Hello community,

here is the log from the commit of package tallow for openSUSE:Factory checked 
in at 2019-12-07 15:17:30
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/tallow (Old)
 and      /work/SRC/openSUSE:Factory/.tallow.new.4691 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "tallow"

Sat Dec  7 15:17:30 2019 rev:6 rq:751605 version:19+git20191106.4b071b0

Changes:
--------
--- /work/SRC/openSUSE:Factory/tallow/tallow.changes    2019-11-07 
23:15:18.492454712 +0100
+++ /work/SRC/openSUSE:Factory/.tallow.new.4691/tallow.changes  2019-12-07 
15:20:32.131752498 +0100
@@ -1,0 +2,14 @@
+Thu Nov 28 12:58:54 UTC 2019 - Thorsten Kukuk <ku...@suse.com>
+
+- 0001-Add-extra-path-for-firewall-cmd.patch: firewall-cmd can be
+  in a different path than ipset/iptables
+
+-------------------------------------------------------------------
+Wed Nov 27 12:00:41 UTC 2019 - ku...@suse.de
+
+- Update to version 19+git20191106.4b071b0:
+  * Need configure in this workflow.
+  * Fix dependency.
+  * Add github workflow integration.
+
+-------------------------------------------------------------------

Old:
----
  tallow-19+git20191104.5dfb982.tar.xz

New:
----
  0001-Add-extra-path-for-firewall-cmd.patch
  tallow-19+git20191106.4b071b0.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ tallow.spec ++++++
--- /var/tmp/diff_new_pack.EswHmA/_old  2019-12-07 15:20:33.163752355 +0100
+++ /var/tmp/diff_new_pack.EswHmA/_new  2019-12-07 15:20:33.167752355 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package tallow
 #
-# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,13 +17,14 @@
 
 
 Name:           tallow
-Version:        19+git20191104.5dfb982
+Version:        19+git20191106.4b071b0
 Release:        0
 Summary:        Temporary IP address ban issuance daemon
 License:        GPL-3.0-or-later
 Group:          Productivity/Security
 URL:            https://github.com/clearlinux/tallow
 Source:         tallow-%{version}.tar.xz
+Patch:          0001-Add-extra-path-for-firewall-cmd.patch
 Requires:       ipset
 Requires:       iptables
 #For systemd macros:
@@ -47,6 +48,7 @@
 
 %prep
 %setup -q
+%patch -p1
 
 %build
 ./autogen.sh
@@ -62,6 +64,7 @@
 mkdir -p %{buildroot}%{_prefix}/lib/systemd/system
 install -m 644 data/tallow.service %{buildroot}%{_prefix}/lib/systemd/system/
 ln -s %{_sbindir}/service %{buildroot}%{_sbindir}/rctallow
+# For customer provided *.json files:
 mkdir -p %{buildroot}%{_sysconfdir}/tallow
 
 %pre

++++++ 0001-Add-extra-path-for-firewall-cmd.patch ++++++
>From 05fcf5541fdd7f89c23cbcf85be78e0327519b74 Mon Sep 17 00:00:00 2001
From: Thorsten Kukuk <ku...@suse.com>
Date: Thu, 28 Nov 2019 13:24:14 +0100
Subject: [PATCH] Add extra path for firewall-cmd

---
 man/tallow.conf.5.md | 12 ++++++++----
 src/tallow.c         | 28 ++++++++++++++++------------
 tallow.conf          |  1 +
 3 files changed, 25 insertions(+), 16 deletions(-)

diff --git a/man/tallow.conf.5.md b/man/tallow.conf.5.md
index 549e284..79edacd 100644
--- a/man/tallow.conf.5.md
+++ b/man/tallow.conf.5.md
@@ -19,10 +19,14 @@ tallow will operate with built-in defaults.
 
 ## OPTIONS
 
+`fwcmd_path`=`<string>`
+Specifies the location of the ipset(1) firewall-cmd(1) programs. By
+default, tallow will look in "/usr/bin" for them.
+
 `ipt_path`=`<string>`
-Specifies the location of the ipset(1) program and iptables(1), 
-ip6tables(1), or firewall-cmd(1) programs. By default, tallow will 
-look in "/usr/sbin" for them.
+Specifies the location of the ipset(1) program and iptables(1) or
+ip6tables(1) programs. By default, tallow will look in "/usr/sbin"
+for them.
 
 `expires`=`<int>`
 The number of seconds that IP addresses are blocked for. Note that
@@ -58,7 +62,7 @@ default, tallow will create new firewall-cmd(1) or 
iptables(1) and ip6tables(1)
 rules when needed automatically. If set to `1`, `tallow(1)` will not create any
 new firewall DROP rules or ipset sets that are needed work. You should create
 them manually before tallow starts up and remove them afterwards using the sets
-of commands below. 
+of commands below.
 
