commit dnscrypt-proxy for openSUSE:Factory

2020-07-24 Thread root
Hello community,

here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory 
checked in at 2020-07-24 10:09:24

Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old)
 and  /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3592 (New)


Package is "dnscrypt-proxy"

Fri Jul 24 10:09:24 2020 rev:7 rq:822511 version:2.0.44

Changes:

--- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes
2020-07-14 07:59:18.293792606 +0200
+++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3592/dnscrypt-proxy.changes  
2020-07-24 10:10:35.826208558 +0200
@@ -1,0 +2,5 @@
+Wed Jul 22 01:43:47 UTC 2020 - Bernhard Wiedemann 
+
+- Sort file lists to make package build reproducible
+
+---



Other differences:
--
++ find_licenses.sh ++
--- /var/tmp/diff_new_pack.roDB4Q/_old  2020-07-24 10:10:36.766209501 +0200
+++ /var/tmp/diff_new_pack.roDB4Q/_new  2020-07-24 10:10:36.766209501 +0200
@@ -33,8 +33,8 @@
   then
 echo Searching for licenses ...
 rm $licenses_file
-find ./*/ -iname  "license*" -fprint $licenses_file
-find ./*/ -iname  "copying*" >> $licenses_file
+find ./*/ -iname  "license*" | sort > $licenses_file
+find ./*/ -iname  "copying*" | sort >> $licenses_file
 goahead=1
   else
 echo "$vendor_licenses_dir" is not a directory.




commit dnscrypt-proxy for openSUSE:Factory

2020-07-13 Thread root
Hello community,

here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory 
checked in at 2020-07-14 07:57:54

Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old)
 and  /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060 (New)


Package is "dnscrypt-proxy"

Tue Jul 14 07:57:54 2020 rev:6 rq:820018 version:2.0.44

Changes:

--- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes
2020-07-10 14:12:51.491524879 +0200
+++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060/dnscrypt-proxy.changes  
2020-07-14 07:59:18.293792606 +0200
@@ -1,0 +2,11 @@
+Tue Jun 30 12:00:00 UTC 2020 - cu...@mail.de
+
+- Made PID available in /run/dnscrypt-proxy/dnscrypt-proxy.pid
+  through systemd service unit.
+
+- README.openSUSE updated.
+
+- dnscrypt-proxy.socket.conf added as example for a systemd
+  drop-in file to override the socket unit.
+
+---

New:

  dnscrypt-proxy.socket.conf



Other differences:
--
++ dnscrypt-proxy.spec ++
--- /var/tmp/diff_new_pack.ERWrDu/_old  2020-07-14 07:59:21.357802527 +0200
+++ /var/tmp/diff_new_pack.ERWrDu/_new  2020-07-14 07:59:21.361802540 +0200
@@ -41,12 +41,16 @@
 Source5:install_licenses.sh
 # Some words
 Source6:README.openSUSE
+# Example how to override socket unit
+Source7:%{name}.socket.conf
 BuildRequires:  golang(API) >= 1.14
 BuildRequires:  golang-packaging
 BuildRequires:  pkgconfig
 BuildRequires:  shadow
 BuildRequires:  systemd-rpm-macros
 BuildRequires:  pkgconfig(libsystemd)
+# For systemd pidfile solution.
+Requires:   bash
 # for daemon group/user
 Requires(pre):  shadow
 %{?systemd_requires}
@@ -81,7 +85,7 @@
 sed -i "1s/#! \/usr\/bin\/env python3/#! \/usr\/bin\/python3/" 
utils/generate-domains-blacklists/generate-domains-blacklist.py
 
 %build
-cd dnscrypt-proxy
+cd %{name}
 go build -mod=vendor -buildmode=pie
 
 %install
@@ -91,8 +95,7 @@
   %{buildroot}%{home_dir}   \
   %{buildroot}%{config_dir}
 
-install -D -d -m 0755   \
-  %{buildroot}%{_datadir}/%{name}/
+install -D -d -m 0755 %{buildroot}%{_datadir}/%{name}/
 
 # Binary
 install -D -m 0755 %{name}/%{name} %{buildroot}%{_sbindir}/%{name}
@@ -132,6 +135,9 @@
 # Some hints. Improvements and feedback welcome!
 cp %{SOURCE6} README.openSUSE
 
