Hello community,

here is the log from the commit of package NetworkManager for openSUSE:Factory 
checked in at 2016-04-07 13:36:33
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/NetworkManager (Old)
 and      /work/SRC/openSUSE:Factory/.NetworkManager.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "NetworkManager"

Changes:
--------
--- /work/SRC/openSUSE:Factory/NetworkManager/NetworkManager.changes    
2016-03-26 15:08:10.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.NetworkManager.new/NetworkManager.changes       
2016-04-07 13:36:34.000000000 +0200
@@ -1,0 +2,55 @@
+Tue Apr  5 05:44:30 UTC 2016 - [email protected]
+
+- nm-treat-not-saved-secrets-just-like-agent-owned-when-cl.diff
+  rebased.
+
+-------------------------------------------------------------------
+Sat Apr  2 14:57:56 UTC 2016 - [email protected]
+
+_ Update to version 1.0.12:
+  + DHCP leases on software devices are now renewed when the
+    computer is awoken from suspend.
+  + Improved ifupdown plugin robustness and interoperability on
+    Yocto and OpenEmbedded.
+  + Fixed failed VPN activations when plugin supports interactive
+    mode, but the VPN daemon does not.
+  + Wi-Fi monitor interfaces are now ignored, not turned into
+    managed mode.
+  + AP and AdHoc mode connections with manual IP configuration are
+    now able to autoconnect.
+  + Broken device drivers (AWS ENI) that initially have invalid
+    MAC addresses are now properly managed as soon as correct MAC
+    address is set.
+  + WWAN devices are unlocked a bit earlier so that supported IP
+    versions can be queried.
+  + The NetworkManager.service was ordered after
+    network-pre.target and dbus.service. This ensures
+    NetworkManager doesn't set up connectivity before firewall
+    rules are in place and wouldn't exit before remote filesystems
+    can be umounted ensuring orderly operation of systemd managed
+    installations.
+  + The netfilter rules used with shared IPv4 method are now
+    removed on exit.
+  + Ability to manage USB gadget drivers (UDC side) has beed
+    added.
+  + Infiniband transport mode change now takes place with the link
+    set down because some drivers need that.
+  + Race conditions that could disclose connection secrets to
+    authenticated local users when changing ifcfg and keyfile
+    connections have been fixed.  This has security impact of low
+    severity (CVE-2016-0764).
+  + A handful of memory leak and crasher bugs of minor importance
+    have been fixed.
+- Drop patches incorporated upstream:
+  - NetworkManager-openvpn-route-configuration.patch.
+  - nm-ppp-manager-clear-ppp_watch_id.patch.
+  - nm-update-ip_iface-only-if-IP-interface-exists.patch.
+- Rebase systemd-network-config.patch for updated version.
+
+-------------------------------------------------------------------
+Fri Apr  1 07:23:17 UTC 2016 - [email protected]
+
+- nm-don-t-consider-not-needed-secrets-for-has_system_secr.diff
+  rebased.
+
+-------------------------------------------------------------------

Old:
----
  NetworkManager-1.0.10.tar.xz
  NetworkManager-openvpn-route-configuration.patch
  nm-ppp-manager-clear-ppp_watch_id.patch
  nm-update-ip_iface-only-if-IP-interface-exists.patch

New:
----
  NetworkManager-1.0.12.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ NetworkManager.spec ++++++
--- /var/tmp/diff_new_pack.qjB39V/_old  2016-04-07 13:36:35.000000000 +0200
+++ /var/tmp/diff_new_pack.qjB39V/_new  2016-04-07 13:36:35.000000000 +0200
@@ -26,7 +26,7 @@
 
