Hello community,

here is the log from the commit of package fail2ban for openSUSE:Factory 
checked in at 2020-05-26 17:21:12
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/fail2ban (Old)
 and      /work/SRC/openSUSE:Factory/.fail2ban.new.2738 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "fail2ban"

Tue May 26 17:21:12 2020 rev:58 rq:808030 version:0.11.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/fail2ban/fail2ban.changes        2020-01-10 
17:50:34.914123884 +0100
+++ /work/SRC/openSUSE:Factory/.fail2ban.new.2738/fail2ban.changes      
2020-05-26 17:21:27.252250052 +0200
@@ -1,0 +2,28 @@
+Thu May 21 07:49:38 UTC 2020 - Paolo Stivanin <[email protected]>
+
+- Update to 0.11.1:
+  * Increment ban time (+ observer) functionality introduced.
+  * Database functionality extended with bad ips.
+  * New tags (usable in actions):
+    - `<bancount>` - ban count of this offender if known as bad
+      (started by 1 for unknown)
+    - `<bantime>` - current ban-time of the ticket
+      (prolongation can be retarded up to 10 sec.)
+  * Introduced new action command `actionprolong` to prolong ban-time
+    (e. g. set new timeout if expected);
+  * algorithm of restore current bans after restart changed:
+    update the restored ban-time (and therefore 
+    end of ban) of the ticket with ban-time of jail (as maximum),
+    for all tickets with ban-time greater (or persistent)
+  * added new setup-option `--without-tests` to skip building
+    and installing of tests files (gh-2287).
+  * added new command `fail2ban-client get <JAIL> banip ?sep-char|--with-time?`
+    to get the banned ip addresses (gh-1916).
+  * purge database will be executed now (within observer).
+   restoring currently banned ip after service restart fixed
+    (now < timeofban + bantime), ignore old log failures (already banned)
+  * upgrade database: update new created table `bips` with entries
+    from table `bans` (allows restore current bans after
+    upgrade from version <= 0.10)
+
+-------------------------------------------------------------------

Old:
----
  fail2ban-0.10.4.tar.gz
  fail2ban-0.10.4.tar.gz.asc

New:
----
  fail2ban-0.11.1.tar.gz
  fail2ban-0.11.1.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ fail2ban.spec ++++++
--- /var/tmp/diff_new_pack.fUZTrB/_old  2020-05-26 17:21:28.076251824 +0200
+++ /var/tmp/diff_new_pack.fUZTrB/_new  2020-05-26 17:21:28.080251833 +0200
@@ -22,7 +22,7 @@
   %define _fillupdir %{_localstatedir}/adm/fillup-templates
 %endif
 Name:           fail2ban
-Version:        0.10.4
+Version:        0.11.1
 Release:        0
 Summary:        Bans IP addresses that make too many authentication failures
 License:        GPL-2.0-or-later

++++++ fail2ban-0.10.4.tar.gz -> fail2ban-0.11.1.tar.gz ++++++
++++ 12495 lines of diff (skipped)

++++++ fail2ban-opensuse-service.patch ++++++
--- /var/tmp/diff_new_pack.fUZTrB/_old  2020-05-26 17:21:28.308252323 +0200
+++ /var/tmp/diff_new_pack.fUZTrB/_new  2020-05-26 17:21:28.312252331 +0200
@@ -1,21 +1,23 @@
-diff -ur fail2ban-0.10.4-orig/files/fail2ban.service.in 
fail2ban-0.10.4/files/fail2ban.service.in
---- fail2ban-0.10.4-orig/files/fail2ban.service.in     2018-10-04 
11:26:22.000000000 +0200
-+++ fail2ban-0.10.4/files/fail2ban.service.in  2019-08-12 11:17:34.929129813 
+0200
-@@ -6,12 +6,13 @@
+--- a/files/fail2ban.service.in        2020-01-11 11:01:00.000000000 +0100
++++ b/files/fail2ban.service.in        2020-05-21 09:48:12.049645909 +0200
+@@ -6,13 +6,14 @@
  
  [Service]
  Type=simple
-+EnvironmentFile=-/etc/sysconfig/fail2ban
- ExecStartPre=/bin/mkdir -p /var/run/fail2ban
+-ExecStartPre=/bin/mkdir -p /run/fail2ban
 -ExecStart=@BINDIR@/fail2ban-server -xf start
++EnvironmentFile=-/etc/sysconfig/fail2ban
++ExecStartPre=/bin/mkdir -p /var/run/fail2ban
 +ExecStart=/usr/bin/fail2ban-server -xf $FAIL2BAN_OPTIONS start
  # if should be logged in systemd journal, use following line or set logtarget 
to sysout in fail2ban.local
 -# ExecStart=@BINDIR@/fail2ban-server -xf --logtarget=sysout start
 -ExecStop=@BINDIR@/fail2ban-client stop
 -ExecReload=@BINDIR@/fail2ban-client reload
+-PIDFile=/run/fail2ban/fail2ban.pid
 +# ExecStart=/usr/bin/fail2ban-server -xf --logtarget=sysout start
 +ExecStop=/usr/bin/fail2ban-client stop
 +ExecReload=/usr/bin/fail2ban-client reload
- PIDFile=/var/run/fail2ban/fail2ban.pid
++PIDFile=/var/run/fail2ban/fail2ban.pid
  Restart=on-failure
  RestartPreventExitStatus=0 255
+ 


Reply via email to