Hello community, here is the log from the commit of package mrsh for openSUSE:Factory checked in at 2019-12-06 12:09:02 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/mrsh (Old) and /work/SRC/openSUSE:Factory/.mrsh.new.4691 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "mrsh" Fri Dec 6 12:09:02 2019 rev:9 rq:754486 version:2.12 Changes: -------- --- /work/SRC/openSUSE:Factory/mrsh/mrsh.changes 2019-02-26 22:21:37.426082708 +0100 +++ /work/SRC/openSUSE:Factory/.mrsh.new.4691/mrsh.changes 2019-12-06 12:09:10.532118164 +0100 @@ -1,0 +2,5 @@ +Thu Dec 5 15:56:04 UTC 2019 - Egbert Eich <e...@suse.com> + +- Add pam_keyinit.so to /etc/pam.d/mrsh|mrlogind (boo#1144051). + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ mrsh.spec ++++++ --- /var/tmp/diff_new_pack.ppPRir/_old 2019-12-06 12:09:11.740117578 +0100 +++ /var/tmp/diff_new_pack.ppPRir/_new 2019-12-06 12:09:11.744117576 +0100 @@ -1,7 +1,7 @@ # # spec file for package mrsh # -# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2019 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -26,7 +26,7 @@ Summary: Remote shell program that uses munge authentication License: GPL-2.0-or-later Group: Productivity/Clustering/Computing -Url: https://github.com/chaos/mrsh +URL: https://github.com/chaos/mrsh Source0: https://github.com/chaos/mrsh/archive/%{version}.tar.gz Source1: README.SUSE Patch1: services-Do-not-require-non-standard-entries-in-etc-services.patch @@ -113,6 +113,8 @@ do sed -i 's#\(account\s\+include\s\+\)system-auth#\1common-account#' %{buildroot}/%{_sysconfdir}/pam.d/$i sed -i 's#\(session\s\+include\s\+\)system-auth#\1common-session#' %{buildroot}/%{_sysconfdir}/pam.d/$i + sed -i -e ':c;/pam_keyinit.so/bx' -e '$asession\toptional\tpam_keyinit.so\tforce revoke' \ + -e 'N;bc;:x;N;bx' %{buildroot}/%{_sysconfdir}/pam.d/$i done %if 0%{!?have_systemd} sed -i 's#disable\s*= yes#disable = no#' %{buildroot}/etc/xinetd.d/mrlogind