Darshit, thank you for taking the time to publish a new release !

Regards, Tim

On 5/11/23 03:29, Darshit Shah wrote:
This is to announce wget-1.21.4, a stable release.

This is a slow release, with not many exciting things to talk about. The main 
reason is to allow HSTS tests to function again on i686 systems.

There have been 29 commits by 3 people in the 62 weeks since 1.21.3.

See the NEWS below for a brief summary.

Thanks to everyone who has contributed!
The following people contributed changes to this release:

   Darshit Shah (6)
   Tim Rühsen (22)
   jinfuchiang (1)

Darshit
  [on behalf of the wget maintainers]
==================================================================

Here is the GNU wget home page:
     http://gnu.org/s/wget/

For a summary of changes and contributors, see:
   http://git.sv.gnu.org/gitweb/?p=wget.git;a=shortlog;h=v1.21.4
or run this command from a git-cloned wget directory:
   git shortlog v1.21.3..v1.21.4

Here are the compressed sources:
   https://ftpmirror.gnu.org/wget/wget-1.21.4.tar.gz   (4.9MB)
   https://ftpmirror.gnu.org/wget/wget-1.21.4.tar.lz   (2.4MB)

Here are the GPG detached signatures:
   https://ftpmirror.gnu.org/wget/wget-1.21.4.tar.gz.sig
   https://ftpmirror.gnu.org/wget/wget-1.21.4.tar.lz.sig

Use a mirror for higher download bandwidth:
   https://www.gnu.org/order/ftp.html

Here are the SHA1 and SHA256 checksums:

   c6dc52cbda882c14fa5c3401d039901a0ba823fc  wget-1.21.4.tar.gz
   gVQvXO+4+qzDm7vGyC3tgOPkqIUFrnLqUd8nUlvN4Ew=  wget-1.21.4.tar.gz
   42384273c1937458c9db3766a5509afa636a2f00  wget-1.21.4.tar.lz
   NoNhml9Q7cvMsXIKeQBvo3v5uaJVqMW0gEi8PHqHS9k=  wget-1.21.4.tar.lz

Verify the base64 SHA256 checksum with cksum -a sha256 --check
from coreutils-9.2 or OpenBSD's cksum since 2007.

Use a .sig file to verify that the corresponding file (without the
.sig suffix) is intact.  First, be sure to download both the .sig file
and the corresponding tarball.  Then, run a command like this:

   gpg --verify wget-1.21.4.tar.gz.sig

The signature should match the fingerprint of the following key:

   pub   rsa4096 2015-10-14 [SC]
         7845 120B 07CB D8D6 ECE5  FF2B 2A17 43ED A91A 35B6
   uid   Darshit Shah <g...@darnir.net>
   uid   Darshit Shah <dar...@gnu.org>

If that command fails because you don't have the required public key,
or that public key has expired, try the following commands to retrieve
or refresh it, and then rerun the 'gpg --verify' command.

   gpg --locate-external-key g...@darnir.net

   gpg --recv-keys 64FF90AAE8C70AF9

   wget -q -O- 
'https://savannah.gnu.org/project/release-gpgkeys.php?group=wget&download=1' | 
gpg --import -

As a last resort to find the key, you can try the official GNU
keyring:

   wget -q https://ftp.gnu.org/gnu/gnu-keyring.gpg
   gpg --keyring gnu-keyring.gpg --verify wget-1.21.4.tar.gz.sig

This release was bootstrapped with the following tools:
   Autoconf 2.71
   Automake 1.16.5
   Gnulib v0.1-6178-gdfdf33a466

NEWS

* Noteworthy changes in release 1.21.4 (2023-05-11)

** Document --retry-on-host-error in help text

** Increase read buffer size to 64k. This should speed up downloads on gigabit 
and faster connections

** Update deprecated option '--html-extension' to '--adjust-extension' in 
documentation

** Update gnulib compatibility layer.
    Fixes HSTS test failures on i686. (Thanks to Andreas Enge for ponting it 
out)


Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to