Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package yast2-vpn for openSUSE:Factory 
checked in at 2023-05-10 16:20:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/yast2-vpn (Old)
 and      /work/SRC/openSUSE:Factory/.yast2-vpn.new.1533 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "yast2-vpn"

Wed May 10 16:20:02 2023 rev:19 rq:1086052 version:4.6.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/yast2-vpn/yast2-vpn.changes      2023-03-03 
22:32:10.964229673 +0100
+++ /work/SRC/openSUSE:Factory/.yast2-vpn.new.1533/yast2-vpn.changes    
2023-05-10 16:20:04.495524995 +0200
@@ -1,0 +2,7 @@
+Wed Apr  5 15:50:35 UTC 2023 - Mohd Saquib <[email protected]>
+
+- Fixed an issue where yast2-vpn module breaks when strongswan is
+  updated to version >= 5.8.0 (boo#1176735)
+- 4.6.1
+
+-------------------------------------------------------------------

Old:
----
  yast2-vpn-4.6.0.tar.bz2

New:
----
  yast2-vpn-4.6.1.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ yast2-vpn.spec ++++++
--- /var/tmp/diff_new_pack.CR698G/_old  2023-05-10 16:20:05.019528095 +0200
+++ /var/tmp/diff_new_pack.CR698G/_new  2023-05-10 16:20:05.027528142 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           yast2-vpn
-Version:        4.6.0
+Version:        4.6.1
 Release:        0
 URL:            https://github.com/yast/yast-vpn
 Source0:        %{name}-%{version}.tar.bz2

++++++ yast2-vpn-4.6.0.tar.bz2 -> yast2-vpn-4.6.1.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-vpn-4.6.0/package/yast2-vpn.changes 
new/yast2-vpn-4.6.1/package/yast2-vpn.changes
--- old/yast2-vpn-4.6.0/package/yast2-vpn.changes       2023-03-03 
16:04:12.000000000 +0100
+++ new/yast2-vpn-4.6.1/package/yast2-vpn.changes       2023-05-10 
12:50:42.000000000 +0200
@@ -1,4 +1,11 @@
 -------------------------------------------------------------------
+Wed Apr  5 15:50:35 UTC 2023 - Mohd Saquib <[email protected]>
+
+- Fixed an issue where yast2-vpn module breaks when strongswan is
+  updated to version >= 5.8.0 (boo#1176735)
+- 4.6.1
+
+-------------------------------------------------------------------
 Fri Mar 03 14:44:07 UTC 2023 - Ladislav Slezák <[email protected]>
 
 - Bump version to 4.6.0 (bsc#1208913)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-vpn-4.6.0/package/yast2-vpn.spec 
new/yast2-vpn-4.6.1/package/yast2-vpn.spec
--- old/yast2-vpn-4.6.0/package/yast2-vpn.spec  2023-03-03 16:04:12.000000000 
+0100
+++ new/yast2-vpn-4.6.1/package/yast2-vpn.spec  2023-05-10 12:50:42.000000000 
+0200
@@ -17,7 +17,7 @@
 
 
 Name:           yast2-vpn
-Version:        4.6.0
+Version:        4.6.1
 Release:        0
 Url:            https://github.com/yast/yast-vpn
 Source0:        %{name}-%{version}.tar.bz2
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-vpn-4.6.0/src/lib/vpn/view_log_dialog.rb 
new/yast2-vpn-4.6.1/src/lib/vpn/view_log_dialog.rb
--- old/yast2-vpn-4.6.0/src/lib/vpn/view_log_dialog.rb  2023-03-03 
16:04:12.000000000 +0100
+++ new/yast2-vpn-4.6.1/src/lib/vpn/view_log_dialog.rb  2023-05-10 
12:50:42.000000000 +0200
@@ -77,7 +77,7 @@
                 _("Existing connections will be interrupted.\n" +
                     "Do you still wish to continue?")
                 )
-                if !(Yast::Service.Active("strongswan") ? 
Yast::Service.Restart("strongswan") : Yast::Service.Start("strongswan"))
+                if !(Yast::Service.Active("ipsec") ? 
Yast::Service.Restart("ipsec") : Yast::Service.Start("ipsec"))
                     Yast::Popup.Error(_("Failed to restart IPSec daemon"))
                 end
             end
@@ -90,7 +90,7 @@
         private
         # Read daemon status and refresh the content of log views.
         def refresh_status
-            sh_daemon_status = 
Yast::SCR.Execute(Yast::Path.new(".target.bash_output"), "systemctl status 
strongswan")
+            sh_daemon_status = 
Yast::SCR.Execute(Yast::Path.new(".target.bash_output"), "systemctl status 
ipsec")
             Yast::UI.ChangeWidget(Id(:daemon_status), :Value, 
sh_daemon_status["stdout"])
 
             sh_conn_status = 
Yast::SCR.Execute(Yast::Path.new(".target.bash_output"), "ipsec statusall 2>&1")
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/yast2-vpn-4.6.0/src/modules/IPSecConf.rb 
new/yast2-vpn-4.6.1/src/modules/IPSecConf.rb
--- old/yast2-vpn-4.6.0/src/modules/IPSecConf.rb        2023-03-03 
16:04:12.000000000 +0100
+++ new/yast2-vpn-4.6.1/src/modules/IPSecConf.rb        2023-05-10 
12:50:42.000000000 +0200
@@ -62,7 +62,7 @@
             load_ipsec_conf_ini
             load_ipsec_secrets_ini
             # Read daemon settings
-            @enable_ipsec = Service.Enabled("strongswan")
+            @enable_ipsec = Service.Enabled("ipsec")
             customrules_content = get_customrules_txt
             @tcp_reduce_mss = customrules_content != nil && 
customrules_content.include?("--set-mss #{REDUCED_MSS}")
             @autoyast_modified = true
@@ -172,14 +172,14 @@
             SCR.Write(path(".etc.ipsec_secrets"), nil)
             # Enable/disable daemon
             if @enable_ipsec
-                Service.Enable("strongswan")
-                if !(Service.Active("strongswan") ? 
Service.Restart("strongswan") : Service.Start("strongswan"))
+                Service.Enable("strongswan-starter")
+                if !(Service.Active("ipsec") ? Service.Restart("ipsec") : 
Service.Start("ipsec"))
                     Report.Error(_("Failed to start IPSec daemon."))
                     successful = false
                 end
             else
-                Service.Disable("strongswan")
-                Service.Stop("strongswan")
+                Service.Stop("ipsec")
+                Service.Disable("strongswan-starter")
             end
             # Configure IP forwarding
             sysctlconfig_modified = false

Reply via email to