rpms/openswan/devel openswan-600167.patch, NONE, 1.1 openswan-nm-584224-600174.patch, NONE, 1.1 .cvsignore, 1.30, 1.31 openswan-2.6-relpath.patch, 1.3, 1.4 openswan-ipsec-help-524146-509318.patch, 1.2, 1.3 openswan.spec, 1.90, 1.91 sources, 1.29, 1.30 openswan-2.6-selinux.patch, 1.5, NONE openswan-nm-and-584224.patch, 1.1, NONE openswan-rfc5114.patch, 1.2, NONE

avesh agarwal avesh at fedoraproject.org
Fri Jul 2 20:46:43 UTC 2010


Author: avesh

Update of /cvs/pkgs/rpms/openswan/devel
In directory cvs01.phx2.fedoraproject.org:/tmp/cvs-serv4393

Modified Files:
	.cvsignore openswan-2.6-relpath.patch 
	openswan-ipsec-help-524146-509318.patch openswan.spec sources 
Added Files:
	openswan-600167.patch openswan-nm-584224-600174.patch 
Removed Files:
	openswan-2.6-selinux.patch openswan-nm-and-584224.patch 
	openswan-rfc5114.patch 
Log Message:
* Fri Jul 2 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.27-1
- NetworkManager-openswan plugin related changes
- Fixes for bz 600167
- Fixes for bz 600174
- Fixes for bz 584224
- Updated old patches 


openswan-600167.patch:
 auto/auto.in        |  106 +++++++++++++++++++++++++++++++++++++++++++
 pluto/connections.c |    5 +-
 pluto/connections.h |    2 
 pluto/initiate.c    |  126 ++++++++++++++++++++++++++++++++++++++++++++++++++--
 4 files changed, 234 insertions(+), 5 deletions(-)

--- NEW FILE openswan-600167.patch ---
diff -urNp openswan-2.6.27-orig/programs/auto/auto.in openswan-2.6.27-cvs-patched/programs/auto/auto.in
--- openswan-2.6.27-orig/programs/auto/auto.in	2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/auto/auto.in	2010-07-02 15:24:00.962354620 -0400
@@ -40,6 +40,112 @@ op=
 argc=
 utc=
 
+defaultinterface() {
+	local getphysdev getifaddr addr phys next multiaddr multidefault
+	addr=
+	phys=
+	next=
+	multiaddr=
+	multidefault=
+
+	getphysdev() {
+	    local phys next addr
+	    phys=
+	    next=
+	    addr=
+	    while test $# -gt 0
+	      do
+	      case $1 in
+		  dev)
+		      phys=$2
+		      shift; shift;
+		      ;;
+		  via)
+		      next=$2
+		      shift; shift;
+		      ;;
+		  src)
+		      addr=$2
+		      shift; shift
+		      ;;
+		  *)
+		      shift
+		      ;;
+	      esac
+	    done
+	    echo "phys=$phys"
+	    echo "next=$next"
+	    echo "addr=$addr"
+	}
+
+	getifaddr() {
+	    local addr peer
+	    addr=
+	    peer=
+	    while test $# -gt 0
+	      do
+	      case $1 in
+		  inet)
+		      addr=$2
+		      shift; shift
+		      ;;
+		  peer)
+		      peer=$2
+		      shift; shift
+		      ;;
+		  *)
+		      shift
+		      ;;
+	      esac
+	    done
+	    if test -n "$peer"
+	    then
+		echo "next=${peer%/*}"
+	    fi
+	    echo "addr=${addr%/*}"
+	}
+
+	iproutedefault=`ip route list 0.0.0.0/0`
+	if test -n "$iproutedefault"
+	then
+	  if test `echo "$iproutedefault" | wc -l` -gt 1
+	  then
+	    multidefault=1
+	    iproutedefault=`echo $iproutedefault | head -1`
+	  fi
+	  eval `getphysdev $iproutedefault`
+	  if test -z "$next" -o -z "$addr" -a -n "$phys"
+	  then
+	    ipaddrlist=`ip -o -f inet addr list dev $phys` 
+	    if test `echo "$ipaddrlist" | wc -l` -gt 1
+	    then
+	      multiaddr=1
+	      ipaddrlist=`echo "$ipaddrlist" | head -1`
+	    fi
+	    eval `getifaddr $ipaddrlist`
+	  fi
+	  if test -n "$multidefault"
+	  then
+	    echo "multiple default routes, using $next on $phys"
+	  fi
+	  if test -n "$multiaddr"
+	  then
+	    echo "multiple ip addresses, using  $addr on $phys"
+	  fi
+	else
+	  echo "no default routes detected"
+	fi
+	# simulate old silly output
+	echo "defaultroutephys=$phys" > $info
+	echo "defaultroutevirt=none" >> $info
+	echo "defaultrouteaddr=$addr" >> $info
+	echo  "defaultroutenexthop=$next" >> $info
+}
+
+
+# calling this routine here again to update default network information in /var/run/pluto/ipsec.info
+defaultinterface
+
 for dummy
 do
 	case "$1" in
diff -urNp openswan-2.6.27-orig/programs/pluto/connections.c openswan-2.6.27-cvs-patched/programs/pluto/connections.c
--- openswan-2.6.27-orig/programs/pluto/connections.c	2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/pluto/connections.c	2010-07-02 15:26:16.746351708 -0400
@@ -457,7 +457,7 @@ check_orientations(void)
     }
 }
 
