Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package systemd for openSUSE:Factory checked in at 2022-01-07 12:44:33 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/systemd (Old) and /work/SRC/openSUSE:Factory/.systemd.new.1896 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "systemd" Fri Jan 7 12:44:33 2022 rev:342 rq:943712 version:249.7 Changes: -------- --- /work/SRC/openSUSE:Factory/systemd/systemd.changes 2021-11-24 23:54:32.392465454 +0100 +++ /work/SRC/openSUSE:Factory/.systemd.new.1896/systemd.changes 2022-01-07 12:44:58.243786690 +0100 @@ -1,0 +2,22 @@ +Tue Jan 4 08:23:19 UTC 2022 - Franck Bui <f...@suse.com> + +- Update systemd-user PAM service again + + Change the default implementation of pam_setcred() again, previously + customized to run the full "auth" PAM stack and only call pam_deny.so which is + basically the SUSE default behavior without pam_warn.so. + + This is considered safer, especially on SLE where a regression was spotted by + QA. + +------------------------------------------------------------------- +Tue Dec 7 12:05:55 UTC 2021 - Ludwig Nussel <lnus...@suse.de> + +- move files related to static nodes to udev + +------------------------------------------------------------------- +Wed Nov 24 10:40:01 UTC 2021 - Ludwig Nussel <lnus...@suse.com> + +- Replace S:$n references with SOURCE$n. Makes vim * search work. + +------------------------------------------------------------------- @@ -283,0 +306 @@ + - upstream commit 6fe2a70b9160e35fdeed9d37bd31727c2d46a8b2 (jsc#SLE-17798) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ systemd.spec ++++++ --- /var/tmp/diff_new_pack.cp2zlg/_old 2022-01-07 12:44:59.231787376 +0100 +++ /var/tmp/diff_new_pack.cp2zlg/_new 2022-01-07 12:44:59.235787379 +0100 @@ -1,7 +1,7 @@ # # spec file for package systemd # -# Copyright (c) 2021 SUSE LLC +# Copyright (c) 2022 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -725,8 +725,8 @@ mkdir -p %{buildroot}%{_localstatedir}/lib/systemd/sysv-convert mkdir -p %{buildroot}%{_localstatedir}/lib/systemd/migrated -install -m0755 -D %{S:3} %{buildroot}/%{_prefix}/lib/systemd/systemd-sysv-convert -install -m0755 -D %{S:4} %{buildroot}/%{_prefix}/lib/systemd/systemd-sysv-install +install -m0755 -D %{SOURCE3} %{buildroot}/%{_prefix}/lib/systemd/systemd-sysv-convert +install -m0755 -D %{SOURCE4} %{buildroot}/%{_prefix}/lib/systemd/systemd-sysv-install %endif mkdir -p % %{buildroot}%{_sysconfdir}/systemd/network @@ -735,7 +735,7 @@ # Package the scripts used to fix all packaging issues. Also drop the # "scripts-{systemd/udev}" prefix which is used because osc doesn't # allow directory structure... -for s in %{S:100} %{S:101} %{S:102}; do +for s in %{SOURCE100} %{SOURCE101} %{SOURCE102}; do install -m0755 -D $s %{buildroot}%{_prefix}/lib/systemd/scripts/${s#*/scripts-systemd-} done @@ -759,7 +759,7 @@ rm -f %{buildroot}/etc/systemd/system/default.target # Replace upstream systemd-user with the openSUSE one. -install -m0644 -D --target-directory=%{buildroot}%{_pam_vendordir} %{S:2} +install -m0644 -D --target-directory=%{buildroot}%{_pam_vendordir} %{SOURCE2} # don't enable wall ask password service, it spams every console (bnc#747783) rm %{buildroot}%{_unitdir}/multi-user.target.wants/systemd-ask-password-wall.path @@ -824,7 +824,7 @@ mkdir -p %{buildroot}%{_systemd_user_env_generator_dir} # ensure