Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package yast2-vpn for openSUSE:Factory checked in at 2023-05-10 16:20:02 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/yast2-vpn (Old) and /work/SRC/openSUSE:Factory/.yast2-vpn.new.1533 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "yast2-vpn" Wed May 10 16:20:02 2023 rev:19 rq:1086052 version:4.6.1 Changes: -------- --- /work/SRC/openSUSE:Factory/yast2-vpn/yast2-vpn.changes 2023-03-03 22:32:10.964229673 +0100 +++ /work/SRC/openSUSE:Factory/.yast2-vpn.new.1533/yast2-vpn.changes 2023-05-10 16:20:04.495524995 +0200 @@ -1,0 +2,7 @@ +Wed Apr 5 15:50:35 UTC 2023 - Mohd Saquib <[email protected]> + +- Fixed an issue where yast2-vpn module breaks when strongswan is + updated to version >= 5.8.0 (boo#1176735) +- 4.6.1 + +------------------------------------------------------------------- Old: ---- yast2-vpn-4.6.0.tar.bz2 New: ---- yast2-vpn-4.6.1.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ yast2-vpn.spec ++++++ --- /var/tmp/diff_new_pack.CR698G/_old 2023-05-10 16:20:05.019528095 +0200 +++ /var/tmp/diff_new_pack.CR698G/_new 2023-05-10 16:20:05.027528142 +0200 @@ -17,7 +17,7 @@ Name: yast2-vpn -Version: 4.6.0 +Version: 4.6.1 Release: 0 URL: https://github.com/yast/yast-vpn Source0: %{name}-%{version}.tar.bz2 ++++++ yast2-vpn-4.6.0.tar.bz2 -> yast2-vpn-4.6.1.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-vpn-4.6.0/package/yast2-vpn.changes new/yast2-vpn-4.6.1/package/yast2-vpn.changes --- old/yast2-vpn-4.6.0/package/yast2-vpn.changes 2023-03-03 16:04:12.000000000 +0100 +++ new/yast2-vpn-4.6.1/package/yast2-vpn.changes 2023-05-10 12:50:42.000000000 +0200 @@ -1,4 +1,11 @@ ------------------------------------------------------------------- +Wed Apr 5 15:50:35 UTC 2023 - Mohd Saquib <[email protected]> + +- Fixed an issue where yast2-vpn module breaks when strongswan is + updated to version >= 5.8.0 (boo#1176735) +- 4.6.1 + +------------------------------------------------------------------- Fri Mar 03 14:44:07 UTC 2023 - Ladislav Slezák <[email protected]> - Bump version to 4.6.0 (bsc#1208913) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-vpn-4.6.0/package/yast2-vpn.spec new/yast2-vpn-4.6.1/package/yast2-vpn.spec --- old/yast2-vpn-4.6.0/package/yast2-vpn.spec 2023-03-03 16:04:12.000000000 +0100 +++ new/yast2-vpn-4.6.1/package/yast2-vpn.spec 2023-05-10 12:50:42.000000000 +0200 @@ -17,7 +17,7 @@ Name: yast2-vpn -Version: 4.6.0 +Version: 4.6.1 Release: 0 Url: https://github.com/yast/yast-vpn Source0: %{name}-%{version}.tar.bz2 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-vpn-4.6.0/src/lib/vpn/view_log_dialog.rb new/yast2-vpn-4.6.1/src/lib/vpn/view_log_dialog.rb --- old/yast2-vpn-4.6.0/src/lib/vpn/view_log_dialog.rb 2023-03-03 16:04:12.000000000 +0100 +++ new/yast2-vpn-4.6.1/src/lib/vpn/view_log_dialog.rb 2023-05-10 12:50:42.000000000 +0200 @@ -77,7 +77,7 @@ _("Existing connections will be interrupted.\n" + "Do you still wish to continue?") ) - if !(Yast::Service.Active("strongswan") ? Yast::Service.Restart("strongswan") : Yast::Service.Start("strongswan")) + if !(Yast::Service.Active("ipsec") ? Yast::Service.Restart("ipsec") : Yast::Service.Start("ipsec")) Yast::Popup.Error(_("Failed to restart IPSec daemon")) end end @@ -90,7 +90,7 @@ private # Read daemon status and refresh the content of log views. def refresh_status - sh_daemon_status = Yast::SCR.Execute(Yast::Path.new(".target.bash_output"), "systemctl status strongswan") + sh_daemon_status = Yast::SCR.Execute(Yast::Path.new(".target.bash_output"), "systemctl status ipsec") Yast::UI.ChangeWidget(Id(:daemon_status), :Value, sh_daemon_status["stdout"]) sh_conn_status = Yast::SCR.Execute(Yast::Path.new(".target.bash_output"), "ipsec statusall 2>&1") diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-vpn-4.6.0/src/modules/IPSecConf.rb new/yast2-vpn-4.6.1/src/modules/IPSecConf.rb --- old/yast2-vpn-4.6.0/src/modules/IPSecConf.rb 2023-03-03 16:04:12.000000000 +0100 +++ new/yast2-vpn-4.6.1/src/modules/IPSecConf.rb 2023-05-10 12:50:42.000000000 +0200 @@ -62,7 +62,7 @@ load_ipsec_conf_ini load_ipsec_secrets_ini # Read daemon settings - @enable_ipsec = Service.Enabled("strongswan") + @enable_ipsec = Service.Enabled("ipsec") customrules_content = get_customrules_txt @tcp_reduce_mss = customrules_content != nil && customrules_content.include?("--set-mss #{REDUCED_MSS}") @autoyast_modified = true @@ -172,14 +172,14 @@ SCR.Write(path(".etc.ipsec_secrets"), nil) # Enable/disable daemon if @enable_ipsec - Service.Enable("strongswan") - if !(Service.Active("strongswan") ? Service.Restart("strongswan") : Service.Start("strongswan")) + Service.Enable("strongswan-starter") + if !(Service.Active("ipsec") ? Service.Restart("ipsec") : Service.Start("ipsec")) Report.Error(_("Failed to start IPSec daemon.")) successful = false end else - Service.Disable("strongswan") - Service.Stop("strongswan") + Service.Stop("ipsec") + Service.Disable("strongswan-starter") end # Configure IP forwarding sysctlconfig_modified = false
