Commit Graph

175 Commits

Author SHA256 Message Date
Dominique Leuenberger
23ec442c57 Accepting request 982371 from network
OBS-URL: https://build.opensuse.org/request/show/982371
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=87
2022-07-08 12:01:29 +00:00
37bc9b79aa Accepting request 981335 from home:gmbr3:Active
- Move the dbus-1 system.d file to /usr (bsc#1200344)

OBS-URL: https://build.opensuse.org/request/show/981335
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=147
2022-06-13 08:25:42 +00:00
Dominique Leuenberger
83a5bd8676 Accepting request 969348 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/969348
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=86
2022-04-14 15:23:28 +00:00
Reinhard Max
e3d0db2cf5 - bsc#1197872, CVE-2022-0934, dnsmasq-CVE-2022-0934.patch:
Heap use after free in dhcp6_no_relay

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=145
2022-04-05 07:17:25 +00:00
Dominique Leuenberger
672de53781 Accepting request 933804 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/933804
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=85
2021-11-26 23:50:56 +00:00
Dominique Leuenberger
c151cb5315 Accepting request 932271 from network
- bsc#1192529, dnsmasq-resolv-conf.patch:
  Fix a segfault when re-reading an empty resolv.conf
- Remove "nogroup" membership from the dnsmasq user.
- Use systemd-sysusers from 15.3 onwards

OBS-URL: https://build.opensuse.org/request/show/932271
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=84
2021-11-20 21:47:53 +00:00
Reinhard Max
e863251880 OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=144 2021-11-18 15:52:28 +00:00
Reinhard Max
c177936b94 - bsc#1192529, dnsmasq-resolv-conf.patch:
Fix a segfault when re-reading an empty resolv.conf
- Remove "nogroup" membership from the dnsmasq user.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=143
2021-11-18 14:11:14 +00:00
Reinhard Max
d5b765a964 Accepting request 928184 from home:gmbr3:Active
- Use systemd-sysusers from 15.3 onwards

OBS-URL: https://build.opensuse.org/request/show/928184
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=142
2021-11-18 13:53:24 +00:00
Dominique Leuenberger
25af15f8e3 Accepting request 921143 from network
- jsc#SLE-17936: Sync this state from Factory to SLE-15-SP1.
- SLE bugs that got fixed upstream between 2.79 and 2.86, but for
  which we need to keep references when syncing:
  * bsc#1176076: dnsmasq-servfail.patch
  * bsc#1156543: dnsmasq-siocgstamp.patch
  * bsc#1138743: dnsmasq-cache-size.patch
  * bsc#1076958: CVE-2017-15107, dnsmasq-CVE-2017-15107.patch 
  * bsc#1180914: Open inotify socket only when used.
  * removed dnsmasq-dnspooq.patch
- bsc#1173646: Set --local-service by default.

- Update to 2.86:
  * Handle DHCPREBIND requests in the DHCPv6 server code.
  * Fix bug which caused dnsmasq to lose track of processes forked
    to handle TCP DNS connections under heavy load.
  * Major rewrite of the DNS server and domain handling code. This
    should be largely transparent, but it drastically improves
    performance and reduces memory foot-print when configuring
    large numbers of domains.
  * Revise resource handling for number of concurrent DNS queries.
  * Improve efficiency of DNSSEC.
  * Connection track mark based DNS query filtering.
  * Allow smaller than 64 prefix lengths in synth-domain, with
    caveats.
    --synth-domain=1234:4567::/56,example.com is now valid.
  * Make domains generated by --synth-domain appear in replies
    when in authoritative mode.
  * Ensure CAP_NET_ADMIN capability is available when conntrack
    is configured.
  * When --dhcp-hostsfile --dhcp-optsfile and --addn-hosts are