-static err_t
+err_t
 default_end(struct end *e, ip_address *dflt_nexthop)
 {
     err_t ugh = NULL;
@@ -1056,7 +1056,8 @@ check_connection_end(const struct whack_
     }
 
     /* MAKE this more sane in the face of unresolved IP addresses */
-    if (that->host_type != KH_IPHOSTNAME && isanyaddr(&that->host_addr))
+    /* that->host_type != KH_DEFAULTROUTE for cases when network is not up at the boot time*/
+    if (that->host_type != KH_IPHOSTNAME && that->host_type != KH_DEFAULTROUTE && isanyaddr(&that->host_addr))
     {
 	/* other side is wildcard: we must check if other conditions met */
 	if (that->host_type != KH_IPHOSTNAME && isanyaddr(&this->host_addr))
diff -urNp openswan-2.6.27-orig/programs/pluto/connections.h openswan-2.6.27-cvs-patched/programs/pluto/connections.h
--- openswan-2.6.27-orig/programs/pluto/connections.h	2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/pluto/connections.h	2010-07-02 15:28:20.438354071 -0400
@@ -289,6 +289,8 @@ extern size_t format_end(char *buf, size
     , const struct end *this, const struct end *that
     , bool is_left, lset_t policy);
 
+extern err_t default_end(struct end *e, ip_address *dflt_nexthop);
+
 struct whack_message;	/* forward declaration of tag whack_msg */
 extern void add_connection(const struct whack_message *wm);
 extern void initiate_connection(const char *name
diff -urNp openswan-2.6.27-orig/programs/pluto/initiate.c openswan-2.6.27-cvs-patched/programs/pluto/initiate.c
--- openswan-2.6.27-orig/programs/pluto/initiate.c	2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/pluto/initiate.c	2010-07-02 15:35:02.219359079 -0400
@@ -151,6 +151,121 @@ struct initiate_stuff {
     enum crypto_importance importance;
 };
 
