Link [ pkgsrc | NetBSD | pkgsrc git mirror | PR fulltext-search | netbsd commit viewer ]


   
        usage: [branch:branch] [user:user] [path[@revision]] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN pkgtools/pkg)




switch to index mode

recent branches: MAIN (40m)  pkgsrc-2024Q1 (14d)  pkgsrc-2023Q4 (41d)  pkgsrc-2023Q2 (74d)  pkgsrc-2023Q3 (153d) 

2024-05-12 13:23:02 UTC Now

2020-09-13 15:09:00 UTC MAIN commitmail json YAML

py-mercurial: restore checksums lost in previous

Thanks, leo@, for noticing!

(wiz)

2020-09-13 15:08:09 UTC MAIN commitmail json YAML

doc: Updated databases/ruby-moneta to 1.4.0

(taca)

2020-09-13 15:07:38 UTC MAIN commitmail json YAML

databases/ruby-moneta: update to 1.4.0

Update ruby-moneta to 1.4.0.

1.4.0 (2020-08-23)

* Adapters::Mongo - drop support for moped gem (#182)
* Adapters::Redis - use #exists? where available (#189)
* Some reorganisation of code into more separate files (#177)

(taca)

2020-09-13 15:05:44 UTC MAIN commitmail json YAML

doc: Updated databases/ruby-activeldap to 6.0.3

(taca)

2020-09-13 15:05:13 UTC MAIN commitmail json YAML

databases/ruby-activeldap: update to 6.0.3

Update ruby-activeldap to 6.0.3.

## 6.0.3: 2020-08-17 {#release-6-0-3}

### Improvements

  * Added support for `save(validate: false)`.
    [GitHub#180][Reported by Kevin McCormack]

  * jndi: Added support for follow referrals.
    [GitHub#182][Patch by Kevin McCormack]

### Fixes

  * Fixed a bug that sub base is ignored in DN specified by `new`.
    [GitHub#185][Reported by Kevin McCormack]

### Thanks

  * Kevin McCormack

(taca)

2020-09-13 15:02:05 UTC MAIN commitmail json YAML

doc: Updated archivers/ruby-mixlib-archive to 1.0.7

(taca)

2020-09-13 15:01:40 UTC MAIN commitmail json YAML

archivers/ruby-mixlib-archive: update to 1.0.7

Update ruby-mixlib-archive to 1.0.7.

1.0.7 (2020-08-21)

* Optimize our requires #53 (tas50)

1.0.6 (2020-08-13)

* Optimize requires for non-omnibus installs #52 (tas50)

(taca)

2020-09-13 14:58:51 UTC MAIN commitmail json YAML

doc: Updated archivers/ruby-ffi-libarchive to 1.0.4

(taca)

2020-09-13 14:58:20 UTC MAIN commitmail json YAML

archivers/ruby-ffi-libarchive: update to 1.0.4

Update ruby-ffi-libarchive to 1.0.4.

v1.0.4 (2020-08-13)

* Optimize requires for non-omnibus installs #34 (tas50)

(taca)

2020-09-13 14:57:32 UTC MAIN commitmail json YAML

doc: Updated misc/ruby-bundler1 to 1.17.3nb2

(taca)

2020-09-13 14:57:05 UTC MAIN commitmail json YAML

misc/ruby-bundler1: apply security fix

Apply patch for CVE-2019-3881.

Bump PKGREVISION.

(taca)

2020-09-13 14:55:53 UTC MAIN commitmail json YAML

doc: Updated www/ruby-rails60 to 6.0.3.3nb1

(taca)

2020-09-13 14:55:24 UTC MAIN commitmail json YAML

www/ruby-rails60: fix dependency

* There is no need to stay on misc/ruby-bundler1 and switch to
  depends on misc/ruby-bundler.

Bump PKGREVISION

(taca)

2020-09-13 14:53:11 UTC MAIN commitmail json YAML

doc: Updated www/ruby-rails52 to 5.2.4.4nb1

(taca)

2020-09-13 14:52:32 UTC MAIN commitmail json YAML

www/ruby-rails52: fix dependency

* Fix dependency to to ruby-bundler, "RUBY_VER < 26" instead of
  "RUBY_VER != 26".
* There is no need to stay on misc/ruby-bundler1 and switch to
  depends on misc/ruby-bundler.

Bump PKGREVISION

(taca)

2020-09-13 14:28:52 UTC MAIN commitmail json YAML

doc: Updated lang/nqp to 2020.08.2

(mef)

2020-09-13 14:28:35 UTC MAIN commitmail json YAML

(lang/nqp) Updated 2020.5 to 2020.08.2 ChangeLog not summarized, again (right)?

(mef)

2020-09-13 14:17:04 UTC MAIN commitmail json YAML

doc: Updated fonts/ghostscript-cidfonts-ryumin to 9.53.0

(leot)

2020-09-13 14:16:53 UTC MAIN commitmail json YAML

doc: Updated print/ghostscript-agpl to 9.53.0

(leot)

2020-09-13 14:16:31 UTC MAIN commitmail json YAML

ghostscript-agpl: Update to 9.53.0

pkgsrc changes (for fonts/ghostscript-cidfonts-ryumin):
- Add SUBST_NOOP_OK.ttf_path, at least for the default `cidfmap-adobe' that's a
  noop

Changes:
9.53.0
======
Highlights in this release include:

- The 9.53.0 release is primarily maintenance.
- The most obvious change is the (re-)introduction of the patch level to the
  version number, this helps facilitate a revised policy on handling security
  related issues.
- Our efforts in code hygiene and maintainability continue.
- We have added the capability to build with the Tesseract OCR engine. In
  such a build, new devices are available (pdfocr8/pdfocr24/pdfocr32) which
  render the output file to an image, OCR that image, and output the image
  "wrapped" up as a PDF file, with the OCR generated text information
  included as "invisible" text (in PDF terms, text rendering mode 3).
  Due to some patches to the Tesseract sources that are required (integrated
  upstream, but awaiting release), time constraints, and the experimental
  nature of the feature, we only support including Tesseract from source, not
  linking to Tesseract shared libraries. Whether we add this capability will
  be largely dependant on community demand for the feature.
- We have added Python bindings for the gsapi interface, can be found in
  demos/python. These are experimental, and we welcome feedback from
  interested developers.
- For those integrating Ghostscript/GhostPDL via the gsapi interface, we have
  added new capabilities to that, specifically in terms of setting and
  interrogating device parameters. These, along with the existing interface
  calls, are documented in: Ghostscript Interpreter API
- IMPORTANT: In consultation with a representative of (OpenPrinting) it is
  our intention to deprecate and, in the not distant future, remove the
  OpenPrinting Vector/Raster Printer Drivers (that is, the opvp and oprp
  devices).
  If you rely on either of these devices, please get in touch with us, so we
  can discuss your use case, and revise our plans accordingly.
- IMPORTANT: We have forked LittleCMS2 into LittleCMS2mt (the "mt" indicating
  "multi-thread"). LCMS2 is not thread safe and cannot be made thread safe
  without breaking the ABI. Our fork will be thread safe and include
  performance enhancements (these changes have all be been offered and
  rejected upstream). We will maintain compatibility between Ghostscript and
  LCMS2 for a time, but not in perpetuity. If there is sufficient interest,
  our fork will be available as its own package separately from Ghostscript
  (and MuPDF).
- The usual round of bug fixes, compatibility changes, and incremental
  improvements.

(leot)

2020-09-13 14:08:50 UTC MAIN commitmail json YAML

doc: Updated devel/MoarVM to 2020.08

(mef)

2020-09-13 14:08:35 UTC MAIN commitmail json YAML

(devel/MoarVM) Updated 2020.05 to 2020.08

New in 2020.08

Core:
+ [c0ed9e32] Make extop marks reachable again in MVM_op_get_mark

Debug Server:
+ [b78b523d][2a9f0f06] Implement `FindMethod` op and add a `name` field for it
+ [7a2881a8] Implement simplest case of `decont` op
+ [f6f12f5a] Fix compiler warnings

GC:
+ [da237717] Move MVM_malloc_trim call after MVM_gc_collect_free_gen2_unmarked call

Strings:
+ [393ae579] Fix case insensitive string matching with an empty string

Tooling/Build:
+ [6d5a3b02] Make `Configure.pl` executable again
+ [1f182b48] Add new `Configure.pl` flag `--dtrace` which allows to put DTrace points in the code

New in 2020.07

6model:
+ [32ce5f97] Constant-fold spesh-time-known unbox/decont_n/s

Core:
+ [44504309,8e75378f,1d52655e,d564695f] Introduce the setthreadname op

Debug Server:
+ [707f6ce7,12780324] Debugserver Protocol 1.2: add thread "name" field

GC:
+ [06d8cdd1] Fix compiler warning in GC debug code

JIT:
+ [19374884] Add JIT templates for return_(i|n|s)

Other:
+ [a4cb0c51,2a3290df,183becd2,0a0a9ba9,953bac6c] Give io loop thread and spesh thread a name

Spesh:
+ [9a9ca434] Propagate facts in set elimination in one more case
+ [af5b89b6] Give known type flag when turning return to box in inline

Unicode:
+ [e5d597d1] Eliminate $annotate_anyway, which is no longer used
+ [1d00a2b5] Don't add placeholders such as "<control>" to the Unicode names lookup hash
+ [07dbc19a] Don't change the name to NULL (occasionally, if it starts with '<')
+ [0369f512] Unwrap the generated codepoint_names to one entry per line
+ [cfe6ed8f] Consistent whitespace for the initialiser for codepoint_bitfield_indexes
+ [23dfde97] Fix building on older compilers by explicitly stating gnu99 usage
+ [67c8413f] Fix ucd2c.pl script error propagation

Tooling/Build:
+ [0c651c23] Fix downloading of Unicode data

New in 2020.06

6model:
+ [e4ff69495] Setup inlined CStruct assigned during construction
+ [57c8bb84e] Fix CStruct handling of inlined attributes
+ [55ee90b17][a5061624d] Add MVM_HASH_(BIND|GET)_FREE macros
+ [3149bbb4f] find_repr_by_name now holds mutex_repr_registry when reading repr_hash
+ [c70587551] Where possible, iterate over lexical_names_list instead of lexical_names
+ [290f518af] Free REPR data before throws and where appropriate, set `st->REPR_data` to NULL
+ [7a799da87] Copy lexical_names_list when copying a StaticFrame
+ [2922f3d1a] mutex_container_registry is held while reading from container_registry
+ [3fe584876] Use correct encoding for deserializing strings
+ [4d0da364d] Wrap all access to lexical_names with MVM_get_lexical_by_name
+ [3658e4cd1] Don't make a lookup hash for lexical names for frames with few lexicals

Core:
+ [de8955822] Fix segfault in bytecode dumper when local_types is NULL
+ [72f720788] Move check (return value+exit handler) earlier
+ [c1c25e33f] Remove the unused `tc` parameter of cleanup_all
+ [17969cfb5] Remove redundant if when reading bytecode
+ [396c90039] Don't obliterate lib_name in exception text of NativeCall
+ [9e12424fb] Show index of outer lexials in bytecode dump instead of ??
+ [520c35124] Allow for explicitly marking the mainline_frame in the bytecode
+ [5d98d8eb6] Remove name assignment in struct MVMDLLRegistry

GC:
+ [1a46b0ae7] Possibly fix MVM_panic from entering GC during spesh

IO:
+ [ee8f3af70] Always handle proc exec arguments verbatim on Windows
+ [780271899] Fix reading closed dir handles on Windows
+ [157387214] Fix closing a dir never read from on Windows

JIT:
+ [7f33af885] JIT atpos/bindpos for known i64 array
+ [680a8cc72] Remove prof_enter JIT template
+ [9b60b37ca] JIT getcurhllsym and gethllsym

Libraries:
+ [6ab7dab5f] Backport a change in libtommath to fix build on x86 Windows
+ [a4b195936] Update libuv to version 1.38.0

Other:
+ [8eb552323] Fix some possible double frees
+ [565e55ce1] Fix the order of some MVM_calloc arguments
+ [3f6e6582e] Convert MVM_free+NULL to MVM_free_null
+ [f47e6ee5a][6cf18281d][c1c25e33f][8cd9ca87c][e736c1fb8]
  Free memory that had been allocated before a throw
+ [aeec50e0a] Simplify counting of lexical_names
+ [1bad1eff6] Simplify some MVM_string_ascii_encode calls
+ [9c758d5eb] Fix duplication of lists when MAST::Frames get written to bytecode multiple times
+ [a7f988940] Add methods WHICH and raku to MAST::Frame for easier debugging
+ [995c70ca8] Allow for MAST::CompUnit to share its lists with an outer compilation
+ [6c7ee4e8f] Add a method for clearing a cached index on a MAST::Frame
+ [c177e85cc] Remove two unused variables

Profiler:
+ [a48790029] Use FSA for alloc and dealloc counts
+ [2041902da] Remove a major source of space waste from alloc counts growth
+ [269d307a8] Add a layer of indirection between call graph and types/sf
+ [03c9154e8] Remove commented out profiler code

Spesh:
+ [9b60b37ca][af1475ec1] Spesh getcurhllsym and gethllsym
+ [12c7a44a8] Simplify MVMLexicalRegistry code

Tooling/Build:
+ [fc7922e5e][42a2424ba][eacb89a27][631008c61][932f5c208][b8506d45a]
  [ac94564c7][a99ab1e4f][852576e7d] Add an AzureCI test setup
+ [bc904b8bd][0257ecac4][0dc625f18]
  Add a new GCC plugin to find cases where an MVM_exception_throw_adhoc is possibly missing a free
+ [20a2a9114] Introduce UV_BSD to avoid duplication in Makefile
+ [06f041fb0][eafa7b39185a29f50271120b105d7087709f75f7] Fix build an FreeBSD
+ [fc092556b] Fix broken builds on older versions of GCC

(mef)

2020-09-13 14:04:10 UTC MAIN commitmail json YAML

doc: Updated lang/nqp to 2020.05

(mef)

2020-09-13 14:03:58 UTC MAIN commitmail json YAML

(lang/nqp) Updated 2020.1 to 2020.05. ChangeLog not summarized, I'm afraid, sorry

(mef)

2020-09-13 13:53:57 UTC MAIN commitmail json YAML

doc: Updated devel/MoarVM to 2020.05

(mef)

2020-09-13 13:53:24 UTC MAIN commitmail json YAML

(devel/MoarVM) Updated 2020.02.1 to 2020.05

New in 2020.05

+ [c59514234] Use the FSA for ConcBlockingQueue
+ [9294cbfcf] Use memcpy instead of strncpy
+ [bbb0cdbed,f03b23c63,12d572bb5,5863b0235] Fix some compiler warnings
+ [60a1a287e] Document cases where we know that no GC issues can appear
+ [070d0e66a] No longer MVMROOT MVMCompUnits as they are always allocated in gen2
+ [49ac793da,ad70770e1,e9baae8dc,a95e5ac32,845e8a3f1,a5e1fdd99,
  651dc59de,8a7e56d9c,51ab0cb2f,c48e40b5b,62dc6c7f7,a39b63c99,
  9b011b033,603831672,fd2742286,833339332,f9ca5cb05,f3cdc7575,
  863e4104f,c2cf2f25b,7c7867c67,dae0220b0,142257b16,c93aa0098]
  Fix numerous very rare but possible GC bugs
+ [4fbd2d0e2,57e798527,d4637c1a0,755309975,1fd9efae4,00def9fd9,
  3ecce8be8,20c4a4a24,24e9082dc,899fff969,8edc0b506]
  Add a proof of concept of a GCC plugin for detecting GC invariant violations
+ [ab089e947] Align offsets in P6opaque.c
+ 233609b52f] Fix some Clang compiler warnings in the profiler
+ [dcbdb571a] Fix SEGV in MVM_spesh_plugin_guard_list_mark
+ [bb27aeb11] Don't null-terminate string when stringifying int
+ [6546027a1] Improve handling of errors in native callbacks
+ [bceb3398a] Use smaller buffer for native int to str coercion
+ [ca6534d20] Fix deadlock when trying to report an unsupported NativeCall return type
+ [1aa555fe1] Fix segfault caused by freed comp unit strings when profiling
+ [dbed72d76,b6bba6945,54ca9090f] Improve memory usage of utf8-c8 encoding
+ [1c392b4e4,3758e9a82,5c9510c32] Make profiling more stable, resolving potential panics
+ [4dc99b55d] Add more ops to be profiled for allocations
+ [6975a6595] Fix bogus test
+ [e7fee00d1] Include system headers after headers local to MoarVM in the Makefile
+ [ec53e4dfc] Give MVMSpeshAnn an "order" field to improve diagnostic output
+ [05c290522,0ce4cbe94] Let encode take a preallocated buffer
+ [1bd5f19e0] Fix a tiny mistake in containers implementation
+ [6baf0de4a] Add a value_desc_cont container descriptor, which brings the needs of Rakudo's Scalar into the VM
+ [4fb85a017] Add missing break statement
+ [3438ad2a4,19a7154cf] Fix lego JIT implementation of takenextdispatcher
+ [24f663cf5] Free malloced data before leaving the function
+ [21fa394a8] Remove remnants of the old mast compiler to fix memory leak
+ [035eae193] Fix interned callsites getting leaked when fixing up inlines
+ [768e6c2f3] Fix invalid reads when freeing native callback cache
+ 282989882d] Fix a leak in JIT compiler
+ [92f1935d7] Fix potential segfault when failing to compile JIT code
+ [ada1cadaa] Fix a leak in the spesh thread
+ [ae71ac80d] Fix NativeCall leaking sym_name on cleanup
+ [c82ff9d73] Destroy vectors that were previously init'ed
+ [09b88efb0] Free some memory calloc'ed when making spesh plans
+ [48da6b291] Implement calculation of unmanaged size for CArray
+ [edb6f8726] Free compunits loaded from bytecode upon dealloc
+ [15e94eecb] Bounds check codepoint passed to chr
+ [a6bc2a2a6] Add missing args spesh coercion validation
+ [f2a52cf5d] Make OSR work in frames from invokewithcapture
+ [162b68b6b,b77aa1622] JIT nextdispatcherfor
+ [f47f53110] Update libuv to version 1.35.0
+ [9a706ba08,12a447318] Improve update-submodules.pl

(mef)

2020-09-13 13:31:01 UTC MAIN commitmail json YAML

p5-PerlMagick: match ImageMagick update

(wiz)

2020-09-13 13:29:48 UTC MAIN commitmail json YAML

doc: Updated graphics/p5-PerlMagick to 7.0.10.29

(wiz)

2020-09-13 13:29:34 UTC MAIN commitmail json YAML

doc: Updated graphics/ImageMagick to 7.0.10.29

(wiz)

2020-09-13 13:29:24 UTC MAIN commitmail json YAML

ImageMagick: update to 7.0.10.29.

2020-09-05  7.0.10-29  <quetzlzacatenango@image...>
  * Release ImageMagick version 7.0.10-29 GIT revision 17580:fc52fa0a9:20200905

2020-09-05  7.0.10-28  <quetzlzacatenango@image...>
  * Eliminate infinite loop for certain SVG styles (reference
    https://github.com/ImageMagick/ImageMagick6/issues/96).
  * Add version element to JSON file format (reference
    https://github.com/ImageMagick/ImageMagick6/issues/91).

2020-09-01  7.0.10-29 Dirk Lemstra <dirk@lem.....org>
  * Enabled support for AVIF encoding on Windows.
  * Clip path in 8bim profile is updated when the image is extended. (reference
    https://github.com/ImageMagick/ImageMagick/issues/2414)

(wiz)

2020-09-13 13:16:10 UTC MAIN commitmail json YAML

Add use of devel/libatomic on powerpc ports; fixes the build since
this platform doesn't have native 8-byte atomics.

(he)

2020-09-13 13:03:37 UTC MAIN commitmail json YAML

(lang/parrot) Change SUBST stage to pre-configure, by pkglint

(mef)

2020-09-13 12:59:25 UTC MAIN commitmail json YAML

(lang/parrot) Add SUBST To avoid work/.tools/bin/perl recorded in installation

(mef)

2020-09-13 11:12:57 UTC MAIN commitmail json YAML

doc: Updated graphics/jbig2dec to 0.19

(leot)

2020-09-13 11:12:45 UTC MAIN commitmail json YAML

jbig2dec: Update to 0.19

Changes:
0.19
----
* API change to use full 32 bit segment numbers, in accordance
  to the JBIG2 specification.
* Better handling of end of input data stream and and when
  encountering errors in the arithmetic decoder stream. This
  should improve many situations where jbig2dec appeared to
  run forever.
* Fix several bugs related to signedness or over-/underflow
  checks that were not robust.
* Bug fixes for issues reported by Coverity/OSS-fuzz.
* Add option to limit memory usage to command line tool.
* Update manpages, and command line tool usage.

(leot)

2020-09-13 11:05:10 UTC MAIN commitmail json YAML

doc: Updated devel/py-hg-evolve to 10.0.2

(wiz)

2020-09-13 11:05:01 UTC MAIN commitmail json YAML

py-hg-evolve: update to 10.0.2.

10.0.2 -- 2020-09-08
--------------------

  * py3: use '%d' for formatting revision numbers in stable range cache warning
    (issue6390)

  * split: correctly handle discard action after previously splitting changes
    into more than one commit

  * uncommit: fix situation where added file would be left in a wrong state

topic (0.19.2)

  * revset: when processing `topic(REVSET)`, no longer return changesets
    without topic from REVSET

(wiz)

2020-09-13 11:04:50 UTC MAIN commitmail json YAML

doc: Updated devel/py-mercurial to 5.5.1

(wiz)

2020-09-13 11:04:41 UTC MAIN commitmail json YAML

py-mercurial: update to 5.5.1.

Mercurial 5.5.1 (2020-09-1)

Regularly scheduled bug fix release.

1.1. bug fixes

    keepalive: Do not append _rbuf if _raw_readinto exists (issue6356)

(wiz)

2020-09-13 10:52:23 UTC MAIN commitmail json YAML

doc: Updated mail/thunderbird-l10n to 78.2.2

(ryoon)

2020-09-13 10:52:02 UTC MAIN commitmail json YAML

thunderbird-l10n: Update to 78.2.2

* Sync with mail/thunderbird-78.2.2.

(ryoon)

2020-09-13 10:51:43 UTC MAIN commitmail json YAML

doc: Updated mail/thunderbird to 78.2.2

(ryoon)

2020-09-13 10:51:03 UTC MAIN commitmail json YAML

thunderbird: Update to 78.2.2

* Runtime depend on chat/libotr.

Changelog:
What's New
new Drag and Drop reordering of recipient pills now supported

Changes
changed OpenPGP: Some signature states reported as "mismatch" now report "unknown"
changed Privacy policy now displayed in a tab when updated
changed Chat: Non-functional Twitter support removed

Fixes
fixed OpenPGP: Improvements to key importing when failures occur
fixed OpenPGP: Decryption did not work with certain HTTP proxy configurations
fixed OpenPGP: "Discover keys online" option did not work when searching for an email address
fixed Email filters reported failure when moving a message to original folder
fixed Message filters: Filters shown as enabled in configuration dialog were not always enabled
fixed vCard 2.1 attachments not handled properly
fixed Sending messages sometimes failed when recipients were in LDAP address book
fixed Non-functional help menu items removed
fixed Adding custom headers in the addressing widget (preference mail.compose.other.header) did not work
fixed Calendar: Event reminder details were unreadable
fixed Windows 10 high-contrast theme fixes
fixed More theme fixes and improvements

(ryoon)

2020-09-13 09:27:16 UTC MAIN commitmail json YAML

doc: Updated devel/orc to 0.4.32

(wiz)

2020-09-13 09:27:07 UTC MAIN commitmail json YAML

orc: update to 0.4.32.

0.4.32
======

  - Add support for JIT code generation in Universal Windows Platform apps
    (Nirbheek Chauhan, Seungha Yang)
  - Minor Meson build system fixes and improvements
    (Jan Alexander Steffens, Tim-Philipp M端ller)

(wiz)

2020-09-13 09:25:47 UTC MAIN commitmail json YAML

doc: Updated x11/libxkbcommon to 1.0.1

(wiz)

2020-09-13 09:25:38 UTC MAIN commitmail json YAML

libxkbcommon: update to 1.0.1.

libxkbcommon 1.0.1 - 2020-09-11
==================

- Fix the tool-option-parsing test failing.

- Remove requirement for pytest in the tool-option-parsing test.

- Make the table output of `xkbcli how-to-type` aligned.

- Some portability and test isolation fixes.

libxkbcommon 1.0.0 - 2020-09-05
==================

Note: this release is API and ABI compatible with previous releases -- the
major version bump is only an indication of stability.

- Add libxkbregistry as configure-time optional library. libxkbregistry is a C
  library that lists available XKB models, layouts and variants for a given
  ruleset. This is a separate library (libxkbregistry.so, pkgconfig file
  xkbregistry.pc) and aimed at tools that provide a listing of available
  keyboard layouts to the user. See the Documentation for details on the API.

  Contributed by Peter Hutterer <@who-t.net>.

- Better support custom user configuration:

    * Allow including XKB files from other paths.

      Previously, a 'symbols/us' file in path A would shadow the same file in
      path B. This is suboptimal, we rarely need to hide the system files - we
      care mostly about *extending* them. By continuing to check other lookup
      paths, we make it possible for a XDG_CONFIG_HOME/xkb/symbols/us file to
      have sections including those from /usr/share/X11/xkb/symbols/us.

      Note that this is not possible for rules files, which need to be manually
      controlled to get the right bits resolved.

    * Add /etc/xkb as extra lookup path for system data files.

      This completes the usual triplet of configuration locations available for
      most processes:
      - vendor-provided data files in /usr/share/X11/xkb
      - system-specific data files in /etc/xkb
      - user-specific data files in $XDG_CONFIG_HOME/xkb

      The default lookup order user, system, vendor, just like everything else
      that uses these conventions.

      For include directives in rules files, the '%E' resolves to that path.

    * Add a new section to the documentation for custom user configuration.

  Contributed by Peter Hutterer <@who-t.net>.

- Add an `xkbcli` command-line utility.

  This tool offers various subcommands for introspection and debugging.
  Currently the available subcommands are:

  list
    List available rules, models, layouts, variants and options

  interactive-wayland
    Interactive debugger for XKB keymaps for Wayland

  interactive-x11
    Interactive debugger for XKB keymaps for X11

  interactive-evdev
    Interactive debugger for XKB keymaps for evdev (Linux)

  compile-keymap
    Compile an XKB keymap

  how-to-type
    See separate entry below.

  See the manpages for usage information.

  Contributed by Peter Hutterer <@who-t.net>.

- Add `xkb_utf32_to_keysym()` to translate a Unicode codepoint to a keysym.
  When a special keysym (`XKB_KEY_` constant) for the codepoint exists, it is
  returned, otherwise the direct encoding is used, if permissible.

  Contributed by Jaroslaw Kubik <@froglogic.com>.

- Add `xkb_keymap_key_get_mods_for_level()` which retrieves sets of modifiers
  which produce a given shift level in a given key+layout.

  Contributed by Jaroslaw Kubik <@froglogic.com>.

- Add `xkbcli how-to-type` command, which, using `xkb_utf32_to_keysym()`
  and `xkb_keymap_key_get_mods_for_level()` and other APIs, prints out all
  the ways to produce a given keysym.

  For example, how to type `?` (codepoint 63) in a us,de keymap?

    $ xkbcli how-to-type --layout us,de 63 | column -ts $'\t'
    keysym: question (0x3f)
    KEYCODE  KEY NAME  LAYOUT#  LAYOUT NAME  LEVEL#  MODIFIERS
    20      AE11      2        German        2      [ Shift ]
    20      AE11      2        German        2      [ Shift Lock ]
    61      AB10      1        English (US)  2      [ Shift ]

- Add a new section to the documentation describing the format of the XKB
  rules file.

- Search for Compose in $XDG_CONFIG_HOME/XCompose (fallback to
  ~/.config/XCompose) before trying $HOME/.XCompose.

  Note that libX11 still only searches in $HOME/.XCompose.

  Contributed by Emmanuel Gil Peyrot <@linkmauve.fr>.

- Bump meson requirement to >= 0.49.0.

- Fix build with byacc.

- Fix building X11 tests on PE targets.

  Contributed by Jon Turney <@dronecode.org.uk>

- The tests no longer rely on bash, only Python (which is already used by
  meson).

- New API:
  xkb_utf32_to_keysym
  xkb_keymap_key_get_mods_for_level
  XKB_KEY_XF86FullScreen

(wiz)

2020-09-13 09:23:06 UTC MAIN commitmail json YAML

doc: Updated security/libssh to 0.95

(wiz)

2020-09-13 09:22:57 UTC MAIN commitmail json YAML

libssh: update to 0.95.

version 0.9.5 (released 2020-XX-XX)
  * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)
  * Improve handling of library initialization (T222)
  * Fix parsing of subsecond times in SFTP (T219)
  * Make the documentation reproducible
  * Remove deprecated API usage in OpenSSL
  * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN
  * Define version in one place (T226)
  * Prevent invalid free when using different C runtimes than OpenSSL (T229)
  * Compatibility improvements to testsuite

(wiz)

2020-09-13 09:19:20 UTC MAIN commitmail json YAML

doc: Updated textproc/enchant2 to 2.2.11

(wiz)

2020-09-13 09:19:11 UTC MAIN commitmail json YAML

enchant2: update to 2.2.11.

2.2.11 (September 7, 2020)
--------------------------

Make enchant silently ignore -B flag, for better Emacs compatibility.

Make enchant_broker_list_dicts sort the tags, so that enchant-lsmod窶冱 output
is sorted.

Minor build system improvement: don窶冲 use -D_FORTIFY_SOURCE, which can cause
problems on Windows, and should be configured by the compiler vendor if
desired.

(wiz)

2020-09-13 09:13:54 UTC MAIN commitmail json YAML

doc: Updated net/p5-FusionInventory-Agent to 2.5

(wiz)

2020-09-13 09:13:46 UTC MAIN commitmail json YAML

p5-FusionInventory-Agent: update to 2.5.

2.5 Fri, 12 Apr 2019

core:
* linux: reload logger during daemonize to avoid issues like not listening http
  daemon if logger has still not been used before starting the listener
* Fix #646: HTTP daemon not starting on CentOS 7
* revert dfcb64573e as now more generic fix has been implemented in a538abaed7
  (tested on CentOS 6)
* win32: don't show service memory usage on OS not supporting GetProcessMemoryInfo
* Fix #601: Log URL for server target and log path for local target
* win32: add early stderr logging support for service
  Just rename "fusioninventory-win32-service.rc.sample" removing ".sample" part
  to enable this feature. This can be handy to investigate start service failures.
* Added support for HTTPD plugins
* Added Inventory HTTPD plugins to permit remote inventory request (disabled by default)
* Added Listener target to permit agent to only answer http requests
* Updated configuration to support HTTPD plugins dedicated configuration file
* Added fusioninventory-remoteinventory script to request agent with Inventory
  HTTPD plugin enabled
* Fix HTTPD local address reuse
* Added SSL HTTPD plugins to support SSL in any server plugins
* Limit the reload target check to 30 seconds
* win32: report memory usage as Working Set Size (WSS) and Page File Usage (PFU)
* win32: revert handling service with callbacks. Even if Win32::Daemon proposes
  the callbacks usage obsoletes the typical skeleton code, the callbacks usage
  is known to leak memory and tests with latest Win32::Daemon shows that's true.
* win32: handle task run in a managed thread as this is more efficient than using
  perl fork with thread emulation under win32 and preserve a little memory usage.
* win32: wait service control manager is ready before really starting the service
* logger: don't use File::stat module to just get logfile file size, better use -s
  as File::stat module seems to fail in rare case.

inventory:
* Bump Inventory task version to 1.7
* Fix lspci command subsystem parsing
* Fix hponcfg.exe can output on stderr on win32 when not really usable
* Skip not working under win32 Generic::Users inventory
  Also avoid error in log on /etc/passwd and /etc/group not found files
* Fix #601: Log deviceid as agentid and related target when running an inventory
* Fix #644: Make WORKGROUP inventory consistent
* Fix #541: Don't try to scan virtualbox VM in win32 users directories
* Updated pci.ids to 2019.04.12 version
* Updated usb.ids to 2019.03.20 version

netdiscovery/netinventory:
* Bump NetDiscovery task version to 2.9
* Bump NetInventory task version to 3.3
* Add Lancom in networking devices recognized by description parsing
* Fix #650: discard empty consumable level elements
* Fix #651: discard empty type element
* Add Netdisco export contrib script from Stoatwblr, see contrib/netdisco
* Fix #638: Fix Kyocera counters handling thanks to Stoatwblr
* Printers: assume -2 counter value means a WARNING level and report it
  Thanks Stoatwblr for the deep investigation
* Add Oki printer support
* Add APC serialnumber support
* Fix #612: Enhanced Ubnt AccessPoint support
* Updated sysobject.ids (tagged fia-2.5 tag on github repository)

deploy:
* Bump Deploy task version to 2.8
* Fix #394: Check file parts source/mirror url to guaranty it ends with a slash
  and trigger an error if it doesn't look like a valid URL.

collect:
* Bump Collect task version to 2.6
* WMI properties can now be a list of properties with comma or space as separator

