{libexec_dirs}/virtualbox/VBoxNetNAT                   root:vboxusers    0755
+/usr/lib/virtualbox/VBoxNetNAT                          root:vboxusers    0755
 
 
 # open-vm-tools (bnc#474285)
@@ -210,10 +210,9 @@
 
 # hawk (bnc#665045)
 /usr/sbin/hawk_chkpwd                                   root:haclient     0755
-/usr/sbin/hawk_invoke                                   root:haclient     0755
 
 # ecryptfs-utils (bnc#740110)
-%{sbin_dirs}/mount.ecryptfs_private                     root:root         0755
+/usr/sbin/mount.ecryptfs_private                        root:root         0755
 
 # wireshark (bsc#957624)
 /usr/bin/dumpcap                                       root:root         0755
@@ -285,7 +284,7 @@
 /usr/bin/firejail                                       root:firejail   0750
 
 # authbind (bsc#1111251)
-%{libexec_dirs}/authbind/helper                         root:root       0755
+/usr/libexec/authbind/helper                            root:root       0755
 
 # fuse3 (bsc#1111230)
 /usr/bin/fusermount3                                    root:trusted    0755
@@ -298,9 +297,10 @@
 
 # ksysguard network helper (bsc#1151190)
 %{lib_dirs}/libexec/ksysguard/ksgrd_network_helper      root:root       0755
+/usr/libexec/ksysguard/ksgrd_network_helper             root:root       0755
 
 # mariadb auth_pam_tool (bsc#1160285)
-%{lib_libexec_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool       
root:root         0755
+%{lib_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root      0755
 
 # Workload Memory Protection (bsc#1161335)
 %{libexec_dirs}/sapwmp/sapwmp-capture                   root:sapsys    0750
@@ -312,7 +312,7 @@
 /usr/libexec/cockpit-session                            
root:cockpit-wsinstance  0750
 
 # binary that launches texlive tools with group "mktex" (bsc#1171686)
-%{libexec_dirs}/mktex/public                            root:mktex 0755
+/usr/libexec/mktex/public                               root:mktex 0755
 
 # enlightenment privileged desktop operations (bsc#1169238)
 %{lib_dirs}/enlightenment/utils/enlightenment_system     root:root  0755
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/permissions-20210518/profiles/permissions.secure 
new/permissions-20210901/profiles/permissions.secure
--- old/permissions-20210518/profiles/permissions.secure        2021-05-18 
13:15:47.000000000 +0200
+++ new/permissions-20210901/profiles/permissions.secure        2021-09-01 
09:24:09.000000000 +0200
@@ -62,7 +62,6 @@
 /etc/ftpusers                                           root:root          644
 /var/lib/nfs/rmtab                                      root:root          644
 /etc/syslog.conf                                        root:root          600
-/etc/ssh/sshd_config                                    root:root          600
 # we might want to tighten that up in the future in this profile (remove the
 # ability for others to read/enter)
 /etc/cron.d/                                            root:root          755
@@ -96,8 +95,8 @@
 /usr/bin/fusermount                                     root:trusted      4750
 # needs setuid root when using shadow via NIS:
 # #216816
-%{sbin_dirs}/unix_chkpwd                                root:shadow       4755
-%{sbin_dirs}/unix2_chkpwd                               root:shadow       4755
+/usr/sbin/unix_chkpwd                                   root:shadow       4755
+/usr/sbin/unix2_chkpwd                                  root:shadow       4755
 
 # squid changes from bnc#891268
 # - adjusted paths in bsc#1171569
@@ -163,6 +162,7 @@
 
 # kdesud (bsc#872276)
 %{lib_dirs}/libexec/kf5/kdesud                          root:nogroup      2755
+/usr/libexec/kf5/kdesud                                 root:nogroup      2755
 
 #
 # amanda
@@ -185,9 +185,9 @@
 # anyone else, therefore the strange permissions 4554 are required
 # for operation. (#67032, #594393)
 #
-%{libexec_dirs}/news/bin/rnews                          news:uucp         4550
-%{libexec_dirs}/news/bin/inews                          news:news         2555
-%{libexec_dirs}/news/bin/innbind                        root:news         4550
+/usr/libexec/news/bin/rnews                             news:uucp         4550
+/usr/libexec/news/bin/inews                             news:news         2555
+/usr/libexec/news/bin/innbind                           root:news         4550
 
