Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package crmsh for openSUSE:Factory checked in at 2023-02-10 14:35:46 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/crmsh (Old) and /work/SRC/openSUSE:Factory/.crmsh.new.1848 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "crmsh" Fri Feb 10 14:35:46 2023 rev:278 rq:1064153 version:4.4.1+20230210.df3b7a92 Changes: -------- --- /work/SRC/openSUSE:Factory/crmsh/crmsh.changes 2023-01-17 17:35:45.805337313 +0100 +++ /work/SRC/openSUSE:Factory/.crmsh.new.1848/crmsh.changes 2023-02-10 14:35:48.186093612 +0100 @@ -1,0 +2,26 @@ +Fri Feb 10 03:09:26 UTC 2023 - xli...@suse.com + +- Update to version 4.4.1+20230210.df3b7a92: + * Dev: unittest: Adjust unit test for previous change + * Dev: behave: Adjust functional test for previous change + * Dev: utils: Add sudo for the commands in user hints + +------------------------------------------------------------------- +Wed Feb 08 14:31:39 UTC 2023 - xli...@suse.com + +- Update to version 4.4.1+20230208.b437e499: + * Dev: spec: Requires parallax version 1.0.8 + +------------------------------------------------------------------- +Tue Feb 07 07:23:40 UTC 2023 - xli...@suse.com + +- Update to version 4.4.1+20230207.3485cdd1: + * Fix: hawk fails to parse the slash (bsc#1206217) + +------------------------------------------------------------------- +Sat Jan 28 08:04:37 UTC 2023 - xli...@suse.com + +- Update to version 4.4.1+20230128.8541d6a8: + * Fix: extra logs while configuring passwordless (bsc#1207720) + +------------------------------------------------------------------- Old: ---- crmsh-4.4.1+20230117.fb8b3c2b.tar.bz2 New: ---- crmsh-4.4.1+20230210.df3b7a92.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ crmsh.spec ++++++ --- /var/tmp/diff_new_pack.vUZ4KU/_old 2023-02-10 14:35:48.798097270 +0100 +++ /var/tmp/diff_new_pack.vUZ4KU/_new 2023-02-10 14:35:48.806097318 +0100 @@ -36,7 +36,7 @@ Summary: High Availability cluster command-line interface License: GPL-2.0-or-later Group: %{pkg_group} -Version: 4.4.1+20230117.fb8b3c2b +Version: 4.4.1+20230210.df3b7a92 Release: 0 URL: http://crmsh.github.io Source0: %{name}-%{version}.tar.bz2 @@ -52,7 +52,7 @@ Requires: /usr/bin/which Requires: python3 >= 3.4 Requires: python3-lxml -Requires: python3-parallax +Requires: python3-parallax >= 1.0.8 Requires: python3-python-dateutil BuildRequires: python3-lxml BuildRequires: python3-setuptools ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.vUZ4KU/_old 2023-02-10 14:35:48.886097795 +0100 +++ /var/tmp/diff_new_pack.vUZ4KU/_new 2023-02-10 14:35:48.890097820 +0100 @@ -9,7 +9,7 @@ </service> <service name="tar_scm"> <param name="url">https://github.com/ClusterLabs/crmsh.git</param> - <param name="changesrevision">fb8b3c2ba172e54af2192b96c3fdbf0d7561ea56</param> + <param name="changesrevision">df3b7a92af87f9bf14be7b354e15081e171d2f34</param> </service> </servicedata> (No newline at EOF) ++++++ crmsh-4.4.1+20230117.fb8b3c2b.tar.bz2 -> crmsh-4.4.1+20230210.df3b7a92.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/crmsh/bootstrap.py new/crmsh-4.4.1+20230210.df3b7a92/crmsh/bootstrap.py --- old/crmsh-4.4.1+20230117.fb8b3c2b/crmsh/bootstrap.py 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/crmsh/bootstrap.py 2023-02-10 03:35:40.000000000 +0100 @@ -1583,7 +1583,6 @@ stdout=subprocess.PIPE, stderr=subprocess.PIPE, ) - print(result) if result.returncode != 0: utils.fatal("Can't get the remote id_rsa.pub from {}: {}".format( remote_node, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/crmsh/utils.py new/crmsh-4.4.1+20230210.df3b7a92/crmsh/utils.py --- old/crmsh-4.4.1+20230117.fb8b3c2b/crmsh/utils.py 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/crmsh/utils.py 2023-02-10 03:35:40.000000000 +0100 @@ -3382,13 +3382,13 @@ hints = f"""Please run this command starting with "sudo". Currently, this command needs to use sudo to escalate itself as root. Please consider to add "{current_user}" as sudoer. For example: - echo "{current_user} ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/{current_user}""" + sudo bash -c 'echo "{current_user} ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/{current_user}'""" else: hints = f"""This command needs higher privilege. Option 1) Please consider to add "{current_user}" as sudoer. For example: - echo "{current_user} ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/{current_user} + sudo bash -c 'echo "{current_user} ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/{current_user}' Option 2) Add "{current_user}" to the haclient group. For example: - usermod -g haclient {current_user}""" + sudo usermod -g haclient {current_user}""" logger.error(hints) else: logger.error("Please run this command starting with \"sudo\"") diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/crmsh.spec.in new/crmsh-4.4.1+20230210.df3b7a92/crmsh.spec.in --- old/crmsh-4.4.1+20230117.fb8b3c2b/crmsh.spec.in 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/crmsh.spec.in 2023-02-10 03:35:40.000000000 +0100 @@ -52,7 +52,7 @@ Requires: /usr/bin/which Requires: python3 >= 3.4 Requires: python3-lxml -Requires: python3-parallax +Requires: python3-parallax >= 1.0.8 Requires: python3-python-dateutil BuildRequires: python3-lxml BuildRequires: python3-setuptools diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/scripts/cryptctl/main.yml new/crmsh-4.4.1+20230210.df3b7a92/scripts/cryptctl/main.yml --- old/crmsh-4.4.1+20230117.fb8b3c2b/scripts/cryptctl/main.yml 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/scripts/cryptctl/main.yml 