Changelog:
v2.6.3:
-------
- We have eight control presets which got some standard names.
Feel free to save you favorite settings there
- Control Overlay for touch devices now have individual height and width settings
- Bug fixes in the Keen dreams engine
- Crash fixes
- Readme updates
v2.6.2:
-------
- More sounds are now played
- Collision fixes
- AI fixes
- Added 5 control presets which can be saved and loaded. Enjoy :-)
v2.6.1:
-------
- More lua support. Oblivion v1.4 fully working
- More crash fixes, especially for Keen 6 DEMO
v2.6:
-----
- Fixing mute music after saving a game
- Added PC Speaker Volume option
v20.2.1 (2020-11-23)
No significant changes.
v20.2.0 (2020-11-21)
Features - 20.2.0
* Optionally skip VCS ignore directive for entire virtualenv directory,
using option :option:`no-vcs-ignore`, by default False.
* Add --read-only-app-data option to allow for creation based on an
existing app data cache which is non-writable. This may be useful (for
example) to produce a docker image where the app-data is pre-populated.
BREAKING CHANGES:
* agent: The enable_central_service_config option now defaults to
true. [GH-8746]
* connect: Switch the default gateway port from 443 to 8443 to avoid
assumption of Envoy running as root. [GH-9113]
* connect: Update Envoy metrics names and labels for proxy listeners so
that attributes like datacenter and namespace can be extracted. [GH-9207]
* connect: intention destinations can no longer be reassigned [GH-8834]
* raft: Raft protocol v2 is no longer supported. If currently using
protocol v2 then an intermediate upgrade to a version supporting both v2
and v3 protocols will be necessary (1.0.0 - 1.8.x). Note that the Raft
protocol configured with the raft_protocol setting and the Consul RPC
protocol configured with the protocol setting and output by the consul
version command are distinct and supported Consul RPC protocol versions are
not altered. [GH-9103]
* sentinel: (Consul Enterprise only) update to v0.16.0, which replaces
whitelist and blacklist with allowlist and denylist
* server: (Enterprise only) Pre-existing intentions defined with
non-existent destination namespaces were non-functional and are erased
during the upgrade process. This should not matter as these intentions had
nothing to enforce. [GH-9186]
* server: (OSS only) Pre-existing intentions defined with either a source
or destination namespace value that is not "default" are rewritten or
deleted during the upgrade process. Wildcards first attempt to downgrade to
"default" unless an intention already exists, otherwise these
non-functional intentions are deleted. [GH-9186]
* xds: Drop support for Envoy versions 1.12.0, 1.12.1, 1.12.2, and 1.13.0,
due to a lack of support for url_path in RBAC. [GH-8839]
SECURITY:
* Fix Consul Enterprise Namespace Config Entry Replication DoS. Previously
an operator with service:write ACL permissions in a Consul Enterprise
cluster could write a malicious config entry that caused infinite raft
writes due to issues with the namespace replication logic. [CVE-2020-25201]
[GH-9024]
* Increase the permissions to read from the /connect/ca/configuration
endpoint to operator:write. Previously Connect CA configuration, including
the private key, set via this endpoint could be read back by an operator
with operator:read privileges. CVE-2020-28053 [GH-9240]
FEATURES:
* agent: Add a new RPC endpoint for streaming cluster state change events
to clients.
* agent: Allow client agents to be configured with an advertised reconnect
timeout to control how long until the nodes are reaped by others in the
cluster. [GH-8781]
* agent: moved ui config options to a new ui_config stanza in agent
configuration and added new options to display service metrics in the
UI. [GH-8694]
* agent: return the default ACL policy to callers as a header [GH-9101]
* autopilot: A new /v1/operator/autopilot/state HTTP API was created to
give greater visibility into what autopilot is doing and how it has
classified all the servers it is tracking. [GH-9103]
* autopilot: Added a new consul operator autopilot state command to
retrieve and view the Autopilot state from consul. [GH-9142]
* cli: update snapshot inspect command to provide more detailed snapshot
data [GH-8787]
* connect: support defining intentions using layer 7 criteria [GH-8839]
* telemetry: add initialization and definition for non-expiring key metrics
in Prometheus [GH-9088]
* telemetry: track node and service counts and emit them as metrics
[GH-8603]
* ui: If Prometheus is being used for monitoring the sidecars, the topology
view can be configured to display overview metrics for the
services. [GH-8858]
* ui: Services using Connect with Envoy sidecars have a topology tab in the
UI showing their upstream and downstream services. [GH-8788]
* xds: use envoy's rbac filter to handle intentions entirely within envoy
[GH-8569]
IMPROVEMENTS:
* agent: Return HTTP 429 when connections per clients
limit (limits.http_max_conns_per_client) has been reached. [GH-8221]
* agent: add path_allowlist config option to restrict metrics proxy queries
[GH-9059]
* agent: allow the /v1/connect/intentions/match endpoint to use the agent
cache [GH-8875]
* agent: protect the metrics proxy behind ACLs [GH-9099]
* api: The v1/connect/ca/roots endpoint now accepts a pem=true query
parameter and will return a PEM encoded certificate chain of all the
certificates that would normally be in the JSON version of the
response. [GH-8774]
* api: support GetMeta() and GetNamespace() on all config entry kinds
[GH-8764]
* autopilot: (Enterprise Only) Autopilot now supports using both Redundancy
Zones and Automated Upgrades together. [GH-9103]
* checks: add health status to the failure message when gRPC healthchecks
fail. [GH-8726]
* chore: Update to Go 1.15 with mitigation for golang/go#42138 [GH-9036]
* command: remove conditional envoy bootstrap generation for versions
<=1.10.0 since those are not supported [GH-8855]
* connect: The Vault provider will now automatically renew the lease of the
token used, if supported. [GH-8560]
* connect: add support for specifying load balancing policy in
service-resolver [GH-8585]
* connect: intentions are now managed as a new config entry kind
"service-intentions" [GH-8834]
* raft: Update raft to v1.2.0 to prevent non-voters from becoming eligible
for leader elections and adding peer id as metric label to reduce
cardinality in metric names [GH-8822]
* server: (Consul Enterprise only) ensure that we also shutdown network
segment serf instances on server shutdown [GH-8786]
* server: break up Intention.Apply monolithic method [GH-9007]
* server: create new memdb table for storing system metadata [GH-8703]
* server: make sure that the various replication loggers use consistent
logging [GH-8745]
* server: remove config entry CAS in legacy intention API bridge code
[GH-9151]
* snapshot agent: Deregister critical snapshotting TTL check if leadership
is transferred.
* telemetry: All metrics should be present and available to prometheus
scrapers when Consul starts. If any non-deprecated metrics are missing
please submit an issue with its name. [GH-9198]
* telemetry: add config flag telemetry { disable_compat_1.9 = (true|false)
} to disable deprecated metrics in 1.9 [GH-8877]
* telemetry: add counter consul.api.http with labels for each HTTP path and
method. This is intended to replace consul.http... [GH-8877]
* ui: Add the Upstreams and Exposed Paths tabs for services in mesh
[GH-9141]
* ui: Moves the Proxy health checks to be displayed with the Service health
check under the Health Checks tab [GH-9141]
* ui: Upstream and downstream services in the topology tab will show a
visual indication if a deny intention or intention with L7 policies is
configured. [GH-8846]
* ui: add dashboard_url_template config option for external dashboard links
[GH-9002]
DEPRECATIONS:
* Go 1.15 has dropped support for 32-bit binaries for Darwin, so darwin_386
builds will not be available for any 1.9.x+ releases. [GH-9036]
* agent: ui, ui_dir and ui_content_path are now deprecated for use in agent
configuration files. Use ui_config.{enable, dir, content_path} instead. The
command arguments -ui, -ui-dir, and -ui-content-path remain
supported. [GH-8694]
* telemetry: The measurements in all of the consul.http... prefixed metrics
have been migrated to consul.api.http. consul.http... prefixed metrics will
be removed in a future version of Consul. [GH-8877]
* telemetry: the disable_compat_1.9 config will cover more metrics
deprecations in future 1.9 point releases. These metrics will be emitted
twice for backwards compatibility - if the flag is true, only the new
metric name will be written. [GH-9181]
BUG FIXES:
* agent: make the json/hcl decoding of ConnectProxyConfig fully work with
CamelCase and snake_case [GH-8741]
* agent: when enable_central_service_config is enabled ensure agent reload
doesn't revert check state to critical [GH-8747]
* api: Fixed a bug where the Check.GRPCUseTLS field could not be set using
snake case. [GH-8771]
* autopilot: (Enterprise Only) Previously servers in other zones would not
be promoted when all servers in a second zone had failed. Now the actual
behavior matches the docs and autopilot will promote a healthy non-voter
from any zone to replace failure of an entire zone. [GH-9103]
* autopilot: Prevent panic when requesting the autopilot health immediately
after a leader is elected. [GH-9204]
* command: when generating envoy bootstrap configs use the datacenter
returned from the agent services endpoint [GH-9229]
* connect: Fixed an issue where the Vault intermediate was not renewed in
the primary datacenter. [GH-8784]
* connect: fix Vault provider not respecting IntermediateCertTTL [GH-8646]
* connect: fix connect sidecars registered via the API not being
automatically deregistered with their parent service after an agent restart
by persisting the LocallyRegisteredAsSidecar property. [GH-8924]
* connect: use stronger validation that ingress gateways have compatible
protocols defined for their upstreams [GH-8470]
* license: (Enterprise only) Fixed an issue where the UI would see
Namespaces and SSO as licensed when they were not.
