Hello community,

here is the log from the commit of package fail2ban for openSUSE:Factory 
checked in at 2017-01-31 12:42:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/fail2ban (Old)
 and      /work/SRC/openSUSE:Factory/.fail2ban.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "fail2ban"

Changes:
--------
--- /work/SRC/openSUSE:Factory/fail2ban/fail2ban.changes        2016-07-28 
23:47:45.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.fail2ban.new/fail2ban.changes   2017-02-03 
17:36:38.461703790 +0100
@@ -1,0 +2,75 @@
+Thu Jan 26 23:16:49 UTC 2017 - [email protected]
+
+- Update to 0.9.6 (2016/12/10)
+
+### Fixes
+* Misleading add resp. enable of (already available) jail in database, that
+  induced a subsequent error: last position of log file will be never 
retrieved (gh-795)
+* Fixed a distribution related bug within testReadStockJailConfForceEnabled
+  (e.g. test-cases faults on Fedora, see gh-1353)
+* Fixed pythonic filters and test scripts (running via wrong python version,
+  uses "fail2ban-python" now);
+* Fixed test case "testSetupInstallRoot" for not default python version (also
+  using direct call, out of virtualenv);
+* Fixed ambiguous wrong recognized date pattern resp. its optional parts (see 
gh-1512);
+* FIPS compliant, use sha1 instead of md5 if it not allowed (see gh-1540)
+* Monit config: scripting is not supported in path (gh-1556)
+* `filter.d/apache-modsecurity.conf`
+    - Fixed for newer version (one space, gh-1626), optimized: non-greedy 
catch-all
+      replaced for safer match, unneeded catch-all anchoring removed, 
non-capturing
+* `filter.d/asterisk.conf`
+    - Fixed to match different asterisk log prefix (source file: method:)
+* `filter.d/dovecot.conf`
+    - Fixed failregex ignores failures through some not relevant info (gh-1623)
+* `filter.d/ignorecommands/apache-fakegooglebot`
+    - Fixed error within apache-fakegooglebot, that will be called
+      with wrong python version (gh-1506)
+* `filter.d/assp.conf`
+    - Extended failregex and test cases to handle ASSP V1 and V2 (gh-1494)
+* `filter.d/postfix-sasl.conf`
+    - Allow for having no trailing space after 'failed:' (gh-1497)
+* `filter.d/vsftpd.conf`
+    - Optional reason part in message after FAIL LOGIN (gh-1543)
+* `filter.d/sendmail-reject.conf`
+    - removed mandatory double space (if dns-host available, gh-1579)
+* filter.d/sshd.conf
+    - recognized "Failed publickey for" (gh-1477);
+    - optimized failregex to match all of "Failed any-method for ... from 
<HOST>" (gh-1479)
+    - eliminated possible complex injections (on user-name resp. auth-info, 
see gh-1479)
+    - optional port part after host (see gh-1533, gh-1581)
+
+### New Features
+* New Actions:
+    - `action.d/npf.conf` for NPF, the latest packet filter for NetBSD
+* New Filters:
+    - `filter.d/mongodb-auth.conf` for MongoDB (document-oriented NoSQL 
database engine)
+      (gh-1586, gh-1606 and gh-1607)
+
+### Enhancements
+* DateTemplate regexp extended with the word-end boundary, additionally to
+  word-start boundary
+* Introduces new command "fail2ban-python", as automatically created symlink to
+  python executable, where fail2ban currently installed (resp. its modules are 
located):
+    - allows to use the same version, fail2ban currently running, e.g. in
+      external scripts just via replace python with fail2ban-python:
+      ```diff
+      -#!/usr/bin/env python
+      +#!/usr/bin/env fail2ban-python
+      ```
+    - always the same pickle protocol
+    - the same (and also guaranteed available) fail2ban modules
+    - simplified stand-alone install, resp. stand-alone installation 
possibility
+      via setup (like gh-1487) is getting closer
+* Several test cases rewritten using new methods assertIn, assertNotIn
+* New forward compatibility method assertRaisesRegexp (normally python >= 2.7).
+  Methods assertIn, assertNotIn, assertRaisesRegexp, assertLogged, 
assertNotLogged
+  are test covered now
+* Jail configuration extended with new syntax to pass options to the backend 
(see gh-1408),
+  examples:
+    - `backend = systemd[journalpath=/run/log/journal/machine-1]`
+    - `backend = 
systemd[journalfiles="/run/log/journal/machine-1/system.journal, 
/run/log/journal/machine-1/user.journal"]`
+    - `backend = systemd[journalflags=2]`
+
+- rebase fail2ban-opensuse-locations.patch, fail2ban-opensuse-service.patch
+
+-------------------------------------------------------------------

Old:
----
  fail2ban-0.9.5.tar.gz

New:
----
  fail2ban-0.9.6.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ fail2ban.spec ++++++
--- /var/tmp/diff_new_pack.SrVRNF/_old  2017-02-03 17:36:39.085615482 +0100
+++ /var/tmp/diff_new_pack.SrVRNF/_new  2017-02-03 17:36:39.089614916 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package fail2ban
 #
-# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           fail2ban
-Version:        0.9.5
+Version:        0.9.6
 Release:        0
 Summary:        Bans IP addresses that make too many authentication failures
 License:        GPL-2.0+
@@ -34,11 +34,11 @@
 # ignore some rpm-lint messages
 Source200:      %{name}-rpmlintrc
 # PATCH-FIX-OPENSUSE fail2ban-opensuse-locations.patch bnc#878028 
[email protected] -- update default locations for logfiles
-Patch100:       fail2ban-opensuse-locations.patch
+Patch100:       %{name}-opensuse-locations.patch
 # PATCH-FIX-OPENSUSE fail2ban-opensuse-service.patch [email protected] 
-- openSUSE modifications to the service file
-Patch101:       fail2ban-opensuse-service.patch
+Patch101:       %{name}-opensuse-service.patch
 # PATCH-FIX-OPENSUSE fail2ban-disable-iptables-w-option.patch 
[email protected] -- disable iptables "-w" option for older releases
-Patch200:       fail2ban-disable-iptables-w-option.patch
+Patch200:       %{name}-disable-iptables-w-option.patch
 BuildRequires:  fdupes
 BuildRequires:  logrotate
 BuildRequires:  python-devel
@@ -81,19 +81,19 @@
 can be defined by the user. Fail2Ban can read multiple log files such as sshd
 or Apache web server ones.
 
-%package -n SuSEfirewall2-fail2ban
+%package -n SuSEfirewall2-%{name}
 Summary:        Files for integrating fail2ban into SuSEfirewall2 via systemd
 Group:          Productivity/Networking/Security
 Requires:       SuSEfirewall2
 Requires:       fail2ban
 Recommends:     packageand(SuSEfirewall2:fail2ban)
 
-%description -n SuSEfirewall2-fail2ban
+%description -n SuSEfirewall2-%{name}
 This package ships systemd files which will cause fail2ban to be ordered in
 relation to SuSEfirewall2 such that the two can be run concurrently within
 reason, i.e. SFW will always run first because it does a table flush.
 
-%package -n nagios-plugins-fail2ban
+%package -n nagios-plugins-%{name}
 %define         nagios_plugindir %{_libexecdir}/nagios/plugins
 Summary:        Check fail2ban server and how many IPs are currently banned
 Group:          System/Monitoring
@@ -115,8 +115,8 @@
 # Use openSUSE paths
 sed -i -e 's/^before = paths-.*/before = paths-opensuse.conf/' config/jail.conf
 
-%patch100 -p1
-%patch101 -p1
+%patch100
+%patch101
 %if 0%{?suse_version} < 1310
 %patch200 -p1
 %endif
@@ -127,7 +127,7 @@
        config/paths-osx.conf
 
 # correct doc-path
-sed -i -e 's|%{_datadir}/doc/fail2ban|%{_docdir}/%{name}|' setup.py
+sed -i -e 's|%{_datadir}/doc/%{name}|%{_docdir}/%{name}|' setup.py
 
 # remove syslogd-logger settings for older distributions
 %if 0%{?suse_version} < 1230
@@ -179,13 +179,13 @@
 
 echo "# Do all your modifications to the jail's configuration in jail.local!" 
> %{buildroot}%{_sysconfdir}/%{name}/jail.local
 
