|Index||index by Group||index by Distribution||index by Vendor||index by creation date||index by Name||Mirrors||Help||Search|
|Name: glib-networking||Distribution: openSUSE Tumbleweed|
|Version: 2.72.0||Vendor: openSUSE|
|Release: 1.3||Build date: Wed Jun 15 06:15:33 2022|
|Group: Development/Libraries/C and C++||Build host: goat11|
|Size: 280553||Source RPM: glib-networking-2.72.0-1.3.src.rpm|
|Summary: Network-related GIO modules for glib|
This package contains network-related GIO modules for glib. Currently, there is only a proxy module based on libproxy.
* Tue Mar 22 2022 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.72.0: + Fix proxy tests. + GnuTLS: use IANA-style ciphersuite names with GnuTLS 3.7.4. + meson devenv. + Updated translations. * Fri Feb 11 2022 Bjørn Lie <email@example.com> - Update to version 2.72.beta: + Add environment variable proxy resolver. + OpenSSL: fix uninitialized memory use. * Fri Jan 07 2022 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.72.alpha: + OpenSSL: - Fix unsafe error handling. - Fail when appropriate if Must-Staple extension is set. + GnuTLS: fix TLS 1.3 ciphersuite names, should use underscores. + Improve failure of tls-unique channel binding requests. + Do not fill SNI extension with IP address. * Tue Jan 04 2022 Andreas Schwab <email@example.com> - Increase testsuite timeout * Mon Dec 06 2021 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.70.1: + Fix crashes when handshake is cancelled + OpenSSL: fix spurious certificate expired verification errors + GnuTLS: - Fix tests on 32-bit systems - Fix crash when invalid priority string is forced - Add check section and run meson_test macro during build. * Fri Sep 17 2021 Dominique Leuenberger <email@example.com> - Update to version 2.70.0: + Updated translations. * Thu Sep 16 2021 Stanislav Brabec <firstname.lastname@example.org> - Remove obsolete translation-update-upstream support (jsc#SLE-21105). * Fri Sep 03 2021 Dominique Leuenberger <email@example.com> - Update to version 2.70.rc: + gnutls: - revert AuthorityInformationAccess implementation for now. - fix use of non-default GTlsDatabases, Geary crash on startup. - fix leak in g_tls_certificate_gnutls_copy. - Unbreak GTLS_GNUTLS_CHECK_VERSION. + openssl: remove openssl-util. * Mon Aug 23 2021 Dominique Leuenberger <firstname.lastname@example.org> - Update to version 2.70.beta: + gnutls: Ensure that PKCS #11 pins are NUL terminated. + openssl: Restore OCSP support. * Fri Aug 06 2021 Dominique Leuenberger <email@example.com> - Update to version 2.70.alpha: + Fix TLS channel bindings tests. + Require OpenSSL 1.0.2. + Fix threadsafety issue in certificate verification. + dlopen libsoup for performing HTTP requests. + OpenSSL: add DTLS support, plus many related improvements. + Implement new GTlsCertificate details APIs. + GnuTLS: improve error handling for PIN failures. + GnuTLS: expose PIN type on PIN requests. + GnuTLS: check cancellable in pull timeout callback. + Improve automation of test certificate creation. + GnuTLS: use GnuTLS to implement all channel bindings. + GnuTLS: rework certificate verification to use TLS session. + GnuTLS: improve peer identity verification. + Bring back automatic downloading of missing intermediate certificates (not fixed, may go away again). * Fri Apr 30 2021 Dominique Leuenberger <firstname.lastname@example.org> - Update to version 2.68.1: + Fix threadsafety issue in certificate verification. + Temporarily remove support for downloading missing intermediate certificates with GnuTLS 3.7. * Sat Mar 20 2021 Michael Gorse <email@example.com> - Update to version 2.68.0: + Fix double free in GnuTLS client certificate request code. * Tue Mar 16 2021 Dominique Leuenberger <firstname.lastname@example.org> - Update to version 2.68.rc: + Improve heuristic for returning G_TLS_ERROR_CERTIFICATE_REQUIRED. + Fix check for certain handshake failure conditions. * Thu Jan 14 2021 Dominique Leuenberger <email@example.com> - Update to version 2.68.alpha: + Download and validate missing intermediate certificates (requires GnuTLS 3.7). + OpenSSL backend now uses system crypto policy. + Remove use of g_assert in testsuite. + Restore support for old versions of OpenSSL. + Implement TLS channel bindings API. + Implement PKCS#11 API. + Update testsuite for Fedora 33 crypto policy. + Fix NULL dereference in g_tls_connection_base_read_message. + Fix a couple code issues found by Coverity. * Mon