Hello community,

here is the log from the commit of package procps for openSUSE:Factory checked 
in at 2012-07-09 13:30:34
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/procps (Old)
 and      /work/SRC/openSUSE:Factory/.procps.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "procps", Maintainer is "wer...@suse.com"

Changes:
--------
--- /work/SRC/openSUSE:Factory/procps/procps.changes    2012-06-07 
15:39:29.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.procps.new/procps.changes       2012-07-09 
13:30:37.000000000 +0200
@@ -1,0 +2,6 @@
+Thu Jul  5 08:13:42 UTC 2012 - wer...@suse.de
+
+- Allow numeric user ids in top even if it does not exist in passwd
+  as such an id may listed due an uid from an chroot environment
+
+-------------------------------------------------------------------

New:
----
  procps-v3.3.3-chroot.diff

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ procps.spec ++++++
--- /var/tmp/diff_new_pack.dgyjae/_old  2012-07-09 13:30:39.000000000 +0200
+++ /var/tmp/diff_new_pack.dgyjae/_new  2012-07-09 13:30:39.000000000 +0200
@@ -17,6 +17,7 @@
 
 
 %bcond_with     bin2usr
+
 Name:           procps
 BuildRequires:  automake
 BuildRequires:  libselinux-devel
@@ -59,6 +60,7 @@
 Patch19:        procps-v3.3.3-large_pcpu.patch
 Patch20:        procps-v3.3.3-tinfo.dif
 Patch21:        procps-v3.3.3-pwdx.patch
+Patch22:        procps-v3.3.3-chroot.diff
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -122,6 +124,7 @@
 %patch19
 %patch20
 %patch21
+%patch22
 
 %build
 sh po/update-potfiles

++++++ procps-v3.3.3-chroot.diff ++++++
--- top/top.c
+++ top/top.c   2012-07-05 07:51:02.384012773 +0000
@@ -1151,9 +1151,15 @@ static const char *user_certify (WIN_t *
    Monpidsidx = 0;
    if (*str) {
       num = (uid_t)strtoul(str, &endp, 0);
-      if ('\0' == *endp)
+      if ('\0' == *endp) {
          pwd = getpwuid(num);
-      else
+         if (!pwd) {
+            /* Allow foreign users from e.g. within chroot environment */
+            q->usrseluid = num;
+            q->usrseltyp = typ;
+            return NULL;
+        }
+      } else
          pwd = getpwnam(str);
       if (!pwd) return N_txt(BAD_username_txt);
       q->usrseluid = pwd->pw_uid;
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to