Gentoo Archives: gentoo-commits

From: Mike Gilbert <floppym@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-vpn/openconnect/files/, net-vpn/openconnect/
Date: Wed, 20 Oct 2021 17:47:20
Message-Id: 1634750855.7f376dc79d0dd572e9771c03558fd631fd86af1e.floppym@gentoo
1 commit: 7f376dc79d0dd572e9771c03558fd631fd86af1e
2 Author: Mike Gilbert <floppym <AT> gentoo <DOT> org>
3 AuthorDate: Wed Oct 20 17:27:35 2021 +0000
4 Commit: Mike Gilbert <floppym <AT> gentoo <DOT> org>
5 CommitDate: Wed Oct 20 17:27:35 2021 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7f376dc7
7
8 net-vpn/openconnect: drop 8.09-r3, 8.10
9
10 Signed-off-by: Mike Gilbert <floppym <AT> gentoo.org>
11
12 net-vpn/openconnect/Manifest | 3 -
13 .../files/8.09-gnutls-buffer-overflow.patch | 62 ---------
14 net-vpn/openconnect/files/README.OpenRC.txt | 25 ----
15 net-vpn/openconnect/files/openconnect.conf.in | 26 ----
16 net-vpn/openconnect/files/openconnect.init.in-r4 | 88 ------------
17 net-vpn/openconnect/openconnect-8.09-r3.ebuild | 152 ---------------------
18 net-vpn/openconnect/openconnect-8.10.ebuild | 149 --------------------
19 7 files changed, 505 deletions(-)
20
21 diff --git a/net-vpn/openconnect/Manifest b/net-vpn/openconnect/Manifest
22 index 59221ffa774..3938384a696 100644
23 --- a/net-vpn/openconnect/Manifest
24 +++ b/net-vpn/openconnect/Manifest
25 @@ -1,4 +1 @@
26 -DIST openconnect-8.09.tar.gz 2083279 BLAKE2B 4588c693a7a641faad271b034e8713f00fda04a872641e45a8ce3e1a236b8d2f4e1b8d973d20e7a9fc656f9460a0e990cbaada008d4ecf9a46353f20c25ac87a SHA512 f6890f5bce4b36b162e4590bce8a61d65fc0ae803d62a3dd408fbb13e96ce41b6443740132808491093032545aea919f9076e34bc11160c503c5e3c46457e7bd
27 DIST openconnect-8.10.tar.gz 2084534 BLAKE2B 98ad0e24e09bc565f359139540f60eb9b6b5ed2239a9c46c56889b8554fc3de3605c10f1bb4fa0b0b206ba35404ae90a389ab8dcee54cf05a24d984529d24c2a SHA512 a36a106cf5c637602fc5bd3cd12df8f6dfe55217c1aae93c66ca33208507f3f8cda15e3a46d75615c7fcea1859d1a04017a07674ad0246876154467305477356
28 -DIST vpnc-scripts-20200226.tar.gz 21460 BLAKE2B 8f00ce3dc49725758abce27f3688946df1bbd4e92769ef02aa9ee66db8b9f41bef3442eaa5405ab1467476899c6d364dfea898ed924ca83497823a85515d48e5 SHA512 3a1eac4ccfaefb0f837189c8cef696b33ab8b8a68cb50a3ad29206b708d0aa479e8eed0c09bef6f60d056cd98d63cc898a1609d734030a63df3be2cfa6c00f9a
29 -DIST vpnc-scripts-20200930.tar.gz 22305 BLAKE2B 5db809ef674cb3cb8f1c775adc1e83debbda28fdcf47e0b0527efe6d1cea09781ef02b2827d9704140b884a85e7ec51fba497f47f6793520b471a7bba0dde6b6 SHA512 5f42bc7b168b5fdfc3ebd4bae52a42a654f102982852cc74240972e16e77fe0b54d82175e2a067e1d7e408bd14c3f465f7eb82b23b41885cb25a813d9587fd3d
30
31 diff --git a/net-vpn/openconnect/files/8.09-gnutls-buffer-overflow.patch b/net-vpn/openconnect/files/8.09-gnutls-buffer-overflow.patch
32 deleted file mode 100644
33 index bf8990ae3d3..00000000000
34 --- a/net-vpn/openconnect/files/8.09-gnutls-buffer-overflow.patch
35 +++ /dev/null
36 @@ -1,62 +0,0 @@
37 -From eef4c1f9d24478aa1d2dd9ac7ec32efb2137f474 Mon Sep 17 00:00:00 2001
38 -From: Sergei Trofimovich <slyfox@g.o>
39 -Date: Fri, 8 May 2020 10:39:41 -0400
40 -Subject: [PATCH] gnutls: prevent buffer overflow in get_cert_name
41 -
42 -The test suite for ocserv calls openconnect with a certificate that has
43 -a name that is 84 bytes in length. The buffer passed to get_cert_name is
44 -currently 80 bytes.
