Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package privoxy for openSUSE:Leap:16.0 
checked in at 2025-04-24 10:16:59
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:16.0/privoxy (Old)
 and      /work/SRC/openSUSE:Leap:16.0/.privoxy.new.30101 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "privoxy"

Thu Apr 24 10:16:59 2025 rev:2 rq:1272226 version:4.0.0

Changes:
--------
--- /work/SRC/openSUSE:Leap:16.0/privoxy/privoxy.changes        2025-03-19 
11:54:58.534478151 +0100
+++ /work/SRC/openSUSE:Leap:16.0/.privoxy.new.30101/privoxy.changes     
2025-04-24 10:17:02.186571072 +0200
@@ -1,0 +2,164 @@
+Thu Mar 20 21:51:57 UTC 2025 - Andreas Stieger <andreas.stie...@gmx.de>
+
+- build with pcre2
+
+-------------------------------------------------------------------
+Tue Jan 28 20:49:04 UTC 2025 - Carsten Ziepke <kiel...@gmail.com>
+
+- Update to version 4.0.0:
+  Bug fixes:
+  * Add missing client-body-tagger data to the action_type_info[]
+    struct so lookups based on the action index work correctly
+    again. Prevents assertion failures or segfaults when trying to
+    edit an action file with the CGI editor.
+    The type of failure depended on whether or not assertions
+    were enabled and on whether or not Privoxy had been compiled
+    with FEATURE_EXTERNAL_FILTERS.
+    Regression introduced in Privoxy 3.0.34.
+    Patch submitted by Aaron Li in #940.
+  * Bump MAX_FILTER_TYPES which should have been done in d128e6aa4
+    when introducing the client-body-tagger{} action.
+    Prevents an assertion in cgi_edit_actions_for_url() from
+    triggering after e32d03e0 when using the CGI editor with
+    assertions enabled.
+  * is_untrusted_url(): Search the encrypted headers for the
+    Referer when the client is using https and https inspection
+    is enabled. Fixes the trust mechanism for https requests.
+    Reported by Laurent Caumont in #1767.
+  * GNUMakefile.in: Let the install target work if no group is
+    specified.
+  * GNUMakefile.in: Set GROUP_T when installing configuration
+    files as root and there is no privoxy user available so the
+    install target doesn't fail.
+    Patch by Fabrice Fontaine.
+  * GNUmakefile.in: Don't exit if configuration files are
+    installed as root as this can be considered acceptable when
+    cross-compiling Privoxy inside an autobuilder with only a
+    root user.
+    Patch by Fabrice Fontaine.
+  * configure.in: Fix argument types in gmtime_r() and
+    localtime_r() probes.
+    Otherwise these probes always fail with stricter compilers
+    even if there is C library support for these functions.
+    Patch submitted by Florian Weimer in SF#149.
+  * Fix socks4 and socks4a support under glibc's source
+    fortification. With glibc's source fortification, gcc offers
+    the compilation warning resulting in a runtime abort() when
+    using a socks4 or socks4a upstream proxy. Despite the warning,
+    the strlcpy() call in question is fine: gcc misidentifies the
+    size of the destination buffer, estimating to hold only a
+    single char while in fact the buffer stretches beyond the end
+    of the struct socks_op.
+    The issue was originally reported in the NixOS issue tracker
+    at https://github.com/NixOS/nixpkgs/issues/265654
+    prompted by an upgrade of glibc from 2.37-39 to 2.38-0.
+    Patch submitted by Ingo Blechschmid, joint work with
+    @esclear and @richi235.
+ General improvements:
+  * Allow to use wolfSSL for https inspection.
+    wolfSSL supports TLS 1.3 and can be significantly faster than
+    mbedTLS. Mainly tested on ElectroBSD amd64 where it can
+    compete with OpenSSL and LibreSSL:
+    https://www.fabiankeil.de/gehacktes/privoxy-tls-benchmarks/
+    To enable the support, install wolfSSL and run ./configure
+    with the --with-wolfssl option.
+    Sponsored by Privoxy project funds collected at SPI.
+  * Add an test framework that leverages the curl test suite.
+    Sponsored by Privoxy project funds collected at SPI.
+  * Add pcre2 support. Closes bug #935.
+    Initial patch submitted by Gagan Sidhu.
+  * Use SHA256 as hash algorithm for the certificate and key file
+    names instead of MD5. The known MD5 vulnerabilities shouldn't
+    matter for Privoxy's use case but it doesn't hurt to use a
+    hash algorithm that isn't deprecated.
+    Sponsored by: Robert Klemme
+  * Add support for mbedTLS 3.x. This removes a sanity check
+    (whether issuer key and issuer certificate match) that seems
+    overly cautious and fails to compile with mbedTLS 3.x as the
+    struct members are private. We don't have an equivalent check
+    in the OpenSSL or wolfSSL code either.
+  * Factor out newer_privoxy_version_required() and improve the
+    logic Previously 3.0.11 was considered newer than 4.0.0.
+  * init_error_log(): Include the reason for failures to open the
+    log file.
+  * create_client_ssl_connection(): Don't keep the certificate
+    lock longer than necessary.
+  * Add periods to a bunch of log messages.
+  * normalize_lws(): Only log the 'Reducing whitespace ...'
+    message once per header
+  * log_error() Win32: Only call LogShowActivity() for debug level
+    LOG_LEVEL_REQUEST. As of b94bbe62a950, which was part of
+    Privoxy 3.0.29,
+    LOG_LEVEL_REQUEST is used for all requests including crunched
+    ones.
+    Previously LogShowActivity() was called twice for crunched
+    requests, (presumably) resulting in an aborted animation.
+  * Remove ./ prefix from tarball-dist files.
+  * create_client_ssl_connection(): Make it more obvious from an
+    error message that a function failed.
+  * Use stringify() instead of section_target() and remove
+    section_target(). Like the XXX comment suggested this could be
+    done my moving the hash into the templates which seems
+    preferable anyway.
+  * Prevent some compiler warnings.
+  * parse_numeric_value(): Expect a base-ten number.
+  * windows/MYconfigure: Have gcc diagnostics in color.
+  Action file improvements:
+  * Block requests to .amazon-adsystem.com/
+  * Block requests to 0.css-load.com/
+  * Block requests to html-load.com/ and 1.html-load.com/
+  * Block requests to b.6sc.co/
+  * Block requests to i.clean.gg/
+  * Block requests to s.cpx.to/
+  * Block requests to track.venatusmedia.com/
+  * Block requests to secure-eu.nmrodam.com/
+  * Block requests to o2.mouseflow.com/
+  * Disable fast-redirects for services.akteneinsichtsportal.de/
+  * Disable fast-redirects for 
+    /wp-content/plugins/pdf-viewer-for-elementor
+  * Disable fast-redirects for syndication.twitter.com/
+  * Disable fast-redirects for archive.softwareheritage.org/
+  * Disable fast-redirects to
+    duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/
+  * Disable fast-redirects for .creator-spring.com/_next/image
+  * Disable fast redirects for accounts.bahn.de/
+  * Unblock .datenschmutz.de/
+  * Unblock requests for 'adventur*.'
+  * Unblock adl.windows.com/
+    as it is apparently required to update from Windows 10 to 11.
+    Reported by Sam Varshavchik.
+  Privoxy-Log-Parser:
+  * Highlight 'Couldn't deliver the error message for [...]'.
+  * Highlight 'Failed to accept() incoming connection: Software
+    caused connection abort'.
+  * Highlight 'Keeping chunk offset at 0 despite flushing
+    31 bytes.'.
+  * Highlight 'Not shutting down client connection on socket 8.
+    The socket is no longer alive.'.
+  * Bump version to 0.9.6.
+  Privoxy-Regression-Test.pl:
+  * Let the --min-level option increase the --max-level
+    if the latter is smaller than the former.
+  * Add --curl option to use a non-default curl binary.
+  * Bump version to 0.7.5.
+  uagen:
+  * Bump BROWSER_VERSION and BROWSER_REVISION to match
+    Firefox ESR 128.
+  * Bump version to 1.2.6.
+  Documentation:
+  * Add HOWTOs for https inspection and client-tags to user-manual.
+  * Suggest to use the force-text-mode action when filtering
+    binary content with external filters.
+  * Declare https-inspection non-experimental.
+  * FAQ: Mention that Privoxy Moral Licenses are available as well.
+  * Fix LibreSSL URL.
+  * Update perlre perldoc URL.
+  * config: Add SOCKS 5 to the list of supported protocols.
+  * In the Windows build section, note that one only needs tidy
+    to build the docs. If you're not building the docbook stuff
+    you don't need tidy.
+  * trust: Use the words 'allowlists' and 'blocklists'
+    instead of "whitelists" and "blacklists" which some
+    people consider to be less inclusive.
+
+-------------------------------------------------------------------