+
+static int 
+resolve_and_reorient(struct connection *c) {
+
+    /* Connection is not oriented, and this may be because the connection was loaded when network was not up due to unresolved ip (atleast this or that) addresses */
+    /* Now connection is being initiated, and assuming network is up, we are trying once more to resolve ip addresses, */
+    /* and to add new network interfaces, and to orient the connections. */
+
+    if (!oriented(*c) && &c->spd != NULL && ( isanyaddr(&c->spd.this.host_addr) || isanyaddr(&c->spd.that.host_addr) ) ) {
+		char filedata[200]; /*size is set randonly*/
+		FILE *fp;
+		size_t bytes;
+		char value[20]; /*size is set randomly*/
+		char *tmp;
+
+		/* Reading the file /var/run/pluto/ipsec.info to obtain default route address ("defaultrouteaddr") after network is up*/
+		fp=fopen("/var/run/pluto/ipsec.info","r");
+
+		if(fp == NULL) {
+		DBG(DBG_CONTROLMORE, DBG_log("Error in opening /var/run/pluto/ipsec.info"));
+		return 0;
+		}
+
+		bytes=fread(filedata, 1, sizeof(filedata)-1, fp);
+		filedata[bytes]='\0';
+                value[0]='\0';
+		fclose(fp);
+
+		if(bytes==0){
+		DBG(DBG_CONTROLMORE, DBG_log("Error reading /var/run/pluto/ipsec.info or file empty"));
+		return 0;
+		}
+
+		unsigned int i = 0;
+		do
+		{
+		int start = i;
+		unsigned int slen;
+
+		while (filedata[i] != '\r' && filedata[i] != '\n' && i < bytes) i++;
+		filedata[i++] = '\0';
+
+		while ( (i<bytes) && (filedata[i] == '\r' || filedata[i] == '\n')) {
+		filedata[i++] = '\0';
+		}
+
+		tmp = &filedata[start];
+
+		if (strncmp(tmp, "defaultrouteaddr", strlen("defaultrouteaddr"))) continue;
+		slen = strlen(tmp);
+
+		if (slen < strlen("defaultrouteaddr")+1) continue;
+		if (tmp[strlen("defaultrouteaddr")] != '=') continue;
+		strcpy(value, &tmp[strlen("defaultrouteaddr")+1]);
+		break;
+
+		} while (i<bytes);
+
+	/*Trying to resolve "this" end*/
+	if(c->spd.this.host_type == KH_DEFAULTROUTE && isanyaddr(&c->spd.this.host_addr)) {
+	err_t e;
+	
+        e = ttoaddr(value, 0, 0, &c->spd.this.host_addr);
+        	if(e) {
+            	DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve this defaultrouteaddr"));
+		return 0;
+        	}		
+	} 
+	else if (c->spd.this.host_type == KH_IPHOSTNAME && isanyaddr(&c->spd.this.host_addr)) {
+        err_t e;
+        e = ttoaddr(c->spd.this.host_addr_name, 0, 0, &c->spd.this.host_addr);
+                if(e) {
+                DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve this ip address string"));
+                return 0;
+                }
+	}
+
+	/*Trying to resolve "that", and also another reason for doing this is that as the connection is not yet oriented, so it is not known which end is which*/
+        if(c->spd.that.host_type == KH_DEFAULTROUTE &&  isanyaddr(&c->spd.that.host_addr) ) {
+        err_t e;
+
+        e = ttoaddr(value, 0, 0, &c->spd.that.host_addr);
+                if(e) {
+                DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve that defaultrouteaddr"));
+                return 0;
+                }
+        } 
+        else if (c->spd.that.host_type == KH_IPHOSTNAME && isanyaddr(&c->spd.that.host_addr)) {
+        err_t e;
+        e = ttoaddr(c->spd.that.host_addr_name, 0, 0, &c->spd.that.host_addr);
+                if(e) {
+                DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve that ip address string"));
+                return 0;
+                }
+        }
+
+	/* If both this and that are resolved, only then proceed*/
+	if ( !isanyaddr(&c->spd.this.host_addr) && !isanyaddr(&c->spd.that.host_addr)) { 
+
+	/*Once ip addresses are resolved, setting boths end again*/
+	default_end(&c->spd.this, &c->spd.that.host_addr);
+    default_end(&c->spd.that, &c->spd.this.host_addr);
+
+	/*Now when ip addresses are resolved, adding new network interfaces after network is up*/
+	find_ifaces();
+
+	/*Due to the unresolved ip addresses this connection may have been set to CK_TEMPLATE, setting it to CK_PERMANENT as ip addresses are resolved now.*/
+	c->kind = CK_PERMANENT;
+	}
+    }
+
+
+return 1;
+}
+
 static int
 initiate_a_connection(struct connection *c
 		      , void *arg)
@@ -165,9 +280,14 @@ initiate_a_connection(struct connection 
 
