Hello community,

here is the log from the commit of package systemd for openSUSE:Factory checked 
in at 2017-02-21 13:33:13
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/systemd (Old)
 and      /work/SRC/openSUSE:Factory/.systemd.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "systemd"

Changes:
--------
--- /work/SRC/openSUSE:Factory/systemd/systemd-mini.changes     2017-02-11 
01:24:35.405436364 +0100
+++ /work/SRC/openSUSE:Factory/.systemd.new/systemd-mini.changes        
2017-02-21 13:33:16.512811439 +0100
@@ -1,0 +2,51 @@
+Mon Feb 20 10:53:11 UTC 2017 - f...@suse.com
+
+- Don't ship systemd-resolved for now (bsc#1024897)
+
+  If resolved is enabled , systemd-tmpfiles creates a wrong symlink in
+  /etc/resolv.conf which confuses the network manager actually used.
+
+-------------------------------------------------------------------
+Thu Feb  9 14:06:46 UTC 2017 - f...@suse.com
+
+- More indentation cleanup (no functional changes)
+
+-------------------------------------------------------------------
+Wed Feb  8 08:45:09 CET 2017 - ku...@suse.de
+
+- Remove obsolete insserv requirements for udev again [bsc#999841]
+
+-------------------------------------------------------------------
+Mon Feb  6 14:13:00 UTC 2017 - f...@suse.com
+
+- Import commit cd97d5d5fef79ab9d957bf6504d085c0faca6bfc
+
+  e587b6ce0 disable RestrictAddressFamilies on all architectures but x86_64 
one (bsc#1023460)
+  c8ae05632 journald: don't flush to /var/log/journal before we get asked to 
(bsc#1004094)
+  7261eaf3e sd-event: fix sd_event_source_get_priority() (#4712)
+
+-------------------------------------------------------------------
+Fri Feb  3 08:37:22 UTC 2017 - f...@suse.com
+
+- Move fix for permission set on /var/lib/systemd/linger/* (no functional 
changes)
+
+  Move that part after the fix on timer timestamp files otherwise the
+  comment doesn't make sense.
+
+-------------------------------------------------------------------
+Wed Feb  1 15:06:06 UTC 2017 - f...@suse.com
+
+- Import commit 028fd9b60580976dffb09b3576a2b652ee35137c
+
+  cc2ca55ff build-sys: do not install ctrl-alt-del.target symlink twice
+  ececae77a device: Avoid calling unit_free(NULL) in device setup logic (#4748)
+
+-------------------------------------------------------------------
+Wed Feb  1 14:32:28 UTC 2017 - f...@suse.com
+
+- Ship systemd-resolved but it's disabled by default (bsc#1018387)
+
+  The NSS plugin will also be disabled, users need to enable it
+  manually.
+
+-------------------------------------------------------------------
systemd.changes: same change

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ systemd-mini.spec ++++++
--- /var/tmp/diff_new_pack.290t6b/_old  2017-02-21 13:33:17.436681110 +0100
+++ /var/tmp/diff_new_pack.290t6b/_new  2017-02-21 13:33:17.436681110 +0100
@@ -230,7 +230,6 @@
 Requires(pre):  /usr/bin/getent
 Requires(post): sed
 Requires(post): /usr/bin/systemctl
-Requires(postun): %insserv_prereq
 
 Requires(post): coreutils
 Requires(postun): coreutils
@@ -399,9 +398,6 @@
 
 %prep
 %setup -q -n systemd-%{version}
-echo "Checking whether upstream rpm macros changed..."
-#skipped for now
-#[ -z "`diff -Naru "%{S:10}" src/core/macros.systemd.in`" ] || exit 1
 
 # only needed for bootstrap
 %if 0%{?bootstrap}
@@ -706,11 +702,6 @@
 *)        rm -f %{_prefix}/lib/systemd/system/tmp.mount
 esac
 
-# Same for user lingering created by logind.
-for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do
-        chmod 0644 $username
-done
-
 # v228 wrongly set world writable suid root permissions on timestamp
 # files used by permanent timers. Fix the timestamps that might have
 # been created by the affected versions of systemd (bsc#1020601).
@@ -718,6 +709,11 @@
         chmod 0644 $stamp
 done
 
+# Same for user lingering created by logind.
+for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do
+        chmod 0644 $username
+done
+
 # Convert /var/lib/machines subvolume to make it suitable for
 # rollbacks, if needed. See bsc#992573. The installer has been fixed
 # to create it at installation time.
@@ -797,7 +793,6 @@
 
