commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-08-29 20:39:06 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.3399 (New) Package is "wireguard-tools" Sat Aug 29 20:39:06 2020 rev:8 rq:829934 version:1.0.20200827 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-08-24 15:12:55.254681115 +0200 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.3399/wireguard-tools.changes 2020-08-29 20:39:16.789387893 +0200 @@ -1,0 +2,8 @@ +Thu Aug 27 08:41:10 UTC 2020 - Martin Hauke + +- Udpate to version 1.0.20200827 + * wg-quick: android: use iproute2 to bring up interface instead +of ndc + * Revert "wg-quick: wait on process substitutions" + +--- Old: wireguard-tools-1.0.20200820.tar.asc wireguard-tools-1.0.20200820.tar.xz New: wireguard-tools-1.0.20200827.tar.asc wireguard-tools-1.0.20200827.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.zE0aAd/_old 2020-08-29 20:39:18.153388468 +0200 +++ /var/tmp/diff_new_pack.zE0aAd/_new 2020-08-29 20:39:18.157388470 +0200 @@ -18,7 +18,7 @@ Name: wireguard-tools -Version:1.0.20200820 +Version:1.0.20200827 Release:0 Summary:WireGuard userspace tools License:GPL-2.0-only ++ wireguard-tools-1.0.20200820.tar.xz -> wireguard-tools-1.0.20200827.tar.xz ++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200820/src/version.h new/wireguard-tools-1.0.20200827/src/version.h --- old/wireguard-tools-1.0.20200820/src/version.h 2020-08-20 12:06:22.0 +0200 +++ new/wireguard-tools-1.0.20200827/src/version.h 2020-08-27 10:22:09.0 +0200 @@ -1,3 +1,3 @@ #ifndef WIREGUARD_TOOLS_VERSION -#define WIREGUARD_TOOLS_VERSION "1.0.20200820" +#define WIREGUARD_TOOLS_VERSION "1.0.20200827" #endif diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200820/src/wg-quick/android.c new/wireguard-tools-1.0.20200827/src/wg-quick/android.c --- old/wireguard-tools-1.0.20200820/src/wg-quick/android.c 2020-08-20 12:06:22.0 +0200 +++ new/wireguard-tools-1.0.20200827/src/wg-quick/android.c 2020-08-27 10:22:09.0 +0200 @@ -726,7 +726,7 @@ cmd("iptables -I INPUT 1 -p udp --dport %u -j ACCEPT -m comment --comment \"wireguard rule %s\"", listen_port, iface); cmd("ip6tables -I INPUT 1 -p udp --dport %u -j %s -m comment --comment \"wireguard rule %s\"", listen_port, should_block_ipv6(iface) ? "DROP" : "ACCEPT", iface); } - cndc("interface setcfg %s up", iface); + cmd("ip link set up dev %s", iface); cndc("network create %u vpn 1 1", *netid); cndc("network interface add %u %s", *netid, iface); } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200820/src/wg-quick/darwin.bash new/wireguard-tools-1.0.20200827/src/wg-quick/darwin.bash --- old/wireguard-tools-1.0.20200820/src/wg-quick/darwin.bash 2020-08-20 12:06:22.0 +0200 +++ new/wireguard-tools-1.0.20200827/src/wg-quick/darwin.bash 2020-08-27 10:22:09.0 +0200 @@ -92,7 +92,7 @@ LAUNCHED_BY_LAUNCHD=1 break fi - done < <(launchctl procinfo $$ 2>/dev/null); wait $! + done < <(launchctl procinfo $$ 2>/dev/null) } read_bool() { @@ -132,14 +132,14 @@ local todelete=( ) destination gateway netif while read -r destination _ _ _ _ netif _; do [[ $netif == "$REAL_INTERFACE" ]] && todelete+=( "$destination" ) - done < <(netstat -nr -f inet); wait $! + done < <(netstat -nr -f inet) for destination in "${todelete[@]}"; do cmd route -q -n delete -inet "$destination" >/dev/null || true done todelete=( ) while read -r destination gateway _ netif; do [[ $netif == "$REAL_INTERFACE" || ( $netif == lo* && $gateway == "$REAL_INTERFACE" ) ]] && todelete+=( "$destination" ) - done < <(netstat -nr -f inet6); wait $! + done < <(netstat -nr -f inet6) for destination in "${todelete[@]}"; do cmd route -q -n delete -inet6 "$destination" >/dev/null || true done @@ -181,7 +181,7 @@ defaultif="$netif" break fi - done < <(netstat -nr -f inet);
commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-08-24 15:10:53 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.3399 (New) Package is "wireguard-tools" Mon Aug 24 15:10:53 2020 rev:7 rq:828736 version:1.0.20200820 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-05-14 23:28:00.669402185 +0200 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.3399/wireguard-tools.changes 2020-08-24 15:12:55.254681115 +0200 @@ -1,0 +2,12 @@ +Sat Aug 22 20:44:20 UTC 2020 - Martin Hauke + +- Update to version 1.0.20200820 + * ipc: split into separate files per-platform + * wincompat: fold random into genkey + * systemd: add reload target to systemd unit + * man: wg-quick: use syncconf instead of addconf for strip example + * pubkey: isblank is a subset of isspace + * ctype: use non-locale-specific ctype.h + * wg-quick: wait on process substitutions + +--- Old: wireguard-tools-1.0.20200513.tar.asc wireguard-tools-1.0.20200513.tar.xz New: wireguard-tools-1.0.20200820.tar.asc wireguard-tools-1.0.20200820.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.prh9GW/_old 2020-08-24 15:12:57.034681982 +0200 +++ /var/tmp/diff_new_pack.prh9GW/_new 2020-08-24 15:12:57.038681984 +0200 @@ -18,7 +18,7 @@ Name: wireguard-tools -Version:1.0.20200513 +Version:1.0.20200820 Release:0 Summary:WireGuard userspace tools License:GPL-2.0-only ++ wireguard-tools-1.0.20200513.tar.xz -> wireguard-tools-1.0.20200820.tar.xz ++ 3339 lines of diff (skipped)
commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-05-14 23:27:56 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.2738 (New) Package is "wireguard-tools" Thu May 14 23:27:56 2020 rev:6 rq:805627 version:1.0.20200513 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-05-11 16:30:49.862459214 +0200 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.2738/wireguard-tools.changes 2020-05-14 23:28:00.669402185 +0200 @@ -1,0 +2,7 @@ +Thu May 14 14:45:48 UTC 2020 - Martin Hauke + +- Update to version 1.0.20200513 + * Makefile: remember to install all systemd units + * ipc: openbsd: switch to array ioctl interface + +--- Old: wireguard-tools-1.0.20200510.tar.asc wireguard-tools-1.0.20200510.tar.xz New: wireguard-tools-1.0.20200513.tar.asc wireguard-tools-1.0.20200513.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.nxa4Kf/_old 2020-05-14 23:28:01.385403748 +0200 +++ /var/tmp/diff_new_pack.nxa4Kf/_new 2020-05-14 23:28:01.389403756 +0200 @@ -18,7 +18,7 @@ Name: wireguard-tools -Version:1.0.20200510 +Version:1.0.20200513 Release:0 Summary:WireGuard userspace tools License:GPL-2.0-only @@ -61,7 +61,6 @@ WITH_WGQUICK=yes \ WITH_SYSTEMDUNITS=yes -install -D -m0644 systemd/wg-quick.target %{buildroot}%{_unitdir}/wg-quick.target install -d %{buildroot}/%{_sysconfdir}/wireguard/ %pre ++ wireguard-tools-1.0.20200510.tar.xz -> wireguard-tools-1.0.20200513.tar.xz ++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200510/src/Makefile new/wireguard-tools-1.0.20200513/src/Makefile --- old/wireguard-tools-1.0.20200510/src/Makefile 2020-05-11 06:20:44.0 +0200 +++ new/wireguard-tools-1.0.20200513/src/Makefile 2020-05-14 02:29:41.0 +0200 @@ -90,7 +90,7 @@ @[ "$(WITH_WGQUICK)" = "yes" -a "$(WITH_BASHCOMPLETION)" = "yes" ] || exit 0; \ install -v -m 0644 completion/wg-quick.bash-completion "$(DESTDIR)$(BASHCOMPDIR)/wg-quick" @[ "$(WITH_WGQUICK)" = "yes" -a "$(WITH_SYSTEMDUNITS)" = "yes" ] || exit 0; \ - install -v -d "$(DESTDIR)$(SYSTEMDUNITDIR)" && install -v -m 0644 systemd/wg-quick@.service "$(DESTDIR)$(SYSTEMDUNITDIR)/wg-quick@.service" + install -v -d "$(DESTDIR)$(SYSTEMDUNITDIR)" && install -v -m 0644 systemd/* "$(DESTDIR)$(SYSTEMDUNITDIR)/" check: clean scan-build --html-title=wireguard-tools -maxloop 100 --view --keep-going $(MAKE) wg diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200510/src/ipc.c new/wireguard-tools-1.0.20200513/src/ipc.c --- old/wireguard-tools-1.0.20200510/src/ipc.c 2020-05-11 06:20:44.0 +0200 +++ new/wireguard-tools-1.0.20200513/src/ipc.c 2020-05-14 02:29:41.0 +0200 @@ -986,12 +986,12 @@ goto out; if (last_size >= wgdata.wgd_size) break; - wgdata.wgd_mem = realloc(wgdata.wgd_mem, wgdata.wgd_size); - if (!wgdata.wgd_mem) + wgdata.wgd_interface = realloc(wgdata.wgd_interface, wgdata.wgd_size); + if (!wgdata.wgd_interface) goto out; } - wg_iface = wgdata.wgd_mem; + wg_iface = wgdata.wgd_interface; dev = calloc(1, sizeof(*dev)); if (!dev) goto out; @@ -1017,7 +1017,8 @@ dev->flags |= WGDEVICE_HAS_PRIVATE_KEY; } - for (wg_peer = wg_iface->i_peers; wg_peer; wg_peer = wg_peer->p_next) { + wg_peer = _iface->i_peers[0]; + for (size_t i = 0; i < wg_iface->i_peers_count; ++i) { peer = calloc(1, sizeof(*peer)); if (!peer) goto out; @@ -1052,7 +1053,8 @@ peer->last_handshake_time.tv_sec = wg_peer->p_last_handshake.tv_sec; peer->last_handshake_time.tv_nsec = wg_peer->p_last_handshake.tv_nsec; - for (wg_aip = wg_peer->p_aips; wg_aip; wg_aip = wg_aip->a_next) { + wg_aip = _peer->p_aips[0]; + for (size_t j = 0; j < wg_peer->p_aips_count; ++j) { aip = calloc(1, sizeof(*aip)); if (!aip) goto out; @@ -1071,55 +1073,63 @@ memcpy(>ip6, _aip->a_ipv6, sizeof(aip->ip6));
commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-05-11 16:30:44 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.2738 (New) Package is "wireguard-tools" Mon May 11 16:30:44 2020 rev:5 rq:802650 version:1.0.20200510 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-03-22 14:18:31.826109187 +0100 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.2738/wireguard-tools.changes 2020-05-11 16:30:49.862459214 +0200 @@ -1,0 +2,21 @@ +Mon May 11 06:39:12 UTC 2020 - Martin Hauke + +- Update to version 1.0.20200510 + * ipc: add support for openbsd kernel implementation + * ipc: cleanup openbsd support + * wg-quick: add support for openbsd kernel implementation + * wg-quick: cleanup openbsd support + * wg-quick: support dns search domains + * Makefile: simplify silent cleaning + * git: add gitattributes so tarball doesn't have gitignore files + * terminal: specialize color_mode to stdout only + * highlighter: insist on 256-bit keys, not 257-bit or 258-bit + * wg-quick: android: support application whitelist + * systemd: add wg-quick.target +- Remove patch (not longer needed): + * wireguard-fix-systemd-service.patch +- Remove source file (fixed upstream) + * wireguard.target +This functionality is now provided by wg-quick.target + +--- Old: wireguard-fix-systemd-service.patch wireguard-tools-1.0.20200319.tar.asc wireguard-tools-1.0.20200319.tar.xz wireguard.target New: wireguard-tools-1.0.20200510.tar.asc wireguard-tools-1.0.20200510.