Hello community,

here is the log from the commit of package permissions for openSUSE:Factory 
checked in at 2017-12-06 08:48:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/permissions (Old)
 and      /work/SRC/openSUSE:Factory/.permissions.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "permissions"

Wed Dec  6 08:48:11 2017 rev:113 rq:548532 version:20171129

Changes:
--------
--- /work/SRC/openSUSE:Factory/permissions/permissions.changes  2017-11-11 
14:14:52.633599236 +0100
+++ /work/SRC/openSUSE:Factory/.permissions.new/permissions.changes     
2017-12-06 08:48:13.799738878 +0100
@@ -1,0 +2,31 @@
+Mon Dec  4 18:45:53 UTC 2017 - ku...@suse.com
+
+- fillup is required for post, not pre installation
+
+-------------------------------------------------------------------
+Thu Nov 30 08:24:44 UTC 2017 - mplus...@suse.com
+
+- Cleanup spec file with spec-cleaner
+- Drop conditions/definitions related to old distros
+
+-------------------------------------------------------------------
+Wed Nov 29 17:02:20 UTC 2017 - astie...@suse.com
+
+- Update to version 20171129:
+  * permissions: adding gvfs (bsc#1065864)
+  * Allow setgid incingacmd on directory /run/icinga2/cmd bsc#1069410
+  * Allow fping cap_net_raw (bsc#1047921)
+
+-------------------------------------------------------------------
+Thu Nov 23 13:41:09 UTC 2017 - rbr...@suse.com
+
+- Replace references to /var/adm/fillup-templates with new 
+  %_fillupdir macro (boo#1069468)
+
+-------------------------------------------------------------------
+Tue Nov 21 14:03:29 UTC 2017 - krah...@suse.com
+
+- Update to version 20171121:
+  * - permissions: adding kwayland (bsc#1062182)
+
+-------------------------------------------------------------------

Old:
----
  permissions-20171106.tar.xz

New:
----
  permissions-20171129.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ permissions.spec ++++++
--- /var/tmp/diff_new_pack.zHN1Sq/_old  2017-12-06 08:48:14.443715301 +0100
+++ /var/tmp/diff_new_pack.zHN1Sq/_new  2017-12-06 08:48:14.443715301 +0100
@@ -14,65 +14,51 @@
 
 # Please submit bugfixes or comments via http://bugs.opensuse.org/
 #
-# icecream 0
 
 
-BuildRequires:  libcap-devel
-
 Name:           permissions
-Version:        20171106
+Version:        20171129
 Release:        0
-Provides:       aaa_base:/etc/permissions
-PreReq:         %fillup_prereq
 Summary:        SUSE Linux Default Permissions
 # Maintained in github by the security team. 
 License:        GPL-2.0+
 Group:          Productivity/Security
-%if 0%{?suse_version} >= 1330
-Requires(pre):  group(trusted)
-#!BuildIgnore:  group(trusted)
-%endif
-Source:         permissions-%{version}.tar.xz
-BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 Url:            http://github.com/openSUSE/permissions
+Source:         permissions-%{version}.tar.xz
+BuildRequires:  libcap-devel
+#!BuildIgnore:  group(trusted)
+Requires(post): %fillup_prereq
+Requires(pre):  group(trusted)
+Provides:       aaa_base:%{_sysconfdir}/permissions
 
 %description
-Permission settings of files and directories depending on the
-local security settings. The local security setting (easy, secure,
-or paranoid) can be configured in /etc/sysconfig/security.
-
-
-Authors:
---------
-    Werner Fink
-    Roman Drahtmüller
-    Michael Schröder
-    Ludwig Nussel
+Permission settings of files and directories depending on the local
+security settings. The local security setting (easy, secure, or paranoid)
+can be configured in /etc/sysconfig/security.
 
 %prep
 %setup -q
 
 %build
-make %{?_smp_mflags} CFLAGS="-W -Wall $RPM_OPT_FLAGS" FSCAPS_DEFAULT_ENABLED=0
+make %{?_smp_mflags} CFLAGS="-W -Wall %{optflags}" FSCAPS_DEFAULT_ENABLED=0
 
 %install
-make DESTDIR="$RPM_BUILD_ROOT" install
+%make_install fillupdir=%{_fillupdir}
 
 %post
 %{fillup_only -n security}
 # apply all potentially changed permissions
-/usr/bin/chkstat --system
+%{_bindir}/chkstat --system
 