 %postun -n udev%{?mini}
 %regenerate_initrd_post
-%insserv_cleanup
 systemctl daemon-reload || :
 # On package update: the restart of the socket units will probably
 # fail as the daemon is most likely running. It's not really an issue
@@ -1002,7 +997,6 @@
 %dir %{_sysconfdir}/systemd/system
 %dir %{_sysconfdir}/systemd/user
 %dir %{_sysconfdir}/xdg/systemd
-%{_sysconfdir}/systemd/system/ctrl-alt-del.target
 %{_sysconfdir}/xdg/systemd/user
 %{_sysconfdir}/X11/xinit/xinitrc.d/50-systemd-user.sh
 

++++++ systemd.spec ++++++
--- /var/tmp/diff_new_pack.290t6b/_old  2017-02-21 13:33:17.464677161 +0100
+++ /var/tmp/diff_new_pack.290t6b/_new  2017-02-21 13:33:17.468676597 +0100
@@ -228,7 +228,6 @@
 Requires(pre):  /usr/bin/getent
 Requires(post): sed
 Requires(post): /usr/bin/systemctl
-Requires(postun): %insserv_prereq
 
 Requires(post): coreutils
 Requires(postun): coreutils
@@ -397,9 +396,6 @@
 
 %prep
 %setup -q -n systemd-%{version}
-echo "Checking whether upstream rpm macros changed..."
-#skipped for now
-#[ -z "`diff -Naru "%{S:10}" src/core/macros.systemd.in`" ] || exit 1
 
 # only needed for bootstrap
 %if 0%{?bootstrap}
@@ -704,11 +700,6 @@
 *)        rm -f %{_prefix}/lib/systemd/system/tmp.mount
 esac
 
-# Same for user lingering created by logind.
-for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do
-        chmod 0644 $username
-done
-
 # v228 wrongly set world writable suid root permissions on timestamp
 # files used by permanent timers. Fix the timestamps that might have
 # been created by the affected versions of systemd (bsc#1020601).
@@ -716,6 +707,11 @@
         chmod 0644 $stamp
 done
 
+# Same for user lingering created by logind.
+for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do
+        chmod 0644 $username
+done
+
 # Convert /var/lib/machines subvolume to make it suitable for
 # rollbacks, if needed. See bsc#992573. The installer has been fixed
 # to create it at installation time.
@@ -795,7 +791,6 @@
 
 %postun -n udev%{?mini}
 %regenerate_initrd_post
-%insserv_cleanup
 systemctl daemon-reload || :
 # On package update: the restart of the socket units will probably
 # fail as the daemon is most likely running. It's not really an issue
@@ -1000,7 +995,6 @@
 %dir %{_sysconfdir}/systemd/system
 %dir %{_sysconfdir}/systemd/user
 %dir %{_sysconfdir}/xdg/systemd
-%{_sysconfdir}/systemd/system/ctrl-alt-del.target
 %{_sysconfdir}/xdg/systemd/user
 %{_sysconfdir}/X11/xinit/xinitrc.d/50-systemd-user.sh
 

++++++ systemd-232.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/Makefile.am new/systemd-232/Makefile.am
--- old/systemd-232/Makefile.am 2017-01-25 15:27:21.000000000 +0100
+++ new/systemd-232/Makefile.am 2017-02-06 15:11:10.000000000 +0100
@@ -639,7 +639,6 @@
        units/halt-local.service.in
 
 GENERAL_ALIASES += \
-       $(systemunitdir)/reboot.target 
$(pkgsysconfdir)/system/ctrl-alt-del.target \
        $(systemunitdir)/machines.target 
$(pkgsysconfdir)/system/multi-user.target.wants/machines.target
 
 dist_doc_DATA = \
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/core/device.c 
new/systemd-232/src/core/device.c
--- old/systemd-232/src/core/device.c   2017-01-25 15:27:21.000000000 +0100
+++ new/systemd-232/src/core/device.c   2017-02-06 15:11:10.000000000 +0100
@@ -403,7 +403,7 @@
 fail:
         log_unit_warning_errno(u, r, "Failed to set up device unit: %m");
 