 #
 # sendfax
@@ -208,7 +208,7 @@
 
 
 # polkit new (bnc#523377)
-%{libexec_dirs}/polkit-1/polkit-agent-helper-1          root:root         4755
+/usr/libexec/polkit-1/polkit-agent-helper-1             root:root         4755
 /usr/bin/pkexec                                         root:root         4755
 
 # dbus-1 (#333361 #1056764, bsc#1171164)
@@ -218,15 +218,15 @@
 /usr/bin/newrole                                        root:root         0755
 
 # VirtualBox (#429725, bsc#1120650)
-%{libexec_dirs}/virtualbox/VirtualBoxVM                 root:vboxusers    0750
-%{libexec_dirs}/virtualbox/VBoxHeadless                 root:vboxusers    0755
-%{libexec_dirs}/virtualbox/VBoxSDL                      root:vboxusers    0755
+/usr/lib/virtualbox/VirtualBoxVM                        root:vboxusers    0750
+/usr/lib/virtualbox/VBoxHeadless                        root:vboxusers    0755
+/usr/lib/virtualbox/VBoxSDL                             root:vboxusers    0755
 # (bnc#533550)
-%{libexec_dirs}/virtualbox/VBoxNetAdpCtl                root:vboxusers    0755
+/usr/lib/virtualbox/VBoxNetAdpCtl                       root:vboxusers    0755
 # bnc#669055
-%{libexec_dirs}/virtualbox/VBoxNetDHCP                  root:vboxusers    0755
+/usr/lib/virtualbox/VBoxNetDHCP                         root:vboxusers    0755
 # bsc#1033425
-%{libexec_dirs}/virtualbox/VBoxNetNAT                   root:vboxusers    0755
+/usr/lib/virtualbox/VBoxNetNAT                          root:vboxusers    0755
 
 
 # open-vm-tools (bnc#474285)
@@ -237,10 +237,9 @@
 
 # hawk (bnc#665045)
 /usr/sbin/hawk_chkpwd                                   root:haclient     4750
-/usr/sbin/hawk_invoke                                   root:haclient     4750
 
 # ecryptfs-utils (bnc#740110)
-%{sbin_dirs}/mount.ecryptfs_private                     root:root         0755
+/usr/sbin/mount.ecryptfs_private                        root:root         0755
 
 # wireshark (bsc#957624)
 /usr/bin/dumpcap                                       root:wireshark    0750
@@ -314,7 +313,7 @@
 /usr/bin/firejail                                       root:firejail   04750
 
 # authbind (bsc#1111251)
-%{libexec_dirs}/authbind/helper                         root:root       04755
+/usr/libexec/authbind/helper                            root:root       04755
 
 # fuse3 (bsc#1111230)
 /usr/bin/fusermount3                                    root:trusted    04750
@@ -329,9 +328,11 @@
 # ksysguard network helper (bsc#1151190)
 %{lib_dirs}/libexec/ksysguard/ksgrd_network_helper      root:root       0755
  +capabilities cap_net_raw=ep
+/usr/libexec/ksysguard/ksgrd_network_helper             root:root       0755
+ +capabilities cap_net_raw=ep
 
 # mariadb auth_pam_tool (bsc#1160285)
-%{lib_libexec_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool       
root:root         4755
+%{lib_dirs}/mysql/plugin/auth_pam_tool_dir/auth_pam_tool root:root      4755
 
 # Workload Memory Protection (bsc#1161335)
 %{libexec_dirs}/sapwmp/sapwmp-capture                   root:sapsys    4750
@@ -343,7 +344,7 @@
 /usr/libexec/cockpit-session                            
root:cockpit-wsinstance  4750
 
 # binary that launches texlive tools with group "mktex" (bsc#1171686)
-%{libexec_dirs}/mktex/public                            root:mktex 2755
+/usr/libexec/mktex/public                               root:mktex 2755
 
 # enlightenment privileged desktop operations (bsc#1169238)
 %{lib_dirs}/enlightenment/utils/enlightenment_system     root:root  4755

Reply via email to