Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openfortivpn for openSUSE:Factory 
checked in at 2021-09-23 23:03:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openfortivpn (Old)
 and      /work/SRC/openSUSE:Factory/.openfortivpn.new.1899 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openfortivpn"

Thu Sep 23 23:03:55 2021 rev:16 rq:921039 version:1.17.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/openfortivpn/openfortivpn.changes        
2021-07-31 18:52:31.418449166 +0200
+++ /work/SRC/openSUSE:Factory/.openfortivpn.new.1899/openfortivpn.changes      
2021-09-23 23:04:02.160322235 +0200
@@ -1,0 +2,8 @@
+Thu Sep  9 12:51:01 UTC 2021 - Martin Hauke <mar...@gmx.de>
+
+- Updat eto version 1.17.1
+  * fix regression: enable OpenSSL engines by default
+  * fix typos found by codespell
+  * fix LGTM alerts
+
+-------------------------------------------------------------------

Old:
----
  openfortivpn-1.17.0.tar.gz

New:
----
  openfortivpn-1.17.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openfortivpn.spec ++++++
--- /var/tmp/diff_new_pack.xKYrcf/_old  2021-09-23 23:04:02.724322655 +0200
+++ /var/tmp/diff_new_pack.xKYrcf/_new  2021-09-23 23:04:02.724322655 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           openfortivpn
-Version:        1.17.0
+Version:        1.17.1
 Release:        0
 Summary:        Client for PPP+SSL VPN tunnel services
 License:        GPL-3.0-or-later

++++++ openfortivpn-1.17.0.tar.gz -> openfortivpn-1.17.1.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/.github/workflows/codespell.yml 
new/openfortivpn-1.17.1/.github/workflows/codespell.yml
--- old/openfortivpn-1.17.0/.github/workflows/codespell.yml     1970-01-01 
01:00:00.000000000 +0100
+++ new/openfortivpn-1.17.1/.github/workflows/codespell.yml     2021-09-08 
10:25:03.000000000 +0200
@@ -0,0 +1,21 @@
+---
+name: Codespell
+
+on:
+  push:
+
+  pull_request:
+    branches:
+      - master
+
+jobs:
+  codespell:
+    name: Check for spelling errors
+    runs-on: ubuntu-latest
+
+    steps:
+      - uses: actions/checkout@v2
+      - uses: codespell-project/actions-codespell@master
+        with:
+          skip: checkpatch.pl,spelling.txt,LICENSE.OpenSSL
+          ignore_words_list: synopsys,parms
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/CHANGELOG.md 
new/openfortivpn-1.17.1/CHANGELOG.md
--- old/openfortivpn-1.17.0/CHANGELOG.md        2021-07-15 08:44:09.000000000 
+0200
+++ new/openfortivpn-1.17.1/CHANGELOG.md        2021-09-08 10:25:03.000000000 
+0200
@@ -14,6 +14,12 @@
 This high level changelog is usually updated when a release is tagged.
 On the master branch there may be changes that are not (yet) described here.
 
+### 1.17.1
+
+* [-] fix regression: enable OpenSSL engines by default
+* [-] fix typos found by codespell
+* [-] fix LGTM alerts
+
 ### 1.17.0
 
 * [-] make OpenSSL engines optional
@@ -51,7 +57,7 @@
 * [+] add git commit id in debug output
 * [-] do not use interface ip for routing on linux
 * [-] avoid extra hop on interface for default route
-* [+] clean up, updates and improvments in the build system
+* [+] clean up, updates and improvements in the build system
 * [+] increase the inbound HTTP buffer capacity when needed
 * [+] print domain search list to output
 * [+] add systemd service file
@@ -191,7 +197,7 @@
 * [+] Print clear text error messages of pppd upon failure
 * [~] Existing configuration file is not overwritten anymore at installation 
time
 * [~] Increase the accepted cookie size and align the error behavior according 
to RFCs
-* [-] More gracefully handle unexcpected content of resolv.conf
+* [-] More gracefully handle unexpected content of resolv.conf
 * [~] Dynamically allocate memory for split routes and thus support larger 
numbers of routes
 
