Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sslh for openSUSE:Factory checked in 
at 2024-01-12 23:45:43
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sslh (Old)
 and      /work/SRC/openSUSE:Factory/.sslh.new.21961 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sslh"

Fri Jan 12 23:45:43 2024 rev:9 rq:1138229 version:2.0.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/sslh/sslh.changes        2022-05-12 
22:58:41.328662146 +0200
+++ /work/SRC/openSUSE:Factory/.sslh.new.21961/sslh.changes     2024-01-12 
23:46:04.944037663 +0100
@@ -1,0 +2,24 @@
+Fri Jan 12 07:58:09 UTC 2024 - Michael Vetter <mvet...@suse.com>
+
+- Update to 2.0.1:
+  * New semver-compatible version number
+  * New sslh-ev: this is functionaly equivalent to sslh-select
+    (mono-process, only forks for specified protocols), but based
+    on libev, which should make it scalable to large numbers
+    of connections.
+  * New log system: instead of –verbose with arbitrary levels,
+    there are now several message classes. Each message class
+    can be set to go to stderr, syslog, or both. Classes are
+    documented in example.cfg.
+  * UDP connections are now managed in a hash to avoid linear
+    searches. The downside is that the number of UDP connections
+    is a hard limit, configurable with the ‘udp_max_connections’,
+    which defaults to 1024. Timeouts are managed with lists.
+  * inetd merges stderr output to what is sent to the client,
+    which is a security issue as it might give information to an
+    attacker. When inetd is activated, stderr is forcibly closed.
+  * New protocol-level option resolve_on_forward, requests that
+    target names are resolved at each connection instead of at
+    startup. Useful for dynamic DNS situations.
+
+-------------------------------------------------------------------

Old:
----
  sslh-v1.22c.tar.gz

New:
----
  v2.0.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sslh.spec ++++++
--- /var/tmp/diff_new_pack.Zv1VQU/_old  2024-01-12 23:46:05.592061381 +0100
+++ /var/tmp/diff_new_pack.Zv1VQU/_new  2024-01-12 23:46:05.592061381 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package sslh
 #
-# Copyright (c) 2022 SUSE LLC
+# Copyright (c) 2024 SUSE LLC
 # Copyright (c) 2012 by Lars Vogdt
 #
 # All modifications and additions to the file contributed by third parties
@@ -18,18 +18,19 @@
 
 
 Name:           sslh
-Version:        1.22c
+Version:        2.0.1
 Release:        0
 Summary:        SSL/SSH multiplexer
 License:        GPL-2.0-or-later
 Group:          Productivity/Networking/SSH
 URL:            https://www.rutschle.net/tech/sslh.shtml
-Source:         
https://www.rutschle.net/tech/%{name}/%{name}-v%{version}.tar.gz
+Source:         
https://github.com/yrutschle/sslh/archive/refs/tags/v%{version}.tar.gz
 Source1:        %{name}.init
 Source2:        %{name}.sysconfig
 Source3:        %{name}.conf.d
 BuildRequires:  libcap-devel
 BuildRequires:  libconfig-devel
+BuildRequires:  libev-devel
 BuildRequires:  pcre2-devel
 BuildRequires:  pkgconfig
 BuildRequires:  pkgconfig(libsystemd)
@@ -44,7 +45,7 @@
 corporate firewall) while still serving HTTPS on that port.
 
 %prep
-%autosetup -n %{name}-v%{version} -p1
+%autosetup -n %{name}-%{version} -p1
 
 %build
 export CFLAGS="%{optflags}"

Reply via email to