+# Example drop-in.
+cp %{SOURCE7} %{name}.socket.conf
+
 %pre
 # group and user
 getent group %{user_group} >/dev/null || %{_sbindir}/groupadd -r %{user_group}
@@ -166,7 +172,7 @@
 %dir %attr(0750,%{user_group},%{user_group}) %{home_dir}
 %dir %attr(0750,%{user_group},%{user_group}) %{log_dir}
 %{_docdir}/%{name}/
-%doc ChangeLog README.md README.openSUSE
+%doc ChangeLog README.md README.openSUSE %{name}.socket.conf
 %license LICENSE
 %{_licensedir}/%{name}/%{vlic_dir}/
 

++ README.openSUSE ++
--- /var/tmp/diff_new_pack.ERWrDu/_old  2020-07-14 07:59:21.389802631 +0200
+++ /var/tmp/diff_new_pack.ERWrDu/_new  2020-07-14 07:59:21.393802644 +0200
@@ -1,27 +1,73 @@
-Some tips:
+***
+* *
+*README.openSUSE last edited for version 2.0.44   *
+* *
+***
 
-1. Configure /etc/dnscrypt-proxy/dnscrypt-proxy.toml for your use case first!
 
-2. Override "ListenStream" and "ListenDatagram" for dnscrypt-proxy.socket
-   according to your setup, especially if dnscrypt-proxy should not be used as
-   your primary name resolver.
-   In this case you might want to forward queries from a tool
-   like "dnsmasq" to dnscrypt-proxy.
-   Then the later should probably not listen on the default adress/port.
+Some hints:
+---
 
-3. If running via systemd, start as root once with
+Configure /etc/dnscrypt-proxy/dnscrypt-proxy.toml for your use case first!
+
+A.
+If dnscrypt-proxy should act as your primary resolver and only listen at
+127.0.0.1:53, start as root once with
 
   $ systemctl start dnscrypt-proxy.socket
 
-   For always activating, do
+  and if you don't want to repeat this after next boots, do
 
   $ systemctl enable dnscrypt-proxy.socket
 
-4. Alternatively dnscrypt-proxy.service can be used the same way.
-   This will require you to set or uncomment "listen_addresses" in
-   /etc/dnscrypt-proxy/dnscrypt-proxy.toml
-   In this case the socket configuration described in (2.)
-   has to be done in this file directly.
 
+B.
+If you have some other resolver listening on 127.0.0.1:53 that should forward
+queries to dnscrypt-proxy it is recommended to create 

commit dnscrypt-proxy for openSUSE:Factory

2020-07-10 Thread root
Hello community,

here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory 
checked in at 2020-07-10 14:12:38

Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old)
 and  /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060 (New)


Package is "dnscrypt-proxy"

Fri Jul 10 14:12:38 2020 rev:5 rq:817415 version:2.0.44

Changes:

--- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes
2020-01-04 19:21:31.569142153 +0100
+++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060/dnscrypt-proxy.changes  
2020-07-10 14:12:51.491524879 +0200
@@ -1,0 +2,60 @@
+Fri Jun 12 12:00:00 UTC 2020 - cu...@mail.de - 2.0.44
+
+- Update to version 2.0.44
+  * Netprobes and listening sockets are now ignored when the
+'-list', '-list-all', '-show-certs' or '-check'
+command-line switches are used.
+  * 'tls_client_auth' was renamed to 'doh_client_x509_auth'.
+A section with the previous name is temporarily ignored if empty,
+but will error out if not.
+  * Updates to the set of block lists.
+
+- Breaking change from 2.0.43 Update:
+  The 'tls_client_auth' section was renamed to 'doh_client_x509_auth'.
+  If you had a tls_client_auth section in the configuration file,
+  it needs to be updated/renamed/deleted.
+
+---
+Tue Jun 09 16:00:00 UTC 2020 - cu...@mail.de - 2.0.43
+
+- Minimum golang version now at 1.14
+
+- Update to version 2.0.43
+  * When stored into a file, service logs now only contain data
+from the most recent launch. This can be changed with the
+new 'log_file_latest' option.
+  * Support for DNS64 translation implemented.
+  * Connections to DoH servers can be authenticated
+using TLS client certificates.
+  * Multiple stamps are now allowed for a single server
+in resolvers and relays lists.
+  * Updates and additions for the example domain block lists.
+  * Cached configuration files can now be temporarily used if
+they are out of date, but bootstraping is impossible.
+  * 'generate-domains-blacklists' now tries to deduplicate
+entries clobbered by wildcard rules.
+  * 'generate-domains-blacklists' can now directly
+write lists to a file with the `-o` command-line option.
+  * Cache files are now downloaded as the user the daemon will
+be running as. This fixes permission issues at startup time.
+  * Forwarded queries are now subject to global timeouts,
+and can be forced to use TCP.
+  * The 'ct' parameter has been removed from DoH queries,
+as Google doesn't require it any more.
+
+---
+Sat May 23 12:00:00 UTC 2020 - cu...@mail.de - 2.0.42
+
+- Upgrade to 2.0.42 (boo#1165343)
+
+- Spec files from home:darix:apps/dnscrypt-proxy and
+  home:cunix:go/dnscrypt-proxy2 merged into existing spec.
+
+- v1 of dnscrypt-proxy is not supported anymore and v2 is
+  a new project. This will require v1 users to migrate their
+  configuration.
+
+- dnscrypt-proxy-default-config.patch deleted because patched
+  file 'dnscrypt-proxy.conf' is not used anymore.
+
+---

