Changelog for
solanum-0~ch560-bp155.1.32.x86_64.rpm :
* Fri May 20 2022 Jan Engelhardt
- Resolve broken scriptlet, which warned \"[-:1] Missing action and name columns\" during installation.
* Sat Apr 30 2022 Jan Engelhardt - Update to snapshot 0~ch560 (48a06ae3)
* Support more human friendly k/d/x-line duration format
* Make opers talking through +g controllable by user mode +M
* Apply cmode C to replies
* Tue May 04 2021 Jan Engelhardt - Move to Solanum codebase/Update to snapshot (3ff5a12e)- Drop 0001-Set-EXTERNAL_BUILD_TIMESTAMP-from-SOURCE_DATE_EPOCH.patch (merged)
* Thu Oct 01 2020 Jan Engelhardt - Add 0001-Set-EXTERNAL_BUILD_TIMESTAMP-from-SOURCE_DATE_EPOCH.patch for reproducible builds.
* Sun Sep 29 2019 Jan Engelhardt - Update to release 4.1.2
* Do not corrupt usermodes on module unload/reload.
* Mon Aug 26 2019 Jan Engelhardt - Update to upstream release 4.1.1
* Implemented IRCv3.2 enhanced capability negotiation (\"CAP LS 302\").
* Implemented support for receiving and sending IRCv3 message tags.
* Implemented IRCv3.2 capabilities: account-tag, echo-message, invite-notify, sasl, server-time.
* Feature from ircd-seven: Implement a channel mode that disallows kicking IRC operators (+M).
* DNS, ident, and blacklist lookups have been moved to a dedicated daemon known as authd. Some cosmetic changes to blacklist statistics and rejection notices have resulted.
* Support for WebSocket has been added.
* Added the ability to strip color codes from topics unconditionally.
* SCTP is now supported for server and user connections.- Remove charybdis-ratbox.diff, charybdis-werror.diff (no longer needed), charybdis-repro.diff (solved differently upstream).
* Tue Jan 10 2017 jengelhAATTinai.de- Add charybdis-repro.diff, throw out buildtime-dependent constructs
* Sun Nov 20 2016 jengelhAATTinai.de- Update description- Abort installation if user/group cannot be created
* Wed Sep 21 2016 jengelhAATTinai.de- Update to new upstream release 3.5.3
* Bug fix for CVE-2016-7143. This bug allows users to spoof CertFP authentication using the SASL EXTERNAL mechanism.
* Sun Jun 19 2016 jengelhAATTinai.de- Update to new upstream release 3.5.2
* Allow IRCv3.1 STARTTLS to work with other SSL backends besides OpenSSL.
* Fix an edge case regression involving channel ban cache that was introduced in 3.5.0.
* Ensure ssld does not crash when DH parameters are not provided.
* mbedtls TLS backend improvements from charybdis 4 development branch:
* add support for CertFP
* provide personalization data for the PRNG
* openssl TLS backend improvements from charybdis 4:
* do not manually initialise openssl when running with OpenSSL 1.1.0 or later
* support ECDHE on more than one curve on OpenSSL 1.0.2 and above
* fix DH parameters memory leak
* free the old TLS context before constructing a new one
* Sat May 07 2016 jengelhAATTinai.de- Update to new upstream release 3.5.1
* Fix propagation of ip_cloaking hostname changes (only when setting or unsetting the umode after connection).
* Fix a remote-triggerable crash triggered by the CAPAB parsing code.
* As per the TS6 spec, require QS and ENCAP capabilities.
* Require EX and IE capabilities (+e and +I cmodes).
* Check that UIDs start with the server\'s SID.
* Allow mode queries on mlocked modes. In particular, allow `/mode #channel f` to query the forward channel even if +f is mlocked.
* Add starttls as per ircv3.
* Reject nicks with \'~\' in them, rather than truncating at the \'~\'.
* Do not allow SASL authentication when the configured SASL agent is unavailable.
* Implement IRCv3.2 capabilities: cap-notify, chghost, userhost-in-names
* Implement the $&, $| and $m extban types:
* $& combines 1 or more child extbans as an AND expression
* $| combines 1 or more child extbans as an OR expression
* $m provides normal hostmask matching as an extban for the above
* Display an operator\'s privilege set in WHOIS.
* The $o extban now matches against privilege set names as well as individual privileges. Privilege set names are preferred over individual privileges.