45 -
46 -The gnutls_x509_crt_get_dn_by_oid function will update the buffer size
47 -parameter if the buffer is too small.
48 -
49 -http://man7.org/linux/man-pages/man3/gnutls_x509_crt_get_dn_by_oid.3.html
50 -
51 -RETURNS
52 - GNUTLS_E_SHORT_MEMORY_BUFFER if the provided buffer is not long
53 - enough, and in that case the buf_size will be updated with the
54 - required size. GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE if there are no
55 - data in the current index. On success 0 is returned.
56 -
57 -Use a temporary variable to avoid clobbering the namelen variable that is
58 -passed to get_cert_name.
59 -
60 -Bug: https://bugs.gentoo.org/721570
61 -Signed-off-by: Sergei Trofimovich <slyfox@g.o>
62 -Signed-off-by: Mike Gilbert <floppym@g.o>
63 ----
64 - gnutls.c | 17 ++++++++++++-----
65 - 1 file changed, 12 insertions(+), 5 deletions(-)
66 -
67 -diff --git a/gnutls.c b/gnutls.c
68 -index 36bc82e0..53bf2a43 100644
69 ---- a/gnutls.c
70 -+++ b/gnutls.c
71 -@@ -546,12 +546,19 @@ static int count_x509_certificates(gnutls_datum_t *datum)
72 -
73 - static int get_cert_name(gnutls_x509_crt_t cert, char *name, size_t namelen)
74 - {
75 -+ /* When the name buffer is not big enough, gnutls_x509_crt_get_dn*() will
76 -+ * update the length argument to the required size, and return
77 -+ * GNUTLS_E_SHORT_MEMORY_BUFFER. We need to avoid clobbering the original
78 -+ * length variable. */
79 -+ size_t nl = namelen;
80 - if (gnutls_x509_crt_get_dn_by_oid(cert, GNUTLS_OID_X520_COMMON_NAME,
81 -- 0, 0, name, &namelen) &&
82 -- gnutls_x509_crt_get_dn(cert, name, &namelen)) {
83 -- name[namelen-1] = 0;
84 -- snprintf(name, namelen-1, "<unknown>");
85 -- return -EINVAL;
86 -+ 0, 0, name, &nl)) {
87 -+ nl = namelen;
88 -+ if (gnutls_x509_crt_get_dn(cert, name, &nl)) {
89 -+ name[namelen-1] = 0;
90 -+ snprintf(name, namelen-1, "<unknown>");
91 -+ return -EINVAL;
92 -+ }
93 - }
94 - return 0;
95 - }
96 ---
97 -2.26.2
98 -
99
100 diff --git a/net-vpn/openconnect/files/README.OpenRC.txt b/net-vpn/openconnect/files/README.OpenRC.txt
101 deleted file mode 100644
102 index 6bd43e62dfb..00000000000
103 --- a/net-vpn/openconnect/files/README.OpenRC.txt
104 +++ /dev/null
105 @@ -1,25 +0,0 @@
106 -The init script for openconnect supports multiple vpn tunnels.
107 -
108 -You need to create a symbolic link to /etc/init.d/openconnect in /etc/init.d
109 -instead of calling it directly:
110 -
111 -ln -s /etc/init.d/openconnect /etc/init.d/openconnect.vpn0
112 -
113 -You can then start the vpn tunnel like this:
114 -
115 -/etc/init.d/openconnect.vpn0 start
116 -
117 -If you would like to run preup, postup, predown, and/or postdown scripts,
118 -You need to create a directory in /etc/openconnect with the name of the vpn:
119 -
120 -mkdir /etc/openconnect/vpn0
121 -
122 -Then add executable shell files:
123 -
124 -mkdir /etc/openconnect/vpn0
125 -cd /etc/openconnect/vpn0
126 -echo '#!/bin/sh' > preup.sh
127 -cp preup.sh predown.sh
128 -cp preup.sh postup.sh
129 -cp preup.sh postdown.sh
130 -chmod 755 /etc/openconnect/vpn0/*
131
132 diff --git a/net-vpn/openconnect/files/openconnect.conf.in b/net-vpn/openconnect/files/openconnect.conf.in
133 deleted file mode 100644
134 index 7e44f569c0c..00000000000
135 --- a/net-vpn/openconnect/files/openconnect.conf.in
136 +++ /dev/null
137 @@ -1,26 +0,0 @@
138 -# Variables to configure vpn tunnels where "vpnname" is the name of your vpn tunnel:
139 -#
140 -# server_vpnname
141 -# password_vpnname
142 -# vpnopts_vpnname
143 -#
144 -# The tunnel will need to be started with a symbolic link to openconnect:
145 -#
146 -# ln -s /etc/init.d/openconnect /etc/init.d/openconnect.vpnname
147 -#
148 -# If you'd like to execute a script on preup, postup, predown and postdown of the vpn tunnel, you
149 -# need to create executable scripts in a directory with the same name as
150 -# the vpn tunnel (vpn0 can be replaced with the vpn name):
151 -#
152 -# mkdir /etc/openconnect/vpn0
153 -# cd /etc/openconnect/vpn0"
154 -# echo '#!/bin/sh' > preup.sh"
155 -# cp preup.sh predown.sh"
156 -# cp preup.sh postup.sh"
157 -# cp preup.sh postdown.sh"
158 -# chmod 755 /etc/openconnect/vpn0/*"
159 -
160 -server_vpn0="vpn.server.tld"
161 -password_vpn0="YOUR_PASSWORD"
162 -# Any OPENCONNECT options my go here (see openconnect --help)
163 -vpnopts_vpn0="-l --passwd-on-stdin --user=YOUR_USERNAME"
164
165 diff --git a/net-vpn/openconnect/files/openconnect.init.in-r4 b/net-vpn/openconnect/files/openconnect.init.in-r4
166 deleted file mode 100644
167 index 040edc76f63..00000000000
168 --- a/net-vpn/openconnect/files/openconnect.init.in-r4
169 +++ /dev/null
170 @@ -1,88 +0,0 @@
171 -#!/sbin/openrc-run
172 -# Copyright 1999-2015 Gentoo Foundation
173 -# Distributed under the terms of the GNU General Public License v2
174 -
175 -VPN="${RC_SVCNAME#*.}"
176 -VPNDIR="/etc/openconnect/${VPN}"
177 -VPNLOG="/var/log/openconnect/${VPN}"
178 -VPNLOGFILE="${VPNLOG}/openconnect.log"
179 -VPNERRFILE="${VPNLOG}/openconnect.err"
180 -
181 -command="/usr/sbin/openconnect"
182 -name="OpenConnect: ${VPN}"
183 -pidfile="/run/openconnect/${VPN}.pid"
184 -stopsig="SIGINT"
185 -
186 -depend() {
187 - before netmount
188 -}
189 -
190 -checkconfig() {
191 - if [ $VPN = "openconnect" ]; then
192 - eerror "You cannot call openconnect directly. You must create a symbolic link to it with the vpn name:"
193 - eerror
194 - eerror "ln -s /etc/init.d/openconnect /etc/init.d/openconnect.vpn0"
195 - eerror
196 - eerror "And then call it instead:"
197 - eerror
198 - eerror "/etc/init.d/openconnect.vpn0 start"
199 - return 1
200 - fi
201 -}
202 -
203 -checktuntap() {
204 - if [ "$RC_UNAME" = "Linux" -a ! -e /dev/net/tun ] ; then
205 - if ! modprobe tun ; then
206 - eerror "TUN/TAP support is not available in this kernel"
207 - return 1
208 - fi
209 - fi
210 -}
211 -
212 -run_hook() {
213 - if [ -x "$1" ]; then
214 - "$@"
215 - fi
216 -}
217 -
218 -start_pre() {
219 - checkconfig || return
220 - checktuntap || return
221 - checkpath -d "${VPNLOG}" || return
222 - checkpath -d /run/openconnect || return
223 - run_hook "${VPNDIR}/preup.sh"
224 -}
225 -
226 -start() {
227 - local server vpnopts password
228 - eval server=\$server_${VPN}
229 - eval vpnopts=\$vpnopts_${VPN}
230 - eval password=\$password_${VPN}
231 -
232 - ebegin "Starting ${name}"
233 - start-stop-daemon --start --exec "${command}" -- \
234 - --background \
235 - --interface="${VPN}" \
236 - --pid-file="${pidfile}" \
237 - ${vpnopts} \
238 - "${server}" \
239 - >> "${VPNLOGFILE}" \
240 - 2>> "${VPNERRFILE}" \
241 - <<EOF
242 -${password}
243 -EOF
244 - eend $?
