Changelog for
libgit2-devel-1.9.0-1.1.x86_64.rpm :
* Mon Jan 13 2025 Andreas Stieger
- update to 1.9.0
* update TLS cipher selection to match the \"compatibility\" cipher suite settings as documented by Mozilla.
* blame API now contains committer information and commit summaries for blame hunks, and the ability to get information about the line of text that was modified
* add blame, init commands to CLI
* ABI-breaking changes in blame hunk, checkout, configuration, update_refs
* new API: git_signature_default_from_env
* packbuilder can now be interrupted from a callback
* honor the preciousObject repository extension
* Push status will be reported even when a push fails
* support generating think packs from a mempack instanct
* New LIBGIT2_VERSION_CHECK macro for version checking
* Custom X509 certificates can be added to OpenSSL\'s certificate store using the GIT_OPT_ADD_SSL_X509_CERT option
* Bug fixes and documentation updates
* Thu Oct 31 2024 Andreas Stieger - update to 1.8.4:
* Actually includes the pre-1.8.0 commit constness behavior fix
* Sun Oct 27 2024 Andreas Stieger - update to 1.8.3:
* revert a const-correctness change introduced in v1.8.0 for the git_commit_create functions. Retain the const-behavior for the commits arguments from prior to v1.8.0.
* Fix a bug introduced in v1.8.1 for users of the legacy Node.js http-parser dependency.
* Fri May 17 2024 Dirk Müller - update to 1.8.1:
* In v1.8, libgit2 introduced the `report_unchanged ` member in the `git_fetch_options` structure. We mistakenly introduced this as a bitfield, which is not suitable for our public API. To correct this mistake, we have _removed_ the `report_unchanged ` member. To support the report unchanged tips option, users can set the `update_fetchhead` member to include the `GIT_REMOTE_UPDATE_REPORT_UNCHANGED` value.
* The libgit2 projects regrets the API change, but this was required to support cross-platform compatibility.
* commit: Fix git_commit_create_from_stage without author and
* committer
* process.c: fix environ
* Bounds check for pack index read
* transport: provide a useful error message during cancellation
* transport: support sha256 oids
* Revparse: Correctly accept ref with \'AATT\' at the end
* remote: drop bitfields in git_remote_fetch_options
* examples: fix memory leak in for-each-ref.c
* xdiff: use proper free function
* rand: avoid uninitialized loadavg warnings
* cli: include alloca on illumos / solaris / sunos
* Update git_array allocator to obey strict aliasing rules
* tree: avoid mixed signedness comparison by AATTethomson in
* Sun Mar 24 2024 Andreas Stieger - update to 1.8.0:
* Simplified commit creation (git_commit_create_from_stage)
* Worktree improvements for better compatibility with core git
* ABI breaking channge: Add WORKTREE configuration level. GIT_CONFIG_LEVEL_WORKTREE level t priority 6, GIT_CONFIG_LEVEL_APP now begins at priority 7.
* ABI breaking change: git_config_entry structure change
* ABI breaking change: git_push_options includes remote push options- the optional, experimental support for invoking OpenSSH remains disabled in this package
* Wed Feb 07 2024 Andreas Stieger - update to 1.7.2:
* CVE-2024-24575: infinite loop condition given specially crafted inputs (boo#1219664)
* CVE-2024-24577: arbitrary code execution due to heap corruption in git_index_add (boo#1219660)
* Fix a bug in the smart transport negotiation could have caused an out-of-bounds read when a remote server did not advertise capabilities.
* Tue Aug 15 2023 Andreas Stieger - update to 1.7.1:
* proxy: Return an error for invalid proxy URLs instead of crashing
* ssh: fix known_hosts leak in _git_ssh_setup_conn
* repository: make cleanup safe for re-use with grafts
* fix: Add missing include for oidarray
* Revert \"CMake: Search for ssh2 instead of libssh2.\"
* Wed Jul 19 2023 Andreas Stieger - update to 1.7.0:
* supports shallow clone and shallow repositories
* Simplify custom pluggable allocator (breaking change)
* repo: honor environment variables for more scenarios
* Introduce timeouts on sockets
* some performance improvements and bug fixes
* Wed Apr 12 2023 Andreas Stieger - Update to 1.6.4:
* config: return GIT_ENOTFOUND for missing programdata- move experimental cli into libgit2-tools as intended
* Tue Mar 21 2023 Paolo Stivanin - Update to 1.6.3:
* odb: restore git_odb_open by AATTethomson in #6520
* Ensure that git_index_add_all handles ignored directories by AATTethomson in #6521
* pack: use 64 bits for the number of objects by AATTcarlosmn in #6530- Drop restore-git-odb-open.patch
* Tue Mar 21 2023 Daniel Garcia - Add restore-git-odb-open.patch, some code was removed by error upstream and they fix it after the release. gh#libgit2/libgit2AATTe1e0d77c6f15
* Tue Mar 07 2023 Andreas Stieger - libgit2 1.6.2:
* Support the notion of a home directory separately from global configuration directory
* stash: partial stash specific files
* push: revpars refspec source, so user can push things that are not refs
* Support OpenSSL 3
* Many bug fixes- Not enabled: experimental SHA256 support for bare repositories
* Sun Feb 26 2023 Andreas Stieger - update to 1.5.2:
* Improve SSH key handling functionality: examine all keys in known_hosts files for matches, to support remote hosts with multiple key types
* Sat Jan 21 2023 Dirk Müller - update to 1.5.1:
* This is a security release to address CVE-2023-22742: when compiled using the optional, included libssh2 backend, libgit2 fails to verify SSH keys by default. boo#1207364
* When using an SSH remote with the optional, included libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2\'s `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack.
* Wed Dec 21 2022 Dominique Leuenberger - Drop baselibs.conf: there is no known consumer of the -32bit package.
* Thu Jul 14 2022 Andreas Stieger - update to 1.5.0:
* add the basis for an experimental CLI
* continue prepare for SHA256 support
* add a benchmarking utility
* Tue Jul 12 2022 Andreas Stieger - update to 1.4.4 (bsc#1198234)
* Compatibility with git\'s changes to address CVE-2022-29187. As a follow up to CVE 2022-24765, now not only is the working directory of a non-bare repository examined for its ownership, but the .git directory and the .git file (if present) are also examined for their ownership [boo#1201431]
* A fix for compatibility with git\'s (new) behavior for CVE 2022-24765 allows users on POSIX systems to access a git repository that is owned by them when they are running in sudo- enable reproducible builds
* Wed Apr 13 2022 Andreas Stieger - update to 1.4.3:
* compatibility with git\'s changes for CVE-2022-24765 boo#1187234
* several correctness fixes where invalid input can lead to a crash and denial of service
* Thu Mar 17 2022 Andreas Stieger - update to 1.4.2:
* remote: do store the update_tips callback error value
* Sat Feb 19 2022 Andreas Stieger - update to 1.4.1:
* improve compatibility with git
* some deprecated API, ABI has changed
* multiple bug fixes and developer visible changes- build with system PCRE2- remove http-parser build dependency, bundled lib has fixes