Hello community, here is the log from the commit of package mrsh for openSUSE:Leap:15.2 checked in at 2020-04-25 19:09:28 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Leap:15.2/mrsh (Old) and /work/SRC/openSUSE:Leap:15.2/.mrsh.new.2738 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "mrsh" Sat Apr 25 19:09:28 2020 rev:17 rq:797523 version:2.12 Changes: -------- --- /work/SRC/openSUSE:Leap:15.2/mrsh/mrsh.changes 2020-01-15 15:31:30.322780538 +0100 +++ /work/SRC/openSUSE:Leap:15.2/.mrsh.new.2738/mrsh.changes 2020-04-25 19:09:29.276163696 +0200 @@ -1,0 +2,43 @@ +Sat Apr 18 10:12:46 UTC 2020 - Egbert Eich <e...@suse.com> + +- Remove previous workaround as chkstat from the updated + 'permissions' is expected to handle the symlinks correctly, + now. + +------------------------------------------------------------------- +Wed Feb 12 11:40:04 UTC 2020 - Egbert Eich <e...@suse.com> + +- Create compatibility symlinks as relative links. This doesn't + trick chkstat to erronously set permissions on link targets + during package build. + +------------------------------------------------------------------- +Mon Jan 27 08:50:12 UTC 2020 - Egbert Eich <e...@suse.com> + +- BuildRequire pkgconfig(systemd) instead of systemd: allow OBS to + shortcut through the -mini flavors. +- Use systemd_ordering instead of systemd_requires: systemd is + never a strict requirement; but in case the system is scheduled + for installation together with systemd, we want systemd to be + installed prior to mrsh. + +------------------------------------------------------------------- +Thu Dec 5 15:56:04 UTC 2019 - Egbert Eich <e...@suse.com> + +- Add pam_keyinit.so to /etc/pam.d/mrsh|mrlogind (boo#1144051). + +------------------------------------------------------------------- +Mon Feb 25 11:46:56 UTC 2019 - Egbert Eich <e...@suse.com> + +- Add README.SUSE: + Describe the steps required to set up and run mrshd/mrlogind. + +------------------------------------------------------------------- +Sat Sep 22 15:15:04 UTC 2018 - e...@suse.com + +- Replace 'Requires(post): systemd' with appropriate macro. +- Move %systemd_requires to the server sub-package. +- Add missing services in pre/post/preun/postun scripts. +- Fix systemd BuildRequires. + +------------------------------------------------------------------- New: ---- README.SUSE ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ mrsh.spec ++++++ --- /var/tmp/diff_new_pack.tWvK0l/_old 2020-04-25 19:09:29.792164805 +0200 +++ /var/tmp/diff_new_pack.tWvK0l/_new 2020-04-25 19:09:29.792164805 +0200 @@ -1,7 +1,7 @@ # # spec file for package mrsh # -# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2020 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -12,7 +12,7 @@ # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. -# Please submit bugfixes or comments via http://bugs.opensuse.org/ +# Please submit bugfixes or comments via https://bugs.opensuse.org/ # @@ -24,10 +24,11 @@ Version: 2.12 Release: 0 Summary: Remote shell program that uses munge authentication -License: GPL-2.0+ +License: GPL-2.0-or-later Group: Productivity/Clustering/Computing -Url: https://github.com/chaos/mrsh +URL: https://github.com/chaos/mrsh Source0: https://github.com/chaos/mrsh/archive/%{version}.tar.gz +Source1: README.SUSE Patch1: services-Do-not-require-non-standard-entries-in-etc-services.patch Patch2: mrlogin-Don-t-use-union-wait.patch Patch3: autogen.sh-Add-force-to-libtoolize.patch @@ -37,9 +38,9 @@ BuildRequires: pam-devel BuildRequires: pkg-config %if 0%{?have_systemd} -BuildRequires: systemd-devel -Requires(post): systemd +BuildRequires: pkgconfig(systemd) %endif +BuildRequires: fdupes # support re-run of autogen BuildRequires: autoconf @@ -52,36 +53,38 @@ Remote shell programs that use munge authentication rather than reserved ports for security. -%package -n %{name}-server +%package server Summary: Servers for remote access commands (mrsh, mrlogin, mrcp) Group: System/Daemons Requires: mrsh Requires: tcpd -%if 0%{!?have_systemd} +%if 0%{?have_systemd} +%{?systemd_ordering} +%else Requires: xinetd %endif -%description -n %{name}-server +%description server Server daemons for remote access commands (mrsh, mrlogin, mrcp) -%package -n %{name}-rsh-compat +%package rsh-compat Summary: Rsh compatibility package for mrcp/mrlogin/mrsh Group: System/Base Requires: mrsh = %version