 Use the following commands if you're using iptables(1):
 
diff --git a/src/tallow.c b/src/tallow.c
index 3ba4158..58e0fb4 100644
--- a/src/tallow.c
+++ b/src/tallow.c
@@ -35,6 +35,7 @@
 #define MAX_OFFSETS 30
 
 static char ipt_path[PATH_MAX];
+static char fwcmd_path[PATH_MAX];
 static int expires = 3600;
 static int has_ipv6 = 0;
 static bool nocreate = false;
@@ -71,17 +72,17 @@ static void ext_ignore(char *fmt, ...)
 static void reset_rules(void)
 {
        /* reset all rules in case the running fw changes */
-       ext_ignore("%s/firewall-cmd --permanent --direct --remove-rule ipv4 
filter INPUT 1 -m set --match-set tallow src -j DROP 2> /dev/null", ipt_path);
-       ext_ignore("%s/firewall-cmd --permanent --delete-ipset=tallow 2> 
/dev/null", ipt_path);
+       ext_ignore("%s/firewall-cmd --permanent --direct --remove-rule ipv4 
filter INPUT 1 -m set --match-set tallow src -j DROP 2> /dev/null", fwcmd_path);
+       ext_ignore("%s/firewall-cmd --permanent --delete-ipset=tallow 2> 
/dev/null", fwcmd_path);
 
        /* delete iptables ref to set before the ipset! */
        ext_ignore("%s/iptables -t filter -D INPUT -m set --match-set tallow 
src -j DROP 2> /dev/null", ipt_path);
        ext_ignore("%s/ipset destroy tallow 2> /dev/null", ipt_path);
 
        if (has_ipv6) {
-               ext_ignore("%s/firewall-cmd --permanent --direct --remove-rule 
ipv6 filter INPUT 1 -m set --match-set tallow6 src -j DROP 2> /dev/null", 
ipt_path);
-               ext_ignore("%s/firewall-cmd --permanent --delete-ipset=tallow6 
2> /dev/null", ipt_path);
-               
+               ext_ignore("%s/firewall-cmd --permanent --direct --remove-rule 
ipv6 filter INPUT 1 -m set --match-set tallow6 src -j DROP 2> /dev/null", 
fwcmd_path);
+               ext_ignore("%s/firewall-cmd --permanent --delete-ipset=tallow6 
2> /dev/null", fwcmd_path);
+
                /* delete iptables ref to set before the ipset! */
                ext_ignore("%s/ip6tables -t filter -D INPUT -m set --match-set 
tallow6 src -j DROP 2> /dev/null", ipt_path);
                ext_ignore("%s/ipset destroy tallow6 2> /dev/null", ipt_path);
@@ -100,39 +101,39 @@ static void setup(void)
 
        /* firewalld */
        char *fwd_path;
-       if (asprintf(&fwd_path, "%s/firewall-cmd", ipt_path) < 0) {
+       if (asprintf(&fwd_path, "%s/firewall-cmd", fwcmd_path) < 0) {
                exit(EXIT_FAILURE);
        }
 
-       if ((access(fwd_path, X_OK) == 0) && ext("%s/firewall-cmd --state 
--quiet", ipt_path) == 0) {
+       if ((access(fwd_path, X_OK) == 0) && ext("%s/firewall-cmd --state 
--quiet", fwcmd_path) == 0) {
                fprintf(stdout, "firewalld is running and will be used by 
tallow.\n");
 
                reset_rules();
 
                /* create ipv4 rule and ipset */
-               if (ext("%s/firewall-cmd --permanent --quiet --new-ipset=tallow 
--type=hash:ip --family=inet --option=timeout=%d", ipt_path, expires)) {
+               if (ext("%s/firewall-cmd --permanent --quiet --new-ipset=tallow 
--type=hash:ip --family=inet --option=timeout=%d", fwcmd_path, expires)) {
                        fprintf(stderr, "Unable to create ipv4 ipset with 
firewall-cmd.\n");
                        exit(EXIT_FAILURE);
                }
-               if (ext("%s/firewall-cmd --permanent --direct --quiet 
--add-rule ipv4 filter INPUT 1 -m set --match-set tallow src -j DROP", 
ipt_path)) {
+               if (ext("%s/firewall-cmd --permanent --direct --quiet 
--add-rule ipv4 filter INPUT 1 -m set --match-set tallow src -j DROP", 
fwcmd_path)) {
                        fprintf(stderr, "Unable to create ipv4 firewalld 
rule.\n");
                        exit(EXIT_FAILURE);
                }
 