Old:

  dnscrypt-proxy-1.9.5.tar.bz2
  dnscrypt-proxy-default-config.patch
  dnscrypt-proxy.tmpfile
  dnscrypt-proxy@.service

New:

  README.openSUSE
  dnscrypt-proxy-2.0.44.tar.gz
  dnscrypt-proxy.service
  dnscrypt-proxy.socket
  example-dnscrypt-proxy.toml.sed
  find_licenses.sh
  install_licenses.sh



Other differences:
--
++ dnscrypt-proxy.spec ++
--- /var/tmp/diff_new_pack.TzVYlg/_old  2020-07-10 14:12:52.799529174 +0200
+++ /var/tmp/diff_new_pack.TzVYlg/_new  2020-07-10 14:12:52.799529174 +0200
@@ -15,143 +15,159 @@
 # Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
+%define _buildshell /bin/bash
+%define user_group  dnscrypt
+%define config_dir  %{_sysconfdir}/%{name}
+%define home_dir%{_localstatedir}/lib/%{name}
+%define log_dir %{_localstatedir}/log/%{name}
+%define services%{name}.socket %{name}.service
+%define vlic_dir  vendored
 
 Name:   dnscrypt-proxy
-Version:1.9.5
+Version:2.0.44
 Release:0
 Summary:A tool for securing communications between a client and a DNS 
resolver
-License:BSD-3-Clause
+License:ISC
 Group:  Productivity/Networking/DNS/Utilities
-URL:https://dnscrypt.org/
-Source: 
https://download.dnscrypt.org/dnscrypt-proxy/%{name}-%{version}.tar.bz2
-Source1:%{name}@.service
-Source5:%{name}.tmpfile
-Patch0: dnscrypt-proxy-default-config.patch
-BuildRequires:  libsodium-devel
-BuildRequires:  libtool
+URL:https://dnscrypt.info/
+Source0:

commit dnscrypt-proxy for openSUSE:Factory

2020-01-04 Thread root
Hello community,

here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory 
checked in at 2020-01-04 19:21:30

Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old)
 and  /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.6675 (New)


Package is "dnscrypt-proxy"

Sat Jan  4 19:21:30 2020 rev:4 rq:760751 version:1.9.5

Changes:

--- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes
2017-11-25 08:43:45.695847358 +0100
+++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.6675/dnscrypt-proxy.changes  
2020-01-04 19:21:31.569142153 +0100
@@ -1,0 +2,6 @@
+Thu Dec 19 15:27:22 UTC 2019 - Dominique Leuenberger 
+
+- BuildRequire pkgconfig(libsystemd) instead of systemd-devel:
+  Allow OBS to shortcut through the -mini flavors.
+
+---



Other differences:
--
++ dnscrypt-proxy.spec ++
--- /var/tmp/diff_new_pack.PghSJb/_old  2020-01-04 19:21:32.821142707 +0100
+++ /var/tmp/diff_new_pack.PghSJb/_new  2020-01-04 19:21:32.845142718 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package dnscrypt-proxy
 #
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,7 +12,7 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
 
@@ -22,7 +22,7 @@
 Summary:A tool for securing communications between a client and a DNS 
resolver
 License:BSD-3-Clause
 Group:  Productivity/Networking/DNS/Utilities
-Url:https://dnscrypt.org/
+URL:https://dnscrypt.org/
 Source: 
https://download.dnscrypt.org/dnscrypt-proxy/%{name}-%{version}.tar.bz2
 Source1:%{name}@.service
 Source5:%{name}.tmpfile
@@ -31,8 +31,8 @@
 BuildRequires:  libtool
 BuildRequires:  pkgconfig
 BuildRequires:  shadow
-BuildRequires:  systemd-devel
 BuildRequires:  systemd-rpm-macros
+BuildRequires:  pkgconfig(libsystemd)
 Requires(pre):  coreutils
 Requires(pre):  diffutils
 Requires(pre):  fillup




commit dnscrypt-proxy for openSUSE:Factory

2017-11-24 Thread root
Hello community,

here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory 
checked in at 2017-11-25 08:43:44

Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old)
 and  /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new (New)


Package is "dnscrypt-proxy"

Sat Nov 25 08:43:44 2017 rev:3 rq:545130 version:1.9.5

Changes:

--- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes
2017-10-11 23:03:24.303508941 +0200
+++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new/dnscrypt-proxy.changes   
2017-11-25 08:43:45.695847358 +0100
@@ -1,0 +2,5 @@
+Mon Oct 23 08:42:59 UTC 2017 - bwiedem...@suse.com
+
+- Make builds reproducible by using a constant __DATE__ (boo#1047218)
+
+---



Other differences:
--
++ dnscrypt-proxy.spec ++
--- /var/tmp/diff_new_pack.F1wrPw/_old  2017-11-25 08:43:46.527817047 +0100
+++ /var/tmp/diff_new_pack.F1wrPw/_new  2017-11-25 08:43:46.531816901 +0100
@@ -64,7 +64,7 @@
 %setup -q
 %patch0 -p1
 # Strip __DATE__
-sed -i "s/__DATE__/\"%(date +%%F)\"/" src/proxy/options.c
+sed -i "s/__DATE__/\"%(date -u -r ChangeLog +%%F)\"/" src/proxy/options.c
 # Don't install COPYING with make, we use our %%license marcro if possible
 sed -i "/\tCOPYING / d" Makefile.am
 sed -i "s/COPYING //" Makefile.in




commit dnscrypt-proxy for openSUSE:Factory

2017-10-11 Thread root
Hello community,

here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory 
checked in at 2017-10-11 23:03:22

Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old)
 and  /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new (New)


Package is "dnscrypt-proxy"

Wed Oct 11 23:03:22 2017 rev:2 rq:533185 version:1.9.5

Changes:

--- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes
2017-09-11 16:17:39.839903305 +0200
+++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new/dnscrypt-proxy.changes   
2017-10-11 23:03:24.303508941 +0200
@@ -1,0 +2,6 @@
+Wed Sep  6 08:51:47 UTC 2017 - jeng...@inai.de
+
+- Errors from user creation from pre scriptlet must not be ignored.
+- Ensure neutrality of description.
+
+---



Other differences:
--
++ dnscrypt-proxy.spec ++
--- /var/tmp/diff_new_pack.rJfRdA/_old  2017-10-11 23:03:25.027477221 +0200
+++ /var/tmp/diff_new_pack.rJfRdA/_new  2017-10-11 23:03:25.027477221 +0200
@@ -46,8 +46,8 @@
 encrypting and authenticating requests using the DNSCrypt protocol and passing 
them to an upstream server,
 by default Cisco who run this on their resolvers. (It used to be OpenDNS.)
 
-The DNSCrypt protocol uses high-speed high-security elliptic-curve 
cryptography and is very similar to
-DNSCurve, but focuses on securing communications between a client and its 
first-level resolver.
+The DNSCrypt protocol uses elliptic-curve cryptography and is similar to 
DNSCurve, but focuses on
+securing communications between a client and its first-level resolver.
 
 While not providing end-to-end security, it protects the local network, which 
is often the weakest point
 of the chain, against man-in-the-middle attacks. It also provides some 
confidentiality to DNS queries.
@@ -93,11 +93,11 @@
 
 %pre
 if ! %{_bindir}/getent group dnscrypt >/dev/null; then
-%{_sbindir}/groupadd -r dnscrypt 2>/dev/null || :
+%{_sbindir}/groupadd -r dnscrypt
 fi
 if ! %{_bindir}/getent passwd dnscrypt >/dev/null; then
 %{_sbindir}/useradd -c "DNSCrypt daemon" -d %{_localstatedir}/lib/empty -g 
dnscrypt \
-  -r -s /bin/false dnscrypt 2>/dev/null || :
+  -r -s /bin/false dnscrypt
 fi
 %if 0%{?suse_version} >= 1210
 %service_add_pre %{name}@.service