     /* turn on any extra debugging asked for */
     c->extra_debugging |= moredebug;
-    
-    if (!oriented(*c))
-    {
+
+    if (!oriented(*c)) {
+	/*Lets try to resolve and reorient the connection once more, assuming network connection is up now*/
+	resolve_and_reorient(c);
+    }
+
+    if (!oriented(*c)) {
+
 	loglog(RC_ORIENT, "We cannot identify ourselves with either end of this connection.");
     }
     else if (NEVER_NEGOTIATE(c->policy))

openswan-nm-584224-600174.patch:
 _realsetup/_realsetup.in         |   10 +++++----
 _updown.netkey/_updown.netkey.in |   40 ++++++++++++++++++++++++++++++++-------
 2 files changed, 39 insertions(+), 11 deletions(-)

--- NEW FILE openswan-nm-584224-600174.patch ---
diff -urNp openswan-2.6.27-orig/programs/_realsetup/_realsetup.in openswan-2.6.27-cvs-patched/programs/_realsetup/_realsetup.in
--- openswan-2.6.27-orig/programs/_realsetup/_realsetup.in	2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/_realsetup/_realsetup.in	2010-07-02 15:36:58.223111824 -0400
@@ -472,6 +472,12 @@ case "$1" in
 			exit 3
 		fi
 		echo "but..."
+		if test "$plutokind" != "no"
+		then
+			echo "An ${plutokind} Pluto is active?"
+			exit 1
+		fi
+
 		if test "$hassublock"
 		then
 			echo "has subsystem lock ($subsyslock)!"
@@ -481,10 +487,6 @@ case "$1" in
 		then
 			echo "has $info file!"
 		fi
-		if test "$plutokind" != "no"
-		then
-			echo "An ${plutokind} Pluto is active?"
-		fi
 		if test "$eroutes" -gt 0
 		then
 			echo "some (${eroutes}) eroutes exist!"
diff -urNp openswan-2.6.27-orig/programs/_updown.netkey/_updown.netkey.in openswan-2.6.27-cvs-patched/programs/_updown.netkey/_updown.netkey.in
--- openswan-2.6.27-orig/programs/_updown.netkey/_updown.netkey.in	2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/_updown.netkey/_updown.netkey.in	2010-07-02 15:40:48.005354964 -0400
@@ -179,19 +179,26 @@ downroute() {
 }
 
 updateresolvconf() {
-    echo "updating resolvconf"
 
 if [ -z "$PLUTO_NM_CONFIGURED" -o "$PLUTO_NM_CONFIGURED" = 0 ]; then
-    if [ -e "$OPENSWAN_RESOLV_CONF" ]; then
-        echo "Backup resolv.conf already exists, so doing nothing"
-        return 1
-    fi
+    echo "updating resolvconf"
 
     if [ ! -e "$ORIG_RESOLV_CONF" ]; then
         echo "resolv.conf does not exist, so doing nothing"
         return 1
     fi
 
+    if [ -e "$OPENSWAN_RESOLV_CONF" ]; then
+	if grep 'Openswan' $ORIG_RESOLV_CONF > /dev/null 2>&1
+	then
+	    echo "Current resolv.conf is generated by Openswan, and backup resolv.conf already exists, so doing nothing"
+	    return 1
+	else
+            echo "backup resolv.conf exists, but current resolv.conf is not generated by Openswan"
+	fi
+    fi
+
+    rm -f $OPENSWAN_RESOLV_CONF
     cp -- $ORIG_RESOLV_CONF $OPENSWAN_RESOLV_CONF
 
     RESOLVE_CONF="#Generated by Openswan (IPSec)"
@@ -211,11 +218,23 @@ if [ -z "$PLUTO_NM_CONFIGURED" -o "$PLUT
 	done
    fi
 
+   ORIG_NAMESERVER=`grep -m 1 ^nameserver $ORIG_RESOLV_CONF`
+   RESOLVE_CONF="$RESOLVE_CONF\n$ORIG_NAMESERVER"
+
    rm -f -- $ORIG_RESOLV_CONF
    echo -e $RESOLVE_CONF > $ORIG_RESOLV_CONF
    return $?
 else
    echo "Updating resolv.conf is controlled by Network Manager"
+   openswan_reason=connect
+   export openswan_reason
+   export PLUTO_CISCO_DOMAIN_INFO
+   export PLUTO_CISCO_DNS_INFO
+   export PLUTO_PEER_BANNER
+   export PLUTO_MY_SOURCEIP
+   export PLUTO_PEER
+
+   /usr/libexec/nm-openswan-service-helper
    return 0
 fi
 }
@@ -249,8 +268,15 @@ fi
 addsource() {
     st=0
     # check if given sourceip is local and add as alias if not
-    if ! ip -o route get ${PLUTO_MY_SOURCEIP%/*} | grep -q ^local; then
-	it="ip addr add ${PLUTO_MY_SOURCEIP%/*}/32 dev ${PLUTO_INTERFACE%:*}"
+    saddr=${PLUTO_MY_SOURCEIP%/*}/32
+    if test "${PLUTO_PEER_CLIENT##*/}" != 32
+    then
+	saddr=${PLUTO_MY_SOURCEIP%/*}/"${PLUTO_PEER_CLIENT##*/}"
+    fi
+
+    if ! ip addr show dev ${PLUTO_INTERFACE%:*} | grep -qs "inet ${saddr}"
+    then
+	it="ip addr add ${saddr} dev ${PLUTO_INTERFACE%:*}"
 	oops="`eval $it 2>&1`"
 	st=$?
 	if [ " $oops" = " " -a " $st" != " 0" ]; then


Index: .cvsignore
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/.cvsignore,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -p -r1.30 -r1.31
--- .cvsignore	29 Mar 2010 18:05:44 -0000	1.30
+++ .cvsignore	2 Jul 2010 20:46:42 -0000	1.31
@@ -14,3 +14,4 @@ openswan-2.6.22.tar.gz
 openswan-2.6.23.tar.gz
 openswan-2.6.24.tar.gz
 openswan-2.6.25.tar.gz
+openswan-2.6.27.tar.gz

openswan-2.6-relpath.patch:
 Makefile.inc            |    2 ++
 programs/setup/Makefile |    2 +-
 2 files changed, 3 insertions(+), 1 deletion(-)

Index: openswan-2.6-relpath.patch
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/openswan-2.6-relpath.patch,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -p -r1.3 -r1.4
--- openswan-2.6-relpath.patch	29 Mar 2010 18:05:44 -0000	1.3
+++ openswan-2.6-relpath.patch	2 Jul 2010 20:46:42 -0000	1.4
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.25-orig/Makefile.inc openswan-2.6.25/Makefile.inc
---- openswan-2.6.25-orig/Makefile.inc	2010-03-21 13:39:35.000000000 -0400
-+++ openswan-2.6.25/Makefile.inc	2010-03-29 12:06:47.000000000 -0400
+diff -urNp openswan-2.6.27-orig/Makefile.inc openswan-2.6.27-cvs-patched/Makefile.inc
+--- openswan-2.6.27-orig/Makefile.inc	2010-06-21 11:43:35.000000000 -0400
++++ openswan-2.6.27-cvs-patched/Makefile.inc	2010-07-02 14:39:23.856116570 -0400
 @@ -123,6 +123,8 @@ FINALRCDIR=$(shell for d in $(INC_RCDIRS
  		do if test -d $(DESTDIR)/$$d ; \
  		then echo $$d ; exit 0 ; \
@@ -10,9 +10,9 @@ diff -urNp openswan-2.6.25-orig/Makefile
  RCDIR=$(DESTDIR)$(FINALRCDIR)
  
  
-diff -urNp openswan-2.6.25-orig/programs/setup/Makefile openswan-2.6.25/programs/setup/Makefile
---- openswan-2.6.25-orig/programs/setup/Makefile	2010-03-21 13:39:35.000000000 -0400
-+++ openswan-2.6.25/programs/setup/Makefile	2010-03-29 12:01:08.000000000 -0400
+diff -urNp openswan-2.6.27-orig/programs/setup/Makefile openswan-2.6.27-cvs-patched/programs/setup/Makefile
+--- openswan-2.6.27-orig/programs/setup/Makefile	2010-06-21 11:43:35.000000000 -0400
++++ openswan-2.6.27-cvs-patched/programs/setup/Makefile	2010-07-02 14:39:52.001360412 -0400
 @@ -32,7 +32,7 @@ include ${srcdir}../Makefile.program
  doinstall:: setup
  	@rm -f $(BINDIR)/setup

