Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

haproxy-devel, several fixes, pfSense 2.4 compatibility #186

Merged
merged 2 commits into from
Sep 13, 2016

Conversation

PiBa-NL
Copy link
Contributor

@PiBa-NL PiBa-NL commented Sep 8, 2016

No description provided.

@rbgarga
Copy link
Member

rbgarga commented Sep 13, 2016

It cannot be automatically merged. @PiBa-NL can you please rebase your fork?

@PiBa-NL
Copy link
Contributor Author

PiBa-NL commented Sep 13, 2016

Rebase done :) was already busy on that when i added my second commit, i saw it couldn't merge anymore.

@netgate-git-updates netgate-git-updates merged commit a41d1ab into pfsense:devel Sep 13, 2016
netgate-git-updates pushed a commit that referenced this pull request Oct 16, 2016
Broker
  Fix TLS operation with websockets listeners and libwebsockets 2.x. Closes
  #186.
  Don.t disconnect client on HUP before reading the pending data. Closes #7.
  Fix some $SYS messages being incorrectly persisted. Closes #191.
  Support OpenSSL 1.1.0.
  Call fsync after persisting data to ensure it is correctly written. Closes
  #189.
  Fix persistence saving of subscription QoS on big-endian machines.
  Fix will retained flag handling on Windows. Closes #222.
  Broker now displays an error if it is unable to open the log file. Closes
  #234.

Client library
  Support OpenSSL 1.1.0.
  Fixed the C++ library not allowing SOCKS support to be used. Closes #198.
  Fix memory leak when verifying a server certificate with a subjectAltName
  section. Closes #237.

Build
  Don.t attempt to install docs when WITH_DOCS=no. Closes #184.

PR:		213532
Submitted by:	ohauer
Approved by:	maintainer <joe@thrallingpenguin.com>
MFH:		2016Q4
netgate-git-updates pushed a commit that referenced this pull request Oct 18, 2016
- update to 1.4.10

Broker
  Fix TLS operation with websockets listeners and libwebsockets 2.x. Closes
  #186.
  Don.t disconnect client on HUP before reading the pending data. Closes #7.
  Fix some $SYS messages being incorrectly persisted. Closes #191.
  Support OpenSSL 1.1.0.
  Call fsync after persisting data to ensure it is correctly written. Closes
  #189.
  Fix persistence saving of subscription QoS on big-endian machines.
  Fix will retained flag handling on Windows. Closes #222.
  Broker now displays an error if it is unable to open the log file. Closes
  #234.

Client library
  Support OpenSSL 1.1.0.
  Fixed the C++ library not allowing SOCKS support to be used. Closes #198.
  Fix memory leak when verifying a server certificate with a subjectAltName
  section. Closes #237.

Build
  Don.t attempt to install docs when WITH_DOCS=no. Closes #184.

PR:		213532
Submitted by:	ohauer
Approved by:	maintainer <joe@thrallingpenguin.com>

Approved by:	ports-secteam (feld)
netgate-git-updates pushed a commit that referenced this pull request Dec 2, 2016
- update to 1.4.10

Broker
  Fix TLS operation with websockets listeners and libwebsockets 2.x. Closes
  #186.
  Don.t disconnect client on HUP before reading the pending data. Closes #7.
  Fix some $SYS messages being incorrectly persisted. Closes #191.
  Support OpenSSL 1.1.0.
  Call fsync after persisting data to ensure it is correctly written. Closes
  #189.
  Fix persistence saving of subscription QoS on big-endian machines.
  Fix will retained flag handling on Windows. Closes #222.
  Broker now displays an error if it is unable to open the log file. Closes
  #234.

Client library
  Support OpenSSL 1.1.0.
  Fixed the C++ library not allowing SOCKS support to be used. Closes #198.
  Fix memory leak when verifying a server certificate with a subjectAltName
  section. Closes #237.

Build
  Don.t attempt to install docs when WITH_DOCS=no. Closes #184.

PR:		213532
Submitted by:	ohauer
Approved by:	maintainer <joe@thrallingpenguin.com>

Approved by:	ports-secteam (feld)
netgate-git-updates pushed a commit that referenced this pull request Sep 13, 2017
Feature request #86: Change meaning of "RequiredHeaders" such that
	header validity is always checked, but messages are only
	rejected on that basis when the flag is set.  Based
	on a patch from Andreas Schulze.
Feature request #127: Log SPF results when rejecting.  Requested
	by Patrick Wagner; patch from Andreas Schulze, follow-up
	patch from Juri Haberland.
Feature request #138: Inculde policy and disposition information
	in an Authentication-Results comment.  Based on a patch
	from Juri Haberland.
Feature request #139: Include the client host name if known
	in failure reports.  Suggested by Roland Turner;
	patch by Andreas Schulze.
Fix bug #95: Assume IPv6 for SPF operations.  Patch from Juri Haberland.
Fix bug #120: Fix control logic around the SPF result.
	Reported by Christophe Wolfhugel; patch from Andreas Schulze.
Fix bug #122: Don't skip the HELO milter phase when SPF is enabled.
	Reported by Christophe Wolfhugel.
Fix bug #157: Fix logging of implicit authserv-ids.  Reported
	by Andreas Schulze; patch from Juri Haberland.
Fix bug #158: Log ignored connections.  Patch from Andreas Schulze.
Fix bug #160: Fix "SyslogFacility" handling.  Patch from
	Juri Haberland.
Fix bug #163: Use a larger buffer for the raw MAIL FROM value.
	Based on a patch from Andreas Schulze.
Fix bug #174: Trim "!" suffixes from reporting addresses.  Problem
	noted by Juri Haberland.
Fix bug #186: When reloading the configuration file, the public
	suffix list was read in with the wrong comment indicator.
	Patch from Federico Omoto.
LIBOPENDMARC: Fix bug #115: Fix type mismatch.  Patch from
	Sebastian A. Siewior via Scott Kitterman.
LIBOPENDMARC: Fix bug #121: Fix IPv6 CIDR matching in SPF code.
	Patch from Christophe Wolfhugel.
LIBOPENDMARC: Fix bug #125: Compile time IPv6 fix.  Reported by
	Christophe Wolfhugel.
LIBOPENDMARC: Fix bug #131: Fix alignment bug.  Patch from
	Andreas Schulze.
LIBOPENDMARC: Fix bug #147: Fix stripping of whitespace from
	DMARC DNS records.  Based on a patch from Job Noorman.
LIBOPENDMARC: Fix bug #149: Apply "sp" setting, if present and
	applicable.  Patch from Petr Novak.
LIBOPENDMARC: Fix bug #154: Fix "rf" and "fo" processing logic.
LIBOPENDMARC: Fix bug #156: Fix variable name.  Patch by
	Andreas Schulze.
LIBOPENDMARC: Fix bug #165: Fix logic in checking which SPF
	identifier was used.  Patches from Marco Favero and
	Juri Haberland.
LIBOPENDMARC: Fix bug #167: Don't return "fail" when we should
	return "none".  Patch from Marco Favero.
REPORTS: Fix bug #134: Handle SMTP errors correctly.  Patch from
	Andreas Schulze.
REPORTS: Fix bug #141: Set the HELO parameter correctly.
	Reported by Alan Smith; patch from Andreas Schulze.
REPORTS: Fix bug #143: Fix logic in table truncation.
	Reported by Wayne Andersen; patch from Juri Haberland.
REPORTS: Fix bug #162: Always report "sp" in aggregate reports.
	Patch from Juri Haberland.
REPORTS: Fix bug #166: Fix report start/end time logic.
	Patch from Juri Haberland.
REPORTS: Fix bug #188: Don't delete inputs too early in
	opendmarc-reports.  Patch from Juri Haberland.
TOOLS: Fix bug #161: "Forensic" reports were renamed "Failure"
	reports.  Patch from Andreas Schulze.
TOOLS: Fix bug #164: Handle IPv6 test addresses.  Reported by
	Andreas Schulze; patch from Juri Haberland.
DOCS: Patch #189: Replace the DMARC RFC with an HTML page
	referencing the relevant specs, since Debian doesn't
	consider RFCs to be "free".  Patch from Scott Kitterman
	via Juri Haberland.

PR:		220902
Submitted by:	Dan Mahoney <freebsd@gushi.org> (maintainer), Lukasz Wasikowski <lukasz@wasikowski.net>
netgate-git-updates pushed a commit that referenced this pull request Jun 15, 2020
Build now explicitly requires gmake

per https://github.com/yaml/libyaml/releases/tag/0.2.5
the following changes have been made

- #105
  Allow question marks in plain scalars in flow collections

- #186
  Emitter: Don't output trailing space for empty scalar nodes

- #185
  Emitter: Output space after an alias mapping key

- #187
  Add -h and --flow (on|off|keep) to run-*-test-suite

- #182
  Remove unnecessary include and malloc

- #177
  Add specific files back to .gitignore

- #181
  Output error position in run-parser-test-suite.c

- #191
  A couple patches to improve test suite support

- #179
  Flow indicators can not be part of local or shorthand tags

PR:	247043
Submitted by:	daniel.engberg.lists@pyret.net
netgate-git-updates pushed a commit that referenced this pull request Aug 4, 2022
Unbreaks port

upstream notes:
Bugfixes:

    Resolves issue with waterfall appearing garbled on some systems. (PR #205)
    Resolves issue with Restore Defaults restoring previous settings on exit. (PR #207)
    Resolves issue with some sound valid sound devices causing PortAudio errors during startup checks. (PR #192)

Enhancements:

    Removes requirement to restart FreeDV after using Restore Defaults. (PR #207)
    Hides frequency display on main window unless PSK Reporter reporting is turned on. (PR #207)
    Scales per-mode squelch settings when in multi-RX mode to reduce unwanted noise. (PR #186)
    Single-thread mode is now the default when multi-RX is turned on. (PR #175)
    Makes multi-RX mode the default. (PR #175)
    Mic In/Speaker Out volume controls added to Filter window. (PR #208)
    Cleans up UI for filters and makes the dialog non-modal. (PR #208)
    Adds optional support for PulseAudio on Linux systems. (PR #194)

Documentation:

    Resolves issue with PDF image placement. (PR #203)

Build System:

    Uses more portable way of referring to Bash in build scripts. (PR #200)
    User manual now installed along with executable. (PR #187)
    macOS app bundle generated by CMake instead of manually. (PR #184)
    Fail as soon as a step in the build script fails. (PR #183)

PR:		ports/264769
Reported by:	castilloeduardo@outlook.com.ar
Tested by:	castilloeduardo@outlook.com.ar
netgate-git-updates pushed a commit that referenced this pull request Mar 28, 2023
v1.8.5 (2023-02-02)

    [#186] Simplify gem configuration reusing Doorkeeper configuration option DSL (thanks to @nbulaj).
    [#182] Drop support for Ruby 2.6 and Rails 5 (thanks to @sato11).
    [#188] Fix dookeeper-jwt compatibility (thanks to @zavan).

v1.8.4 (2023-02-01)

    [#177] Replace json-jwt with ruby-jwt to align with doorkeeper-jwt (thanks to @kristof-mattei).
    [#185] Don't call active_record_options for Doorkeeper >= 5.6.3 (thanks to @zavan).
    [#183] Stop render consent screen when user is not logged-in (thanks to @nov).

Changelog:
https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md

Fixes also a problem with www/gitlab-ce:
rake aborted!
NoMethodError: undefined method `active_record_options' for #<Doorkeeper::Config:0x000000081fb0f0c8 @Orm=:active_record, @default_generator_method=:hex, @authenticate_resource_owner=#<Proc:0x000000081fb0ed80 /usr/local/www/gitlab-ce/config/initializers/doorkeeper.rb:13>, @resource_owner_from_credentials=#<Proc:0x000000081fb0ec68 /usr/local/www/gitlab-ce/config/initializers/doorkeeper.rb:25>, @refresh_token_enabled=true, @enforce_configured_scopes=true, @force_ssl_in_redirect_uri=false, @forbid_redirect_uri=#<Proc:0x000000081fb0ea10 /usr/local/www/gitlab-ce/config/initializers/doorkeeper.rb:67>, @enable_application_owner=true, @default_scopes=#<Doorkeeper::OAuth::Scopes:0x000000081fb17e30 @scopes=["api"]>, @optional_scopes=#<Doorkeeper::OAuth::Scopes:0x000000081fb177f0 @scopes=["read_api", "read_user", "read_repository", "write_repository", "sudo", "openid", "profile", "email"]>, @access_token_methods=[:from_access_token_param, :from_bearer_authorization, :from_bearer_param], @token_secret_strategy=Gitlab::DoorkeeperSecretStoring::Token::Pbkdf2Sha512, @token_secret_fallback_strategy=Doorkeeper::SecretStoring::Plain, @application_secret_strategy=Gitlab::DoorkeeperSecretStoring::Secret::Pbkdf2Sha512, @application_secret_fallback_strategy=Doorkeeper::SecretStoring::Plain, @grant_flows=["authorization_code", "password", "client_credentials"], @skip_authorization=#<Proc:0x000000081fb1ce58 /usr/local/www/gitlab-ce/config/initializers/doorkeeper.rb:109>, @base_controller="::Gitlab::BaseDoorkeeperController", @skip_client_authentication_for_password_grant=true, @application_model=Doorkeeper::Application(id: integer, name: string, uid: string, secret: string, redirect_uri: text, scopes: string, created_at: datetime, updated_at: datetime, owner_id: integer, owner_type: string, trusted: boolean, confidential: boolean, expire_access_tokens: boolean), @access_grant_model=Doorkeeper::AccessGrant(id: integer, resource_owner_id: integer, application_id: integer, token: string, expires_in: integer, redirect_uri: text, created_at: datetime, revoked_at: datetime, scopes: string, code_challenge: text, code_challenge_method: text), @access_token_model=Doorkeeper::AccessToken(id: integer, resource_owner_id: integer, application_id: integer, token: string, refresh_token: string, expires_in: integer, revoked_at: datetime, created_at: datetime, scopes: string)>

          if Doorkeeper.configuration.active_record_options[:establish_connection]
                                     ^^^^^^^^^^^^^^^^^^^^^^
/usr/local/www/gitlab-ce/config/environment.rb:7:in `<top (required)>'
Tasks: TOP => db:migrate => db:load_config => environment
(See full trace by running task with --trace)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants