Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sudo for openSUSE:Factory checked in 
at 2022-02-03 23:15:48
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sudo (Old)
 and      /work/SRC/openSUSE:Factory/.sudo.new.1898 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sudo"

Thu Feb  3 23:15:48 2022 rev:127 rq:950730 version:1.9.9

Changes:
--------
--- /work/SRC/openSUSE:Factory/sudo/sudo.changes        2021-12-08 
22:08:32.562850950 +0100
+++ /work/SRC/openSUSE:Factory/.sudo.new.1898/sudo.changes      2022-02-03 
23:16:05.232776293 +0100
@@ -1,0 +2,95 @@
+Tue Feb  1 02:27:04 UTC 2022 - Simon Lees <simonf.l...@suse.com>
+
+- Update to 1.9.9
+   * Sudo can now be built with OpenSSL 3.0 without generating
+     warnings about deprecated OpenSSL APIs.
+   * A digest can now be specified along with the ALL command in
+     the LDAP and SSSD back-ends. Sudo 1.9.0 introduced support for
+     this in the sudoers file but did not include corresponding
+     changes for the other back-ends.
+   * visudo now only warns about an undefined alias or a cycle in
+     an alias once for each alias.
+   * The sudoRole cn was truncated by a single character in warning
+     messages. GitHub issue #115.
+   * The cvtsudoers utility has new --group-file and --passwd-file
+     options to use a custom passwd or group file when the
+     --match-local option is also used.
+   * The cvtsudoers utility can now filter or match based on a command.
+   * The cvtsudoers utility can now produce output in csv
+     (comma-separated value) format. This can be used to help generate
+     entitlement reports.
+   * Fixed a bug in sudo_logsrvd that could result in the connection
+     being dropped for very long command lines.
+   * Fixed a bug where sudo_logsrvd would not accept a restore point
+     of zero.
+   * Fixed a bug in visudo where the value of the editor setting was
+     not used if it did not match the user???s EDITOR environment
+     variable. This was only a problem if the env_editor setting was
+     not enabled. Bug #1000.
+   * Sudo now builds with the -fcf-protection compiler option and the
+     -z now linker option if supported.
+   * The output of sudoreplay -l now more closely matches the
+     traditional sudo log format.
+   * The sudo_sendlog utility will now use the full contents of the
+     log.json file, if present. This makes it possible to send
+     sudo-format I/O logs that use the newer log.json format to
+     sudo_logsrvd without losing any information.
+   * Fixed compilation of the arc4random_buf() replacement on systems
+     with arc4random() but no arc4random_buf(). Bug #1008.
+   * Sudo now uses its own getentropy() by default on Linux. The GNU
+     libc version of getentropy() will fail on older kernels that
+     don???t support the getrandom() system call.
+   * It is now possible to build sudo with WolfSSL???s OpenSSL
+     compatibility layer by using the --enable-wolfssl configure
+     option.
+   * Fixed a bug related to Daylight Saving Time when parsing
+     timestamps in Generalized Time format. This affected the NOTBEFORE
+     and NOTAFTER options in sudoers. Bug #1006.
+   * Added the -O and -P options to visudo, which can be used to check
+     or set the owner and permissions. This can be used in conjunction
+     with the -c option to check that the sudoers file ownership and
+     permissions are correct. Bug #1007.
+   * It is now possible to set resource limits in the sudoers file
+     itself. The special values default and ???user??? refer to the
+     default system limit and invoking user limit respectively. The
+     core dump size limit is now set to 0 by default unless overridden
+     by the sudoers file.
+   * The cvtsudoers utility can now merge multiple sudoers sources into
+     a single, combined sudoers file. If there are conflicting entries,
+     cvtsudoers will attempt to resolve them but manual intervention
+     may be required. The merging of sudoers rules is currently fairly
+     simplistic but will be improved in a future release.
+   * Sudo was parsing but not applying the ???deref??? and ???tls_reqcert???
+     ldap.conf settings. This meant the options were effectively ignored
+     which broke dereferencing of aliases in LDAP. Bug #1013.
+   * Clarified in the sudo man page that the security policy may
+     override the user???s PATH environment variable. Bug #1014.
+   * When sudo is run in non-interactive mode (with the -n option), it
+     will now attempt PAM authentication and only exit with an error if
+     user interaction is required. This allows PAM modules that don???t
+     interact with the user to succeed. Previously, sudo would not
+     attempt authentication if the -n option was specified. Bug #956
+     and GitHub issue #83.
+   * Fixed a regression introduced in version 1.9.1 when sudo is built
+     with the --with-fqdn configure option. The local host name was
+     being resolved before the sudoers file was processed, making it
+     impossible to disable DNS lookups by negating the fqdn sudoers
+     option. Bug #1016.
+   * Added support for negated sudoUser attributes in the LDAP and SSSD
+     sudoers back ends. A matching sudoUser that is negated will cause
+     the sudoRole containing it to be ignored.
+   * Fixed a bug where the stack resource limit could be set to a value
+     smaller than that of the invoking user and not be reset before the
+     command was run. Bug #1016.
+- sudo no longer ships schema for LDAP.
+- sudo-feature-negated-LDAP-users.patch dropped, included upstream
+- refreshed sudo-sudoers.patch
+
+-------------------------------------------------------------------
+Thu Jan 27 03:00:26 UTC 2022 - Simon Lees <sfl...@suse.de>
+
+- Add support in the LDAP filter for negated users, patch taken
+  from upstream (jsc#20068)
+  * Adds sudo-feature-negated-LDAP-users.patch
+
+-------------------------------------------------------------------