-        if (delete)
+        if (delete && u)
                 unit_free(u);
 
         return r;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/core/execute.c 
new/systemd-232/src/core/execute.c
--- old/systemd-232/src/core/execute.c  2017-01-25 15:27:21.000000000 +0100
+++ new/systemd-232/src/core/execute.c  2017-02-06 15:11:10.000000000 +0100
@@ -1329,7 +1329,11 @@
         Iterator i;
         int r;
 
-#if defined(__i386__)
+#if !defined(__x86_64__)
+        /* Temporarly disable RestrictAddressFamilies on all
+         * architectures but x86_64. This is currently broken but
+         * should be fixed once v233 will be released.
+         * See issue #4575 and bsc#1023460 for details. */
         return 0;
 #endif
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/journal/journald-server.c 
new/systemd-232/src/journal/journald-server.c
--- old/systemd-232/src/journal/journald-server.c       2017-01-25 
15:27:21.000000000 +0100
+++ new/systemd-232/src/journal/journald-server.c       2017-02-06 
15:11:10.000000000 +0100
@@ -283,17 +283,16 @@
 }
 
 static bool flushed_flag_is_set(void) {
-        return (access("/run/systemd/journal/flushed", F_OK) >= 0);
+        return access("/run/systemd/journal/flushed", F_OK) >= 0;
 }
 
 static int system_journal_open(Server *s, bool flush_requested) {
-        bool flushed = false;
         const char *fn;
         int r = 0;
 
         if (!s->system_journal &&
-            (s->storage == STORAGE_PERSISTENT || s->storage == STORAGE_AUTO) &&
-            (flush_requested || (flushed = flushed_flag_is_set()))) {
+            IN_SET(s->storage, STORAGE_PERSISTENT, STORAGE_AUTO) &&
+            (flush_requested || flushed_flag_is_set())) {
 
                 /* If in auto mode: first try to create the machine
                  * path, but not the prefix.
@@ -326,8 +325,8 @@
                  * Perform an implicit flush to var, leaving the runtime
                  * journal closed, now that the system journal is back.
                  */
-                if (s->runtime_journal && flushed)
-                        (void) server_flush_to_var(s);
+                if (!flush_requested)
+                        (void) server_flush_to_var(s, true);
         }
 
         if (!s->runtime_journal &&
@@ -1183,7 +1182,7 @@
         dispatch_message_real(s, iovec, n, m, ucred, tv, label, label_len, 
unit_id, priority, object_pid);
 }
 
-int server_flush_to_var(Server *s) {
+int server_flush_to_var(Server *s, bool require_flag_file) {
         sd_id128_t machine;
         sd_journal *j = NULL;
         char ts[FORMAT_TIMESPAN_MAX];
@@ -1193,13 +1192,15 @@
 
         assert(s);
 
-        if (s->storage != STORAGE_AUTO &&
-            s->storage != STORAGE_PERSISTENT)
+        if (!IN_SET(s->storage, STORAGE_AUTO, STORAGE_PERSISTENT))
                 return 0;
 
         if (!s->runtime_journal)
                 return 0;
 
+        if (require_flag_file && !flushed_flag_is_set())
+                return 0;
+
         (void) system_journal_open(s, true);
 
         if (!s->system_journal)
@@ -1411,7 +1412,7 @@
 
         log_info("Received request to flush runtime journal from PID " 
PID_FMT, si->ssi_pid);
 
-        (void) server_flush_to_var(s);
+        (void) server_flush_to_var(s, false);
         server_sync(s);
         server_vacuum(s, false);
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/journal/journald-server.h 
new/systemd-232/src/journal/journald-server.h
--- old/systemd-232/src/journal/journald-server.h       2017-01-25 
15:27:21.000000000 +0100
+++ new/systemd-232/src/journal/journald-server.h       2017-02-06 
15:11:10.000000000 +0100
@@ -197,7 +197,7 @@
 int server_vacuum(Server *s, bool verbose);
 void server_rotate(Server *s);
 int server_schedule_sync(Server *s, int priority);
-int server_flush_to_var(Server *s);
+int server_flush_to_var(Server *s, bool require_flag_file);
 void server_maybe_append_tags(Server *s);
 int server_process_datagram(sd_event_source *es, int fd, uint32_t revents, 
void *userdata);
 void server_space_usage_message(Server *s, JournalStorage *storage);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/journal/journald.c 
new/systemd-232/src/journal/journald.c
--- old/systemd-232/src/journal/journald.c      2017-01-25 15:27:21.000000000 
+0100
+++ new/systemd-232/src/journal/journald.c      2017-02-06 15:11:10.000000000 
+0100
@@ -52,7 +52,7 @@
                 goto finish;
 
