--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2023-410191adcb
2023-01-30 00:34:55.234400
--------------------------------------------------------------------------------
Name : bgpq4
Product : Fedora EPEL 9
Version : 1.8
Release : 1.el9
URL :
https://github.com/bgp/bgpq4
Summary : Automate BGP filter generation based on routing database information
Description :
The bgpq4 utility can be used to generate BGP filter configurations
such as prefix lists, (extended) access lists, policy statement terms
and AS path lists based on routing database information and supports
output formats for BIRD, Cisco, Huawei, Juniper, MikroTik, Nokia and
OpenBGPD routers as well as generic JSON.
--------------------------------------------------------------------------------
Update Information:
# bgpq4 1.8 - Downgrade 'key not found' to DEBUG level to reduce noise -
Re-introduce `-p` for private ASN support option
--------------------------------------------------------------------------------
ChangeLog:
* Sat Jan 21 2023 Robert Scheck <robert(a)fedoraproject.org> 1.8-1
- Upgrade to 1.8 (#2162768)
* Wed Jan 18 2023 Fedora Release Engineering <releng(a)fedoraproject.org> - 1.7-2
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2162768 - bgpq4-1.8 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2162768
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update bgpq4' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------