openswan-ipsec-help-524146-509318.patch:
 ipsec.in |    4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Index: openswan-ipsec-help-524146-509318.patch
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/openswan-ipsec-help-524146-509318.patch,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -p -r1.2 -r1.3
--- openswan-ipsec-help-524146-509318.patch	29 Mar 2010 18:05:46 -0000	1.2
+++ openswan-ipsec-help-524146-509318.patch	2 Jul 2010 20:46:43 -0000	1.3
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.25-orig/programs/ipsec/ipsec.in openswan-2.6.25/programs/ipsec/ipsec.in
---- openswan-2.6.25-orig/programs/ipsec/ipsec.in	2010-03-21 13:39:35.000000000 -0400
-+++ openswan-2.6.25/programs/ipsec/ipsec.in	2010-03-29 11:46:52.000000000 -0400
+diff -urNp openswan-2.6.27-orig/programs/ipsec/ipsec.in openswan-2.6.27-cvs-patched/programs/ipsec/ipsec.in
+--- openswan-2.6.27-orig/programs/ipsec/ipsec.in	2010-06-21 11:43:35.000000000 -0400
++++ openswan-2.6.27-cvs-patched/programs/ipsec/ipsec.in	2010-07-02 14:45:45.573355284 -0400
 @@ -79,9 +79,9 @@ case "$1" in
  --help)
  	echo "Usage: ipsec command argument ..."


Index: openswan.spec
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/openswan.spec,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -p -r1.90 -r1.91
--- openswan.spec	26 May 2010 20:36:19 -0000	1.90
+++ openswan.spec	2 Jul 2010 20:46:43 -0000	1.91
@@ -8,9 +8,9 @@
 
 Summary: IPSEC implementation with IKEv1 and IKEv2 keying protocols
 Name: openswan
-Version: 2.6.25
+Version: 2.6.27
 
-Release: 2%{?dist}
+Release: 1%{?dist}
 License: GPLv2+
 Url: http://www.openswan.org/
 Source: openswan-%{version}.tar.gz
@@ -18,10 +18,9 @@ Source: openswan-%{version}.tar.gz
 Source2: ipsec.conf
 
 Patch1: openswan-2.6-relpath.patch
-Patch2: openswan-2.6-selinux.patch
-Patch3: openswan-ipsec-help-524146-509318.patch
-Patch4: openswan-rfc5114.patch
-Patch5: openswan-nm-and-584224.patch
+Patch2: openswan-ipsec-help-524146-509318.patch
+Patch3: openswan-nm-584224-600174.patch
+Patch4: openswan-600167.patch
 
 Group: System Environment/Daemons
 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
@@ -76,10 +75,9 @@ find doc/examples -type f -print0 | xarg
 find doc -name .gitignore -print0 | xargs -0 rm -v
 
 %patch1 -p1 -b .relpath
-%patch2 -p1 -b .selinux
+%patch2 -p1
 %patch3 -p1
 %patch4 -p1
-%patch5 -p1
 
 %build
 
@@ -232,6 +230,13 @@ fi
 chkconfig --add ipsec || :
 
 %changelog
+* Fri Jul 2 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.27-1
+- NetworkManager-openswan plugin related changes
+- Fixes for bz 600167
+- Fixes for bz 600174
+- Fixes for bz 584224
+- Updated old patches 
+
 * Wed May 29 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.25-2
 - NetworkManager-openswan plugin related changes
 - Fixes for bz 584224


Index: sources
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/sources,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -p -r1.29 -r1.30
--- sources	29 Mar 2010 18:05:46 -0000	1.29
+++ sources	2 Jul 2010 20:46:43 -0000	1.30
@@ -1 +1 @@
-c1223786c9eb58950a4be0ab2d0a84d1  openswan-2.6.25.tar.gz
+5177b7401bb89e84ca1c89029143441e  openswan-2.6.27.tar.gz


--- openswan-2.6-selinux.patch DELETED ---


--- openswan-nm-and-584224.patch DELETED ---


--- openswan-rfc5114.patch DELETED ---



More information about the scm-commits mailing list