 Name:           NetworkManager
 Url:            http://www.gnome.org/projects/NetworkManager/
-Version:        1.0.10
+Version:        1.0.12
 Release:        0
 Summary:        Network Link Manager and User Applications
 License:        GPL-2.0+
@@ -38,20 +38,14 @@
 Source99:       NetworkManager-rpmlintrc
 # PATCH-FEATURE-OPENSUSE systemd-network-config.patch -- don't try to start NM 
under systemd if it is disabled in system configuration
 Patch0:         systemd-network-config.patch
-# PATCH-NEEDS-REBASE 
nm-don-t-consider-not-needed-secrets-for-has_system_secr.diff [email protected] 
-- avoid polkit popups for 802.11x (WAS: PATCH-HACK-OPENSUSE)
+# PATCH-HACK-OPENSUSE 
nm-don-t-consider-not-needed-secrets-for-has_system_secr.diff [email protected] 
-- avoid polkit popups for 802.11x
 Patch3:         nm-don-t-consider-not-needed-secrets-for-has_system_secr.diff
-# PATCH-NEEDS-REBASE 
nm-treat-not-saved-secrets-just-like-agent-owned-when-cl.diff [email protected] 
-- avoid polkit popups for 802.11x (WAS: PATCH-HACK-OPENSUSE)
+# PATCH-HACK-OPENSUSE 
nm-treat-not-saved-secrets-just-like-agent-owned-when-cl.diff [email protected] 
-- avoid polkit popups for 802.11x
 Patch4:         nm-treat-not-saved-secrets-just-like-agent-owned-when-cl.diff
 # PATCH-FIX-UPSTREAM nm-probe-radius-server-cert.patch bnc#574266 
[email protected] -- Probe the RADIUS server certificate
 Patch5:         nm-probe-radius-server-cert.patch
 # PATCH-FIX-OPENSUSE NetworkManager-geoclue-interaction.patch 
[email protected] -- Allow the user "srvGeoClue" to query NetworkManager on 
the dbus
 Patch6:         NetworkManager-geoclue-interaction.patch
-# PATCH-FIX-UPSTREAM NetworkManager-openvpn-route-configuration.patch 
[email protected] -- Fix routes not being applied when connecting to openvpn
-Patch7:         NetworkManager-openvpn-route-configuration.patch
-# PATCH-FIX-UPSTREAM nm-ppp-manager-clear-ppp_watch_id.patch 
[email protected] -- ppp-manager: clear @ppp_watch_id upon pppd termination
-Patch8:         nm-ppp-manager-clear-ppp_watch_id.patch
-# PATCH-FIX-UPSTREAM nm-update-ip_iface-only-if-IP-interface-exists.patch 
rh#1268617 [email protected] -- If @ip_ifindex is zero, the IP interface has 
disappeared and there's no point in updating @ip_iface.
-Patch9:         nm-update-ip_iface-only-if-IP-interface-exists.patch
 BuildRequires:  fdupes
 BuildRequires:  gobject-introspection-devel
 BuildRequires:  gtk-doc
@@ -248,15 +242,12 @@
 %setup -n %{name}-%{version} -q
 translation-update-upstream
 %patch0 -p1
-#patch3 -p1
-#patch4 -p1
+%patch3 -p1
+%patch4 -p1
 %if %{with_cacert_patch}
 %patch5 -p1
 %endif
 %patch6 -p1
-%patch7 -p1
-%patch8 -p1
-%patch9 -p1
 
 %build
 pppddir=`ls -1d /usr/%_lib/pppd/2*`

++++++ NetworkManager-1.0.10.tar.xz -> NetworkManager-1.0.12.tar.xz ++++++
++++ 4354 lines of diff (skipped)

++++++ nm-don-t-consider-not-needed-secrets-for-has_system_secr.diff ++++++
--- /var/tmp/diff_new_pack.qjB39V/_old  2016-04-07 13:36:37.000000000 +0200
+++ /var/tmp/diff_new_pack.qjB39V/_new  2016-04-07 13:36:37.000000000 +0200
@@ -7,11 +7,11 @@
  src/settings/nm-agent-manager.c |   56 +++++++++++++++++++++++++++++++++++---
  1 files changed, 51 insertions(+), 5 deletions(-)
 
