Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package policycoreutils for openSUSE:Factory checked in at 2021-11-28 21:29:57 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/policycoreutils (Old) and /work/SRC/openSUSE:Factory/.policycoreutils.new.1895 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "policycoreutils" Sun Nov 28 21:29:57 2021 rev:59 rq:933777 version:3.3 Changes: -------- --- /work/SRC/openSUSE:Factory/policycoreutils/policycoreutils.changes 2021-11-15 15:27:33.945843080 +0100 +++ /work/SRC/openSUSE:Factory/.policycoreutils.new.1895/policycoreutils.changes 2021-11-28 21:30:08.586069622 +0100 @@ -1,0 +2,12 @@ +Thu Nov 25 13:59:02 UTC 2021 - Johannes Segitz <jseg...@suse.com> + +- finish UsrMerge (bsc#1191089) + +------------------------------------------------------------------- +Wed Nov 24 16:27:00 UTC 2021 - Johannes Segitz <jseg...@suse.com> + +- Add run_init.pamd.patch to adjust to SUSE pam setup. Removed + run_init_use_pam_keyinit.patch and included it in the new patch + (bsc#1190098) + +------------------------------------------------------------------- Old: ---- run_init_use_pam_keyinit.patch New: ---- run_init.pamd.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ policycoreutils.spec ++++++ --- /var/tmp/diff_new_pack.FKhKfZ/_old 2021-11-28 21:30:09.238067536 +0100 +++ /var/tmp/diff_new_pack.FKhKfZ/_new 2021-11-28 21:30:09.246067510 +0100 @@ -39,8 +39,8 @@ Source8: https://github.com/SELinuxProject/selinux/releases/download/%{version}/semodule-utils-%{version}.tar.gz Source9: newrole.pam Patch0: make_targets.patch -Patch1: run_init_use_pam_keyinit.patch Patch2: get_os_version.patch +Patch3: run_init.pamd.patch BuildRequires: audit-devel >= %{libaudit_ver} BuildRequires: bison BuildRequires: dbus-1-glib-devel @@ -163,8 +163,8 @@ setools_python_pwd="$PWD/selinux-python-%{version}" semodule_utils_pwd="$PWD/semodule-utils-%{version}" %patch0 -p1 -%patch1 -p1 %patch2 -p1 +%patch3 -p1 mv ${setools_python_pwd}/audit2allow ${setools_python_pwd}/chcat ${setools_python_pwd}/semanage ${setools_python_pwd}/sepolgen ${setools_python_pwd}/sepolicy . mv ${semodule_utils_pwd}/semodule_expand ${semodule_utils_pwd}/semodule_link ${semodule_utils_pwd}/semodule_package . @@ -211,6 +211,7 @@ %{buildroot}%{_datadir}/pixmaps/system-config-selinux.png %endif cp -f %{SOURCE9} %{buildroot}%{_sysconfdir}/pam.d/newrole +mv %{buildroot}/sbin/* %{buildroot}/usr/sbin/ %post newrole %set_permissions %{_bindir}/newrole @@ -219,13 +220,13 @@ %verify_permissions -e %{_bindir}/newrole %files -/sbin/restorecon -/sbin/setfiles -/sbin/restorecon_xattr %{_bindir}/semodule_expand %{_bindir}/semodule_link %{_bindir}/semodule_package %{_bindir}/semodule_unpackage +%{_sbindir}/restorecon +%{_sbindir}/setfiles +%{_sbindir}/restorecon_xattr %{_sbindir}/fixfiles %{_sbindir}/load_policy %dir %{_libexecdir}/selinux ++++++ run_init.pamd.patch ++++++ Index: policycoreutils-3.3/run_init/run_init.pamd =================================================================== --- policycoreutils-3.3.orig/run_init/run_init.pamd +++ policycoreutils-3.3/run_init/run_init.pamd @@ -1,8 +1,9 @@ #%PAM-1.0 # Uncomment the next line if you do not want to enter your passwd everytime #auth sufficient pam_rootok.so -auth include system-auth -account include system-auth -password include system-auth -session include system-auth +auth include common-auth +account include common-account +password include common-password +session include common-session session optional pam_xauth.so +session optional pam_keyinit.so revoke [force]