Hello community,

here is the log from the commit of package apache2-mod_nss for openSUSE:Factory 
checked in at 2018-03-20 22:00:22
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/apache2-mod_nss (Old)
 and      /work/SRC/openSUSE:Factory/.apache2-mod_nss.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "apache2-mod_nss"

Tue Mar 20 22:00:22 2018 rev:29 rq:588675 version:1.0.16

Changes:
--------
--- /work/SRC/openSUSE:Factory/apache2-mod_nss/apache2-mod_nss.changes  
2018-03-11 15:25:33.850541809 +0100
+++ /work/SRC/openSUSE:Factory/.apache2-mod_nss.new/apache2-mod_nss.changes     
2018-03-20 22:00:50.444643599 +0100
@@ -1,0 +2,15 @@
+Mon Mar 19 15:23:59 UTC 2018 - [email protected]
+
+- Use fixed upstream 1.0.16 tarball
+  * https://pagure.io/mod_nss/issue/44
+
+-------------------------------------------------------------------
+Mon Mar 19 11:12:29 UTC 2018 - [email protected]
+
+- Update to 1.0.16
+  * Fix up some broken cipher strings from a bad merge
+- adjust distro detection, Tumbleweed has NSS 3.35, Leap 15 has 3.34
+- drop 0001-Fix-up-some-broken-cipher-strings-from-a-bad-merge.patch
+  (upstream)
+
+-------------------------------------------------------------------

Old:
----
  0001-Fix-up-some-broken-cipher-strings-from-a-bad-merge.patch
  mod_nss-1.0.15.tar.gz

New:
----
  mod_nss-1.0.16.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ apache2-mod_nss.spec ++++++
--- /var/tmp/diff_new_pack.QC2LBR/_old  2018-03-20 22:00:51.296612926 +0100
+++ /var/tmp/diff_new_pack.QC2LBR/_new  2018-03-20 22:00:51.304612638 +0100
@@ -25,7 +25,7 @@
 %define    apache_mmn        %(MMN=$(%{apxs} -q LIBEXECDIR)_MMN; test -x $MMN 
&& $MMN)
 %define    apache_sysconf_nssdir %{apache_sysconfdir}/mod_nss.d
 Name:           apache2-mod_nss
-Version:        1.0.15
+Version:        1.0.16
 Release:        0
 Summary:        SSL/TLS module for the Apache HTTP server
 License:        Apache-2.0
@@ -39,7 +39,6 @@
 Patch1:         mod_nss-migrate.patch
 Patch2:         mod_nss-gencert-correct-ownership.patch
 Patch4:         mod_nss-gencert_use_ss_instead_of_netstat.patch
-Patch5:         0001-Fix-up-some-broken-cipher-strings-from-a-bad-merge.patch
 BuildRequires:  apache-rpm-macros
 BuildRequires:  apache2-devel >= 2.2.12
 BuildRequires:  apr-devel
@@ -76,7 +75,6 @@
 %patch1 -p1
 %patch2 -p1
 %patch4 -p1
-%patch5 -p1
 
 # Touch expression parser sources to prevent regenerating it
 touch nss_expr_*.[chyl]
@@ -130,7 +128,7 @@
 install -m 755 migrate.pl %{buildroot}%{_sbindir}/mod_nss_migrate.pl
 
 #ln -s $RPM_BUILD_ROOT/%%{apache_libexecdir}/libnssckbi.so 
$RPM_BUILD_ROOT%%{apache_sysconf_nssdir}/
-%if 0%{?suse_version} < 1330
+%if 0%{?suse_version} <= 1500
 touch %{buildroot}%{apache_sysconf_nssdir}/secmod.db
 touch %{buildroot}%{apache_sysconf_nssdir}/cert8.db
 touch %{buildroot}%{apache_sysconf_nssdir}/key3.db
@@ -220,7 +218,7 @@
 %dir %{apache_libexecdir}
 %{apache_libexecdir}/mod_nss.so
 %dir %{apache_sysconf_nssdir}/
-%if 0%{?suse_version} < 1330
+%if 0%{?suse_version} <= 1500
 %ghost %attr(0640,root,www) %config(noreplace) 
%{apache_sysconf_nssdir}/secmod.db
 %ghost %attr(0640,root,www) %config(noreplace) 
%{apache_sysconf_nssdir}/cert8.db
 %ghost %attr(0640,root,www) %config(noreplace) %{apache_sysconf_nssdir}/key3.db