-Index: NetworkManager-0.9.8.0/src/settings/nm-agent-manager.c
+Index: NetworkManager-1.0.10/src/settings/nm-agent-manager.c
 ===================================================================
---- NetworkManager-0.9.8.0.orig/src/settings/nm-agent-manager.c
-+++ NetworkManager-0.9.8.0/src/settings/nm-agent-manager.c
-@@ -847,6 +847,11 @@ get_agent_modify_auth_cb (NMAuthChain *c
+--- NetworkManager-1.0.10.orig/src/settings/nm-agent-manager.c
++++ NetworkManager-1.0.10/src/settings/nm-agent-manager.c
+@@ -983,6 +983,11 @@ get_agent_modify_auth_cb (NMAuthChain *c
        nm_auth_chain_unref (chain);
  }
  
@@ -23,7 +23,7 @@
  static void
  check_system_secrets_cb (NMSetting *setting,
                           const char *key,
-@@ -855,11 +860,17 @@ check_system_secrets_cb (NMSetting *sett
+@@ -991,11 +996,17 @@ check_system_secrets_cb (NMSetting *sett
                           gpointer user_data)
  {
        NMSettingSecretFlags secret_flags = NM_SETTING_SECRET_FLAG_NONE;
@@ -42,7 +42,7 @@
        /* Clear out system-owned or always-ask secrets */
        if (NM_IS_SETTING_VPN (setting) && !strcmp (key, 
NM_SETTING_VPN_SECRETS)) {
                GHashTableIter iter;
-@@ -871,21 +882,44 @@ check_system_secrets_cb (NMSetting *sett
+@@ -1007,22 +1018,45 @@ check_system_secrets_cb (NMSetting *sett
                        secret_flags = NM_SETTING_SECRET_FLAG_NONE;
                        nm_setting_get_secret_flags (setting, secret_name, 
&secret_flags, NULL);
                        if (secret_flags == NM_SETTING_SECRET_FLAG_NONE)
@@ -50,7 +50,8 @@
 +                              has_system = TRUE;
                }
        } else {
-               nm_setting_get_secret_flags (setting, key, &secret_flags, NULL);
+               if (!nm_setting_get_secret_flags (setting, key, &secret_flags, 
NULL))
+                       g_return_if_reached ();
                if (secret_flags == NM_SETTING_SECRET_FLAG_NONE)
 -                      *has_system = TRUE;
 +                      has_system = TRUE;
@@ -90,16 +91,15 @@
        return has_system;
  }
  
-@@ -894,20 +928,32 @@ get_next_cb (Request *req)
- {
+@@ -1032,19 +1066,31 @@ get_next_cb (Request *parent)
+       ConnectionRequest *req = (ConnectionRequest *) parent;
        NMSettingConnection *s_con;
        const char *agent_dbus_owner, *perm;
 +      gboolean has_system = FALSE;
  
-       if (!next_generic (req, "getting"))
-               return;
+       req->current_has_modify = FALSE;
  
-       agent_dbus_owner = nm_secret_agent_get_dbus_owner (NM_SECRET_AGENT 
(req->current));
+       agent_dbus_owner = nm_secret_agent_get_dbus_owner (parent->current);
  
 +      has_system = has_system_secrets (req->connection);
 +      nm_log_dbg (LOGD_AGENTS, "flags %d, existing %p, has_system %d",
@@ -118,9 +118,9 @@
 +       * should simply fail then. Setting new secrets is a job for
 +       * the connection edit dialog.
 +       */
-       if (   (req->flags != NM_SETTINGS_GET_SECRETS_FLAG_NONE)
+       if (   (req->flags != NM_SECRET_AGENT_GET_SECRETS_FLAG_NONE)
 -          && (req->existing_secrets || has_system_secrets (req->connection))) 
{
 +          && (req->existing_secrets || has_system)) {
-               nm_log_dbg (LOGD_AGENTS, "(%p/%s) request has system secrets; 
checking agent %s for MODIFY",
-                           req, req->setting_name, agent_dbus_owner);
+               nm_log_dbg (LOGD_AGENTS, "(%p/%s/%s) request has system 
secrets; checking agent %s for MODIFY",
+                           req, parent->detail, req->setting_name, 
agent_dbus_owner);
  

