NetworkManager update upstream with patches
Signed-off-by: basebuilder_pel7ppc64bebuilder0 <basebuilder@powerel.org>master
parent
bb58123f7e
commit
43af999b7a
|
@ -10,7 +10,7 @@
|
|||
%global epoch_version 1
|
||||
%global rpm_version 1.12.0
|
||||
%global real_version 1.12.0
|
||||
%global release_version 8
|
||||
%global release_version 10
|
||||
%global snapshot %{nil}
|
||||
%global git_sha %{nil}
|
||||
|
||||
|
@ -33,7 +33,6 @@
|
|||
%global snap %{?snapshot_dot}%{?git_sha_dot}
|
||||
|
||||
%global real_version_major %(printf '%s' '%{real_version}' | sed -n 's/^\\([1-9][0-9]*\\.[1-9][0-9]*\\)\\.[1-9][0-9]*$/\\1/p')
|
||||
%global real_version_major 1.12
|
||||
|
||||
%global is_devel_build %(printf '%s' '%{real_version}' | sed -n 's/^1\\.\\([0-9]*[13579]\\)\\..*/1/p')
|
||||
|
||||
|
@ -131,6 +130,9 @@ Patch1000: 1000-cli-remove-assertion-in-nmc_device_state_to_color.patch
|
|||
Patch1001: 1001-translations-rh1569438.patch
|
||||
Patch1002: 1002-cli-fix-reading-vpn.secrets.-from-passwd-file.patch
|
||||
Patch1003: 1003-manager-accept-non-null-device-for-VPN-activations-rh1641174.patch
|
||||
Patch1004: 1004-preserve-routes-on-link-down-rh1676551.patch
|
||||
Patch1005: 1005-manager-ignore-ovs-system-master-when-assuming-rh1676551.patch
|
||||
Patch1006: 1006-device-announce-arp-after-slaves-rh1678796.patch
|
||||
|
||||
# The pregenerated docs contain default values and paths that depend
|
||||
# on the configure options when creating the source tarball.
|
||||
|
@ -891,6 +893,13 @@ fi
|
|||
|
||||
|
||||
%changelog
|
||||
* Mon Mar 4 2019 Beniamino Galvani <bgalvani@redhat.com> - 1:1.12.0-10
|
||||
- manager: ignore ovs-system master when assuming connections (rh #1676551)
|
||||
- device: do ARP announcements only after masters have a slave (rh #1678796)
|
||||
|
||||
* Tue Feb 19 2019 Beniamino Galvani <bgalvani@redhat.com> - 1:1.12.0-9
|
||||
- device: restore routes after a link down event (rh #1676551)
|
||||
|
||||
* Fri Nov 2 2018 Thomas Haller <thaller@redhat.com> - 1:1.12.0-8
|
||||
- dhcp: fix out-of-bounds heap write for DHCPv6 with internal plugin (CVE-2018-15688)
|
||||
|
||||
|
|
Loading…
Reference in New Issue