2.4.3 Fri, 22 Feb 2019

core:
* fix some cases where a file handle was not closed
* win32: fix a handle leak case when agent was running as service
* Fix #637: Don't depend on GNU install during "make install" to support
  more Unix systems
* daemon/service: reload target when the stat file has been updated by
  another script to use the updated next run timeout
* For server target, server connection attempts are delayed from 60 seconds,
  doubled at each new failed attempt, now until reaching max defined by delaytime
  configuration parameter.

inventory:
* Bump Inventory task version to 1.6
* win32 antivirus support update:
- nicer product name report for ESET
- report expiration date for ESET
* Fix #582: Add other Acer monitors support
* Fix #687: Virtuozzo inventory task doesn't include first container
* Add few minor fix to virtuozzo containers inventory
* Fix LXC containers support to support recent LXC versions
* Fix #625: Container UUID is the same than host UUID
* Fix #624: Skip incomplete battery infos from dmidecode (seen on MacOS)
* Fix #631: Fix duplicated memory inventory on MacOS
* linux: fix storage size inventory
* linux: try to set storage serialnumber from mbr partition id or even
  PV UUID when not found (hdparm missing or virtual drive)
* Fix #604: Only inventory Windows Store on recent win32 platforms
* Fix #596: Openstack container seen as Physical on win32
* Fix #593: Correct detection of machine type when /var/log/dmesg is too short
* Fix #583: Add BitDefender antivirus support
* Encrypted filesystems support added
* Updated pci.ids to 2019.02.20 version
* Updated usb.ids to 2019.01.17 version

netdiscovery/netinventory:
* Bump NetDiscovery task version to 2.8
* Bump NetInventory task version to 3.2
* Add BlueCoat proxy appliance serialnumber support
* win32: Support arp table check for NetDiscovery task
* Fix #634: Net::Ping version may not numeric with win32 installer
* Add Panasas PanFS support
* Add few HP/Compaq serialnumber cases support
* Fix #605: try 'ip neighbor show' if 'arp' is not available for netdiscovery
* Add UPS-MIB support for Riello, S2S & APC
* Components support added
* Updated sysobject.ids (tagged fia-2.4.3 tag on github repository)

2.4.2 Wed, 03 Oct 2018

core:
* Linux: fix agent not listening on http port when syslog logger is active
  and Sys::Sylog module is too old

inventory:
* Bump Inventory task version to 1.5
* Fix physical memory error correction detection via WMI under win32
* Fix #299: Added UWP/APPX/Windows Store software inventory
* win32 antivirus detection enhanced support:
  - add support for few antivirus base versions (defender, kaspersky,
    EST, avira, MSE, McAfee, F-Secure)
  - try to set license expiration date for F-Secure, kaspersky & avira
* Fix #442: kaspersky not fully recognized in russia
* Fix #501: wrong status was reported when windows defender was disabled
* Enhanced software inventory under Arch Linux
* Fix #453: under MacOS, skip XML DTD validation for software inventory as
  parsing may fail if a proxy is enabled
* Fix #473: fix arch detection under MacOS
* Fix #475: fix video cards support under MacOS
* Fix #504: support non-standard ssh port to report local ssh server pubkey
* Updated pci.ids to 2018.10.02 version
* Updated usb.ids to 2018.08.15 version

deploy:
* Bump Deploy task version to 2.7
* Fix deployment of private packages: their downloaded parts were not
  fully found when download were too long (closes: #542)
* Handle retention duration differently for p2p and not p2p files
* P2p files have a default retention of 3 days by default
* P2p files have a default retention of 3 times the target prolog delay
  after download, parts retention is reset to the same delay for all file parts,
  so the retention duration applies at the time parts has been downloaded
* P2p file parts are now cleaned up after job success if retention duration
  is null
* Fix WinKeyNotEquals audit check to also be true when the registry key is
  simply missing
* Add support to "startjob" key for failing deploy audit check to permit
  to skip remaining checks when a failing condition makes them obsolete.

esx:
* Bump ESX task version to 2.4
* Support 2 ServiceTags case to cover chassis & lame board S/N inventory
* Updated AssetTag support
* fix wrong cpu core computation when only one package is available

netdiscovery/netinventory:
* Bump NetDiscovery task version to 2.7
* Bump NetInventory task version to 3.1
* Thanks to @QuickNerd357, Brocade devices will now show serial number and
  firmware informations.
* Sanitize VLAN names. This fixes an issue with Cisco Small Business Switches.
* Get rid of unofficial Net::Ping::TimeStamp support to only use official
  support if available. Net::Ping v2.67 is now mandatory to discover
  devices thanks to timestamp ping.
* Fix #481: Add Synology NAS support
* Fix #480: Add CheckPoint support
* Fix #488: Update HP Printers support
* Updated LLDP/CDP connection match checks
* Updated sysobject.ids (tagged fia-2.4.2 tag on github repository)

collect:
* Bump Collect task version to 2.5
* Thanks to David Durieux, add support for dynamic pattern in registry key
  collect under win32. The dynamic pattern is '**' to glob subkeys like in:
  HKEY_USERS/**/Software/**/**/CurrentVersion

maintenance:
* Bump Maintenance task version to 1.1
* Disable Maintenance task if no maintenance module could be used

test suite:
* Make snmp walk tests faster

2.4.1 Fri, 29 Jun 2018

core:
* Update setup & FusionInventory::Agent::Version modules during make install
* Can set FusionInventory::Agent::Version module VERSION & COMMMENTS during
  perl Makefile.PL configuration stage
* Normalized Target class APIs
* Register planned tasks at target level so target class can filter out
  unsupported tasks
* Add Scheduler target support to be used at the same time than Server target
  but more often to make maintenance other server target storage
* One scheduler target is created for each configured server target
* Scheduler target will trigger between one to 2 minutes
* Get rid of Time::Piece dependency

maintenance:
* New Maintenance v1.0 task
* Maintenance task handles quick server target storage cleanup to deploy
  packages are really removed afetr their expiration time
* Task only supported by Scheduler target

inventory:
* Fix BSD Storages support
* Don't try to run dmidecode inventories if it returns no output
* Set Bios && Hardware from /sys/class/dmi on recent Linux when dmidecode is missing
* Add PowerSupplies support
* Add BSD batteries support
* Add UUID to LXD containers under Linux
* Fix #439: Wrong network interface speed under win32
* Fix #472: On MacOS, add monitors serial number when available
* Fix #479: No virtual machine memory under Proxmox
* Fix #485: Fix df output parsing under MacOS
* Fix #500: Add Acer monitor EDID id match
* Better SQL Server software inventory under win32
* Update Xen Server support
* Fix get-edid command output parsing, thanks to David Durieux
* Updated pci.ids to 2018.06.29 version
* Updated usb.ids to 2018.05.04 version

netdiscovery/netinventory:
* Bump NetDiscovery task version to 2.6
* Bump NetInventory task version to 3.0
* fusioninventory-netdiscovery & fusioninventory-netinventory scripts
  now support '--port' and '--protocol' options for not standard snmp support.
* Fix RAM & CPU are missing from net inventory
* Fix MEMORY/RAM OID support
* Added support for HP Net Peripheral, involving better HP printers inventory
* Get Serial number & firmware version
* Fix total printed pages counter in many case
* Added total color pages counter support
* Don't assume colors table was read: fixes black toner detection on many HP printers
* Added Microtik devices support
* Enhanced Epson printers support, including model name, serial number and firmwares
* Updated LLDP support
* NetInventory task protocol upgrade to fix multithreading scheduling according to
  upgrades done server-side.
* Fix discovery of devices with only ping responding and without found hostname. In
  that case, we default the DNSHOSTNAME to the scanned ip.
* fix entity option in fusioninventory-netdiscovery script
* Get rid of nmap support for NetDiscovery task
* Add Zebra printer support
* Add QuesCom Appliance detection
* Add Linux Appliance template support
* Closes: #441,#519
* Update extmod function calls, thanks to Vadim Pisarev
* Add custom OID for Canon printer counters
* Updated sysobject.ids (tagged fia-2.4.1 tag on github repository)

deploy:
* Bump Deploy task version to 2.6
* Fix file retention support
* Add P2P peers caching to reduce peers discovery load in the meantime
* Reduced timeout for peer discovery and file parts downloading for P2P. This
  efficiently limits the time passed to discover the local peers and disqualify
  any busy or not responding peers in a more acceptable delay.
* For better P2P support, agent ajusts its 404 message to "Nothing found" when it
  has nothing to share with other agents. So peers won't ask again and again for
  any file part during 20 minutes by default.

2.4 Fri, 29 Dec 2017
core:
* Cleanup confdir use in task so using deprecated etc/softwares folder is no more
  logged in journal
* Get rid of confdir setup in setup.pm
* Added "include" directive support while reading configuration file to make
  configuration maintenance easy
* Update syslog name to fullname agent
* Get rid of List::Util & Proc::PID::File module dependencies
* Try to load more recent IDS database files if found in well-known places
* Fixed default daemon pid filename
* When --pidfile is used, don't permit to manually start daemon even in foreground
  unless --pidfile parameter is different
* Makes --pidfile filename optional to compute a default one
* Check if we need to include libdir while daemonize
* Class refactoring: Get rid of discouraged 'use base' syntax in favor of lighter
  'use parent' and as fields pragma is not used (see 'base' man)
* Logger refactoring: no more an Exporter based class to simplify its usage and
  as Logger object should be commonly shared everywhere it is used.
* Fix command run to also time out while an alarm has been set
* Fix WMI calls to also time out under win32
* Few code refactoring
* remove devtom30 from maintainers

inventory:
* Bump Inventory task version to 1.4
* Fixed Provider program name in agent context
* Fixed HyperV VM issue while BIOSGUID is not defined
* Fix #349: Include last logged user as usual computer user on win32 platform
* Linux distro: Add support for reading os-release file and removing LSB support
* Fix Solaris drives df output parsing adding better zfs handling
* Make backend-collect-timeout working even while waiting on command output
* Support ASM filesystems on Oracle Grid
* Introduce getDeviceId() API on Inventory class so it returns task deviceid if set
  or set a new deviceid (aka agentid or machineid) in case of remote inventory
* Fix #161: Support retrieving License software via WMI, including Office 2016
* Fix #364: [win32] Get antivirus version from software installation and get
  Windows Defender version via WMI
* Added Windows 10 version support
* Updated pci.ids to 2017.12.20 version
* Updated usb.ids to 2017.12.28 version

netdiscovery/netinventory:
* Bump NetDiscovery & NetInventory task version to 2.5
* Added section support for MODEMS, SIMCARDS & FIRMWARES
* Added new detection algorithm based on exposed device supported MIB (sysORID list)
  and/or sysObjectID
* Added support for HP iLO cards
* Added support for Digi devices with enhanced MODEMS, SIMCARDS & FIRMWARES support
* Updated sysobject.ids with a lot of new devices support
* Keep first MAC address found while discovering
* Try first to select MAC address from SNMP session during SNMP device scan
* Updated sysobject.ids (tagged fia-2.4 tag on github repository)

deploy:
* Bump Deploy task version to 2.5
* ddurieux fixed a regression introduced in 2.3.18 preventing to re-use known
  good peer to download file parts.

esx:
* Bump ESX task version to 2.3
* Removed no more needed createFakeDeviceid() API

injector:
* Support --no-ssl-check option to avoid checking server SSL certificate

wmi-inventory:
* Added new task and script to permit agent-less inventory on win32 platform based
  on remote WMI support.

(wiz)

2020-09-13 08:59:43 UTC MAIN commitmail json YAML

doc: Updated www/p5-HTTP-Message to 6.26

(wiz)

2020-09-13 08:59:34 UTC MAIN commitmail json YAML

p5-HTTP-Message: update to 6.26.

6.26      2020-09-10 02:34:25Z
    - Update comment which explains in which RFC 451 is defined (GH#143) (Olaf
      Alders). Reported by Toby Inkster.
    - Fix HTTP status descriptions and add 425 Too Early (GH#145) (Dan Book)

(wiz)

2020-09-13 08:58:58 UTC MAIN commitmail json YAML

doc: Updated www/p5-Catalyst-Runtime to 5.90128

(wiz)

2020-09-13 08:58:48 UTC MAIN commitmail json YAML

p5-Catalyst-Runtime: update to 5.90128.

5.90128 - 2020-09-11
  - fix command to run psgi compile test if Catalyst not already installed
  - improve debugging output on psgi compile test

5.90_127 - 2020-07-27
  - fix TODO tests for uri_for as a class method
  - silence warnings in tests
  - remove developer prerequisites on Catalyst plugins
  - cleanups and fixes for optional tests
  - bump Moose prereq to 2.1400, and drop MooseX::Role::WithOverloading prereq
  - stop warning about missing Term::Size::Any when it isn't useful

(wiz)

2020-09-13 08:44:51 UTC MAIN commitmail json YAML

doc: Updated www/p5-Catalyst-Devel to 1.42

(wiz)

2020-09-13 08:44:40 UTC MAIN commitmail json YAML

p5-Catalyst-Devel: update to 1.42.

1.42 - 2020-09-11
        - stop using Module::Install for packaging, improving metadata and
          fixing Makefile.PL on perl 5.26+.  Generating a Catalyst application
          still uses Module::Install::Catalyst for now.
        - fix generated_app.t test on Windows
        - whitespace and formatting tweaks
        - various internal test cleanups

(wiz)

2020-09-13 08:17:26 UTC MAIN commitmail json YAML

doc: Added security/p5-Crypt-JWT version 0.029

(wiz)

2020-09-13 08:17:06 UTC MAIN commitmail json YAML

security/Makefile: + p5-Crypt-JWT.

(wiz)

2020-09-13 08:16:48 UTC MAIN commitmail json YAML

security/p5-Crypt-JWT: import p5-Crypt-JWT-0.029

This perl module implements JSON Web Token (JWT). The implementation
covers not only JSON Web Signature (JWS), but also JSON Web Encryption
(JWE).

The module implements all algorithms defined in JSON Web Algorithms
(JWA).

This module supports Compact JWS/JWE and Flattened JWS/JWE JSON
serialization, general JSON serialization is not supported yet.

(wiz)

2020-09-13 08:07:28 UTC MAIN commitmail json YAML

doc: Updated textproc/p5-YAML-PP to 0.026

(wiz)

2020-09-13 08:07:17 UTC MAIN commitmail json YAML

p5-YAML-PP: update to 0.026.

0.026 2020-09-11 00:39:09+02:00

    - Add option 'duplicate_keys'. The default allows it for now and will
      change to forbid in the next release.

0.025 2020-09-06 22:14:07+02:00

    - Emitter: Fix indentation issues for non-default indents
    - Emitter: Add option 'width' for maximum columns
    - Improve error message for unhandled reftypes

(wiz)

2020-09-13 08:06:15 UTC MAIN commitmail json YAML

doc: Updated net/p5-Net-DNS to 1.27

(wiz)

2020-09-13 08:06:06 UTC MAIN commitmail json YAML

p5-Net-DNS: update to 1.27.

**** 1.27 Sep 11, 2020

Fix rt.cpan.org #133203

Net::DNS::RR::LOC erroneously strips non default values from
string representation

(wiz)

2020-09-13 07:57:48 UTC MAIN commitmail json YAML

doc: Updated mail/p5-Mail-DKIM to 1.20200907

(wiz)

2020-09-13 07:57:40 UTC MAIN commitmail json YAML

p5-Mail-DKIM: update to 1.20200907.

1.20200907 2020-09-07 UTC
  * ARC::Signer: Preserve leading fold from AR (if any) when copying to AAR.
    Thanks to @dev-aaront-org

(wiz)

2020-09-13 07:55:58 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Sub-HandlesVia to 0.015

(wiz)

2020-09-13 07:55:49 UTC MAIN commitmail json YAML

p5-Sub-HandlesVia: update to 0.015.

0.015 2020-09-12

- Added: `reset` method for Array.
- Added: `reset` method for Hash.
- Plain toolkit (used by non-Moo/Moose/Mouse classes) now supports
  defaults/builders.

(wiz)

2020-09-13 07:54:11 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Perl-Tidy to 20200907

(wiz)

2020-09-13 07:54:02 UTC MAIN commitmail json YAML

p5-Perl-Tidy: update to 20200907.

## 2020 09 07

    - Fixed bug git #37, an error when the combination -scbb -csc was used.
      It occurs in perltidy versions 20200110, 20200619, and 20200822.  What happens is
      that when two consecutive lines with isolated closing braces had new side
      comments generated by the -csc parameter, a separating newline was missing.
      The resulting script will not then run, but worse, if it is reformatted with
      the same parameters then closing side comments could be overwritten and data
      lost.

      This problem was found during automated random testing.  The parameter
      -scbb is rarely used, which is probably why this has not been reported.  Please
      upgrade your version.

    - Added parameter --non-indenting-braces, or -nib, which prevents
      code from indenting one level if it follows an opening brace marked
      with a special side comment, '#<<<'.  For example,

                    { #<<<  a closure to contain lexical vars

                    my $var;  # this line does not indent

                    }

                    # this line cannot 'see' $var;

      This is on by default.  If your code happens to have some
      opening braces followed by '#<<<', and you
      don't want this, you can use -nnib to deactivate it.