Sep 14 2020 firstname.lastname@example.org - Update to version 2.66.0: + Updated translations. * Fri Sep 04 2020 email@example.com - Update to version 2.65.90: + Many fixes to OpenSSL backend. - Changes from version 2.65.1: + Fix peer-certificate[-errors] props set too soon. + Implement ALPN for OpenSSL backend. * Fri May 29 2020 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.64.3: + Revert warning when server-identity property is unset. + Fix CVE-2020-13645, fail connections when server identity is unset. * Wed Apr 15 2020 Bjørn Lie <email@example.com> - Update to version 2.64.2: + Reenable TLS 1.0/1.1 protocols due to COVID-19. + Fix build warning on Windows. * Sat Mar 28 2020 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.64.1: + Warn when server-identity property is missing. + Fix crashes in debug logs. + Fix write loop in OpenSSL backend. * Fri Mar 06 2020 email@example.com - Update to version 2.64.0: + Fix OpenSSL backend on RHEL 6. * Fri Feb 28 2020 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.63.92: + Revert fix for glgo#GNOME/glib-networking#127, which broke libsoup (glgo#GNOME/glib-networking#129). + Updated translations. * Tue Feb 18 2020 Dominique Leuenberger <email@example.com> - Update to version 2.63.91: + Fix peer-certificate properties changing too soon. + GnuTLS backend: reduce session resumption cache lifetime. + GnuTLS backend: restore TLS 1.2 support for copy session state. * Wed Feb 12 2020 firstname.lastname@example.org - Update to version 2.63.90: + Remove PKCS#11 support, deferred until next cycle. + Remove OpenSSL backend's OCSP support. - Changes from version 2.63.3: + Fix OpenSSL backend regressions and reenable OpenSSL testsuite. + Temporarily disable cancellation of sync handshakes. + Disable flaky test (#104) and resolve testsuite flakiness. + Fix regression where GnuTLS connection init could theoretically fail without error. - Changes from version 2.63.2: + Fix crash when handshake context is reset too late. + Require GnuTLS 3.6.5. + Build mock PKCS #11 module only for GnuTLS backend. + Rework session resumption support for TLS 1.3. + Run GnuTLS tests under TLS 1.2 in addition to TLS 1.3. + Support OpenSSL 1.0.1. + Drop rehandshake mode and protocol version fallback support. + Add logging functions. + Fix PKCS #11 tests with TLS 1.2. + Add more debug logging for PKCS #11. + Fix leak in GTlsCertificateGnutls finalizer. - Changes from version 2.63.1: + Add support for new PKCS#11 APIs to facilitate use with smartcards. + Disable TLS 1.0 and TLS 1.1 when using GnuTLS. + Fix threadsafety issue. * Sat Jan 25 2020 Dominique Leuenberger <email@example.com> - No longer recommend -lang: supplements are in use * Sun Jan 05 2020 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.62.3: + Fix leak of base iostream (or base datagram socket), 2.62 regression. + Fix duplicate notifies of peer-certificate and peer-certificate-errors. + Fix obscure corner case where SNI might not work. * Tue Dec 10 2019 Bjørn Lie <email@example.com> - Update to version 2.62.2: + Fix handshake_context crashes. * Sat Oct 05 2019 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.62.1: + Fix two memory leaks. * Sat Sep 07 2019 email@example.com - Update to version 2.62.0: + Revert broken queued data fix for glgo#GNOME/glib-networking#15. * Mon Sep 02 2019 Michael Gorse <firstname.lastname@example.org> - Update to version 2.61.92: + Discard queued data after interrupted writes. + Verify socket timeouts are respected. + Fix a couple broken error messages. + Changes in version 2.61.90: + Fix translations of certain error messages + Changes in version 2.61.2: + Improve certain handshake error messages. + Fix regressions introduced in 2.61.1. + Changes in version 2.61.1: + This release contains a major refactoring of the TLS codebase. The GnuTLS backend now shares the same base classes as the OpenSSL backend, to avoid duplicating as much code as possible. The base classes, previously used only by the OpenSSL backend and originally forked from glib-networking several years ago, have been enhanced to achieve feature-parity with the current state of the GnuTLS backend. Please note that the OpenSSL backend remains experimental. Further planned work is required before this backend will be production-ready. * Wed Aug 28 2019 email@example.com - Move LICENSE_EXCEPTION to %license. * Sun Jun 09 2019 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.60.3: + Fix clobbering of the thread-default main context after certificate verification failure during async handshakes since 2.60.1. + Fix GTlsDatabase initialization failures in OpenSSL backend due to uninitialized memory use. + Fix minor leak of ALPN protocols. * Fri May 03 2019 Bjørn Lie <email@example.com> - Update to version 2.60.2: + OpenSSL backend now defaults to system trust store. + Fix client auth failure error with GnuTLS 3.6.7 (bsc#1134795). - Drop 0001-gnutls-Handle-new-GNUTLS_E_CERTIFICATE_REQUIRED.patch: fixed upstream. * Fri Apr 05 2019 Vítězslav Čížek <firstname.lastname@example.org> - Handle new GnuTLS error GNUTLS_E_CERTIFICATE_REQUIRED + https://gitlab.gnome.org/GNOME/glib-networking/issues/70 + add 0001-gnutls-Handle-new-GNUTLS_E_CERTIFICATE_REQUIRED.patch * Tue Apr 02 2019 Bjørn Lie <email@example.com> - Update to version 2.60.1: + Improve reliability of client auth failure tests. + Fix excessive CPU usage after sync handshake. * Tue Mar 12 2019 Bjørn Lie <firstname.lastname@example.org> - Update to version 18.104.22.168: + Fix build with OpenSSL pkg-config unavailable. * Mon Mar 11 2019 Bjørn Lie <email@example.com> - Update to version 2.60.0: + This is the first stable release featuring the new OpenSSL backend. Please be advised that this new backend is still experimental and known to not work on some systems, including Debian. Linux distributions are encouraged to stick to the default build options, where OpenSSL is not yet enabled. + Fix build with GnuTLS disabled. * Tue Mar 05 2019 Bjørn Lie <firstname.lastname@example.org> - Update to version 2.59.92: + GnuTLS: reject sync operations during handshake to avoid deadlocks. + Temporarily disable DTLS and OpenSSL tests due to bugs. * Thu Feb 21 2019 email@example.com - Update to version 2.59.91: + Update OpenSSL SSL struct when certificate is changed. + Fix tests build when GnuTLS is disabled. + Remove Fedora-specific PROFILE=SYSTEM default cipher list. + Fix some problems with the connection tests. * Thu Feb 14 2019 firstname.lastname@example.org - Update to version 2.59.90: + This release adds an OpenSSL backend, obsoleting the glib-openssl project. + The OpenSSL backend seems to be mature, though it is less well-tested for desktop usage than the GnuTLS backend. It will remain disabled by default at build time due to the GPL-incompatible nature of the OpenSSL license -- and the GPLv2-incompatible nature of the Apache license that will be used by future versions of OpenSSL -- and because the GnuTLS backend is sufficient for Linux distros. + Use the OpenSSL backend if you are building an embedded system where (GPLv2+ or LGPLv3+) dependencies are unacceptable (e.g. nettle or GMP, both dependencies of GnuTLS) and you are OK with the GPL-incompatible OpenSSL license. If the OpenSSL backend is enabled at build time, you should probably disable build of the GnuTLS backend, or it will take precedence over the OpenSSL backend at runtime. * Tue Jan 08 2019 email@example.com - Update to version 2.59.2: + Add support for application layer protocol negotiation. * Sat Jan 05 2019 firstname.lastname@example.org - Update to version 2.59.1: + This release removes the gnutls-pkcs11 backend, which was disabled in 2.57.2, due to lack of any feedback whatsoever regarding its disablement. If you think it is still useful to you, given that the normal gnutls backend now supports PKCS#11, speak up now. + This release also includes several changes to properly support TLS 1.3. + Other changes: - Perform certificate verification during, not after, TLS handshake. - Dramatically improve the reliability of the non-DTLS tests. (DTLS is still having problems). - Regenerate test certificates to prepare for OpenSSL support. - Several meson build system improvements to prepare for OpenSSL support.
/usr/lib/gio/modules/libgioenvironmentproxy.so /usr/lib/gio/modules/libgiognomeproxy.so /usr/lib/gio/modules/libgiognutls.so /usr/lib/gio/modules/libgiolibproxy.so /usr/lib/systemd/user/glib-pacrunner.service /usr/libexec/glib-pacrunner /usr/share/dbus-1/services/org.gtk.GLib.PACRunner.service /usr/share/doc/packages/glib-networking /usr/share/doc/packages/glib-networking/NEWS /usr/share/doc/packages/glib-networking/README /usr/share/licenses/glib-networking /usr/share/licenses/glib-networking/COPYING /usr/share/licenses/glib-networking/LICENSE_EXCEPTION
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Jul 10 23:14:26 2022