Provides: rsh Conflicts: otherproviders(rsh) -%description -n %{name}-rsh-compat +%description rsh-compat This package provides rsh compatibility for mrcp/mrlogin/mrsh -%package -n %{name}-rsh-server-compat +%package rsh-server-compat Summary: Rsh server compatibility package for mrlogind/mrshd Group: System/Daemons Requires: mrsh-server = %version Provides: rsh-server Conflicts: otherproviders(rsh-server) -%description -n %{name}-rsh-server-compat +%description rsh-server-compat This package provides rsh server compatibility for mrlogind/mrshd %prep @@ -90,6 +93,7 @@ %patch2 -p1 %patch3 -p1 %patch4 -p1 +cp %{S:1} . %build ./autogen.sh @@ -109,20 +113,23 @@ do sed -i 's#\(account\s\+include\s\+\)system-auth#\1common-account#' %{buildroot}/%{_sysconfdir}/pam.d/$i sed -i 's#\(session\s\+include\s\+\)system-auth#\1common-session#' %{buildroot}/%{_sysconfdir}/pam.d/$i + sed -i -e ':c;/pam_keyinit.so/bx' -e '$asession\toptional\tpam_keyinit.so\tforce revoke' \ + -e 'N;bc;:x;N;bx' %{buildroot}/%{_sysconfdir}/pam.d/$i done %if 0%{!?have_systemd} sed -i 's#disable\s*= yes#disable = no#' %{buildroot}/etc/xinetd.d/mrlogind sed -i 's#disable\s*= yes#disable = no#' %{buildroot}/etc/xinetd.d/mrshd %endif +%fdupes -s %{buildroot} %pre server %if 0%{?have_systemd} -%service_add_pre mrshd.socket mrlogind.socket +%service_add_pre mrshd.socket mrlogind.socket mrlogind@.service mrshd@.service %endif %post server %if 0%{?have_systemd} -%service_add_post mrshd.socket mrlogind.socket +%service_add_post mrshd.socket mrlogind.socket mrlogind@.service mrshd@.service %else %restart_on_update xinetd %endif @@ -133,19 +140,19 @@ %preun server %if 0%{?have_systemd} -%service_del_preun %{?service_arg:-f} mrshd.socket mrlogind.socket +%service_del_preun %{?service_arg:-n} mrshd.socket mrlogind.socket mrlogind@.service mrshd@.service %endif %postun server %if 0%{?have_systemd} -%service_del_postun %{?service_arg:-n} mrshd.socket mrlogind.socket +%service_del_postun %{?service_arg:-n} mrshd.socket mrlogind.socket mrlogind@.service mrshd@.service %else %restart_on_update xinetd %endif %files -%defattr(-,root,root) -%doc NEWS README ChangeLog COPYING DISCLAIMER DISCLAIMER.UC +%doc NEWS README ChangeLog +%license COPYING DISCLAIMER DISCLAIMER.UC %{_mandir}/man1/mrcp.1* %{_mandir}/man1/mrsh.1* %{_mandir}/man1/mrlogin.1* @@ -153,8 +160,8 @@ %{_bindir}/mrsh %{_bindir}/mrlogin -%files -n %{name}-server -%defattr(-,root,root) +%files server +%doc %{basename %{S:1}} %{!?have_systemd:%attr(644,root,root) %config(noreplace) /etc/xinetd.d/mrshd} %{!?have_systemd:%attr(644,root,root) %config(noreplace) /etc/xinetd.d/mrlogind} %attr(644,root,root) %config(noreplace) /etc/pam.d/mrsh @@ -167,8 +174,7 @@ %{_sbindir}/in.mrlogind %{_sbindir}/in.mrshd -%files -n %{name}-rsh-compat -%defattr(-,root,root) +%files rsh-compat %{_mandir}/man1/rcp.1* %{_mandir}/man1/rsh.1* %{_mandir}/man1/rlogin.1* @@ -176,8 +182,7 @@ %{_bindir}/rsh %{_bindir}/rlogin -%files -n %{name}-rsh-server-compat -%defattr(-,root,root) +%files rsh-server-compat %{_mandir}/man8/in.rlogind.8* %{_mandir}/man8/in.rshd.8* %{_mandir}/man8/rlogind.8* ++++++ README.SUSE ++++++ mrsh - Remote shell program that uses munge authentication ========================================================== 'mrshd' and 'mrlogind' require 'munge' authentication to be configured and running. Prequisites (if munge is not configured and running, yet) --------------------------------------------------------- 1. Create a system user and group 'munge' with an identical UID/GID on all participating machines: # groupadd -r --gid <GID> munge # useradd -r --uid <UID> --gid <GID> --home-dir /var/run/munge -s /bin/false -c "MUNGE authentication service" munge 2. Install 'munge' on these machines. # zypper in munge 3. Copy the munge key from one of these machines to all others: # scp /etc/munge/munge.key root@<target>:/etc/munge/munge.key 4. Start (and optionally enable) munge: # systemctl enable munge # systemctl start munge Steps (server side): -------------------- 1. Install package mrsh-server: # zypper install mrsh-server 2. Start (and optionally enable mrlogind and mrshd: # systemctl enable mrlogind.socket # systemctl start mrlogind.socket # systemctl enable mrshd.socket # systemctl start mrshd.socket Steps (client side): -------------------- 1. Install package mrsh: # zypper install mrsh