    - Side comment locations reset at a line ending in a level 0 open
      block, such as when a new multi-line sub begins.  This is intended to
      help keep side comments from drifting to far to the right.

(wiz)

2020-09-13 07:51:23 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Perl-PrereqScanner-NotQuiteLite to 0.9913

(wiz)

2020-09-13 07:51:15 UTC MAIN commitmail json YAML

p5-Perl-PrereqScanner-NotQuiteLite: update to 0.9913.

0.9913 2020/09/06
  - Add URI::cpan to cpanfile

0.9912 2020/09/06
  - Fix not to dedupe core modules needlessly
  - Use a main module to represent modules that belong to the same distribution
  - Dedupe build requires as well

(wiz)

2020-09-13 07:49:53 UTC MAIN commitmail json YAML

doc: Updated devel/p5-PPIx-Regexp to 0.074

(wiz)

2020-09-13 07:49:44 UTC MAIN commitmail json YAML

p5-PPIx-Regexp: update to 0.074.

0.074 2020-09-08 T. R. Wyant
    Remove PPIx::Regexp::StringTokenizer itself and all documentation
    referring to it or the 'parse' argument to PPIx::Regexp->new().

(wiz)

2020-09-13 07:48:25 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Log-Log4perl to 1.52

(wiz)

2020-09-13 07:47:56 UTC MAIN commitmail json YAML

p5-Log-Log4perl: update to 1.52.

1.52 2020-09-07
- fix tests to work better on Windows
- doc fixes - thanks @whosgonna, @plicease, @simon04, @willsheppard
- improve detection of layout modules already available - thanks @KES777
- remove circular dependency in Log::Log4perl::Appender - thanks @lharey

(wiz)

2020-09-13 07:46:46 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Alien-Build to 2.32

(wiz)

2020-09-13 07:46:37 UTC MAIN commitmail json YAML

p5-Alien-Build: update to 2.32.

2.32      2020-09-11 10:42:41 -0600
  - Production release identical to 2.27_01

2.31_01  2020-09-09 06:26:25 -0600
  - Diagnostic release

2.30_01  2020-09-08 14:48:12 -0600
  - Documentation fixes (gh#223, #224, #225, shawnlaffan++)
  - Use shorter filename paths for test files to keep older versions of tar
    happy (gh#228, gh#229, gh#230)

(wiz)

2020-09-13 07:38:23 UTC MAIN commitmail json YAML

doc/TODO: add some

+ ImageMagick-7.0.10.29, bison-3.7.2, enchant2-2.2.11,
  ghostscript-agpl-9.53.0, libssh-0.95, libxkbcommon-1.0.1,
  orc-0.4.32, polkit-0.118, vala-0.50.0.

(wiz)

2020-09-13 07:19:24 UTC MAIN commitmail json YAML

doc: Updated archivers/arqiver to 0.6.1

(pin)

2020-09-13 07:18:55 UTC MAIN commitmail json YAML

archivers/arqiver: update to 0.6.1

V0.6.1
--------
* Added read-only support for RAR archives through 7z.

(pin)

2020-09-13 04:58:41 UTC MAIN commitmail json YAML

doc: Updated x11/deforaos-integration to 0.1.1

(khorben)

2020-09-13 04:58:25 UTC MAIN commitmail json YAML

deforaos-integration: update to version 0.1.1

* Imported the telephony applet from DeforaOS Panel

(khorben)

2020-09-13 04:33:01 UTC MAIN commitmail json YAML

doc: Updated x11/deforaos-panel to 0.4.1

(khorben)

2020-09-13 04:32:35 UTC MAIN commitmail json YAML

deforaos-panel: update to version 0.4.1

* The telephony applet moved to DeforaOS Integration
* The "General" tab no longer focused when applying preferences
* Fix building Panel applets with pkg-config
* Improved support for translations

(khorben)

2020-09-12 23:56:44 UTC MAIN commitmail json YAML

qgis: Update to 3.10.10

This is three micro updates along a LTS branch, and is therefore
presumed to contain bugfixes.

(Builds with cmake 3.17; cmake 3.18 stability issues seem orthogonal
to the 3.10.10 update.)

(gdt)

2020-09-12 22:51:10 UTC MAIN commitmail json YAML

deforaos-panel: fix building panel applets with pkg-config

This should notably fix building x11/deforaos-integration.

(khorben)

2020-09-12 22:14:24 UTC MAIN commitmail json YAML

doc: Added games/q5go version 1.1.1

(wiz)

2020-09-12 22:14:15 UTC MAIN commitmail json YAML

game/Makefile: +q5go.

(wiz)

2020-09-12 22:14:02 UTC MAIN commitmail json YAML

games/q5go: import q5go-1.1.1

This is a tool for Go players which performs the following functions:

* SGF editor
* Analysis frontend for KataGo, Leela Zero or compatible engines
* GTP interface
* IGS client
* Export to a variety of formats

The basic goal for this program is to provide an everyday SGF editor
that is fast, easy and convenient to use and does everything you
could want out of such a tool. Some of the more unusual features
include a Go diagram exporting function for sites like lifein19x19.com
or Sensei's library, as well as SVG vector graphics or slide export.
q5go also supports some non-standard Go variants. For beginners,
tutorials that explain the rules and basic tactics are included.

This program is based on the old Qt3 version of qGo, but ported to
Qt5 and modernized.

(wiz)

2020-09-12 21:27:15 UTC MAIN commitmail json YAML

show-all: use descriptive variable names

The show-all code is mostly line noise, therefore it is all the more
important to provide at least a few hints to a potential reader, by
using descriptive variable names for the iteration variables:

g => grp
c => cat
v => var
w => width
x => word

(rillig)

2020-09-12 21:00:10 UTC MAIN commitmail json YAML

show-all: use separator for long rows of backslashes

I had been confused by the printf commands since some of them used '\n'
and some used '\\\n', which seemed as if there were some quoting issue
that would make it necessary to double the backslashes.

This assumption was wrong though.  The printf commands for the
single-valued variables use the normal '\n', while the lines for the
multi-valued variables end with a real backslash in the output, to
mimick the continuation lines in makefiles.

As a hint that the '\\\n' means backslash + newline, add single quotes
between the two characters.

(rillig)

2020-09-12 20:48:13 UTC MAIN commitmail json YAML

show-all: fix escaping of '$' in variable modifiers

The previous code relied on the exact implementation of Var_Parse in
bmake, and that it does not issue any error messages in case of $$ in
variable modifiers.

In variable modifiers, a $ is escaped using \$, not $$, as documented in
the manual page.

At the time when I wrote the previous version with the _SHOW_ALL.d4 and
_SHOW_ALL.d8 hacks, I did not know about the backslash escaping rule,
and I just added dollar signs until everything seemed to work.  I
couldn't explain why it worked though, which is not surprising since the
code was using an undocumented implementation flaw of bmake.

(rillig)

2020-09-12 20:43:58 UTC MAIN commitmail json YAML

libreoffice: requires libnumbertext>=1.0.6 to build

(gutteridge)

2020-09-12 17:44:26 UTC MAIN commitmail json YAML

qgis: Improve comment about why we use gmake

(gdt)

2020-09-12 16:39:06 UTC MAIN commitmail json YAML

Pull in devel/libatomic on powerpc due to lack of native 8-byte atomics.
Fixes build on NetBSD/macppc 9.0, should have no effect elsewhere, so no
revision bump.

(he)

2020-09-12 15:17:14 UTC MAIN commitmail json YAML

doc: Updated textproc/ugrep to 2.5.5

(wiz)

2020-09-12 15:17:04 UTC MAIN commitmail json YAML

ugrep: update to 2.5.5.

2.5.5

Cumulative build improvements: updated build script; fixed automake
build failure with git clones; workaround missing lz4 macro; updated
Dockerfile; updated tests.

2.5.4

updated Dockerfile

(wiz)

2020-09-12 14:54:15 UTC MAIN commitmail json YAML

doc: Added net/amazon-ecs-cli version 1.20.0

(leot)

2020-09-12 14:53:55 UTC MAIN commitmail json YAML

net: + amazon-ecs-cli

(leot)

2020-09-12 14:53:39 UTC MAIN commitmail json YAML

amazon-ecs-cli: Import amazon-ecs-cli-1.20.0 as net/amazon-ecs-cli

The Amazon ECS Command Line Interface (CLI) is a command line tool for
Amazon Elastic Container Service (Amazon ECS) that provides high-level
commands to simplify creating, updating, and monitoring clusters and
tasks from a local development environment. The Amazon ECS CLI supports
Docker Compose, a popular open-source tool for defining and running
multi-container applications. Use the CLI as part of your everyday
development and testing cycle as an alternative to the AWS Management
Console or the AWS CLI.

(leot)

2020-09-12 12:22:01 UTC MAIN commitmail json YAML

2020-09-12 12:20:11 UTC MAIN commitmail json YAML

py-markups: not for python 2.7

(tnn)

2020-09-12 11:05:58 UTC MAIN commitmail json YAML

doc: Added security/amass version 3.10.3

(leot)

2020-09-12 11:05:37 UTC MAIN commitmail json YAML

security: + amass

(leot)

2020-09-12 11:05:15 UTC MAIN commitmail json YAML

amass: Import amass-3.10.3 as security/amass

The OWASP Amass Project performs network mapping of attack surfaces and
external asset discovery using open source information gathering and
active reconnaissance techniques.

(leot)

2020-09-12 10:03:38 UTC MAIN commitmail json YAML

doc: Updated fonts/vlgothic-ttf to 20200720

(tsutsui)

2020-09-12 10:03:22 UTC MAIN commitmail json YAML

vlgothic-ttf: update to 20200720.

pkgsrc changes:
- Specify OSDN page for HOMEPAGE

Upstream changes (roughly translated from Changelog):

* 2020/07/20
- Fix VL-PGothic/VL-Gothic symbol glyphs
  - Fix wrong L/R directions of U+23F4/U+23F5
    - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860157
  - Update glyphs of U+1F643,U+1F43F per current Unicode definitions
    - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823285
    - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888411
  - Make several Latin1 symbols half width (VL Gothic)
    - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776436
  - Update U+2FB2, U+2BF3
    - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900878
  - add/fix some Greek Letter
    - add Greek Capital Letter Yot (U+037F)
    - fix Greek Small Letter Digamma (U+03dd)
    - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849857

* 2020/07/19
- Update M+1C,1M part of VL-PGothic/VL-Gothic to TESTFLIGHT-063a
- Update one Kanji chalacter glyph (U+9304) of VL-PGothic/VL-Gothic
    and add a ligature of era "Reiwa" (U+32FF)

(tsutsui)

2020-09-12 09:32:07 UTC MAIN commitmail json YAML

(textproc/fmtlib) regen PLIST

(mef)

2020-09-12 09:25:28 UTC MAIN commitmail json YAML

regen PLIST. (right ?)

(mef)

2020-09-12 06:55:08 UTC MAIN commitmail json YAML

mk/plist: fail fast on programming mistake

(rillig)

2020-09-12 06:51:15 UTC MAIN commitmail json YAML

bsd.build-vars.mk: describe MAKE_FLAGS in details, rewrite and reformat

(rillig)

2020-09-12 06:33:47 UTC MAIN commitmail json YAML

py-precis-i18n: mark as not for python 2.x

  File "/usr/pkg/lib/python2.7/site-packages/precis_i18n/factory.py", line 53
    def get_profile(name, *, unicodedata=None):
                          ^
SyntaxError: invalid syntax

The packages using it are already limited to 3.7+.

(wiz)

2020-09-12 05:58:40 UTC MAIN commitmail json YAML

devel/gmake: add link to the 4.3 release notes

(rillig)

2020-09-12 05:23:25 UTC MAIN commitmail json YAML

Don't mess with the share/doc/mutt/samples link in the
INSTALL/DEINSTALL scripts. Bump revision.

(kim)

2020-09-12 03:49:46 UTC MAIN commitmail json YAML

libreoffice: fix typo in comment

(gutteridge)

2020-09-12 03:25:34 UTC MAIN commitmail json YAML

py-mautrix: mark Python 2.7 incompatibility (fix bulk builds)

(gutteridge)

2020-09-12 03:18:31 UTC MAIN commitmail json YAML

options.description: add several options offered by ffmpeg4

(gutteridge)

2020-09-12 03:11:29 UTC MAIN commitmail json YAML

ffmpeg4: bump PKGREVISION due to default dependency addition

(gutteridge)

2020-09-12 00:45:22 UTC MAIN commitmail json YAML

Add an option for webp support
From Jean-Jacques Puig

(manu)

2020-09-12 00:23:14 UTC MAIN commitmail json YAML

doc: Updated textproc/py-markdown-math to 0.7

(gutteridge)

2020-09-12 00:22:35 UTC MAIN commitmail json YAML

py-markdown-math: update to 0.7

Version 0.7, 2020-06-19
=======================

* This extension now requires Python ≥ 3.4 and Python-Markdown ≥ 3.0.
* Fixed deprecation warnings with Python-Markdown 3.x.
* Added support for GitLab-style delimiters.

(gutteridge)

2020-09-12 00:19:28 UTC MAIN commitmail json YAML

qgis: Clean up comment (NFCI)

(gdt)

2020-09-12 00:19:18 UTC MAIN commitmail json YAML

doc: Updated wm/xfce4-wm to 4.14.4

(gutteridge)

2020-09-12 00:18:59 UTC MAIN commitmail json YAML

xfce4-wm: update to 4.14.4

Change log:

4.14.4
======

- Fix a crash on FreeBSD (xfce/xfwm4#411)
- Fix compilation warning due to g_type_class_add_private deprecation

4.14.3
======

- Add support for XRes X11 extension to get the PID of sandboxed apps
- Fix use-after-free of settings strings (xfce/xfwm4#406)
- More XError traps (xfce/xfwm4#405)
- I18n:
  Update translations: en_CA, et, he, hy_AM, id, it, sq, zh_HK
  New translations: hye

(gutteridge)

2020-09-11 23:50:09 UTC MAIN commitmail json YAML

doc: Removed chat/py-tulir-hangups

(js)

2020-09-11 23:48:53 UTC MAIN commitmail json YAML

Remove py-tulir-hangups

The only thing using it, mautrix-hangouts, moved back to upstream hangups.

(js)

2020-09-11 23:45:35 UTC MAIN commitmail json YAML

mautrix-hangouts: Forgot to adjust dependency path

(js)

2020-09-11 23:44:40 UTC MAIN commitmail json YAML

doc: Updated chat/mautrix-hangouts to 0.1.2

(js)

2020-09-11 23:44:28 UTC MAIN commitmail json YAML

2020-09-11 20:44:17 UTC MAIN commitmail json YAML

profanity: Remove hardcoded homebrew paths to fix building on Darwin

(js)

2020-09-11 17:18:37 UTC MAIN commitmail json YAML

doc: Updated net/samba4 to 4.12.6nb2

(jperkin)

2020-09-11 17:18:09 UTC MAIN commitmail json YAML

samba4: Limit iconv hack to NetBSD.

Resolves issue on Linux reported by sobukus on IRC.

(jperkin)

2020-09-11 15:14:12 UTC MAIN commitmail json YAML

elixir: gmake is a runtime dependency

(nia)

2020-09-11 15:05:06 UTC MAIN commitmail json YAML

2020-09-11 14:47:51 UTC MAIN commitmail json YAML

doc: Updated www/webkit-gtk to 2.30.0

(leot)

2020-09-11 14:47:35 UTC MAIN commitmail json YAML

webkit-gtk: Update to 2.30.0

pkgsrc changes:
- Unconditionally disable systemd support via CMAKE_ARGS (by default systemd is
  enabled unconditionally)

Changes:
WebKitGTK 2.30.0
================
  - Fix NTLM authentication.
  - Don't try to use SHM on wayland with older wpebackend-fdo.
  - Fix the build due to seccomp.h header not found.

WebKitGTK 2.29.92
=================
  - Fix user agent header after a redirect when a new quirk is required.
  - Stop using firefox user agent quirk for google docs.
  - Fix rendering frames timeline panel in web inspector.
  - Fix per-thread cpu usage in web inspector.
  - Fix several crashes and rendering issues.
  - Translation updates: Polish

WebKitGTK 2.29.91
=================
  - Fix a web process crash introduced in 2.29.90.

WebKitGTK 2.29.90
=================
  - Fix font variation settings when font smoothing setting is also present.
  - Fix HTML drag and drop operations.
  - Fix argument order for clone syscall seccomp filter on s390x.
  - Fix a crash when selecting text.
  - Fix several crashes and rendering issues.

WebKitGTK 2.29.4
================
  - Add support for backdrop filters.
  - Add support for text-underline-offset and text-decoration-thickness.
  - Add OpenCDM and AV1 support to media backend.
  - Add new API to get ITP data summary.
  - Use mobile user-agent on tablets.
  - Fix several crashes and rendering issues.

