Hello community, here is the log from the commit of package accountsservice for openSUSE:Factory checked in at 2018-06-19 11:53:54 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/accountsservice (Old) and /work/SRC/openSUSE:Factory/.accountsservice.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "accountsservice" Tue Jun 19 11:53:54 2018 rev:58 rq:617169 version:0.6.49 Changes: -------- --- /work/SRC/openSUSE:Factory/accountsservice/accountsservice.changes 2018-03-14 19:23:13.546893883 +0100 +++ /work/SRC/openSUSE:Factory/.accountsservice.new/accountsservice.changes 2018-06-19 11:54:04.687385415 +0200 @@ -1,0 +2,46 @@ +Wed Jun 13 06:00:22 UTC 2018 - fezh...@suse.com + +- Add accountsservice-missing-users-on-gdm-login.patch: Don't abort + loading users when an /etc/shadow entry found missing + (boo#1090003 fdo#106904). + +------------------------------------------------------------------- +Sun May 13 23:59:22 UTC 2018 - luc1...@linuxmail.org + +- Update to version 0.6.49: + + Fix crash on startup from previous compiler warning fix. +- Changes from version 0.6.48: + + Fix crashes when adding admin user and when user is removed. + + Performance improvements handling really large wtmp files. +- Changes from version 0.6.47: + + Fix problem where libaccountsservice users weren't getting + property change updates. + + Reduce memory usage of cached users in daemon process. + + Drop premature user-added/user-removed signals that erroneously + get emitted before ListCachedUsers call finishes. + +------------------------------------------------------------------- +Fri Apr 6 02:43:51 UTC 2018 - luc1...@linuxmail.org + +- Update to version 0.6.46: + + Fix systemd unit file to use default standard output; + + Performance improvements; + + Leak fixes; + + Crash fixes; + + Support extra groups for admin users; + + Add policy that allows admins to allow users to change their + own password; + + Introspection fixes; + + Elogind support; + + Decruftification of username blacklist; + + Updated translations. +- Add: + + gio-2.0 and gio-unix-2.0 pkgconfig modules BuildRequires to + avoid implicit dependencies. + + xmlto and xsltproc BuildRequires to enable documentation. +- Drop remove-no-longer-used-system-accounts.patch: fixed upstream. +- Rebase patches: + + accountsservice-sysconfig.patch and + + accountsservice-filter-suse-accounts.patch. + +------------------------------------------------------------------- Old: ---- accountsservice-0.6.45.tar.xz remove-no-longer-used-system-accounts.patch New: ---- accountsservice-0.6.49.tar.xz accountsservice-missing-users-on-gdm-login.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ accountsservice.spec ++++++ --- /var/tmp/diff_new_pack.MiTaSa/_old 2018-06-19 11:54:05.603351408 +0200 +++ /var/tmp/diff_new_pack.MiTaSa/_new 2018-06-19 11:54:05.603351408 +0200 @@ -17,30 +17,37 @@ Name: accountsservice -Version: 0.6.45 +Version: 0.6.49 Release: 0 Summary: D-Bus Service to Manipulate User Account Information License: GPL-3.0-or-later Group: System/Daemons URL: http://www.freedesktop.org/wiki/Software/AccountsService/ Source: http://www.freedesktop.org/software/accountsservice/%{name}-%{version}.tar.xz + # WARNING: do not remove/significantly change patch0 without updating the relevant patch in gdm too # PATCH-FIX-OPENSUSE accountsservice-sysconfig.patch bnc#688071 vu...@opensuse.org -- Read/write autologin configuration from sysconfig, like gdm (see gdm-sysconfig-settings.patch) Patch0: accountsservice-sysconfig.patch # PATCH-FIX-OPENSUSE accountsservice-filter-suse-accounts.patch vu...@opensuse.org -- Filter out some system users that are specific to openSUSE Patch1: accountsservice-filter-suse-accounts.patch +# PATCH-FIX-UPSTREAM accountsservice-missing-users-on-gdm-login.patch boo#1090003 fdo#106904 fezh...@suse.com -- Don't abort loading users when an /etc/shadow entry found missing +Patch2: accountsservice-missing-users-on-gdm-login.patch +## SLE-only patches start at 1000 # PATCH-FEATURE-SLE as-fate318433-prevent-same-account-multi-logins.patch fate#318433 cxi...@suse.com -- prevent multiple simultaneous login. -Patch2: as-fate318433-prevent-same-account-multi-logins.patch -# PATCH-FIX-UPSTREAM remove-no-longer-used-system-accounts.patch bsc#1063794 fdo#103879 qzh...@suse.com -- drop operator, nobody4 and noaccess from the blacklist. -Patch3: remove-no-longer-used-system-accounts.patch +Patch1000: as-fate318433-prevent-same-account-multi-logins.patch # needed for patch0 + BuildRequires: gnome-common -BuildRequires: gobject-introspection-devel +BuildRequires: gobject-introspection-devel >= 0.40.0 BuildRequires: intltool BuildRequires: pkgconfig # needed for patch0 BuildRequires: vala -BuildRequires: pkgconfig(glib-2.0) +BuildRequires: xmlto +BuildRequires: xsltproc +BuildRequires: pkgconfig(gio-2.0) >= 2.37.3 +BuildRequires: pkgconfig(gio-unix-2.0) +BuildRequires: pkgconfig(glib-2.0) >= 2.44 BuildRequires: pkgconfig(libsystemd) >= 186 BuildRequires: pkgconfig(polkit-gobject-1) BuildRequires: pkgconfig(systemd) @@ -93,9 +100,10 @@ %setup -q %patch0 -p1 %patch1 -p1 -%patch3 -p1 -%if !0%{?is_opensuse} %patch2 -p1 +# Sle-only patches start at 1000 +%if !0%{?is_opensuse} +%patch1000 -p1 %endif %build @@ -128,7 +136,7 @@ %files %license COPYING -%doc AUTHORS NEWS README +%doc NEWS README %{_unitdir}/accounts-daemon.service %{_sysconfdir}/dbus-1/system.d/org.freedesktop.Accounts.conf %{_libexecdir}/accounts-daemon @@ -148,6 +156,7 @@ %{_libdir}/girepository-1.0/AccountsService-1.0.typelib %files devel +%doc AUTHORS TODO %doc %{_datadir}/gtk-doc/html/lib%{name}/ %{_libdir}/*.so %{_libdir}/pkgconfig/accountsservice.pc ++++++ accountsservice-0.6.45.tar.xz -> accountsservice-0.6.49.tar.xz ++++++ ++++ 13715 lines of diff (skipped) ++++++ accountsservice-filter-suse-accounts.patch ++++++ --- /var/tmp/diff_new_pack.MiTaSa/_old 2018-06-19 11:54:05.863341754 +0200 +++ /var/tmp/diff_new_pack.MiTaSa/_new 2018-06-19 11:54:05.863341754 +0200 @@ -2,7 +2,7 @@ =================================================================== --- accountsservice-0.6.37.orig/src/user-classify.c +++ accountsservice-0.6.37/src/user-classify.c -@@ -53,7 +53,13 @@ static const char *default_excludes[] = +@@ -51,7 +51,13 @@ static const char *default_excludes[] = "man", "at", "gdm", ++++++ accountsservice-missing-users-on-gdm-login.patch ++++++ >From c9503bcb40c21da08b7938279117d68ec37ac1f1 Mon Sep 17 00:00:00 2001 From: Felix Zhang <fezh...@suse.com> Date: Wed, 13 Jun 2018 11:05:52 +0800 Subject: [PATCH] daemon: don't abort loading users even if missing shadow entries Some system accounts, e.g. sshd have no entries in /etc/shadow because they are created prior to /etc/shadow and have no passwords. Right now load_entries aborts iterating through /etc/passwd entries if it fails to find the corresponding /etc/shadow entry, ignoring all the users behind it, making those users missing from the gdm login screen user list. https://bugs.freedesktop.org/show_bug.cgi?id=106904 --- src/daemon.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/daemon.c b/src/daemon.c index e711a46..2851ed6 100644 --- a/src/daemon.c +++ b/src/daemon.c @@ -235,8 +235,8 @@ entry_generator_fgetpwent (Daemon *daemon, if (shadow_entry_buffers != NULL) { *spent = &shadow_entry_buffers->spbuf; - return pwent; } + return pwent; } } -- 2.13.7 ++++++ accountsservice-sysconfig.patch ++++++ --- /var/tmp/diff_new_pack.MiTaSa/_old 2018-06-19 11:54:05.879341161 +0200 +++ /var/tmp/diff_new_pack.MiTaSa/_new 2018-06-19 11:54:05.883341012 +0200 @@ -21,7 +21,7 @@ =================================================================== --- accountsservice-0.6.37.orig/src/daemon.c +++ accountsservice-0.6.37/src/daemon.c -@@ -44,6 +44,7 @@ +@@ -47,6 +47,7 @@ #include "wtmp-helper.h" #include "daemon.h" #include "util.h" @@ -29,16 +29,16 @@ #define PATH_PASSWD "/etc/passwd" #define PATH_SHADOW "/etc/shadow" -@@ -376,7 +377,7 @@ reload_autologin_timeout (Daemon *daemon +@@ -560,7 +561,7 @@ reload_autologin_timeout (Daemon *daemon daemon->priv->autologin_id = 0; if (!load_autologin (daemon, &name, &enabled, &error)) { - g_debug ("failed to load gdms custom.conf: %s", error->message); + g_debug ("failed to load autologin config: %s", error->message); - g_error_free (error); - g_free (name); + return FALSE; + } -@@ -1272,6 +1273,43 @@ daemon_local_check_auth (Daemon +@@ -1434,6 +1435,43 @@ daemon_local_check_auth (Daemon g_object_unref (subject); } @@ -82,17 +82,17 @@ gboolean load_autologin (Daemon *daemon, gchar **name, -@@ -1282,6 +1320,8 @@ load_autologin (Daemon *daemon, - GError *local_error; - gchar *string; +@@ -1444,6 +1482,8 @@ load_autologin (Daemon *daemon, + GError *local_error = NULL; + g_autofree gchar *string = NULL; + return load_autologin_suse (daemon, name, enabled, error); + keyfile = g_key_file_new (); if (!g_key_file_load_from_file (keyfile, PATH_GDM_CUSTOM, -@@ -1329,6 +1369,8 @@ save_autologin (Daemon *daemon, - gchar *data; +@@ -1483,6 +1523,8 @@ save_autologin (Daemon *daemon, + g_autofree gchar *data = NULL; gboolean result; + return save_autologin_suse (daemon, name, enabled, error);