Hello community,

here is the log from the commit of package dnsdiag for openSUSE:Factory checked 
in at 2019-06-06 18:19:42
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dnsdiag (Old)
 and      /work/SRC/openSUSE:Factory/.dnsdiag.new.4811 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "dnsdiag"

Thu Jun  6 18:19:42 2019 rev:1 rq:708137 version:1.6.4

Changes:
--------
New Changes file:

--- /dev/null   2019-06-06 01:32:53.891093091 +0200
+++ /work/SRC/openSUSE:Factory/.dnsdiag.new.4811/dnsdiag.changes        
2019-06-06 18:19:44.584643496 +0200
@@ -0,0 +1,11 @@
+-------------------------------------------------------------------
+Sun Jun  2 19:04:28 UTC 2019 - Sebastian Wagner <[email protected]>
+
+- rename to dnsdiag instead of python-dnsdiag
+- Update to version 1.6.4:
+ * no upstream changelog available
+
+-------------------------------------------------------------------
+Fri Nov  3 07:59:09 UTC 2017 - [email protected]
+
+- Initial package, version 1.6.3

New:
----
  dnsdiag-1.6.4.tar.gz
  dnsdiag.changes
  dnsdiag.spec
  dnseval.1
  dnsping.1
  dnstraceroute.1

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dnsdiag.spec ++++++
#
# spec file for package dnsdiag
#
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
# Copyright (c) 2017, Martin Hauke <[email protected]>
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.

# Please submit bugfixes or comments via https://bugs.opensuse.org/
#


%bcond_without test
Name:           dnsdiag
Version:        1.6.4
Release:        0
Summary:        DNS request auditing toolset
License:        BSD-3-Clause
Group:          Development/Languages/Python
URL:            https://dnsdiag.org/
Source:         
https://files.pythonhosted.org/packages/source/d/dnsdiag/dnsdiag-%{version}.tar.gz
Source1:        dnseval.1
Source2:        dnsping.1
Source3:        dnstraceroute.1
BuildRequires:  fdupes
BuildRequires:  python-rpm-macros
BuildRequires:  python3-setuptools
Requires:       python3-cymruwhois >= 1.6
Requires:       python3-dnspython >= 1.15.0
Requires:       python3-setuptools
Provides:       python3-dnsdiag
Obsoletes:      python3-dnsdiag
BuildArch:      noarch
%if %{with test}
BuildRequires:  python3-cymruwhois >= 1.6
BuildRequires:  python3-dnspython >= 1.15.0
%endif

%description
Set of tools to perform basic audits on your DNS requests and responses to make 
sure your DNS is working as you expect. Dnsping can be used to measure the 
response time of a given DNS server for arbitrary requests. Just like a 
traditional ping utility, it provides similar functionality for DNS requests.

Dnstraceroute can be used to trace the path a DNS request takes to destination. 
Its purpose is to detect whether a request is redirected or hijacked. This can 
be done by comparing different DNS queries being sent to the same DNS server 
using dnstraceroute and observe if there is any difference between the path.

dnseval evaluates multiple DNS resolvers and helps you choose the best DNS 
server for your network. It is highly recommended to use your own DNS resolver 
as opposed to a third-party DNS server, but in case you need to choose the best 
DNS forwarder for your network, dnseval lets you compare different DNS servers 
from performance (latency) and reliability (loss) point of view.

%prep
%setup -q -n dnsdiag-%{version}

%build
%python3_build

%install
%python3_install
%fdupes %{buildroot}%{python3_sitelib}
mv %{buildroot}%{_bindir}/dnseval.py %{buildroot}%{_bindir}/dnseval
mv %{buildroot}%{_bindir}/dnstraceroute.py %{buildroot}%{_bindir}/dnstraceroute
mv %{buildroot}%{_bindir}/dnsping.py %{buildroot}%{_bindir}/dnsping
install -d -m0755 %{buildroot}%{_mandir}/man1/
install -m0644 %{SOURCE1} %{buildroot}%{_mandir}/man1/
install -m0644 %{SOURCE2} %{buildroot}%{_mandir}/man1/
install -m0644 %{SOURCE3} %{buildroot}%{_mandir}/man1/

%files
%doc README.md
%license LICENSE
%{_bindir}/dnseval
%{_bindir}/dnstraceroute
%{_bindir}/dnsping
%{_mandir}/man1/dnseval.1%{?ext_man}
%{_mandir}/man1/dnstraceroute.1%{?ext_man}
%{_mandir}/man1/dnsping.1%{?ext_man}
%{python3_sitelib}/*

