commit dnscrypt-proxy for openSUSE:Factory
Hello community, here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory checked in at 2020-07-24 10:09:24 Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old) and /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3592 (New) Package is "dnscrypt-proxy" Fri Jul 24 10:09:24 2020 rev:7 rq:822511 version:2.0.44 Changes: --- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes 2020-07-14 07:59:18.293792606 +0200 +++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3592/dnscrypt-proxy.changes 2020-07-24 10:10:35.826208558 +0200 @@ -1,0 +2,5 @@ +Wed Jul 22 01:43:47 UTC 2020 - Bernhard Wiedemann + +- Sort file lists to make package build reproducible + +--- Other differences: -- ++ find_licenses.sh ++ --- /var/tmp/diff_new_pack.roDB4Q/_old 2020-07-24 10:10:36.766209501 +0200 +++ /var/tmp/diff_new_pack.roDB4Q/_new 2020-07-24 10:10:36.766209501 +0200 @@ -33,8 +33,8 @@ then echo Searching for licenses ... rm $licenses_file -find ./*/ -iname "license*" -fprint $licenses_file -find ./*/ -iname "copying*" >> $licenses_file +find ./*/ -iname "license*" | sort > $licenses_file +find ./*/ -iname "copying*" | sort >> $licenses_file goahead=1 else echo "$vendor_licenses_dir" is not a directory.
commit dnscrypt-proxy for openSUSE:Factory
Hello community, here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory checked in at 2020-07-14 07:57:54 Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old) and /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060 (New) Package is "dnscrypt-proxy" Tue Jul 14 07:57:54 2020 rev:6 rq:820018 version:2.0.44 Changes: --- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes 2020-07-10 14:12:51.491524879 +0200 +++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060/dnscrypt-proxy.changes 2020-07-14 07:59:18.293792606 +0200 @@ -1,0 +2,11 @@ +Tue Jun 30 12:00:00 UTC 2020 - cu...@mail.de + +- Made PID available in /run/dnscrypt-proxy/dnscrypt-proxy.pid + through systemd service unit. + +- README.openSUSE updated. + +- dnscrypt-proxy.socket.conf added as example for a systemd + drop-in file to override the socket unit. + +--- New: dnscrypt-proxy.socket.conf Other differences: -- ++ dnscrypt-proxy.spec ++ --- /var/tmp/diff_new_pack.ERWrDu/_old 2020-07-14 07:59:21.357802527 +0200 +++ /var/tmp/diff_new_pack.ERWrDu/_new 2020-07-14 07:59:21.361802540 +0200 @@ -41,12 +41,16 @@ Source5:install_licenses.sh # Some words Source6:README.openSUSE +# Example how to override socket unit +Source7:%{name}.socket.conf BuildRequires: golang(API) >= 1.14 BuildRequires: golang-packaging BuildRequires: pkgconfig BuildRequires: shadow BuildRequires: systemd-rpm-macros BuildRequires: pkgconfig(libsystemd) +# For systemd pidfile solution. +Requires: bash # for daemon group/user Requires(pre): shadow %{?systemd_requires} @@ -81,7 +85,7 @@ sed -i "1s/#! \/usr\/bin\/env python3/#! \/usr\/bin\/python3/" utils/generate-domains-blacklists/generate-domains-blacklist.py %build -cd dnscrypt-proxy +cd %{name} go build -mod=vendor -buildmode=pie %install @@ -91,8 +95,7 @@ %{buildroot}%{home_dir} \ %{buildroot}%{config_dir} -install -D -d -m 0755 \ - %{buildroot}%{_datadir}/%{name}/ +install -D -d -m 0755 %{buildroot}%{_datadir}/%{name}/ # Binary install -D -m 0755 %{name}/%{name} %{buildroot}%{_sbindir}/%{name} @@ -132,6 +135,9 @@ # Some hints. Improvements and feedback welcome! cp %{SOURCE6} README.openSUSE +# Example drop-in. +cp %{SOURCE7} %{name}.socket.conf + %pre # group and user getent group %{user_group} >/dev/null || %{_sbindir}/groupadd -r %{user_group} @@ -166,7 +172,7 @@ %dir %attr(0750,%{user_group},%{user_group}) %{home_dir} %dir %attr(0750,%{user_group},%{user_group}) %{log_dir} %{_docdir}/%{name}/ -%doc ChangeLog README.md README.openSUSE +%doc ChangeLog README.md README.openSUSE %{name}.socket.conf %license LICENSE %{_licensedir}/%{name}/%{vlic_dir}/ ++ README.openSUSE ++ --- /var/tmp/diff_new_pack.ERWrDu/_old 2020-07-14 07:59:21.389802631 +0200 +++ /var/tmp/diff_new_pack.ERWrDu/_new 2020-07-14 07:59:21.393802644 +0200 @@ -1,27 +1,73 @@ -Some tips: +*** +* * +*README.openSUSE last edited for version 2.0.44 * +* * +*** -1. Configure /etc/dnscrypt-proxy/dnscrypt-proxy.toml for your use case first! -2. Override "ListenStream" and "ListenDatagram" for dnscrypt-proxy.socket - according to your setup, especially if dnscrypt-proxy should not be used as - your primary name resolver. - In this case you might want to forward queries from a tool - like "dnsmasq" to dnscrypt-proxy. - Then the later should probably not listen on the default adress/port. +Some hints: +--- -3. If running via systemd, start as root once with +Configure /etc/dnscrypt-proxy/dnscrypt-proxy.toml for your use case first! + +A. +If dnscrypt-proxy should act as your primary resolver and only listen at +127.0.0.1:53, start as root once with $ systemctl start dnscrypt-proxy.socket - For always activating, do + and if you don't want to repeat this after next boots, do $ systemctl enable dnscrypt-proxy.socket -4. Alternatively dnscrypt-proxy.service can be used the same way. - This will require you to set or uncomment "listen_addresses" in - /etc/dnscrypt-proxy/dnscrypt-proxy.toml - In this case the socket configuration described in (2.) - has to be done in this file directly. +B. +If you have some other resolver listening on 127.0.0.1:53 that should forward +queries to dnscrypt-proxy it is recommended to create
commit dnscrypt-proxy for openSUSE:Factory
Hello community, here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory checked in at 2020-07-10 14:12:38 Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old) and /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060 (New) Package is "dnscrypt-proxy" Fri Jul 10 14:12:38 2020 rev:5 rq:817415 version:2.0.44 Changes: --- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes 2020-01-04 19:21:31.569142153 +0100 +++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.3060/dnscrypt-proxy.changes 2020-07-10 14:12:51.491524879 +0200 @@ -1,0 +2,60 @@ +Fri Jun 12 12:00:00 UTC 2020 - cu...@mail.de - 2.0.44 + +- Update to version 2.0.44 + * Netprobes and listening sockets are now ignored when the +'-list', '-list-all', '-show-certs' or '-check' +command-line switches are used. + * 'tls_client_auth' was renamed to 'doh_client_x509_auth'. +A section with the previous name is temporarily ignored if empty, +but will error out if not. + * Updates to the set of block lists. + +- Breaking change from 2.0.43 Update: + The 'tls_client_auth' section was renamed to 'doh_client_x509_auth'. + If you had a tls_client_auth section in the configuration file, + it needs to be updated/renamed/deleted. + +--- +Tue Jun 09 16:00:00 UTC 2020 - cu...@mail.de - 2.0.43 + +- Minimum golang version now at 1.14 + +- Update to version 2.0.43 + * When stored into a file, service logs now only contain data +from the most recent launch. This can be changed with the +new 'log_file_latest' option. + * Support for DNS64 translation implemented. + * Connections to DoH servers can be authenticated +using TLS client certificates. + * Multiple stamps are now allowed for a single server +in resolvers and relays lists. + * Updates and additions for the example domain block lists. + * Cached configuration files can now be temporarily used if +they are out of date, but bootstraping is impossible. + * 'generate-domains-blacklists' now tries to deduplicate +entries clobbered by wildcard rules. + * 'generate-domains-blacklists' can now directly +write lists to a file with the `-o` command-line option. + * Cache files are now downloaded as the user the daemon will +be running as. This fixes permission issues at startup time. + * Forwarded queries are now subject to global timeouts, +and can be forced to use TCP. + * The 'ct' parameter has been removed from DoH queries, +as Google doesn't require it any more. + +--- +Sat May 23 12:00:00 UTC 2020 - cu...