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.3jcowt/_old 2020-05-11 16:30:51.638462952 +0200 +++ /var/tmp/diff_new_pack.3jcowt/_new 2020-05-11 16:30:51.642462961 +0200 @@ -18,7 +18,7 @@ Name: wireguard-tools -Version:1.0.20200319 +Version:1.0.20200510 Release:0 Summary:WireGuard userspace tools License:GPL-2.0-only @@ -27,8 +27,6 @@ Source: https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-%{version}.tar.xz Source1: https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-%{version}.tar.asc Source99: https://www.zx2c4.com/keys/AB9942E6D4A4CFC3412620A749FC7012A5DE03AE.asc#/WireGuard.keyring -Source2:wireguard.target -Patch1: wireguard-fix-systemd-service.patch BuildRequires: bash-completion BuildRequires: pkgconfig %systemd_requires @@ -49,7 +47,6 @@ %prep %setup -q -n wireguard-tools-%{version} -%patch1 -p1 ## HACK: Fixing wg-quick's DNS= directive with a hatchet contrib/dns-hatchet/apply.sh @@ -64,20 +61,20 @@ WITH_WGQUICK=yes \ WITH_SYSTEMDUNITS=yes -install -D -m0644 %{S:2} %{buildroot}%{_unitdir}/wireguard.target +install -D -m0644 systemd/wg-quick.target %{buildroot}%{_unitdir}/wg-quick.target install -d %{buildroot}/%{_sysconfdir}/wireguard/ %pre -%service_add_pre wireguard.target wg-quick@.service +%service_add_pre wg-quick.target wg-quick@.service %post -%service_add_post wireguard.target wg-quick@.service +%service_add_post wg-quick.target wg-quick@.service %preun -%service_del_preun wireguard.target wg-quick@.service +%service_del_preun wg-quick.target wg-quick@.service %postun -%service_del_postun wireguard.target wg-quick@.service +%service_del_postun wg-quick.target wg-quick@.service %files %license COPYING @@ -90,6 +87,6 @@ %{_datadir}/bash-completion/completions/wg %{_datadir}/bash-completion/completions/wg-quick %{_unitdir}/wg-quick@.service -%{_unitdir}/wireguard.target +%{_unitdir}/wg-quick.target %changelog ++ wireguard-tools-1.0.20200319.tar.xz -> wireguard-tools-1.0.20200510.tar.xz ++ 1653 lines of diff (skipped)
commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-03-22 14:18:27 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.3160 (New) Package is "wireguard-tools" Sun Mar 22 14:18:27 2020 rev:4 rq:787157 version:1.0.20200319 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-02-10 21:54:12.650217106 +0100 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.3160/wireguard-tools.changes 2020-03-22 14:18:31.826109187 +0100 @@ -1,0 +2,11 @@ +Sat Mar 21 13:57:06 UTC 2020 - Martin Hauke + +- Update to version 1.0.20200319 + * netlink: initialize mostly unused field + * curve25519: squelch warnings on clang + * man: fix grammar in wg(8) and wg-quick(8) + * man: backlink wg-quick(8) in wg(8) + * man: add a warning to the SaveConfig description + * wincompat: use string_list instead of inflatable_buffer + +--- Old: wireguard-tools-1.0.20200206.tar.asc wireguard-tools-1.0.20200206.tar.xz New: wireguard-tools-1.0.20200319.tar.asc wireguard-tools-1.0.20200319.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.KGryCA/_old 2020-03-22 14:18:32.270109472 +0100 +++ /var/tmp/diff_new_pack.KGryCA/_new 2020-03-22 14:18:32.274109474 +0100 @@ -18,7 +18,7 @@ Name: wireguard-tools -Version:1.0.20200206 +Version:1.0.20200319 Release:0 Summary:WireGuard userspace tools License:GPL-2.0-only ++ wireguard-tools-1.0.20200206.tar.xz -> wireguard-tools-1.0.20200319.tar.xz ++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/curve25519.c new/wireguard-tools-1.0.20200319/src/curve25519.c --- old/wireguard-tools-1.0.20200206/src/curve25519.c 2020-02-06 16:19:47.0 +0100 +++ new/wireguard-tools-1.0.20200319/src/curve25519.c 2020-03-19 23:46:35.0 +0100 @@ -39,35 +39,39 @@ #define le32_to_cpup(a) (*(a)) #define cpu_to_le64(a) (a) #endif -static inline __le32 get_unaligned_le32(const u8 *a) +#ifndef __unused +#define __unused __attribute__((unused)) +#endif +#ifndef __always_inline +#define __always_inline __inline __attribute__((__always_inline__)) +#endif +#ifndef noinline +#define noinline __attribute__((noinline)) +#endif +#ifndef __aligned +#define __aligned(x) __attribute__((aligned(x))) +#endif +#ifndef __force +#define __force +#endif + +static __always_inline __unused __le32 get_unaligned_le32(const u8 *a) { __le32 l; __builtin_memcpy(, a, sizeof(l)); return le32_to_cpup(); } -static inline __le64 get_unaligned_le64(const u8 *a) +static __always_inline __unused __le64 get_unaligned_le64(const u8 *a) { __le64 l; __builtin_memcpy(, a, sizeof(l)); return le64_to_cpup(); } -static inline void put_unaligned_le64(u64 s, u8 *d) +static __always_inline __unused void put_unaligned_le64(u64 s, u8 *d) { __le64 l = cpu_to_le64(s); __builtin_memcpy(d, , sizeof(l)); } -#ifndef __always_inline -#define __always_inline __inline __attribute__((__always_inline__)) -#endif -#ifndef noinline -#define noinline __attribute__((noinline)) -#endif -#ifndef __aligned -#define __aligned(x) __attribute__((aligned(x))) -#endif -#ifndef __force -#define __force -#endif static noinline void memzero_explicit(void *s, size_t count) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200206/src/man/wg-quick.8 new/wireguard-tools-1.0.20200319/src/man/wg-quick.8 --- old/wireguard-tools-1.0.20200206/src/man/wg-quick.8 2020-02-06 16:19:47.0 +0100 +++ new/wireguard-tools-1.0.20200319/src/man/wg-quick.8 2020-03-19 23:46:35.0 +0100 @@ -56,7 +56,7 @@ The configuration file adds a few extra configuration values to the format understood by .BR wg (8) -in order to configure additional attribute of an interface. It handles the +in order to configure additional attributes of an interface. It handles the values that it understands, and then it passes the remaining ones directly to .BR wg (8) for further processing. @@ -99,7 +99,8 @@ the commands are executed in order. .IP \(bu SaveConfig \(em if set to `true', the configuration is saved from the current state of the -interface upon shutdown. +interface upon shutdown. Any changes made to the configuration file before the +interface is removed will therefore be overwritten. .P Recommended \fIINTERFACE\fP names include `wg0' or `wgvpn0' or even
commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-02-10 21:54:11 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.26092 (New) Package is "wireguard-tools" Mon Feb 10 21:54:11 2020 rev:3 rq:772554 version:1.0.20200206 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-01-22 22:45:53.652564248 +0100 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.26092/wireguard-tools.changes 2020-02-10 21:54:12.650217106 +0100 @@ -1,0 +2,11 @@ +Thu Feb 6 20:44:11 UTC 2020 - Martin Hauke + +- Update to version 1.0.20200206 + * man: document dynamic debug trick for Linux + * extract-{handshakes,keys}: rework for upstream kernel + * netlink: remove libmnl requirement + * embeddable-wg-library: use newer string_list + * netlink: don't pretend that sysconf isn't a function + * Small cleanups. + +--- Old: wireguard-tools-1.0.20200121.tar.asc wireguard-tools-1.0.20200121.tar.xz New: wireguard-tools-1.0.20200206.tar.asc wireguard-tools-1.0.20200206.