* license: (Enterprise only) Fixed an issue where warnings about Namespaces
being unlicensed would be emitted erroneously.
* namespace: (Enterprise Only) Fixed a bug that could case snapshot
restoration to fail when it contained a namespace marked for deletion while
still containing other resources in that namespace. [GH-9156]
* namespace: (Enterprise Only) Fixed an issue where namespaced services and
checks were not being deleted when the containing namespace was deleted.
* raft: (Enterprise only) properly update consul server meta non_voter for
non-voting Enterprise Consul servers [GH-8731]
* server: skip deleted and deleting namespaces when migrating intentions to
config entries [GH-9186]
* telemetry: fixed a bug that caused logs to be flooded with [WARN]
agent.router: Non-server in server-only area [GH-8685]
* ui: show correct datacenter for gateways [GH-8704]
* [Breaking] Change implementation of character variants to cv## and
alternate substitutions.
* [Breaking] Change the building configuration format -- now we use dicts
instead of “array of styles”.
* [Breaking] Cleanup of weight levels and increase contrast under heavier
weights.
* [Breaking] Remove WOFF 1 web font building.
* [Breaking] Release packages will now be divided by formats.
* Add Characters:
* Derived bold, italic, sans-serif, typewriter, and double-struck letters
/ digits, in Mathematical Alphanumeric Symbols block.
* Half-filled stars (U+2BE8 ... U+2BEB).
* U+0462 CYRILLIC CAPITAL LETTER YAT and U+0463 CYRILLIC SMALL LETTER
YAT.
* U+1D6A4 MATHEMATICAL ITALIC SMALL DOTLESS I, U+1D6A5 MATHEMATICAL
ITALIC SMALL DOTLESS J.
* U+23CF EJECT SYMBOL.
* Add Variants:
* u/toothless-corner.
* Curly variants of Z / z.
* Toothless-corner variant of G and Ampersand (&).
* Update ss09 style for capital G to Toothless.
* Add ligation set for Verilog.
* Add more alternative exclamation-related ligation sets (exeqeq-dotted,
eqexeq-dotted, eqexeq-dl-dotted).
* Fix the shape of hook-top V's.
* Make check and cross marks wide-aware.
* Fix middle bar placement of U+2180 under quasi-proportional.
* Correct description of 1 variants.
* Fix broken Bulgarian localization of Cyrillic Small Sha and Cyrillic
Capital El.
* Fix broken serif shapes in Italic Cyrillic Small I.
* Fix incorrect serifs of Greek Small Rho.
* Fix inconsistent italic serif of U+0463 CYRILLIC SMALL LETTER YAT.
* Fix inconsistent serif on Bulgarian U+044E CYRILLIC SMALL LETTER
YU.
* Fix variant application on italic Cyrillic Small Te and Cyrillic Small
I.
* Fix variant application on fraction 1/10 (U+2152).
* Fix variant application on LATIN SMALL LETTER WITH STROKE (U+0167).
* Fix centering of Q variants when occurred in enclosures.
* Fix broken descender connection of cyrl/tse (U+0446) under Italic.
* Fix missing serifs in earless-corner m variants.
* Remove slight curvature of italic single-storey a.
* Fix kerned dotty operators' placement when placed near brackets and
commas.
2.9.2 - 2020-11-25
Fixes
* Fix default value for types_or so symlink and directory can be matched
2.9.1 - 2020-11-25
Fixes
* Improve error message for "hook goes missing"
* Add warning for /* in files / exclude regexes
* Fix healthy() check for language: python on windows when the base executable has non-ascii characters.
