Hello community, here is the log from the commit of package systemd for openSUSE:Factory checked in at 2019-11-18 19:57:26 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/systemd (Old) and /work/SRC/openSUSE:Factory/.systemd.new.26869 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "systemd" Mon Nov 18 19:57:26 2019 rev:301 rq:748032 version:243 Changes: -------- --- /work/SRC/openSUSE:Factory/systemd/systemd-mini.changes 2019-11-03 11:58:21.615434088 +0100 +++ /work/SRC/openSUSE:Factory/.systemd.new.26869/systemd-mini.changes 2019-11-18 19:57:29.573981402 +0100 @@ -1,0 +2,19 @@ +Tue Nov 12 14:15:03 UTC 2019 - Franck Bui <[email protected]> + +- Import commit 0b715187a87907e18edf98eab9d0a50fced4a424 + + 9dbdbc2f10 logind: fix (again) the race that might happen when logind restores VT (bsc#1101591 bsc#1140081) + c848bec110 libblkid: open device in nonblock mode. (bsc#1084671) + b70ad6c927 resolved: check for IP in certificate when using DoT with GnuTLS (bsc#1155539 CVE-2018-21029) + bbedf3d557 resolved: require at least version 3.6.0 of GnuTLS for DNS-over-TLS + eb732c2e29 resolved: fix connection failures with TLS 1.3 and GnuTLS + 4e45084ac5 shared/install: failing with -ELOOP can be due to the use of an alias in install_error() + 2e297f0d87 shared/install: fix error codes returned by install_context_apply() + dd29d70d32 man: alias names can't be used with enable command + +------------------------------------------------------------------- +Tue Nov 5 10:56:54 UTC 2019 - Franck Bui <[email protected]> + +- Fix %{_libexecdir} misuses of /usr/lib + +------------------------------------------------------------------- @@ -140,0 +160,6 @@ + +------------------------------------------------------------------- +Thu Sep 19 08:49:59 UTC 2019 - Martin Vidner <[email protected]> + +- Allow YaST to select Iranian (Persian, Farsi) keyboard layout + (bsc#1092920) systemd.changes: same change Old: ---- systemd-v243+suse.126.gb7467b7b55.tar.xz New: ---- systemd-v243+suse.135.g0b715187a8.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ systemd-mini.spec ++++++ --- /var/tmp/diff_new_pack.nGBIH5/_old 2019-11-18 19:57:30.565980904 +0100 +++ /var/tmp/diff_new_pack.nGBIH5/_new 2019-11-18 19:57:30.569980903 +0100 @@ -26,7 +26,7 @@ ##### WARNING: please do not edit this auto generated spec file. Use the systemd.spec! ##### %define mini -mini %define min_kernel_version 4.5 -%define suse_version +suse.126.gb7467b7b55 +%define suse_version +suse.135.g0b715187a8 %bcond_with gnuefi %if 0%{?bootstrap} @@ -1132,7 +1132,7 @@ %endif %dir %{_sysconfdir}/modules-load.d -%{_libexecdir}/modules-load.d +%{_prefix}/lib/modules-load.d %{_sysusersdir}/ %dir %{_sysconfdir}/tmpfiles.d @@ -1143,7 +1143,7 @@ %exclude %{_sysusersdir}/systemd-remote.conf %endif -%{_libexecdir}/environment.d/ +%{_prefix}/lib/environment.d/ %dir %{_binfmtdir} %dir %{_sysconfdir}/binfmt.d ++++++ systemd.spec ++++++ --- /var/tmp/diff_new_pack.nGBIH5/_old 2019-11-18 19:57:30.589980893 +0100 +++ /var/tmp/diff_new_pack.nGBIH5/_new 2019-11-18 19:57:30.589980893 +0100 @@ -24,7 +24,7 @@ %define bootstrap 0 %define mini %nil %define min_kernel_version 4.5 -%define suse_version +suse.126.gb7467b7b55 +%define suse_version +suse.135.g0b715187a8 %bcond_with gnuefi %if 0%{?bootstrap} @@ -1130,7 +1130,7 @@ %endif %dir %{_sysconfdir}/modules-load.d -%{_libexecdir}/modules-load.d +%{_prefix}/lib/modules-load.d %{_sysusersdir}/ %dir %{_sysconfdir}/tmpfiles.d @@ -1141,7 +1141,7 @@ %exclude %{_sysusersdir}/systemd-remote.conf %endif -%{_libexecdir}/environment.d/ +%{_prefix}/lib/environment.d/ %dir %{_binfmtdir} %dir %{_sysconfdir}/binfmt.d ++++++ kbd-model-map.legacy ++++++ --- /var/tmp/diff_new_pack.nGBIH5/_old 2019-11-18 19:57:30.637980868 +0100 +++ /var/tmp/diff_new_pack.nGBIH5/_new 2019-11-18 19:57:30.637980868 +0100 @@ -4,6 +4,7 @@ cn-latin1 ca pc105 multix terminate:ctrl_alt_bksp cz-lat2-us cz,us pc105 qwerty,basic terminate:ctrl_alt_bksp,grp:shift_toggle es-cp850 es pc105 - terminate:ctrl_alt_bksp +ir ir pc105 - terminate:ctrl_alt_bksp korean kr pc105 - terminate:ctrl_alt_bksp lt.std lt pc105 std terminate:ctrl_alt_bksp no-latin1 no pc105 - terminate:ctrl_alt_bksp ++++++ systemd-v243+suse.126.gb7467b7b55.tar.xz -> systemd-v243+suse.135.g0b715187a8.