 ### 1.5.0
@@ -286,8 +292,8 @@
 * [+] Add support for client keys and certificates
 * [~] Extend the split VPN support with older FortiOS servers
 * [+] Add a config parser to handle received non-xml content
-* [~] Allow ommitting the gateway for split routes
-* [~] Allow ommitting DNS servers
+* [~] Allow omitting the gateway for split routes
+* [~] Allow omitting DNS servers
 * [-] Fix a memory leak in auth_get_config
 * [+] Support split routes
 * [+] Export the configuration of routes and gateway to environment
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/README.md 
new/openfortivpn-1.17.1/README.md
--- old/openfortivpn-1.17.0/README.md   2021-07-15 08:44:09.000000000 +0200
+++ new/openfortivpn-1.17.1/README.md   2021-09-08 10:25:03.000000000 +0200
@@ -95,8 +95,8 @@
 * [Gentoo](https://packages.gentoo.org/packages/net-vpn/openfortivpn)
 * 
[NixOS](https://github.com/NixOS/nixpkgs/tree/master/pkgs/tools/networking/openfortivpn)
 * [Arch 
Linux](https://www.archlinux.org/packages/community/x86_64/openfortivpn)
-* [Debian (testing)](https://packages.debian.org/buster/openfortivpn)
-* [Ubuntu (bionic and 
later)](https://packages.ubuntu.com/search?keywords=openfortivpn) and 
[pre-bionic (ppa)](https://launchpad.net/~ar-lex/+archive/ubuntu/fortisslvpn)
+* [Debian](https://packages.debian.org/stable/openfortivpn)
+* [Ubuntu](https://packages.ubuntu.com/search?keywords=openfortivpn)
 * [Solus](https://dev.getsol.us/source/openfortivpn/)
 
 On macOS both [Homebrew](https://formulae.brew.sh/formula/openfortivpn) and
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/configure.ac 
new/openfortivpn-1.17.1/configure.ac
--- old/openfortivpn-1.17.0/configure.ac        2021-07-15 08:44:09.000000000 
+0200
+++ new/openfortivpn-1.17.1/configure.ac        2021-09-08 10:25:03.000000000 
+0200
@@ -2,7 +2,7 @@
 # Process this file with autoconf to produce a configure script.
 
 AC_PREREQ([2.63])
-AC_INIT([openfortivpn], [1.17.0])
+AC_INIT([openfortivpn], [1.17.1])
 AC_CONFIG_SRCDIR([src/main.c])
 AM_INIT_AUTOMAKE([foreign subdir-objects])
 
@@ -372,7 +372,7 @@
        AS_HELP_STRING([--enable-resolvconf],
                       [Enable usage of resolvconf at runtime by default. \
                        Use --disable-resolvconf for the opposite, note that \
-                       resolvconf support will still be compliled in, but \
+                       resolvconf support will still be compilled in, but \
                        disabled if not explicitly enabled at runtime.]))
 
 # Determine how resolvconf works at build-time if it is installed:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/src/io.c 
new/openfortivpn-1.17.1/src/io.c
--- old/openfortivpn-1.17.0/src/io.c    2021-07-15 08:44:09.000000000 +0200
+++ new/openfortivpn-1.17.1/src/io.c    2021-09-08 10:25:03.000000000 +0200
@@ -462,10 +462,10 @@
                        break;
                }
 