-install -d -m 0755 %{buildroot}%{_localstatedir}/lib/fail2ban/
+install -d -m 0755 %{buildroot}%{_localstatedir}/lib/%{name}/
 
 install -d -m 755 %{buildroot}%{_localstatedir}/adm/fillup-templates
 install -p -m 644 %{SOURCE2} 
%{buildroot}%{_localstatedir}/adm/fillup-templates/sysconfig.%{name}
 
 install -d -m 755 %{buildroot}%{_sysconfdir}/logrotate.d
-install -p -m 644 %{SOURCE3}  %{buildroot}%{_sysconfdir}/logrotate.d/fail2ban
+install -p -m 644 %{SOURCE3}  %{buildroot}%{_sysconfdir}/logrotate.d/%{name}
 
 %if 0%{?_unitdir:1}
 install -Dm 0644 "%{_sourcedir}/sfw-fail2ban.conf" \
@@ -193,7 +193,7 @@
 install -D -m 0644 "%{_sourcedir}/f2b-restart.conf" \
        "%{buildroot}%{_unitdir}/fail2ban.service.d/SuSEfirewall2.conf"
 %endif
-install -D -m 755 files/nagios/check_fail2ban 
%{buildroot}%{nagios_plugindir}/check_fail2ban
+install -D -m 755 files/nagios/check_fail2ban 
%{buildroot}%{nagios_plugindir}/check_%{name}
 
 # install docs using the macro
 rm -r %{buildroot}%{_docdir}/%{name}
@@ -241,10 +241,10 @@
 %endif
 
 %if 0%{?_unitdir:1}
-%post -n SuSEfirewall2-fail2ban
+%post -n SuSEfirewall2-%{name}
 %{_bindir}/systemctl daemon-reload >/dev/null 2>&1 || :
 
-%postun -n SuSEfirewall2-fail2ban
+%postun -n SuSEfirewall2-%{name}
 %{_bindir}/systemctl daemon-reload >/dev/null 2>&1 || :
 %endif
 
@@ -252,22 +252,22 @@
 %defattr(-, root, root)
 %dir %{_sysconfdir}/%{name}
 %dir %{_sysconfdir}/%{name}/action.d
-%dir %{_sysconfdir}/%{name}/fail2ban.d
+%dir %{_sysconfdir}/%{name}/%{name}.d
 %dir %{_sysconfdir}/%{name}/filter.d
 %dir %{_sysconfdir}/%{name}/jail.d
 #
 %config %{_sysconfdir}/%{name}/action.d/*
 %config %{_sysconfdir}/%{name}/filter.d/*
 #
-%config(noreplace) %{_sysconfdir}/%{name}/fail2ban.conf
+%config(noreplace) %{_sysconfdir}/%{name}/%{name}.conf
 %config %{_sysconfdir}/%{name}/jail.conf
 %config %{_sysconfdir}/%{name}/paths-common.conf
 %config %{_sysconfdir}/%{name}/paths-opensuse.conf
 #
 %config(noreplace) %{_sysconfdir}/%{name}/jail.local
 #
-%config %{_sysconfdir}/logrotate.d/fail2ban
-%dir %{_localstatedir}/lib/fail2ban/
+%config %{_sysconfdir}/logrotate.d/%{name}
+%dir %{_localstatedir}/lib/%{name}/
 %if 0%{?suse_version} > 1310
 # use /run directory
 %ghost /run/%{name}
@@ -284,9 +284,10 @@
 %{_initddir}/%{name}
 %endif
 %{_sbindir}/rc%{name}
-%{_bindir}/fail2ban-server
-%{_bindir}/fail2ban-client
-%{_bindir}/fail2ban-regex
+%{_bindir}/%{name}-server
+%{_bindir}/%{name}-client
+%{_bindir}/%{name}-python
+%{_bindir}/%{name}-regex
 %{python_sitelib}/%{name}
 %exclude %{python_sitelib}/%{name}/tests
 %{python_sitelib}/%{name}-*
@@ -296,21 +297,21 @@
 %doc README.md TODO ChangeLog COPYING doc/*.txt
 