++++++ mod_nss-1.0.15.tar.gz -> mod_nss-1.0.16.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_nss-1.0.15/ChangeLog new/mod_nss-1.0.16/ChangeLog
--- old/mod_nss-1.0.15/ChangeLog        2018-01-19 21:29:30.000000000 +0100
+++ new/mod_nss-1.0.16/ChangeLog        2018-01-19 21:44:16.000000000 +0100
@@ -1,4 +1,9 @@
 2018-01-19  Rob Crittenden <[email protected]>
+    * Fix some merge issues in the ciphers (that'll teach me to test
+         BEFORE making the tag)
+       * Become 1.0.16
+
+2018-01-19  Rob Crittenden <[email protected]>
     * Resync ciphers and tests with openssl-1.1.0g and nss-3.34.0
        * Become 1.0.15
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_nss-1.0.15/configure.ac 
new/mod_nss-1.0.16/configure.ac
--- old/mod_nss-1.0.15/configure.ac     2018-01-19 21:29:30.000000000 +0100
+++ new/mod_nss-1.0.16/configure.ac     2018-01-19 21:44:16.000000000 +0100
@@ -1,5 +1,5 @@
 # Required initializer
-AC_INIT([mod_nss],[1.0.15])
+AC_INIT([mod_nss],[1.0.16])
 
