Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package sslh for openSUSE:Factory checked in at 2024-01-12 23:45:43 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sslh (Old) and /work/SRC/openSUSE:Factory/.sslh.new.21961 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "sslh" Fri Jan 12 23:45:43 2024 rev:9 rq:1138229 version:2.0.1 Changes: -------- --- /work/SRC/openSUSE:Factory/sslh/sslh.changes 2022-05-12 22:58:41.328662146 +0200 +++ /work/SRC/openSUSE:Factory/.sslh.new.21961/sslh.changes 2024-01-12 23:46:04.944037663 +0100 @@ -1,0 +2,24 @@ +Fri Jan 12 07:58:09 UTC 2024 - Michael Vetter <mvet...@suse.com> + +- Update to 2.0.1: + * New semver-compatible version number + * New sslh-ev: this is functionaly equivalent to sslh-select + (mono-process, only forks for specified protocols), but based + on libev, which should make it scalable to large numbers + of connections. + * New log system: instead of âverbose with arbitrary levels, + there are now several message classes. Each message class + can be set to go to stderr, syslog, or both. Classes are + documented in example.cfg. + * UDP connections are now managed in a hash to avoid linear + searches. The downside is that the number of UDP connections + is a hard limit, configurable with the âudp_max_connectionsâ, + which defaults to 1024. Timeouts are managed with lists. + * inetd merges stderr output to what is sent to the client, + which is a security issue as it might give information to an + attacker. When inetd is activated, stderr is forcibly closed. + * New protocol-level option resolve_on_forward, requests that + target names are resolved at each connection instead of at + startup. Useful for dynamic DNS situations. + +------------------------------------------------------------------- Old: ---- sslh-v1.22c.tar.gz New: ---- v2.0.1.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sslh.spec ++++++ --- /var/tmp/diff_new_pack.Zv1VQU/_old 2024-01-12 23:46:05.592061381 +0100 +++ /var/tmp/diff_new_pack.Zv1VQU/_new 2024-01-12 23:46:05.592061381 +0100 @@ -1,7 +1,7 @@ # # spec file for package sslh # -# Copyright (c) 2022 SUSE LLC +# Copyright (c) 2024 SUSE LLC # Copyright (c) 2012 by Lars Vogdt # # All modifications and additions to the file contributed by third parties @@ -18,18 +18,19 @@ Name: sslh -Version: 1.22c +Version: 2.0.1 Release: 0 Summary: SSL/SSH multiplexer License: GPL-2.0-or-later Group: Productivity/Networking/SSH URL: https://www.rutschle.net/tech/sslh.shtml -Source: https://www.rutschle.net/tech/%{name}/%{name}-v%{version}.tar.gz +Source: https://github.com/yrutschle/sslh/archive/refs/tags/v%{version}.tar.gz Source1: %{name}.init Source2: %{name}.sysconfig Source3: %{name}.conf.d BuildRequires: libcap-devel BuildRequires: libconfig-devel +BuildRequires: libev-devel BuildRequires: pcre2-devel BuildRequires: pkgconfig BuildRequires: pkgconfig(libsystemd) @@ -44,7 +45,7 @@ corporate firewall) while still serving HTTPS on that port. %prep -%autosetup -n %{name}-v%{version} -p1 +%autosetup -n %{name}-%{version} -p1 %build export CFLAGS="%{optflags}"