From patchwork Mon Feb 26 18:00:15 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller_via_Development?= X-Patchwork-Id: 1675 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) by web02.i.ipfire.org (Postfix) with ESMTP id 3C06060741 for ; Mon, 26 Feb 2018 08:00:24 +0100 (CET) X-Virus-Scanned: ClamAV at mail01.ipfire.org Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 68595105FC8A; Mon, 26 Feb 2018 07:00:41 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=lists.ipfire.org; s=201801; t=1519628441; x=1522220441; bh=3UBWqRXEtqrh2XYTHAQWk/iE0+9PtqqngKD27Bs9T6w=; h=To:Subject:Date:Message-Id:From:Reply-To:Sender:From:To:Cc:Date: Content-Type:Message-ID:In-Reply-To:Subject:Reply-To:Sender; b=jayNiVBT8ScjIoJrNegorM3BH0o29nmsowLTK/ZTt58D5AsKJPSRidWv/yQZD5AHv Z9vaw0xa9YkZSv4JwXBUQmCiAubI6rrvEyWZUFdpHXtxrGMXDH3QPC8K05aYcLjgxi SBSY+fg7SMztPUVA5w/ckOmNAtjOb3zuLt2UCAMeWG1phYW8HPFc7DIBkAyEt5K6Eg HJWt/65sIsbh/nH61k0uh3lc90pN2WEYgixtDYwW4WyXwLOOCLm0Dg2b1oWqMS/pbf E8r/zq2Y1qXKJK/ggg8VxIJx3qZh57uxE7ouK9xJdypY/qij1Tflk0gdLTDJ/6gcuU RSGcgpUG3PDTQ== X-Virus-Scanned: ClamAV at mail01.ipfire.org Received: from localhost.localdomain (i59F523E2.versanet.de [89.245.35.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 5A5A71018DE0; Mon, 26 Feb 2018 07:00:38 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ipfire.org; s=201801; t=1519628438; x=1522220438; bh=3UBWqRXEtqrh2XYTHAQWk/iE0+9PtqqngKD27Bs9T6w=; h=From:To:Cc:Subject:Date:Message-Id:From:To:Cc:Date:Content-Type: Message-ID:In-Reply-To:Subject:Reply-To:Sender; b=oAv6PcOzceHAZCcpAZTXP1VNVuqSMP2qp28IT6lpLf09CW2mWCr47Dbx3yLrCPjnq js94AmAdLMPIPuWP4MpYiiHH2M9odxONrCoKe6ay5nR4916oTKHJSp0dpiumDs7ejF ZMefMVbkLe/ktPVLpyLI2QaaTwkq7BWqbgmGKOW05GteLB8OSf6SeT0cyi6YJKvq7t +FLOsiyhRVsHlp6/tmv11AjiQLNi+GHr67Rd711l2uaUW8krLQgE5wVw60siQNakAt 3GTSRcNTjxGhYl0iFR6EsR8bDB1UnQYlOXs+P/GPUnbCcibArWF+mPDSwGFDSwJndB WxmGkhigFQWyQ== To: development@lists.ipfire.org Subject: [PATCH] OpenVPN: Ship missing OpenSSL configuration file for update Date: Mon, 26 Feb 2018 08:00:15 +0100 Message-Id: <1519628415-14144-1-git-send-email-erik.kapfer@ipfire.org> X-Mailer: git-send-email 2.7.4 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Erik Kapfer via Development From: =?utf-8?q?Peter_M=C3=BCller_via_Development?= Reply-To: Erik Kapfer Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Core 115 delivered a patch which prevents the '--ns-cert-type server is deprecated' message and introduced also '--remote-cert-tls server' --> https://patchwork.ipfire.org/patch/1441/ whereby the changed ovpn.cnf has not been delivered. Signed-off-by: Erik Kapfer --- config/rootfiles/core/120/filelists/files | 1 + 1 file changed, 1 insertion(+) diff --git a/config/rootfiles/core/120/filelists/files b/config/rootfiles/core/120/filelists/files index 4baf08e..9369453 100644 --- a/config/rootfiles/core/120/filelists/files +++ b/config/rootfiles/core/120/filelists/files @@ -3,3 +3,4 @@ etc/issue etc/fcron.daily/openvpn-crl-updater srv/web/ipfire/cgi-bin/ovpnmain.cgi var/ipfire/langs +var/ipfire/ovpn/openssl/ovpn.cnf