                /* create ipv6 rule and ipset */
                if (has_ipv6) {
-                       if (ext("%s/firewall-cmd --permanent --quiet 
--new-ipset=tallow6 --type=hash:ip --family=inet6 --option=timeout=%d", 
ipt_path, expires)) {
+                       if (ext("%s/firewall-cmd --permanent --quiet 
--new-ipset=tallow6 --type=hash:ip --family=inet6 --option=timeout=%d", 
fwcmd_path, expires)) {
                                fprintf(stderr, "Unable to create ipv6 ipset 
with firewall-cmd.\n");
                                exit(EXIT_FAILURE);
                        }
-                       if (ext("%s/firewall-cmd --permanent --direct --quiet 
--add-rule ipv6 filter INPUT 1 -m set --match-set tallow6 src -j DROP ", 
ipt_path)) {
+                       if (ext("%s/firewall-cmd --permanent --direct --quiet 
--add-rule ipv6 filter INPUT 1 -m set --match-set tallow6 src -j DROP ", 
fwcmd_path)) {
                                fprintf(stderr, "Unable to create ipv6 
firewalld rule.\n");
                                exit(EXIT_FAILURE);
                        }
                }
 
                /* reload firewalld for ipsets to load */
-               if (ext("%s/firewall-cmd --reload --quiet", ipt_path, expires)) 
{
+               if (ext("%s/firewall-cmd --reload --quiet", fwcmd_path, 
expires)) {
                        fprintf(stderr, "Unable to reload firewalld rules.\n");
                        exit(EXIT_FAILURE);
                }
@@ -292,6 +293,7 @@ int main(void)
        json_load_patterns();
 
        strcpy(ipt_path, "/usr/sbin");
+       strcpy(fwcmd_path, "/usr/bin");
 
 #ifdef DEBUG
        fprintf(stderr, "Debug output enabled. Send SIGUSR1 to dump internal 
state table\n");
@@ -331,6 +333,8 @@ int main(void)
                        // todo: filter leading/trailing whitespace
                        if (!strcmp(key, "ipt_path"))
                                strncpy(ipt_path, val, PATH_MAX - 1);
+                       if (!strcmp(key, "fwcmd_path"))
+                               strncpy(fwcmd_path, val, PATH_MAX - 1);
                        if (!strcmp(key, "expires"))
                                expires = atoi(val);
                        if (!strcmp(key, "whitelist"))
diff --git a/tallow.conf b/tallow.conf
index bf61c0a..df0ffb4 100644
--- a/tallow.conf
+++ b/tallow.conf
@@ -1,6 +1,7 @@
 
 # tallow.conf - see `man tallow.conf` for more information
 
+#fwcmd_path=/usr/bin
 #ipt_path=/usr/sbin
 #expires=3600
 #whitelist=127.0.0.1
-- 
2.16.4

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.EswHmA/_old  2019-12-07 15:20:33.207752349 +0100
+++ /var/tmp/diff_new_pack.EswHmA/_new  2019-12-07 15:20:33.207752349 +0100
@@ -1,6 +1,6 @@
 <servicedata>
   <service name="tar_scm">
     <param name="url">git://github.com/clearlinux/tallow.git</param>
-    <param 
name="changesrevision">5dfb9821e328920b871f205285e9040ea20ad63d</param>
+    <param 
name="changesrevision">4b071b01f65317f99077277efe6a31e52d942e29</param>
  </service>
 </servicedata>
\ No newline at end of file

++++++ tallow-19+git20191104.5dfb982.tar.xz -> 
tallow-19+git20191106.4b071b0.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/tallow-19+git20191104.5dfb982/.github/workflows/ccpp.yml 
new/tallow-19+git20191106.4b071b0/.github/workflows/ccpp.yml
--- old/tallow-19+git20191104.5dfb982/.github/workflows/ccpp.yml        
1970-01-01 01:00:00.000000000 +0100
+++ new/tallow-19+git20191106.4b071b0/.github/workflows/ccpp.yml        
2019-11-06 20:37:06.000000000 +0100
@@ -0,0 +1,23 @@
+name: C/C++ CI
+
+on: [push]
+
+jobs:
+  build:
+
+    runs-on: ubuntu-latest
+
+    steps:
+    - uses: actions/checkout@v1
+    - name: install dependencies
+      run: sudo apt-get install check libjson-c-dev libpcre2-dev libsystemd-dev
+    - name: autogen
+      run: sh autogen.sh
+    - name: configure
+      run: ./configure
+    - name: make
+      run: make
+    - name: make check
+      run: make check
+    - name: make distcheck
+      run: make distcheck


Reply via email to