after.local wrapper is called -install -m 644 %{S:11} %{buildroot}%{_unitdir}/ +install -m 644 %{SOURCE11} %{buildroot}%{_unitdir}/ ln -s ../after-local.service %{buildroot}%{_unitdir}/multi-user.target.wants/ # ghost directories with default permissions. @@ -867,7 +867,7 @@ # still keep the remaining paths that still don't have a better home # in suse.conf. rm -f %{buildroot}%{_tmpfilesdir}/{etc,home,legacy,tmp,var}.conf -install -m 644 %{S:5} %{buildroot}%{_tmpfilesdir}/suse.conf +install -m 644 %{SOURCE5} %{buildroot}%{_tmpfilesdir}/suse.conf # The content of the files shipped by systemd doesn't match the # defaults used by SUSE. Don't ship those files but leave the decision @@ -891,7 +891,7 @@ # kbd-model-map.legacy is used to provide mapping for legacy keymaps, # which may still be used by yast. -cat %{S:14} >>%{buildroot}%{_datarootdir}/systemd/kbd-model-map +cat %{SOURCE14} >>%{buildroot}%{_datarootdir}/systemd/kbd-model-map # Don't ship systemd-journald-audit.socket as there's no other way for # us to prevent journald from recording audit messages in the journal @@ -1304,6 +1304,8 @@ %exclude %{_unitdir}/*.target.wants/systemd-hwdb*.* %exclude %{_unitdir}/initrd-udevadm-cleanup-db.service %exclude %{_unitdir}/kmod-static-nodes.service +%exclude %{_unitdir}/sysinit.target.wants/kmod-static-nodes.service +%exclude %{_tmpfilesdir}/static-nodes-permissions.conf %exclude %{_unitdir}/systemd-nspawn@.service %if %{with machined} %exclude %{_prefix}/lib/systemd/systemd-machined @@ -1651,6 +1653,8 @@ %dir %{_unitdir} %{_prefix}/lib/systemd/systemd-udevd %{_unitdir}/kmod-static-nodes.service +%{_unitdir}/sysinit.target.wants/kmod-static-nodes.service +%{_tmpfilesdir}/static-nodes-permissions.conf %{_unitdir}/systemd-udev*.service %{_unitdir}/systemd-udevd*.socket %{_unitdir}/systemd-hwdb*.* ++++++ systemd-user ++++++ --- /var/tmp/diff_new_pack.cp2zlg/_old 2022-01-07 12:44:59.387787484 +0100 +++ /var/tmp/diff_new_pack.cp2zlg/_new 2022-01-07 12:44:59.391787487 +0100 @@ -2,18 +2,19 @@ # # Used by systemd --user instances. -# This is not about authentication per se (user@.service is a system -# service anyway) but to give the possibility to user services -# (especially those like gnome-terminal, see [1]) to have theirs -# credentials extended similar to the ones received by a user when he -# logs in (and the full PAM authentication stack is run). See [2] and -# [3] for details. +# Override the default behavior of the "auth" PAM stack and don't throw a +# warning each time a user instance is started, which is the default behavior of +# the PAM stack when no auth is defined. Indeed PID1 calls pam_setcred() when +# the user instance is about to be started to allow some user services, such as +# gnome-terminal, to extend theirs credentials similar to the ones received by a +# user when he logs in (and the full PAM authentication stack is run). For some +# details, see: # -# [1] https://gitlab.gnome.org/GNOME/gdm/-/issues/393 -# [2] https://github.com/systemd/systemd/issues/11198 -# [3] https://bugzilla.suse.com/show_bug.cgi?id=1190515 +# https://gitlab.gnome.org/GNOME/gdm/-/issues/393 +# https://github.com/systemd/systemd/issues/11198 +# https://bugzilla.suse.com/show_bug.cgi?id=1190515 # -auth include common-auth +auth required pam_deny.so account include common-account