Date: Wednesday, April 26, 2017 @ 19:01:56
  Author: jsteel
Revision: 225714

upgpkg: nrpe 3.1.0-1

Modified:
  nrpe/trunk/PKGBUILD
Deleted:
  nrpe/trunk/nrpe-0010-opensslv110-strict.patch
  nrpe/trunk/nrpe-0011-opensslv110-nosslv2.patch

-------------------------------------+
 PKGBUILD                            |   18 +----
 nrpe-0010-opensslv110-strict.patch  |   54 ----------------
 nrpe-0011-opensslv110-nosslv2.patch |  113 ----------------------------------
 3 files changed, 4 insertions(+), 181 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD    2017-04-26 19:01:47 UTC (rev 225713)
+++ PKGBUILD    2017-04-26 19:01:56 UTC (rev 225714)
@@ -3,8 +3,8 @@
 # Contributor: Dale Blount <[email protected]>
 
 pkgname=nrpe
-pkgver=3.0.1
-pkgrel=4
+pkgver=3.1.0
+pkgrel=1
 pkgdesc="Nagios Remote Plugin Executor"
 arch=('i686' 'x86_64')
 license=('GPL')
@@ -13,19 +13,9 @@
 install=$pkgname.install
 backup=('etc/nrpe/nrpe.cfg' 'etc/xinetd.d/nrpe')
 url="https://github.com/NagiosEnterprises/nrpe";
-source=(https://github.com/NagiosEnterprises/nrpe/releases/download/$pkgver/$pkgname-$pkgver.tar.gz
-        nrpe-0010-opensslv110-strict.patch
-        nrpe-0011-opensslv110-nosslv2.patch)
-sha256sums=('8f56da2d74f6beca1a04fe04ead84427e582b9bb88611e04e290f59617ca3ea3'
-            '58ca691a11f5005631f4e940daa18c344b3d2f322184506d63cc1eb2633d30a3'
-            'e4383c8261b7097a46d8fe54c97391767a4ef0107d551f55d71940469f5e433f')
+source=(https://github.com/NagiosEnterprises/nrpe/releases/download/release-$pkgver/$pkgname-$pkgver.tar.gz)
+md5sums=('ad9208ef4938449986cb5c5ba094598e')
 
-prepare() {
-  cd $pkgname-$pkgver
-  patch -Np1 -i ../nrpe-0010-opensslv110-strict.patch
-  patch -Np1 -i ../nrpe-0011-opensslv110-nosslv2.patch
-}
-
 build() {
   cd $pkgname-$pkgver
 