 # do not include tests as they are executed during the build process
-%exclude %{_bindir}/fail2ban-testcases
+%exclude %{_bindir}/%{name}-testcases
 %exclude %{python_sitelib}/%{name}/tests
 
 %if 0%{?_unitdir:1}
-%files -n SuSEfirewall2-fail2ban
+%files -n SuSEfirewall2-%{name}
 %defattr(-,root,root)
 %{_unitdir}/SuSEfirewall2.service.d
-%{_unitdir}/fail2ban.service.d
+%{_unitdir}/%{name}.service.d
 %endif
 
-%files -n nagios-plugins-fail2ban
+%files -n nagios-plugins-%{name}
 %defattr(-,root,root)
 %doc files/nagios/README COPYING
 %dir %{_libexecdir}/nagios
 %dir %{nagios_plugindir}
-%{nagios_plugindir}/check_fail2ban
+%{nagios_plugindir}/check_%{name}
 
 %changelog

++++++ fail2ban-0.9.5.tar.gz -> fail2ban-0.9.6.tar.gz ++++++
++++ 3028 lines of diff (skipped)

++++++ fail2ban-opensuse-locations.patch ++++++
--- /var/tmp/diff_new_pack.SrVRNF/_old  2017-02-03 17:36:39.269589443 +0100
+++ /var/tmp/diff_new_pack.SrVRNF/_new  2017-02-03 17:36:39.273588877 +0100
@@ -1,7 +1,8 @@
-diff -Nur fail2ban-0.9.4-orig/config/jail.conf fail2ban-0.9.4/config/jail.conf
---- fail2ban-0.9.4-orig/config/jail.conf       2016-03-08 03:50:10.000000000 
+0100
-+++ fail2ban-0.9.4/config/jail.conf    2016-03-10 09:38:46.382071358 +0100
-@@ -669,7 +669,7 @@
+Index: config/jail.conf
+===================================================================
+--- config/jail.conf.orig
++++ config/jail.conf
+@@ -670,7 +670,7 @@ backend = %(syslog_backend)s
  # filter   = named-refused
  # port     = domain,953
  # protocol = udp
@@ -10,7 +11,7 @@
  
  # IMPORTANT: see filter.d/named-refused for instructions to enable logging
  # This jail blocks TCP traffic for DNS requests.
-@@ -677,7 +677,7 @@
+@@ -678,7 +678,7 @@ backend = %(syslog_backend)s
  [named-refused]
  
  port     = domain,953
@@ -19,10 +20,11 @@
  
  
  [nsd]
-diff -Nur fail2ban-0.9.4-orig/config/paths-common.conf 
fail2ban-0.9.4/config/paths-common.conf
---- fail2ban-0.9.4-orig/config/paths-common.conf       2016-03-08 
03:50:10.000000000 +0100
-+++ fail2ban-0.9.4/config/paths-common.conf    2016-03-10 09:36:00.690852425 
+0100
-@@ -74,7 +74,7 @@
+Index: config/paths-common.conf
+===================================================================
+--- config/paths-common.conf.orig
++++ config/paths-common.conf
+@@ -75,7 +75,7 @@ solidpop3d_log = %(syslog_local0)s
  mysql_log = %(syslog_daemon)s
  mysql_backend = %(default_backend)s
  

++++++ fail2ban-opensuse-service.patch ++++++
--- /var/tmp/diff_new_pack.SrVRNF/_old  2017-02-03 17:36:39.281587745 +0100
+++ /var/tmp/diff_new_pack.SrVRNF/_new  2017-02-03 17:36:39.285587179 +0100
@@ -1,6 +1,7 @@
-diff -Nur fail2ban-0.9.4-orig/files/fail2ban.service 
fail2ban-0.9.4/files/fail2ban.service
---- fail2ban-0.9.4-orig/files/fail2ban.service 2016-03-08 03:50:10.000000000 
+0100
-+++ fail2ban-0.9.4/files/fail2ban.service      2016-03-10 10:33:48.834063007 
+0100
+Index: files/fail2ban.service
+===================================================================
+--- files/fail2ban.service.orig
++++ files/fail2ban.service
 @@ -1,12 +1,13 @@
  [Unit]
  Description=Fail2Ban Service


Reply via email to