commit ufw for openSUSE:Factory
Hello community, here is the log from the commit of package ufw for openSUSE:Factory checked in at 2019-01-15 09:17:49 Comparing /work/SRC/openSUSE:Factory/ufw (Old) and /work/SRC/openSUSE:Factory/.ufw.new.28833 (New) Package is "ufw" Tue Jan 15 09:17:49 2019 rev:8 rq:665678 version:0.36 Changes: --- /work/SRC/openSUSE:Factory/ufw/ufw.changes 2017-01-09 11:53:41.319541759 +0100 +++ /work/SRC/openSUSE:Factory/.ufw.new.28833/ufw.changes 2019-01-15 09:18:45.714102023 +0100 @@ -1,0 +2,9 @@ +Thu Jan 08 13:44:54 UTC 2019 - alexander_nau...@opensuse.org + +- Update to version 0.36 + * adds snap packaging + * concurrent updates + * many bug fixes + * a new 'prepend' command to better support IPS and dynamic firewalls. + +--- Old: ufw-0.35.tar.gz New: ufw-0.36.tar.gz Other differences: -- ++ ufw.spec ++ --- /var/tmp/diff_new_pack.jRkeZF/_old 2019-01-15 09:18:46.070101691 +0100 +++ /var/tmp/diff_new_pack.jRkeZF/_new 2019-01-15 09:18:46.070101691 +0100 @@ -1,7 +1,7 @@ # # spec file for package ufw # -# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,10 +17,10 @@ Name: ufw -Version:0.35 +Version:0.36 Release:0 Summary:Uncomplicated Firewall -License:GPL-3.0 +License:GPL-3.0-only Group: Productivity/Networking/Security Url:https://launchpad.net/ufw Source0: https://launchpad.net/ufw/%{version}/%{version}/+download/%{name}-%{version}.tar.gz ++ ufw-0.35.tar.gz -> ufw-0.36.tar.gz ++ 16979 lines of diff (skipped)
commit ufw for openSUSE:Factory
Hello community, here is the log from the commit of package ufw for openSUSE:Factory checked in at 2015-12-09 19:50:50 Comparing /work/SRC/openSUSE:Factory/ufw (Old) and /work/SRC/openSUSE:Factory/.ufw.new (New) Package is "ufw" Changes: --- /work/SRC/openSUSE:Factory/ufw/ufw.changes 2015-04-10 10:20:20.0 +0200 +++ /work/SRC/openSUSE:Factory/.ufw.new/ufw.changes 2015-12-09 22:35:39.0 +0100 @@ -1,0 +2,72 @@ +Wed Dec 2 13:22:00 UTC 2015 - p.drou...@gmail.com + +- Update to version 0.34 + * refactor capabilities checks and only call when needed + * error out early instead of tracing back with iptables errors in +get_netfilter_capabilities() (LP: #1044361) + * fix TypeError which somehow only manifested itself when using zh_CN + * add 'reload' to help (LP: #1059060) + * check-requirements now gives iptables output on failure. Patch thanks to +S. Nizio. + * use conntrack instead of state module. Patch based on work by S. Nizio. +(LP: #1065297) + * don't use get_netfilter_capabilities() with ipv6 if ipv6 is disabled +(LP: #1039729, LP: #1062521) + * fix parse error when finding PPID (LP: #1101304) + * implement before and after hooks in /etc/ufw/(before|after).init +(LP: #1075975) TODO: add tests + * add unit test framework and cleanup, remove dead and refactor some code + * honor UFW_SKIP_CHECKS=1 environment variable with setup.py, which eases +testing + * tests/check-requirements: add a check for -m rt --rt-type 0 (LP: #1191197) + * match simple rule syntax and don't allow ports with esp and ah protocols +with extended rule syntax + * when displaying extended rules via parser.get_command(), show "out" if the +direction is "out" and there is no corresponding interface + * fix return of various invalid extended rules in parser.get_command() + * clarify 'limit' command in man page (LP: #1089262) + * implement route rules (ie, manage FORWARD, LP: #262421). See man page for +details. This change reworked interface parsing and we now allow +interfaces with '_' in the name (LP: #1098472) + * add state RELATED,ESTABLISHED rule to ufw-before-forward in before*.rules +like we do with ufw-before-input. This will only affect systems with ip +forwarding enabled via sysctl + * add ufw[6]-track-forward chain and handle it the same as for +ufw[6]track-input and ufw[6]-track-output + * document ufw[6]-track-* in README (dropped in previous commit) + * fix for 'status' not distingushing between some v4/v6 targets +(LP: #1078665) + * add safe icmp packets packets to ufw-before-forward in before*.rules like +we do for ufw-before-input. This will only affect systems with ip +forwarding enabled via sysctl + * update check-requirements for python 3.3 and 3.4 + * add 5269/tcp to XMPP (LP: #1327162) + * fix traceback with forward rule + * import new and updated Launchpad translations: +- po/ar.po, po/ast.po, po/bg.po, po/bs.po, po/ca.po, po/ce.po, po/cs.po, + po/da.po, po/de.po, po/el.po, po/en_AU.po, po/en_GB.po, po/es.po, + po/et.po, po/fi.po, po/fr.po, po/he.po, po/hu.po, po/id.po, po/it.po, + po/ja.po, po/ko.po, po/lv.po, po/nb.po, po/nl.po, po/pl.po, po/pt_BR.po, + po/pt.po, po/ru.po, po/se.po, po/sk.po, po/sl.po, po/sr.po, po/sv.po, + po/tl.po, po/tr.po, po/uk.po, po/ur.po, po/zh_CN.po, po/zh_TW.po + * also use .lower() on translations for 'yes' (LP: #1438647) + * adjust/rearrange before6.rules for rfc4890 'must not be blocked' and +'should not be blocked' (LP: #1434525, LP: #1030214) + * doc/systemd.example: add service file from Ubuntu (LP: #1341083) + * correctly spell qBittorrent (LP: #1273965) + * update man page for app rules (LP: #1155292) + * support igmp protocol (LP: #946322) + * adjust testsuite for systems supporting smtp/udp (LP: #815982) + * enforce that basic commands don't have arguments (LP: #1155250) + * update command completion for --dry-run, --force, --help and route +(LP: #1225666) + * support gre protocol (LP: #1418879) + * support ./setup.py build (LP: #819600) + * doc/ufw.8: +- clarify log level behavior (LP: #1461701) +- add app profile syntax +- add protocol support + * skip profiles with invalid port declarations (LP: #1201934) + * tests/check-locales: skip locales that fail to install or generate + +--- Old: ufw-0.33.tar.gz New: ufw-0.34.tar.gz Other differences: -- ++ ufw.spec ++ --- /var/tmp/diff_new_pack.zT5gXv/_old 2015-12-09 22:35:41.0 +0100 +++ /var/tmp/diff_new_pack.zT5gXv/_new 2015-12-09 22:35:41.0 +0100 @@ -17,7 +17,7 @@ Name: ufw -Version:
commit ufw for openSUSE:Factory
Hello community, here is the log from the commit of package ufw for openSUSE:Factory checked in at 2012-11-14 17:03:13 Comparing /work/SRC/openSUSE:Factory/ufw (Old) and /work/SRC/openSUSE:Factory/.ufw.new (New) Package is "ufw", Maintainer is "" Changes: New Changes file: --- /dev/null 2012-10-22 00:44:18.403455820 +0200 +++ /work/SRC/openSUSE:Factory/.ufw.new/ufw.changes 2012-11-14 17:03:14.0 +0100 @@ -0,0 +1,75 @@ +--- +Fri Nov 9 12:28:27 UTC 2012 - johann.l...@wanadoo.fr + +-fix problem systemd move in /usr + fix various warning OBS + +--- +Tue Oct 16 14:53:10 UTC 2012 - johann.l...@wanadoo.fr + +-fix systemd tag to start automaticaly ufw + +--- +Mon Sep 17 12:53:01 UTC 2012 - johann.l...@wanadoo.fr + +- Update in 0.33 + fix dependance python-base + fix lang zh_TW + +--- +Wed Apr 4 14:02:00 UTC 2012 - johann.l...@wanadoo.fr + +- Updated in 0.31.1 + fix various warning OBS + add script init file for systemd + +--- +Tue Oct 11 15:05:51 UTC 2011 - johann.l...@wanadoo.fr + +bug on restart in init file- + +--- +Mon Oct 10 16:13:12 UTC 2011 - johann.l...@wanadoo.fr + +add opensuse init script - + +--- +Thu Oct 6 21:17:36 UTC 2011 - johann.l...@wanadoo.fr + +add %lang tag in spec file- + +--- +Wed Oct 5 14:56:20 UTC 2011 - johann.l...@wanadoo.fr + +OpenSuSE Factory- + +--- +Wed Oct 5 12:50:01 UTC 2011 - johann.l...@wanadoo.fr + +Delete patch commit.py- + +--- +Wed Oct 5 10:15:43 UTC 2011 - johann.l...@wanadoo.fr + +Changes in spec file for lang- + +--- +Tue Oct 4 14:21:01 UTC 2011 - johann.l...@wanadoo.fr + +Changes in spec file for python version - + +--- +Tue Oct 4 14:07:48 UTC 2011 - johann.l...@wanadoo.fr + +Changes on buildarch - + +--- +Tue Oct 4 13:57:07 UTC 2011 - johann.l...@wanadoo.fr + +Errors in spec file - + +--- +Tue Oct 4 13:49:46 UTC 2011 - johann.l...@wanadoo.fr + +first on OpenSUSE 11.4 - + New: ufw-0.33.tar.bz2 ufw-init ufw.changes ufw.service ufw.spec Other differences: -- ++ ufw.spec ++ # # spec file for package ufw # # Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via http://bugs.opensuse.org/ # Name: ufw Version:0.33 Release:0 Summary:Uncomplicated Firewall License:GPL-3.0 Group: Productivity/Networking/Security Url:http://launchpad.net/%{name} Source0:%{name}-%{version}.tar.bz2 Source1:ufw-init Source2:ufw.service BuildArch: noarch BuildRequires: iptables BuildRequires: python-base >= 2.7 BuildRequires: python-devel %if 0%{?suse_version} > 1140 BuildRequires: systemd %systemd_requires %endif #Requires: %description The Uncomplicated Firewall(ufw) is a front-end for netfilter, which aims to make it easier for people unfamiliar with firewall concepts. Ufw provides a framework for managing netfilter as well as manipulating the firewall. %prep %setup -q #Submited patch through ufw's bug report #Fix directory locations instead of #CONFIG_PREFIX# #http://bugs.launchpad.net/ufw/+bug/819600 %build #python setup.py build %install rm -rf %{buildroot} python setup.py install --prefix=/usr \ --root %{buildroot} mkdir -p $RPM_BUILD_ROOT/etc/init.d/ install -m 755 $RPM_SOURCE_DIR/ufw-init $RPM_BU