OBS-URL: https://build.opensuse.org/request/show/921143
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=83
2021-09-26 19:48:37 +00:00
Reinhard Max
f4508ec1d0 OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=141 2021-09-23 12:06:42 +00:00
Reinhard Max
029f71cf1d OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=140 2021-09-23 12:02:11 +00:00
Reinhard Max
0c6831c53a OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=139 2021-09-23 09:22:08 +00:00
Reinhard Max
bcf4390ff2 - SLE bugs that got fixed upstream between 2.79 and 2.86, but for
which we need to keep references when syncing Factory to SLE:
  * bsc#1176076: dnsmasq-servfail.patch
  * bsc#1156543: dnsmasq-siocgstamp.patch
  * bsc#1138743: dnsmasq-cache-size.patch
  * bsc#1076958: CVE-2017-15107, dnsmasq-CVE-2017-15107.patch

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=138
2021-09-23 08:59:05 +00:00
Reinhard Max
049fbc620b - Update to 2.86:
* Handle DHCPREBIND requests in the DHCPv6 server code.
  * Fix bug which caused dnsmasq to lose track of processes forked
    to handle TCP DNS connections under heavy load.
  * Major rewrite of the DNS server and domain handling code. This
    should be largely transparent, but it drastically improves
    performance and reduces memory foot-print when configuring
    large numbers of domains.
  * Revise resource handling for number of concurrent DNS queries.
  * Improve efficiency of DNSSEC.
  * Connection track mark based DNS query filtering.
  * Allow smaller than 64 prefix lengths in synth-domain, with
    caveats.
    --synth-domain=1234:4567::/56,example.com is now valid.
  * Make domains generated by --synth-domain appear in replies
    when in authoritative mode.
  * Ensure CAP_NET_ADMIN capability is available when conntrack
    is configured.
  * When --dhcp-hostsfile --dhcp-optsfile and --addn-hosts are
    given a directory as argument, define the order in which files
    within that directory are read (alphabetical order of filename).
- Added hardening to systemd service(s) (bsc#1181400).

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=137
2021-09-17 11:27:06 +00:00
Reinhard Max
dc54688f33 Accepting request 918936 from home:jsegitz:branches:systemdhardening:network
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/918936
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=136
2021-09-17 09:40:15 +00:00
Dominique Leuenberger
36392b1f56 Accepting request 904175 from network
OBS-URL: https://build.opensuse.org/request/show/904175
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=82
2021-07-07 16:29:47 +00:00
Reinhard Max
253903d350 Accepting request 899810 from home:gmbr3:Active
- Add now working CONFIG parameter to sysusers generator

OBS-URL: https://build.opensuse.org/request/show/899810
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=135
2021-07-05 13:31:21 +00:00
Reinhard Max
05adc3fbcf Accepting request 896893 from home:gmbr3:Active
- Change to using systemd-sysusers on TW

OBS-URL: https://build.opensuse.org/request/show/896893
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=134
2021-06-07 10:59:49 +00:00
Dominique Leuenberger
42d55dff3c Accepting request 888631 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/888631
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=81
2021-04-28 23:36:38 +00:00
Reinhard Max
755bed9cef - Update to 2.85:
* Fix problem with DNS retries in 2.83/2.84.
  * Tweak sort order of tags in get-version.
  * Avoid treating a --dhcp-host which has an IPv6 address as
    eligible for use with DHCPv4 on the grounds that it has
    no address, and vice-versa.
  * Add --dynamic-host option: A and AAAA records which take their
    network part from the network of a local interface. Useful
    for routers with dynamically prefixes.
  * Teach --bogus-nxdomain and --ignore-address to take an IPv4
    subnet.
  * CVE-2021-3448, bsc#1183709: Use random source ports where
    possible if source addresses/interfaces in use.
  * Change the method of allocation of random source ports for DNS.
  * Scale the size of the DNS random-port pool based on the
    value of the --dns-forward-max configuration.
  * Tweak TFTP code to check sender of all received packets, as
    specified in RFC 1350 para 4.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=132
2021-04-19 21:50:31 +00:00
Reinhard Max
822e2ef139 Fix URLs.
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=131
2021-04-19 20:45:47 +00:00
Reinhard Max
6b64faead0 Accepting request 870366 from home:dirkmueller:branches:network
- update to 2.84:
  * Change HAVE_NETTLEHASH compile-time to HAVE_CRYPTOHASH
  * Tidy initialisation in hash_questions.c
  * Optimise sort_rrset for the case where the RR type
  * Move fd into frec_src