2.9.0 - 2020-11-21
Features
* Add types_or which allows matching multiple disparate types in a hook
* Add Github Sponsors / Open Collective links
Fixes
* Improve cleanup for language: dotnet
* Fix "xargs" when running windows batch files
* Fix conflict with external rbenv and language_version: default
* Improve performance of git status / git diff commands by ignoring submodules
mpv is a movie player based on MPlayer and mplayer2. It supports
a wide variety of video file formats, audio and video codecs, and
subtitle types.
Intended to be used to update multimedia/mpv.
existing.
Require python2.7, because python 3.x has a header called context.h
that ends up getting included before the package's context.h.
let's build with clang support, it got detected because I had the
executable, but we probably want it anyway (it's an IDE).
of BearSSL.
libtls shares some of the same goals as BearSSL: it is also consistent,
secure by default, and well documented. However, it is also a
higher-level API that is designed to be easy to use for many common
situations.
CLI tool to perform spell checking.
Rust implementation of Peter Norvig's Spell Corrector.
The default file contains ~30k unique words and is included in the crate.
Currently stava only supports the English alphabet.
IMAPFilter 2.7.4 - 18 Nov 2020
- Bug fix; incorrect argument to regular expression compile function.
IMAPFilter 2.7.3 - 14 Nov 2020
- Bug fix; incorrect free of compiled pattern.
- Unexpected network errors and IMAP BYE are now logged.
IMAPFilter 2.7.2 - 10 Nov 2020
- Makefile is back to being Lua version agnostic.
IMAPFilter 2.7.1 - 9 Nov 2020
- Makefile now builds with Lua 5.4 and PCRE2.
IMAPFilter 2.7 - 8 Nov 2020
- Lua 5.4 compatibility (the codebase can still be compiled with versions
5.3, 5.2 and 5.1).
- PCRE2 compatibility (version 10.00 and later)
- New error code is returned if certificate verify fails.
- Bug fix; add missing truststore option from brief usage message.
IMAPFilter 2.6.16 - 23 Nov 2019
- Bug fix; escape the double-quote character in passwords.
IMAPFilter 2.6.15 - 14 Nov 2019
- Bug fix; try to setup both a CA file and path for SSL validations.
IMAPFilter 2.6.14 - 1 Nov 2019
- Bug fix; OpenSSL version mess up for SSL hostname validation.
IMAPFilter 2.6.13 - 17 Sep 2019
- Support for SSL hostname validation.
IMAPFilter 2.6.12 - 3 Oct 2018
- Support for Server Name Indication (SNI).
- The searching methods return values are described in the config man page.
- Example of using the enter_idle() function in the sample extend file.
IMAPFilter 2.6.11 - 19 Nov 2017
- Support for interrupting IDLE mode with SIGUSR1/SIGUSR2.
- New "persist" option to try to recover a connection indefinitely.
- New "range" option to limit messages included in a range.
- Bug fix; always close selected mailbox before check_status().
- Bug fix; closing of selected mailbox twice with fetch_message().
Changelog:
phpredis 5.3.2
* Use "%.17g" sprintf format for doubles as done in Redis server.
* Allow to pass NULL as RedisCluster stream context options.
---
phpredis 5.3.2RC2
---
* Verify SET options are strings before testing them as strings
---
phpredis 5.3.2RC1
---
* Fix cluster segfault when dealing with NULL multi bulk replies in
RedisCluster
* Fix xReadGroup() must return message id
* Fix memory leak in rediscluster session handler
* Fix XInfo() returns false if the stream is empty
* Relax requirements on set's expire argument
* Refactor redis_sock_check_liveness
* PHP8 compatibility
* Update documentation
* Add Redis::OPT_NULL_MULTIBULK_AS_NULL setting to treat NULL multi bulk
replies as NULL instead of [].
* Allow to specify stream context for rediscluster session handler
* Add new parameter to RedisCluster to specify stream ssl/tls context.
* Add new parameter to RedisSentinel to specify auth information
Changes in version 0.4.5.2-alpha - 2020-11-23
Tor 0.4.5.2-alpha is the second alpha release in the 0.4.5.x series.
It fixes several bugs present in earlier releases, including one that
made it impractical to run relays on Windows. It also adds a few small
safety features to improve Tor's behavior in the presence of strange
compile-time options, misbehaving proxies, and future versions
of OpenSSL.
o Major bugfixes (relay, windows):
- Fix a bug in our implementation of condition variables on Windows.
Previously, a relay on Windows would use 100% CPU after running
for some time. Because of this change, Tor now require Windows
Vista or later to build and run. Fixes bug 30187; bugfix on
0.2.6.3-alpha. (This bug became more serious in 0.3.1.1-alpha with
the introduction of consensus diffs.) Patch by Daniel Pinto.
o Minor features (compilation):
- Disable deprecation warnings when building with OpenSSL 3.0.0 or
later. There are a number of APIs newly deprecated in OpenSSL
3.0.0 that Tor still requires. (A later version of Tor will try to
stop depending on these APIs.) Closes ticket 40165.
o Minor features (protocol, proxy support, defense in depth):
- Respond more deliberately to misbehaving proxies that leave
leftover data on their connections, so as to make Tor even less
likely to allow the proxies to pass their data off as having come
from a relay. Closes ticket 40017.
o Minor features (safety):
- Log a warning at startup if Tor is built with compile-time options
that are likely to make it less stable or reliable. Closes
ticket 18888.
o Minor bugfixes (circuit, handshake):
- In the v3 handshaking code, use connection_or_change_state() to
change the state. Previously, we changed the state directly, but
this did not pass the state change to the pubsub or channel
objects, potentially leading to bugs. Fixes bug 32880; bugfix on
0.2.3.6-alpha. Patch by Neel Chauhan.
o Minor bugfixes (compilation):
- Use the correct 'ranlib' program when building libtor.a.
Previously we used the default ranlib, which broke some kinds of
cross-compilation. Fixes bug 40172; bugfix on 0.4.5.1-alpha.
- Remove a duplicate typedef in metrics_store.c. Fixes bug 40177;
bugfix on 0.4.5.1-alpha.
- When USDT tracing is enabled, and STAP_PROBEV() is missing, don't
attempt to build. Linux supports that macro but not the BSDs.
Fixes bug 40174; bugfix on 0.4.5.1-alpha.
o Minor bugfixes (configuration):
- Exit Tor on a misconfiguration when the Bridge line is configured
to use a transport but no corresponding ClientTransportPlugin can
be found. Prior to this fix, Tor would attempt to connect to the
bridge directly without using the transport, making it easier for
adversaries to notice the bridge. Fixes bug 25528; bugfix
on 0.2.6.1-alpha.
- Fix an issue where an ORPort was compared with other kinds of
ports, when it should have been only checked against other
ORPorts. This bug would lead to "DirPort auto" getting ignored.
Fixes bug 40195; bugfix on 0.4.5.1-alpha.
- Fix a bug where a second non-ORPort with a variant family (ex:
SocksPort [::1]:9050) would be ignored due to a configuration
parsing error. Fixes bug 40183; bugfix on 0.4.5.1-alpha.
o Minor bugfixes (crash, relay, signing key):
- Avoid assertion failures when we run Tor from the command line
with `--key-expiration sign`, but an ORPort is not set. Fixes bug
40015; bugfix on 0.3.2.1-alpha. Patch by Neel Chauhan.
o Minor bugfixes (logging):
- Remove trailing whitespace from control event log messages. Fixes
bug 32178; bugfix on 0.1.1.1-alpha. Based on a patch by
Amadeusz Pawlik.
- Turn warning-level log message about SENDME failure into a debug-
level message. (This event can happen naturally, and is no reason
for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
o Minor bugfixes (relay, address discovery):
- Don't trigger an IP change when no new valid IP can be found.
Fixes bug 40071; bugfix on 0.4.5.1-alpha.
- When attempting to discover our IP, use a simple test circuit,
rather than a descriptor fetch: the same address information is
present in NETINFO cells, and is better authenticated there. Fixes
bug 40071; bugfix on 0.4.5.1-alpha.
o Minor bugfixes (testing):
- Fix the `config/parse_tcp_proxy_line` test so that it works
correctly on systems where the DNS provider hijacks invalid
queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
- Fix unit tests that used newly generated list of routers so that
they check them with respect to the date when they were generated,
not with respect to the current time. Fixes bug 40187; bugfix
on 0.4.5.1-alpha.
- Fix our Python reference-implementation for the v3 onion service
handshake so that it works correctly with the version of hashlib
provided by Python 3.9. Fixes part of bug 40179; bugfix
on 0.3.1.6-rc.
- Fix the `tortls/openssl/log_one_error` test to work with OpenSSL
3.0.0. Fixes bug 40170; bugfix on 0.2.8.1-alpha.
o Removed features (controller):
- Remove the "GETINFO network-status" controller command. It has
been deprecated since 0.3.1.1-alpha. Closes ticket 22473.