commit yast2-auth-server for openSUSE:Factory
Hello community, here is the log from the commit of package yast2-auth-server for openSUSE:Factory checked in at 2018-03-30 12:07:58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/yast2-auth-server (Old) and /work/SRC/openSUSE:Factory/.yast2-auth-server.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "yast2-auth-server" Fri Mar 30 12:07:58 2018 rev:18 rq:592204 version:3.2.2 Changes: -------- --- /work/SRC/openSUSE:Factory/yast2-auth-server/yast2-auth-server.changes 2018-02-20 17:59:27.161008442 +0100 +++ /work/SRC/openSUSE:Factory/.yast2-auth-server.new/yast2-auth-server.changes 2018-03-30 12:08:03.368359929 +0200 @@ -1,0 +2,6 @@ +Mon Mar 19 09:30:15 UTC 2018 - hguo@suse.com + +- Fix unreliable server setup routine caused by incorrect handling + of external program IO (bsc#1081324), bump to version 3.2.2. + +------------------------------------------------------------------- Old: ---- yast2-auth-server-3.2.1.tar.bz2 New: ---- yast2-auth-server-3.2.2.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ yast2-auth-server.spec ++++++ --- /var/tmp/diff_new_pack.5uARzy/_old 2018-03-30 12:08:04.136332163 +0200 +++ /var/tmp/diff_new_pack.5uARzy/_new 2018-03-30 12:08:04.136332163 +0200 @@ -20,7 +20,7 @@ Summary: A tool for creating identity management server instances License: GPL-2.0+ Group: System/YaST -Version: 3.2.1 +Version: 3.2.2 Release: 0 Source0: %{name}-%{version}.tar.bz2 Url: https://github.com/yast/yast-auth-server ++++++ yast2-auth-server-3.2.1.tar.bz2 -> yast2-auth-server-3.2.2.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-auth-server-3.2.1/package/yast2-auth-server.changes new/yast2-auth-server-3.2.2/package/yast2-auth-server.changes --- old/yast2-auth-server-3.2.1/package/yast2-auth-server.changes 2018-02-20 13:52:11.000000000 +0100 +++ new/yast2-auth-server-3.2.2/package/yast2-auth-server.changes 2018-03-29 11:34:33.000000000 +0200 @@ -1,4 +1,10 @@ ------------------------------------------------------------------- +Mon Mar 19 09:30:15 UTC 2018 - hguo@suse.com + +- Fix unreliable server setup routine caused by incorrect handling + of external program IO (bsc#1081324), bump to version 3.2.2. + +------------------------------------------------------------------- Mon Feb 19 13:49:24 UTC 2018 - hguo@suse.com - Upgrade to version 3.2.1 that resolves issues in setting up diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-auth-server-3.2.1/package/yast2-auth-server.spec new/yast2-auth-server-3.2.2/package/yast2-auth-server.spec --- old/yast2-auth-server-3.2.1/package/yast2-auth-server.spec 2018-02-20 13:52:11.000000000 +0100 +++ new/yast2-auth-server-3.2.2/package/yast2-auth-server.spec 2018-03-29 11:34:33.000000000 +0200 @@ -18,7 +18,7 @@ Name: yast2-auth-server Group: System/YaST Summary: A tool for creating identity management server instances -Version: 3.2.1 +Version: 3.2.2 Release: 0 License: GPL-2.0+ Source0: %{name}-%{version}.tar.bz2 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-auth-server-3.2.1/src/lib/authserver/dir/client.rb new/yast2-auth-server-3.2.2/src/lib/authserver/dir/client.rb --- old/yast2-auth-server-3.2.1/src/lib/authserver/dir/client.rb 2018-02-20 13:52:11.000000000 +0100 +++ new/yast2-auth-server-3.2.2/src/lib/authserver/dir/client.rb 2018-03-29 11:34:33.000000000 +0200 @@ -55,7 +55,7 @@ def change_password(dn, new_pass) stdin, stdouterr, result = Open3.popen2e('/usr/bin/ldappasswd', '-H', @url, '-x', '-D', @bind_dn, '-w', @bind_pw, '-s', new_pass, dn) stdin.close - return [stdouterr.gets, result.value.exitstatus == 0] + return [stdouterr.readlines.join('\n'), result.value.exitstatus == 0] end # aci_allow_modify adds an ACI rule that allows user to modify a tree. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-auth-server-3.2.1/src/lib/authserver/dir/ds389.rb new/yast2-auth-server-3.2.2/src/lib/authserver/dir/ds389.rb --- old/yast2-auth-server-3.2.1/src/lib/authserver/dir/ds389.rb 2018-02-20 13:52:11.000000000 +0100 +++ new/yast2-auth-server-3.2.2/src/lib/authserver/dir/ds389.rb 2018-03-29 11:34:33.000000000 +0200 @@ -58,9 +58,9 @@ # Returns true only if setup was successful. def self.exec_setup(content) open(DS_SETUP_INI_PATH, 'w') {|fh| fh.puts(content)} - _, stdouterr, result = Open3.popen2e('/usr/sbin/setup-ds.pl', '--debug', '--silent', '-f', DS_SETUP_INI_PATH) - append_to_log(stdouterr.gets) - stdouterr.close + stdin, stdouterr, result = Open3.popen2e('/usr/sbin/setup-ds.pl', '--debug', '--silent', '-f', DS_SETUP_INI_PATH) + append_to_log(stdouterr.readlines.join('\n')) + stdin.close return result.value.exitstatus == 0 end @@ -95,13 +95,13 @@ instance_dir = '/etc/dirsrv/slapd-' + instance_name # Put CA certificate into NSS database _, stdouterr, result = Open3.popen2e('/usr/bin/certutil', '-A', '-d', instance_dir, '-n', 'ca_cert', '-t', 'C,,', '-i', ca_path) - append_to_log(stdouterr.gets) + append_to_log(stdouterr.readlines.join('\n')) if result.value.exitstatus != 0 return false end # Put TLS certificate and key into NSS database _, stdouterr, result = Open3.popen2e('/usr/bin/pk12util', '-d', instance_dir, '-W', '', '-K', '', '-i', p12_path) - append_to_log(stdouterr.gets) + append_to_log(stdouterr.readlines.join('\n')) if result.value.exitstatus != 0 return false end diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/yast2-auth-server-3.2.1/src/lib/authserver/krb/mit.rb new/yast2-auth-server-3.2.2/src/lib/authserver/krb/mit.rb --- old/yast2-auth-server-3.2.1/src/lib/authserver/krb/mit.rb 2018-02-20 13:52:11.000000000 +0100 +++ new/yast2-auth-server-3.2.2/src/lib/authserver/krb/mit.rb 2018-03-29 11:34:33.000000000 +0200 @@ -101,10 +101,10 @@ stdin.close succeeded = result.value.exitstatus == 0 if !succeeded - return [stdouterr.gets, false] + return [stdouterr.readlines.join('\n'), false] end File.chmod(0600, file_path) - return [stdouterr.gets, true] + return [stdouterr.readlines.join('\n'), true] end # init_dir uses kerberos LDAP utility to prepare a directory server for kerberos operation. @@ -113,7 +113,7 @@ puts ['/usr/lib/mit/sbin/kdb5_ldap_util', '-H', 'ldaps://'+ldaps_addr, '-D', dir_admin_dn, '-w', dir_admin_pass, 'create', '-r', realm_name, '-subtrees', container_dn, '-s', '-P', master_pass].join(' ') stdin, stdouterr, result = Open3.popen2e('/usr/lib/mit/sbin/kdb5_ldap_util', '-H', 'ldaps://'+ldaps_addr, '-D', dir_admin_dn, '-w', dir_admin_pass, 'create', '-r', realm_name, '-subtrees', container_dn, '-s', '-P', master_pass) stdin.close - return [stdouterr.gets, result.value.exitstatus == 0] + return [stdouterr.readlines.join('\n'), result.value.exitstatus == 0] end # restart_kdc restarts KDC system service. Returns true only on success.
participants (1)
-
root@hilbert.suse.de