Old:
----
  sudo-1.9.8p2.tar.gz
  sudo-1.9.8p2.tar.gz.sig

New:
----
  sudo-1.9.9.tar.gz
  sudo-1.9.9.tar.gz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sudo.spec ++++++
--- /var/tmp/diff_new_pack.69yk0L/_old  2022-02-03 23:16:05.916771624 +0100
+++ /var/tmp/diff_new_pack.69yk0L/_new  2022-02-03 23:16:05.920771597 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package sudo
 #
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -22,7 +22,7 @@
 %define use_usretc 1
 %endif
 Name:           sudo
-Version:        1.9.8p2
+Version:        1.9.9
 Release:        0
 Summary:        Execute some commands as root
 License:        ISC
@@ -88,8 +88,7 @@
 Tests for fate#313276
 
 %prep
-%setup -q
-%patch0 -p1
+%autosetup -p1
 
 %build
 %ifarch s390 s390x %{sparc}
@@ -140,7 +139,6 @@
 rm -f %{buildroot}%{_bindir}/sudoedit
 ln -sf %{_bindir}/sudo %{buildroot}%{_bindir}/sudoedit
 install -d -m 755 %{buildroot}%{_sysconfdir}/openldap/schema
-install -m 644 doc/schema.OpenLDAP 
%{buildroot}%{_sysconfdir}/openldap/schema/sudo.schema
 install -m 644 %{SOURCE5} %{buildroot}%{_docdir}/%{name}/
 rm -f %{buildroot}%{_docdir}/%{name}/sample.pam
 rm -f %{buildroot}%{_docdir}/%{name}/sample.syslog.conf
@@ -154,9 +152,10 @@
 install -d -m 755 %{buildroot}%{_localstatedir}/lib/tests/sudo
 install -m 755 %{SOURCE6} %{buildroot}%{_localstatedir}/lib/tests/sudo
 install -m 755 %{SOURCE7} %{buildroot}%{_localstatedir}/lib/tests/sudo
-install -d %{buildroot}%{_docdir}/%{name}-test
-install -m 644 %{buildroot}%{_docdir}/%{name}/LICENSE 
%{buildroot}%{_docdir}/%{name}-test/LICENSE
-rm -fv %{buildroot}%{_docdir}/%{name}/LICENSE
+
+install -d %{buildroot}%{_licensedir}/%{name}
+install -m 644 %{buildroot}%{_docdir}/%{name}/LICENSE.md 
%{buildroot}%{_licensedir}/%{name}/LICENSE.md
+rm -fv %{buildroot}%{_docdir}/%{name}/LICENSE.md
 
 %if %{defined use_usretc}
 %pre
@@ -185,7 +184,7 @@
 %verify_permissions -e %{_bindir}/sudo
 
 %files -f %{name}.lang
-%license doc/LICENSE
+%license doc/LICENSE.md
 %doc %{_docdir}/%{name}
 %{_mandir}/man1/cvtsudoers.1%{?ext_man}
 %{_mandir}/man5/sudoers.5%{?ext_man}
@@ -213,9 +212,6 @@
 %config(noreplace) %{_sysconfdir}/pam.d/sudo-i
 %endif
 %attr(4755,root,root) %{_bindir}/sudo
-%dir %{_sysconfdir}/openldap
-%dir %{_sysconfdir}/openldap/schema
-%attr(0444,root,root) %config %{_sysconfdir}/openldap/schema/sudo.schema
 %{_bindir}/sudoedit
 %{_bindir}/sudoreplay
 %{_bindir}/cvtsudoers
@@ -252,6 +248,5 @@
 
 %files test
 %{_localstatedir}/lib/tests
-%{_docdir}/%{name}-test/
 
 %changelog

++++++ sudo-1.9.8p2.tar.gz -> sudo-1.9.9.tar.gz ++++++
++++ 181902 lines of diff (skipped)

++++++ sudo-sudoers.patch ++++++
--- /var/tmp/diff_new_pack.69yk0L/_old  2022-02-03 23:16:06.608766900 +0100
+++ /var/tmp/diff_new_pack.69yk0L/_new  2022-02-03 23:16:06.612766873 +0100
@@ -1,7 +1,7 @@
-Index: sudo-1.8.31/plugins/sudoers/sudoers.in
+Index: sudo-1.9.9/plugins/sudoers/sudoers.in
 ===================================================================
---- sudo-1.8.31.orig/plugins/sudoers/sudoers.in
-+++ sudo-1.8.31/plugins/sudoers/sudoers.in
+--- sudo-1.9.9.orig/plugins/sudoers/sudoers.in
++++ sudo-1.9.9/plugins/sudoers/sudoers.in
 @@ -32,30 +32,23 @@
  ##
  ## Defaults specification
@@ -67,49 +67,18 @@
  ##
  ## Runas alias specification
  ##
-@@ -84,13 +84,5 @@
+@@ -84,13 +83,5 @@ root ALL=(ALL:ALL) ALL
  ## Same thing without a password
- # %wheel ALL=(ALL) NOPASSWD: ALL
+ # %wheel ALL=(ALL:ALL) NOPASSWD: ALL
  
 -## Uncomment to allow members of group sudo to execute any command
--# %sudo       ALL=(ALL) ALL
+-# %sudo       ALL=(ALL:ALL) ALL
 -
 -## Uncomment to allow any user to run sudo if they know the password
 -## of the user they are running the command as (root by default).
 -# Defaults targetpw  # Ask for the password of the target user
--# ALL ALL=(ALL) ALL  # WARNING: only use this together with 'Defaults 
targetpw'
+-# ALL ALL=(ALL:ALL) ALL  # WARNING: only use this together with 'Defaults 
targetpw'
 -
  ## Read drop-in files from @sysconfdir@/sudoers.d
  @includedir @sysconfdir@/sudoers.d
-Index: sudo-1.8.31/doc/sudoers.mdoc.in
-===================================================================
---- sudo-1.8.31.orig/doc/sudoers.mdoc.in
-+++ sudo-1.8.31/doc/sudoers.mdoc.in
-@@ -1985,7 +1985,7 @@ is present in the
- .Em env_keep
- list, both of which are strongly discouraged.
- This flag is
--.Em off
-+.Em on
- by default.
- .It authenticate
- If set, users must authenticate themselves via a password (or other
-@@ -2376,7 +2376,7 @@ If set,
- .Nm sudo
- will insult users when they enter an incorrect password.
- This flag is
--.Em @insults@
-+.Em off
- by default.
- .It log_allowed
- If set,
-@@ -3009,7 +3009,7 @@ database as an argument to the
- .Fl u
- option.
- This flag is
--.Em off
-+.Em on
- by default.
- .It tty_tickets
- If set, users must authenticate on a per-tty basis.
 

Reply via email to