 m4_include([acinclude.m4])
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_nss-1.0.15/nss_engine_cipher.c 
new/mod_nss-1.0.16/nss_engine_cipher.c
--- old/mod_nss-1.0.15/nss_engine_cipher.c      2018-01-19 21:29:30.000000000 
+0100
+++ new/mod_nss-1.0.16/nss_engine_cipher.c      2018-01-19 21:44:16.000000000 
+0100
@@ -59,7 +59,7 @@
     {"fips_3des_sha", SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA, "FIPS-DES-CBC3-SHA", 
SSL_kRSA|SSL_aRSA|SSL_3DES|SSL_SHA1, SSLV3, SSL_MEDIUM, 112, 168, NULL},
     {"fips_des_sha", SSL_RSA_FIPS_WITH_DES_CBC_SHA, "FIPS-DES-CBC-SHA", 
SSL_kRSA|SSL_aRSA|SSL_DES|SSL_SHA1, SSLV3, SSL_LOW, 56, 56, NULL},
 #ifdef ENABLE_SERVER_DHE
-    {"dhe_rsa_3des_sha", TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 
"EDH-RSA-DES-CBC3-SHA", SSL_kDHE|SSL_aRSA|SSL_3DES|SSL_SHA1, TLSV1, SSL_MEDIUM, 
112, 168, NULL},
+    {"dhe_rsa_3des_sha", TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 
"DHE-RSA-DES-CBC3-SHA", SSL_kDHE|SSL_aRSA|SSL_3DES|SSL_SHA1, TLSV1, SSL_MEDIUM, 
112, 168, NULL},
     {"dhe_rsa_aes_128_sha", TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 
"DHE-RSA-AES128-SHA", SSL_kDHE|SSL_aRSA|SSL_AES128|SSL_SHA1, TLSV1, SSL_HIGH, 
128, 128, NULL},
     {"dhe_rsa_aes_256_sha", TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 
"DHE-RSA-AES256-SHA", SSL_kDHE|SSL_aRSA|SSL_AES256|SSL_SHA1, TLSV1, SSL_HIGH, 
256, 256, NULL},
     {"dhe_rsa_camellia_128_sha", TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, 
"DHE-RSA-CAMELLIA128-SHA", SSL_kDHE|SSL_aRSA|SSL_CAMELLIA128|SSL_SHA1, TLSV1, 
SSL_HIGH, 128, 128, NULL},
@@ -74,21 +74,21 @@
 #endif
 #endif /* ENABLE_SERVER_DHE */
 #ifdef NSS_ENABLE_ECC
-    {"ecdh_ecdsa_null_sha", TLS_ECDH_ECDSA_WITH_NULL_SHA, 
"ECDH-ECDSA-NULL-SHA", SSL_kECDHe|SSL_aECDH|SSL_eNULL|SSL_SHA1, TLSV1, 
SSL_STRONG_NONE, 0, 0, NULL},
-    {"ecdh_ecdsa_rc4_128_sha", TLS_ECDH_ECDSA_WITH_RC4_128_SHA, 
"ECDH-ECDSA-RC4-SHA", SSL_kECDHe|SSL_aECDH|SSL_RC4|SSL_SHA1, TLSV1, SSL_MEDIUM, 
128, 128, NULL},
-    {"ecdh_ecdsa_3des_sha", TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, 
"ECDH-ECDSA-DES-CBC3-SHA", SSL_kECDHe|SSL_aECDH|SSL_3DES|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 112, 168, NULL},
-    {"ecdh_ecdsa_aes_128_sha", TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, 
"ECDH-ECDSA-AES128-SHA", SSL_kECDHe|SSL_aECDH|SSL_AES128|SSL_SHA1, TLSV1, 
SSL_HIGH, 128, 128, NULL},
-    {"ecdh_ecdsa_aes_256_sha", TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, 
"ECDH-ECDSA-AES256-SHA", SSL_kECDHe|SSL_aECDH|SSL_AES256|SSL_SHA1, TLSV1, 
SSL_HIGH, 256, 256, NULL},
+    {"ecdh_ecdsa_null_sha", TLS_ECDH_ECDSA_WITH_NULL_SHA, 
"ECDH-ECDSA-NULL-SHA", SSL_kECDHE|SSL_AECDH|SSL_eNULL|SSL_SHA1, TLSV1, 
SSL_STRONG_NONE, 0, 0, NULL},
+    {"ecdh_ecdsa_rc4_128_sha", TLS_ECDH_ECDSA_WITH_RC4_128_SHA, 
"ECDH-ECDSA-RC4-SHA", SSL_kECDHE|SSL_AECDH|SSL_RC4|SSL_SHA1, TLSV1, SSL_MEDIUM, 
128, 128, NULL},
+    {"ecdh_ecdsa_3des_sha", TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, 
"ECDH-ECDSA-DES-CBC3-SHA", SSL_kECDHE|SSL_AECDH|SSL_3DES|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 112, 168, NULL},
+    {"ecdh_ecdsa_aes_128_sha", TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, 
"ECDH-ECDSA-AES128-SHA", SSL_kECDHE|SSL_AECDH|SSL_AES128|SSL_SHA1, TLSV1, 
SSL_HIGH, 128, 128, NULL},
+    {"ecdh_ecdsa_aes_256_sha", TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, 
"ECDH-ECDSA-AES256-SHA", SSL_kECDHE|SSL_AECDH|SSL_AES256|SSL_SHA1, TLSV1, 
SSL_HIGH, 256, 256, NULL},
     {"ecdhe_ecdsa_null_sha", TLS_ECDHE_ECDSA_WITH_NULL_SHA, 
"ECDHE-ECDSA-NULL-SHA", SSL_kEECDH|SSL_aECDSA|SSL_eNULL|SSL_SHA1, TLSV1, 
SSL_STRONG_NONE, 0, 0, NULL},
     {"ecdhe_ecdsa_rc4_128_sha", TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, 
"ECDHE-ECDSA-RC4-SHA", SSL_kEECDH|SSL_aECDSA|SSL_RC4|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 128, 128, NULL},
     {"ecdhe_ecdsa_3des_sha", TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, 
"ECDHE-ECDSA-DES-CBC3-SHA", SSL_kEECDH|SSL_aECDSA|SSL_3DES|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 112, 168, NULL},
     {"ecdhe_ecdsa_aes_128_sha", TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 
"ECDHE-ECDSA-AES128-SHA", SSL_kEECDH|SSL_aECDSA|SSL_AES128|SSL_SHA1, TLSV1, 
SSL_HIGH, 128, 128, NULL},
     {"ecdhe_ecdsa_aes_256_sha", TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 
"ECDHE-ECDSA-AES256-SHA", SSL_kEECDH|SSL_aECDSA|SSL_AES256|SSL_SHA1, TLSV1, 
SSL_HIGH, 256, 256, NULL},
-    {"ecdh_rsa_null_sha", TLS_ECDH_RSA_WITH_NULL_SHA, "ECDH-RSA-NULL-SHA", 
SSL_kECDHr|SSL_aECDH|SSL_eNULL|SSL_SHA1, TLSV1, SSL_STRONG_NONE, 0, 0, NULL},
-    {"ecdh_rsa_128_sha", TLS_ECDH_RSA_WITH_RC4_128_SHA, "ECDH-RSA-RC4-SHA", 
SSL_kECDHr|SSL_aECDH|SSL_RC4|SSL_SHA1, TLSV1, SSL_MEDIUM, 128, 128, NULL},
-    {"ecdh_rsa_3des_sha", TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, 
"ECDH-RSA-DES-CBC3-SHA", SSL_kECDHr|SSL_aECDH|SSL_3DES|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 112, 168, NULL},
-    {"ecdh_rsa_aes_128_sha", TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, 
"ECDH-RSA-AES128-SHA", SSL_kECDHr|SSL_aECDH|SSL_AES128|SSL_SHA1, TLSV1, 
SSL_HIGH, 128, 128, NULL},
-    {"ecdh_rsa_aes_256_sha", TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, 
"ECDH-RSA-AES256-SHA", SSL_kECDHr|SSL_aECDH|SSL_AES256|SSL_SHA1, TLSV1, 
SSL_HIGH, 256, 256, NULL},
+    {"ecdh_rsa_null_sha", TLS_ECDH_RSA_WITH_NULL_SHA, "ECDH-RSA-NULL-SHA", 
SSL_kECDHr|SSL_AECDH|SSL_eNULL|SSL_SHA1, TLSV1, SSL_STRONG_NONE, 0, 0, NULL},
+    {"ecdh_rsa_128_sha", TLS_ECDH_RSA_WITH_RC4_128_SHA, "ECDH-RSA-RC4-SHA", 
SSL_kECDHr|SSL_AECDH|SSL_RC4|SSL_SHA1, TLSV1, SSL_MEDIUM, 128, 128, NULL},
+    {"ecdh_rsa_3des_sha", TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, 
"ECDH-RSA-DES-CBC3-SHA", SSL_kECDHr|SSL_AECDH|SSL_3DES|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 112, 168, NULL},
+    {"ecdh_rsa_aes_128_sha", TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, 
"ECDH-RSA-AES128-SHA", SSL_kECDHr|SSL_AECDH|SSL_AES128|SSL_SHA1, TLSV1, 
SSL_HIGH, 128, 128, NULL},
+    {"ecdh_rsa_aes_256_sha", TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, 
"ECDH-RSA-AES256-SHA", SSL_kECDHr|SSL_AECDH|SSL_AES256|SSL_SHA1, TLSV1, 
SSL_HIGH, 256, 256, NULL},
     {"ecdhe_rsa_null", TLS_ECDHE_RSA_WITH_NULL_SHA, "ECDHE-RSA-NULL-SHA", 
SSL_kEECDH|SSL_aRSA|SSL_eNULL|SSL_SHA1, TLSV1, SSL_STRONG_NONE, 0, 0, NULL},
     {"ecdhe_rsa_rc4_128_sha", TLS_ECDHE_RSA_WITH_RC4_128_SHA, 
"ECDHE-RSA-RC4-SHA", SSL_kEECDH|SSL_aRSA|SSL_RC4|SSL_SHA1, TLSV1, SSL_MEDIUM, 
128, 128, NULL},
     {"ecdhe_rsa_3des_sha", TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, 
"ECDHE-RSA-DES-CBC3-SHA", SSL_kEECDH|SSL_aRSA|SSL_3DES|SSL_SHA1, TLSV1, 
SSL_MEDIUM, 112, 168, NULL},


Reply via email to