Old:
----
  privoxy-3.0.34-stable-src.tar.gz
  privoxy-3.0.34-stable-src.tar.gz.asc

New:
----
  privoxy-4.0.0-stable-src.tar.gz
  privoxy-4.0.0-stable-src.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ privoxy.spec ++++++
--- /var/tmp/diff_new_pack.j06eUV/_old  2025-04-24 10:17:02.530585542 +0200
+++ /var/tmp/diff_new_pack.j06eUV/_new  2025-04-24 10:17:02.530585542 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package privoxy
 #
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -18,7 +18,7 @@
 
 %define chroot %{_localstatedir}/lib/privoxy
 Name:           privoxy
-Version:        3.0.34
+Version:        4.0.0
 Release:        0
 Summary:        The Internet Junkbuster - HTTP Proxy Server
 License:        GPL-3.0-or-later
@@ -38,7 +38,7 @@
 BuildRequires:  w3m
 BuildRequires:  pkgconfig(libbrotlicommon)
 BuildRequires:  pkgconfig(libcrypto)
-BuildRequires:  pkgconfig(libpcre)
+BuildRequires:  pkgconfig(libpcre2-8)
 BuildRequires:  pkgconfig(libssl)
 BuildRequires:  pkgconfig(systemd)
 BuildRequires:  pkgconfig(zlib)

++++++ privoxy-3.0.34-stable-src.tar.gz -> privoxy-4.0.0-stable-src.tar.gz 
++++++
++++ 35657 lines of diff (skipped)

Reply via email to