Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package fail2ban for openSUSE:Factory checked in at 2024-10-23 21:11:23 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/fail2ban (Old) and /work/SRC/openSUSE:Factory/.fail2ban.new.26871 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "fail2ban" Wed Oct 23 21:11:23 2024 rev:70 rq:1217267 version:1.1.0 Changes: -------- --- /work/SRC/openSUSE:Factory/fail2ban/fail2ban.changes 2024-09-04 13:27:44.101573518 +0200 +++ /work/SRC/openSUSE:Factory/.fail2ban.new.26871/fail2ban.changes 2024-10-23 21:12:31.504317419 +0200 @@ -1,0 +2,53 @@ +Wed Oct 23 09:08:23 UTC 2024 - Dirk Müller <dmuel...@suse.com> + +- update to 1.1.0: + * circumvent SEGFAULT in a python's socket module by + getaddrinfo with disabled IPv6 (gh-3438) + * avoid sporadic error in pyinotify backend if pending file + deleted in other thread, e. g. by flushing logs (gh-3635) + * `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode + args by unban + * `action.d/*ipset*`: make `maxelem` ipset option configurable + through banaction arguments (gh-3564) + * `filter.d/apache-common.conf` - accepts remote besides client + (gh-3622) + * `filter.d/mysqld-auth.conf` - matches also if no suffix in + message (mariadb 10.3 log format, gh-3603) + * `filter.d/nginx-*.conf` - nginx error-log filters extended + with support of journal format (gh-3646) + * `filter.d/postfix.conf`: + - "rejected" rule extended to match "Access denied" too + - avoid double counting ('lost connection after AUTH' + together with message 'disconnect ...', gh-3505) + - add Sender address rejected: Malformed DNS server reply + - add to postfix syslog daemon format (gh-3690) + - change journalmatch postfix, allow sub-units with + postfix@-.service (gh-3692) + * `filter.d/recidive.conf`: support for systemd-journal, + conditional RE depending on logtype (for file or journal, + gh-3693) + * `filter.d/slapd.conf` - filter rewritten for single-line + processing, matches errored result without `text=...` + (gh-3604) + * supports python 3.12 and 3.13 (gh-3487) + * bundling async modules removed in python 3.12+ (fallback to + local libraries pyasyncore/pyasynchat if import would miss + them, gh-3487) + * `fail2ban-client` extended (gh-2975): + - `fail2ban-client status --all [flavor]` - returns status + of fail2ban and all jails in usual form + - `fail2ban-client stats` - returns statistic in form of + table (jail, backend, found and banned counts) + - `fail2ban-client statistic` or `fail2ban-client + statistics` - same as `fail2ban-client stats` (aliases for + stats) + - `fail2ban-client status --all stats` - (undocumented, + flavor "stats") returns statistic of all jails in form of + python dict + * `fail2ban-regex` extended to load settings from jail (by + simple name it'd prefer jail to the filter now, gh-2655); +- drop fail2ban-disable-iptables-w-option.patch: only needed for + sle10 and older, which is no longer supported (is now python >= + 3.5) + +------------------------------------------------------------------- Old: ---- fail2ban-1.0.2.tar.gz fail2ban-1.0.2.tar.gz.asc fail2ban-disable-iptables-w-option.patch New: ---- fail2ban-1.1.0.tar.gz fail2ban-1.1.0.tar.gz.asc BETA DEBUG BEGIN: Old: simple name it'd prefer jail to the filter now, gh-2655); - drop fail2ban-disable-iptables-w-option.patch: only needed for sle10 and older, which is no longer supported (is now python >= BETA DEBUG END: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ fail2ban.spec ++++++ --- /var/tmp/diff_new_pack.CfCmGw/_old 2024-10-23 21:12:32.236347979 +0200 +++ /var/tmp/diff_new_pack.CfCmGw/_new 2024-10-23 21:12:32.240348146 +0200 @@ -22,7 +22,7 @@ %define _fillupdir %{_localstatedir}/adm/fillup-templates %endif Name: fail2ban -Version: 1.0.2 +Version: 1.1.0 Release: 0 Summary: Bans IP addresses that make too many authentication failures License: GPL-2.0-or-later @@ -42,8 +42,6 @@ Patch100: %{name}-opensuse-locations.patch # PATCH-FIX-OPENSUSE fail2ban-opensuse-service.patch jweberho...@weberhofer.at -- openSUSE modifications to the service file Patch101: %{name}-opensuse-service.patch -# PATCH-FIX-OPENSUSE fail2ban-disable-iptables-w-option.patch jweberho...@weberhofer.at -- disable iptables "-w" option for older releases -Patch200: %{name}-disable-iptables-w-option.patch # PATCH-FIX-OPENSUSE fail2ban-0.10.4-env-script-interpreter.patch jweberho...@weberhofer.at -- use exact path to define interpretor Patch201: %{name}-0.10.4-env-script-interpreter.patch # PATCH-FEATURE-OPENSUSE fail2ban-opensuse-service-sfw.patch jweberho...@weberhofer.at -- start after SuSEfirewall2 only for older distributions @@ -62,11 +60,9 @@ Requires: ed Requires: iptables Requires: logrotate -Requires: python3 >= 3.2 +Requires: python3 >= 3.5 Requires: whois -%if 0%{?suse_version} != 1110 BuildArch: noarch -%endif %if 0%{?suse_version} >= 1230 # systemd BuildRequires: python3-systemd @@ -79,7 +75,7 @@ Requires: lsof Requires: syslog %endif -%if 0%{?suse_version} >= 1140 && 0%{?suse_version} != 1010 && 0%{?suse_version} != 1110 && 0%{?suse_version} != 1315 +%if 0%{?suse_version} >= 1500 BuildRequires: python3-pyinotify >= 0.8.3 Requires: python3-pyinotify >= 0.8.3 %endif @@ -134,9 +130,6 @@ %patch -P 100 -p1 %patch -P 101 -p1 -%if 0%{?suse_version} < 1310 -%patch -P 200 -p1 -%endif %patch -P 201 -p1 %if !0%{?suse_version} > 1500 %patch -P 300 -p1 @@ -160,7 +153,6 @@ %build export CFLAGS="%{optflags}" -./fail2ban-2to3 python3 setup.py build gzip man/*.{1,5} @@ -229,10 +221,8 @@ %fdupes -s %{buildroot}%{python3_sitelib} %check -#stat /dev/log -#python -c "import platform; print(platform.system())" # tests require python-pyinotify to be installed, so don't run them on older versions -%if 0%{?suse_version} >= 1140 && 0%{?suse_version} != 1010 && 0%{?suse_version} != 1110 && 0%{?suse_version} != 1315 +%if 0%{?suse_version} >= 1500 # Need a UTF-8 locale to work export LANG=en_US.UTF-8 ./fail2ban-testcases-all --no-network || true ++++++ fail2ban-1.0.2.tar.gz -> fail2ban-1.1.0.tar.gz ++++++ ++++ 9138 lines of diff (skipped)