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.x9QUxE/_old 2020-02-10 21:54:13.454217551 +0100 +++ /var/tmp/diff_new_pack.x9QUxE/_new 2020-02-10 21:54:13.458217553 +0100 @@ -1,7 +1,7 @@ # # spec file for package wireguard-tools # -# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2020 SUSE LLC # Copyright (c) 2020, Martin Hauke # # All modifications and additions to the file contributed by third parties @@ -18,7 +18,7 @@ Name: wireguard-tools -Version:1.0.20200121 +Version:1.0.20200206 Release:0 Summary:WireGuard userspace tools License:GPL-2.0-only @@ -30,7 +30,6 @@ Source2:wireguard.target Patch1: wireguard-fix-systemd-service.patch BuildRequires: bash-completion -BuildRequires: libmnl-devel BuildRequires: pkgconfig %systemd_requires @@ -55,6 +54,7 @@ contrib/dns-hatchet/apply.sh %build +export CFLAGS="%{optflags}" make V=1 -C src %{?_smp_mflags} %install ++ wireguard-tools-1.0.20200121.tar.xz -> wireguard-tools-1.0.20200206.tar.xz ++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200121/README.md new/wireguard-tools-1.0.20200206/README.md --- old/wireguard-tools-1.0.20200121/README.md 2020-01-21 15:51:31.0 +0100 +++ new/wireguard-tools-1.0.20200206/README.md 2020-02-06 16:19:47.0 +0100 @@ -14,9 +14,7 @@ $ cd src $ make -On Linux, [`libmnl`](https://netfilter.org/projects/libmnl/index.html) is -required. On Windows, the [MinGW](http://www.mingw.org/) compiler is required. -On other platforms, only a sane libc is required. +There are no dependencies other than a good C compiler and a sane libc. ## Installing diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/test.c new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/test.c --- old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/test.c 2020-01-21 15:51:31.0 +0100 +++ new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/test.c 2020-02-06 16:19:47.0 +0100 @@ -27,8 +27,11 @@ perror("Unable to get device"); continue; } - wg_key_to_base64(key, device->public_key); - printf("%s has public key %s\n", device_name, key); + if (device->flags & WGDEVICE_HAS_PUBLIC_KEY) { + wg_key_to_base64(key, device->public_key); + printf("%s has public key %s\n", device_name, key); + } else + printf("%s has no public key\n", device_name); wg_for_each_peer(device, peer) { wg_key_to_base64(key, peer->public_key); printf(" - peer %s\n", key); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/wireguard.c new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/wireguard.c --- old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/wireguard.c 2020-01-21 15:51:31.0 +0100 +++ new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/wireguard.c 2020-02-06 16:19:47.0 +0100 @@ -856,85 +856,73 @@ /* wireguard-specific
commit wireguard-tools for openSUSE:Factory
Hello community, here is the log from the commit of package wireguard-tools for openSUSE:Factory checked in at 2020-01-22 22:45:44 Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old) and /work/SRC/openSUSE:Factory/.wireguard-tools.new.26092 (New) Package is "wireguard-tools" Wed Jan 22 22:45:44 2020 rev:2 rq:766168 version:1.0.20200121 Changes: --- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes 2020-01-21 21:01:07.640870266 +0100 +++ /work/SRC/openSUSE:Factory/.wireguard-tools.new.26092/wireguard-tools.changes 2020-01-22 22:45:53.652564248 +0100 @@ -1,0 +2,11 @@ +Tue Jan 21 22:04:27 UTC 2020 - Martin Hauke + +- Update to version 1.0.20200121 + * Makefile: add standard 'all' target + * ipc: simplify inflatable buffer and add fuzzer + * fuzz: add generic command argument fuzzer + * fuzz: add set and setconf fuzzers + * netlink: make sure to clear return value when trying again + * Makefile: sort inputs to linker so that build is reproducible + +--- Old: wireguard-tools-1.0.20200102.tar.asc wireguard-tools-1.0.20200102.tar.xz New: wireguard-tools-1.0.20200121.tar.asc wireguard-tools-1.0.20200121.tar.xz Other differences: -- ++ wireguard-tools.spec ++ --- /var/tmp/diff_new_pack.eq4nqJ/_old 2020-01-22 22:45:55.704565281 +0100 +++ /var/tmp/diff_new_pack.eq4nqJ/_new 2020-01-22 22:45:55.752565306 +0100 @@ -1,6 +1,7 @@ # # spec file for package wireguard-tools # +# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany. # Copyright (c) 2020, Martin Hauke # # All modifications and additions to the file contributed by third parties @@ -15,10 +16,11 @@ # Please submit bugfixes or comments via https://bugs.opensuse.org/ # + Name: wireguard-tools -Version:1.0.20200102 +Version:1.0.20200121 Release:0 -Summary:Wireguard userspace tools +Summary:WireGuard userspace tools License:GPL-2.0-only Group: Productivity/Networking/Security URL:https://www.wireguard.com/ ++ wireguard-tools-1.0.20200102.tar.xz -> wireguard-tools-1.0.20200121.tar.xz ++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200102/src/Makefile new/wireguard-tools-1.0.20200121/src/Makefile --- old/wireguard-tools-1.0.20200102/src/Makefile 2020-01-02 19:53:11.0 +0100 +++ new/wireguard-tools-1.0.20200121/src/Makefile 2020-01-21 15:51:31.0 +0100 @@ -46,9 +46,9 @@ ifeq ($(DEBUG),yes) CFLAGS += -g endif -GIT_VERSION := $(shell GIT_CEILING_DIRECTORIES="$(PWD)/../.." git describe --dirty 2>/dev/null) -ifneq ($(GIT_VERSION),) -CFLAGS += -D'WIREGUARD_TOOLS_VERSION="$(GIT_VERSION:v%=%)"' +WIREGUARD_TOOLS_VERSION = $(patsubst v%,%,$(shell GIT_CEILING_DIRECTORIES="$(PWD)/../.." git describe --dirty 2>/dev/null)) +ifneq ($(WIREGUARD_TOOLS_VERSION),) +CFLAGS += -D'WIREGUARD_TOOLS_VERSION="$(WIREGUARD_TOOLS_VERSION)"' endif ifeq ($(PLATFORM),linux) LIBMNL_CFLAGS := $(shell $(PKG_CONFIG) --cflags libmnl 2>/dev/null) @@ -68,18 +68,18 @@ ifneq ($(V),1) BUILT_IN_LINK.o := $(LINK.o) -LINK.o = @echo " LD $$(pwd)/$@"; +LINK.o = @echo " LD $@"; LINK.o += $(BUILT_IN_LINK.o) BUILT_IN_COMPILE.c := $(COMPILE.c) -COMPILE.c = @echo " CC $$(pwd)/$@"; +COMPILE.c = @echo " CC $@"; COMPILE.c += $(BUILT_IN_COMPILE.c) endif -wg: $(patsubst %.c,%.o,$(wildcard *.c)) +wg: $(sort $(patsubst %.c,%.o,$(wildcard *.c))) ifneq ($(V),1) clean: - @echo " CLEAN $$(pwd)/{wg,*.o,*.d}" + @echo " CLEAN {wg,*.o,*.d}" @$(RM) wg *.o *.d else clean: @@ -103,6 +103,8 @@ check: clean scan-build --html-title=wireguard-tools -maxloop 100 --view --keep-going $(MAKE) wg +all: wg +.DEFAULT_GOAL: all .PHONY: clean install check -include *.d diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200102/src/fuzz/.gitignore new/wireguard-tools-1.0.20200121/src/fuzz/.gitignore --- old/wireguard-tools-1.0.20200102/src/fuzz/.gitignore2020-01-02 19:53:11.0 +0100 +++ new/wireguard-tools-1.0.20200121/src/fuzz/.gitignore2020-01-21 15:51:31.0 +0100 @@ -1,2 +1,6 @@ config uapi +stringlist +cmd +set +setconf diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/wireguard-tools-1.0.20200102/src/fuzz/Makefile new/wireguard-tools-1.0.20200121/src/fuzz/Makefile --- old/wireguard-tools-1.0.20200102/src/fuzz/Makefile 2020-01-02 19:53:11.0 +0100 +++ new/wireguard-tools-1.0.20200121/src/fuzz/Makefile 2020-01-21