Hello community, here is the log from the commit of package permissions for openSUSE:Factory checked in at 2017-12-06 08:48:11 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/permissions (Old) and /work/SRC/openSUSE:Factory/.permissions.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "permissions" Wed Dec 6 08:48:11 2017 rev:113 rq:548532 version:20171129 Changes: -------- --- /work/SRC/openSUSE:Factory/permissions/permissions.changes 2017-11-11 14:14:52.633599236 +0100 +++ /work/SRC/openSUSE:Factory/.permissions.new/permissions.changes 2017-12-06 08:48:13.799738878 +0100 @@ -1,0 +2,31 @@ +Mon Dec 4 18:45:53 UTC 2017 - ku...@suse.com + +- fillup is required for post, not pre installation + +------------------------------------------------------------------- +Thu Nov 30 08:24:44 UTC 2017 - mplus...@suse.com + +- Cleanup spec file with spec-cleaner +- Drop conditions/definitions related to old distros + +------------------------------------------------------------------- +Wed Nov 29 17:02:20 UTC 2017 - astie...@suse.com + +- Update to version 20171129: + * permissions: adding gvfs (bsc#1065864) + * Allow setgid incingacmd on directory /run/icinga2/cmd bsc#1069410 + * Allow fping cap_net_raw (bsc#1047921) + +------------------------------------------------------------------- +Thu Nov 23 13:41:09 UTC 2017 - rbr...@suse.com + +- Replace references to /var/adm/fillup-templates with new + %_fillupdir macro (boo#1069468) + +------------------------------------------------------------------- +Tue Nov 21 14:03:29 UTC 2017 - krah...@suse.com + +- Update to version 20171121: + * - permissions: adding kwayland (bsc#1062182) + +------------------------------------------------------------------- Old: ---- permissions-20171106.tar.xz New: ---- permissions-20171129.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ permissions.spec ++++++ --- /var/tmp/diff_new_pack.zHN1Sq/_old 2017-12-06 08:48:14.443715301 +0100 +++ /var/tmp/diff_new_pack.zHN1Sq/_new 2017-12-06 08:48:14.443715301 +0100 @@ -14,65 +14,51 @@ # Please submit bugfixes or comments via http://bugs.opensuse.org/ # -# icecream 0 -BuildRequires: libcap-devel - Name: permissions -Version: 20171106 +Version: 20171129 Release: 0 -Provides: aaa_base:/etc/permissions -PreReq: %fillup_prereq Summary: SUSE Linux Default Permissions # Maintained in github by the security team. License: GPL-2.0+ Group: Productivity/Security -%if 0%{?suse_version} >= 1330 -Requires(pre): group(trusted) -#!BuildIgnore: group(trusted) -%endif -Source: permissions-%{version}.tar.xz -BuildRoot: %{_tmppath}/%{name}-%{version}-build Url: http://github.com/openSUSE/permissions +Source: permissions-%{version}.tar.xz +BuildRequires: libcap-devel +#!BuildIgnore: group(trusted) +Requires(post): %fillup_prereq +Requires(pre): group(trusted) +Provides: aaa_base:%{_sysconfdir}/permissions %description -Permission settings of files and directories depending on the -local security settings. The local security setting (easy, secure, -or paranoid) can be configured in /etc/sysconfig/security. - - -Authors: --------- - Werner Fink - Roman Drahtmüller - Michael Schröder - Ludwig Nussel +Permission settings of files and directories depending on the local +security settings. The local security setting (easy, secure, or paranoid) +can be configured in /etc/sysconfig/security. %prep %setup -q %build -make %{?_smp_mflags} CFLAGS="-W -Wall $RPM_OPT_FLAGS" FSCAPS_DEFAULT_ENABLED=0 +make %{?