Deleted: nrpe-0010-opensslv110-strict.patch
===================================================================
--- nrpe-0010-opensslv110-strict.patch  2017-04-26 19:01:47 UTC (rev 225713)
+++ nrpe-0010-opensslv110-strict.patch  2017-04-26 19:01:56 UTC (rev 225714)
@@ -1,54 +0,0 @@
-diff -up ./src/check_nrpe.c.opensslv110 ./src/check_nrpe.c
---- ./src/check_nrpe.c.opensslv110     2017-02-07 11:08:23.647733686 -0500
-+++ ./src/check_nrpe.c 2017-02-07 12:44:22.314160593 -0500
-@@ -980,9 +980,10 @@ int connect_to_remote()
-                       if (peer) {
-                               if (sslprm.log_opts & SSL_LogIfClientCert)
-                                       syslog(LOG_NOTICE, "SSL %s has %s 
certificate",
--                                                 rem_host, peer->valid ? "a 
valid" : "an invalid");
-+                                             rem_host, 
SSL_get_verify_result(ssl) ? "a valid" : "an invalid");
-                               if (sslprm.log_opts & SSL_LogCertDetails) {
--                                      syslog(LOG_NOTICE, "SSL %s Cert Name: 
%s", rem_host, peer->name);
-+                                      
X509_NAME_oneline(X509_get_subject_name(peer), buffer, sizeof(buffer));
-+                                      syslog(LOG_NOTICE, "SSL %s Cert Name: 
%s", rem_host, buffer);
-                                       
X509_NAME_oneline(X509_get_issuer_name(peer), buffer, sizeof(buffer));
-                                       syslog(LOG_NOTICE, "SSL %s Cert Issuer: 
%s", rem_host, buffer);
-                               }
-@@ -1427,7 +1428,7 @@ int verify_callback(int preverify_ok, X5
-       ssl = X509_STORE_CTX_get_ex_data(ctx, 
SSL_get_ex_data_X509_STORE_CTX_idx());
- 
-       X509_NAME_oneline(X509_get_subject_name(err_cert), name, 256);
--      X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert), issuer, 256);
-+      X509_NAME_oneline(X509_get_issuer_name(err_cert), issuer, 256);
- 
-       if (!preverify_ok && sslprm.client_certs >= Ask_For_Cert
-               && (sslprm.log_opts & SSL_LogCertDetails)) {
-diff -up ./src/nrpe.c.opensslv110 ./src/nrpe.c
---- ./src/nrpe.c.opensslv110   2016-09-08 12:18:58.000000000 -0400
-+++ ./src/nrpe.c       2017-02-07 12:42:35.667799987 -0500
-@@ -614,7 +614,7 @@ int verify_callback(int preverify_ok, X5
-       ssl = X509_STORE_CTX_get_ex_data(ctx, 
SSL_get_ex_data_X509_STORE_CTX_idx());
- 
-       X509_NAME_oneline(X509_get_subject_name(err_cert), name, 256);
--      X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert), issuer, 256);
-+      X509_NAME_oneline(err_cert, issuer, 256);
- 
-       if (!preverify_ok && (sslprm.log_opts & SSL_LogCertDetails)) {
-               syslog(LOG_ERR, "SSL Client has an invalid certificate: %s 
(issuer=%s) err=%d:%s",
-@@ -1785,12 +1785,14 @@ int handle_conn_ssl(int sock, void *ssl_
-               peer = SSL_get_peer_certificate(ssl);
- 
-               if (peer) {
-+
-                       if (sslprm.log_opts & SSL_LogIfClientCert)
-                               syslog(LOG_NOTICE, "SSL Client %s has %svalid 
certificate",
--                                         remote_host, peer->valid ? "a " : 
"an in");
-+                                     remote_host, SSL_get_verify_result(ssl) 
? "a " : "an in");
-                       if (sslprm.log_opts & SSL_LogCertDetails) {
-+                              X509_NAME_oneline(X509_get_subject_name(peer), 
buffer, sizeof(buffer));
-                               syslog(LOG_NOTICE, "SSL Client %s Cert Name: 
%s",
--                                         remote_host, peer->name);
-+                                         remote_host, buffer);
-                               X509_NAME_oneline(X509_get_issuer_name(peer), 
buffer, sizeof(buffer));
-                               syslog(LOG_NOTICE, "SSL Client %s Cert Issuer: 
%s",
-                                          remote_host, buffer);

