Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package certmonger for openSUSE:Factory checked in at 2024-07-15 19:46:18 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/certmonger (Old) and /work/SRC/openSUSE:Factory/.certmonger.new.17339 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "certmonger" Mon Jul 15 19:46:18 2024 rev:10 rq:1187420 version:0.79.19 Changes: -------- --- /work/SRC/openSUSE:Factory/certmonger/certmonger.changes 2024-06-28 15:47:29.794989931 +0200 +++ /work/SRC/openSUSE:Factory/.certmonger.new.17339/certmonger.changes 2024-07-15 19:46:21.649249138 +0200 @@ -1,0 +2,7 @@ +Thu Jul 11 17:22:28 UTC 2024 - David Mulder <david.mul...@suse.com> + +- Add cm_dont_restart_external.patch (a SUSE specific patch) which + prevents the restart of the cert request for an external ca + (bsc#1221406). + +------------------------------------------------------------------- New: ---- cm_dont_restart_external.patch BETA DEBUG BEGIN: New: - Add cm_dont_restart_external.patch (a SUSE specific patch) which prevents the restart of the cert request for an external ca BETA DEBUG END: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ certmonger.spec ++++++ --- /var/tmp/diff_new_pack.hodUFy/_old 2024-07-15 19:46:23.417313922 +0200 +++ /var/tmp/diff_new_pack.hodUFy/_new 2024-07-15 19:46:23.437314655 +0200 @@ -28,6 +28,7 @@ Patch0001: 0001-Update-tests-to-be-compatible-with-OpenSSL-3.2.patch Patch0002: certmonger-c99-01.patch Patch0003: certmonger-c99-02.patch +Patch0004: cm_dont_restart_external.patch BuildRequires: autoconf BuildRequires: automake ++++++ cm_dont_restart_external.patch ++++++ --- certmonger-0.79.13-150400.3.3.1.x86_64/src/iterate.c 2020-10-20 21:39:55.000000000 +0200 +++ certmonger-0.79.13-150400.3.3.1.x86_64/src/iterate.c 2024-05-08 10:48:22.851568239 +0200 @@ -2389,15 +2389,19 @@ case cm_ca_phase_renew_reqs: case cm_ca_phase_capabilities: if (emit_ca_changes != NULL) { - cm_restart_entries_by_ca(context, - ca->cm_nickname); + if(ca->cm_ca_type != cm_ca_external) { + cm_restart_entries_by_ca(context, + ca->cm_nickname); + } } ca->cm_ca_state[state->cm_phase] = CM_CA_NEED_TO_ANALYZE; break; case cm_ca_phase_encryption_certs: if (emit_ca_changes != NULL) { - cm_restart_entries_by_ca(context, - ca->cm_nickname); + if(ca->cm_ca_type != cm_ca_external) { + cm_restart_entries_by_ca(context, + ca->cm_nickname); + } } ca->cm_ca_state[state->cm_phase] = CM_CA_NEED_TO_ANALYZE; break;