         server_vacuum(&server, false);
-        server_flush_to_var(&server);
+        server_flush_to_var(&server, true);
         server_flush_dev_kmsg(&server);
 
         log_debug("systemd-journald running as pid "PID_FMT, getpid());
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/libsystemd/sd-event/sd-event.c 
new/systemd-232/src/libsystemd/sd-event/sd-event.c
--- old/systemd-232/src/libsystemd/sd-event/sd-event.c  2017-01-25 
15:27:21.000000000 +0100
+++ new/systemd-232/src/libsystemd/sd-event/sd-event.c  2017-02-06 
15:11:10.000000000 +0100
@@ -1539,7 +1539,8 @@
         assert_return(s, -EINVAL);
         assert_return(!event_pid_changed(s->event), -ECHILD);
 
-        return s->priority;
+        *priority = s->priority;
+        return 0;
 }
 
 _public_ int sd_event_source_set_priority(sd_event_source *s, int64_t 
priority) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/systemd-232/src/libsystemd/sd-event/test-event.c 
new/systemd-232/src/libsystemd/sd-event/test-event.c
--- old/systemd-232/src/libsystemd/sd-event/test-event.c        2017-01-25 
15:27:21.000000000 +0100
+++ new/systemd-232/src/libsystemd/sd-event/test-event.c        2017-02-06 
15:11:10.000000000 +0100
@@ -172,6 +172,7 @@
         static const char ch = 'x';
         int a[2] = { -1, -1 }, b[2] = { -1, -1}, d[2] = { -1, -1}, k[2] = { 
-1, -1 };
         uint64_t event_now;
+        int64_t priority;
 
         assert_se(pipe(a) >= 0);
         assert_se(pipe(b) >= 0);
@@ -209,6 +210,8 @@
         assert_se(sd_event_add_exit(e, &q, exit_handler, INT_TO_PTR('g')) >= 
0);
 
         assert_se(sd_event_source_set_priority(x, 99) >= 0);
+        assert_se(sd_event_source_get_priority(x, &priority) >= 0);
+        assert_se(priority == 99);
         assert_se(sd_event_source_set_enabled(y, SD_EVENT_ONESHOT) >= 0);
         assert_se(sd_event_source_set_prepare(x, prepare_handler) >= 0);
         assert_se(sd_event_source_set_priority(z, 50) >= 0);

++++++ systemd-mini-rpmlintrc ++++++
--- /var/tmp/diff_new_pack.290t6b/_old  2017-02-21 13:33:20.864197599 +0100
+++ /var/tmp/diff_new_pack.290t6b/_new  2017-02-21 13:33:20.864197599 +0100
@@ -19,6 +19,7 @@
 addFilter("nss-systemd.*shlib-policy-name-error.*")
 addFilter("nss-myhostname.*shlib-policy-name-error.*")
 addFilter("nss-mymachines.*shlib-policy-name-error.*")
+addFilter("nss-resolve.*shlib-policy-name-error.*")
 addFilter("systemd-logger.*useless-provides sysvinit(syslog).*")
 
addFilter("devel-file-in-non-devel-package.*/usr/share/pkgconfig/(udev|systemd)\.pc.*")
 addFilter(".*script-without-shebang.*/usr/lib/udev/rule_generator.functions.*")

++++++ systemd-rpmlintrc ++++++
--- /var/tmp/diff_new_pack.290t6b/_old  2017-02-21 13:33:20.888194214 +0100
+++ /var/tmp/diff_new_pack.290t6b/_new  2017-02-21 13:33:20.888194214 +0100
@@ -19,6 +19,7 @@
 addFilter("nss-systemd.*shlib-policy-name-error.*")
 addFilter("nss-myhostname.*shlib-policy-name-error.*")
 addFilter("nss-mymachines.*shlib-policy-name-error.*")
+addFilter("nss-resolve.*shlib-policy-name-error.*")
 addFilter("systemd-logger.*useless-provides sysvinit(syslog).*")
 
addFilter("devel-file-in-non-devel-package.*/usr/share/pkgconfig/(udev|systemd)\.pc.*")
 addFilter(".*script-without-shebang.*/usr/lib/udev/rule_generator.functions.*")


Reply via email to