Deleted: nrpe-0011-opensslv110-nosslv2.patch
===================================================================
--- nrpe-0011-opensslv110-nosslv2.patch 2017-04-26 19:01:47 UTC (rev 225713)
+++ nrpe-0011-opensslv110-nosslv2.patch 2017-04-26 19:01:56 UTC (rev 225714)
@@ -1,113 +0,0 @@
-diff -up ./src/check_nrpe.c.opensslv110_nossl2 ./src/check_nrpe.c
---- ./src/check_nrpe.c.opensslv110_nossl2      2017-02-07 13:51:02.848680596 
-0500
-+++ ./src/check_nrpe.c 2017-02-07 13:56:14.134901320 -0500
-@@ -64,7 +64,7 @@ int use_ssl = FALSE;
- 
- /* SSL/TLS parameters */
- typedef enum _SSL_VER {
--      SSL_Ver_Invalid = 0, SSLv2 = 1, SSLv2_plus, SSLv3, SSLv3_plus,
-+      SSL_Ver_Invalid = 0, SSLv3=3, SSLv3_plus,
-       TLSv1, TLSv1_plus, TLSv1_1, TLSv1_1_plus, TLSv1_2, TLSv1_2_plus
- } SslVer;
- 
-@@ -402,11 +402,7 @@ int process_arguments(int argc, char **a
-                                                               "overrides the 
config file option.");
-                               break;
-                       }
--                      if (!strcmp(optarg, "SSLv2"))
--                              sslprm.ssl_min_ver = SSLv2;
--                      else if (!strcmp(optarg, "SSLv2+"))
--                              sslprm.ssl_min_ver = SSLv2_plus;
--                      else if (!strcmp(optarg, "SSLv3"))
-+                      if (!strcmp(optarg, "SSLv3"))
-                               sslprm.ssl_min_ver = SSLv3;
-                       else if (!strcmp(optarg, "SSLv3+"))
-                               sslprm.ssl_min_ver = SSLv3_plus;
-@@ -665,8 +661,8 @@ void usage(int result)
-               printf("                2 = Force Anonymous Diffie Hellman\n");
-               printf(" <size>       = Specify non-default payload size for 
NSClient++\n");
-               printf
--                      (" <ssl ver>    = The SSL/TLS version to use. Can be 
any one of: SSLv2 (only),\n");
--              printf("                SSLv2+ (or above), SSLv3 (only), SSLv3+ 
(or above),\n");
-+                      (" <ssl ver>    = The SSL/TLS version to use. Can be 
any one of: \n");
-+              printf("                SSLv3 (only), SSLv3+ (or above),\n");
-               printf("                TLSv1 (only), TLSv1+ (or above 
DEFAULT), TLSv1.1 (only),\n");
-               printf("                TLSv1.1+ (or above), TLSv1.2 (only), 
TLSv1.2+ (or above)\n");
-               printf(" <cipherlist> = The list of SSL ciphers to use 
(currently defaults\n");
-@@ -736,12 +732,6 @@ void setup_ssl()
-                          sslprm.allowDH == 0 ? "No" : (sslprm.allowDH == 1 ? 
"Allow" : "Require"));
-               syslog(LOG_INFO, "SSL Log Options: 0x%02x", sslprm.log_opts);
-               switch (sslprm.ssl_min_ver) {
--              case SSLv2:
--                      val = "SSLv2";
--                      break;
--              case SSLv2_plus:
--                      val = "SSLv2 And Above";
--                      break;
-               case SSLv3:
-                       val = "SSLv3";
-                       break;
-@@ -779,10 +769,6 @@ void setup_ssl()
-               SSL_library_init();
-               meth = SSLv23_client_method();
- 
--# ifndef OPENSSL_NO_SSL2
--              if (sslprm.ssl_min_ver == SSLv2)
--                      meth = SSLv2_client_method();
--# endif
- # ifndef OPENSSL_NO_SSL3
-               if (sslprm.ssl_min_ver == SSLv3)
-                       meth = SSLv3_client_method();
-diff -up ./src/nrpe.c.opensslv110_nossl2 ./src/nrpe.c
---- ./src/nrpe.c.opensslv110_nossl2    2017-02-07 13:51:02.849680580 -0500
-+++ ./src/nrpe.c       2017-02-07 13:51:02.851680549 -0500
-@@ -109,7 +109,7 @@ int       listen_queue_size = DEFAULT_LI
- 
- /* SSL/TLS parameters */
- typedef enum _SSL_VER {
--      SSLv2 = 1, SSLv2_plus, SSLv3, SSLv3_plus, TLSv1,
-+      SSLv3=3, SSLv3_plus, TLSv1,
-       TLSv1_plus, TLSv1_1, TLSv1_1_plus, TLSv1_2, TLSv1_2_plus
- } SslVer;
- 
-@@ -278,10 +278,10 @@ void init_ssl(void)
-                       }
-               }
-       }
--# ifndef OPENSSL_NO_SSL2
--      if (sslprm.ssl_min_ver == SSLv2)
--              meth = SSLv2_server_method();
--# endif
-+
-+
-+
-+
- # ifndef OPENSSL_NO_SSL3
-       if (sslprm.ssl_min_ver == SSLv3)
-               meth = SSLv3_server_method();
-@@ -385,12 +385,6 @@ void log_ssl_startup(void)
-                                                                               
                         1 ? "Accept" : "Require"));
-       syslog(LOG_INFO, "SSL Log Options: 0x%02x", sslprm.log_opts);
-       switch (sslprm.ssl_min_ver) {
--      case SSLv2:
--              vers = "SSLv2";
--              break;
--      case SSLv2_plus:
--              vers = "SSLv2 And Above";
--              break;
-       case SSLv3:
-               vers = "SSLv3";
-               break;
-@@ -796,11 +790,7 @@ int read_config_file(char *filename)
-                       }
- 
-               } else if (!strcmp(varname, "ssl_version")) {
--                      if (!strcmp(varvalue, "SSLv2"))
--                              sslprm.ssl_min_ver = SSLv2;
--                      else if (!strcmp(varvalue, "SSLv2+"))
--                              sslprm.ssl_min_ver = SSLv2_plus;
--                      else if (!strcmp(varvalue, "SSLv3"))
-+                      if (!strcmp(varvalue, "SSLv3"))
-                               sslprm.ssl_min_ver = SSLv3;
-                       else if (!strcmp(varvalue, "SSLv3+"))
-                               sslprm.ssl_min_ver = SSLv3_plus;

Reply via email to