OBS-URL: https://build.opensuse.org/request/show/870366
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=130
2021-02-09 07:35:03 +00:00
Dominique Leuenberger
119b64113a Accepting request 867893 from network
OBS-URL: https://build.opensuse.org/request/show/867893
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=80
2021-02-04 19:23:46 +00:00
5761a19f0e Accepting request 867249 from home:gmbr3:Lua
- Fix building with lua54

OBS-URL: https://build.opensuse.org/request/show/867249
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=128
2021-01-30 08:06:09 +00:00
Dominique Leuenberger
e7d4817578 Accepting request 864301 from network
- Update to 2.83:
  * bsc#1177077: Fixed DNSpooq vulnerabilities
  * Use the values of --min-port and --max-port in outgoing
    TCP connections to upstream DNS servers.
  * Fix a remote buffer overflow problem in the DNSSEC code.
    Any dnsmasq with DNSSEC compiled in and enabled is vulnerable
    to this, referenced by CVE-2020-25681, CVE-2020-25682,
    CVE-2020-25683 CVE-2020-25687.
  * Be sure to only accept UDP DNS query replies at the address
    from which the query was originated. This keeps as much
    entropy in the {query-ID, random-port} tuple as possible, to
    help defeat cache poisoning attacks. Refer: CVE-2020-25684.
  * Use the SHA-256 hash function to verify that DNS answers
    received are for the questions originally asked. This replaces
    the slightly insecure SHA-1 (when compiled with DNSSEC) or
    the very insecure CRC32 (otherwise). Refer: CVE-2020-25685
  * Handle multiple identical near simultaneous DNS queries better.
    Previously, such queries would all be forwarded independently.
    This is, in theory, inefficent but in practise not a problem,
    _except_ that is means that an answer for any of the forwarded
    queries will be accepted and cached.
    An attacker can send a query multiple times, and for each
    repeat, another {port, ID} becomes capable of accepting the
    answer he is sending in the blind, to random IDs and ports.
    The chance of a succesful attack is therefore multiplied by the
    number of repeats of the query. The new behaviour detects
    repeated queries and merely stores the clients sending repeats
    so that when the first query completes, the answer can be sent
    to all the clients who asked. Refer: CVE-2020-25686.

