Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package accountsservice for openSUSE:Factory checked in at 2022-06-24 08:45:05 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/accountsservice (Old) and /work/SRC/openSUSE:Factory/.accountsservice.new.1548 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "accountsservice" Fri Jun 24 08:45:05 2022 rev:80 rq:984690 version:22.08.8 Changes: -------- --- /work/SRC/openSUSE:Factory/accountsservice/accountsservice.changes 2022-03-28 18:01:01.445261794 +0200 +++ /work/SRC/openSUSE:Factory/.accountsservice.new.1548/accountsservice.changes 2022-06-24 08:45:16.523136814 +0200 @@ -1,0 +2,36 @@ +Sat Apr 30 20:16:58 UTC 2022 - Ferdinand Thiessen <r...@fthiessen.de> + +- Update to version 22.08.8 + + Handle missing admin groups when changing account types + + Set PrivateTmp to false in the systemd service + + Add function to set user password expiration policy +- Update to version 22.04.62 + + Updated Swedish translation + + Updated Indonesian translation + + Updated German translation + + Updated slovak translation + + Update Ukrainian translation + + Updated Brazilian Portuguese translation + + act-user: Use stronger hashing methods in make_crypted() if available. + + act-user-manager: Watch for the daemon going away and coming back + + user-manager: Update users tables on username changes + + user: Translate property x-session property name to match the proxy one + + Check GDBusMessage for INTERACTIVE_AUTHORIZATION flag + + daemon: Fix error check in save_autologin() + + Never delete the root filesystem when removing users + + Remove user heuristics + + user-classify: Add git to username blacklist + + daemon: ensure cache files for system users are processed + + daemon: Don't try to add admin users to non existing groups + + Move D-Bus conf file to $(datadir)/dbus-1/system.d +- Rebased patches: + + accountsservice-sysconfig.patch + + accountsservice-filter-suse-accounts.patch + + as-fate318433-prevent-same-account-multi-logins.patch +- Drop upstream fixed patches: + + ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch + + accountsservice-fix-gdm-crash.patch + + accountsservice-read-root-user-cache.patch + + accountsservice-wtmp-io-improvements.patch + +------------------------------------------------------------------- Old: ---- ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch accountsservice-0.6.55.tar.xz accountsservice-fix-gdm-crash.patch accountsservice-read-root-user-cache.patch accountsservice-wtmp-io-improvements.patch New: ---- accountsservice-22.08.8.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ accountsservice.spec ++++++ --- /var/tmp/diff_new_pack.eJpAb1/_old 2022-06-24 08:45:17.031137383 +0200 +++ /var/tmp/diff_new_pack.eJpAb1/_new 2022-06-24 08:45:17.035137387 +0200 @@ -18,7 +18,7 @@ #!BuildIgnore: rpmlint-mini Name: accountsservice -Version: 0.6.55 +Version: 22.08.8 Release: 0 Summary: D-Bus Service to Manipulate User Account Information License: GPL-3.0-or-later @@ -31,16 +31,8 @@ Patch0: accountsservice-sysconfig.patch # PATCH-FIX-OPENSUSE accountsservice-filter-suse-accounts.patch vu...@opensuse.org -- Filter out some system users that are specific to openSUSE Patch1: accountsservice-filter-suse-accounts.patch -# PATCH-FIX-UPSTREAM accountsservice-read-root-user-cache.patch bsc#1114292 glfo#accountsservice/accountsservice#65 xw...@suse.com-- read root user cache file WAS PATCH-FIX-UPSTREAM -Patch2: accountsservice-read-root-user-cache.patch -# PATCH-FIX-UPSTREAM accountsservice-wtmp-io-improvements.patch boo#1139487 fezh...@suse.com -- Backports that improve wtmp io performance. -Patch3: accountsservice-wtmp-io-improvements.patch -# PATCH-FIX-UPSTREAM accountsservice-fix-gdm-crash.patch glfo#accountsservice/accountsservice#55 antoine.belv...@opensuse.org -- Prevent gdm crash upon service restart when autologin is enabled -Patch4: accountsservice-fix-gdm-crash.patch # PATCH-FIX-OPENSUSE harden_accounts-daemon.service.patch jseg...@suse.com -- For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort -Patch5: harden_accounts-daemon.service.patch -# PATCH-FIX-UPSTREAM ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch -- Fix build with meson 0.61.0 -Patch6: https://gitlab.freedesktop.org/accountsservice/accountsservice/-/commit/ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch +Patch2: harden_accounts-daemon.service.patch ## SLE and Leap only patches start at 1000 # PATCH-FEATURE-SLE as-fate318433-prevent-same-account-multi-logins.patch fate#318433 cxi...@suse.com -- prevent multiple simultaneous login. @@ -49,10 +41,11 @@ BuildRequires: gtk-doc BuildRequires: meson BuildRequires: pkgconfig +BuildRequires: vala BuildRequires: pkgconfig(dbus-1) -BuildRequires: pkgconfig(gio-2.0) >= 2.37.3 +BuildRequires: pkgconfig(gio-2.0) >= 2.63.5 BuildRequires: pkgconfig(gio-unix-2.0) -BuildRequires: pkgconfig(glib-2.0) >= 2.44 +BuildRequires: pkgconfig(glib-2.0) >= 2.63.5 BuildRequires: pkgconfig(gobject-introspection-1.0) BuildRequires: pkgconfig(libsystemd) >= 186 BuildRequires: pkgconfig(polkit-gobject-1) @@ -99,6 +92,18 @@ The accountsservice server provides a set of D-Bus interfaces for querying and manipulating user account information. +%package vala +Summary: Vala bindings for accountsservice +Group: Development/Libraries/C and C++ +Requires: libaccountsservice0 = %{version} +Requires: typelib-1_0-AccountsService-1_0 = %{version} + +%description vala +The accountsservice server provides a set of D-Bus interfaces for +querying and manipulating user account information. + +This package contains the Vala bindings for accountservice. + %lang_package %prep @@ -106,10 +111,6 @@ %patch0 -p1 %patch1 -p1 %patch2 -p1 -%patch3 -p1 -%patch4 -p1 -%patch5 -p1 -%patch6 -p1 # SLE and Leap patches start at 1000 %if 0%{?sle_version} @@ -118,7 +119,6 @@ %build %meson \ - -Dsystemd=true \ -Dintrospection=true \ -Dgtk_doc=true \ %{nil} @@ -145,14 +145,17 @@ %files %license COPYING -%doc NEWS README.md +%doc README.md %{_unitdir}/accounts-daemon.service -%{_sysconfdir}/dbus-1/system.d/org.freedesktop.Accounts.conf %{_libexecdir}/accounts-daemon +%{_datadir}/dbus-1/system.d/org.freedesktop.Accounts.conf %{_datadir}/dbus-1/interfaces/org.freedesktop.Accounts.xml %{_datadir}/dbus-1/interfaces/org.freedesktop.Accounts.User.xml %{_datadir}/dbus-1/system-services/org.freedesktop.Accounts.service %{_datadir}/polkit-1/actions/org.freedesktop.accounts.policy +# User templates +%dir %{_datadir}/accountsservice +%{_datadir}/accountsservice/user-templates # Directories where the server stores user data %dir %{_localstatedir}/lib/AccountsService %dir %{_localstatedir}/lib/AccountsService/users @@ -172,6 +175,11 @@ %{_includedir}/accountsservice-1.0/ %{_datadir}/gir-1.0/AccountsService-1.0.gir +%files vala +%dir %{_datadir}/vala/vapi +%{_datadir}/vala/vapi/accountsservice.deps +%{_datadir}/vala/vapi/accountsservice.vapi + %files lang -f accounts-service.lang %changelog ++++++ accountsservice-0.6.55.tar.xz -> accountsservice-22.08.8.tar.xz ++++++ ++++ 7452 lines of diff (skipped) ++++++ accountsservice-filter-suse-accounts.patch ++++++ --- /var/tmp/diff_new_pack.eJpAb1/_old 2022-06-24 08:45:17.227137603 +0200 +++ /var/tmp/diff_new_pack.eJpAb1/_new 2022-06-24 08:45:17.231137607 +0200 @@ -1,13 +1,12 @@ -Index: accountsservice-0.6.37/src/user-classify.c -=================================================================== ---- accountsservice-0.6.37.orig/src/user-classify.c -+++ accountsservice-0.6.37/src/user-classify.c -@@ -51,7 +51,13 @@ static const char *default_excludes[] = - "man", +diff -Nur accountsservice-22.08.8/src/user-classify.c new/src/user-classify.c +--- accountsservice-22.08.8/src/user-classify.c 2022-02-23 16:27:48.000000000 +0100 ++++ new/src/user-classify.c 2022-04-30 22:33:44.148344188 +0200 +@@ -52,7 +52,13 @@ "at", "gdm", -- "gnome-initial-setup" -+ "gnome-initial-setup", + "gnome-initial-setup", +- "git" ++ "git", + "beagleindex", + "fax", + "suse-ncc", ++++++ accountsservice-sysconfig.patch ++++++ --- /var/tmp/diff_new_pack.eJpAb1/_old 2022-06-24 08:45:17.247137625 +0200 +++ /var/tmp/diff_new_pack.eJpAb1/_new 2022-06-24 08:45:17.251137629 +0200 @@ -4,19 +4,19 @@ Use autologin configuration from sysconfig (SUSE-ism) -Index: accountsservice-0.6.55/src/daemon.c -=================================================================== ---- accountsservice-0.6.55.orig/src/daemon.c 2019-04-23 17:16:09.000000000 +0200 -+++ accountsservice-0.6.55/src/daemon.c 2019-05-30 00:12:49.993056439 +0200 -@@ -47,6 +47,7 @@ - #include "wtmp-helper.h" - #include "daemon.h" + +diff -Nur accountsservice-22.08.8/src/daemon.c new/src/daemon.c +--- accountsservice-22.08.8/src/daemon.c 2022-02-23 16:27:48.000000000 +0100 ++++ new/src/daemon.c 2022-04-30 22:23:22.228315678 +0200 +@@ -50,6 +50,7 @@ #include "util.h" + #include "user.h" + #include "accounts-user-generated.h" +#include "gdm-sysconfig.h" #define PATH_PASSWD "/etc/passwd" #define PATH_SHADOW "/etc/shadow" -@@ -582,7 +583,7 @@ reload_autologin_timeout (Daemon *daemon +@@ -581,7 +582,7 @@ priv->autologin_id = 0; if (!load_autologin (daemon, &name, &enabled, &error)) { @@ -25,7 +25,7 @@ return FALSE; } -@@ -1474,6 +1475,43 @@ daemon_local_check_auth (Daemon +@@ -1508,6 +1509,43 @@ g_object_unref (subject); } @@ -69,7 +69,7 @@ gboolean load_autologin (Daemon *daemon, gchar **name, -@@ -1484,6 +1522,8 @@ load_autologin (Daemon *daemon, +@@ -1518,6 +1556,8 @@ GError *local_error = NULL; g_autofree gchar *string = NULL; @@ -78,19 +78,18 @@ keyfile = g_key_file_new (); if (!g_key_file_load_from_file (keyfile, PATH_GDM_CUSTOM, -@@ -1523,6 +1563,8 @@ save_autologin (Daemon *daemon, - g_autofree gchar *data = NULL; +@@ -1558,6 +1598,8 @@ gboolean result; + g_autoptr(GError) local_error = NULL; + return save_autologin_suse (daemon, name, enabled, error); + keyfile = g_key_file_new (); if (!g_key_file_load_from_file (keyfile, PATH_GDM_CUSTOM, -Index: accountsservice-0.6.55/src/gdm-sysconfig.c -=================================================================== ---- /dev/null 1970-01-01 00:00:00.000000000 +0000 -+++ accountsservice-0.6.55/src/gdm-sysconfig.c 2019-05-30 00:12:49.993056439 +0200 +diff -Nur accountsservice-22.08.8/src/gdm-sysconfig.c new/src/gdm-sysconfig.c +--- accountsservice-22.08.8/src/gdm-sysconfig.c 1970-01-01 01:00:00.000000000 +0100 ++++ new/src/gdm-sysconfig.c 2022-04-30 22:22:54.876314424 +0200 @@ -0,0 +1,484 @@ +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 8 -*- + * @@ -576,10 +575,9 @@ + g_strfreev (lines); + return result; +} -Index: accountsservice-0.6.55/src/gdm-sysconfig.h -=================================================================== ---- /dev/null 1970-01-01 00:00:00.000000000 +0000 -+++ accountsservice-0.6.55/src/gdm-sysconfig.h 2019-05-30 00:12:49.993056439 +0200 +diff -Nur accountsservice-22.08.8/src/gdm-sysconfig.h new/src/gdm-sysconfig.h +--- accountsservice-22.08.8/src/gdm-sysconfig.h 1970-01-01 01:00:00.000000000 +0100 ++++ new/src/gdm-sysconfig.h 2022-04-30 22:22:54.876314424 +0200 @@ -0,0 +1,43 @@ +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 8 -*- + * @@ -624,11 +622,10 @@ +G_END_DECLS + +#endif /* __GDM_SYSCONFIG_H */ -Index: accountsservice-0.6.55/src/meson.build -=================================================================== ---- accountsservice-0.6.55.orig/src/meson.build 2019-04-23 17:16:09.000000000 +0200 -+++ accountsservice-0.6.55/src/meson.build 2019-05-30 00:12:49.993056439 +0200 -@@ -46,6 +46,8 @@ libaccounts_generated_dep = declare_depe +diff -Nur accountsservice-22.08.8/src/meson.build new/src/meson.build +--- accountsservice-22.08.8/src/meson.build 2022-02-23 16:27:48.000000000 +0100 ++++ new/src/meson.build 2022-04-30 22:22:54.876314424 +0200 +@@ -48,6 +48,8 @@ ) sources = files( ++++++ as-fate318433-prevent-same-account-multi-logins.patch ++++++ --- /var/tmp/diff_new_pack.eJpAb1/_old 2022-06-24 08:45:17.271137651 +0200 +++ /var/tmp/diff_new_pack.eJpAb1/_new 2022-06-24 08:45:17.275137656 +0200 @@ -1,36 +1,7 @@ -Index: b/src/libaccountsservice/act-user-manager.c -=================================================================== ---- a/src/libaccountsservice/act-user-manager.c 2019-09-11 17:40:53.726949739 +0800 -+++ b/src/libaccountsservice/act-user-manager.c 2019-09-11 17:41:00.547007450 +0800 -@@ -1752,12 +1752,22 @@ maybe_add_new_session (ActUserManagerNew - if (new_session->x11_display == NULL) { - g_debug ("AcUserManager: (mostly) ignoring session '%s' since it's not graphical", - new_session->id); -- is_ours = FALSE; -+ /* SLE: ignore non-graphical session completely */ -+ /* see `act_user_is_logged_in_anywhere` */ -+ unload_new_session (new_session); -+ return; - } else if (session_is_login_window (manager, new_session->id)) { - new_session->state = ACT_USER_MANAGER_NEW_SESSION_STATE_LOADED; - unload_new_session (new_session); - return; - } else if (!session_is_on_our_seat (manager, new_session->id)) { -+ /** -+ * NOTE: if `manager->priv->seat.id` or `new_session->id` is -+ * either NULL, it's not on our seat: this is reasonable, as -+ * non-seat session is not switchable and thus no need to be -+ * ours. However, this nondiscrimination for all non-seated -+ * sessions is possibly a source for bugs. -+ */ - is_ours = FALSE; - } - -Index: b/src/libaccountsservice/act-user.c -=================================================================== ---- a/src/libaccountsservice/act-user.c 2019-09-11 17:40:53.726949739 +0800 -+++ b/src/libaccountsservice/act-user.c 2019-09-11 17:41:00.547007450 +0800 -@@ -868,6 +868,8 @@ act_user_is_logged_in (ActUser *user) +diff -Nur accountsservice-22.08.8/src/libaccountsservice/act-user.c new/src/libaccountsservice/act-user.c +--- accountsservice-22.08.8/src/libaccountsservice/act-user.c 2022-02-23 16:27:48.000000000 +0100 ++++ new/src/libaccountsservice/act-user.c 2022-04-30 22:34:42.160346848 +0200 +@@ -878,6 +878,8 @@ * (Currently, this function is only implemented for systemd-logind. * For ConsoleKit, it is equivalent to act_user_is_logged_in.) * @@ -39,7 +10,7 @@ * Returns: %TRUE or %FALSE */ gboolean -@@ -896,6 +898,24 @@ act_user_get_saved (ActUser *user) +@@ -906,6 +908,24 @@ } /** @@ -64,11 +35,10 @@ * act_user_get_locked: * @user: a #ActUser * -Index: b/src/libaccountsservice/act-user.h -=================================================================== ---- a/src/libaccountsservice/act-user.h 2019-09-11 17:40:53.726949739 +0800 -+++ b/src/libaccountsservice/act-user.h 2019-09-11 17:41:00.547007450 +0800 -@@ -67,6 +67,7 @@ guint act_user_get_num_sessions +diff -Nur accountsservice-22.08.8/src/libaccountsservice/act-user.h new/src/libaccountsservice/act-user.h +--- accountsservice-22.08.8/src/libaccountsservice/act-user.h 2022-02-23 16:27:48.000000000 +0100 ++++ new/src/libaccountsservice/act-user.h 2022-04-30 22:34:42.164346848 +0200 +@@ -61,6 +61,7 @@ guint act_user_get_num_sessions_anywhere (ActUser *user); gboolean act_user_is_logged_in (ActUser *user); gboolean act_user_is_logged_in_anywhere (ActUser *user); @@ -76,4 +46,31 @@ int act_user_get_login_frequency (ActUser *user); gint64 act_user_get_login_time (ActUser *user); const GVariant*act_user_get_login_history (ActUser *user); +diff -Nur accountsservice-22.08.8/src/libaccountsservice/act-user-manager.c new/src/libaccountsservice/act-user-manager.c +--- accountsservice-22.08.8/src/libaccountsservice/act-user-manager.c 2022-02-23 16:27:48.000000000 +0100 ++++ new/src/libaccountsservice/act-user-manager.c 2022-04-30 22:34:42.160346848 +0200 +@@ -1366,12 +1366,22 @@ + if (new_session->x11_display == NULL) { + g_debug ("AcUserManager: (mostly) ignoring session '%s' since it's not graphical", + new_session->id); +- is_ours = FALSE; ++ /* SLE: ignore non-graphical session completely */ ++ /* see `act_user_is_logged_in_anywhere` */ ++ unload_new_session (new_session); ++ return; + } else if (session_is_login_window (manager, new_session->id)) { + new_session->state = ACT_USER_MANAGER_NEW_SESSION_STATE_LOADED; + unload_new_session (new_session); + return; + } else if (!session_is_on_our_seat (manager, new_session->id)) { ++ /** ++ * NOTE: if `manager->priv->seat.id` or `new_session->id` is ++ * either NULL, it's not on our seat: this is reasonable, as ++ * non-seat session is not switchable and thus no need to be ++ * ours. However, this nondiscrimination for all non-seated ++ * sessions is possibly a source for bugs. ++ */ + is_ours = FALSE; + } +