245 -}
246 -
247 -start_post() {
248 - run_hook "${VPNDIR}/postup.sh"
249 -}
250 -
251 -stop_pre() {
252 - checkconfig || return
253 - run_hook "${VPNDIR}/predown.sh"
254 -}
255 -
256 -stop_post() {
257 - run_hook "${VPNDIR}/postdown.sh"
258 -}
259
260 diff --git a/net-vpn/openconnect/openconnect-8.09-r3.ebuild b/net-vpn/openconnect/openconnect-8.09-r3.ebuild
261 deleted file mode 100644
262 index c5c21a23d94..00000000000
263 --- a/net-vpn/openconnect/openconnect-8.09-r3.ebuild
264 +++ /dev/null
265 @@ -1,152 +0,0 @@
266 -# Copyright 2011-2021 Gentoo Authors
267 -# Distributed under the terms of the GNU General Public License v2
268 -
269 -EAPI=7
270 -
271 -PYTHON_COMPAT=( python{3_7,3_8,3_9} )
272 -PYTHON_REQ_USE="xml"
273 -
274 -inherit linux-info python-any-r1
275 -
276 -if [[ ${PV} == 9999 ]]; then
277 - EGIT_REPO_URI="https://gitlab.com/openconnect/openconnect.git"
278 - inherit git-r3 autotools
279 -else
280 - ARCHIVE_URI="ftp://ftp.infradead.org/pub/${PN}/${P}.tar.gz"
281 - KEYWORDS="amd64 arm arm64 ppc64 x86"
282 -fi
283 -VPNC_VER=20200226
284 -SRC_URI="${ARCHIVE_URI}
285 - ftp://ftp.infradead.org/pub/vpnc-scripts/vpnc-scripts-${VPNC_VER}.tar.gz"
286 -
287 -DESCRIPTION="Free client for Cisco AnyConnect SSL VPN software"
288 -HOMEPAGE="http://www.infradead.org/openconnect.html"
289 -
290 -LICENSE="LGPL-2.1 GPL-2"
291 -SLOT="0/5"
292 -IUSE="doc +gnutls gssapi libproxy lz4 nls smartcard stoken test"
293 -RESTRICT="!test? ( test )"
294 -
295 -DEPEND="
296 - dev-libs/libxml2
297 - sys-libs/zlib
298 - !gnutls? (
299 - >=dev-libs/openssl-1.0.1h:0=
300 - )
301 - gnutls? (
302 - app-crypt/trousers
303 - app-misc/ca-certificates
304 - dev-libs/nettle
305 - >=net-libs/gnutls-3.6.13:0=
306 - dev-libs/libtasn1:0=
307 - app-crypt/tpm2-tss
308 - )
309 - gssapi? ( virtual/krb5 )
310 - libproxy? ( net-libs/libproxy )
311 - lz4? ( app-arch/lz4:= )
312 - nls? ( virtual/libintl )
313 - smartcard? ( sys-apps/pcsc-lite:0= )
314 - stoken? ( app-crypt/stoken )
315 -"
316 -RDEPEND="${DEPEND}
317 - sys-apps/iproute2
318 -"
319 -BDEPEND="
320 - virtual/pkgconfig
321 - doc? ( ${PYTHON_DEPS} sys-apps/groff )
322 - nls? ( sys-devel/gettext )
323 - test? (
324 - net-libs/socket_wrapper
325 - net-vpn/ocserv
326 - sys-libs/uid_wrapper
327 - )
328 -"
329 -
330 -CONFIG_CHECK="~TUN"
331 -
332 -pkg_pretend() {
333 - check_extra_config
334 -}
335 -
336 -pkg_setup() {
337 - :
338 -}
339 -
340 -src_unpack() {
341 - if [[ ${PV} == 9999 ]]; then
342 - git-r3_src_unpack
343 - fi
344 - default
345 -}
346 -
347 -src_prepare() {
348 - local PATCHES=(
349 - "${FILESDIR}"/8.09-gnutls-buffer-overflow.patch
350 - )
351 - default
352 - if [[ ${PV} == 9999 ]]; then
353 - eautoreconf
354 - fi
355 -}
356 -
357 -src_configure() {
358 - if use doc; then
359 - python_setup