OBS-URL: https://build.opensuse.org/request/show/864301
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=79
2021-01-20 17:23:34 +00:00
Reinhard Max
f38fa3d41b - Update to 2.83:
* bsc#1177077: Fixed DNSpooq vulnerabilities
  * Use the values of --min-port and --max-port in outgoing
    TCP connections to upstream DNS servers.
  * Fix a remote buffer overflow problem in the DNSSEC code.
    Any dnsmasq with DNSSEC compiled in and enabled is vulnerable
    to this, referenced by CVE-2020-25681, CVE-2020-25682,
    CVE-2020-25683 CVE-2020-25687.
  * Be sure to only accept UDP DNS query replies at the address
    from which the query was originated. This keeps as much
    entropy in the {query-ID, random-port} tuple as possible, to
    help defeat cache poisoning attacks. Refer: CVE-2020-25684.
  * Use the SHA-256 hash function to verify that DNS answers
    received are for the questions originally asked. This replaces
    the slightly insecure SHA-1 (when compiled with DNSSEC) or
    the very insecure CRC32 (otherwise). Refer: CVE-2020-25685
  * Handle multiple identical near simultaneous DNS queries better.
    Previously, such queries would all be forwarded independently.
    This is, in theory, inefficent but in practise not a problem,
    _except_ that is means that an answer for any of the forwarded
    queries will be accepted and cached.
    An attacker can send a query multiple times, and for each
    repeat, another {port, ID} becomes capable of accepting the
    answer he is sending in the blind, to random IDs and ports.
    The chance of a succesful attack is therefore multiplied by the
    number of repeats of the query. The new behaviour detects
    repeated queries and merely stores the clients sending repeats
    so that when the first query completes, the answer can be sent
    to all the clients who asked. Refer: CVE-2020-25686.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=126
2021-01-19 12:32:14 +00:00
Dominique Leuenberger
de12c31418 Accepting request 823748 from network
OBS-URL: https://build.opensuse.org/request/show/823748
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=78
2020-08-03 12:13:03 +00:00
Reinhard Max
be2d2498af Accepting request 823079 from home:mrey:branches:network
- Update to 2.82:
  * Improve behaviour in the face of network interfaces which come
    and go and change index.
  * Convert hard startup failure on NETLINK_NO_ENOBUFS under
    qemu-user to a warning.
  * Allow IPv6 addresses ofthe form [::ffff:1.2.3.4] in
    --dhcp-option.
  * Fix crash under heavy TCP connection load introduced in 2.81.
  * Change default lease time for DHCPv6 to one day.
  * Alter calculation of preferred and valid times in router
    advertisements, so that these do not have a floor applied of
    the lease time in the dhcp-range if this is not explicitly
    specified and is merely the default.
- Reformat spec file with spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/823079
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=124
2020-07-31 14:11:53 +00:00
Dominique Leuenberger
f2c36e7dad Accepting request 807964 from network
OBS-URL: https://build.opensuse.org/request/show/807964
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=77
2020-06-04 15:49:02 +00:00
067293717f Accepting request 800348 from home:polslinux:branches:network
- Update to 2.81:
  *	Improve cache behaviour for TCP connections
  *	Remove the NO_FORK compile-time option, and support for uclinux
  *	Fix line-counting when reading /etc/hosts and friends
  *	Fix bug in DNS non-terminal code, added in 2.80, which could
	sometimes cause a NODATA rather than an NXDOMAIN reply.
  *	Support TCP-fastopen (RFC-7413) on both incoming and
	outgoing TCP connections, if supported and enabled in the OS.
  *	Improve kernel-capability manipulation code under Linux
  *	Add --shared-network config. This enables allocation of addresses
	by the DHCP server in subnets where the server (or relay) does not
	have an interface on the network in that subnet. Many thanks to
	kamp.de for sponsoring this feature.
  *	Fix broken contrib/lease_tools/dhcp_lease_time.c. A packet
	validation check got borked in commit 2b38e382 and release 2.80.
	Thanks to Tomasz Szajner for spotting this.
  *	Fix compilation against nettle version 3.5 and later.
  *	Fix spurious DNSSEC validation failures when the auth section
	of a reply contains unsigned RRs from a signed zone,
	with the exception that NSEC and NSEC3 RRs must always be signed.
        Thanks to Tore Anderson for spotting and diagnosing the bug.
  *	Add --dhcp-ignore-clid. This disables reading of DHCP client
	identifier option (option 61), so clients are only identified by
	MAC addresses.
  *	Fix a bug which stopped --dhcp-name-match from working when a hostname
	is supplied in --dhcp-host. Thanks to James Feeney for spotting this.
  *	Fix bug which caused very rarely caused zero-length DHCPv6 packets.
	Thanks to Dereck Higgins for spotting this.
  *	Add --tftp-single-port option.
  *	Enhance --conf-dir to load files in a deterministic order
  * Add filtering by tag of --dhcp-host directives
  * Remove DSA signature verification from DNSSEC, as specified in
	RFC 8624
  *	Add --script-on-renewal option.
- Remove Fix-build-with-libnettle-3.5.patch
- Remove 0001-fix-build-after-y2038-changes-in-glibc.patch
- Remove dnsmasq-CVE-2019-14834.patch

OBS-URL: https://build.opensuse.org/request/show/800348
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=122
2020-05-21 11:02:08 +00:00
Dominique Leuenberger
558e4ff507 Accepting request 752812 from network
OBS-URL: https://build.opensuse.org/request/show/752812
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=76
2019-12-07 14:11:48 +00:00
Tomáš Chvátal
717dcedc03 Accepting request 752568 from home:dimstar:Factory
- Remove redundant %else without meaning (if/else/else/endif?)