_smp_mflags} CFLAGS="-W -Wall %{optflags}" FSCAPS_DEFAULT_ENABLED=0 %install -make DESTDIR="$RPM_BUILD_ROOT" install +%make_install fillupdir=%{_fillupdir} %post %{fillup_only -n security} # apply all potentially changed permissions -/usr/bin/chkstat --system +%{_bindir}/chkstat --system %files -%defattr(-,root,root,-) -%config /etc/permissions -%config /etc/permissions.easy -%config /etc/permissions.secure -%config /etc/permissions.paranoid -%config(noreplace) /etc/permissions.local +%config %{_sysconfdir}/permissions +%config %{_sysconfdir}/permissions.easy +%config %{_sysconfdir}/permissions.secure +%config %{_sysconfdir}/permissions.paranoid +%config(noreplace) %{_sysconfdir}/permissions.local %{_bindir}/chkstat -%{_mandir}/man5/permissions.5* -%{_mandir}/man8/chkstat.8* -/var/adm/fillup-templates/sysconfig.security +%{_mandir}/man5/permissions.5%{ext_man} +%{_mandir}/man8/chkstat.8%{ext_man} +%{_fillupdir}/sysconfig.security %changelog ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.zHN1Sq/_old 2017-12-06 08:48:14.487713690 +0100 +++ /var/tmp/diff_new_pack.zHN1Sq/_new 2017-12-06 08:48:14.491713543 +0100 @@ -1,4 +1,4 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/openSUSE/permissions.git</param> - <param name="changesrevision">73fce42f13a75d8e1a572f366bcebd7a8a0ecbeb</param></service></servicedata> \ No newline at end of file + <param name="changesrevision">37fe496b66d03043da61fc1af7cd51f21d4e2000</param></service></servicedata> \ No newline at end of file ++++++ permissions-20171106.tar.xz -> permissions-20171129.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20171106/permissions.easy new/permissions-20171129/permissions.easy --- old/permissions-20171106/permissions.easy 2017-11-06 16:55:37.000000000 +0100 +++ new/permissions-20171129/permissions.easy 2017-11-29 18:02:04.000000000 +0100 @@ -410,3 +410,19 @@ # newgidmap / newuidmap (bsc#979282, bsc#1048645) /usr/bin/newgidmap root:shadow 4755 /usr/bin/newuidmap root:shadow 4755 + +# kwayland (bsc#1062182) +/usr/bin/kwin_wayland root:root 0755 + +capabilities cap_sys_nice=ep + +# gvfs (bsc#1065864) +/usr/lib/gvfs/gvfsd-nfs root:root 0755 + +capabilities cap_net_bind_service=ep + +# incinga2 (bsc#1069410) +/run/incinga2/cmd icinga:icingagmd 2750 + +# fping (bsc#1047921) +/usr/sbin/fping root:root 0755 + +capabilities cap_net_raw=ep + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20171106/permissions.paranoid new/permissions-20171129/permissions.paranoid --- old/permissions-20171106/permissions.paranoid 2017-11-06 16:55:37.000000000 +0100 +++ new/permissions-20171129/permissions.paranoid 2017-11-29 18:02:04.000000000 +0100 @@ -424,3 +424,13 @@ # newgidmap / newuidmap (bsc#979282, bsc#1048645) /usr/bin/newgidmap root:shadow 4755 /usr/bin/newuidmap root:shadow 4755 + +# kwayland (bsc#1062182) +/usr/bin/kwin_wayland root:root 0755 + +# gvfs (bsc#1065864) +/usr/lib/gvfs/gvfsd-nfs root:root 0755 + +# incinga2 (bsc#1069410) +/run/incinga2/cmd icinga:icingagmd 0750 + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/permissions-20171106/permissions.secure new/permissions-20171129/permissions.secure --- old/permissions-20171106/permissions.secure 2017-11-06 16:55:37.000000000 +0100 +++ new/permissions-20171129/permissions.secure 2017-11-29 18:02:04.000000000 +0100 @@ -447,3 +447,18 @@ # newgidmap / newuidmap (bsc#979282, bsc#1048645) /usr/bin/newgidmap root:shadow 4755 /usr/bin/newuidmap root:shadow 4755 + +# kwayland (bsc#1062182) +/usr/bin/kwin_wayland root:root 0755 + +capabilities cap_sys_nice=ep + +# gvfs (bsc#1065864) +/usr/lib/gvfs/gvfsd-nfs root:root 0755 + +# incinga2 (bsc#1069410) +/run/incinga2/cmd icinga:icingagmd 2750 + +# fping (bsc#1047921) +/usr/sbin/fping root:root 0755 + +capabilities cap_net_raw=ep +