360 - else
361 - export ac_cv_path_PYTHON=
362 - fi
363 -
364 - # Used by tests if userpriv is disabled
365 - addwrite /run/netns
366 -
367 - local myconf=(
368 - --disable-dsa-tests
369 - $(use_enable nls)
370 - --disable-static
371 - $(use_with !gnutls openssl)
372 - $(use_with gnutls)
373 - $(use_with libproxy)
374 - $(use_with lz4)
375 - $(use_with gssapi)
376 - $(use_with smartcard libpcsclite)
377 - $(use_with stoken)
378 - --with-vpnc-script="${EPREFIX}/etc/openconnect/openconnect.sh"
379 - --without-java
380 - )
381 -
382 - econf "${myconf[@]}"
383 -}
384 -
385 -src_test() {
386 - local charset
387 - for charset in UTF-8 ISO8859-2; do
388 - if [[ $(LC_ALL=cs_CZ.${charset} locale charmap 2>/dev/null) != ${charset} ]]; then
389 - # If we don't have valid cs_CZ locale data, auth-nonascii will fail.
390 - # Force a test skip by exiting with status 77.
391 - sed -i -e '2i exit 77' tests/auth-nonascii || die
392 - break
393 - fi
394 - done
395 - default
396 -}
397 -
398 -src_install() {
399 - default
400 -
401 - find "${ED}" -name '*.la' -delete || die
402 -
403 - dodoc "${FILESDIR}"/README.OpenRC.txt
404 -
405 - newinitd "${FILESDIR}"/openconnect.init.in-r4 openconnect
406 - insinto /etc/openconnect
407 -
408 - newconfd "${FILESDIR}"/openconnect.conf.in openconnect
409 -
410 - exeinto /etc/openconnect
411 - newexe "${WORKDIR}"/vpnc-scripts-${VPNC_VER}/vpnc-script openconnect.sh
412 -
413 - insinto /etc/logrotate.d
414 - newins "${FILESDIR}"/openconnect.logrotate openconnect
415 -
416 - keepdir /var/log/openconnect
417 -}
418
419 diff --git a/net-vpn/openconnect/openconnect-8.10.ebuild b/net-vpn/openconnect/openconnect-8.10.ebuild
420 deleted file mode 100644
421 index ff4f18582c1..00000000000
422 --- a/net-vpn/openconnect/openconnect-8.10.ebuild
423 +++ /dev/null
424 @@ -1,149 +0,0 @@
425 -# Copyright 2011-2020 Gentoo Authors
426 -# Distributed under the terms of the GNU General Public License v2
427 -
428 -EAPI=7
429 -
430 -PYTHON_COMPAT=( python{3_7,3_8,3_9} )
431 -PYTHON_REQ_USE="xml"
432 -
433 -inherit linux-info python-any-r1
434 -
435 -if [[ ${PV} == 9999 ]]; then
436 - EGIT_REPO_URI="https://gitlab.com/openconnect/openconnect.git"
437 - inherit git-r3 autotools
438 -else
439 - ARCHIVE_URI="ftp://ftp.infradead.org/pub/${PN}/${P}.tar.gz"
440 - KEYWORDS="~amd64 ~arm ~arm64 ~ppc64 ~x86"
441 -fi
442 -VPNC_VER=20200930
443 -SRC_URI="${ARCHIVE_URI}
444 - ftp://ftp.infradead.org/pub/vpnc-scripts/vpnc-scripts-${VPNC_VER}.tar.gz"
445 -
446 -DESCRIPTION="Free client for Cisco AnyConnect SSL VPN software"
447 -HOMEPAGE="http://www.infradead.org/openconnect.html"
448 -
449 -LICENSE="LGPL-2.1 GPL-2"
450 -SLOT="0/5"
451 -IUSE="doc +gnutls gssapi libproxy lz4 nls smartcard stoken test"
452 -RESTRICT="!test? ( test )"
453 -
454 -DEPEND="
455 - dev-libs/libxml2
456 - sys-libs/zlib
457 - !gnutls? (
458 - >=dev-libs/openssl-1.0.1h:0=
459 - )
460 - gnutls? (
461 - app-crypt/trousers
462 - app-misc/ca-certificates
463 - dev-libs/nettle
464 - >=net-libs/gnutls-3.6.13:0=
465 - dev-libs/libtasn1:0=
466 - app-crypt/tpm2-tss
467 - )
468 - gssapi? ( virtual/krb5 )
469 - libproxy? ( net-libs/libproxy )
470 - lz4? ( app-arch/lz4:= )
471 - nls? ( virtual/libintl )
472 - smartcard? ( sys-apps/pcsc-lite:0= )
473 - stoken? ( app-crypt/stoken )
474 -"
475 -RDEPEND="${DEPEND}
476 - sys-apps/iproute2
477 -"
478 -BDEPEND="
479 - virtual/pkgconfig
480 - doc? ( ${PYTHON_DEPS} sys-apps/groff )
481 - nls? ( sys-devel/gettext )
482 - test? (
483 - net-libs/socket_wrapper
484 - net-vpn/ocserv
485 - sys-libs/uid_wrapper
486 - )
487 -"
488 -
489 -CONFIG_CHECK="~TUN"
490 -
491 -pkg_pretend() {
492 - check_extra_config
493 -}
494 -
495 -pkg_setup() {
496 - :
497 -}
498 -
499 -src_unpack() {
500 - if [[ ${PV} == 9999 ]]; then
501 - git-r3_src_unpack
502 - fi
503 - default
504 -}
505 -
506 -src_prepare() {
507 - default
508 - if [[ ${PV} == 9999 ]]; then
509 - eautoreconf
510 - fi
511 -}
512 -
513 -src_configure() {
514 - if use doc; then
515 - python_setup
516 - else
517 - export ac_cv_path_PYTHON=
518 - fi
519 -
520 - # Used by tests if userpriv is disabled
521 - addwrite /run/netns
522 -
523 - local myconf=(
524 - --disable-dsa-tests
525 - $(use_enable nls)
526 - --disable-static
527 - $(use_with !gnutls openssl)
528 - $(use_with gnutls)
529 - $(use_with libproxy)
530 - $(use_with lz4)
531 - $(use_with gssapi)
532 - $(use_with smartcard libpcsclite)
533 - $(use_with stoken)
534 - --with-vpnc-script="${EPREFIX}/etc/openconnect/openconnect.sh"
535 - --without-java
536 - )
537 -
538 - econf "${myconf[@]}"
539 -}
540 -
541 -src_test() {
542 - local charset
543 - for charset in UTF-8 ISO8859-2; do
544 - if [[ $(LC_ALL=cs_CZ.${charset} locale charmap 2>/dev/null) != ${charset} ]]; then
545 - # If we don't have valid cs_CZ locale data, auth-nonascii will fail.
546 - # Force a test skip by exiting with status 77.
547 - sed -i -e '2i exit 77' tests/auth-nonascii || die
548 - break
549 - fi
550 - done
551 - default
552 -}
553 -
554 -src_install() {
555 - default
556 -
557 - find "${ED}" -name '*.la' -delete || die
558 -
559 - dodoc "${FILESDIR}"/README.OpenRC.txt
560 -
561 - newinitd "${FILESDIR}"/openconnect.init.in-r4 openconnect
562 - insinto /etc/openconnect
563 -
564 - newconfd "${FILESDIR}"/openconnect.conf.in openconnect
565 -
566 - exeinto /etc/openconnect
567 - newexe "${WORKDIR}"/vpnc-scripts-${VPNC_VER}/vpnc-script openconnect.sh
568 -
569 - insinto /etc/logrotate.d
570 - newins "${FILESDIR}"/openconnect.logrotate openconnect
571 -
572 - keepdir /var/log/openconnect
573 -}