diff --git a/.github/workflows/packages.yaml b/.github/workflows/packages.yaml new file mode 100644 index 00000000000000..eda96d7482be15 --- /dev/null +++ b/.github/workflows/packages.yaml @@ -0,0 +1,83 @@ +name: builder + +on: + workflow_dispatch: + push: + schedule: + - cron: '30 5 * * *' + +jobs: + build: + runs-on: ubuntu-22.04 + steps: + - name: Check out the repo + uses: actions/checkout@v4 + with: + fetch-depth: 0 + + - name: merge upstream + run: | + git remote add upstream https://github.com/curl/curl.git + git fetch upstream + git -c user.name=Github -c user.email=none merge upstream/master + + - name: Cache ccache + uses: actions/cache@v3 + with: + path: /home/runner/.cache/ccache + key: ccache + + - name: Prepare build environment + run: | + sudo add-apt-repository -y ppa:v-launchpad-jochen-sprickerhof-de/sbuild + sudo DEBIAN_FRONTEND=noninteractive apt install -y --no-install-recommends sbuild mmdebstrap debian-archive-keyring ccache uidmap + + mkdir -p "$HOME/.cache/sbuild" + mmdebstrap --variant=buildd --include=apt,ccache,ca-certificates \ + --keyring=/usr/share/keyrings/debian-archive-keyring.gpg \ + --customize-hook='chroot "$1" update-ccache-symlinks' \ + testing "$HOME/.cache/sbuild/testing-amd64.tar" + + ccache --zero-stats --max-size=10.0G + chmod a+X "$HOME" "$HOME/.cache" + chmod -R a+rwX "$HOME/.cache/ccache" + + cat << "EOF" > "$HOME/.sbuildrc" + $build_environment = { "CCACHE_DIR" => "/build/ccache" }; + $path = "/usr/lib/ccache:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games"; + $build_path = "/build/package/"; + $dsc_dir = "package"; + $unshare_bind_mounts = [ { directory => "$HOME/.cache/ccache", mountpoint => "/build/ccache" } ]; + $verbose = 1; + EOF + mkdir "$HOME/apt_repo" + + - name: Run sbuild + run: | + sed -i "1 s/([^)]*)/($(git describe --tags | sed 's/^[^0-9]*//;s/-/./g;s/_/./g')-$(date -u '+%Y%m%d.%H%M%S%N'))/" debian/changelog + sbuild -d testing --chroot-mode=unshare --no-clean-source --no-run-lintian \ + --extra-repository="deb [trusted=yes] https://github.com/defo-project/openssl/raw/packages/ ./" \ + --dpkg-source-opts="-Zgzip -z1 --format=1.0 -sn" --build-dir="$HOME/apt_repo" + cd "$HOME/apt_repo" + apt-ftparchive packages . > Packages + apt-ftparchive release . > Release + + - name: Test packages + run: | + mmdebstrap --chrooted-customize-hook="curl --ech true --doh-url 'https://1.1.1.1/dns-query' 'https://defo.ie/ech-check.php' | grep 'SSL_ECH_STATUS: success'" \ + --variant=essential --include=ca-certificates,curl testing /dev/null \ + "deb [signed-by=/usr/share/keyrings/debian-archive-keyring.gpg] http://deb.debian.org/debian testing main" \ + "deb [trusted=yes] https://github.com/defo-project/openssl/raw/packages/ /" \ + "deb [trusted=yes] copy:/$HOME/apt_repo /" + + - name: Upload apt repository + run: | + cd "$HOME/apt_repo" + BRANCH=packages + REPOSITORY="$(printf "%s" "$GITHUB_REPOSITORY" | tr / _)" + echo "echo \"deb [trusted=yes] $GITHUB_SERVER_URL/$GITHUB_REPOSITORY/raw/$BRANCH/ /\" | sudo tee /etc/apt/sources.list.d/$REPOSITORY.list" >> README.md + git init -b "$BRANCH" + git remote add origin "$(echo "$GITHUB_SERVER_URL/$GITHUB_REPOSITORY.git" | sed "s#https://#https://x-access-token:${{ secrets.GITHUB_TOKEN }}@#")" + git add . + git -c user.name=Github -c user.email=none commit --message="Generated with $GITHUB_SERVER_URL/$GITHUB_REPOSITORY/actions/runs/$GITHUB_RUN_ID" + git push --force origin "$BRANCH" diff --git a/debian/README.Debian b/debian/README.Debian new file mode 100644 index 00000000000000..009428d21fe9ef --- /dev/null +++ b/debian/README.Debian @@ -0,0 +1,11 @@ +README for curl Debian package +============================== + +Maintaining curl is not an easy task so it's important to have multiple people +taking care of it. With that in mind, the Debian Curl Maintainers team was +created to ease the maintenance burden. We also decided to keep the package +under the Debian namespace on Salsa because of its importance. Nonetheless, if +you would like to make changes to the package please try to reach us first +before committing and uploading. + + -- Carlos Henrique Lima Melara Sun, 26 Nov 2023 22:54:15 -0300 diff --git a/debian/README.source b/debian/README.source new file mode 100644 index 00000000000000..511e9579457e31 --- /dev/null +++ b/debian/README.source @@ -0,0 +1,9 @@ +Adding New Patches +================== + +Note that when adding new patches they must be applied *before* 90_gnutls.patch +and 99_nss.patch. This is needed by curl's package byzantine build process, +which builds the source multiple times with different TLS libraries. + +This basically means that when adding new patches to the debian/patches/series +file, they must be listed before the aformentioned patches. diff --git a/debian/changelog b/debian/changelog new file mode 100644 index 00000000000000..3530853912a682 --- /dev/null +++ b/debian/changelog @@ -0,0 +1,2911 @@ +curl (8.5.0-2.1~1.gbpecf5952a8) UNRELEASED; urgency=medium + + ** SNAPSHOT build @ecf5952a8 ** + + * Add ECH patch + + -- Jochen Sprickerhof Wed, 18 Oct 2023 23:19:51 +0200 + +curl (8.5.0-2) unstable; urgency=medium + + * d/p/openldap_fix_an_LDAP_crash.patch: New patch to fix ldap segfault + (closes: #1057855) + + -- Samuel Henrique Fri, 29 Dec 2023 15:34:11 -0300 + +curl (8.5.0-1) unstable; urgency=medium + + [ Samuel Henrique ] + * New upstream version 8.5.0 + - Fix CVE-2023-46218: cookie mixed case PSL bypass (closes: #1057646) + - Fix CVE-2023-46219: HSTS long file name clears contents (closes: #1057645) + * d/rules: Use pkg-info.mk instead of dpkg-parsechangelog for DEB_VERSION + * d/p/90_gnutls.patch: Update patch + * d/p/dist_add_tests_errorcodes_pl_to_the_tarball.patch: Upstream patch to + fix tests + * d/p/add_errorcodes_upstream_file.patch: Include missing file from upstream + tarball + + [ Carlos Henrique Lima Melara ] + * d/control: change Maintainer field to curl packaging team + * d/README.Debian: add readme to explain curl's team creation + * d/control: add myself to Uploaders + + -- Samuel Henrique Wed, 06 Dec 2023 20:15:49 +0000 + +curl (8.4.0-2) unstable; urgency=medium + + * d/rules: set CURL_PATCHSTAMP to package's version, so it shows up in + "--version" output + + -- Samuel Henrique Sat, 14 Oct 2023 12:19:21 +0100 + +curl (8.4.0-1) unstable; urgency=medium + + * New upstream version 8.4.0 + * d/libcurl*.symbols: New symbol curl_multi_get_handles + * d/patches: + - Remove patches from 8.4.0 release + - 90_gnutls.patch: Update patch + + -- Samuel Henrique Fri, 13 Oct 2023 00:53:16 +0100 + +curl (8.3.0-3) unstable; urgency=high + + * Add patches to fix CVE-2023-38545 and CVE-2023-38546 + + -- Samuel Henrique Thu, 05 Oct 2023 22:26:40 +0100 + +curl (8.3.0-2) unstable; urgency=medium + + * d/rules: Add test 3102 to TESTS_FAILS_ON_IPV6_ONLY_MACHINES + * d/patches: Import two upstream patches to try to fix FTBFS on armel/armhf + - test650_fix_an_end_tag_typo.patch + - tests_increase_the_default_server_logs_lock_timeout.patch + * d/p/lib_use_wrapper_for_curl_mime_data_fseek_callback.patch: New patch to + fix armel/armhf FTBFS + + -- Samuel Henrique Sun, 01 Oct 2023 15:01:42 +0100 + +curl (8.3.0-1) unstable; urgency=medium + + * New upstream version 8.3.0 + - Fix CVE-2023-38039: HTTP headers eat all memory + * debian/: Remove files used for the nss packaging + * d/patches: + - Refresh patches + - gen_pl_escape_all_dashes.patch: Drop merged patch + - 90_gnutls.patch: Update patch + * d/libcurl*.symbols: New symbol curl_global_trace + + -- Samuel Henrique Thu, 14 Sep 2023 16:13:10 +0530 + +curl (8.2.1-2) unstable; urgency=medium + + [ Andreas Hasenack ] + * Move ldap-test to a script and add retry logic + + [ Samuel Henrique ] + * Build without nss, dropped by upstream in the next release + * d/p/gen_pl_escape_all_dashes.patch: New patch to fix manpage generation + (closes: #1043309, #1043339) + + -- Samuel Henrique Fri, 25 Aug 2023 20:05:02 +0100 + +curl (8.2.1-1) unstable; urgency=medium + + [ Samuel Henrique ] + * New upstream version 8.2.1 + + [ Sergio Durigan Junior ] + * d/p/{90_gnutls,99_nss}.patch: + Update GNUTls/NSS patches to unbreak tests/http/clients + * Drop unnecessary patches. + d/p/CVE-2023-27533.patch + d/p/CVE-2023-27534.patch + d/p/CVE-2023-27535.patch + d/p/CVE-2023-27536.patch + d/p/CVE-2023-27537.patch + d/p/CVE-2023-27538.patch + d/p/CVE-2023-28319.patch + d/p/CVE-2023-28320-1.patch + d/p/CVE-2023-28320.patch + d/p/CVE-2023-28321.patch + d/p/CVE-2023-28322.patch + d/p/CVE-2023-32001.patch + d/p/Use-OpenLDAP-specific-functionality.patch + d/p/fix-unix-domain-socket.patch + + -- Sergio Durigan Junior Thu, 03 Aug 2023 20:00:01 -0400 + +curl (7.88.1-11) unstable; urgency=medium + + [ Carlos Henrique Lima Melara ] + * Fix CVE-2023-32001: TOCTOU race condition in Curl_fopen(): + - Done by d/p/CVE-2023-32001.patch (Closes: #1041812). + + [ John Scott ] + * LDAP backend: correct the usage of OpenLDAP-specific functionality being + disabled with an upstream patch (Closes: #1041964) + This corrects the improper fetching of binary attributes. + * debian/tests: add a DEP-8 test that getting binary LDAP attributes works now + + -- Samuel Henrique Fri, 28 Jul 2023 21:11:25 +0100 + +curl (7.88.1-10) unstable; urgency=medium + + * Add new patches to fix CVEs (closes: #1036239): + - CVE-2023-28319: UAF in SSH sha256 fingerprint check + - CVE-2023-28320: siglongjmp race condition + - CVE-2023-28321: IDN wildcard match + - CVE-2023-28322: more POST-after-PUT confusion + * d/libcurl*.symbols: Drop curl_jmpenv, not built anymore due to + CVE-2023-28320 + + -- Samuel Henrique Thu, 18 May 2023 23:43:40 +0100 + +curl (7.88.1-9) unstable; urgency=medium + + [ Sergio Durigan Junior ] + * d/p/Use-correct-path-when-loading-libnss-pem-ckbi-.so.patch: + Don't prepend "nss" when opening libnssckbi.so. (Closes: #1034359) + + [ Samuel Henrique ] + * Update list of tests that fail on IPv6-only envs and don't skip them on + autopkgtest + * d/p/fix-unix-domain-socket.patch: Import upstream patch to fix --unix + (closes: #1033963) + + -- Samuel Henrique Sat, 15 Apr 2023 20:03:44 +0100 + +curl (7.88.1-8) unstable; urgency=medium + + [ Samuel Henrique ] + * d/gbp.conf: Push gbp conf with sane defaults + * d/salsa-ci.yml: Disable dh_auto_test with DEB_BUILD_OPTIONS + * d/rules: Add new build profiles to limit builds to a single TLS backend + * d/tests: Add new autopkgtests that runs curl's test suite + + [ Sergio Durigan Junior ] + * d/rules: Remove -D_DEB_HOST_ARCH from curl-config's CFLAGS. + + -- Samuel Henrique Sun, 26 Mar 2023 11:36:24 +0100 + +curl (7.88.1-7) unstable; urgency=medium + + * Bump Standards-Version to 4.6.2 + * d/p/06_always-disable-valgrind.patch: Remove unused patch + * d/patches: Refresh all patches + * Import 5 new upstream patches fixing CVES: + - CVE-2023-27533: TELNET option IAC injection + - CVE-2023-27534: SFTP path ~ resolving discrepancy + - CVE-2023-27535: FTP too eager connection reuse + - CVE-2023-27536: GSS delegation too eager connection re-use + - CVE-2023-27537: HSTS double-free + - CVE-2023-27538: SSH connection too eager reuse still + + -- Samuel Henrique Tue, 21 Mar 2023 22:39:05 +0000 + +curl (7.88.1-6) unstable; urgency=medium + + * d/rules: Ignore test results from tests that fail on IPv6-only builders + (closes: #1032343) + * d/control: Don't install gnutls-bin for tests on ppc64el (tests hangs + forever) + + -- Samuel Henrique Wed, 08 Mar 2023 20:57:09 +0000 + +curl (7.88.1-5) unstable; urgency=medium + + * Fix stringification of _DEB_HOST_ARCH macro. + - d/p/Use-correct-path-when-loading-libnss-pem-ckbi-.so.patch: + Use _DEB_HOST_ARCH directly. + - d/rules: Quote _DEB_HOST_ARCH when passing it with -D. + + -- Sergio Durigan Junior Mon, 06 Mar 2023 10:22:32 -0500 + +curl (7.88.1-4) unstable; urgency=medium + + * d/p/Use-correct-path-when-loading-libnss-pem-ckbi-.so.patch: + Prepend "/nss/" before the library name. + + -- Sergio Durigan Junior Sun, 05 Mar 2023 18:38:13 -0500 + +curl (7.88.1-3) unstable; urgency=medium + + * d/p/Use-correct-path-when-loading-libnss-pem-ckbi-.so.patch: + Use correct paths when loading libnss{pem,ckbi}.so. (Closes: #726073) + * d/rules: Pass _DEB_HOST_ARCH via C{,XX}FLAGS; reenable NSS PEM tests. + * d/control: B-D on nss-plugin-pem (test only). + Also, make libcurl3-nss depend on nss-plugin-pem as well. + + -- Sergio Durigan Junior Sun, 05 Mar 2023 12:59:58 -0500 + +curl (7.88.1-2) unstable; urgency=medium + + * Multiple test improvements, which will increase the reliability of the + package, especially when backporting fixes on stable and oldstable: + - Test results are now critical to the build process, if a test fails, + the build will fail. + - Add two new test build-dependencies to increase coverage: locales-all + and gnutls-bin. + - Only run non-flaky tests. + - Print logs of failed tests. + - Run all tests even if there was a failure. + - Ignore results of known failing tests (for Debian). + - Disable valgrind through a test parameter instead of patching + upstream source code. + + -- Samuel Henrique Fri, 03 Mar 2023 08:28:19 +0000 + +curl (7.88.1-1) unstable; urgency=medium + + * New upstream version 7.88.1 + - Fix the following CVEs (closes: #1031371) + ~ CVE-2023-23916: HTTP multi-header compression denial of service + ~ CVE-2023-23915: HSTS amnesia with --parallel + ~ CVE-2023-23914: HSTS ignored on multiple requests + - Fix curl_multi_socket_action regression (closes: #1029231) + * d/patches: Drop backported patch added to fix regression in setopt/getinfo + * d/copyright: Drop removed file from copyright + * d/control: Update BD to drop transitional package libidn11-dev + + -- Samuel Henrique Mon, 20 Feb 2023 22:35:53 +0000 + +curl (7.87.0-2) unstable; urgency=medium + + * d/patches: Add new upstream patch to fix regression in setopt/getinfo + (closes: #1027564) + * d/p/build-Divide-mit-krb5...patch: Refresh patch + + -- Samuel Henrique Sun, 15 Jan 2023 21:12:09 +0000 + +curl (7.87.0-1) unstable; urgency=medium + + * New upstream version 7.87.0 + * d/patches: + - Update patches + - Drop all backported patches that are applied in the new release + * d/copyright: Remove missing file + * d/*.lintian-overrides: Remove unused overrides + + [ Simon McVittie ] + * Make -dev packages 'Multi-Arch: same' back again (closes: #1024668) + + -- Samuel Henrique Fri, 23 Dec 2022 20:36:01 +0000 + +curl (7.86.0-3) unstable; urgency=medium + + * Fix two HSTS-related CVEs. + - d/p/CVE-2022-43551-another-hsts-bypass-via-idn.patch: use the IDN + decoded name in HSTS checks. + (Closes: #1026829, CVE-2022-43551) + - d/p/CVE-2022-43552-http-proxy-deny-use-after-free.patch: do not free + smb's/telnet's protocol struct in *_done(). + (Closes: #1026830, CVE-2022-43552) + + -- Sergio Durigan Junior Wed, 21 Dec 2022 15:55:18 -0500 + +curl (7.86.0-2) unstable; urgency=medium + + [ Debian Janitor ] + * Apply multi-arch hints. + libcurl4-gnutls-dev, libcurl4-nss-dev, + libcurl4-openssl-dev: Drop Multi-Arch: same. + + [ Samuel Henrique ] + * d/patches: Backport three upstream patches to fix noproxy option. + + -- Samuel Henrique Tue, 15 Nov 2022 21:04:55 +0000 + +curl (7.86.0-1) unstable; urgency=medium + + * New upstream version 7.86.0 + - Fix HSTS bypass via IDN: + curl's HSTS check could be bypassed to trick it to keep using HTTP. + (closes: CVE-2022-42916) + - Fix HTTP proxy double-free (closes: CVE-2022-42915) + - Fix .netrc parser out-of-bounds access (closes: CVE-2022-35260) + - Fix POST following PUT confusion (closes: CVE-2022-32221) + + -- Samuel Henrique Thu, 27 Oct 2022 20:38:24 +0100 + +curl (7.85.0-1) unstable; urgency=medium + + * New upstream version 7.85.0 + - Fix control code in cookie denial of service: + When curl retrieves and parses cookies from an HTTP(S) server, it + accepts cookies using control codes (byte values below 32). When cookies + that contain such control codes are later sent back to an HTTP(S) server, + it might make the server return a 400 response. Effectively allowing a + "sister site" to deny service to siblings + (closes: #1018831, CVE-2022-35252) + - Fix FTBFS on riscv64 with gcc-12 (closes: #1015835) + * Bump Standards-Version to 4.6.1 + * Add lintian overrides for old-style-config-script-multiarch-path triggered + for curl-config + * d/patches: + - 11_omit-directories-from-config.patch: Update patch + - 20_ftbfs_import_sched.patch: Drop patch, applied upstream + * d/rules: Fix configure args, remove bogus '--without-ssl' + * d/copyright: Update the whole file + * d/(control|watch): Update upstream's URL + + -- Samuel Henrique Fri, 02 Sep 2022 13:00:10 +0100 + +curl (7.84.0-2) unstable; urgency=medium + + * d/p/20_ftbfs_import_sched.patch: New upstream patch to fix FTBFS + (closes: #1014596) + + -- Samuel Henrique Mon, 11 Jul 2022 22:50:01 +0100 + +curl (7.84.0-1) unstable; urgency=medium + + * New upstream version 7.84.0 + - Fix the following CVEs: + ~ Improper Enforcement of Message Integrity During Transmission in a + Communication Channel (CVE-2022-32208) + ~ Improper Preservation of Permissions (CVE-2022-32207) + ~ Allocation of Resources Without Limits or Throttling (CVE-2022-32205, + CVE-2022-32206) + + -- Samuel Henrique Mon, 27 Jun 2022 22:06:25 +0100 + +curl (7.83.1-2) unstable; urgency=medium + + * d/p/fix_multiline_header_regression.patch: New upstream patch to fix + regression (closes: #1012263, #1011696) + + -- Samuel Henrique Tue, 14 Jun 2022 18:05:23 +0100 + +curl (7.83.1-1) unstable; urgency=medium + + * New upstream version 7.83.1 + - Fix the following CVEs: + ~ HSTS bypass via trailing dot (CVE-2022-30115) + ~ TLS and SSH connection too eager reuse (CVE-2022-27782) + ~ CERTINFO never-ending busy-loop (CVE-2022-27781) + ~ percent-encoded path separator in URL host (CVE-2022-27780) + ~ cookie for trailing dot TLD (CVE-2022-27779) + ~ curl removes wrong file on error (CVE-2022-27778) + + -- Samuel Henrique Wed, 11 May 2022 17:46:48 +0100 + +curl (7.83.0-1) unstable; urgency=medium + + * New upstream version 7.83.0 + - Fix auth/cookie leak on redirect (closes: #1010252, CVE-2022-27776) + - Fix bad local IPv6 connection reuse (closes: #1010253, CVE-2022-27775) + - Fix credential leak on redirect (closes: #1010254, CVE-2022-27774) + - Fix OAUTH2 bearer bypass in connection re-use + (closes: #1010295, CVE-2022-22576) + * d/libcurl*.symbols: update symbols files to add curl_easy_header and + curl_easy_nextheader + * d/patches: + - Refresh patches + - 12_fix_openssl_cm_check.patch: remove patch, applied upstream + + -- Samuel Henrique Thu, 28 Apr 2022 18:53:32 +0100 + +curl (7.82.0-2) unstable; urgency=medium + + * d/p/12_fix_openssl_cm_check.patch: New upstream patch to fix openssl CN + check (closes: #1007739, #1007740) + * d/control: + - Set libcurl4-doc as Multi-Arch: foreign + - Remove ancient version requirements for dependencies + * d/salsa-ci.yml: Disable reprotest until it acknowledges + SALSA_CI_DPKG_BUILDPACKAGE_ARGS + + -- Samuel Henrique Sat, 19 Mar 2022 13:55:00 +0000 + +curl (7.82.0-1) unstable; urgency=medium + + * New upstream version 7.82.0 + * d/salsa-ci.yml: Add CI definition customized to skip tests (nocheck), to + avoid long build times + * Update and refresh patches: 13_fix-man-formatting.patch has been merged + upstream + * d/rules: + - Add --with-nss-deprecated, required to build with nss now + (upstream will drop support in August) + - Look for nocheck build profile in DEB_BUILD_PROFILES instead of + DEB_BUILD_OPTIONS (wider coverage) + + -- Samuel Henrique Sat, 05 Mar 2022 13:40:14 +0000 + +curl (7.81.0-1) unstable; urgency=medium + + * New upstream version 7.81.0 + * d/p/13_fix-man-formatting.patch: Refresh patch + + -- Samuel Henrique Wed, 05 Jan 2022 09:31:32 -0300 + +curl (7.80.0-3) unstable; urgency=medium + + * Revert "Revert "debian/control: Add Build-Depends on libssh-dev for + Ubuntu". + + As per #1002598, the blocker has been solved. + + Note that this does not changes Debian's curl to libssh, it still + uses libssh2. + + Discussions about changing to libssh are ongoing at #897950 + + -- Samuel Henrique Sun, 26 Dec 2021 13:22:18 -0300 + +curl (7.80.0-2) unstable; urgency=medium + + * Revert "debian/control: Add Build-Depends on libssh-dev for Ubuntu" + (closes: #1002597) + The change had side effects on Debian due to the inclusion of the new + Build-dep, even though it doesn't changes the resulting binary. It cause + issues for architecture bootstraping. + + We are gonna reintroduce this change once the issues are fixed, to allow + Ubuntu to remove its delta. + + See discussions at #1002598 and #1002597 for details + + -- Samuel Henrique Sat, 25 Dec 2021 10:47:13 -0300 + +curl (7.80.0-1) unstable; urgency=medium + + [ Samuel Henrique ] + * New upstream version 7.80.0 + * Bump Standards-Version to 4.6.0 + * Add new symbol curl_url_strerror to symbols files + * Compile with zstd support (closes: #983660) + * d/p/12_use-python3-in-tests.patch: Drop patch, merged upstream + * d/p/13_fix-man-formatting.patch: Update patch + * d/p/14_fix-compatibility-impacket-0-9-23.patch: Drop patch, merged upstream + + [ Jeremy Bicha ] + * debian/control: Add Build-Depends on libssh-dev for Ubuntu + + -- Samuel Henrique Fri, 24 Dec 2021 11:42:57 -0300 + +curl (7.79.1-2) unstable; urgency=medium + + * d/rules: Make test failures non-fatal again. + Unfortunately there are some test failures happening on a few + architectures, so we have to make the build pass even if not all tests + are succeeding, at least until we have time to properly investigate + the reason for these failures. + + -- Sergio Durigan Junior Mon, 08 Nov 2021 23:54:35 -0500 + +curl (7.79.1-1) unstable; urgency=medium + + [ Samuel Henrique ] + * Add myself as an Uploader + * Add sergiodj as an uploader + * New upstream version 7.79.1 (closes: #989046) + - Changes since 7.74.0: + ~ vtls: fix connection reuse checks for issuer cert and case sensitivity + (closes: #991492, CVE-2021-22924) + ~ Fix User-Agent header missing in some cases (closes: #994940) + ~ Fix TELNET stack contents disclosure (closes: #989228, CVE-2021-22898) + * d/rules: Add --with-{openssl|gnutls|nss} to configure args + * Update all patches. + Remove patches: + - 07_do-not-disable-debug-symbols: Obsolete as per + https://github.com/curl/curl/issues/7216. + - 14_transfer-strip-credentials-from-the-auto-referer-hea: + Originally from upstream, part of the release now. + - 15_vtls-add-isproxy-argument-to-Curl_ssl_get-addsession: + Originally from upstream, part of the release now. + - fix-regression-microseconds-instead-of-seconds: + Originally from upstream, part of the release now. + Update patches: + - 12_use-python3-in-tests: Update and forward upstream. + - 90_gnutls: Update + - 99_nss: Update + - 13_fix-man-formatting: Update + + [ Debian Janitor ] + * Use secure URI in Homepage field. + * Set debhelper-compat version in Build-Depends. + * Set upstream metadata fields: Bug-Database, + Bug-Submit (from ./configure), Repository, Repository-Browse. + * Avoid explicitly specifying -Wl,--as-needed linker flag. + + [ Helmut Grohne ] + * Also remove -ffile-prefix-map from curl-config (closes: #990128) + * Explicitly disable zstd support (closes: #992505) + + [ Sergio Durigan Junior ] + * d/control: Add Rules-Requires-Root: no. + * d/copyright: Add public-domain license text. + * Enable GPG-checking of orig tarball. + - d/upstream/signing-key.asc: Upstream public key. + - d/watch: Add "pgpmode=auto" as an option. + * Bump debhelper-compat to 13. + - d/control: B-D on debhelper-compat = 13. + - d/rules: After the override_dh_auto_install target has been run, + we know that we can safely get rid of the contents inside the + debian/tmp/ directory. This is needed because otherwise dh_missing + will complain about uninstalled files, which will make the build + fail when using debhelper-compat 13. + * d/rules: Some minor cleanup and removal of unneeded comments. + * d/rules: Honour "nocheck" build option. + * Make OpenSSL and GNUTLS builds fail if tests fail + - d/rules: Adjust rule to make OpenSSL and GNUTLS builds fail if their + tests fail. Unfortunately, it's still not possible to make the NSS + build fail if its tests fail; we're still investigating the failures + there with it. + - d/p/14_fix-compatibility-impacket-0-9-23.patch: Needed patch + to make tests pass with impacket 0.9.23+. + + -- Samuel Henrique Mon, 08 Nov 2021 21:14:47 +0000 + +curl (7.74.0-1.3) unstable; urgency=medium + + * Non-maintainer upload. + * Add upstream patch bc7ecc7 so curl -w times shown as seconds with + fractions (Closes: #989064) + + -- Paul Gevers Fri, 25 Jun 2021 20:59:54 +0200 + +curl (7.74.0-1.2) unstable; urgency=medium + + * Non-maintainer upload. + * transfer: strip credentials from the auto-referer header field + (CVE-2021-22876) (Closes: #986269) + * vtls: add 'isproxy' argument to Curl_ssl_get/addsessionid() + (CVE-2021-22890) (Closes: #986270) + + -- Salvatore Bonaccorso Sat, 03 Apr 2021 14:43:39 +0200 + +curl (7.74.0-1.1) unstable; urgency=medium + + * Non-maintainer upload. + + [ Bruno Kleinert ] + * Fixed "Please build-depend on libidn2-dev instead of obsolete transition + package libidn2-0-dev" (Closes: #974996) + + -- Samuel Henrique Wed, 10 Feb 2021 00:42:40 +0000 + +curl (7.74.0-1) unstable; urgency=medium + + * New upstream release + + Fix inferior OCSP verification as per CVE-2020-8286 (Closes: #977161) + https://curl.se/docs/CVE-2020-8286.html + + Fix FTP wildcard stack overflow as per CVE-2020-8285 (Closes: #977162) + https://curl.se/docs/CVE-2020-8285.html + + Fix trusting FTP PASV responses as per CVE-2020-8284 (Closes: #977163) + https://curl.se/docs/CVE-2020-8284.html + * Update debian/watch to new upstream download page layout + * Update 12_use-python3-in-tests.patch due to renamed file + * Refresh patches + * Fix cross-build due to python build dependencies. + Thanks to Helmut Grohne for the patch (Closes: #969004) + * Fix formatting in some man pages. + Thanks to Bjarni Ingi Gislason for the patch (Closes: #963559) + * Update list of documentation files to install + * Update symbols + * Bump Standards-Version to 4.5.1 (no changes needed) + * Drop removed file from d/copyright + + -- Alessandro Ghedini Thu, 31 Dec 2020 15:22:05 +0100 + +curl (7.72.0-1) unstable; urgency=medium + + * New upstream release + + Fix partial password leak over DNS on HTTP redirect as per CVE-2020-8169 + (Closes: #965280) + https://curl.haxx.se/docs/CVE-2020-8169.html + + Fix local file overwrite with -J option as per CVE-2020-8177 + (Closes: #965281) + https://curl.haxx.se/docs/CVE-2020-8177.html + + Fix wrong connect-only connection as per CVE-2020-8231 (Closes: #968831) + https://curl.haxx.se/docs/CVE-2020-8231.html + * Refresh patches + * Do not install *.la files. + Thanks to Pino Toscano for the patch. (Closes: #955785) + * Update list of doc files + * Update copyright for polarssl -> mbedtls rename + * Use python3 executable in tests + + -- Alessandro Ghedini Mon, 24 Aug 2020 10:26:12 +0200 + +curl (7.68.0-1) unstable; urgency=medium + + * New upstream release + * Bump Standards-Version to 4.5.0 (no changes needed) + * Update symbols files + * Configure default CA file with OpenSSL again (Closes: #948441) + + -- Alessandro Ghedini Sat, 22 Feb 2020 14:37:19 +0000 + +curl (7.67.0-2) unstable; urgency=medium + + * Restore :native annotation for python3 Build-Depends. + Thanks to Helmut Grohne for the patch (Closes: #945928) + + -- Alessandro Ghedini Sun, 01 Dec 2019 13:29:28 +0000 + +curl (7.67.0-1) unstable; urgency=medium + + * New upstream release + * Replace python with python3 in Build-Depends (Closes: #942984) + * Bump Standards-Version to 4.4.1 (no changes needed) + + -- Alessandro Ghedini Sat, 30 Nov 2019 12:45:07 +0000 + +curl (7.66.0-1) unstable; urgency=medium + + * New upstream release (Closes: #940024) + + Fix FTP-KRB double-free as per CVE-2019-5481 (Closes: #940009) + https://curl.haxx.se/docs/CVE-2019-5481.html + + Fix TFTP small blocksize heap buffer overflow as per CVE-2019-5482 + (Closes: #940010) + https://curl.haxx.se/docs/CVE-2019-5482.html + * Refresh patches + * Enable brotli support (Closes: #940129) + * Update *.symbols files + + -- Alessandro Ghedini Sun, 15 Sep 2019 15:47:05 +0100 + +curl (7.65.3-1) unstable; urgency=medium + + * New upstream release + * Drop 12_fix-man-errors.patch (merged upstream) + * Remove Ian Jackson from Uploaders as he has never done an upload + + -- Alessandro Ghedini Fri, 09 Aug 2019 19:45:02 +0100 + +curl (7.65.1-1) unstable; urgency=medium + + * New upstream release + + Reduce verbose output (Closes: #926148) + + Fix parsing URLs with link local addresses (Closes: #926812) + * Drop patches merged upstream + * Refresh patches + * Bump STandards-Version to 4.4.0 (no changes needed) + * Update entry in copyright for renamed files + * Fix some man errors. + Thanks to Bjarni Ingi Gislason for the patch (Closes: #926352) + * Add Build-Depends-Package field to symbols files + + -- Alessandro Ghedini Sat, 13 Jul 2019 12:37:09 +0100 + +curl (7.64.0-4) unstable; urgency=medium + + * Fix TFTP receive buffer overflow as per CVE-2019-5436 (Closes: #929351) + https://curl.haxx.se/docs/CVE-2019-5436.html + * Fix integer overflow in curl_url_set() as per CVE-2019-5435 (Closes: #929352) + https://curl.haxx.se/docs/CVE-2019-5435.html + + -- Alessandro Ghedini Fri, 14 Jun 2019 19:23:32 +0100 + +curl (7.64.0-3) unstable; urgency=medium + + * Fix potential crash in HTTP/2 code and busy loop at the end of connections + (Closes: #927471) + + -- Alessandro Ghedini Sat, 04 May 2019 12:51:06 +0100 + +curl (7.64.0-2) unstable; urgency=medium + + * Fix infinite loop when fetching URLs with unreachable IPv6 (Closes: #922554) + + -- Alessandro Ghedini Thu, 07 Mar 2019 20:02:35 +0000 + +curl (7.64.0-1) unstable; urgency=medium + + * New upstream release + + Fix NTLM type-2 out-of-bounds buffer read as per CVE-2018-16890 + https://curl.haxx.se/docs/CVE-2018-16890.html + + Fix NTLMv2 type-3 header stack buffer overflow as per CVE-2019-3822 + https://curl.haxx.se/docs/CVE-2019-3822.html + + Fix SMTP end-of-response out-of-bounds read as per CVE-2019-3823 + https://curl.haxx.se/docs/CVE-2019-3823.html + + Fix HTTP negotiation with POST requests (Closes: #920267) + * Refresh patches + * Import fixes for zsh completion script generator (Closes: #92145) + + -- Alessandro Ghedini Wed, 06 Feb 2019 22:33:05 +0000 + +curl (7.63.0-1) unstable; urgency=medium + + * New upstream release + + Fix IPv6 numeral address parser (Closes: #915520) + + Fix timeout handling (Closes: #914793) + + Fix HTTP auth to include query in URI (Closes: #913214) + * Drop 12_fix-runtests-curl.patch (merged upstream) + * Update symbols + * Update copyright for removed files + * Bump debhlper compat level to 12 + * Bump Standards-Version to 4.3.0 (no changes needed) + + -- Alessandro Ghedini Tue, 15 Jan 2019 20:47:40 +0000 + +curl (7.62.0-1) unstable; urgency=medium + + * New upstream release + + Fix NTLM password overflow via integer overflow as per CVE-2018-14618 + (Closes: #908327) https://curl.haxx.se/docs/CVE-2018-14618.html + + Fix SASL password overflow via integer overflow as per CVE-2018-16839 + https://curl.haxx.se/docs/CVE-2018-16839.html + + Fix use-after-free in handle close as per CVE-2018-16840 + https://curl.haxx.se/docs/CVE-2018-16840.html + + Fix warning message out-of-buffer read as per CVE-2018-16842 + https://curl.haxx.se/docs/CVE-2018-16842.html + + Fix broken terminal output (closes: #911333) + * Refresh patches + * Add 12_fix-runtests-curl.patch to fix running curl in tests + + -- Alessandro Ghedini Wed, 31 Oct 2018 22:42:44 +0000 + +curl (7.61.0-1) unstable; urgency=medium + + * New upstream release + + Fix SMTP send heap buffer overflow as per CVE-2018-0500 (Closes: #903546) + https://curl.haxx.se/docs/adv_2018-70a2.html + + Fix some crashes related to HTTP/2 (Closes: #902628) + * Disable libssh2 on Ubuntu. + Thanks to Gianfranco Costamagna for the patch (Closes: #888449) + * Bump Standards-Version to 4.2.0 (no changes needed) + * Don't configure default CA bundle with OpenSSL and GnuTLS (Closes: #883174) + + -- Alessandro Ghedini Sat, 11 Aug 2018 13:32:28 +0100 + +curl (7.60.0-2) unstable; urgency=medium + + [ Steve Langasek ] + * Build-depend on libssl-dev instead of libssl1.0-dev. + * Rename libcurl3 to libcurl4, because libcurl exposes an SSL_CTX via + CURLOPT_SSL_CTX_FUNCTION, and this object changes incompatibly between + openssl 1.0 and openssl 1.1. + * debian/patches/03_keep_symbols_compat.patch: drop, since we are no longer + claiming compatibility. + * debian/patches/90_gnutls.patch: Retain symbol versioning compatibility for + non-OpenSSL builds. Closes: #858398. + * Adjust libssl1.1 vs libssl1.0 Suggests/Conflicts; thanks, Adrian Bunk + + -- Alessandro Ghedini Wed, 23 May 2018 20:25:39 +0100 + +curl (7.60.0-1) unstable; urgency=medium + + * New upstream release (Closes: #891997, #893546, #898856) + + Fix use of IPv6 literals with NO_PROXY + + Fix NIL byte out of bounds write due to FTP path trickery + as per CVE-2018-1000120 + https://curl.haxx.se/docs/adv_2018-9cd6.html + + Fix LDAP NULL pointer dereference as per CVE-2018-1000121 + https://curl.haxx.se/docs/adv_2018-97a2.html + + Fix RTSP RTP buffer over-read as per CVE-2018-1000122 + https://curl.haxx.se/docs/adv_2018-b047.html + + Fix heap buffer overflow when closing down an FTP connection + with very long server command replies as per CVE-2018-1000300 + https://curl.haxx.se/docs/adv_2018-82c2.html + + Fix heap buffer over-read when parsing bad RTSP headers + as per CVE-2018-1000301 + https://curl.haxx.se/docs/adv_2018-b138.html + * Refresh patches + * Bump Standards-Version to 4.1.4 (no changes needed) + + -- Alessandro Ghedini Fri, 18 May 2018 20:21:17 +0100 + +curl (7.58.0-2) unstable; urgency=medium + + * Explicitly enable libssh2 support which got silently disabled in the + previous update + + -- Alessandro Ghedini Wed, 24 Jan 2018 20:27:50 +0000 + +curl (7.58.0-1) unstable; urgency=medium + + * New upstream release + - Fix HTTP/2 trailer out-of-bounds read as per CVE-2018-1000005 + https://curl.haxx.se/docs/adv_2018-824a.html + - Fix HTTP authentication leak in redirects as per CVE-2018-1000007 + https://curl.haxx.se/docs/adv_2018-b3bf.html + * Point Vcs-* to salsa.d.o + * Bump Standards-Version to 4.1.3 (no changes needed) + * Bump debhlper compat level to 11 + * Refresh patches + * fix insecure-copyright-format-uri + + -- Alessandro Ghedini Wed, 24 Jan 2018 11:13:58 +0000 + +curl (7.57.0-1) unstable; urgency=medium + + * New upstream release + - Fix NTLM buffer overflow via integer overflow as per CVE-2017-8816 + https://curl.haxx.se/docs/adv_2017-11e7.html + - Fix FTP wildcard out of bounds read as per CVE-2017-8817 + https://curl.haxx.se/docs/adv_2017-ae72.html + - Fix SSL out of buffer access as per CVE-2017-8818 + https://curl.haxx.se/docs/adv_2017-af0a.html + * Remove -fdebug-prefix-map from curl-config. + Thanks to Timo Weingärtner for the patch (Closes: #861974, #874223, #874238) + * Don't install zsh completion when cross compiling. + Thanks to Wookey for the patch (Closes: #812965) + + -- Alessandro Ghedini Thu, 30 Nov 2017 10:16:03 +0000 + +curl (7.56.1-1) unstable; urgency=medium + + * New upstream release + - Fix IMAP FETCH response out of bounds read as per CVE-2017-1000257 + https://curl.haxx.se/docs/adv_20171023.html + * Bump Standards-Version to 4.1.1 (no changes needed) + * Drop 01_runtests_gdb.patch + * Drop 12_dont-wait-on-CONNECT.patch + * Refresh patches + * Update *.symbols files + * Use https:// URL in watch file + + -- Alessandro Ghedini Tue, 24 Oct 2017 11:05:48 +0100 + +curl (7.55.1-1) unstable; urgency=medium + + * New upstream release + - Fix FTBFS on powerpc (Closes: #872502) + * Apply upstream patch to fix connection timeouts with NetworkManager + (Closes: #873181) + * Refresh patches + * Bump Standards-Version to 4.1.0 (no changes needed) + + -- Alessandro Ghedini Sat, 02 Sep 2017 12:10:22 +0100 + +curl (7.55.0-1) unstable; urgency=medium + + * New upstream release + - Fix TFTP sends more than buffer size as per CVE-2017-1000100 + (Closes: #871555) + - Fix URL globbing out of bounds read as per CVE-2017-1000101 + (Closes: #871554) + * Refresh patches and drop patches merged upstream + * Update Standards-Version to 4.0.1 (no changes needed) + * Drop -dbg package + + -- Alessandro Ghedini Sat, 12 Aug 2017 15:18:05 +0100 + +curl (7.52.1-5) unstable; urgency=high + + * Fix TLS session resumption client cert bypass as per CVE-2017-7468 + https://curl.haxx.se/docs/adv_20170419.html + + -- Alessandro Ghedini Wed, 19 Apr 2017 11:19:50 +0100 + +curl (7.52.1-4) unstable; urgency=medium + + * Fix regression in CONNECT response handling (Closes: #857613) + * Fix buffer read overrun on --write-out as per CVE-2017-7407 + https://curl.haxx.se/docs/adv_20170403.html (Closes: #859500) + + -- Alessandro Ghedini Sat, 08 Apr 2017 21:55:27 +0100 + +curl (7.52.1-3) unstable; urgency=high + + * Make SSL_VERIFYSTATUS work again as per CVE-2017-2629 + https://curl.haxx.se/docs/adv_20170222.html + + -- Alessandro Ghedini Tue, 21 Feb 2017 22:38:41 +0000 + +curl (7.52.1-2) unstable; urgency=medium + + * Fix HTTPS connection timeout with OpenSSL (Closes: #852317) + + -- Alessandro Ghedini Sun, 29 Jan 2017 21:34:10 +0000 + +curl (7.52.1-1) unstable; urgency=medium + + * New upstream release + - Fix printf floating point buffer overflow as per CVE-2016-9586 + (Closes: #848958) + * B-D on "libssl1.0-dev | libssl-dev (<< 1.1)" (Closes: #850880, #844018) + * Another attempt at making -dev packages multi-arch. + Thanks to Benjamin Moody for the patches. (Closes: #731998, #846360) + * Enable support for PSL (Closes: #847958) + * Re-enable support for IDN (Closes: #849539) + * Drop 10_disable-network-tests.patch. + It didn't really work, and the issue is not urgent. + * Switch curl binary back to libcurl3/OpenSSL. + While the GnuTLS flavour mostly worked fine, there are a bunch of features + that are not implemented. + + -- Alessandro Ghedini Thu, 12 Jan 2017 22:02:44 +0000 + +curl (7.51.0-1) unstable; urgency=medium + + * New upstream release + - Fix cookie injection for other servers as per CVE-2016-8615 + https://curl.haxx.se/docs/adv_20161102A.html + - Fix case insensitive password comparison as per CVE-2016-8616 + https://curl.haxx.se/docs/adv_20161102B.html + - Fix OOB write via unchecked multiplication as per CVE-2016-8617 + https://curl.haxx.se/docs/adv_20161102C.html + - Fix double-free in curl_maprintf as per CVE-2016-8618 + https://curl.haxx.se/docs/adv_20161102D.html + - Fix double-free in krb5 code as per CVE-2016-8619 + https://curl.haxx.se/docs/adv_20161102E.html + - Fix glob parser write/read out of bounds as per CVE-2016-8620 + https://curl.haxx.se/docs/adv_20161102F.html + - Fix curl_getdate read out of bounds as per CVE-2016-8621 + https://curl.haxx.se/docs/adv_20161102G.html + - Fix URL unescape heap overflow via integer truncation as per CVE-2016-8622 + https://curl.haxx.se/docs/adv_20161102H.html + - Fix use-after-free via shared cookies as per CVE-2016-8623 + https://curl.haxx.se/docs/adv_20161102I.html + - Fix invalid URL parsing with '#' as per CVE-2016-8624 + https://curl.haxx.se/docs/adv_20161102J.html + - Fix IDNA 2003 makes curl use wrong host + https://curl.haxx.se/docs/adv_20161102K.html + - Fix escape and unescape integer overflows as + per CVE-2016-7167 (Closes: #837945) + https://curl.haxx.se/docs/adv_20160914.html + - Fix incorrect reuse of client certificates (NSS backend) + as per CVE-2016-7141 (Closes: #836918) + https://curl.haxx.se/docs/adv_20160907.html + * Drop 02_art_http_scripting.patch (file not shipped anymore) + * Refresh patches + * Temporarily disable IDN support + * Don't install pdf and html docs (they are not shipped in the tarball anymore) + * Install markdown docs + + -- Alessandro Ghedini Thu, 03 Nov 2016 22:46:14 +0000 + +curl (7.50.1-2) unstable; urgency=medium + + * Disable more network tests (Closes: #830273) + + -- Alessandro Ghedini Sun, 28 Aug 2016 14:48:05 +0100 + +curl (7.50.1-1) unstable; urgency=medium + + * New upstream release (Closes: #827900) + - Fix TLS session resumption client cert bypass as per CVE-2016-5419 + https://curl.haxx.se/docs/adv_20160803A.html + - Fix re-using connection with wrong client cert as per CVE-2016-5420 + https://curl.haxx.se/docs/adv_20160803B.html + - Fix use of connection struct after free as per CVE-2016-5421 + https://curl.haxx.se/docs/adv_20160803C.html + - Support OpenSSL 1.1 (Closes: #828127) + * Fix 04_workaround_as_needed_bug.patch. + Thanks to Yuriy M. Kaminskiy for the patch (Closes: #818131) + * Bump Standards-Version to 3.9.8 (no changes needed) + * Update Vcs-* URLs + * Refresh patches + * Add 08_enable-zsh.patch to re-enable zsh completion generation + * Remove 08_fix-zsh-completion.patch (was already disabled) + * Add 09_fix-typo.patch to fix spelling-error-in-manpage + * Add 10_disable-network-tests.patch to disable networked tests + (Closes: #830273) + * Improve cross Build-Depends satisfiability. + Thanks to Helmut Grohne for the patch (Closes: #818092) + + -- Alessandro Ghedini Wed, 03 Aug 2016 12:46:05 +0100 + +curl (7.47.0-1) unstable; urgency=high + + * New upstream release + - Fix NTLM credentials not-checked for proxy connection re-use + as per CVE-2016-0755 + http://curl.haxx.se/docs/adv_20160127A.html + - Set uyrgency=high accordingly + * Remove hard-coded dependency on libgnutls (Closes: #812542) + * Drop 08_fix-zsh-completion.patch (merged upstream) + * Refresh patches + + -- Alessandro Ghedini Wed, 27 Jan 2016 11:45:59 +0000 + +curl (7.46.0-1) unstable; urgency=medium + + * New upstream release + - Initialize OpenSSL algorithms after loading config (Closes: #805408) + * Install curl zsh completion (Closes: #805509) + - Add 08_fix-zsh-completion.patch to fix zsh completion generation + + -- Alessandro Ghedini Sun, 27 Dec 2015 18:18:09 +0100 + +curl (7.45.0-1) unstable; urgency=medium + + * New upstream release + * Drop 08_spelling.patch (merged upstream) + + -- Alessandro Ghedini Wed, 07 Oct 2015 12:59:03 +0200 + +curl (7.44.0-2) unstable; urgency=medium + + * Enable HTTP/2 support (Closes: #796302) + + -- Alessandro Ghedini Thu, 10 Sep 2015 11:25:14 +0200 + +curl (7.44.0-1) unstable; urgency=medium + + * New upstream release + * Refresh patches + * Update symbols files + * Add 08_spelling.patch to fix some spelling errors + + -- Alessandro Ghedini Wed, 12 Aug 2015 11:49:04 +0200 + +curl (7.43.0-1) unstable; urgency=medium + + * New upstream release + - Fix lingering HTTP credentials in connection re-use as per CVE-2015-3236 + http://curl.haxx.se/docs/adv_20150617A.html + - Fix SMB send off unrelated memory contents as per CVE-2015-3237 + http://curl.haxx.se/docs/adv_20150617B.html + * Refresh patches + * Fix spelling-error-in-description + + -- Alessandro Ghedini Wed, 17 Jun 2015 10:21:34 +0200 + +curl (7.42.1-3) unstable; urgency=medium + + * Update copyright + * Set both CA bundle and CA path default values for OpenSSL and GnuTLS + backends + * Bump versioned depends on libgnutls to workaround lack of nettle versioned + symbols (Closes: #787960) + + -- Alessandro Ghedini Sun, 07 Jun 2015 18:15:15 +0200 + +curl (7.42.1-2) unstable; urgency=medium + + * Switch curl binary to libcurl3-gnutls (Closes: #342719) + This is the first step of a possible migration to a GnuTLS-only + libcurl for Debian. Let's see how it goes. + + -- Alessandro Ghedini Sun, 03 May 2015 13:13:15 +0200 + +curl (7.42.1-1) unstable; urgency=high + + * New upstream release + - Don't send sensitive HTTP server headers to proxies as per + CVE-2015-3153 + http://curl.haxx.se/docs/adv_20150429.html + * Drop 08_fix-spelling.patch (merged upstream) + * Refresh patches + + -- Alessandro Ghedini Wed, 29 Apr 2015 10:43:43 +0200 + +curl (7.42.0-1) unstable; urgency=medium + + * New upstream release + - Fix re-using authenticated connection when unauthenticated + as per CVE-2015-3143 + http://curl.haxx.se/docs/adv_20150422A.html + - Fix host name out of boundary memory access as per CVE-2015-3144 + http://curl.haxx.se/docs/adv_20150422D.html + - Fix cookie parser out of boundary memory access as per CVE-2015-3145 + http://curl.haxx.se/docs/adv_20150422C.html + - Fix Negotiate not treated as connection-oriented as per CVE-2015-3148 + http://curl.haxx.se/docs/adv_20150422B.html + - Disable SSLv3 in the OpenSSL backend when OPENSSL_NO_SSL3_METHOD is + defined (Closes: #768562) + * Drop patches merged upstream + * Refresh patches + * Bump Standards-Version to 3.9.6 (no changes needed) + + -- Alessandro Ghedini Wed, 22 Apr 2015 11:07:32 +0200 + +curl (7.38.0-4) unstable; urgency=high + + * Fix URL request injection vulnerability as per CVE-2014-8150 + http://curl.haxx.se/docs/adv_20150108B.html + * Set urgency=high accordingly + + -- Alessandro Ghedini Thu, 08 Jan 2015 10:47:24 +0100 + +curl (7.38.0-3) unstable; urgency=high + + * Enable all hardening options (Closes: #763372) + * Fix duphandle read out of bounds as per CVE-2014-3707 + http://curl.haxx.se/docs/adv_20141105.html + * Set urgency=high accordingly + + -- Alessandro Ghedini Thu, 06 Nov 2014 11:40:24 +0100 + +curl (7.38.0-2) unstable; urgency=medium + + * Check for libtoolize instead of libtool during build. + Thanks to Helmut Grohne for the patch (Closes: #761740) + * Add README.source note regarding ordering of patches (Closes: #762193) + * Add 10_fix-resolver.patch from upstream (Closes: #762014) + + -- Alessandro Ghedini Tue, 23 Sep 2014 16:41:53 +0200 + +curl (7.38.0-1) unstable; urgency=medium + + * New upstream release + - Only use full host matches for hosts used as IP address + as per CVE-2014-3613 + http://curl.haxx.se/docs/adv_20140910A.html + - Reject incoming cookies set for TLDs as per CVE-2014-3620 + http://curl.haxx.se/docs/adv_20140910B.html + * Drop 08_link-curl-to-nss.patch (merged upstream) + * Refresh patches + * Fix wildcard-matches-nothing-in-dep5-copyright + * Add 08_fix-spelling.patch + + -- Alessandro Ghedini Wed, 10 Sep 2014 20:11:02 +0200 + +curl (7.37.1-1) unstable; urgency=medium + + * New upstream release + * Re-enable RTMP support (Closes: #754222) + * Add 08_link-curl-to-nss.patch to fix NSS build + * Refresh patches + * Install manpages of single libcurl options too + + -- Alessandro Ghedini Fri, 18 Jul 2014 10:18:03 +0200 + +curl (7.37.0-1) unstable; urgency=medium + + * New upstream release + - Fix NULL pointer dereference in GnuTLS code (Closes: #746349) + * Drop 08_fix-imap-tests.patch (merged upstream) + * Refresh 01_runtests_gdb.patch + * Remove Build-Depends on libgcrypt + + -- Alessandro Ghedini Wed, 21 May 2014 15:22:38 +0200 + +curl (7.36.0-2) unstable; urgency=medium + + * Move Depends on -dev packages needed to use static libraries to Suggests + * Switch to GnuTLS 3.x (Closes: #741568) + * Disable RTMP support (librtmp-dev requires libgnutls-dev, which conflicts + with libgnutls28-dev) + + -- Alessandro Ghedini Mon, 28 Apr 2014 19:37:14 +0200 + +curl (7.36.0-1) unstable; urgency=high + + * New upstream release (Closes: #742728) + - Fix connection re-use when using different log-in credentials + as per CVE-2014-0138 + http://curl.haxx.se/docs/adv_20140326A.html + - Reject IP address wildcard matches as per CVE-2014-0139 + http://curl.haxx.se/docs/adv_20140326B.html + - Set urgency=high accordingly + * Add 08_fix-imap-tests.patch to fix tests broken by the fix for CVE-2014-0138 + + -- Alessandro Ghedini Sun, 30 Mar 2014 15:36:35 +0200 + +curl (7.35.0-1) unstable; urgency=high + + * New upstream release + - Fix re-use of wrong HTTP NTLM connection as per CVE-2014-0015 + http://curl.haxx.se/docs/adv_20140129.html + - Set urgency=high accordingly + * Refresh patches + + -- Alessandro Ghedini Wed, 29 Jan 2014 11:16:57 +0100 + +curl (7.34.0-1) unstable; urgency=high + + * New upstream release + - Fix GnuTLS checking of a certificate CN or SAN name field when the + digital signature verification is turned off as per CVE-2013-6422 + http://curl.haxx.se/docs/adv_20131217.html + - Set urgency=high accordingly + * Drop patches merged upstream: + - 08_fix-typo.patch + - 09_fix-urlglob.patch + + -- Alessandro Ghedini Tue, 17 Dec 2013 13:16:19 +0100 + +curl (7.33.0-2) unstable; urgency=low + + * Make -dev packages Multi-Arch: same too (Closes: #731309) + * Bump Standards-Version to 3.9.5 (no changes needed) + * Add 09_fix-urlglob.patch to fix URL globbing (Closes: #731855) + + -- Alessandro Ghedini Wed, 11 Dec 2013 18:44:37 +0100 + +curl (7.33.0-1) unstable; urgency=low + + * New upstream release + - Handle arbitrary-length username and password (Closes: #719856) + * Remove Luk from Uploaders as per his request (Closes: #723603) + * Do not Build-Depends on specific automake version (Closes: #724361) + * Fix lintian vcs-field-not-canonical + * Add 08_fix-typo.patch + * Refresh patches + + -- Alessandro Ghedini Mon, 14 Oct 2013 22:11:14 +0200 + +curl (7.32.0-1) unstable; urgency=low + + * New upstream release + * Fix typo in changelog entry for 7.31.0-1 (Closes: #714502) + * Drop 08_typo.patch (merged upstream) + * Drop 09_openssl-recv.patch (merged upstream) + * Refresh 90_gnutls.patch and 99_nss.patch + * Refresh 06_always-disable-valgrind.patch + * Enable threaded DNS resolver (Closes: #570436) + See NEWS.Debian for more info + + -- Alessandro Ghedini Mon, 12 Aug 2013 12:19:05 +0200 + +curl (7.31.0-2) unstable; urgency=high + + * Add 09_openssl-recv.patch to fix incorrect OpenSSL usage (Closes: #714050) + * Set urgency=high because