Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package nagios for openSUSE:Factory checked 
in at 2022-05-25 20:35:03
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/nagios (Old)
 and      /work/SRC/openSUSE:Factory/.nagios.new.2254 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "nagios"

Wed May 25 20:35:03 2022 rev:22 rq:979137 version:4.4.7

Changes:
--------
--- /work/SRC/openSUSE:Factory/nagios/nagios.changes    2021-10-29 
22:35:42.395715511 +0200
+++ /work/SRC/openSUSE:Factory/.nagios.new.2254/nagios.changes  2022-05-25 
20:35:50.936335373 +0200
@@ -1,0 +2,17 @@
+Fri May 13 20:57:58 UTC 2022 - Andre Klaerner <[email protected]>
+
+- 4.4.7 - 2022-04-14
+  FIXES
+  * Fixed checkboxes in jsonquery.html (#778) (Rfferrao87)
+  * Added SSL support for version update check (Sebastian Wolf)
+  * Note: NEB modules using the priority/scheduling queues in libnagios may 
need to update headers due to symbol conflicts with OpenSSL.
+  * Fixed XSS in homepage when displaying update check results (Sebastian Wolf)
+  * Fixed allocation error in getcgi.c (#820) (Ariadne Conill)
+  * Fixed Error: NULL variable for lines of spaces in resource.cfg (#814) 
(Ralf Herrmann)
+  * Fixed crash when handling large check output (#825, #828) (Kilvador)
+  * Update packaging instructions for RPM/EPEL (#850) (T.J. Yang)
+  * Include packaging instructions for DEB (#842) (Catfriend1)
+  * Fixed CGI object processing when names end in \ (#819) (Sebastian Wolf)
+  * $SERVICEPROBLEMID$ now accessible when notifications are sent (#688) 
(Sebastian Wolf)
+
+-------------------------------------------------------------------

Old:
----
  nagios-4.4.6.tar.gz

New:
----
  nagios-4.4.7.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ nagios.spec ++++++
--- /var/tmp/diff_new_pack.EtIgvY/_old  2022-05-25 20:35:51.564336250 +0200
+++ /var/tmp/diff_new_pack.EtIgvY/_new  2022-05-25 20:35:51.568336255 +0200
@@ -30,7 +30,7 @@
 %endif
 
 Name:           nagios
-Version:        4.4.6
+Version:        4.4.7
 Release:        0
 Summary:        The Nagios Network Monitor
 License:        GPL-2.0-or-later
@@ -233,7 +233,7 @@
 may compile against.
 
 %prep
-%setup -q -n nagioscore-%{name}-%{version}
+%setup -q
 %patch3 -p1
 %patch4 -p1
 %patch11 -p1

++++++ nagios-4.4.6.tar.gz -> nagios-4.4.7.tar.gz ++++++
/work/SRC/openSUSE:Factory/nagios/nagios-4.4.6.tar.gz 
/work/SRC/openSUSE:Factory/.nagios.new.2254/nagios-4.4.7.tar.gz differ: char 5, 
line 1

++++++ nagios-disable_phone_home.patch ++++++
--- /var/tmp/diff_new_pack.EtIgvY/_old  2022-05-25 20:35:51.648336367 +0200
+++ /var/tmp/diff_new_pack.EtIgvY/_new  2022-05-25 20:35:51.652336373 +0200
@@ -1,8 +1,7 @@
-Index: nagios-4.4.2/base/utils.c
-===================================================================
---- nagios-4.4.2.orig/base/utils.c
-+++ nagios-4.4.2/base/utils.c
-@@ -3297,122 +3297,6 @@ int check_for_nagios_updates(int force,
+diff --unified -r nagios-4.4.7-orig/base/utils.c nagios-4.4.7/base/utils.c
+--- nagios-4.4.7-orig/base/utils.c     2022-04-14 16:19:37.000000000 +0200
++++ nagios-4.4.7/base/utils.c  2022-05-13 19:58:24.615532600 +0200
+@@ -3322,142 +3322,6 @@
  
  /* checks for updates at api.nagios.org */
  int query_update_api(void) {
@@ -62,6 +61,26 @@
 -        abort();
 -      }
 -
+-#ifdef HAVE_SSL
+-      SSL *ssl;
+-      SSL_CTX *ctx;
+-
+-      int result = my_ssl_connect(api_server, 443, &sd, &ssl, &ctx, 2);
+-      if(sd > 0 && result != ERROR) {
+-              /* send request */
+-              send_len = strlen(buf);
+-              my_ssl_sendall(sd, ssl, buf, &send_len, 2);
+-
+-              /* get response */
+-              recv_len = sizeof(recv_buf);
+-              my_ssl_recvall(sd, ssl, recv_buf, &recv_len, 2);
+-              recv_buf[sizeof(recv_buf) - 1] = '\x0';
+-
+-              /* close connection */
+-              SSL_free(ssl);
+-              SSL_CTX_free(ctx);
+-              close(sd);
+-#else 
 -      my_tcp_connect(api_server, 80, &sd, 2);
 -      if(sd > 0) {
 -              /* send request */
@@ -75,7 +94,7 @@
 -
 -              /* close connection */
 -              close(sd);
--
+-#endif
 -              /* parse the result */
 -              in_header = TRUE;
 -              while((ptr = get_next_string_from_buf(recv_buf, &buf_index, 
sizeof(recv_buf)))) {

Reply via email to