2023-02-10 03:35:40.000000000 +0100 @@ -1,7 +1,7 @@ # Copyright (C) 2022 Peter Varkoly # License: GNU General Public License (GPL) version: 2.2 -category: System/Management +category: System Management shortdesc: A utility for setting up LUKS-based disk encryption longdesc: | Configure a resource group containing a virtual IP address, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/test/features/user_access.feature new/crmsh-4.4.1+20230210.df3b7a92/test/features/user_access.feature --- old/crmsh-4.4.1+20230117.fb8b3c2b/test/features/user_access.feature 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/test/features/user_access.feature 2023-02-10 03:35:40.000000000 +0100 @@ -12,7 +12,7 @@ ERROR: Please run this command starting with "sudo". Currently, this command needs to use sudo to escalate itself as root. Please consider to add "xin1" as sudoer. For example: - echo "xin1 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/xin1 + sudo bash -c 'echo "xin1 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/xin1' """ When Run "echo "xin1 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/xin1" on "hanode1" When Try "su xin1 -c 'crm cluster init -y'" @@ -61,7 +61,7 @@ ERROR: Please run this command starting with "sudo". Currently, this command needs to use sudo to escalate itself as root. Please consider to add "user1" as sudoer. For example: - echo "user1 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user1 + sudo bash -c 'echo "user1 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user1' """ When Run "echo "user1 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user1" on "hanode1" When Try "su user1 -c 'crm cluster init -y'" @@ -80,9 +80,9 @@ WARNING: Failed to open log file: [Errno 13] Permission denied: '/var/log/crmsh/crmsh.log' ERROR: This command needs higher privilege. Option 1) Please consider to add "user2" as sudoer. For example: - echo "user2 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user2 + sudo bash -c 'echo "user2 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user2' Option 2) Add "user2" to the haclient group. For example: - usermod -g haclient user2 + sudo usermod -g haclient user2 """ When Run "usermod -g haclient user2" on "hanode1" When Run "su user2 -c 'crm node standby hanode1'" on "hanode1" @@ -95,9 +95,9 @@ WARNING: Failed to open log file: [Errno 13] Permission denied: '/var/log/crmsh/crmsh.log' ERROR: This command needs higher privilege. Option 1) Please consider to add "user3" as sudoer. For example: - echo "user3 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user3 + sudo bash -c 'echo "user3 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user3' Option 2) Add "user3" to the haclient group. For example: - usermod -g haclient user3 + sudo usermod -g haclient user3 """ When Run "echo "user3 ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user3" on "hanode1" When Try "su user3 -c 'crm node online hanode1'" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/test/testcases/scripts.exp new/crmsh-4.4.1+20230210.df3b7a92/test/testcases/scripts.exp --- old/crmsh-4.4.1+20230117.fb8b3c2b/test/testcases/scripts.exp 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/test/testcases/scripts.exp 2023-02-10 03:35:40.000000000 +0100 @@ -63,7 +63,7 @@ sbd SBD, Shared storage based fencing vmware Fencing using vCenter / ESX Server -System/management: +System management: cryptctl A utility for setting up LUKS-based disk encryption @@ -128,7 +128,7 @@ sbd SBD, Shared storage based fencing vmware Fencing using vCenter / ESX Server -System/management: +System management: cryptctl A utility for setting up LUKS-based disk encryption diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/crmsh-4.4.1+20230117.fb8b3c2b/test/unittests/test_utils.py new/crmsh-4.4.1+20230210.df3b7a92/test/unittests/test_utils.py --- old/crmsh-4.4.1+20230117.fb8b3c2b/test/unittests/test_utils.py 2023-01-17 09:08:55.000000000 +0100 +++ new/crmsh-4.4.1+20230210.df3b7a92/test/unittests/test_utils.py 2023-02-10 03:35:40.000000000 +0100 @@ -1792,7 +1792,7 @@ mock_sudo.return_value = False with pytest.raises(utils.TerminateSubCommand) as err: utils.check_user_access('ra') - mock_error.assert_called_once_with('This command needs higher privilege.\nOption 1) Please consider to add "user" as sudoer. For example:\n echo "user ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user\nOption 2) Add "user" to the haclient group. For example:\n usermod -g haclient user') + mock_error.assert_called_once_with('This command needs higher privilege.\nOption 1) Please consider to add "user" as sudoer. For example:\n sudo bash -c \'echo "user ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user\'\nOption 2) Add "user" to the haclient group. For example:\n sudo usermod -g haclient user') @mock.patch('logging.Logger.error') @@ -1805,4 +1805,4 @@ mock_sudo.return_value = False with pytest.raises(utils.TerminateSubCommand) as err: utils.check_user_access('cluster') - mock_error.assert_called_once_with('Please run this command starting with "sudo".\nCurrently, this command needs to use sudo to escalate itself as root.\nPlease consider to add "user" as sudoer. For example:\n echo "user ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user') + mock_error.assert_called_once_with('Please run this command starting with "sudo".\nCurrently, this command needs to use sudo to escalate itself as root.\nPlease consider to add "user" as sudoer. For example:\n sudo bash -c \'echo "user ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/user\'')