WebKitGTK 2.29.3
================
  - Add webkit_authentication_request_get_security_origin.
  - Change the cookies accept policy to always when no-third-party is set and ITP is enabled.
  - Fix web process hangs on large GitHub pages.
  - Bubblewrap sandbox should not attempt to bind empty paths.
  - Add support for sndio to bubblewrap sandbox.
  - Also handle dark themes when the name ends with -Dark.
  - Fix a race condition causing a crash in media player.
  - Fix several crashes and rendering issues.

WebKitGTK 2.29.2
================
- Add Intelligent Tracking Prevention (ITP) support.
- Add support for video formats in img elements.
- Add API to handle video autoplay policy that now defaults to disallow autoplay videos with audio.
- Add API to mute a web view.
- Add API to allow applications to handle the HTTP authentication credential storage.
- Add a WebKitSetting to set the media content types requiring hardware support.
- Fix a crash during drag an drop due to a bug introduced in 2.29.1.
- Do not start page load during animation in back/forward gesture.
- Fix several crashes and rendering issues.
- Translation updates: Ukrainian.

WebKitGTK 2.29.1
================
- Stop using GTK theming to render form controls.
- Add API to disable GTK theming for scrollbars too.
- Fix several race conditions and threading issues in the media player.
- Add USER_AGENT_BRANDING build option.
- Add paste as plain text option to the context menu for rich editable content.
- Fix several crashes and rendering issues.

(leot)

2020-09-11 13:28:30 UTC MAIN commitmail json YAML

doc: Added x11/clipnotify version 1.0.2

(leot)

2020-09-11 13:28:13 UTC MAIN commitmail json YAML

x11: + clipnotify

(leot)

2020-09-11 13:27:43 UTC MAIN commitmail json YAML

clipnotify: Import clipnotify-1.0.2 as x11/clipnotify

clipnotify is a simple program that, using the XFIXES extension to X11,
waits until a new selection is available and then exits.

(leot)

2020-09-11 10:28:09 UTC MAIN commitmail json YAML

games/woof: Build fix for Darwin

XDG desktop and icon files are now always installed (on Darwin too).
pkgsrc users maybe have X11 installed on Apple machines.

(micha)

2020-09-11 09:58:03 UTC MAIN commitmail json YAML

Updated security/py-google-auth, devel/py-google-api-core

(adam)

2020-09-11 09:57:42 UTC MAIN commitmail json YAML

py-google-api-core: updated to 1.22.2

1.22.2:
Bug Fixes
only add quota project id if supported

(adam)

2020-09-11 09:56:33 UTC MAIN commitmail json YAML

py-google-auth: updated to 1.21.1

1.21.1:
Bug Fixes
dummy commit to trigger a auto release

(adam)

2020-09-11 09:40:55 UTC MAIN commitmail json YAML

Updated www/py-django-admin-sortable2, www/py-django-admin-rangefilter

(adam)

2020-09-11 09:40:24 UTC MAIN commitmail json YAML

2020-09-11 09:38:18 UTC MAIN commitmail json YAML

py-django-admin-rangefilter: updated to 0.6.2

0.6.2:
Unknown changes

0.6.1:
Added
- Added Danish translation
Changed
- Refactor tests

(adam)

2020-09-11 09:35:58 UTC MAIN commitmail json YAML

2020-09-11 09:25:38 UTC MAIN commitmail json YAML

Updated lang/nodejs, databases/redis

(adam)

2020-09-11 09:25:18 UTC MAIN commitmail json YAML

redis: updated to 6.0.8

Redis 6.0.8
===========

Upgrade urgency HIGH: Anyone who's using Redis 6.0.7 with Sentinel or
CONFIG REWRITE command is affected and should upgrade ASAP.

Bug fixes:

* CONFIG REWRITE after setting oom-score-adj-values either via CONFIG SET or
  loading it from a config file, will generate a corrupt config file that will
  cause Redis to fail to start
* Fix issue with redis-cli --pipe on MacOS
* Fix RESP3 response for HKEYS/HVALS on non-existing key
* Various small bug fixes

New features / Changes:

* Remove THP warning when set to madvise
* Allow EXEC with read commands on readonly replica in cluster
* Add masters/replicas options to redis-cli --cluster call command

Module API:

* Add RedisModule_ThreadSafeContextTryLock

(adam)

2020-09-11 09:24:21 UTC MAIN commitmail json YAML

nodejs: updated to 14.10.1

Version 14.10.1 (Current)

Notable Changes
Node.js 14.10.0 included a streams regression with async generators and a docs rendering regression that are being fixed in this release.

(adam)

2020-09-11 09:21:32 UTC MAIN commitmail json YAML

Pull in devel/libatomic on powerpc due to lack of native 8-byte atomics.
Fixes build on NetBSD/macppc 9.0, should have no effect elsewhere, so no
revision bump.

(he)

2020-09-11 08:16:19 UTC MAIN commitmail json YAML

py-commonmark: use egg, fix dependencies and category

(adam)

2020-09-11 05:49:03 UTC MAIN commitmail json YAML

2020-09-11 05:42:44 UTC MAIN commitmail json YAML

2020-09-11 05:40:51 UTC MAIN commitmail json YAML

2020-09-11 02:47:42 UTC MAIN commitmail json YAML

doc: Added chat/mautrix-hangouts version 0.1.1

(js)

2020-09-11 02:47:17 UTC MAIN commitmail json YAML

2020-09-11 02:45:40 UTC MAIN commitmail json YAML

Oops, forgot to cvs add new files

(js)

2020-09-11 02:38:31 UTC MAIN commitmail json YAML

chat/py-tulir-hangups: Make deps less strict in setup.py

chat/py-hangups does the same.

(js)

2020-09-11 02:06:38 UTC MAIN commitmail json YAML

chat/py-mautrix: Fix typo I introduced after testing

(js)

2020-09-11 02:04:16 UTC MAIN commitmail json YAML

2020-09-11 01:59:21 UTC MAIN commitmail json YAML

doc: Added chat/py-tulir-hangups version 0.4.12

(js)

2020-09-11 01:59:05 UTC MAIN commitmail json YAML

2020-09-11 01:21:41 UTC MAIN commitmail json YAML

chat/py-mautrix: Specify maximum version of py-aiohttp

(js)

2020-09-11 01:19:16 UTC MAIN commitmail json YAML

doc: Added chat/py-mautrix version 0.7.1

(js)

2020-09-11 01:18:55 UTC MAIN commitmail json YAML

2020-09-11 00:49:37 UTC MAIN commitmail json YAML

doc: Added textproc/py-commonmark version 0.9.1

(js)

2020-09-11 00:48:57 UTC MAIN commitmail json YAML

textproc: SUBDIR+= py-commonmark

(js)

2020-09-11 00:46:00 UTC MAIN commitmail json YAML

2020-09-10 22:27:14 UTC MAIN commitmail json YAML

doc: Updated x11/xf86-video-vesa to 2.5.0

(wiz)

2020-09-10 22:27:04 UTC MAIN commitmail json YAML

xf86-video-vesa: update to 2.5.0.

This release rolls up a few minor bug fixes since 2.4.0. We now refuse
to run on machines with UEFI firmware (on Linux only, patches welcome
for other OSes) since it won't work in the general case and you
probably have a kernel framebuffer driver running already. We also only
attempt to use 24bpp if the alternative would be pseudocolor, but note
that since xserver 1.20 24bpp will not work at all. If you'd like to
fix that case, please note that it is filed as issue #4:

https://gitlab.freedesktop.org/xorg/driver/xf86-video-vesa/-/issues/4

We also notice several cases of running on emulated GPUs, in which case
the shadow framebuffer is disabled by default to improve performance by
reducing the number of copies.

All users are recommended to upgrade, ideally to a better video card
and/or driver.

Full changelog:

Adam Jackson (5):
      Newline-terminate a few error messages
      Refuse to run on UEFI machines
      Try harder to avoid 24bpp
      Disable shadow by default on known-virtual GPUs
      vesa 2.5.0

Alan Coopersmith (2):
      Update README for gitlab migration
      Update configure.ac bug URL for gitlab migration

Benjamin Tissoires (1):
      Refuse to run on UEFI machines running older kernels

(wiz)

2020-09-10 22:11:57 UTC MAIN commitmail json YAML

Note update of security/vault to 1.5.3.

(he)

2020-09-10 22:10:59 UTC MAIN commitmail json YAML

Upgrade vault to version 1.5.3:

Pkgsrc changes:
* Added a patch to cope with fromStatT on NetBSD
* Added a patch to cope with docker client default settings (build
  also on NetBSD)

Upstream changes:

1.5.3 (August 27th, 2020)

NOTE:
All security content from 1.5.2, 1.5.1, 1.4.5, 1.4.4, 1.3.9, 1.3.8,
1.2.6, and 1.2.5 has been made fully open source, and the git tags for
1.5.3, 1.4.6, 1.3.10, and 1.2.7 will build correctly for open source
users.

BUG FIXES:
* auth/aws: Made header handling for IAM authentication more robust
* secrets/ssh: Fixed a bug with role option for SSH signing algorithm
  to allow more than RSA signing

## 1.5.1

CHANGES:
* pki: The tidy operation will now remove revoked certificates if the
  parameter `tidy_revoked_certs` is set to `true`. This will result in
  certificate entries being immediately removed, as opposed to
  awaiting until its NotAfter time. Note that this only affects
  certificates that have been already
  revoked. [[GH-9609](https://github.com/hashicorp/vault/pull/9609)]

IMPROVEMENTS:
* auth/jwt: Add support for fetching groups and user information from
  G Suite during
  authentication. [[GH-9574](https://github.com/hashicorp/vault/pull/9574)]
* secrets/openldap: Add "ad" schema that allows the engine to
  correctly rotate AD
  passwords. [[GH-9740](https://github.com/hashicorp/vault/pull/9740)]
* ui: Wrap TTL option on transit engine export action is updated to a
  new component.
  [[GH-9632](https://github.com/hashicorp/vault/pull/9632)]

BUG FIXES:
* secrets/gcp: Ensure that the IAM policy version is appropriately set
  after a roleset's bindings have
  changed. [[GH-9603](https://github.com/hashicorp/vault/pull/9603)]
* replication (enterprise): Fix status API output incorrectly stating
  replication is in `idle` state.
* core: Fix panic when printing over-long info fields at startup
  [[GH-9681](https://github.com/hashicorp/vault/pull/9681)]

## 1.5.0
### July 21st, 2020

CHANGES:
* storage/raft: The storage configuration now accepts a new
  `max_entry_size` config that will limit the total size in bytes of
  any entry committed via raft. It defaults to `"1048576"`
  (1MiB). [[GH-9027](https://github.com/hashicorp/vault/pull/9027)]
* token: Token creation with custom token ID via `id` will no longer
  allow periods (`.`) as part of the input string.
  The final generated token value may contain periods, such as the
  `s.` prefix for service token
  indication. [[GH-8646](https://github.com/hashicorp/vault/pull/8646/files)]
* token: Token renewals will now return token policies within the
  `token_policies` , identity policies within `identity_policies`, and
  the full policy set within
  `policies`. [[GH-8535](https://github.com/hashicorp/vault/pull/8535)]
* cubbyhole: Reject reads and writes to an empty ("")
  path. [[GH-8971](https://github.com/hashicorp/vault/pull/8971)]
* core: Remove the addition of newlines to parsed configuration when
  using integer/boolean values
  [[GH-8928](https://github.com/hashicorp/vault/pull/8928)]
* audit: Token TTL and issue time are now provided in the auth portion
  of audit logs. [[GH-9091](https://github.com/hashicorp/vault/pull/9091)]

IMPROVEMENTS:
* audit: Replication status requests are no longer
  audited. [[GH-8877](https://github.com/hashicorp/vault/pull/8877)]
* audit: Added mount_type field to requests and
  responses. [[GH-9167](https://github.com/hashicorp/vault/pull/9167)]
* auth/aws: Add support for Web Identity credentials
  [[GH-7738](https://github.com/hashicorp/vault/pull/7738)]
* auth/jwt: Support users that are members of more than 200 groups on Azure
  [[GH-120](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/120)]
* auth/kubernetes: Allow disabling `iss` validation
  [[GH-91](https://github.com/hashicorp/vault-plugin-auth-kubernetes/pull/91)]
* core: Add the Go version used to build a Vault binary to the server message
  output. [[GH-9078](https://github.com/hashicorp/vault/pull/9078)]
* core: Added Password Policies for user-configurable password generation
  [[GH-8637](https://github.com/hashicorp/vault/pull/8637)]
* core: New telemetry metrics covering token counts, token creation, KV
  secret counts, lease
  creation. [[GH-9239](https://github.com/hashicorp/vault/pull/9239)]
  [[GH-9250](https://github.com/hashicorp/vault/pull/9250)]
  [[GH-9244](https://github.com/hashicorp/vault/pull/9244)]
  [[GH-9052](https://github.com/hashicorp/vault/pull/9052)]
* cli: Support reading TLS parameters from file for the `vault operator raft
  join` command. [[GH-9060](https://github.com/hashicorp/vault/pull/9060)]
* plugin: Add SDK method, `Sys.ReloadPlugin`, and CLI command, `vault plugin
  reload`, for reloading
  plugins. [[GH-8777](https://github.com/hashicorp/vault/pull/8777)]
* plugin (enterprise): Add a scope field to plugin reload, which when global,
  reloads the plugin anywhere in a
  cluster. [[GH-9347](https://github.com/hashicorp/vault/pull/9347)]
* sdk/framework: Support accepting TypeFloat parameters over the API
  [[GH-8923](https://github.com/hashicorp/vault/pull/8923)]
* secrets/aws: Add iam_groups parameter to role create/update
  [[GH-8811](https://github.com/hashicorp/vault/pull/8811)]
* secrets/database: Add static role rotation for MongoDB Atlas database
  plugin
  [[GH-11](https://github.com/hashicorp/vault-plugin-database-mongodbatlas/pull/11)]
* secrets/database: Add static role rotation for MSSQL database plugin
  [[GH-9062](https://github.com/hashicorp/vault/pull/9062)]
* secrets/database: Allow InfluxDB to use insecure TLS without cert bundle
  [[GH-8778](https://github.com/hashicorp/vault/pull/8778)]
* secrets/gcp: Support BigQuery dataset ACLs in absence of IAM endpoints
  [[GH-78](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/78)]
* secrets/pki: Allow 3072-bit RSA keys
  [[GH-8343](https://github.com/hashicorp/vault/pull/8343)]
* secrets/ssh: Add a CA-mode role option to specify signing algorithm
  [[GH-9096](https://github.com/hashicorp/vault/pull/9096)]
* secrets/transit: Transit requests that make use of keys now include a new
  field  `key_version` in their responses
  [[GH-8775](https://github.com/hashicorp/vault/pull/8775)]
* secrets/transit: Improving transit batch encrypt and decrypt latencies
  [[GH-9100](https://github.com/hashicorp/vault/pull/9100)]
* sentinel: Add a sentinel config section, and "additional_enabled_modules",
  a list of Sentinel modules that may be imported in addition to the
  defaults.
* ui: Update TTL picker styling on SSH secret engine
  [[GH-8891](https://github.com/hashicorp/vault/pull/8891)]
* ui: Only render the JWT input field of the Vault login form on mounts
  configured for JWT auth
  [[GH-8952](https://github.com/hashicorp/vault/pull/8952)]
* cli: Add a new subcommand, `vault monitor`, for tailing server logs in the
  console. [[GH-8477](https://github.com/hashicorp/vault/pull/8477)]
* ui: Add replication dashboards.  Improve replication management
  workflows. [[GH-8705]](https://github.com/hashicorp/vault/pull/8705).

BUG FIXES:
* agent: Restart template server when it shuts down
  [[GH-9200](https://github.com/hashicorp/vault/pull/9200)]
* auth/oci: Fix issue where users of the Oracle Cloud Infrastructure (OCI)
  auth method could not authenticate when the plugin backend was mounted at a
  non-default path.
  [[GH-7](https://github.com/hashicorp/vault-plugin-auth-oci/pull/7)]
* core: Extend replicated cubbyhole fix in 1.4.0 to cover case where a
  performance primary is also a DR primary
  [[GH-9148](https://github.com/hashicorp/vault/pull/9148)]
* secrets/aws: Fix issue where performance standbys weren't able to generate
  STS credentials after an IAM access key rotation in AWS and root IAM
  credential update in Vault
  [[GH-9186](https://github.com/hashicorp/vault/pull/9186)]
* secrets/database: Fix issue where rotating root database credentials while
  Vault's storage backend is unavailable causes Vault to lose access to the
  database [[GH-8782](https://github.com/hashicorp/vault/pull/8782)]
* secrets/database: Fix issue that prevents performance standbys from
  connecting to databases after a root credential rotation
  [[GH-9129](https://github.com/hashicorp/vault/pull/9129)]
* secrets/gcp: Fix issue were updates were not being applied to the
  `token_scopes` of a roleset.
  [[GH-90](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/90)]
* secrets/kv: Return the value of delete_version_after when reading
  kv/config, even if it is set to the default.
  [[GH-42](https://github.com/hashicorp/vault-plugin-secrets-kv/pull/42)]
* ui: Add Toggle component into core addon so it is available in KMIP and
  other Ember Engines.
  [[GH-8913]](https://github.com/hashicorp/vault/pull/8913)
* ui: Disallow max versions value of large than 9999999999999999 on kv2
  secrets engine. [[GH-9242](https://github.com/hashicorp/vault/pull/9242)]

## 1.4.3 (TBD)

IMPROVEMENTS:
* auth/aws: Add support for Web Identity credentials
  [[GH-9251](https://github.com/hashicorp/vault/pull/9251)]
* core: Add the Go version used to build a Vault binary to the server message
  output. [[GH-9078](https://github.com/hashicorp/vault/pull/9078)]
* secrets/database: Add static role rotation for MongoDB Atlas database
  plugin [[GH-9311](https://github.com/hashicorp/vault/pull/9311)]
* ui: Link to the Vault Changelog in the UI footer
  [[GH-9216](https://github.com/hashicorp/vault/pull/9216)]

BUG FIXES:
* auth/oci: Fix issue where users of the Oracle Cloud Infrastructure (OCI)
  auth method could not authenticate when the plugin backend was mounted at a
  non-default path. [[GH-9278](https://github.com/hashicorp/vault/pull/9278)]
* replication: The issue causing cubbyholes in namespaces on performance
  secondaries to not work, which was fixed in 1.4.0, was still an issue when
  the primary was both a performance primary and DR primary.
* secrets/aws: Fix issue where performance standbys weren't able to generate
  STS credentials after an IAM access key rotation in AWS and root IAM
  credential update in Vault
  [[GH-9207](https://github.com/hashicorp/vault/pull/9207)]
* secrets/database: Fix issue that prevents performance standbys from
  connecting to databases after a root credential rotation
  [[GH-9208](https://github.com/hashicorp/vault/pull/9208)]
* secrets/gcp: Fix issue were updates were not being applied to the
  `token_scopes` of a roleset.
  [[GH-9277](https://github.com/hashicorp/vault/pull/9277)]

## 1.4.2 (May 21st, 2020)

SECURITY:
* core: Proxy environment variables are now redacted before being logged, in
  case the URLs include a username:password. This vulnerability,
  CVE-2020-13223, is fixed in 1.3.6 and 1.4.2, but affects 1.4.0 and 1.4.1,
  as well as older versions of Vault
  [[GH-9022](https://github.com/hashicorp/vault/pull/9022)]
* secrets/gcp: Fix a regression in 1.4.0 where the system TTLs were being
  used instead of the configured backend TTLs for dynamic service
  accounts. This vulnerability is CVE-2020-12757.
  [[GH-85](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/85)]

IMPROVEMENTS:
* storage/raft: The storage stanza now accepts `leader_ca_cert_file`,
  `leader_client_cert_file`, and  `leader_client_key_file` parameters to read
  and parse TLS certificate information from paths on disk.
  Existing non-path based parameters will continue to work, but their values
  will need to be provided as a single-line string with newlines delimited by
  `\n`.  [[GH-8894](https://github.com/hashicorp/vault/pull/8894)]
* storage/raft: The `vault status` CLI command and the `sys/leader` API now
  contain the committed and applied raft indexes.
  [[GH-9011](https://github.com/hashicorp/vault/pull/9011)]

BUG FIXES:
* auth/aws: Fix token renewal issues caused by the metadata changes in 1.4.1
  [[GH-8991](https://github.com/hashicorp/vault/pull/8991)]
* auth/ldap: Fix 1.4.0 regression that could result in auth failures when
  LDAP auth config includes upndomain.
  [[GH-9041](https://github.com/hashicorp/vault/pull/9041)]
* secrets/ad: Forward rotation requests from standbys to active clusters
  [[GH-66](https://github.com/hashicorp/vault-plugin-secrets-ad/pull/66)]
* secrets/database: Prevent generation of usernames that are not allowed by
  the MongoDB Atlas API
  [[GH-9](https://github.com/hashicorp/vault-plugin-database-mongodbatlas/pull/9)]
* secrets/database: Return an error if a manual rotation of static account
  credentials fails [[GH-9035](https://github.com/hashicorp/vault/pull/9035)]
* secrets/openldap: Forward all rotation requests from standbys to active
  clusters [[GH-9028](https://github.com/hashicorp/vault/pull/9028)]
* secrets/transform (enterprise): Fix panic that could occur when accessing
  cached template entries, such as a requests that accessed templates
  directly or indirectly from a performance standby node.
* serviceregistration: Fix a regression for Consul service registration that
  ignored using the listener address as the redirect address unless api_addr
  was provided. It now properly uses the same redirect address as the one
  used by Vault's Core object.
  [[GH-8976](https://github.com/hashicorp/vault/pull/8976)]
* storage/raft: Advertise the configured cluster address to the rest of the
  nodes in the raft cluster. This fixes an issue where a node advertising
  0.0.0.0 is not using a unique hostname.
  [[GH-9008](https://github.com/hashicorp/vault/pull/9008)]
* storage/raft: Fix panic when multiple nodes attempt to join the cluster at
  once. [[GH-9008](https://github.com/hashicorp/vault/pull/9008)]
* sys: The path provided in `sys/internal/ui/mounts/:path` is now
  namespace-aware. This fixes an issue with `vault kv` subcommands that had
  namespaces provided in the path returning permission denied all the time.
  [[GH-8962](https://github.com/hashicorp/vault/pull/8962)]
* ui: Fix snowman that appears when namespaces have more than one period
  [[GH-8910](https://github.com/hashicorp/vault/pull/8910)]

## 1.4.1 (April 30th, 2020)

CHANGES:
* auth/aws: The default set of metadata fields added in 1.4.1 has been
  changed to `account_id` and `auth_type`
  [[GH-8783](https://github.com/hashicorp/vault/pull/8783)]
* storage/raft: Disallow `ha_storage` to be specified if `raft` is set as the
  `storage` type. [[GH-8707](https://github.com/hashicorp/vault/pull/8707)]

IMPROVEMENTS:
* auth/aws: The set of metadata stored during login is now configurable
  [[GH-8783](https://github.com/hashicorp/vault/pull/8783)]
* auth/aws: Improve region selection to avoid errors seen if the account
  hasn't enabled some newer AWS regions
  [[GH-8679](https://github.com/hashicorp/vault/pull/8679)]
* auth/azure: Enable login from Azure VMs with user-assigned identities
  [[GH-33](https://github.com/hashicorp/vault-plugin-auth-azure/pull/33)]
* auth/gcp: The set of metadata stored during login is now configurable
  [[GH-92](https://github.com/hashicorp/vault-plugin-auth-gcp/pull/92)]
* auth/gcp: The type of alias name used during login is now configurable
  [[GH-95](https://github.com/hashicorp/vault-plugin-auth-gcp/pull/95)]
* auth/ldap: Improve error messages during LDAP operation failures
  [[GH-8740](https://github.com/hashicorp/vault/pull/8740)]
* identity: Add a batch delete API for identity entities
  [[GH-8785]](https://github.com/hashicorp/vault/pull/8785)
* identity: Improve performance of logins when no group updates are needed
  [[GH-8795]](https://github.com/hashicorp/vault/pull/8795)
* metrics: Add `vault.identity.num_entities` metric
  [[GH-8816]](https://github.com/hashicorp/vault/pull/8816)
* secrets/kv: Allow `delete-version-after` to be reset to 0 via the CLI
  [[GH-8635](https://github.com/hashicorp/vault/pull/8635)]
* secrets/rabbitmq: Improve error handling and reporting
  [[GH-8619](https://github.com/hashicorp/vault/pull/8619)]
* ui: Provide One Time Password during Operation Token generation process
  [[GH-8630]](https://github.com/hashicorp/vault/pull/8630)

BUG FIXES:
* auth/okta: Fix MFA regression (introduced in
  [GH-8143](https://github.com/hashicorp/vault/pull/8143)) from 1.4.0
  [[GH-8807](https://github.com/hashicorp/vault/pull/8807)]
* auth/userpass: Fix upgrade value for `token_bound_cidrs` being ignored due
  to incorrect key provided
  [[GH-8826](https://github.com/hashicorp/vault/pull/8826/files)]
* config/seal: Fix segfault when seal block is removed
  [[GH-8517](https://github.com/hashicorp/vault/pull/8517)]
* core: Fix an issue where users attempting to build Vault could receive Go
  module checksum errors
  [[GH-8770](https://github.com/hashicorp/vault/pull/8770)]
* core: Fix blocked requests if a SIGHUP is issued during a long-running
  request has the state lock held.
  Also fixes deadlock that can happen if `vault debug` with the config target
  is ran during this time.
  [[GH-8755](https://github.com/hashicorp/vault/pull/8755)]
* core: Always rewrite the .vault-token file as part of a `vault login` to
  ensure permissions and ownership are set correctly
  [[GH-8867](https://github.com/hashicorp/vault/pull/8867)]
* database/mongodb: Fix context deadline error that may result due to retry
  attempts on failed commands
  [[GH-8863](https://github.com/hashicorp/vault/pull/8863)]
* http: Fix superflous call messages from the http package on logs caused by
  missing returns after `respondError` calls
  [[GH-8796](https://github.com/hashicorp/vault/pull/8796)]
* namespace (enterprise): Fix namespace listing to return `key_info` when a
  scoping namespace is also provided.
* seal/gcpkms: Fix panic that could occur if all seal parameters were
  provided via environment variables
  [[GH-8840](https://github.com/hashicorp/vault/pull/8840)]
* storage/raft: Fix memory allocation and incorrect metadata tracking issues
  with snapshots [[GH-8793](https://github.com/hashicorp/vault/pull/8793)]
* storage/raft: Fix panic that could occur if `disable_clustering` was set to
  true on Raft storage cluster
  [[GH-8784](https://github.com/hashicorp/vault/pull/8784)]
* storage/raft: Handle errors returned from the API during snapshot
  operations [[GH-8861](https://github.com/hashicorp/vault/pull/8861)]
* sys/wrapping: Allow unwrapping of wrapping tokens which contain nil data
  [[GH-8714](https://github.com/hashicorp/vault/pull/8714)]

## 1.4.0 (April 7th, 2020)

CHANGES:
* cli: The raft configuration command has been renamed to list-peers to avoid
  confusion.

FEATURES:
* **Kerberos Authentication**: Vault now supports Kerberos authentication
  using a SPNEGO token.
  Login can be performed using the Vault CLI, API, or agent.
* **Kubernetes Service Discovery**: A new Kubernetes service discovery
  feature where, if configured, Vault will tag Vault pods with their current
  health status. For more, see
  [#8249](https://github.com/hashicorp/vault/pull/8249).
* **MongoDB Atlas Secrets**: Vault can now generate dynamic credentials for
  both MongoDB Atlas databases as well as the [Atlas programmatic
  interface]
  (https://docs.atlas.mongodb.com/tutorial/manage-programmatic-access/).
* **OpenLDAP Secrets Engine**: We now support password management of existing
  OpenLDAP user entries. For more, see [#8360]
  (https://github.com/hashicorp/vault/pull/8360/).
* **Redshift Database Secrets Engine**: The database secrets engine now
  supports static and dynamic secrets for the Amazon Web Services (AWS)
  Redshift service.
* **Service Registration Config**: A newly introduced `service_registration`
  configuration stanza, that allows for service registration to be configured
  separately from the storage backend. For more, see [#7887]
  (https://github.com/hashicorp/vault/pull/7887/).
* **Transform Secrets Engine (Enterprise)**: A new secrets engine that
  handles secure data transformation and tokenization against provided input
  value.
* **Integrated Storage**: Promoted out of beta and into general availability
  for both open-source and enterprise workloads.

IMPROVEMENTS:
* agent: add option to force the use of the auth-auth token, and ignore the
  Vault token in the request
  [[GH-8101](https://github.com/hashicorp/vault/pull/8101)]
* api: Restore and fix DNS SRV Lookup
  [[GH-8520](https://github.com/hashicorp/vault/pull/8520)]
* audit: HMAC http_raw_body in audit log; this ensures that large
  authenticated Prometheus metrics responses get replaced with short HMAC
  values [[GH-8130](https://github.com/hashicorp/vault/pull/8130)]
* audit: Generate-root, generate-recovery-token, and
  generate-dr-operation-token requests and responses are now
  audited. [[GH-8301](https://github.com/hashicorp/vault/pull/8301)]
* auth/aws: Reduce the number of simultaneous STS client credentials needed
  [[GH-8161](https://github.com/hashicorp/vault/pull/8161)]
* auth/azure: subscription ID, resource group, vm and vmss names are now
  stored in alias metadata
  [[GH-30](https://github.com/hashicorp/vault-plugin-auth-azure/pull/30)]
* auth/jwt: Additional OIDC callback parameters available for CLI logins
  [[GH-80](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/80) &
  [GH-86](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/86)]
* auth/jwt: Bound claims may be optionally configured using globs
  [[GH-89](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/89)]
* auth/jwt: Timeout during OIDC CLI login if process doesn't complete within
  2 minutes
  [[GH-97](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/97)]
* auth/jwt: Add support for the `form_post` response mode
  [[GH-98](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/98)]
* auth/jwt: add optional client_nonce to authorization flow
  [[GH-104](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/104)]
* auth/okta: Upgrade okta sdk lib, which should improve handling of groups
  [[GH-8143](https://github.com/hashicorp/vault/pull/8143)]
* aws: Add support for v2 of the instance metadata service (see [issue
  7924](https://github.com/hashicorp/vault/issues/7924) for all linked PRs)
* core: Separate out service discovery interface from storage interface to allow
  new types of service discovery not coupled to storage
  [[GH-7887](https://github.com/hashicorp/vault/pull/7887)]
* core: Add support for telemetry option `metrics_prefix`
  [[GH-8340](https://github.com/hashicorp/vault/pull/8340)]
* core: Entropy Augmentation can now be used with AWS KMS and Vault Transit
  seals
* core: Allow tls_min_version to be set to TLS 1.3
  [[GH-8305](https://github.com/hashicorp/vault/pull/8305)]
* cli: Incorrect TLS configuration will now correctly fail
  [[GH-8025](https://github.com/hashicorp/vault/pull/8025)]
* identity: Allow specifying a custom `client_id` for identity tokens
  [[GH-8165](https://github.com/hashicorp/vault/pull/8165)]
* metrics/prometheus: improve performance with high volume of metrics updates
  [[GH-8507](https://github.com/hashicorp/vault/pull/8507)]
* replication (enterprise): Fix race condition causing clusters with high
  throughput writes to sometimes fail to enter streaming-wal mode
* replication (enterprise): Secondary clusters can now perform an extra gRPC
  call to all nodes in a primary
  cluster in an attempt to resolve the active node's address
* replication (enterprise): The replication status API now outputs
  `last_performance_wal`, `last_dr_wal`, and `connection_state` values
* replication (enterprise): DR secondary clusters can now be recovered by the
  `replication/dr/secondary/recover` API
* replication (enterprise): We now allow for an alternate means to create a
  Disaster Recovery token, by using a batch token that is created with an ACL
  that allows for access to one or more of the DR endpoints.
* secrets/database/mongodb: Switched internal MongoDB driver to mongo-driver
  [[GH-8140](https://github.com/hashicorp/vault/pull/8140)]
* secrets/database/mongodb: Add support for x509 client authorization to
  MongoDB [[GH-8329](https://github.com/hashicorp/vault/pull/8329)]
* secrets/database/oracle: Add support for static credential rotation
  [[GH-26](https://github.com/hashicorp/vault-plugin-database-oracle/pull/26)]
* secrets/consul: Add support to specify TLS options per Consul backend
  [[GH-4800](https://github.com/hashicorp/vault/pull/4800)]
* secrets/gcp: Allow specifying the TTL for a service key
  [[GH-54](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/54)]
* secrets/gcp: Add support for rotating root keys
  [[GH-53](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/53)]
* secrets/gcp: Handle version 3 policies for Resource Manager IAM requests
  [[GH-77](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/77)
* secrets/nomad: Add support to specify TLS options per Nomad backend
  [[GH-8083](https://github.com/hashicorp/vault/pull/8083)]
* secrets/ssh: Allowed users can now be templated with identity information
  [[GH-7548](https://github.com/hashicorp/vault/pull/7548)]
* secrets/transit: Adding RSA3072 key support
  [[GH-8151](https://github.com/hashicorp/vault/pull/8151)]
* storage/consul: Vault returns now a more descriptive error message when
  only a client cert or a client key has been provided
  [[GH-4930]](https://github.com/hashicorp/vault/pull/8084)
* storage/raft: Nodes in the raft cluster can all be given possible leader
  addresses for them to continuously try and join one of them, thus
  automating the process of join to a greater extent
  [[GH-7856](https://github.com/hashicorp/vault/pull/7856)]
* storage/raft: Fix a potential deadlock that could occur on leadership
  transition [[GH-8547](https://github.com/hashicorp/vault/pull/8547)]
* storage/raft: Refresh TLS keyring on snapshot restore
  [[GH-8546](https://github.com/hashicorp/vault/pull/8546)]
* storage/etcd: Bumped etcd client API SDK
  [[GH-7931](https://github.com/hashicorp/vault/pull/7931) &
  [GH-4961](https://github.com/hashicorp/vault/pull/4961) &
  [GH-4349](https://github.com/hashicorp/vault/pull/4349) &
  [GH-7582](https://github.com/hashicorp/vault/pull/7582)]
* ui: Make Transit Key actions more prominent
  [[GH-8304](https://github.com/hashicorp/vault/pull/8304)]
* ui: Add Core Usage Metrics
  [[GH-8347](https://github.com/hashicorp/vault/pull/8347)]
* ui: Add refresh Namespace list on the Namespace dropdown, and redesign of
  Namespace dropdown menu
  [[GH-8442](https://github.com/hashicorp/vault/pull/8442)]
* ui: Update transit actions to codeblocks & automatically encode plaintext
  unless indicated [[GH-8462](https://github.com/hashicorp/vault/pull/8462)]
* ui: Display the results of transit key actions in a modal window
  [[GH-8462](https://github.com/hashicorp/vault/pull/8575)]
* ui: Transit key version styling updates & ability to copy key from dropdown
  [[GH-8480](https://github.com/hashicorp/vault/pull/8480)]