-               total = (header[0] << 8) | header[1];
-               magic = (header[2] << 8) | header[3];
-               size = (header[4] << 8) | header[5];
-               if (magic != 0x5050 || total != 6 + size || size == 0 || size 
>= 0xffff) {
+               total = (uint16_t)(header[0]) << 8 | header[1];
+               magic = (uint16_t)(header[2]) << 8 | header[3];
+               size = (uint16_t)(header[4]) << 8 | header[5];
+               if (magic != 0x5050 || total < 7 || total - 6 != size) {
                        log_error("Received bad header from gateway:\n");
                        debug_bad_packet(tunnel, header);
                        break;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/src/ipv4.c 
new/openfortivpn-1.17.1/src/ipv4.c
--- old/openfortivpn-1.17.0/src/ipv4.c  2021-07-15 08:44:09.000000000 +0200
+++ new/openfortivpn-1.17.1/src/ipv4.c  2021-09-08 10:25:03.000000000 +0200
@@ -143,7 +143,7 @@
         * - the routing table is to some extent trusted input,
         * - it's not that large,
         * - and the loop in strtok_r increments the pointer in each
-        *   interation until it reaches the area where we have ensured
+        *   iteration until it reaches the area where we have ensured
         *   that there is a delimiting '\0' character by proper
         *   initialization. We ensure this also when growing the buffer.
         */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openfortivpn-1.17.0/src/tunnel.c 
new/openfortivpn-1.17.1/src/tunnel.c
--- old/openfortivpn-1.17.0/src/tunnel.c        2021-07-15 08:44:09.000000000 
+0200
+++ new/openfortivpn-1.17.1/src/tunnel.c        2021-09-08 10:25:03.000000000 
+0200
@@ -35,7 +35,7 @@
 #endif
 
 #include <openssl/err.h>
-#ifdef OPENSSL_ENGINE
+#ifndef OPENSSL_NO_ENGINE
 #include <openssl/engine.h>
 #endif
 #include <openssl/ui.h>
@@ -447,7 +447,7 @@
                 */
                log_debug("waitpid: %s exit status code %d\n",
                          PPP_DAEMON, exit_status);
-               if (exit_status >= ARRAY_SIZE(ppp_message) || exit_status < 0) {
+               if (exit_status >= ARRAY_SIZE(ppp_message)) {
                        log_error("%s: Returned an unknown exit status code: 
%d\n",
                                  PPP_DAEMON, exit_status);
                } else {
@@ -511,19 +511,17 @@
        }
 
        for (ifa = ifap; ifa != NULL; ifa = ifa->ifa_next) {
-               if ((
+               if (
 #if HAVE_USR_SBIN_PPPD
-                           (tunnel->config->pppd_ifname
-                            && strstr(ifa->ifa_name, 
tunnel->config->pppd_ifname)
-                            != NULL)
-                           || strstr(ifa->ifa_name, "ppp") != NULL
+                       ((tunnel->config->pppd_ifname &&
+                         strstr(ifa->ifa_name, tunnel->config->pppd_ifname) != 
NULL) ||
+                        strstr(ifa->ifa_name, "ppp") != NULL) &&
 #endif
 #if HAVE_USR_SBIN_PPP
-                           strstr(ifa->ifa_name, "tun") != NULL
+                       strstr(ifa->ifa_name, "tun") != NULL &&
 #endif
-                   ) && ifa->ifa_flags & IFF_UP) {
-                       if (&(ifa->ifa_addr->sa_family) != NULL
-                           && ifa->ifa_addr->sa_family == AF_INET) {
+                       ifa->ifa_flags & IFF_UP) {
+                       if (ifa->ifa_addr && ifa->ifa_addr->sa_family == 
AF_INET) {
                                struct in_addr if_ip_addr =
                                        cast_addr(ifa->ifa_addr)->sin_addr;
 
@@ -1117,7 +1115,7 @@
 #endif
 
        /* Use engine for PIV if user-cert config starts with pkcs11 URI: */
-#ifdef OPENSSL_ENGINE
+#ifndef OPENSSL_NO_ENGINE
        if (tunnel->config->use_engine > 0) {
                ENGINE *e;
 
@@ -1206,9 +1204,9 @@
                                goto err_ssl_context;
                        }
                }
-#ifdef OPENSSL_ENGINE
+#ifndef OPENSSL_NO_ENGINE
        }
-#endif /* PKCS11-engine */
+#endif
 
        tunnel->ssl_handle = SSL_new(tunnel->ssl_context);
        if (tunnel->ssl_handle == NULL) {

Reply via email to