++++++ nm-treat-not-saved-secrets-just-like-agent-owned-when-cl.diff ++++++
--- /var/tmp/diff_new_pack.qjB39V/_old  2016-04-07 13:36:37.000000000 +0200
+++ /var/tmp/diff_new_pack.qjB39V/_new  2016-04-07 13:36:37.000000000 +0200
@@ -1,17 +1,8 @@
-From b4ccaf268f1c32d09df8f678dcf4c296f9b2b213 Mon Sep 17 00:00:00 2001
-From: Ludwig Nussel <[email protected]>
-Date: Tue, 27 Sep 2011 12:34:11 +0200
-Subject: [PATCH 2/3] treat not saved secrets just like agent owned when 
cleaning
-
----
- src/settings/nm-settings-connection.c |    2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-Index: NetworkManager-0.9.8.0/src/settings/nm-settings-connection.c
+Index: NetworkManager-1.0.10/src/settings/nm-settings-connection.c
 ===================================================================
---- NetworkManager-0.9.8.0.orig/src/settings/nm-settings-connection.c
-+++ NetworkManager-0.9.8.0/src/settings/nm-settings-connection.c
-@@ -592,7 +592,7 @@ clear_nonagent_secrets (GHashTableIter *
+--- NetworkManager-1.0.10.orig/src/settings/nm-settings-connection.c
++++ NetworkManager-1.0.10/src/settings/nm-settings-connection.c
+@@ -732,7 +732,7 @@ clear_nonagent_secrets (GHashTableIter *
                          NMSettingSecretFlags flags,
                          gpointer user_data)
  {

++++++ systemd-network-config.patch ++++++
--- /var/tmp/diff_new_pack.qjB39V/_old  2016-04-07 13:36:37.000000000 +0200
+++ /var/tmp/diff_new_pack.qjB39V/_new  2016-04-07 13:36:37.000000000 +0200
@@ -1,16 +1,16 @@
-Index: NetworkManager-0.9.10.0/data/NetworkManager.service.in
+Index: NetworkManager-1.0.12/data/NetworkManager.service.in
 ===================================================================
---- NetworkManager-0.9.10.0.orig/data/NetworkManager.service.in
-+++ NetworkManager-0.9.10.0/data/NetworkManager.service.in
+--- NetworkManager-1.0.12.orig/data/NetworkManager.service.in
++++ NetworkManager-1.0.12/data/NetworkManager.service.in
 @@ -1,6 +1,6 @@
  [Unit]
  Description=Network Manager
 -Wants=network.target
 +Wants=remote-fs.target network.target
+ After=network-pre.target dbus.service
  Before=network.target @DISTRO_NETWORK_SERVICE@
  
- [Service]
-@@ -12,6 +12,6 @@ KillMode=process
+@@ -15,6 +15,6 @@ KillMode=process
  
  [Install]
  WantedBy=multi-user.target
@@ -18,10 +18,10 @@
 +Alias=network.service
  Also=NetworkManager-dispatcher.service
  
-Index: NetworkManager-0.9.10.0/data/NetworkManager-wait-online.service.in
+Index: NetworkManager-1.0.12/data/NetworkManager-wait-online.service.in
 ===================================================================
---- NetworkManager-0.9.10.0.orig/data/NetworkManager-wait-online.service.in
-+++ NetworkManager-0.9.10.0/data/NetworkManager-wait-online.service.in
+--- NetworkManager-1.0.12.orig/data/NetworkManager-wait-online.service.in
++++ NetworkManager-1.0.12/data/NetworkManager-wait-online.service.in
 @@ -7,7 +7,9 @@ Before=network.target network-online.tar
  
  [Service]


Reply via email to