of the security fix in the previous upload + + -- Alessandro Ghedini Wed, 26 Jun 2013 11:47:00 +0200 + +curl (7.31.0-1) unstable; urgency=low + + * New upstream release + - Fix URL decode buffer boundary flaw as per CVE-2013-2174 + http://curl.haxx.se/docs/adv_20130622.html + * Make curl Multi-Arch: foreign (Closes: #712585) + * Drop 08_reset-timecond.patch (merged upstream) + * Refresh patches + * Add 08_typo.patch to fix a couple of typos in one of the manpages + + -- Alessandro Ghedini Sat, 22 Jun 2013 15:46:53 +0200 + +curl (7.30.0-2) unstable; urgency=low + + * Move textual docs to the -doc package too + * Move manpages from -dev packages to -doc as well + - Add Breaks+Replaces accordingly + * Remove outdated Replaces/Conflicts + * Update watch file version to 3 + * Add 08_reset-timecond.patch (Closes: #705783) + + -- Alessandro Ghedini Fri, 10 May 2013 17:46:46 +0200 + +curl (7.30.0-1) unstable; urgency=low + + * New upstream release + * Update upstream copyright years + * Drop patches merged upstream: + - 08_NULL-pointer-dereference-on-close.patch + - 09_CVE-213-1944.patch + - 10_test1218-another-cookie-tailmatch-test.patch + * Update patches: + - 03_keep_symbols_compat.patch + - 90_gnutls.patch + - 99_nss.patch + * Add libcurl4-doc package: + - Move *.pdf and *.html files to the libcurl4-doc package + - Add Suggests for -doc package to -dev packages + - Move examples to the -doc package + * Add Build-Depends on python which is used by some tests + + -- Alessandro Ghedini Thu, 18 Apr 2013 12:55:09 +0200 + +curl (7.29.0-2.1) unstable; urgency=high + + * Non-maintainer upload. + + [ Alessandro Ghedini ] + * Do not compress *.pdf files (Closes: #704093) + + [ Salvatore Bonaccorso ] + * Add 09_CVE-213-1944.patch. + Fix CVE-2013-1944: fix tailmatching to prevent cross-domain leakage. + Cookies set for 'example.com' could accidentaly also be sent by libcurl + to the 'bexample.com' (ie with a prefix to the first domain name). + (Closes: #705274) + * Add testcase for CVE-2013-1944. + + -- Salvatore Bonaccorso Fri, 12 Apr 2013 13:55:34 +0200 + +curl (7.29.0-2) unstable; urgency=low + + * Fix a segfault when closing an unused multi handle (Closes: #701713) + * Mention LDAPS in packages' long descriptions + * Clean-up d/rules + - Switch to short-form dh + - Enable test suite on hurd and kfreebsd too + - Enable GSSAPI support on hurd too + + -- Alessandro Ghedini Mon, 11 Mar 2013 19:02:56 +0100 + +curl (7.29.0-1) unstable; urgency=high + + * New upstream release + - Fix buffer overflow when negotiating SASL DIGEST-MD5 authentication + as per CVE-2013-0249 (Closes: #700002) + http://curl.haxx.se/docs/adv_20130206.html + - Set urgency=high accordingly + * Install all the examples + * Update 90_gnutls.patch and 99_nss.patch + * Refresh patches + * Correctly pass CPPFLAGS to ./configure + * Upload to unstable + + -- Alessandro Ghedini Mon, 11 Feb 2013 14:48:03 +0100 + +curl (7.28.1-1) experimental; urgency=low + + * New upstream release + * Drop 05_fix-git-over-https.patch and 08_fix-git-auth.patch + (merged upstream) + * Update 07_do-not-disable-debug-symbols.patch + * Refresh patches + * Add NEWS entry about change in CURLOPT_SSL_VERIFYHOST semantics + + -- Alessandro Ghedini Mon, 26 Nov 2012 17:51:27 +0100 + +curl (7.28.0-3) unstable; urgency=low + + * Add 07_do-not-disable-debug-symbols.patch, do not pass --enable-debug + anymore (Closes: #693110) + * Update 05_fix-git-over-https.patch to reflect new upstream patch + * Add 08_fix-git-auth.patch to fix HTTPS authentication (Closes: #690764) + + -- Alessandro Ghedini Sat, 17 Nov 2012 14:07:21 +0100 + +curl (7.28.0-2) unstable; urgency=low + + * Add 05_fix-git-over-https.patch (Closes: #690551) + * Add 06_always-disable-valgrind.patch (Closes: #690968) + + -- Alessandro Ghedini Mon, 22 Oct 2012 14:35:02 +0200 + +curl (7.28.0-1) unstable; urgency=low + + * New upstream release + - gnutls: do not fail on non-fatal handshake errors (Closes: #685402) + * Remove versioned build depends on libssh2 (already in stable) + * Bump Standards-Version to 3.9.4 (no changes needed) + * Refresh 01_runtests_gdb.patch + * Update *.symbols files + * Build depend on ca-certifcates to avoid test failure + + -- Alessandro Ghedini Thu, 11 Oct 2012 19:11:09 +0200 + +curl (7.27.0-1) unstable; urgency=low + + * New upstream release + * Update upstream copyright + * Refresh 01_runtests_gdb.patch, 90_gnutls.patch and 99_nss.patch + + -- Alessandro Ghedini Wed, 08 Aug 2012 17:22:00 +0200 + +curl (7.26.0-1) unstable; urgency=low + + * New upstream release + - Reject numerical IPv6 addresses outside brackets (Closes: #670126) + * Email change: Alessandro Ghedini -> ghedo@debian.org + * Stricter Depends on libcurl3 (Closes: #666089) + * Remove Ramakrishnan (as per his request), move myself to Maintainer + Thank you for all your work so far + * Disable memory tracking, but keep debug enabled + - Remove memdebug symbols (used by curl only) + * Refresh 01_runtests_gdb.patch, 90_gnutls.patch and 99_nss.patch + * Disable not-quite-working symbols hiding + + -- Alessandro Ghedini Fri, 25 May 2012 15:19:51 +0200 + +curl (7.25.0-1) unstable; urgency=low + + * New upstream release + - Add --ssl-allow-beast and CURLOPT_SSL_OPTIONS (Closes: #658276) + - Allow negative numbers as option value (Closes: #659591) + * Add libssh2-1-dev to libcurl4-gnutls-dev and libcurl4-nss-dev Depends + * Bump debhelper compat level to 9 + - Make *.links files executable to simplify rules file + * Pass --as-needed ld flag to avoid unneeded dependencies + - Add workaround_as_needed_bug to workaround a libtool bug + - Drop dont_link_to_krb5 (not needed because of --as-needed) + * Do some clean-up in debian/rules + * Update debian/copyright format as in Debian Policy 3.9.3 + * Bump Standards-Version to 3.9.3 + * Explicit Conflicts in -dev packages (fixes binaries-have-file-conflict) + * Add openssh-server to build depends to enable some more tests + * Update upstream copyright years + * Refresh patches + + -- Alessandro Ghedini Fri, 23 Mar 2012 16:24:51 +0100 + +curl (7.24.0-1) unstable; urgency=high + + * New upstream release + - Improve documentation for the --capath option (Closes: #628697) + - Fix URL sanitization vulnerability as per CVE-2012-0036 + http://curl.haxx.se/docs/adv_20120124.html + - Fix SSL CBC IV vulnerability as per CVE-2011-3389 + http://curl.haxx.se/docs/adv_20120124B.html + - Set urgency=high accordingly + * Remove curl_links_with_rt patch (curl links to librt anyway) + * Improve descriptions of -dev and -dbg packages + * Drop fix_manpage_spelling and versioned patches (merged upstream) + * Refresh patches + * Add keep_symbols_compat patch to not break backwards ABI compatibility + * Enable libssh2 support for GnuTLS and NSS flavours too + (libssh2 now uses libgcrypt instead of libssl) + + -- Alessandro Ghedini Tue, 24 Jan 2012 12:04:04 +0100 + +curl (7.23.1-3) unstable; urgency=low + + * Enable security hardening flags + * Remove libdb-dev from B-D (not used) + * Improve short and long descriptions + * Provide proper *.symbols files (Closes: #651619) + * Do not version Curl_* symbols (for internal use only) + * Do not override dh_makeshlibs version anymore + + -- Alessandro Ghedini Tue, 13 Dec 2011 19:55:31 +0100 + +curl (7.23.1-2) unstable; urgency=low + + * Bump shlibs version for libcurl3-nss (Closes: #650498) + + -- Alessandro Ghedini Thu, 01 Dec 2011 22:32:19 +0100 + +curl (7.23.1-1) unstable; urgency=low + + * New upstream release + - Do not use gnutls_priority_set_direct and + gnutls_certificate_type_set_priority anymore (Closes: #624024) + * Refresh patches + * Add --enable-debug flag to configure (Closes: #648902) + * One Provides/Replaces per line + * libcurl4-openssl-dev Provides libcurl4-dev too (Closes: #644126) + * Specify only 3 components for Standards-Version + (the fourth is not really needed) + * Move ca-certificates to Recommends in lib* packages (Closes: #546607) + * Add NSS flavour to versioned symbols + + -- Alessandro Ghedini Sun, 27 Nov 2011 18:45:01 +0100 + +curl (7.22.0-3) unstable; urgency=low + + [ Ramakrishnan Muthukrishnan ] + * Add new Uploaders, Ian and Alessandro. (Closes: #647255) + + [ Luk Claes ] + * Install lintian overrides with dh_lintian. + * Install all files with dh_install and get rid of dh_installdirs. + + [ Alessandro Ghedini ] + * New upstream release. + * Bump debhelper compat level to 8. + * debian/control: + - One (Build-)Depends per line. + - Sort (Build-)Depends. + - Remove Build-Depends on binutils + (v2.18 is already in oldstable and it is Build-Essential: yes). + - Build depends on stunnel4 instead of stunnel + (stunnel is just a dummy package). + - Remove duplicate Section field in package curl. + - Add Luk to Uploaders too, sort names. + * debian/patches: + - Update runtests_gdb patch, add DEP3 headers. + - Update gnutls and nss patches, add DEP3 headers. + - Refresh other patches. + - Add DEP3 headers to all the patches. + - Remove libtool patch (not applied anyway) + - Set Forwarded: not-needed for Debian specific patches + * Replace dh_clean -k call with dh_prep + (dh_clean -k is deprecated since debhelper 7). + * Add fix_manpage_spelling patch + * debian/copyright: + - Switch to DEP5 format + - Update copyright information + * Add librtmp-dev to libcurl4-nss-dev too + + -- Alessandro Ghedini Sun, 13 Nov 2011 21:07:32 +0100 + +curl (7.21.7-3) unstable; urgency=low + + * debian/rules: Build only curl and libcurl3 with rtmp support. Rest of the + packages do not need to be built with rtmp support. (closes: #641173) + + -- Ramakrishnan Muthukrishnan Sun, 11 Sep 2011 22:08:08 +0200 + +curl (7.21.7-2) unstable; urgency=low + + * debian/control: libcurl*-dev packages should depend on librtmp-dev. + (closes: #640260) + * debian/rules: add build-arch and build-indep targets. + + -- Ramakrishnan Muthukrishnan Mon, 05 Sep 2011 16:12:42 +0200 + +curl (7.21.7-1) unstable; urgency=low + + * New Upstream release which fixes the following bugs. + - libcurl3-gnutls: HTTPS over HTTP still broken in + Git (closes: #627335) + - git-core: gnutls_handshake() fail when using + https:// over a proxy (closes: #559371) + * debian/control: capitalize 'ftp'. (closes: #587338) + * debian/rules: add build-arch and build-indep targets. + + -- Ramakrishnan Muthukrishnan Sat, 30 Jul 2011 17:57:08 +0530 + +curl (7.21.6-3) unstable; urgency=low + + * Apply the Multiarch patch from Steve Langasek. + (closes: #631946) + + -- Ramakrishnan Muthukrishnan Wed, 29 Jun 2011 08:26:56 +0530 + +curl (7.21.6-2) unstable; urgency=high + + * Fix for the inappropriate GSSAPI delegation vulnerability (CVE-2011-2192). + (closes: #631615) + + -- Ramakrishnan Muthukrishnan Sat, 25 Jun 2011 23:37:04 +0530 + +curl (7.21.6-1) unstable; urgency=low + + * New upstream release to fix a HTTPS over a HTTP proxy bug on 7.21.5. + + -- Ramakrishnan Muthukrishnan Sat, 23 Apr 2011 07:12:57 +0530 + +curl (7.21.5-1) unstable; urgency=low + + * New Upstream version. (closes: #623459) + * debian/patches/{sslv2_disable, error_code}: removed as these + patches were backported earlier from new upstream and this + release incorporates them. + + -- Ramakrishnan Muthukrishnan Fri, 22 Apr 2011 13:14:41 +0530 + +curl (7.21.4-2) unstable; urgency=low + + * debian/patches/{sslv2-disable, series}: Apply the + upstream commit c66b0b32fba175d5f096c944d8ec8f9f06299f4a. + (closes: #622016) + * debian/{rules, control}: enable rtmp. (closes: #622328) + * debian/control: removing hurd from dependencies. Hurd is + an 'essential' package. + + -- Ramakrishnan Muthukrishnan Wed, 13 Apr 2011 16:15:27 -0700 + +curl (7.21.4-1) unstable; urgency=low + + * New upstream release. + * debian/control: downgraded the version number of libdb-dev required + to 4.6 from 4.7, based on the inputs from Erik Schanze . + + -- Ramakrishnan Muthukrishnan Mon, 28 Feb 2011 19:35:36 +0530 + +curl (7.21.3-1) unstable; urgency=low + + * New upstream release. + * debian/*.manpages: adding all manpages for the curl library. + (closes: #605651) + * gnutls->handshake: improved timeout handling. See #594150 for details. + + -- Ramakrishnan Muthukrishnan Wed, 15 Dec 2010 23:39:26 +0530 + +curl (7.21.2-4) unstable; urgency=low + + * support for curl library built against nss. + (closes: #606244) + * honour DEB_BUILD_OPTIONS=nocheck option. + (closes: #606059) + + -- Ramakrishnan Muthukrishnan Thu, 09 