Hello community,
here is the log from the commit of package wireguard-tools for openSUSE:Factory
checked in at 2020-03-22 14:18:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old)
and /work/SRC/openSUSE:Factory/.wireguard-tools.new.3160 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "wireguard-tools"
Sun Mar 22 14:18:27 2020 rev:4 rq:787157 version:1.0.20200319
Changes:
--------
--- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes
2020-02-10 21:54:12.650217106 +0100
+++
/work/SRC/openSUSE:Factory/.wireguard-tools.new.3160/wireguard-tools.changes
2020-03-22 14:18:31.826109187 +0100
@@ -1,0 +2,11 @@
+Sat Mar 21 13:57:06 UTC 2020 - Martin Hauke <[email protected]>
+
+- Update to version 1.0.20200319
+ * netlink: initialize mostly unused field
+ * curve25519: squelch warnings on clang
+ * man: fix grammar in wg(8) and wg-quick(8)
+ * man: backlink wg-quick(8) in wg(8)
+ * man: add a warning to the SaveConfig description
+ * wincompat: use string_list instead of inflatable_buffer
+
+-------------------------------------------------------------------
Old:
----
wireguard-tools-1.0.20200206.tar.asc
wireguard-tools-1.0.20200206.tar.xz
New:
----
wireguard-tools-1.0.20200319.tar.asc
wireguard-tools-1.0.20200319.tar.xz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ wireguard-tools.spec ++++++
--- /var/tmp/diff_new_pack.KGryCA/_old 2020-03-22 14:18:32.270109472 +0100
+++ /var/tmp/diff_new_pack.KGryCA/_new 2020-03-22 14:18:32.274109474 +0100
@@ -18,7 +18,7 @@
Name: wireguard-tools
-Version: 1.0.20200206
+Version: 1.0.20200319
Release: 0
Summary: WireGuard userspace tools
License: GPL-2.0-only
++++++ wireguard-tools-1.0.20200206.tar.xz ->
wireguard-tools-1.0.20200319.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/curve25519.c
new/wireguard-tools-1.0.20200319/src/curve25519.c
--- old/wireguard-tools-1.0.20200206/src/curve25519.c 2020-02-06
16:19:47.000000000 +0100
+++ new/wireguard-tools-1.0.20200319/src/curve25519.c 2020-03-19
23:46:35.000000000 +0100
@@ -39,35 +39,39 @@
#define le32_to_cpup(a) (*(a))
#define cpu_to_le64(a) (a)
#endif
-static inline __le32 get_unaligned_le32(const u8 *a)
+#ifndef __unused
+#define __unused __attribute__((unused))
+#endif
+#ifndef __always_inline
+#define __always_inline __inline __attribute__((__always_inline__))
+#endif
+#ifndef noinline
+#define noinline __attribute__((noinline))
+#endif
+#ifndef __aligned
+#define __aligned(x) __attribute__((aligned(x)))
+#endif
+#ifndef __force
+#define __force
+#endif
+
+static __always_inline __unused __le32 get_unaligned_le32(const u8 *a)
{
__le32 l;
__builtin_memcpy(&l, a, sizeof(l));
return le32_to_cpup(&l);
}
-static inline __le64 get_unaligned_le64(const u8 *a)
+static __always_inline __unused __le64 get_unaligned_le64(const u8 *a)
{
__le64 l;
__builtin_memcpy(&l, a, sizeof(l));
return le64_to_cpup(&l);
}
-static inline void put_unaligned_le64(u64 s, u8 *d)
+static __always_inline __unused void put_unaligned_le64(u64 s, u8 *d)
{
__le64 l = cpu_to_le64(s);
__builtin_memcpy(d, &l, sizeof(l));
}
-#ifndef __always_inline
-#define __always_inline __inline __attribute__((__always_inline__))
-#endif
-#ifndef noinline
-#define noinline __attribute__((noinline))
-#endif
-#ifndef __aligned
-#define __aligned(x) __attribute__((aligned(x)))
-#endif
-#ifndef __force
-#define __force
-#endif
static noinline void memzero_explicit(void *s, size_t count)
{
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/man/wg-quick.8
new/wireguard-tools-1.0.20200319/src/man/wg-quick.8
--- old/wireguard-tools-1.0.20200206/src/man/wg-quick.8 2020-02-06
16:19:47.000000000 +0100
+++ new/wireguard-tools-1.0.20200319/src/man/wg-quick.8 2020-03-19
23:46:35.000000000 +0100
@@ -56,7 +56,7 @@
The configuration file adds a few extra configuration values to the format
understood by
.BR wg (8)
-in order to configure additional attribute of an interface. It handles the
+in order to configure additional attributes of an interface. It handles the
values that it understands, and then it passes the remaining ones directly to
.BR wg (8)
for further processing.