BUG FIXES:
* agent: Fix issue where TLS options are ignored for agent template feature
  [[GH-7889](https://github.com/hashicorp/vault/pull/7889)]
* auth/jwt: Use lower case role names for `default_role` to match the `role`
  case convention
  [[GH-100](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/100)]
* auth/ldap: Fix a bug where the UPNDOMAIN parameter was wrongly used to
  lookup the group membership of the given user
  [[GH-6325]](https://github.com/hashicorp/vault/pull/8333)
* cli: Support autocompletion for nested mounts
  [[GH-8303](https://github.com/hashicorp/vault/pull/8303)]
* cli: Fix CLI namespace autocompletion
  [[GH-8315](https://github.com/hashicorp/vault/pull/8315)]
* identity: Fix incorrect caching of identity token JWKS responses
  [[GH-8412](https://github.com/hashicorp/vault/pull/8412)]
* metrics/stackdriver: Fix issue that prevents the stackdriver metrics
  library to create unnecessary stackdriver descriptors
  [[GH-8073](https://github.com/hashicorp/vault/pull/8073)]
* replication: Fix issue causing cubbyholes in namespaces on performance
  secondaries to not work.
* replication (enterprise): Unmounting a dynamic secrets backend could
  sometimes lead to replication errors.  Change the order of operations to
  prevent that.
* seal (enterprise): Fix seal migration when transactional seal wrap backend
  is in use.
* secrets/database/influxdb: Fix potential panic if connection to the
  InfluxDB database cannot be established
  [[GH-8282](https://github.com/hashicorp/vault/pull/8282)]
* secrets/database/mysql: Ensures default static credential rotation
  statements are used
  [[GH-8240](https://github.com/hashicorp/vault/pull/8240)]
* secrets/database/mysql: Fix inconsistent query parameter names: {{name}} or
  {{username}} for different queries. Now it allows for either for backwards
  compatibility [[GH-8240](https://github.com/hashicorp/vault/pull/8240)]
* secrets/database/postgres: Fix inconsistent query parameter names: {{name}}
  or {{username}} for different queries. Now it allows for either for
  backwards compatibility
  [[GH-8240](https://github.com/hashicorp/vault/pull/8240)]
* secrets/pki: Support FQDNs in DNS Name
  [[GH-8288](https://github.com/hashicorp/vault/pull/8288)]
* storage/raft: Allow seal migration to be performed on Vault clusters using
  raft storage [[GH-8103](https://github.com/hashicorp/vault/pull/8103)]
* telemetry: Prometheus requests on standby nodes will now return an error
  instead of forwarding the request to the active node
  [[GH-8280](https://github.com/hashicorp/vault/pull/8280)]
* ui: Fix broken popup menu on the transit secrets list page
  [[GH-8348](https://github.com/hashicorp/vault/pull/8348)]
* ui: Update headless Chrome flag to fix `yarn run test:oss`
  [[GH-8035](https://github.com/hashicorp/vault/pull/8035)]
* ui: Update CLI to accept empty strings as param value to reset
  previously-set values
* ui: Fix bug where error states don't clear when moving between action tabs
  on Transit [[GH-8354](https://github.com/hashicorp/vault/pull/8354)]

## 1.3.6 (May 21st, 2020)

SECURITY:
* core: proxy environment variables are now redacted before being logged, in
  case the URLs include a username:password. This vulnerability,
  CVE-2020-13223, is fixed in 1.3.6 and 1.4.2, but affects 1.4 and 1.4.1, as
  well as older versions of Vault
  [[GH-9022](https://github.com/hashicorp/vault/pull/9022)

BUG FIXES:
* auth/aws: Fix token renewal issues caused by the metadata changes in 1.3.5
  [[GH-8991](https://github.com/hashicorp/vault/pull/8991)]
* replication: Fix mount filter bug that allowed replication filters to hide
  local mounts on a performance secondary

## 1.3.5 (April 28th, 2020)

CHANGES:
* auth/aws: The default set of metadata fields added in 1.3.2 has been
  changed to `account_id` and `auth_type`
  [[GH-8783](https://github.com/hashicorp/vault/pull/8783)]

IMPROVEMENTS:
* auth/aws: The set of metadata stored during login is now configurable
  [[GH-8783](https://github.com/hashicorp/vault/pull/8783)]

## 1.3.4 (March 19th, 2020)

SECURITY:
* A vulnerability was identified in Vault and Vault Enterprise such that,
  under certain circumstances,  an Entity's Group membership may
  inadvertently include Groups the Entity no longer has permissions to. This
  vulnerability, CVE-2020-10660, affects Vault and Vault Enterprise versions
  0.9.0 and newer, and is fixed in 1.3.4.
  [[GH-8606](https://github.com/hashicorp/vault/pull/8606)]
* A vulnerability was identified in Vault Enterprise such that, under certain
  circumstances, existing nested-path policies may give access to Namespaces
  created after-the-fact. This vulnerability, CVE-2020-10661, affects Vault
  Enterprise versions 0.11 and newer, and is fixed in 1.3.4.

## 1.3.3 (March 5th, 2020)

BUG FIXES:
* approle: Fix excessive locking during tidy, which could potentially block
  new approle logins for long enough to cause an outage
  [[GH-8418](https://github.com/hashicorp/vault/pull/8418)]
* cli: Fix issue where Raft snapshots from standby nodes created an empty
  backup file [[GH-8097](https://github.com/hashicorp/vault/pull/8097)]
* identity: Fix incorrect caching of identity token JWKS responses
  [[GH-8412](https://github.com/hashicorp/vault/pull/8412)]
* kmip: role read now returns tls_client_ttl
* kmip: fix panic when templateattr not provided in rekey request
* secrets/database/influxdb: Fix potential panic if connection to the
  InfluxDB database cannot be established
  [[GH-8282](https://github.com/hashicorp/vault/pull/8282)]
* storage/mysql: Fix potential crash when using MySQL as coordination for
  high availability [[GH-8300](https://github.com/hashicorp/vault/pull/8300)]
* storage/raft: Fix potential crash when using Raft as coordination for high
  availability [[GH-8356](https://github.com/hashicorp/vault/pull/8356)]
* ui: Fix missing License menu item
  [[GH-8230](https://github.com/hashicorp/vault/pull/8230)]
* ui: Fix bug where default auth method on login is defaulted to auth method
  that is listing-visibility=unauth instead of "other"
  [[GH-8218](https://github.com/hashicorp/vault/pull/8218)]
* ui: Fix bug where KMIP details were not shown in the UI Wizard
  [[GH-8255](https://github.com/hashicorp/vault/pull/8255)]
* ui: Show Error messages on Auth Configuration page when you hit permission
  errors [[GH-8500](https://github.com/hashicorp/vault/pull/8500)]
* ui: Remove duplicate form inputs for the GitHub config
  [[GH-8519](https://github.com/hashicorp/vault/pull/8519)]
* ui: Correct HMAC capitalization
  [[GH-8528](https://github.com/hashicorp/vault/pull/8528)]
* ui: Fix danger message in DR
  [[GH-8555](https://github.com/hashicorp/vault/pull/8555)]
* ui: Fix certificate field for LDAP config
  [[GH-8573](https://github.com/hashicorp/vault/pull/8573)]

## 1.3.2 (January 22nd, 2020)

SECURITY:
* When deleting a namespace on Vault Enterprise, in certain circumstances,
  the deletion process will fail to revoke dynamic secrets for a mount in
  that namespace. This will leave any dynamic secrets in remote systems
  alive and will fail to clean them up. This vulnerability, CVE-2020-7220,
  affects Vault Enterprise 0.11.0 and newer.

IMPROVEMENTS:
* auth/aws: Add aws metadata to identity alias
  [[GH-7985](https://github.com/hashicorp/vault/pull/7985)]
* auth/kubernetes: Allow both names and namespaces to be set to "*"
  [[GH-78](https://github.com/hashicorp/vault-plugin-auth-kubernetes/pull/78)]

BUG FIXES:
* auth/azure: Fix Azure compute client to use correct base URL
  [[GH-8072](https://github.com/hashicorp/vault/pull/8072)]
* auth/ldap: Fix renewal of tokens without configured policies that are
  generated by an LDAP login
  [[GH-8072](https://github.com/hashicorp/vault/pull/8072)]
* auth/okta: Fix renewal of tokens without configured policies that are
  generated by an Okta login
  [[GH-8072](https://github.com/hashicorp/vault/pull/8072)]
* core: Fix seal migration error when attempting to migrate from auto unseal
  to shamir [[GH-8172](https://github.com/hashicorp/vault/pull/8172)]
* core: Fix seal migration config issue when migrating from auto unseal to
  auto unseal [[GH-8172](https://github.com/hashicorp/vault/pull/8172)]
* plugin: Fix issue where a plugin unwrap request potentially used an expired
  token [[GH-8058](https://github.com/hashicorp/vault/pull/8058)]
* replication: Fix issue where a forwarded request from a performance/standby
  node could run into a timeout
* secrets/database: Fix issue where a manual static role rotation could
  potentially panic [[GH-8098](https://github.com/hashicorp/vault/pull/8098)]
* secrets/database: Fix issue where a manual root credential rotation request
  is not forwarded to the primary node
  [[GH-8125](https://github.com/hashicorp/vault/pull/8125)]
* secrets/database: Fix issue where a manual static role rotation request is
  not forwarded to the primary node
  [[GH-8126](https://github.com/hashicorp/vault/pull/8126)]
* secrets/database/mysql: Fix issue where special characters for a MySQL
  password were encoded
  [[GH-8040](https://github.com/hashicorp/vault/pull/8040)]
* ui: Fix deleting namespaces
  [[GH-8132](https://github.com/hashicorp/vault/pull/8132)]
* ui: Fix Error handler on kv-secret edit and kv-secret view pages
  [[GH-8133](https://github.com/hashicorp/vault/pull/8133)]
* ui: Fix OIDC callback to check storage
  [[GH-7929](https://github.com/hashicorp/vault/pull/7929)].
* ui: Change `.box-radio` height to min-height to prevent overflow issues
  [[GH-8065](https://github.com/hashicorp/vault/pull/8065)]

## 1.3.1 (December 18th, 2019)

IMPROVEMENTS:
* agent: Add ability to set `exit-after-auth` via the CLI
  [[GH-7920](https://github.com/hashicorp/vault/pull/7920)]
* auth/ldap: Add a `request_timeout` configuration option to prevent
  connection requests from hanging
  [[GH-7909](https://github.com/hashicorp/vault/pull/7909)]
* auth/kubernetes: Add audience to tokenreview API request for Kube
  deployments where issuer is not Kube.
  [[GH-74](https://github.com/hashicorp/vault/pull/74)]
* secrets/ad: Add a `request_timeout` configuration option to prevent
  connection requests from hanging
  [[GH-59](https://github.com/hashicorp/vault-plugin-secrets-ad/pull/59)]
* storage/postgresql: Add support for setting `connection_url` from
  enviornment variable `VAULT_PG_CONNECTION_URL`
  [[GH-7937](https://github.com/hashicorp/vault/pull/7937)]
* telemetry: Add `enable_hostname_label` option to telemetry stanza
  [[GH-7902](https://github.com/hashicorp/vault/pull/7902)]
* telemetry: Add accept header check for prometheus mime type
  [[GH-7958](https://github.com/hashicorp/vault/pull/7958)]

BUG FIXES:
* agent: Fix issue where Agent exits before all templates are rendered when
  using and `exit_after_auth`
  [[GH-7899](https://github.com/hashicorp/vault/pull/7899)]
* auth/aws: Fixes region-related issues when using a custom `sts_endpoint` by
  adding a `sts_region` parameter
  [[GH-7922](https://github.com/hashicorp/vault/pull/7922)]
* auth/token: Fix panic when getting batch tokens on a performance standby
  from a role that does not exist
  [[GH-8027](https://github.com/hashicorp/vault/pull/8027)]
* core: Improve warning message for lease TTLs
  [[GH-7901](https://github.com/hashicorp/vault/pull/7901)]
* identity: Fix identity token panic during invalidation
  [[GH-8043](https://github.com/hashicorp/vault/pull/8043)]
* plugin: Fix a panic that could occur if a mount/auth entry was unable to
  mount the plugin backend and a request that required the system view to be
  retrieved was made
  [[GH-7991](https://github.com/hashicorp/vault/pull/7991)]
* replication: Add `generate-public-key` endpoint to list of allowed
  endpoints for existing DR secondaries
* secrets/gcp: Fix panic if bindings aren't provided in roleset
  create/update.
  [[GH-56](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/56)]
* secrets/pki: Prevent generating certificate on performance standby when
  storing
  [[GH-7904](https://github.com/hashicorp/vault/pull/7904)]
* secrets/transit: Prevent restoring keys to new names that are sub paths
  [[GH-7998](https://github.com/hashicorp/vault/pull/7998)]
* storage/s3: Fix a bug in configurable S3 paths that was preventing use of
  S3 as a source during `operator migrate` operations
  [[GH-7966](https://github.com/hashicorp/vault/pull/7966)]
* ui: Ensure secrets with a period in their key can be viewed and copied
  [[GH-7926](https://github.com/hashicorp/vault/pull/7926)]
* ui: Fix status menu after demotion
  [[GH-7997](https://github.com/hashicorp/vault/pull/7997)]
* ui: Fix select dropdowns in Safari when running Mojave
  [[GH-8023](https://github.com/hashicorp/vault/pull/8023)]

## 1.3 (November 14th, 2019)

CHANGES:
* Secondary cluster activation: There has been a change to the way that
  activating performance and DR secondary clusters works when using public
  keys for encryption of the parameters rather than a wrapping token. This
  flow was experimental and never documented. It is now officially supported
  and documented but is not backwards compatible with older Vault releases.
* Cluster cipher suites: On its cluster port, Vault will no longer advertise
  the full TLS 1.2 cipher suite list by default. Although this port is only
  used for Vault-to-Vault communication and would always pick a strong
  cipher, it could cause false flags on port scanners and other security
  utilities that assumed insecure ciphers were being used. The previous
  behavior can be achieved by setting the value of the (undocumented)
  `cluster_cipher_suites` config flag to `tls12`.
* API/Agent Renewal behavior: The API now allows multiple options for how it
  deals with renewals. The legacy behavior in the Agent/API is for the renewer
  (now called the lifetime watcher) to exit on a renew error, leading to a
  reauthentication. The new default behavior is for the lifetime watcher to
  ignore 5XX errors and simply retry as scheduled, using the existing lease
  duration. It is also possible, within custom code, to disable renewals
  entirely, which allows the lifetime watcher to simply return when it
  believes it is time for your code to renew or reauthenticate.