Fixes build with rpm 4.15,
see https://build.opensuse.org/package/live_build_log/openSUSE:Factory:Staging:N/dnsmasq/standard/x86_64

OBS-URL: https://build.opensuse.org/request/show/752568
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=120
2019-12-02 07:41:02 +00:00
Dominique Leuenberger
bd280d0c79 Accepting request 748378 from network
- bsc#1154849, CVE-2019-14834, dnsmasq-CVE-2019-14834.patch:
  memory leak in the create_helper() function in /src/helper.c
- bsc#1143454: Require user(tftp) instead of creating it ourselves.
- Package contrib/lease-tools/dhcp_release6.
- bsc#1152539: include config files from /etc/dnsmasq.d/*.conf .

OBS-URL: https://build.opensuse.org/request/show/748378
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=75
2019-11-20 12:42:47 +00:00
Reinhard Max
6ce28c3b4b OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=118 2019-11-13 14:29:51 +00:00
Reinhard Max
0ed13f31d4 OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=117 2019-11-13 14:15:14 +00:00
Reinhard Max
5fa347475a OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=116 2019-11-13 11:21:17 +00:00
Dominique Leuenberger
d4db467b75 Accepting request 728482 from network
OBS-URL: https://build.opensuse.org/request/show/728482
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=74
2019-09-11 08:21:32 +00:00
ccc8eeefa0 Accepting request 728337 from home:StefanBruens:branches:openSUSE:Factory
Fix build with libnettle 3.5, unbreak Staging:L

OBS-URL: https://build.opensuse.org/request/show/728337
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=114
2019-09-05 11:34:19 +00:00
Dominique Leuenberger
519adea1a1 Accepting request 718597 from network
OBS-URL: https://build.opensuse.org/request/show/718597
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=73
2019-07-31 12:14:17 +00:00
3edd2e1ad9 Accepting request 717919 from home:mgerstner:branches:network
- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

OBS-URL: https://build.opensuse.org/request/show/717919
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=112
2019-07-25 17:07:06 +00:00
Dominique Leuenberger
e6a98bbf25 Accepting request 714386 from network
OBS-URL: https://build.opensuse.org/request/show/714386
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=72
2019-07-22 10:17:32 +00:00
Tomáš Chvátal
9c019eebb6 Accepting request 714370 from home:jirislaby:branches:network
- add 0001-fix-build-after-y2038-changes-in-glibc.patch

OBS-URL: https://build.opensuse.org/request/show/714370
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=110
2019-07-10 07:24:12 +00:00
Dominique Leuenberger
31f9b22cb9 Accepting request 709322 from network
OBS-URL: https://build.opensuse.org/request/show/709322
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=71
2019-06-26 14:00:08 +00:00
Tomáš Chvátal
8f7f833592 Accepting request 709153 from home:dimstar:Factory
Allow OBS to pick better candidates to shorten rebuild queues

OBS-URL: https://build.opensuse.org/request/show/709153
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=108
2019-06-12 06:05:10 +00:00
Stephan Kulow
5775d74cdf Accepting request 678217 from network
OBS-URL: https://build.opensuse.org/request/show/678217
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=70
2019-02-28 20:24:22 +00:00
Tomáš Chvátal
deb329e226 Accepting request 678164 from home:fbui:branches:network
- Drop use of $FIRST_ARG in .spec
  The use of $FIRST_ARG was probably required because of the
  %service_* rpm macros were playing tricks with the shell positional
  parameters. This is bad practice and error prones so let's assume
  that no macros should do that anymore and hence it's safe to assume
  that positional parameters remains unchanged after any rpm macro
  call.

OBS-URL: https://build.opensuse.org/request/show/678164
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=106
2019-02-22 10:44:04 +00:00
Dominique Leuenberger
ce51e100ef Accepting request 668717 from network
OBS-URL: https://build.opensuse.org/request/show/668717
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=69
2019-01-26 21:21:24 +00:00
500c355c40 Accepting request 668710 from home:eeich:branches:network
- enabled lua scripting interface (FATE#327143).

OBS-URL: https://build.opensuse.org/request/show/668710
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=104
2019-01-25 17:29:11 +00:00
Tomáš Chvátal
943aafc77b Accepting request 668197 from home:elvigia:branches:network
- libidn should not be used anymore, switch to libidn2

OBS-URL: https://build.opensuse.org/request/show/668197
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=103
2019-01-24 08:33:18 +00:00