Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package fail2ban for openSUSE:Factory 
checked in at 2024-10-23 21:11:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/fail2ban (Old)
 and      /work/SRC/openSUSE:Factory/.fail2ban.new.26871 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "fail2ban"

Wed Oct 23 21:11:23 2024 rev:70 rq:1217267 version:1.1.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/fail2ban/fail2ban.changes        2024-09-04 
13:27:44.101573518 +0200
+++ /work/SRC/openSUSE:Factory/.fail2ban.new.26871/fail2ban.changes     
2024-10-23 21:12:31.504317419 +0200
@@ -1,0 +2,53 @@
+Wed Oct 23 09:08:23 UTC 2024 - Dirk Müller <dmuel...@suse.com>
+
+- update to 1.1.0:
+  * circumvent SEGFAULT in a python's socket module by
+    getaddrinfo with disabled IPv6 (gh-3438)
+  * avoid sporadic error in pyinotify backend if pending file
+    deleted in other thread, e. g. by flushing logs (gh-3635)
+  * `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode
+    args by unban
+  * `action.d/*ipset*`: make `maxelem` ipset option configurable
+    through banaction arguments (gh-3564)
+  * `filter.d/apache-common.conf` - accepts remote besides client
+    (gh-3622)
+  * `filter.d/mysqld-auth.conf` - matches also if no suffix in
+    message (mariadb 10.3 log format, gh-3603)
+  * `filter.d/nginx-*.conf` - nginx error-log filters extended
+    with support of journal format (gh-3646)
+  * `filter.d/postfix.conf`:
+    - "rejected" rule extended to match "Access denied" too
+    - avoid double counting ('lost connection after AUTH'
+      together with message 'disconnect ...', gh-3505)
+    - add Sender address rejected: Malformed DNS server reply
+    - add to postfix syslog daemon format (gh-3690)
+    - change journalmatch postfix, allow sub-units with
+      postfix@-.service (gh-3692)
+  * `filter.d/recidive.conf`: support for systemd-journal,
+    conditional RE depending on logtype (for file or journal,
+    gh-3693)
+  * `filter.d/slapd.conf` - filter rewritten for single-line
+    processing, matches errored result without `text=...`
+    (gh-3604)
+  * supports python 3.12 and 3.13 (gh-3487)
+  * bundling async modules removed in python 3.12+ (fallback to
+    local libraries pyasyncore/pyasynchat if import would miss
+    them, gh-3487)
+  * `fail2ban-client` extended (gh-2975):
+    - `fail2ban-client status --all [flavor]` - returns status
+      of fail2ban and all jails in usual form
+    - `fail2ban-client stats` - returns statistic in form of
+      table (jail, backend, found and banned counts)
+    - `fail2ban-client statistic` or `fail2ban-client
+      statistics` - same as `fail2ban-client stats` (aliases for
+      stats)
+    - `fail2ban-client status --all stats` - (undocumented,
+      flavor "stats") returns statistic of all jails in form of
+      python dict
+  * `fail2ban-regex` extended to load settings from jail (by
+     simple name it'd prefer jail to the filter now, gh-2655);
+- drop fail2ban-disable-iptables-w-option.patch: only needed for
+  sle10 and older, which is no longer supported (is now python >=
+  3.5)
+
+-------------------------------------------------------------------

Old:
----
  fail2ban-1.0.2.tar.gz
  fail2ban-1.0.2.tar.gz.asc
  fail2ban-disable-iptables-w-option.patch

New:
----
  fail2ban-1.1.0.tar.gz
  fail2ban-1.1.0.tar.gz.asc

BETA DEBUG BEGIN:
  Old:     simple name it'd prefer jail to the filter now, gh-2655);
- drop fail2ban-disable-iptables-w-option.patch: only needed for
  sle10 and older, which is no longer supported (is now python >=
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ fail2ban.spec ++++++
--- /var/tmp/diff_new_pack.CfCmGw/_old  2024-10-23 21:12:32.236347979 +0200
+++ /var/tmp/diff_new_pack.CfCmGw/_new  2024-10-23 21:12:32.240348146 +0200
@@ -22,7 +22,7 @@
   %define _fillupdir %{_localstatedir}/adm/fillup-templates
 %endif
 Name:           fail2ban
-Version:        1.0.2
+Version:        1.1.0
 Release:        0
 Summary:        Bans IP addresses that make too many authentication failures
 License:        GPL-2.0-or-later
@@ -42,8 +42,6 @@
 Patch100:       %{name}-opensuse-locations.patch
 # PATCH-FIX-OPENSUSE fail2ban-opensuse-service.patch jweberho...@weberhofer.at 
-- openSUSE modifications to the service file
 Patch101:       %{name}-opensuse-service.patch
-# PATCH-FIX-OPENSUSE fail2ban-disable-iptables-w-option.patch 
jweberho...@weberhofer.at -- disable iptables "-w" option for older releases
-Patch200:       %{name}-disable-iptables-w-option.patch
 # PATCH-FIX-OPENSUSE fail2ban-0.10.4-env-script-interpreter.patch 
jweberho...@weberhofer.at -- use exact path to define interpretor
 Patch201:       %{name}-0.10.4-env-script-interpreter.patch
 # PATCH-FEATURE-OPENSUSE fail2ban-opensuse-service-sfw.patch 
jweberho...@weberhofer.at -- start after SuSEfirewall2 only for older 
distributions
@@ -62,11 +60,9 @@
 Requires:       ed
 Requires:       iptables
 Requires:       logrotate
-Requires:       python3 >= 3.2
+Requires:       python3 >= 3.5
 Requires:       whois
-%if 0%{?suse_version} != 1110
 BuildArch:      noarch
-%endif
 %if 0%{?suse_version} >= 1230
 # systemd
 BuildRequires:  python3-systemd
@@ -79,7 +75,7 @@
 Requires:       lsof
 Requires:       syslog
 %endif
-%if 0%{?suse_version} >= 1140 && 0%{?suse_version} != 1010  && 
0%{?suse_version} != 1110 && 0%{?suse_version} != 1315
+%if 0%{?suse_version} >= 1500
 BuildRequires:  python3-pyinotify >= 0.8.3
 Requires:       python3-pyinotify >= 0.8.3
 %endif
@@ -134,9 +130,6 @@
 
 %patch -P 100 -p1
 %patch -P 101 -p1
-%if 0%{?suse_version} < 1310
-%patch -P 200 -p1
-%endif
 %patch -P 201 -p1
 %if !0%{?suse_version} > 1500
 %patch -P 300 -p1
@@ -160,7 +153,6 @@
 
 %build
 export CFLAGS="%{optflags}"
-./fail2ban-2to3
 python3 setup.py build
 gzip man/*.{1,5}
 
@@ -229,10 +221,8 @@
 %fdupes -s %{buildroot}%{python3_sitelib}
 
 %check
-#stat /dev/log
-#python -c "import platform; print(platform.system())"
 # tests require python-pyinotify to be installed, so don't run them on older 
versions
-%if 0%{?suse_version} >= 1140 && 0%{?suse_version} != 1010  && 
0%{?suse_version} != 1110 && 0%{?suse_version} != 1315
+%if 0%{?suse_version} >= 1500
 # Need a UTF-8 locale to work
 export LANG=en_US.UTF-8
 ./fail2ban-testcases-all --no-network || true

++++++ fail2ban-1.0.2.tar.gz -> fail2ban-1.1.0.tar.gz ++++++
++++ 9138 lines of diff (skipped)

Reply via email to