@mail.de - 2.0.42 + +- Upgrade to 2.0.42 (boo#1165343) + +- Spec files from home:darix:apps/dnscrypt-proxy and + home:cunix:go/dnscrypt-proxy2 merged into existing spec. + +- v1 of dnscrypt-proxy is not supported anymore and v2 is + a new project. This will require v1 users to migrate their + configuration. + +- dnscrypt-proxy-default-config.patch deleted because patched + file 'dnscrypt-proxy.conf' is not used anymore. + +--- Old: dnscrypt-proxy-1.9.5.tar.bz2 dnscrypt-proxy-default-config.patch dnscrypt-proxy.tmpfile dnscrypt-proxy@.service New: README.openSUSE dnscrypt-proxy-2.0.44.tar.gz dnscrypt-proxy.service dnscrypt-proxy.socket example-dnscrypt-proxy.toml.sed find_licenses.sh install_licenses.sh Other differences: -- ++ dnscrypt-proxy.spec ++ --- /var/tmp/diff_new_pack.TzVYlg/_old 2020-07-10 14:12:52.799529174 +0200 +++ /var/tmp/diff_new_pack.TzVYlg/_new 2020-07-10 14:12:52.799529174 +0200 @@ -15,143 +15,159 @@ # Please submit bugfixes or comments via https://bugs.opensuse.org/ # +%define _buildshell /bin/bash +%define user_group dnscrypt +%define config_dir %{_sysconfdir}/%{name} +%define home_dir%{_localstatedir}/lib/%{name} +%define log_dir %{_localstatedir}/log/%{name} +%define services%{name}.socket %{name}.service +%define vlic_dir vendored Name: dnscrypt-proxy -Version:1.9.5 +Version:2.0.44 Release:0 Summary:A tool for securing communications between a client and a DNS resolver -License:BSD-3-Clause +License:ISC Group: Productivity/Networking/DNS/Utilities -URL:https://dnscrypt.org/ -Source: https://download.dnscrypt.org/dnscrypt-proxy/%{name}-%{version}.tar.bz2 -Source1:%{name}@.service -Source5:%{name}.tmpfile -Patch0: dnscrypt-proxy-default-config.patch -BuildRequires: libsodium-devel -BuildRequires: libtool +URL:https://dnscrypt.info/ +Source0:
commit dnscrypt-proxy for openSUSE:Factory
Hello community, here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory checked in at 2020-01-04 19:21:30 Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old) and /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.6675 (New) Package is "dnscrypt-proxy" Sat Jan 4 19:21:30 2020 rev:4 rq:760751 version:1.9.5 Changes: --- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes 2017-11-25 08:43:45.695847358 +0100 +++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new.6675/dnscrypt-proxy.changes 2020-01-04 19:21:31.569142153 +0100 @@ -1,0 +2,6 @@ +Thu Dec 19 15:27:22 UTC 2019 - Dominique Leuenberger + +- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: + Allow OBS to shortcut through the -mini flavors. + +--- Other differences: -- ++ dnscrypt-proxy.spec ++ --- /var/tmp/diff_new_pack.PghSJb/_old 2020-01-04 19:21:32.821142707 +0100 +++ /var/tmp/diff_new_pack.PghSJb/_new 2020-01-04 19:21:32.845142718 +0100 @@ -1,7 +1,7 @@ # # spec file for package dnscrypt-proxy # -# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2019 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -12,7 +12,7 @@ # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. -# Please submit bugfixes or comments via http://bugs.opensuse.org/ +# Please submit bugfixes or comments via https://bugs.opensuse.org/ # @@ -22,7 +22,7 @@ Summary:A tool for securing communications between a client and a DNS resolver License:BSD-3-Clause Group: Productivity/Networking/DNS/Utilities -Url:https://dnscrypt.org/ +URL:https://dnscrypt.org/ Source: https://download.dnscrypt.org/dnscrypt-proxy/%{name}-%{version}.tar.bz2 Source1:%{name}@.service Source5:%{name}.tmpfile @@ -31,8 +31,8 @@ BuildRequires: libtool BuildRequires: pkgconfig BuildRequires: shadow -BuildRequires: systemd-devel BuildRequires: systemd-rpm-macros +BuildRequires: pkgconfig(libsystemd) Requires(pre): coreutils Requires(pre): diffutils Requires(pre): fillup
commit dnscrypt-proxy for openSUSE:Factory
Hello community, here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory checked in at 2017-11-25 08:43:44 Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old) and /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new (New) Package is "dnscrypt-proxy" Sat Nov 25 08:43:44 2017 rev:3 rq:545130 version:1.9.5 Changes: --- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes 2017-10-11 23:03:24.303508941 +0200 +++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new/dnscrypt-proxy.changes 2017-11-25 08:43:45.695847358 +0100 @@ -1,0 +2,5 @@ +Mon Oct 23 08:42:59 UTC 2017 - bwiedem...@suse.com + +- Make builds reproducible by using a constant __DATE__ (boo#1047218) + +--- Other differences: -- ++ dnscrypt-proxy.spec ++ --- /var/tmp/diff_new_pack.F1wrPw/_old 2017-11-25 08:43:46.527817047 +0100 +++ /var/tmp/diff_new_pack.F1wrPw/_new 2017-11-25 08:43:46.531816901 +0100 @@ -64,7 +64,7 @@ %setup -q %patch0 -p1 # Strip __DATE__ -sed -i "s/__DATE__/\"%(date +%%F)\"/" src/proxy/options.c +sed -i "s/__DATE__/\"%(date -u -r ChangeLog +%%F)\"/" src/proxy/options.c # Don't install COPYING with make, we use our %%license marcro if possible sed -i "/\tCOPYING / d" Makefile.am sed -i "s/COPYING //" Makefile.in
commit dnscrypt-proxy for openSUSE:Factory
Hello community, here is the log from the commit of package dnscrypt-proxy for openSUSE:Factory checked in at 2017-10-11 23:03:22 Comparing /work/SRC/openSUSE:Factory/dnscrypt-proxy (Old) and /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new (New) Package is "dnscrypt-proxy" Wed Oct 11 23:03:22 2017 rev:2 rq:533185 version:1.9.5 Changes: --- /work/SRC/openSUSE:Factory/dnscrypt-proxy/dnscrypt-proxy.changes 2017-09-11 16:17:39.839903305 +0200 +++ /work/SRC/openSUSE:Factory/.dnscrypt-proxy.new/dnscrypt-proxy.changes 2017-10-11 23:03:24.303508941 +0200 @@ -1,0 +2,6 @@ +Wed Sep 6 08:51:47 UTC 2017 - jeng...@inai.de + +- Errors from user creation from pre scriptlet must not be ignored. +- Ensure neutrality of description. + +--- Other differences: -- ++ dnscrypt-proxy.spec ++ --- /var/tmp/diff_new_pack.rJfRdA/_old 2017-10-11 23:03:25.027477221 +0200 +++ /var/tmp/diff_new_pack.rJfRdA/_new 2017-10-11 23:03:25.027477221 +0200 @@ -46,8 +46,8 @@ encrypting and authenticating requests using the DNSCrypt protocol and passing them to an upstream server, by default Cisco who run this on their resolvers. (It used to be OpenDNS.) -The DNSCrypt protocol uses high-speed high-security elliptic-curve cryptography and is very similar to -DNSCurve, but focuses on securing communications between a client and its first-level resolver. +The DNSCrypt protocol uses elliptic-curve cryptography and is similar to DNSCurve, but focuses on +securing communications between a client and its first-level resolver. While not providing end-to-end security, it protects the local network, which is often the weakest point of the chain, against man-in-the-middle attacks. It also provides some confidentiality to DNS queries. @@ -93,11 +93,11 @@ %pre if ! %{_bindir}/getent group dnscrypt >/dev/null; then -%{_sbindir}/groupadd -r dnscrypt 2>/dev/null || : +%{_sbindir}/groupadd -r dnscrypt fi if ! %{_bindir}/getent passwd dnscrypt >/dev/null; then %{_sbindir}/useradd -c "DNSCrypt daemon" -d %{_localstatedir}/lib/empty -g dnscrypt \ - -r -s /bin/false dnscrypt 2>/dev/null || : + -r -s /bin/false dnscrypt fi %if 0%{?suse_version} >= 1210 %service_add_pre %{name}@.service