Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kirussel/libarchive #15

Closed
wants to merge 2 commits into from
Closed

Kirussel/libarchive #15

wants to merge 2 commits into from

Conversation

kirussel
Copy link
Contributor

@kirussel kirussel commented Feb 7, 2015

I am adding test execution hooks to the libarchive Makefile to help reduce future libarchive regressions.

I noticed that libarchive-2.8.4nb4 does not work with iso files anymore. To reproduce this issue, you can run the libarchive tests:

$ cd /usr/pkgsrc/archivers/libarchive
$ bmake TEST_TARGET=check test
[...]
47: test_read_format_iso_gz                           FAIL

I noticed that libarchive-3.1.2 appears to work with iso files. To verify, you can run the libarchive tests:

$ cd /usr/pkgsrc/wip/libarchive
$ bmake TEST_TARGET=test test
[...]
100% tests passed, 0 tests failed out of 404

This effects OS X Yosemite users because the default bsdtar appears to have the same iso regression. So, I would like to use pkgsrc to get the latest working libarchive.

$ /usr/bin/bsdtar --version
bsdtar 2.8.3 - libarchive 2.8.3

@kirussel kirussel closed this Feb 21, 2015
@kirussel kirussel deleted the kirussel/libarchive branch February 21, 2015 16:51
jperkin pushed a commit that referenced this pull request May 18, 2018
Changelog:

2018-04-20 Alfred E. Heggestad

	* Version 0.5.3

	* Project URL: https://github.com/creytiv/rem

	* auresamp: avoid FIR filtering if ouput sample rate equals input (#15)

	* build: Update Windows project (#18) (thanks Encamy)

	* vid: vidframe_draw_point: correct endian for RGB32 (#16)
jperkin pushed a commit that referenced this pull request May 10, 2019
CHANGES:
This is a summary of changes between each release. See the commit log on
https://github.com/mlj/castget/commits/master for a details.

Version 1.2.4 (2017/05/17):

  * Fix build issues involving man pages (issue #20)

Version 1.2.3 (2017/05/16):

  * Fix lack of support for https (issue #10, issue #14, PR #15)
  * Fix broken handling of COLUMNS environment variable etc. (PR #16)
  * Improve error reporting when enclosure download fails
  * Check sanity of reported length of enclosures in feeds
  * Fix MacOS build
  * Replace ChangeLog and NEWS files with CHANGES file

Version 1.2.2 (2016/01/26):

  * Fix width of the progress bar.

Version 1.2.1 (2016/01/04):

  * Fix broken enclosure filenames.

Version 1.2.0 (2013/07/10):

  * Add command line option -p for an optional progress bar.
  * Add command line option --debug for optional connection debugging.
  * Use glib's option parsing.
  * Fix incorrect memory allocation when enclosure download fails.
  * Document proxy configuration.
jperkin pushed a commit that referenced this pull request Nov 24, 2020
1.0.3: not documented

1.0.2 (July 21, 2015)
* In the event of a NilAccept for the language, request.languages() would
  throw an AttributeError exception. Fixes #24.
* Encode Location HTTP header in redirect responses in UTF-8. Per
  RFC 3987. Refers to #15.
* Remove "Post Traceback" as it was a possible XSS vector with prior versions
  of WebError, and the PylonsHQ site is no longer in existence to support them.

1.0.1 (August 13th, 2012)
* No changes since RC1.

1.0.1RC1 (December 12, 2011)
* WARNING: pylons.lib.decorators has had two functions removed:
  ``determine_response_charset`` and ``encode_formencode_errors``.
* Updated dependencies to latest versions of Paste, PasteDeploy, and
  compatibility for the latest WebOb 1.2 betas.
* authenticate_form allows for GET. Patch by Domen Kožar.
* jsonify now properly sets charset to utf-8.
* Add ability for jsonify to handle objects with a __json__ attribute using
  custom JSONEncoder class similar to TG2. Patch by Bob Farrell.
* Added ability for __before__ to reference a callable function. Patch
  contributed by mverdone.
* Pulled in JSON-RPC support from agentultra's pylons fork.
* Apply patch for proper pylons.__version__ under Windows. Contributed by
  Christoph Zwerschke.
* Utilize MarkupSafe for faster HTML escaping.
* Fix signed cookies by using standard base64 alphabet, and prevent timing
  attacks on signature comparison.
* Added setup of app_globals and config to Pylons config.init_app to ensure
  as long as the Pylons application is loaded, the app_globals and config
  will be appropriately initialized.
* Documentation updates.
jperkin pushed a commit that referenced this pull request Nov 24, 2020
Switched to use go-module.mk.

CHANGES:

* agent: Agent now properly returns a non-zero exit code on error, such as
  one due to template rendering failure. Using error_on_missing_key in the
  template config will cause agent to immediately exit on failure. In order
  to make agent properly exit due to continuous failure from template
  rendering errors, the old behavior of indefinitely restarting the
  template server is now changed to exit once the default retry attempt of
  12 times (with exponential backoff) gets exhausted. [GH-9670]
* token: Periodic tokens generated by auth methods will have the period
  value stored in its token entry. [GH-7885]

* core: New telemetry metrics reporting mount table size and number of
  entries [GH-10201]
* go: Updated Go version to 1.15.4 [GH-10366]

FEATURES:

* Couchbase Secrets: Vault can now manage static and dynamic credentials
  for Couchbase. [GH-9664]
* Expanded Password Policy Support: Custom password policies are now
  supported for all database engines.
* Integrated Storage Auto Snapshots (Enterprise): This feature enables an
  operator to schedule snapshots of the integrated storage backend and
  ensure those snapshots are persisted elsewhere.
* Integrated Storage Cloud Auto Join: This feature for integrated storage
  enables Vault nodes running in the cloud to automatically discover and
  join a Vault cluster via operator-supplied metadata.
* Key Management Secrets Engine (Enterprise; Tech Preview): This new secret
  engine allows securely distributing and managing keys to Azure cloud KMS
  services.
* Seal Migration: With Vault 1.6, we will support migrating from an auto
  unseal mechanism to a different mechanism of the same type. For example,
  if you were using an AWS KMS key to automatically unseal, you can now
  migrate to a different AWS KMS key.
* Tokenization (Enterprise; Tech Preview): Tokenization supports creating
  irreversible “tokens” from sensitive data. Tokens can be used in less
  secure environments, protecting the original data.
* Vault Client Count: Vault now counts the number of active entities (and
  non-entity tokens) per month and makes this information available via the
  "Metrics" section of the UI.

IMPROVEMENTS:

* auth/approle: Role names can now be referenced in templated policies
  through the approle.metadata.role_name property [GH-9529]
* auth/aws: Improve logic check on wildcard BoundIamPrincipalARNs and
  include role name on error messages on check failure [GH-10036]
* auth/jwt: Add support for fetching groups and user information from G
  Suite during authentication. [GH-123]
* auth/jwt: Adding EdDSA (ed25519) to supported algorithms [GH-129]
* auth/jwt: Improve cli authorization error [GH-137]
* auth/jwt: Add OIDC namespace_in_state option [GH-140]
* secrets/transit: fix missing plaintext in bulk decrypt response [GH-9991]
* command/server: Delay informational messages in -dev mode until logs have
  settled. [GH-9702]
* command/server: Add environment variable support for
  disable_mlock. [GH-9931]
* core/metrics: Add metrics for storage cache [GH_10079]
* core/metrics: Add metrics for leader status [GH 10147]
* physical/azure: Add the ability to use Azure Instance Metadata Service to
  set the credentials for Azure Blob storage on the backend. [GH-10189]
* sdk/framework: Add a time type for API fields. [GH-9911]
* secrets/database: Added support for password policies to all databases
  [GH-9641, and more]
* secrets/database/cassandra: Added support for static credential rotation
  [GH-10051]
* secrets/database/elasticsearch: Added support for static credential
  rotation [GH-19]
* secrets/database/hanadb: Added support for root credential & static
  credential rotation [GH-10142]
* secrets/database/hanadb: Default password generation now includes
  dashes. Custom statements may need to be updated to include quotes around
  the password field [GH-10142]
* secrets/database/influxdb: Added support for static credential rotation
  [GH-10118]
* secrets/database/mongodbatlas: Added support for root credential rotation
  [GH-14]
* secrets/database/mongodbatlas: Support scopes field in creations
  statements for MongoDB Atlas database plugin [GH-15]
* seal/awskms: Add logging during awskms auto-unseal [GH-9794]
* storage/azure: Update SDK library to use azure-storage-blob-go since
  previous library has been deprecated. [GH-9577]
* secrets/ad: rotate-root now supports POST requests like other secret
  engines [GH-70]
* ui: Add ui functionality for the Transform Secret Engine [GH-9665]
* ui: Pricing metrics dashboard [GH-10049]

BUG FIXES:

* auth/jwt: Fix bug preventing config edit UI from rendering [GH-141]
* cli: Don't open or overwrite a raft snapshot file on an unsuccessful
  vault operator raft snapshot [GH-9894]
* core: Implement constant time version of shamir GF(2^8) math [GH-9932]
* core: Fix resource leak in plugin API (plugin-dependent, not all plugins
  impacted) [GH-9557]
* core: Fix race involved in enabling certain features via a license change
* identity: Check for timeouts in entity API [GH-9925]
* secrets/database: Fix handling of TLS options in mongodb connection
  strings [GH-9519]
* secrets/gcp: Ensure that the IAM policy version is appropriately set
  after a roleset's bindings have changed. [GH-93]
* ui: Mask LDAP bindpass while typing [GH-10087]
* ui: Update language in promote dr modal flow [GH-10155]
* ui: Update language on replication primary dashboard for clarity
  [GH-10205]
* core: Fix bug where updating an existing path quota could introduce a
  conflict. [GH-10285]
jperkin pushed a commit that referenced this pull request May 25, 2021
* Convert to use released tarball from GitHub.
* Fix build.
* Update DESCR.
* Take MAINTAINERship.

Changelog:
1.7.0
    Allow building without manpage
    Allow building against musl
    Fix memory corruption error
    Fix decompressing large files on 32-bit systems
    Avoid unaligned memory access
    Fix warnings with recent compilers
    Use optimized endian swapping functions on macOS

1.0.6
    fixes large file support for listing

1.0.5
    add htole64 and le64toh on glibc < 2.9

1.0.4
    Include man page in release tarball, fixed #50

1.0.3
    complete autotools build, see README.md for build instructions, see #37
    large-file support for 32-bit systems, see #26
    creates output file with permissions of input file (if possible, i.e. not reading from stdin), see #15
    better error messages on incorrect input path
    list main differences between pixz and xz in README
    fix issue with extreme (-e) command line option parsing, see #12
    adds keep input (-k) command line option, see #14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant