2022-07-21 13:31:23 by Thomas Klausner | Files touched by this commit (4) | |
Log message:
libfilezilla: update to 0.38.1.
0.38.1 (2022-07-20)
+ fz::aio_waitable now also accepts event handlers in addition to aio_waiter
- Split fz::process::kill into separate stop and kill functions
0.38.0 (2022-07-08)
+ Added readers and writers for asynchronous disk I/O operating on a buffer pool
+ Added fz::current_username()
+ Added fz::event_handler::stop_add_timer
+ Added overload for fz::event_handler::add_timer that takes a deadline
+ Added fz::file::set_modification_time
+ Added fz::get_network_interfaces
+ *nix: fz::socket can now accept Unix-domain sockets, added fz::socket::send_fd \
and fz::socke::read_fd
- *nix: When impersonating, limit supplementary groups to NGROUPS_MAX
|
2022-05-04 07:46:46 by Thomas Klausner | Files touched by this commit (4) | |
Log message:
libfilezilla: update to 0.37.2.
0.37.2 (2022-04-29)
+ Added a null_logger that doesn't do anything
- MSW: fz::mkdir with restricted permissions now uses inheritable ACLs
- MSW: Minor performance improvements reading from fz::process and explicit \
cancellation of pending I/O when killing child processes.
0.37.1 (2022-04-08)
+ Added convenience functions ot fz::json
- MSW: Fixed spawning fz::process with blocking communication
0.37.0 (2022-04-01)
+ *nix: password-less impersonation can take an optional group
+ Added demo https client showcasing usage of fz::socket and fz::tls_layer
+ Added some compile-time checks for fz::sprintf arguments
+ MSW: Added fz::registry
+ Added a way to use non-blocking read/write with fz::process
- Added fz::logger_interface::log_u which assumes string arguments are in UTF-8 \
as opposed to the character set used by the current locale
- Disallow spawning additional threads while fz::thread_pool is in the process \
of being destroyed
- *nix: poll() is now mandatory, the select() based socket event loop has been \
removed
- Simplified fz::socket implementation through use of internal fz::poller
|
2022-02-07 11:53:52 by Thomas Klausner | Files touched by this commit (2) |
Log message:
libfilezilla: add upstream bug report URL
|
2022-02-07 11:48:26 by Thomas Klausner | Files touched by this commit (4) | |
Log message:
libfilezilla: update to 0.36.0.
0.36.0 (2022-02-02)
+ Added parameter to tls_layer::set_alpn to control which peer has priority over \
which ALPN is chosen.
+ Added fz::hmac_sha1
+ Mutex debugging framework to detect locking order inversions that may lead to \
deadlocks
+ Add additional io_redirect mode to fz::process_spawn where the parent-side \
handles for stdin/out/err are always closed
- fz::json: Handle object members with empty string as name
- Minor performance improvements to removing timers and to spawning processes
0.35.0 (2021-12-08)
+ *nix: Added fz::forkblock which can be used to safely set FD_CLOEXEC on \
descriptors even if the system lacks SOCK_CLOCKEXEC, MSG_CMSG_CLOEXEC, pipe2 or \
accept4
+ macOS: Impersonation support
+ Added fz::tls_layer::set_unexpected_eof_cb, in some situations it may be \
desirable that unexpected closure is not reported as a hard errror
- Added various convenience overloads for fz::buffer
- Performance improvement for fz::json::to_string
0.34.2 (2021-10-26)
+ fz::file::open now returns fz::result
- fz::tls_layer: Additional fixes for trust path extration
- MSW: fz::local_filesys::get_next_file now handles directory contents returned \
by the kernel in oversized buffers with embedded nulls
0.34.1 (2021-10-19)
- *nix: Handle supplementary groups when impersonating
- *nix: fz::recv_fd now sets the MSG_CMSG_CLOEXEC flag
- *nix: fz::local_filesys::get_link_target now handles link targets larger than \
1024 bytes
- MSW: Restrict DLL search path for system DLLs to the system32 directory
- fz::tls_layer: Fixed how trust path extration interacts with CRLs
0.34.0 (2021-10-11)
- MSW: Load shell32.dll and ole32.dll on-demand at runtime, it is not available \
in all environments
- Made fz::local_filesys movable
0.33.0 (2021-09-29)
+ MSW: Add local_filesys::begin_find_files overload accepting a directory HANDLE
+ If peer certificate chain is trusted by the system trust store, \
tls_session_info::get_certificates now returns the actual path to the trust \
anchor, use tls_session_info::get_peer_certificates to get the peer certificates \
as received by the server. GnuTLS 3.7.0 or later is required.
- JSON: Correctly handle \u-encoded UTF-16 surrogate pairs
0.32.0 (2021-09-14)
+ MSW: Impersonation support
- Allow more direct control over session ticket/PSK generation under TLS 1.3, \
requires GnuTLS 3.6.14 or later
- Ensure an error is returned if accepting a socket fails
- Fixed appending to fz::buffer
0.32.0-beta1 (2021-08-30)
+ *nix: Impersonation support
+ *nix: Sending of file descriptors over Unix Domain Sockets
* nix: Add local_filesys::begin_find_files overload accepting a directory file \
descriptor
+ Allow creating fz::file from a file descriptors/handle, add function to detach \
the descriptor/handle
+ Added fz::datetime::operator>=
+ Added fz::duration::absolute()
- fz::sprintf no longer crashes on x and X conversion specifiers if a negative \
signed integer is passed as argument
- Replace std::random_device as the C++ standard allows it to not be random
- JSON: Fixed crash if assigning values from nested values
- JWS: Fixed memory leak and padding of signature components
|
2021-12-08 17:07:18 by Adam Ciarcinski | Files touched by this commit (3063) |
Log message:
revbump for icu and libffi
|
2021-10-26 13:07:15 by Nia Alarie | Files touched by this commit (958) |
Log message:
net: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Not committed (merge conflicts...):
net/radsecproxy/distinfo
The following distfiles could not be fetched (fetched conditionally?):
./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
|
2021-10-07 16:43:07 by Nia Alarie | Files touched by this commit (962) |
Log message:
net: Remove SHA1 hashes for distfiles
|
2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872) |
Log message:
revbump for boost-libs
|
2021-07-29 12:28:47 by Thomas Klausner | Files touched by this commit (3) | |
Log message:
libfilezilla: update to 0.31.0.
0.31.0 (2021-07-28)
+ Added simple JSON parser
+ Added basic JWS generator
- Made fz::file movable
- Fixed empty creation_flag for fz::file if other flags are also passed
0.30.0 (2021-07-09)
+ Added a flag to fz::file::creation_flags to create files with permissions only \
granting the current user and administrators access
+ Added mkdir_permissions flags to fz::mkdir
0.29.0 (2021-07-02)
+ Added fz::tls_layer::set_min_tls_ver and for testing purposes set_max_tls_ver
+ The TLS layer now also supports server-side session resumption with TLS <= \
1.2 clients not supporting session tickets
+ Added fz::rename_file
+ MSW: Added libfilezilla/glue/windows.hpp to set proper defines before \
including windows.h
+ Added fz::move_assign_through_move_constructor for classes that depend on \
normal destruction order even on move assignment
- Fixed memory leak in fz::tls_layer::set_alpn
- IPv6 listen sockets are now always created with IPV6_V6ONLY to unify behavior \
across platforms
- Fixes for issues found by --socketdebug
- Fixed warnings when bool arguments are passed to fz::sprintf
- Fixed warnings in fz::to_integral<bool>
0.28.0 (2021-05-03)
+ Added fz::hostname_lookup
+ Added fz::datetime::set_rfc3339
+ Added fz::load_certificates and fz::load_certificates_file
+ Added fz::base64_encode_append
- Moved some common functionality shared by multiple layers to socket_layer itself
- Fixed a crash with older versions of GnuTLS if the system trust store cannot \
be loaded
0.27.1 (2021-03-15)
- Fixed a socket event sequencing invariant violation in tls_layer
- Fixed query_string constructor leaving object in undefined state if set fails
- Fixed arguments passed from the templated equal_constime helper
|
2021-04-21 15:25:34 by Adam Ciarcinski | Files touched by this commit (864) |
Log message:
revbump for boost-libs
|