@@ -99,7 +99,8 @@
the commands are executed in order.
.IP \(bu
SaveConfig \(em if set to `true', the configuration is saved from the current
state of the
-interface upon shutdown.
+interface upon shutdown. Any changes made to the configuration file before the
+interface is removed will therefore be overwritten.
.P
Recommended \fIINTERFACE\fP names include `wg0' or `wgvpn0' or even
`wgmgmtlan0'.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/man/wg.8
new/wireguard-tools-1.0.20200319/src/man/wg.8
--- old/wireguard-tools-1.0.20200206/src/man/wg.8 2020-02-06
16:19:47.000000000 +0100
+++ new/wireguard-tools-1.0.20200319/src/man/wg.8 2020-03-19
23:46:35.000000000 +0100
@@ -40,7 +40,7 @@
Shows current WireGuard configuration and runtime information of specified
\fI<interface>\fP.
If no \fI<interface>\fP is specified, \fI<interface>\fP defaults to \fIall\fP.
If \fIinterfaces\fP is specified, prints a list of all WireGuard interfaces,
-one per line, and quit. If no options are given after the interface
+one per line, and quits. If no options are given after the interface
specification, then prints a list of all attributes in a visually pleasing way
meant for the terminal. Otherwise, prints specified information grouped by
newlines and tabs, meant to be used in scripts. For this script-friendly
display,
@@ -61,7 +61,7 @@
for a peer, that peer is removed, not configured. If \fIlisten-port\fP
is not specified, or set to 0, the port will be chosen randomly when the
interface comes up. Both \fIprivate-key\fP and \fIpreshared-key\fP must
-be a files, because command line arguments are not considered private on
+be files, because command line arguments are not considered private on
most systems but if you are using
.BR bash (1),
you may safely pass in a string by specifying as \fIprivate-key\fP or
@@ -233,6 +233,7 @@
If set to an integer or to \fIinfinity\fP, DNS resolution for each peer's
endpoint will be retried that many times for non-permanent errors, with an
increasing delay between retries. If unset, the default is 15 retries.
.SH SEE ALSO
+.BR wg-quick (8),
.BR ip (8),
.BR ip-link (8),
.BR ip-address (8),
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/netlink.h
new/wireguard-tools-1.0.20200319/src/netlink.h
--- old/wireguard-tools-1.0.20200206/src/netlink.h 2020-02-06
16:19:47.000000000 +0100
+++ new/wireguard-tools-1.0.20200319/src/netlink.h 2020-03-19
23:46:35.000000000 +0100
@@ -737,6 +737,7 @@
nlg = malloc(sizeof(*nlg));
if (!nlg)
return NULL;
+ nlg->id = 0;
err = -ENOMEM;
nlg->buf = malloc(mnl_ideal_socket_buffer_size());
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/version.h
new/wireguard-tools-1.0.20200319/src/version.h
--- old/wireguard-tools-1.0.20200206/src/version.h 2020-02-06
16:19:47.000000000 +0100
+++ new/wireguard-tools-1.0.20200319/src/version.h 2020-03-19
23:46:35.000000000 +0100
@@ -1,3 +1,3 @@
#ifndef WIREGUARD_TOOLS_VERSION
-#define WIREGUARD_TOOLS_VERSION "1.0.20200206"
+#define WIREGUARD_TOOLS_VERSION "1.0.20200319"
#endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/wincompat/ipc.c
new/wireguard-tools-1.0.20200319/src/wincompat/ipc.c
--- old/wireguard-tools-1.0.20200206/src/wincompat/ipc.c 2020-02-06
16:19:47.000000000 +0100
+++ new/wireguard-tools-1.0.20200319/src/wincompat/ipc.c 2020-03-19
23:46:35.000000000 +0100
@@ -113,8 +113,9 @@
return NULL;
}
-static int userspace_get_wireguard_interfaces(struct inflatable_buffer *buffer)
+static int userspace_get_wireguard_interfaces(struct string_list *list)
{
+ static const char prefix[] =
"ProtectedPrefix\\Administrators\\WireGuard\\";
WIN32_FIND_DATA find_data;
HANDLE find_handle;
int ret = 0;
@@ -123,11 +124,9 @@
if (find_handle == INVALID_HANDLE_VALUE)
return -GetLastError();
do {
- if (strncmp("WireGuard\\", find_data.cFileName, 10))
+ if (strncmp(prefix, find_data.cFileName, strlen(prefix)))
continue;
- buffer->next = strdup(find_data.cFileName + 10);
- buffer->good = true;
- ret = add_next_to_inflatable_buffer(buffer);
+ ret = string_list_add(list, find_data.cFileName +
strlen(prefix));
if (ret < 0)
goto out;
} while (FindNextFile(find_handle, &find_data));