 %files
-%defattr(-,root,root,-)
-%config /etc/permissions
-%config /etc/permissions.easy
-%config /etc/permissions.secure
-%config /etc/permissions.paranoid
-%config(noreplace) /etc/permissions.local
+%config %{_sysconfdir}/permissions
+%config %{_sysconfdir}/permissions.easy
+%config %{_sysconfdir}/permissions.secure
+%config %{_sysconfdir}/permissions.paranoid
+%config(noreplace) %{_sysconfdir}/permissions.local
 %{_bindir}/chkstat
-%{_mandir}/man5/permissions.5*
-%{_mandir}/man8/chkstat.8*
-/var/adm/fillup-templates/sysconfig.security
+%{_mandir}/man5/permissions.5%{ext_man}
+%{_mandir}/man8/chkstat.8%{ext_man}
+%{_fillupdir}/sysconfig.security
 
 %changelog

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.zHN1Sq/_old  2017-12-06 08:48:14.487713690 +0100
+++ /var/tmp/diff_new_pack.zHN1Sq/_new  2017-12-06 08:48:14.491713543 +0100
@@ -1,4 +1,4 @@
 <servicedata>
 <service name="tar_scm">
             <param 
name="url">https://github.com/openSUSE/permissions.git</param>
-          <param 
name="changesrevision">73fce42f13a75d8e1a572f366bcebd7a8a0ecbeb</param></service></servicedata>
\ No newline at end of file
+          <param 
name="changesrevision">37fe496b66d03043da61fc1af7cd51f21d4e2000</param></service></servicedata>
\ No newline at end of file

++++++ permissions-20171106.tar.xz -> permissions-20171129.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/permissions-20171106/permissions.easy 
new/permissions-20171129/permissions.easy
--- old/permissions-20171106/permissions.easy   2017-11-06 16:55:37.000000000 
+0100
+++ new/permissions-20171129/permissions.easy   2017-11-29 18:02:04.000000000 
+0100
@@ -410,3 +410,19 @@
 # newgidmap / newuidmap (bsc#979282, bsc#1048645)
 /usr/bin/newgidmap                                     root:shadow     4755
 /usr/bin/newuidmap                                     root:shadow     4755
+
+# kwayland (bsc#1062182)
+/usr/bin/kwin_wayland                                  root:root       0755
+ +capabilities cap_sys_nice=ep
+
+# gvfs (bsc#1065864)
+/usr/lib/gvfs/gvfsd-nfs                                 root:root       0755
+ +capabilities cap_net_bind_service=ep
+
+# incinga2 (bsc#1069410)
+/run/incinga2/cmd                                      icinga:icingagmd 2750
+
+# fping (bsc#1047921)
+/usr/sbin/fping                                                root:root       
0755
+ +capabilities cap_net_raw=ep
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/permissions-20171106/permissions.paranoid 
new/permissions-20171129/permissions.paranoid
--- old/permissions-20171106/permissions.paranoid       2017-11-06 
16:55:37.000000000 +0100
+++ new/permissions-20171129/permissions.paranoid       2017-11-29 
18:02:04.000000000 +0100
@@ -424,3 +424,13 @@
 # newgidmap / newuidmap (bsc#979282, bsc#1048645)
 /usr/bin/newgidmap                                     root:shadow     4755
 /usr/bin/newuidmap                                     root:shadow     4755
+
+# kwayland (bsc#1062182)
+/usr/bin/kwin_wayland                                  root:root       0755
+
+# gvfs (bsc#1065864)
+/usr/lib/gvfs/gvfsd-nfs                                 root:root       0755
+ 
+# incinga2 (bsc#1069410)
+/run/incinga2/cmd                                      icinga:icingagmd 0750
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/permissions-20171106/permissions.secure 
new/permissions-20171129/permissions.secure
--- old/permissions-20171106/permissions.secure 2017-11-06 16:55:37.000000000 
+0100
+++ new/permissions-20171129/permissions.secure 2017-11-29 18:02:04.000000000 
+0100
@@ -447,3 +447,18 @@
 # newgidmap / newuidmap (bsc#979282, bsc#1048645)
 /usr/bin/newgidmap                                     root:shadow     4755
 /usr/bin/newuidmap                                     root:shadow     4755
+
+# kwayland (bsc#1062182)
+/usr/bin/kwin_wayland                                  root:root       0755
+ +capabilities cap_sys_nice=ep
+
+# gvfs (bsc#1065864)
+/usr/lib/gvfs/gvfsd-nfs                                 root:root       0755
+
+# incinga2 (bsc#1069410)
+/run/incinga2/cmd                                      icinga:icingagmd 2750
+
+# fping (bsc#1047921)
+/usr/sbin/fping                                                root:root       
0755
+ +capabilities cap_net_raw=ep
+


Reply via email to