Hello community, here is the log from the commit of package erlang for openSUSE:Factory checked in at 2017-11-07 09:57:37 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/erlang (Old) and /work/SRC/openSUSE:Factory/.erlang.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "erlang" Tue Nov 7 09:57:37 2017 rev:59 rq:538268 version:20.1.2 Changes: -------- --- /work/SRC/openSUSE:Factory/erlang/erlang.changes 2017-09-23 21:36:00.639267957 +0200 +++ /work/SRC/openSUSE:Factory/.erlang.new/erlang.changes 2017-11-07 09:57:49.322685717 +0100 @@ -1,0 +2,79 @@ +Thu Oct 19 10:40:11 UTC 2017 - matwey.korni...@gmail.com + +- Update to 21.1.2: + * diameter: An inadvertently removed monitor in diameter 2.1 + caused the ets table diameter_reg to leak entries, and caused + service restart and more to fail. + * erts: Fixed bug that could cause a VM crash when a corrupt + message is received on distribution channel from other node. + +- Update to 20.1.1: + * compiler: The compiler could issue an incorrect internal + consistency failure diagnostic for some complicated bit syntax + maches. + * erts: The new zlib module returned a data_error when inflating + concatenated streams, which was incompatible with the old + module's behavior of returning the uncompressed data up to the + end of the first stream. + * erts: zlib:gunzip/1 will no longer stop at the end of the first + stream when decompressing concatenated gzip files. + * ssh: Fixed broken printout + * ssh: Disable aes_gcm ciphers if peer is OpenSSH 6.2 which is + known to have trouble with them in some cases. + +- Update to 20.1: + * crypto, public_key: Extend crypto and public_key functions + sign and verify with: support for RSASSA-PS padding for + signatures and for saltlength setting X9.31 RSA padding. sha, + sha224, sha256, sha384, and sha512 for dss signatures as + mentioned in NIST SP 800-57 Part 1. ripemd160 to be used for + rsa signatures. A new tuple in crypto:supports/0 reports + supported MAC algorithms. + * diameter: Add service option decode_format to allow incoming + messages to be decoded into maps instead of records. Decode + performance has been improved. Add service/transport option + avp_dictionaries to give better support for dictionaries only + defining AVPs. + * erts: Upgraded the ERTS internal PCRE library from version + 8.40 to version 8.41. + * erts, kernel, tools: Profiling with lock counting can now be + fully toggled at runtime in the lock counting emulator + (-emu_type lcnt). Everything is enabled by default to match + the old behavior, but specific categories can be toggled at + will with minimal runtime overhead when disabled. Refer to the + documentation on lcnt:rt_mask/1 for details. + * lcnt:collect and lcnt:clear will no longer block all other + threads in the runtime system. This makes it possible to run + the lock counting under heavier load. + * erts: The zlib module has been refactored and all its + operations will now yield appropriately, allowing them to be + used freely in concurrent applications. + * erts, tools: Add erlang:iolist_to_iovec/1, which converts an + iolist() to an erlang:iovec(), which is suitable for use with + enif_inspect_iovec(). + * erts: Add new nif API functions for managing an I/O Queue. The + added functions are: enif_ioq_create(), enif_ioq_destroy(), + enif_ioq_enq_binary(), enif_ioq_enqv(), enif_ioq_deq(), + enif_ioq_peek(), enif_inspect_iovec(), enif_free_iovec() + * observer/crashdump_viewer: Reading of crash dumps with many + binaries is optimized. A progress bar is shown when the detail + view for a process is opened. The cdv script now sets + ERL_CRASH_DUMP_SECONDS=0 to avoid generating a new crash dump + from the node running the Crashdump Viewer. + * observer: Add system statistics and limits to frontpage in + observer. + * public_key, ssl**: Improved error propagation and reports + * ssh: A new option modify_algorithms is implemented. It enables + specifying changes on the default algorithms list. See the + reference manual and the SSH User's Guide chapter "Configuring + algorithms in SSH". + * tools/xref: The predefined Xref analysis locals_not_used now + understands the -on_load() attribute and does not report + unused functions. + * tools/fprof: When sampling multiple processes and analyzing + with totals set to true, the output now sums together all + caller and callee entries which concerns the same function. + Previous behaviour was to report each contributing entry + separately. + +------------------------------------------------------------------- Old: ---- OTP-20.0.5.tar.gz New: ---- OTP-20.1.2.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ erlang.spec ++++++ --- /var/tmp/diff_new_pack.TwGHTa/_old 2017-11-07 09:57:51.602603005 +0100 +++ /var/tmp/diff_new_pack.TwGHTa/_new 2017-11-07 09:57:51.606602859 +0100 @@ -21,7 +21,7 @@ %endif Name: erlang -Version: 20.0.5 +Version: 20.1.2 Release: 0 # not set up to be built with position independend executable support #!BuildIgnore: gcc-PIE ++++++ OTP-20.0.5.tar.gz -> OTP-20.1.2.tar.gz ++++++ /work/SRC/openSUSE:Factory/erlang/OTP-20.0.5.tar.gz /work/SRC/openSUSE:Factory/.erlang.new/OTP-20.1.2.tar.gz differ: char 16, line 1 ++++++ crypto.patch ++++++ --- /var/tmp/diff_new_pack.TwGHTa/_old 2017-11-07 09:57:51.694599667 +0100 +++ /var/tmp/diff_new_pack.TwGHTa/_new 2017-11-07 09:57:51.694599667 +0100 @@ -5,11 +5,11 @@ In openssl 1.0.1e EC_GROUP_new_curve_GF2m function is wrapped by #ifndef OPENSSL_NO_EC2M. We have to check whether OPENSSL_NO_EC2M is set, and if it is, then we do not have EC_GROUP_new_curve_GF2m function and do not HAVE_EC. -Index: otp-OTP-20.0.1/lib/crypto/c_src/crypto.c +Index: otp-OTP-20.1.2/lib/crypto/c_src/crypto.c =================================================================== ---- otp-OTP-20.0.1.orig/lib/crypto/c_src/crypto.c -+++ otp-OTP-20.0.1/lib/crypto/c_src/crypto.c -@@ -142,7 +142,8 @@ +--- otp-OTP-20.1.2.orig/lib/crypto/c_src/crypto.c ++++ otp-OTP-20.1.2/lib/crypto/c_src/crypto.c +@@ -146,7 +146,8 @@ #if OPENSSL_VERSION_NUMBER >= PACKED_OPENSSL_VERSION(0,9,8,'o') \ && !defined(OPENSSL_NO_EC) \ && !defined(OPENSSL_NO_ECDH) \ ++++++ erlang-not-install-misc.patch ++++++ --- /var/tmp/diff_new_pack.TwGHTa/_old 2017-11-07 09:57:51.738598071 +0100 +++ /var/tmp/diff_new_pack.TwGHTa/_new 2017-11-07 09:57:51.742597926 +0100 @@ -9,11 +9,11 @@ erts/etc/unix/Install.src | 10 ---------- 2 files changed, 14 deletions(-) -Index: otp-OTP-19.0/erts/etc/common/Makefile.in +Index: otp-OTP-20.1.2/erts/etc/common/Makefile.in =================================================================== ---- otp-OTP-19.0.orig/erts/etc/common/Makefile.in -+++ otp-OTP-19.0/erts/etc/common/Makefile.in -@@ -492,10 +492,6 @@ endif +--- otp-OTP-20.1.2.orig/erts/etc/common/Makefile.in ++++ otp-OTP-20.1.2/erts/etc/common/Makefile.in +@@ -495,10 +495,6 @@ endif ifneq ($(INSTALL_TOP_BIN),) $(INSTALL_PROGRAM) $(INSTALL_TOP_BIN) "$(RELEASE_PATH)" endif @@ -24,10 +24,10 @@ ifneq ($(INSTALL_SRC),) $(INSTALL_DIR) "$(RELEASE_PATH)/erts-$(VSN)/src" $(INSTALL_DATA) $(INSTALL_SRC) "$(RELEASE_PATH)/erts-$(VSN)/src" -Index: otp-OTP-19.0/erts/etc/unix/Install.src +Index: otp-OTP-20.1.2/erts/etc/unix/Install.src =================================================================== ---- otp-OTP-19.0.orig/erts/etc/unix/Install.src -+++ otp-OTP-19.0/erts/etc/unix/Install.src +--- otp-OTP-20.1.2.orig/erts/etc/unix/Install.src ++++ otp-OTP-20.1.2/erts/etc/unix/Install.src @@ -141,14 +141,4 @@ cp -p ../releases/%I_SYSTEM_VSN%/start_* cp -p ../releases/%I_SYSTEM_VSN%/no_dot_erlang.boot . cp -p $Name.boot start.boot