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/README new/systemd-v243+suse.135.g0b715187a8/README --- old/systemd-v243+suse.126.gb7467b7b55/README 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/README 2019-11-12 15:12:30.000000000 +0100 @@ -154,7 +154,7 @@ libmicrohttpd (optional) libpython (optional) libidn2 or libidn (optional) - gnutls >= 3.1.4 (optional, >= 3.5.3 is required to support DNS-over-TLS with gnutls) + gnutls >= 3.1.4 (optional, >= 3.6.0 is required to support DNS-over-TLS with gnutls) openssl >= 1.1.0 (optional, required to support DNS-over-TLS with openssl) elfutils >= 158 (optional) polkit (optional) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/man/systemd.unit.xml new/systemd-v243+suse.135.g0b715187a8/man/systemd.unit.xml --- old/systemd-v243+suse.126.gb7467b7b55/man/systemd.unit.xml 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/man/systemd.unit.xml 2019-11-12 15:12:30.000000000 +0100 @@ -137,10 +137,10 @@ a symlink, so when <command>systemd</command> is asked through D-Bus to load <filename>dbus-org.freedesktop.network1.service</filename>, it'll load <filename>systemd-networkd.service</filename>. Alias names may be used in commands like - <command>enable</command>, <command>disable</command>, <command>start</command>, <command>stop</command>, - <command>status</command>, and similar, and in all unit dependency directives, including - <varname>Wants=</varname>, <varname>Requires=</varname>, <varname>Before=</varname>, - <varname>After=</varname>. Aliases cannot be used with the <command>preset</command> command.</para> + <command>disable</command>, <command>start</command>, <command>stop</command>, <command>status</command>, + and similar, and in all unit dependency directives, including <varname>Wants=</varname>, + <varname>Requires=</varname>, <varname>Before=</varname>, <varname>After=</varname>. Aliases cannot be + used with the <command>preset</command> command.</para> <para>Unit files may specify aliases through the <varname>Alias=</varname> directive in the [Install] section. When the unit is enabled, symlinks will be created for those names, and removed when the unit is diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/meson.build new/systemd-v243+suse.135.g0b715187a8/meson.build --- old/systemd-v243+suse.126.gb7467b7b55/meson.build 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/meson.build 2019-11-12 15:12:30.000000000 +0100 @@ -1201,7 +1201,7 @@ if dns_over_tls == 'openssl' have_gnutls = false else - have_gnutls = (conf.get('HAVE_GNUTLS') == 1 and libgnutls.version().version_compare('>= 3.5.3')) + have_gnutls = (conf.get('HAVE_GNUTLS') == 1 and libgnutls.version().version_compare('>= 3.6.0')) if dns_over_tls == 'gnutls' and not have_gnutls error('DNS-over-TLS support was requested with gnutls, but dependencies are not available') endif diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/src/core/dbus-manager.c new/systemd-v243+suse.135.g0b715187a8/src/core/dbus-manager.c --- old/systemd-v243+suse.126.gb7467b7b55/src/core/dbus-manager.c 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/src/core/dbus-manager.c 2019-11-12 15:12:30.000000000 +0100 @@ -1903,11 +1903,13 @@ case -ELOOP: r = sd_bus_error_setf(error, BUS_ERROR_UNIT_LINKED, - "Refusing to operate on linked unit file %s", changes[i].path); + "Refusing to operate on alias name or linked unit file: %s", + changes[i].path); goto found; case -ENOENT: - r = sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_UNIT, "Unit file %s does not exist.", changes[i].path); + r = sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_UNIT, + "Unit file %s does not exist.", changes[i].path); goto found; default: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/src/login/logind-session.c new/systemd-v243+suse.135.g0b715187a8/src/login/logind-session.c --- old/systemd-v243+suse.126.gb7467b7b55/src/login/logind-session.c 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/src/login/logind-session.c 2019-11-12 15:12:30.000000000 +0100 @@ -1240,23 +1240,27 @@ } static void session_restore_vt(Session *s) { - int r, vt, old_fd; + int r; - /* We need to get a fresh handle to the virtual terminal, - * since the old file-descriptor is potentially in a hung-up - * state after the controlling process exited; we do a - * little dance to avoid having the terminal be available - * for reuse before we've cleaned it up. - */ - old_fd = TAKE_FD(s->vtfd); + r = vt_restore(s->vtfd); + if (r == -EIO) { + int vt, old_fd; + + /* It might happen if the controlling process exited before or while we were + * restoring the VT as it would leave the old file-descriptor in a hung-up + * state. In this case let's retry with a fresh handle to the virtual terminal. */ + + /* We do a little dance to avoid having the terminal be available + * for reuse before we've cleaned it up. */ + old_fd = TAKE_FD(s->vtfd); + + vt = session_open_vt(s); + safe_close(old_fd); + + if (vt >= 0) + r = vt_restore(vt); + } - vt = session_open_vt(s); - safe_close(old_fd); - - if (vt < 0) - return; - - r = vt_restore(vt); if (r < 0) log_warning_errno(r, "Failed to restore VT, ignoring: %m"); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/src/resolve/resolved-dnstls-gnutls.c new/systemd-v243+suse.135.g0b715187a8/src/resolve/resolved-dnstls-gnutls.c --- old/systemd-v243+suse.126.gb7467b7b55/src/resolve/resolved-dnstls-gnutls.c 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/src/resolve/resolved-dnstls-gnutls.c 2019-11-12 15:12:30.000000000 +0100 @@ -9,11 +9,7 @@ #include "resolved-dns-stream.h" #include "resolved-dnstls.h" -#if GNUTLS_VERSION_NUMBER >= 0x030600 -#define PRIORTY_STRING "NORMAL:-VERS-ALL:+VERS-TLS1.2:+VERS-TLS1.3" -#else -#define PRIORTY_STRING "NORMAL:-VERS-ALL:+VERS-TLS1.2" -#endif +#define PRIORTY_STRING "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2" DEFINE_TRIVIAL_CLEANUP_FUNC(gnutls_session_t, gnutls_deinit); static ssize_t dnstls_stream_writev(gnutls_transport_ptr_t p, const giovec_t *iov, int iovcnt) { @@ -59,8 +55,17 @@ server->dnstls_data.session_data.size = 0; } - if (server->manager->dns_over_tls_mode == DNS_OVER_TLS_YES) - gnutls_session_set_verify_cert(gs, NULL, 0); + if (server->manager->dns_over_tls_mode == DNS_OVER_TLS_YES) { + stream->dnstls_data.validation.type = GNUTLS_DT_IP_ADDRESS; + if (server->family == AF_INET) { + stream->dnstls_data.validation.data = (unsigned char*) &server->address.in.s_addr; + stream->dnstls_data.validation.size = 4; + } else { + stream->dnstls_data.validation.data = server->address.in6.s6_addr; + stream->dnstls_data.validation.size = 16; + } + gnutls_session_set_verify_cert2(gs, &stream->dnstls_data.validation, 1, 0); + } gnutls_handshake_set_timeout(gs, GNUTLS_DEFAULT_HANDSHAKE_TIMEOUT); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/src/resolve/resolved-dnstls-gnutls.h new/systemd-v243+suse.135.g0b715187a8/src/resolve/resolved-dnstls-gnutls.h --- old/systemd-v243+suse.126.gb7467b7b55/src/resolve/resolved-dnstls-gnutls.h 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/src/resolve/resolved-dnstls-gnutls.h 2019-11-12 15:12:30.000000000 +0100 @@ -18,6 +18,7 @@ struct DnsTlsStreamData { gnutls_session_t session; + gnutls_typed_vdata_st validation; int handshake; bool shutdown; }; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/src/shared/install.c new/systemd-v243+suse.135.g0b715187a8/src/shared/install.c --- old/systemd-v243+suse.126.gb7467b7b55/src/shared/install.c 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/src/shared/install.c 2019-11-12 15:12:30.000000000 +0100 @@ -1897,7 +1897,7 @@ q = install_info_traverse(scope, c, paths, i, flags, NULL); if (q < 0) { - unit_file_changes_add(changes, n_changes, r, i->name, NULL); + unit_file_changes_add(changes, n_changes, q, i->name, NULL); return q; } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-v243+suse.126.gb7467b7b55/src/udev/udev-builtin-blkid.c new/systemd-v243+suse.135.g0b715187a8/src/udev/udev-builtin-blkid.c --- old/systemd-v243+suse.126.gb7467b7b55/src/udev/udev-builtin-blkid.c 2019-10-31 08:31:53.000000000 +0100 +++ new/systemd-v243+suse.135.g0b715187a8/src/udev/udev-builtin-blkid.c 2019-11-12 15:12:30.000000000 +0100 @@ -266,7 +266,7 @@ if (r < 0) return log_device_debug_errno(dev, r, "Failed to get device name: %m"); - fd = open(devnode, O_RDONLY|O_CLOEXEC); + fd = open(devnode, O_RDONLY|O_CLOEXEC|O_NONBLOCK); if (fd < 0) return log_device_debug_errno(dev, errno, "Failed to open block device %s: %m", devnode);