FEATURES:
* **Vault Debug**: A new top-level subcommand, `debug`, is added that allows
  operators to retrieve debugging information related to a particular Vault
  node. Operators can use this simple workflow to capture triaging
  information, which can then be consumed programmatically or by support and
  engineering teams.  It has the abilitity to probe for config, host,
  metrics, pprof, server status, and replication status.
* **Recovery Mode**: Vault server can be brought up in recovery mode to
  resolve outages caused due to data store being in bad state. This is a
  privileged mode that allows `sys/raw` API calls to perform surgical
  corrections to the data tore. Bad storage state can be caused by
  bugs. However, this is usually observed when known (and fixed) bugs are
  hit by older versions of Vault.
* **Entropy Augmentation (Enterprise)**: Vault now supports sourcing entropy
  from external source for critical security parameters. Currently an HSM
  that supports PKCS#11 is the only supported source.
* **Active Directory Secret Check-In/Check-Out**: In the Active Directory
  secrets engine, users or applications can check out a service account for
  use, and its password will be rotated when it's checked back in.
* **Vault Agent Template**: Vault Agent now supports rendering templates
  containing Vault secrets to disk, similar to Consul Template
  [[GH-7652](https://github.com/hashicorp/vault/pull/7652)]
* **Transit Key Type Support**: Signing and verification is now supported
  with the P-384 (secp384r1) and P-521 (secp521r1) ECDSA curves
  [[GH-7551](https://github.com/hashicorp/vault/pull/7551)] and encryption
  and decryption is now supported via AES128-GCM96
  [[GH-7555](https://github.com/hashicorp/vault/pull/7555)]
* **SSRF Protection for Vault Agent**: Vault Agent has a configuration
  option to require a specific header before allowing requests
  [[GH-7627](https://github.com/hashicorp/vault/pull/7627)]
* **AWS Auth Method Root Rotation**: The credential used by the AWS auth
  method can now be rotated, to ensure that only Vault knows the credentials
  it is using [[GH-7131](https://github.com/hashicorp/vault/pull/7131)]
* **New UI Features**: The UI now supports managing users and groups for the
  Userpass, Cert, Okta, and Radius auth methods.
* **Shamir with Stored Master Key**: The on disk format for Shamir seals has
  changed, allowing for a secondary cluster using Shamir downstream from a
  primary cluster using Auto
  Unseal. [[GH-7694](https://github.com/hashicorp/vault/pull/7694)]
* **Stackdriver Metrics Sink**: Vault can now send metrics to
  [Stackdriver](https://cloud.google.com/stackdriver/). See the
  [configuration
  documentation](https://www.vaultproject.io/docs/config/index.html) for
  details. [[GH-6957](https://github.com/hashicorp/vault/pull/6957)]
* **Filtered Paths Replication (Enterprise)**: Based on the predecessor
  Filtered Mount Replication, Filtered Paths Replication allows now
  filtering of namespaces in addition to mounts.
* **Token Renewal via Accessor**: Tokens can now be renewed via the accessor
  value through the new `auth/token/renew-accessor` endpoint if the caller's
  token has permission to access that endpoint.
* **Improved Integrated Storage (Beta)**: Improved raft write performance,
  added support for non-voter nodes, along with UI support for: using raft
  storage, joining a raft cluster, and downloading and restoring a
  snapshot.

IMPROVEMENTS:
* agent: Add ability to set the TLS SNI name used by Agent
  [[GH-7519](https://github.com/hashicorp/vault/pull/7519)]
* agent & api: Change default renewer behavior to ignore 5XX errors
  [[GH-7733](https://github.com/hashicorp/vault/pull/7733)]
* auth/jwt: The redirect callback host may now be specified for CLI logins
  [[GH-71](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/71)]
* auth/jwt: Bound claims may now contain boolean values
  [[GH-73](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/73)]
* auth/jwt: CLI logins can now open the browser when running in WSL
  [[GH-77](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/77)]
* core: Exit ScanView if context has been cancelled
  [[GH-7419](https://github.com/hashicorp/vault/pull/7419)]
* core: re-encrypt barrier and recovery keys if the unseal key is updated
  [[GH-7493](https://github.com/hashicorp/vault/pull/7493)]
* core: Don't advertise the full set of TLS 1.2 cipher suites on the cluster
  port, even though only strong ciphers were used
  [[GH-7487](https://github.com/hashicorp/vault/pull/7487)]
* core (enterprise): Add background seal re-wrap
* core/metrics: Add config parameter to allow unauthenticated sys/metrics
  access. [[GH-7550](https://github.com/hashicorp/vault/pull/7550)]
* metrics: Upgrade DataDog library to improve performance
  [[GH-7794](https://github.com/hashicorp/vault/pull/7794)]
* replication (enterprise): Write-Ahead-Log entries will not duplicate the
  data belonging to the encompassing physical entries of the transaction,
  thereby improving the performance and storage capacity.
* replication (enterprise): Added more replication metrics
* replication (enterprise): Reindex process now compares subpages for a more
  accurate indexing process.
* replication (enterprise): Reindex API now accepts a new `skip_flush`
  parameter indicating all the changes should not be flushed while the tree
  is locked.
* secrets/aws: The root config can now be read
  [[GH-7245](https://github.com/hashicorp/vault/pull/7245)]
* secrets/database/cassandra: Add ability to skip verfication of connection
  [[GH-7614](https://github.com/hashicorp/vault/pull/7614)]
* secrets/gcp: Fix panic during rollback if the roleset has been deleted
  [[GH-52](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/52)]
* storage/azure: Add config parameter to Azure storage backend to allow
  specifying the ARM endpoint
  [[GH-7567](https://github.com/hashicorp/vault/pull/7567)]
* storage/cassandra: Improve storage efficiency by eliminating unnecessary
  copies of value data
  [[GH-7199](https://github.com/hashicorp/vault/pull/7199)]
* storage/raft: Improve raft write performance by utilizing FSM Batching
  [[GH-7527](https://github.com/hashicorp/vault/pull/7527)]
* storage/raft: Add support for non-voter nodes
  [[GH-7634](https://github.com/hashicorp/vault/pull/7634)]
* sys: Add a new `sys/host-info` endpoint for querying information about
  the host [[GH-7330](https://github.com/hashicorp/vault/pull/7330)]
* sys: Add a new set of endpoints under `sys/pprof/` that allows profiling
  information to be extracted
  [[GH-7473](https://github.com/hashicorp/vault/pull/7473)]
* sys: Add endpoint that counts the total number of active identity entities
  [[GH-7541](https://github.com/hashicorp/vault/pull/7541)]
* sys: `sys/seal-status` now has a `storage_type` field denoting what type
  of storage the cluster is configured to use
* sys: Add a new `sys/internal/counters/tokens` endpoint, that counts the
  total number of active service token accessors in the shared token
  storage.
  [[GH-7541](https://github.com/hashicorp/vault/pull/7541)]
* sys/config: Add  a new endpoint under `sys/config/state/sanitized` that
  returns the configuration state of the server. It excludes config values
  from `storage`, `ha_storage`, and `seal` stanzas and some values
  from `telemetry` due to potential sensitive entries in those fields.
* ui: when using raft storage, you can now join a raft cluster, download a
  snapshot, and restore a snapshot from the UI
  [[GH-7410](https://github.com/hashicorp/vault/pull/7410)]
* ui: clarify when secret version is deleted in the secret version history
  dropdown [[GH-7714](https://github.com/hashicorp/vault/pull/7714)]

BUG FIXES:
* agent: Fix a data race on the token value for inmemsink
  [[GH-7707](https://github.com/hashicorp/vault/pull/7707)]
* api: Fix Go API using lease revocation via URL instead of body
  [[GH-7777](https://github.com/hashicorp/vault/pull/7777)]
* api: Allow setting a function to control retry behavior
  [[GH-7331](https://github.com/hashicorp/vault/pull/7331)]
* auth/gcp: Fix a bug where region information in instance groups names could
  cause an authorization attempt to fail
  [[GH-74](https://github.com/hashicorp/vault-plugin-auth-gcp/pull/74)]
* cli: Fix a bug where a token of an unknown format (e.g. in ~/.vault-token)
  could cause confusing error messages during `vault login`
  [[GH-7508](https://github.com/hashicorp/vault/pull/7508)]
* cli: Fix a bug where the `namespace list` command with JSON formatting
  always returned an empty object
  [[GH-7705](https://github.com/hashicorp/vault/pull/7705)]
* cli: Command timeouts are now always specified solely by the
  `VAULT_CLIENT_TIMEOUT`
  value. [[GH-7469](https://github.com/hashicorp/vault/pull/7469)]
* core: Don't allow registering a non-root zero TTL token lease. This is
  purely defense in depth as the lease would be revoked immediately anyways,
  but there's no real reason to allow registration.
  [[GH-7524](https://github.com/hashicorp/vault/pull/7524)]
* identity (enterprise): Fixed identity case sensitive loading in secondary
  cluster [[GH-7327](https://github.com/hashicorp/vault/pull/7327)]
* identity: Ensure only replication primary stores the identity case
  sensitivity state
  [[GH-7820](https://github.com/hashicorp/vault/pull/7820)]
* raft: Fixed VAULT_CLUSTER_ADDR env being ignored at startup
  [[GH-7619](https://github.com/hashicorp/vault/pull/7619)]
* secrets/pki: Don't allow duplicate SAN names in issued certs
  [[GH-7605](https://github.com/hashicorp/vault/pull/7605)]
* sys/health: Pay attention to the values provided for `standbyok` and
  `perfstandbyok` rather than simply using their presence as a key to flip on
  that behavior [[GH-7323](https://github.com/hashicorp/vault/pull/7323)]
* ui: using the `wrapped_token` query param will work with `redirect_to` and
  will automatically log in as intended
  [[GH-7398](https://github.com/hashicorp/vault/pull/7398)]
* ui: fix an error when initializing from the UI using PGP keys
  [[GH-7542](https://github.com/hashicorp/vault/pull/7542)]
* ui: show all active kv v2 secret versions even when `delete_version_after`
  is configured [[GH-7685](https://github.com/hashicorp/vault/pull/7685)]
* ui: Ensure that items in the top navigation link to pages that users have
  access to [[GH-7590](https://github.com/hashicorp/vault/pull/7590)]

## 1.2.4 (November 7th, 2019)

SECURITY:
* In a non-root namespace, revocation of a token scoped to a non-root
  namespace did not trigger the expected revocation of dynamic secret leases
  associated with that token. As a result, dynamic secret leases in non-root
  namespaces may outlive the token that created them.  This vulnerability,
  CVE-2019-18616, affects Vault Enterprise 0.11.0 and newer.
* Disaster Recovery secondary clusters did not delete already-replicated data
  after a mount filter has been created on an upstream Performance secondary
  cluster. As a result, encrypted secrets may remain replicated on a Disaster
  Recovery secondary cluster after application of a mount filter excluding
  those secrets from replication. This vulnerability, CVE-2019-18617, affects
  Vault Enterprise 0.8 and newer.
* Update version of Go to 1.12.12 to fix Go bug golang.org/issue/34960 which
  corresponds to CVE-2019-17596.

CHANGES:
* auth/aws: If a custom `sts_endpoint` is configured, Vault Agent and the
  CLI should provide the corresponding region via the `region` parameter
  (which already existed as a CLI parameter, and has now been added to
  Agent). The automatic region detection added to the CLI and Agent in 1.2
  has been removed.

IMPROVEMENTS:
  * cli: Ignore existing token during CLI login
    [[GH-7508](https://github.com/hashicorp/vault/pull/7508)]
  * core: Log proxy settings from environment on startup
    [[GH-7528](https://github.com/hashicorp/vault/pull/7528)]
  * core: Cache whether we've been initialized to reduce load on storage
    [[GH-7549](https://github.com/hashicorp/vault/pull/7549)]

BUG FIXES:
* agent: Fix handling of gzipped responses
  [[GH-7470](https://github.com/hashicorp/vault/pull/7470)]
* cli: Fix panic when pgp keys list is empty
  [[GH-7546](https://github.com/hashicorp/vault/pull/7546)]
* cli: Command timeouts are now always specified solely by the
  `VAULT_CLIENT_TIMEOUT`
  value. [[GH-7469](https://github.com/hashicorp/vault/pull/7469)]
* core: add hook for initializing seals for migration
  [[GH-7666](https://github.com/hashicorp/vault/pull/7666)]
* core (enterprise): Migrating from one auto unseal method to another never
  worked on enterprise, now it does.
* identity: Add required field `response_types_supported` to identity token
  `.well-known/openid-configuration` response
  [[GH-7533](https://github.com/hashicorp/vault/pull/7533)]
* identity: Fixed nil pointer panic when merging entities
  [[GH-7712](https://github.com/hashicorp/vault/pull/7712)]
* replication (Enterprise): Fix issue causing performance standbys nodes
  disconnecting when under high loads.
* secrets/azure: Fix panic that could occur if client retries timeout
  [[GH-7793](https://github.com/hashicorp/vault/pull/7793)]
* secrets/database: Fix bug in combined DB secrets engine that can result in
  writes to static-roles endpoints timing out
  [[GH-7518](https://github.com/hashicorp/vault/pull/7518)]
* secrets/pki: Improve tidy to continue when value is nil
  [[GH-7589](https://github.com/hashicorp/vault/pull/7589)]
* ui (Enterprise): Allow kv v2 secrets that are gated by Control Groups to
  be viewed in the UI
  [[GH-7504](https://github.com/hashicorp/vault/pull/7504)]

(he)

2020-09-10 21:57:27 UTC MAIN commitmail json YAML

chat/matrix-synapse: Add missing dependency for url_preview

(js)

2020-09-10 20:42:56 UTC MAIN commitmail json YAML

transifex-client: fix typo in DESCR.

(wiz)

2020-09-10 16:56:10 UTC MAIN commitmail json YAML

doc: Removed databases/ruby-arel80

(taca)

2020-09-10 16:55:51 UTC MAIN commitmail json YAML

databases/ruby-arel80: remove package

Remove one more package which is kept for rails51.

(taca)

2020-09-10 16:55:19 UTC MAIN commitmail json YAML

databases/Makefile: remove ruby-arel80

(taca)

2020-09-10 16:53:03 UTC MAIN commitmail json YAML

lang/ruby: drop support for Ruby on Rails 5.1

* Drop support for Ruby on Rails 5.1.
* Remove useless conditional (i.e. always true after remove of Rails 4.2).

(taca)

2020-09-10 16:50:55 UTC MAIN commitmail json YAML

doc: Removed devel/ruby-activesupport51

(taca)

2020-09-10 16:50:35 UTC MAIN commitmail json YAML

devel/ruby-activesupport51: remove package

Remove ruby-activesupport51 (Ruby on Rails 5.1.*) package which is EOL.

(taca)

2020-09-10 16:50:13 UTC MAIN commitmail json YAML

devel/Makefile: remove ruby-activesupport51

(taca)

2020-09-10 16:49:20 UTC MAIN commitmail json YAML

textproc/ruby-rails-dom-testing: drop support rails51

Drop support for rails51.

(taca)

2020-09-10 16:48:16 UTC MAIN commitmail json YAML

doc: Removed devel/ruby-activemodel51

(taca)

2020-09-10 16:47:58 UTC MAIN commitmail json YAML

devel/ruby-activemodel51: remove package

Remove ruby-activemodel51 (Ruby on Rails 5.1.*) package which is EOL.

(taca)

2020-09-10 16:47:34 UTC MAIN commitmail json YAML

devel/Makefile: remove ruby-activemodel51

(taca)

2020-09-10 16:46:39 UTC MAIN commitmail json YAML

doc: Removed devel/ruby-activejob51

(taca)

2020-09-10 16:46:24 UTC MAIN commitmail json YAML

devel/ruby-activejob51: remove package

Remove ruby-activejob51 (Ruby on Rails 5.1.*) package which is EOL.

(taca)

2020-09-10 16:45:44 UTC MAIN commitmail json YAML

devel/Makefile: remove ruby-activejob51

(taca)

2020-09-10 16:44:52 UTC MAIN commitmail json YAML

doc: Removed www/ruby-actionview51

(taca)

2020-09-10 16:44:34 UTC MAIN commitmail json YAML

www/ruby-actionview51: remove package

Remove ruby-actionview51 (Ruby on Rails 5.1.*) package which is EOL.

(taca)

2020-09-10 16:44:08 UTC MAIN commitmail json YAML

www/Makefile: remove ruby-actionview51

(taca)

2020-09-10 16:42:11 UTC MAIN commitmail json YAML

doc: Removed www/ruby-actionpack51

(taca)

2020-09-10 16:41:51 UTC MAIN commitmail json YAML

www/ruby-actionpack51: remove pacakge

Remove ruby-actionpack51 (Ruby on Rails 5.1.*) package which is EOL.

(taca)

2020-09-10 16:41:22 UTC MAIN commitmail json YAML

www/Makefile: remove ruby-actionpack51

(taca)

2020-09-10 16:40:25 UTC MAIN commitmail json YAML

doc: Removed www/ruby-actioncable51

(taca)

2020-09-10 16:40:03 UTC MAIN commitmail json YAML

www/ruby-actioncable51: remove package

Remove ruby-actioncable51 (Ruby on Rails 5.1.*) package which is EOL.

(taca)