%changelog
++++++ dnseval.1 ++++++
.\" (C) Copyright 2016 Ana Custura <[email protected]>
.TH DNSEVAL "1" "December 3 2016" "User Commands"
.SH NAME
dnseval: \-  bulk ping utility that sends an arbitrary DNS query to a list of 
DNS servers
.SH DESCRIPTION
dnseval is a bulk ping utility that sends an arbitrary DNS query to a given 
list of DNS servers. This script is meant for comparing response time of 
multiple DNS servers at once
.SH USAGE
usage: dnseval [\-h] [\-f server\-list] [\-c count] [\-t type] [\-w wait] 
hostname
.SH OPTIONS
.TP
\fB\-h\fR  \fB\-\-help\fR
show this help
.TP
\fB\-f\fR  \fB\-\-file\fR
dns server list to use (default: system resolvers)
.TP
\fB\-c\fR  \fB\-\-count\fR
number of requests to send (default: 10)
.TP
\fB\-w\fR  \fB\-\-wait\fR
maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR  \fB\-\-type\fR
DNS request record type (default: A)
.TP
\fB\-h\fR  \fB\-\-help\fR
show this help
.TP
\fB\-f\fR  \fB\-\-file\fR
dns server list to use (default: system resolvers)
.TP
\fB\-c\fR  \fB\-\-count\fR
number of requests to send (default: 10)
.TP
\fB\-w\fR  \fB\-\-wait\fR
maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR  \fB\-\-type\fR
DNS request record type (default: A)
.SH "SEE ALSO"
The full documentation for dnseval can be found at https://dnsdiag.org/
++++++ dnsping.1 ++++++
.\" (C) Copyright 2016 Ana Custura <[email protected]>
.TH DNSPING "1" "December 3 2016" "User Commands"
.SH NAME
dnsping \- DNS ping utility
.SH DESCRIPTION
dnsping pings a DNS resolver by sending an arbitrary DNS query for given number 
of times.
It calculates minimum, maximum and average response time as well as jitter 
(stddev).
.SH USAGE
usage: dnsping [\-h] [\-q] [\-v] [\-s server] [\-p port] [\-P port] [\-S 
address] [\-c count] [\-t type] [\-w wait] hostname
.SH OPTIONS
.TP
\fB\-h\fR  \fB\-\-help\fR
Show this help
.TP
\fB\-q\fR  \fB\-\-quiet\fR
Quiet
.TP
\fB\-v\fR  \fB\-\-verbose\fR
Print actual dns response
.TP
\fB\-s\fR  \fB\-\-server\fR
DNS server to use (default: first entry from \fI\,/etc/resolv.conf\/\fP)
.TP
\fB\-p\fR  \fB\-\-port\fR
DNS server port number (default: 53)
.TP
\fB\-T\fR  \fB\-\-tcp\fR
Use TCP instead of UDP
.TP
\fB\-4\fR  \fB\-\-ipv4\fR
Use IPv4 as default network protocol
.TP
\fB\-6\fR  \fB\-\-ipv6\fR
Use IPv6 as default network protocol
.TP
\fB\-P\fR  \fB\-\-srcport\fR
Query source port number (default: 0)
.TP
\fB\-S\fR  \fB\-\-srcip\fR
Query source IP address (default: default interface address)
.TP
\fB\-c\fR  \fB\-\-count\fR
Number of requests to send (default: 10)
.TP
\fB\-w\fR  \fB\-\-wait\fR
Maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR  \fB\-\-type\fR
DNS request record type (default: A)
.PP
.SH "SEE ALSO"
For more documentation on dnsping see https://dnsdiag.org/.
++++++ dnstraceroute.1 ++++++
.\" (C) Copyright 2016 Ana Custura <[email protected]>
.TH DNSTRACEROUTE "1" "December 2016" "User Commands"
.SH NAME
dnstraceroute \- DNS traceroute utility
.SH DESCRIPTION
dnstraceroute is a traceroute utility to figure out the path that a DNS request 
is passing through to get to its destination. 
Comparing it to a network traceroute can help identify if DNS traffic is routed 
via any unwanted path.
.PP
.SH USAGE
usage: dnstraceroute [\-h] [\-q] [\-a] [\-s server] [\-p port] [\-c count] [\-t 
type] [\-w wait] hostname
.SH OPTIONS
.TP
\fB\-h\fR  \fB\-\-help\fR
Show this help
.TP
\fB\-q\fR  \fB\-\-quiet\fR
Quiet
.TP
\fB\-e\fR  \fB\-\-expert\fR
Print expert hints if available
.TP
\fB\-a\fR  \fB\-\-asn\fR
Turn on AS# lookups for each hop encountered
.TP
\fB\-s\fR  \fB\-\-server\fR
DNS server to use (default: first system resolver)
.TP
\fB\-p\fR  \fB\-\-port\fR
DNS server port number (default: 53)
.TP
\fB\-c\fR  \fB\-\-count\fR
Maximum number of hops (default: 30)
.TP
\fB\-w\fR  \fB\-\-wait\fR
Maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR  \fB\-\-type\fR
DNS request record type (default: A)
.TP
\fB\-C\fR  \fB\-\-color\fR
Print colorful output
.SH SEE ALSO
Full Documentation available at https://dnsdiag.org/

Reply via email to