Dec 2010 20:11:37 +0530 + +curl (7.21.2-3) unstable; urgency=low + + * debian/rules: reverting changes related to c-ares inclusion. + * debian/control: removing libc-ares-dev for now. + (closes: #605558) + + -- Ramakrishnan Muthukrishnan Thu, 02 Dec 2010 10:56:36 +0530 + +curl (7.21.2-2) unstable; urgency=low + + * debian/control: add libc-ares-dev as build dependency. + * debian/rules: invoke configure with --enable-ares. + (closes: #570436) + * debian/copyright: add copyright notice of `lib/security.c' + to the copyright file. (closes: #603712) + + -- Ramakrishnan Muthukrishnan Tue, 30 Nov 2010 17:35:29 +0530 + +curl (7.21.2-1) unstable; urgency=low + + * New upstream release. + + -- Ramakrishnan Muthukrishnan Mon, 18 Oct 2010 11:13:17 +0530 + +curl (7.21.1-1) unstable; urgency=low + + * New upstream release. + + -- Ramakrishnan Muthukrishnan Thu, 12 Aug 2010 08:20:48 +0530 + +curl (7.21.0-1) unstable; urgency=low + + * New upstream. + + -- Ramakrishnan Muthukrishnan Wed, 16 Jun 2010 19:25:37 +0530 + +curl (7.20.1-2) unstable; urgency=low + + * debian/rules: Removed the custom LDFLAGS variable. This is not + required as we are no longer using the libtool patch. + (closes: #578774) + + -- Ramakrishnan Muthukrishnan Wed, 28 Apr 2010 18:40:27 +0530 + +curl (7.20.1-1) unstable; urgency=low + + * New upstream release. + * debian/patches/missing-double-quote: No longer needed as it has been + fixed by the upstream. + * debian/patches/no_com_err: Reworked the patches for the new release. + * debian/patches/versioned: fix for build failure of 'make test'. + (closes: #576237) + * debian/rules: removed --enable-ldaps option from the configure as LDAP + SSL (Novell extensions to openldap) is not available as Debian packages. + * lib/http.c: chunked-encoding with Content-Length header problem has + been fixed in the upstream. (closes: #572276) + + -- Ramakrishnan Muthukrishnan Mon, 19 Apr 2010 09:21:35 +0530 + +curl (7.20.0-3) unstable; urgency=low + + * debian/control: Vcs* tags added. + * docs/libcurl/libcurl.m4: added the missing double quote (closes: #576518). + + -- Ramakrishnan Muthukrishnan Mon, 05 Apr 2010 18:56:40 +0530 + +curl (7.20.0-2) unstable; urgency=low + + * New Maintainer (closes: #574137). + * Bug #533669 (curl segmentation fault in addbyter()) is fixed + from release 7.19.7 onwards (closes: #533669). + * Bug #510559 (curl sends whitespace unencoded in the url) can't + be reproduced in the 7.20.0 release (closes: #510559). + + -- Ramakrishnan Muthukrishnan Thu, 18 Mar 2010 08:55:19 +0530 + +curl (7.20.0-1) unstable; urgency=low + + * Package is orphaned. + * New upstream release. + * Switch to dpkg-source 3.0 (quilt) format (closes: #538547). + * Fixed build error with binutils-gold (closes: #554296). + + -- Domenico Andreoli Tue, 09 Feb 2010 13:06:39 +0100 + +curl (7.19.7-1) unstable; urgency=low + + * New upstream release: + - curl_getdate(3) now correctly manages single letter military + timezones as specified in RFC 822 (closes: #551461). + * build depends on generic libdb-dev (closes: #548476). + * build depends on libssh2-1-dev (>= 1.2) to enable new curl options. + + -- Domenico Andreoli Thu, 05 Nov 2009 10:11:57 +0100 + +curl (7.19.5-1) unstable; urgency=low + + * New upstream release + * Fix "libcurl3-gnutls has memory corruption" by upgrading to new upstream + release, which fixes this bug (Closes: #530131) + * update standards version to 3.8.1 + * adjust overrides from libdevel to debug for -dbg package + * adjust doc-base section + + -- Andreas Schuldei Sun, 24 May 2009 21:12:19 +0200 + +curl (7.19.4-1) unstable; urgency=low + + * New upstream release + * Fix "newer bdb version" + (Closes: #517277) + * resolve libtool version confusion, thanks to + Stefanos Harhalakis + * add new dependency on libgcrypt11-dev due to newly arising binary symbols + + -- Andreas Schuldei Thu, 02 Apr 2009 23:35:45 +0200 + +curl (7.18.2-8lenny1) stable-security; urgency=high + + * Applied upstream patch to fix arbitrary file access (CVE-2009-0037). + + -- Domenico Andreoli Tue, 03 Mar 2009 10:29:03 +0100 + +curl (7.18.2-8) unstable; urgency=low + + * Fix "Please add support for ldap/ldaps protocols" + by changing the linker option for liblber (Closes: #506096) + + -- Andreas Schuldei Fri, 26 Dec 2008 23:48:19 +0100 + +curl (7.18.2-7) unstable; urgency=low + + * disable c-ares support again, no fix yet, just get stuff working again. + + -- Andreas Schuldei Tue, 15 Jul 2008 01:17:29 +0200 + +curl (7.18.2-6) unstable; urgency=low + + * enable c-ares support, with ipv6 support + + -- Andreas Schuldei Fri, 11 Jul 2008 02:05:16 +0200 + +curl (7.18.2-5) unstable; urgency=low + + * /usr/lib/pkgconfig/libcurl.pc: "pkg-config --libs libcurl" returns + "-Wl, -z, defs" (Closes: #488701), closing same bug again for + curl-config --libs command + + -- Andreas Schuldei Wed, 02 Jul 2008 11:24:40 +0200 + +curl (7.18.2-4) unstable; urgency=medium + + * /usr/lib/pkgconfig/libcurl.pc: "pkg-config --libs libcurl" returns + "-Wl, -z, defs" (Closes: #488701) + + -- Andreas Schuldei Mon, 30 Jun 2008 23:59:55 +0200 + +curl (7.18.2-3) unstable; urgency=low + + * removing c-ares from the dependencies + + -- Andreas Schuldei Sat, 28 Jun 2008 03:34:50 +0200 + +curl (7.18.2-2) unstable; urgency=medium + + * blanking the "dependency_libs" line in lib*.la file to keep all the listed libs + from being linked to other libs linking to curl. + * fixing miss-linking problem by specifying liblber as a configure argument + * disabling c-ares again for stability reasons + * correcting libgssapi linking in configure.ac (patch no_com_err) + + -- Andreas Schuldei Fri, 27 Jun 2008 03:40:18 +0200 + +curl (7.18.2-1e1) experimental; urgency=low + + * testing c-ares-ipv6 integration patch + + -- Andreas Schuldei Mon, 23 Jun 2008 08:48:31 +0200 + +curl (7.18.2-1) unstable; urgency=low + + * New upstream release: + - removed patches/ftp-response, it is already in the upstream release + - fixed issues with kerberos ftp (closes: #478864). + * Disable c-ares support, it is still not ready for Debian's wide + user base (closes: #478864, #481189). + * Standards-Version bumped to 3.8.0: + - added support for parallel builds to debian/rules + * Removal of $QUILT_PC's override makes this package ready for new + source format 3.0 (quilt) (closes: #485023). + * Configure build with --with-ca-path but only for OpenSSL flavour, + GnuTLS supports only --with-ca-bundle (closes: #482814, #483999). + Both libcurl3 and libcurl3-gnutls now depend on ca-certificates. + + -- Domenico Andreoli Mon, 09 Jun 2008 14:09:42 +0200 + +curl (7.18.1-1) unstable; urgency=low + + * New upstream release. + * Fixed crossbuilding bug (closes: #465089). + * Improved error reporting in case of failing FTP (closes: #474224). + * Enable c-ares support (closes: #352694). + * libcurl3-dbg now depends on either libcurl3 or libcurl3-gnutls + (closes: #463173). + + -- Domenico Andreoli Thu, 17 Apr 2008 10:22:28 +0200 + +curl (7.18.0-1) unstable; urgency=low + + * New upstream release. + * Use Homepage field in debian/control. + + -- Domenico Andreoli Tue, 29 Jan 2008 02:16:25 +0100 + +curl (7.17.1-1) unstable; urgency=low + + * New upstream release: + - fixed bad use of "its" in curl.1 (closes: #443734) + - fixed curl_easy_escape() with input bytes that are >= 0x80 + (closes: #445214) + + -- Domenico Andreoli Wed, 31 Oct 2007 01:12:54 +0100 + +curl (7.17.0-1) unstable; urgency=low + + * New upstream release. + * Updated to use libssh2-1-dev (closes: #441979, #442198). + * Do not run the test suite on hurd (closes: #433834). + * Enabled support for LDAPS protocol. + + -- Domenico Andreoli Fri, 14 Sep 2007 00:24:21 +0200 + +curl (7.16.4-5) unstable; urgency=low + + * libcurl4-openssl-dev now depends on libssh2-0-dev. + closes: #439317, #439326. + + -- Domenico Andreoli Fri, 24 Aug 2007 18:13:17 +0200 + +curl (7.16.4-4) unstable; urgency=low + + * Build libcurl/GnuTLS without libssh2 because of the usual OpenSSL + vs. GPL software lincense conflict (closes: #439176). + + -- Domenico Andreoli Thu, 23 Aug 2007 23:47:35 +0200 + +curl (7.16.4-3) unstable; urgency=low + + * Added support for scp and SFTP protocols. + + -- Domenico Andreoli Wed, 22 Aug 2007 00:48:32 +0200 + +curl (7.16.4-2) unstable; urgency=low + + * Fixed regression with FTP sites not requesting PASS (closes: #435771). + + -- Domenico Andreoli Sat, 04 Aug 2007 02:04:40 +0200 + +curl (7.16.4-1) unstable; urgency=low + + * New upstream release (closes: #432514). + * Welcome Andreas to the curl packagers! + * Build-Depends is now more backporting friendly. + + -- Domenico Andreoli Wed, 18 Jul 2007 16:44:30 +0200 + +curl (7.16.2-6) unstable; urgency=low + + * Added missing libcurl3 symlinks (closes: #429945) + Patch courtesy of Bryan Donlan. + + -- Domenico Andreoli Sat, 23 Jun 2007 00:39:20 +0200 + +curl (7.16.2-5) unstable; urgency=low + + [ Steve Langasek ] + * Re-introduce curl3 symbol versions and rename the packages back to + libcurl3*, restoring ABI compatibility with the etch version of the + package. + + [ Domenico Andreoli ] + * Package libcurl4-gnutls-dev now suggests libcurl3-dbg. + * libcurl3-dbg replaces/conflict/provide libcurl4-dbg. + * Properly use ${binary:Version} in control file. + + -- Domenico Andreoli Wed, 20 Jun 2007 17:52:38 +0200 + +curl (7.16.2-4) unstable; urgency=low + + * Fixed configure.ac in case of build with GNUTLS (closes: #425013). + * Fixed double-free bug (closes: #424894). + Patch courtesy of Daniel Stenberg. + + -- Domenico Andreoli Sun, 20 May 2007 01:15:01 +0200 + +curl (7.16.2-3) unstable; urgency=low + + * Updated to db4.5 (closes: #421933). + * Got rid of unused libcomerr2 dependency (closes: #392294). + + -- Domenico Andreoli Tue, 08 May 2007 08:46:21 +0200 + +curl (7.16.2-2) experimental; urgency=low + + * Improved package descriptions (closes: #410472). + * Updated package Provides to ease the soname transition. + + -- Domenico Andreoli Fri, 27 Apr 2007 15:37:44 +0200 + +curl (7.16.2-1) experimental; urgency=low + + * New upstream release. + * libcurl4-openssl-dev now depends on libcurl4-openssl (closes: #419774). + * Bumped shlibs version to 7.16.2-1. + * Patches are now managed with quilt. + + -- Domenico Andreoli Wed, 18 Apr 2007 09:29:48 +0200 + +curl (7.16.1-1) experimental; urgency=low + + * New upstream release. + * Bumped shlibs version to 7.16.1-1. + * Added HIDDEN section to version script to handle any __*, _rest or + _save* local symbol. + * Gopher protocol is not supported since 7.15.2. Removed any reference + in package description (closes: #408704). + * Moved libcurl/openssl to the new package libcurl4-openssl, now + libcurl4 contains a version with no SSL or GSSAPI support (any + future cryptographic stuff will be kept out of there). + * Package libcurl4-dev now contains the matching headers for libcurl4 + (so crypto stuff). + + -- Domenico Andreoli Thu, 1 Feb 2007 12:49:32 +0100 + +curl (7.16.0-1) experimental; urgency=low + + * New upstream release. + * Bumped shlibs version to 7.16.0-1. + * libcurl4 and libcurl4-gnutls now only recommend ca-certificates + (closes: #404103). + * pkg-config .pc file now uses Libs.private (closes: #405226). + + -- Domenico Andreoli Fri, 26 Jan 2007 14:26:55 +0100 + +curl (7.15.5-1) unstable; urgency=low + + * New upstream release: + - fixed nodes removal from the splay tree (closes: #375076). + * Make package build also if $TAPE is set (closes: #377470). + * Bumped shlibs version to 7.15.5-1. + + -- Domenico Andreoli Mon, 7 Aug 2006 10:26:13 +0200 + +curl (7.15.4-1ubuntu1) edgy; urgency=low + + * Synchronize to Debian. Only change left: Removal of stunnel and + libdb4.2-dev build dependencies. + + -- Martin Pitt Thu, 29 Jun 2006 15:04:24 +0200 + +curl (7.15.4-1) unstable; urgency=low + + * New upstream release. + * Bumped shlibs version to 7.15.4-1. + + -- Domenico Andreoli Wed, 14 Jun 2006 14:41:16 +0200 + +curl (7.15.3-2) unstable; urgency=low + + * Fixed bug in configure.ac that makes FTBFS (closes: #367954). + + -- Domenico Andreoli Wed, 31 May 2006 15:18:26 +0200 + +curl (7.15.3-1) unstable; urgency=high + + * New upstream release: + - fixed TFTP packet buffer overflow vulnerability + [lib/tftp.c, CVE-2006-1061]. + - improved curl_getenv.3 manpage grammar (closes: #357388). + + -- Domenico Andreoli Mon, 20 Mar 2006 11:46:25 +0100 + +curl (7.15.2-3) unstable; urgency=low + + * Applied upstream patch to fix multi interface and multi-part formposts + (closes: #355715). + * Build back with -O2, gcc 4.0.2-10 fixed the previously trigged bug. + + -- Domenico Andreoli Wed, 8 Mar 2006 15:29:15 +0100 + +curl (7.15.2-2) unstable; urgency=low + + * Added missing autotools invocation. Re-added versioned symbols + (closes: #355241). + * Bumped shlibs version to 7.15.2-2. + * Build with -O3 to work around sospicious segfaults on tests 253 + and 255. + + -- Domenico Andreoli Sat, 4 Mar 2006 22:47:23 +0100 + +curl (7.15.2-1) unstable; urgency=low + + * New upstream release. + * Bumped shlibs version to 7.15.2-1. + * Adopted debhelper's compatibility level 5. + + -- Domenico Andreoli Wed, 1 Mar 2006 16:12:51 +0100 + +curl (7.15.1-1ubuntu2) dapper; urgency=low + + * SECURITY UPDATE: Arbitrary remote code execution with long tftp:// URLs. + * lib/tftp.c: Fix unbounded sprintf() to avoid buffer overflow. Thanks to + Ulf Harnhammar for discovering this. + * CVE-2006-1061 + + -- Martin Pitt Thu, 16 Mar 2006 11:30:25 +0100 + +curl (7.15.1-1ubuntu1) dapper; urgency=low + + * Resynchronise with Debian to get URL parser overflow fix from 7.15.1 + (CVE-2005-4077). + + -- Martin Pitt Mon, 12 Dec 2005 15:04:52 +0100 + +curl (7.15.1-1) unstable; urgency=low + + * New upstream release: + - fixed buffer overflow in URL parser function (closes: #342339). + + -- Domenico Andreoli Wed, 7 Dec 2005 11:11:38 +0100 + +curl (7.15.0-5.1) unstable; urgency=high + + * Non-maintainer upload. + * Urgency high for RC bug fix. + * Let libcurl3-*-dev depend on libkrb5-dev (closes: #340784, #340916). + + -- Luk Claes Sun, 4 Dec 2005 11:59:20 +0100 + +curl (7.15.0-5) unstable; urgency=low + + * libcurl3-gnutls-dev and libcurl3-openssl-dev now only recommend + libkrb5-dev (closes: #334888). + * Applied upstream patch to fix error message in case FTP-path does + not exist (closes: #338680). + * Applied upstream patch to fix parsing of --limit-rate command line + option (closes: #338681). + + -- Domenico Andreoli Fri, 25 Nov 2005 10:30:25 +0100 + +curl (7.15.0-4ubuntu1) dapper; urgency=low + + * Resynchronise with Debian (only change left: Removal of stunnel build + dependency). + * Remove libdb4.2-dev build dependency. + + -- Martin Pitt Thu, 10 Nov 2005 17:44:35 -0500 + +curl (7.15.0-4) unstable; urgency=low + + * Fixed output of curl-config --vernum (closes: #335296). + * libcurl3-openssl-dev now replaces libcurl3-dev older than 7.14.1-1 + (closes: #335277). + + -- Domenico Andreoli Tue, 25 Oct 2005 11:48:53 +0200 + +curl (7.15.0-3) unstable; urgency=low + + * libcurl3 and libcurl3-gnutls now suggest libldap2 (closes: #294407). + + * Re-introduced libcurl3-dev package for transition reasons. + + -- Domenico Andreoli Wed, 19 Oct 2005 12:45:43 +0200 + +curl (7.15.0-2) unstable; urgency=low + + * Fixed depends of libcurl3-*-dev packages (closes: #334021, #333609, #334048). + * Bumped shlibs version to 7.15.0-1 (closes: #334053). + + -- Domenico Andreoli Sun, 16 Oct 2005 15:34:40 +0200 + +curl (7.15.0-1) unstable; urgency=low + + * New upstream release: + - fixed user+domain name buffer overflow in the NTLM code + (CAN-2005-3185, closes: #333734). + - libcurl3-*-dev packages now depend on libkrb5-dev (closes: #333609). + - improved docs about curl_easy_setopt() and ERRORBUFFER (closes: #329313). + + -- Domenico Andreoli Fri, 14 Oct 2005 13:32:06 +0200 + +curl (7.14.1-5) unstable; urgency=low + + * Added build dependency on libtool (closes: #332729, #333174). + + -- Domenico Andreoli Tue, 11 Oct 2005 10:05:36 +0200 + +curl (7.14.1-4) unstable; urgency=low + + * Fixed SEE ALSO section in curl_excape.3 (closes: #331505). + * Fixed configure.ac when --host=i586-mingw32msvc is given (closes: #329444). + * Added missing example files (closes: #331722). + * Updated build dependency for OpenSSL 0.9.8 transition. + + -- Domenico Andreoli Mon, 10 Oct 2005 12:43:25 +0200 + +curl (7.14.1-3) experimental; urgency=low + + * Fixed soname of libcurl-gnutls.so* variant. + * Fixed broken sentence (closes: #329305). + * Fixed reference to TheArtOfHttpScripting.gz (closes: #329299). + * Added clarification about WRITEFUNCTION and WRITEDATA (closes: #329311). + + -- Domenico Andreoli Wed, 28 Sep 2005 17:13:51 +0200 + +curl (7.14.1-2) experimental; urgency=low + + * Started using the system-wide CA certificate file (closes: #308514). + * Fixed apostrophe typos in the curl man page (closes: #326511). + * Only curl_* symbols are now globally visible outside of libcurl. + + -- Domenico Andreoli Sat, 17 Sep 2005 23:52:28 +0200 + +curl (7.14.1-1) experimental; urgency=low + + * New upstream release. + * libcurl3-gnutls has a modified soname and may be installed together + with libcurl3 (closes: #318590). + * Both libcurl3 and libcurl3-gnutls are built with versioned symbols + and with support of GSSAPI authentication. + * Renamed libcurl3-dev to libcurl3-openssl-dev. + * Dropped package libcurl3-gssapi. + + -- Domenico Andreoli Thu, 15 Sep 2005 23:59:32 +0200 + +curl (7.14.0-5) unstable; urgency=low + + * Added libcurl3-gnutls and libcurl3-gnutls-dev packages (closes: #318590). + * libcurl3-gssapi now has its own shlibs file. Packages built with this + package installed will depend on it. + + -- Domenico Andreoli Thu, 18 Aug 2005 02:26:38 +0200 + +curl (7.14.0-4) unstable; urgency=low + + * OpenSSL is back (closes: #321294, #321391). + + -- Domenico Andreoli Fri, 5 Aug 2005 23:34:45 +0200 + +curl (7.14.0-3) unstable; urgency=low + + * Updated the use of dpkg-architecture (closes: #320046). + * Added missing aclocal file libcurl.m4 to libcurl3-dev (closes: #315848). + * Added (many) missing man pages (closes: #315850). + * OpenSSL is replaced by GnuTLS in providing SSL support (closes: #318590). + * Heimdal is replaced by MIT Kerberos in providing GSSAPI support. + + -- Domenico Andreoli Tue, 2 Aug 2005 22:34:01 +0200 + +curl (7.14.0-2ubuntu1) breezy; urgency=low + + * Synchronize with Debian. + + -- Matthias Klose Tue, 26 Jul 2005 19:03:01 +0200 + +curl (7.14.0-2) unstable; urgency=low + + * Rebuilt and uploaded to unstable. + + -- Domenico Andreoli Wed, 15 Jun 2005 11:41:32 +0200 + +curl (7.14.0-1) experimental; urgency=low + + * New upstream release. + + -- Domenico Andreoli Tue, 17 May 2005 10:42:35 +0200 + +curl (7.13.2-3) unstable; urgency=high + + * HTTP response headers with null bytes are now correctly managed + (closes: #310948). + + -- Domenico Andreoli Fri, 3 Jun 2005 23:59:30 +0200 + +curl (7.13.2-2) unstable; urgency=low + + * Fixed conditional build of package libcurl3-gssapi + (closes: #303939, #303953). + + -- Domenico Andreoli Mon, 11 Apr 2005 19:00:27 +0200 + +curl (7.13.2-1) unstable; urgency=low + + * New upstream release: + - fixed curl man page typos (closes: #302820). + + -- Domenico Andreoli Tue, 5 Apr 2005 14:41:13 +0200 + +curl (7.13.1-3) unstable; urgency=low + + * Fixed hanging of some SSL connections (closes: #302366). + + -- Domenico Andreoli Thu, 31 Mar 2005 16:27:41 +0200 + +curl (7.13.1-2) unstable; urgency=low + + * Rebuilt to get the correct libidn11 dependency (closes: #299348). + * Added some missing documentation files (closes: #298855). + + -- Domenico Andreoli Wed, 16 Mar 2005 14:30:03 +0100 + +curl (7.13.1-1) unstable; urgency=low + + * New upstream release. + * Bumped up shlibs version for libcurl3 because of new curl options. + + -- Domenico Andreoli Fri, 4 Mar 2005 16:03:17 +0100 + +curl (7.13.0-2) unstable; urgency=high + + * Fixed NTLM Authentication buffer overflow (closes: #296678). + Patch courtesy of Daniel Stenberg. This handles CAN-2005-0490. + * Removed libcurl2* packages and all the scary stuff used to build them + (closes: #274631). + + -- Domenico Andreoli Thu, 24 Feb 2005 10:07:22 +0100 + +curl (7.13.0-1) unstable; urgency=low + + * New upstream release. + * libcurl3 now suggests package libldap2-dev to enable support for + LDAP protocol. + * Bumped up shlibs version for libcurl3 because of new curl options. + + -- Domenico Andreoli Sat, 5 Feb 2005 10:39:52 +0100 + +curl (7.12.3-2ubuntu3) hoary; urgency=low + + * Fix the version numbers internal to debian/rules. Closes; #8088 + + -- LaMont Jones Wed, 23 Mar 2005 18:41:29 -0700 + +curl (7.12.3-2) unstable; urgency=low + + * Disabled test suite on m68k, it stalls. + + -- Domenico Andreoli Thu, 30 Dec 2004 11:11:48 +0100 + +curl (7.12.3-1) unstable; urgency=low + + * New upstream release: + - fixed debug tracing to network socket is stderr is closed + (closes: #278691). + * Applied patch to fix getpass license problems (closes: #286794). + Patch courtesy of Daniel Stenberg. + * Bumped up shlibs version for libcurl3 because of new curl options. + + -- Domenico Andreoli Mon, 27 Dec 2004 12:50:30 +0100 + +curl (7.12.2-2) unstable; urgency=low + + * libcurl3-dbg package is now built by dh_strip --dbg-package + (closes: #274710). + * Added build dependency on libdb4.2-dev. + + -- Domenico Andreoli Thu, 4 Nov 2004 11:36:17 +0100 + +curl (7.12.2-1) unstable; urgency=low + + * New upstream release. + * Update diff to 7.11.2. + * Add debian/watch file. + * Add myself as a uploader. + + -- Matthias Klose Wed, 3 Nov 2004 00:55:52 +0100 + +curl (7.12.1-1) unstable; urgency=low + + * New upstream release: + - workaround for ASN1_STRING_to_UTF8 failing if input is already + UTF-8 encoded (closes: #264711). + * Bumped up shlibs version for libcurl3 because of the introduction + of FTP 3rd party transfer support options. + + -- Domenico Andreoli Tue, 10 Aug 2004 11:40:29 +0200 + +curl (7.12.0.rel-6) unstable; urgency=low + + * In rebuilding the 7.11.2 tree starting from the 7.12.0 one, + lib/getdate.y is patched before lib/getdate.c (closes: #262597). + + -- Domenico Andreoli Sun, 1 Aug 2004 17:59:57 +0200 + +curl (7.12.0.rel-5) unstable; urgency=low + + * Tests are performed only if build target and building host are the + same and are not kfreebsd-gnu or knetbsd-gnu (closes: #261591). + * On hurd-i386 libcurl3-gssapi is not built. + + -- Domenico Andreoli Thu, 29 Jul 2004 15:17:51 +0200 + +curl (7.12.0.rel-4) unstable; urgency=low + + * Added build dependency on groff-base to really build the built-in + manual. + * libcurl3 now replaces old libcurl2 versions (closes: #255262). + + -- Domenico Andreoli Tue, 20 Jul 2004 11:40:09 +0200 + +curl (7.12.0.rel-3) unstable; urgency=low + + * Enabled curl's built-in manual. + * configure script for 7.11.2 is now managed correctly. + + -- Domenico Andreoli Sun, 18 Jul 2004 22:25:00 +0200 + +curl (7.12.0.rel-2) unstable; urgency=low + + * libcurl2 uses curl-ca-bundle-7.11.2.crt (closes: #255262). + Yes, it is a hack to not add libcurl-common package right now. + + -- Domenico Andreoli Sun, 18 Jul 2004 16:40:45 +0200 + +curl (7.12.0.rel-1) experimental; urgency=low + + * Version 7.12.0 is back with proper libcurl3* packages. + * libcurl2* 7.11.2 packages are still provided (closes: #252879). + * Enabled again the support for libidn. + + -- Domenico Andreoli Sun, 6 Jun 2004 23:09:33 +0200 + +curl (7.12.0.is.7.11.2-1) unstable; urgency=low + + * Reverted to version 7.11.2 (closes: #252348). + * Disabled support for libidn (closes: #252367). This is to leave + curl in unstable as much similar as possible to the one in testing. + + -- Domenico Andreoli Fri, 4 Jun 2004 19:09:25 +0200 + +curl (7.12.0-1) unstable; urgency=low + + * New upstream release: + - fixed minor man page problem (closes: #232928) + - improved --create-dirs description in curl man page (closes: #251351) + * Enabled support for libidn. + + -- Domenico Andreoli Wed, 2 Jun 2004 18:06:05 +0200 + +curl (7.11.2-2) unstable; urgency=low + + * Fixed curl.1 man page (closes: #232928). + Patch courtesy of Daniel Stenberg, the upstream developer. + + -- Domenico Andreoli Tue, 27 Apr 2004 19:47:09 +0200 + +curl (7.11.2-1) unstable; urgency=low + + * New upstream release. + * Bumped up shlibs version because of the introduction of + CURLOPT_TCP_NODELAY option. + + -- Domenico Andreoli Mon, 26 Apr 2004 14:14:20 +0200 + +curl (7.11.1-2) unstable; urgency=low + + * Added GSSAPI support to package libcurl2-gssapi (closes: #241553). + + -- Domenico Andreoli Fri, 2 Apr 2004 18:03:15 +0200 + +curl (7.11.1-1) unstable; urgency=low + + * New upstream release. + * Bumped up shlibs version because of the introduction of + CURLOPT_POSTFIELDSIZE_LARGE option. + + -- Domenico Andreoli Fri, 19 Mar 2004 11:39:07 +0100 + +curl (7.11.0-4) unstable; urgency=low + + * Applied fix from upstream's CVS which adds another CRLF in + chunked-transfers. + + -- Domenico Andreoli Sun, 1 Feb 2004 13:19:02 +0100 + +curl (7.11.0-3) unstable; urgency=low + + * "Fixed" build process, now the right file is searched for CA + certificates (closes: #228182). + + -- Domenico Andreoli Sat, 31 Jan 2004 20:06:10 +0100 + +curl (7.11.0-2) unstable; urgency=low + + * Test suite is still performed but is not critical for the build + being successful any more. + + -- Domenico Andreoli Fri, 30 Jan 2004 13:03:03 +0100 + +curl (7.11.0-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Sun, 25 Jan 2004 17:50:43 +0100 + +curl (7.10.8+7.11.0-pre1-1) unstable; urgency=low + + * New upstream pre-release: + - proxy+ssl now passes post variables (closes: #222901) + - various test case problems exposed in #222140 should now be fixed. + * Bumped up shlibs version because of the introduction of + CURLOPT_NETRC_FILE and CURLOPT_FTP_SSL options in libcurl. + + -- Domenico Andreoli Wed, 14 Jan 2004 17:35:46 +0100 + +curl (7.10.8-1) unstable; urgency=low + + * New upstream release: + - fixed LDAP support (closes: #149609) + - cleaner environment for testsuite execution (closes: #210253) + - fixed lib/Makefile.am's use of LDFLAGS (closes: #212086) + - fixed name clash in curl.h with respect to unistd.h (closes: #213180) + - fixed typo in curl manpage (closes: #218046). + * Bumped up shlibs version because of new libcurl options. + * Added stunnel to the Build-Depends in order to enable SSL test cases. + + -- Domenico Andreoli Mon, 3 Nov 2003 10:26:12 +0100 + +curl (7.10.7-2) unstable; urgency=low + + * Fixed bug in cache_resolv_response on alpha and ia64 (closes: #207174). + Patch courtesy of Jurij Smakov. + + -- Domenico Andreoli Mon, 8 Sep 2003 21:55:46 +0200 + +curl (7.10.7-1) unstable; urgency=low + + * New upstream release. + * Bumped up shlibs version because of the introduction of CURLOPT_PROXYAUTH + and CURLOPT_FTP_CREATE_MISSING_DIRS options in libcurl. + + -- Domenico Andreoli Mon, 18 Aug 2003 00:19:43 +0200 + +curl (7.10.6-3) unstable; urgency=low + + * Applied patch to fix test 60 on ia64. + + -- Domenico Andreoli Sat, 9 Aug 2003 04:26:15 +0200 + +curl (7.10.6-2) unstable; urgency=low + + * Applied patch from upstream to fix url globbing (closes: #203827). + * make test is still performed on building debug stuff but errors + are ignored. + + -- Domenico Andreoli Thu, 7 Aug 2003 02:20:46 +0200 + +curl (7.10.6-1) unstable; urgency=low + + * New upstream release: + - added spport for http_proxy env var with name:passwd + (closes: #193630). + * make test is invoked after build + + -- Domenico Andreoli Tue, 29 Jul 2003 01:26:50 +0200 + +curl (7.10.5-1) unstable; urgency=low + + * New upstream release: + - fixed typo in curl's man page (closes: #189272). + * New libcurl option CURLOPT_FTP_USE_EPRT has been added, bumped + up shlibs. + + -- Domenico Andreoli Mon, 19 May 2003 23:57:12 +0200 + +curl (7.10.4-1) unstable; urgency=low + + * New upstream release: + - now uses new settings properly when re-using an existing connection + (closes: #185254) + - curl man page now refers to MANUAL (closes: #178509). + * Changed section of libcurl2-dev and libcurl2-dbg to libdevel. + + -- Domenico Andreoli Wed, 2 Apr 2003 21:25:24 +0200 + +curl (7.10.3-3) unstable; urgency=low + + * Rebuilt to link against libssl0.9.7. + * Improved package descriptions thanks to suggestions provided by + Filip Van Raemdonck (closes: #177995). + + -- Domenico Andreoli Fri, 14 Mar 2003 16:08:38 +0100 + +curl (7.10.3-2) unstable; urgency=low + + * Development package is now named libcurl2-dev, it provides + libcurl-dev. People can now safely make their build dependencies + and be sure to use the right stuff. + * New package libcurl2-dbg is provided to help in debugging sessions. + + -- Domenico Andreoli Mon, 20 Jan 2003 22:04:32 +0100 + +curl (7.10.3-1) unstable; urgency=low + + * New upstream release. + * It now suggests ca-certificates package. + + -- Domenico Andreoli Thu, 16 Jan 2003 00:27:48 +0100 + +curl (7.10.2-2) unstable; urgency=low + + * Added AM_MAINTAINER_MODE to configure.in (closes: #170050). + + -- Domenico Andreoli Fri, 22 Nov 2002 14:28:22 +0100 + +curl (7.10.2-1) unstable; urgency=low + + * New upstream release: + - fixed segfault on retrieving relative redirects (closes: #165382) + - fixed a leak of debug output (closes: #167678). + * Updated config.guess and config.sub (closes: #166153). + * Added zlib1g-dev to build and libcurl-dev dependencies + (closes: #169654). + * Added HTML and PDF versions of all manpages in libcurl-dev package. + + -- Domenico Andreoli Wed, 20 Nov 2002 23:38:24 +0100 + +curl (7.10.1-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Fri, 11 Oct 2002 23:26:50 +0200 + +curl (7.10-1) unstable; urgency=low + + * New upstream release: + - new way to use option -x to prevent curl from using any proxy + server (closes: #161153). + + -- Domenico Andreoli Wed, 2 Oct 2002 01:04:20 +0200 + +curl (7.9.8-2) unstable; urgency=low + + * Added again libcurl2-ssl to the libcurl2 conflicts. + + -- Domenico Andreoli Thu, 4 Jul 2002 02:35:24 +0200 + +curl (7.9.8-1) unstable; urgency=low + + * New upstream release. + * Double flavor of curl to support both non-SSL and SSL is gone. + Now curl comes only with SSL. Who needs SSL can require curl + version >= 7.9.8 . + + -- Domenico Andreoli Mon, 24 Jun 2002 23:04:37 +0200 + +curl (7.9.7-2) unstable; urgency=low + + * Fixed the bashism in debian/rules (closes: #147352). + * SSL and non-SSL series of curl packages are now built from the + same source. thanks crypto-in-main! :) + + -- Domenico Andreoli Mon, 20 May 2002 23:28:05 +0200 + +curl (7.9.7-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Wed, 15 May 2002 21:09:19 +0200 + +curl (7.9.6-1) unstable; urgency=low + + * New upstream release. + * libcurl.3 manpage is now installed by libcurl-dev instead of + libcurl2. Indeed it provides an overview on how to use libcurl in + C programs. + + -- Domenico Andreoli Sat, 20 Apr 2002 17:06:51 +0200 + +curl (7.9.5-2) unstable; urgency=low + + * curl-ssl stuff moved from non-US to main. + + -- Domenico Andreoli Mon, 25 Mar 2002 23:40:02 +0100 + +curl (7.9.5-1) unstable; urgency=low + + * New upstream release (closes: #134608). + * Added autotools-dev to the build dependencies. config.{guess,sub} + can now be updated automatically in the build process. + + -- Domenico Andreoli Tue, 12 Mar 2002 19:06:21 +0100 + +curl (7.9.3-2) unstable; urgency=low + + * Upstream source code has been correctly imported in my CVS + repository (closes: #130906). + + -- Domenico Andreoli Sun, 27 Jan 2002 22:23:54 +0100 + +curl (7.9.3-1) unstable; urgency=low + + * New upstream release: + - fixed wrong assumption on char signedness (closes: #127011) + - missing header added accordingly (closes: #130401) + * Fixed a typo in curl description (closes: #124526). + + -- Domenico Andreoli Thu, 24 Jan 2002 20:04:04 +0100 + +curl (7.9.2-1) unstable; urgency=low + + * New upstream release: + - two bad timeout matters in libcurl2 are now solved (closes: #118595). + + -- Domenico Andreoli Fri, 7 Dec 2001 16:58:45 +0100 + +curl (7.9.1-3) unstable; urgency=low + + * Fixed return type of Curl_ftpsendf(...) to CURLcode (closes: #120485). + * Versions in debian/libcurl2.shlibs have been incremented to + ">= 7.9.1-1". + + -- Domenico Andreoli Thu, 22 Nov 2001 15:35:40 +0100 + +curl (7.9.1-2) unstable; urgency=low + + * Reverted to unpatched released 7.9.1 source tree, patch behavior + was weird. + + -- Domenico Andreoli Thu, 15 Nov 2001 18:05:58 +0100 + +curl (7.9.1-1) unstable; urgency=low + + * New upstream release. + * Applied upstream patch #478780 found on sourceforge, fixes libcurl + which didn't restore SIGALRM handler (closes: #118595). + * Applied patch for patch #478780 of above, see bug #118595 in BTS. + Patch courtesy of Enrik Berkhan . + * Build-Depends reduced to what is strictly required for building. + autoconf, automake and libtool build dependencies are gone. + + -- Domenico Andreoli Fri, 9 Nov 2001 13:56:36 +0100 + +curl (7.9-1) unstable; urgency=low + + * New upstream release: + - output of "curl-config --libs" now includes -lcurl. + + -- Domenico Andreoli Tue, 25 Sep 2001 18:38:46 +0200 + +curl (7.8-3) unstable; urgency=low + + * Added libc6-dev to libcurl2-dev dependencies. + * Fixed lack of some FD_ZERO(...)s in lib/transfer.c (closes: #105516). + + -- Domenico Andreoli Fri, 3 Aug 2001 16:32:20 +0200 + +curl (7.8-2) unstable; urgency=low + + * libcurl2.shlibs now includes version numbers. some new symbols have + been introduced in libcurl 7.8, so program linked against 7.8 cannot + work with older ones. + * IPv6 support is now enabled + * configure.in has been renamed to autoconf.ac to force the use of + autoconf 2.50 + + -- Domenico Andreoli Thu, 5 Jul 2001 01:38:24 +0200 + +curl (7.8-1) unstable; urgency=low + + * New upstream release. + * Applied patch for correct shared library versioning of libcurl, curl + 7.8 comes with broken shared library version out of the box. + Patch provided by upstream developer. + + -- Domenico Andreoli Sat, 9 Jun 2001 21:12:05 +0200 + +curl (7.7.3-3) unstable; urgency=low + + * Fixed manpages libcurl-dev with required simlinks (closes: 99610). + + -- Domenico Andreoli Mon, 4 Jun 2001 14:37:49 +0200 + +curl (7.7.3-2) unstable; urgency=low + + * lib/url.c and lib/version.c are now fixed (closes: #97709). + * install upstream changelog (closes: #97628). + + -- Domenico Andreoli Fri, 18 May 2001 10:32:25 +0200 + +curl (7.7.3-1) unstable; urgency=low + + * New upstream release. + * Using dh_installman instead dh_installmanpages. + * Installing libcurl examples with dh_installexamples. + * Policy 3.5.3.0 compliant. + + -- Domenico Andreoli Thu, 10 May 2001 09:45:05 +0200 + +curl (7.7.2-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Tue, 24 Apr 2001 09:14:51 +0200 + +curl (7.7.1-2) unstable; urgency=low + + * Fixed debian/rules (closes: #78232, #93837). + + -- Domenico Andreoli Tue, 17 Apr 2001 17:12:19 +0200 + +curl (7.7.1-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Tue, 10 Apr 2001 13:26:09 +0200 + +curl (7.7-1) unstable; urgency=low + + * New upstream release. + * Fixed formatting errors in curl.1 (closes: #90281). + + -- Domenico Andreoli Fri, 23 Mar 2001 18:25:26 +0100 + +curl (7.6.1-5) unstable; urgency=low + + * Fixed debian/libcurl1.shlibs in order to solve any problem for those + packages which should depend on either libcurl1 or libcurl1-ssl. + I should have done it long time ago. + + -- Domenico Andreoli Tue, 13 Mar 2001 18:29:06 +0100 + +curl (7.6.1-4) unstable; urgency=low + + * Added versioned Build-Depend for debhelper. + + -- Domenico Andreoli Tue, 6 Mar 2001 15:16:02 +0100 + +curl (7.6.1-3) unstable; urgency=low + + * Refining the transition to debhelper compatibility 2. I forgot the + executable in the curl package (closes: #87886). + + -- Domenico Andreoli Wed, 28 Feb 2001 14:31:43 +0100 + +curl (7.6.1-2) unstable; urgency=low + + * Switched to debhelper compatibility version 2. + + -- Domenico Andreoli Fri, 23 Feb 2001 18:24:02 +0100 + +curl (7.6.1-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Tue, 13 Feb 2001 18:04:04 +0100 + +curl (7.6-2) unstable; urgency=low + + * Adjusted dependencies in order to let curl-ssl package manage a + smooth upgrade from potato. + + -- Domenico Andreoli Fri, 9 Feb 2001 13:36:11 +0100 + +curl (7.6-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Mon, 29 Jan 2001 16:00:59 +0100 + +curl (7.5.2-2) unstable; urgency=low + + * This is a service upload in order to fix dependencies problems arose + for a ill-formed upload of 7.5.2-1. + + -- Domenico Andreoli Mon, 29 Jan 2001 14:54:57 +0100 + +curl (7.5.2-1) unstable; urgency=low + + * New upstream release. + * It needed to be recompiled against the new libc (closes: #80256). + + -- Domenico Andreoli Mon, 15 Jan 2001 13:08:15 +0100 + +curl (7.5-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Mon, 4 Dec 2000 13:15:33 +0100 + +curl (7.4.2-2) unstable; urgency=low + + * curl replaces curl-ssl. curl is only a frontend for libcurl and is not + aware of any protocol, libcurl is. so what is really different whether + ssl is enable or not is only libcurl. + * curl now depends on (libcurl0 | libcurl0-ssl). + * The workaround for libtool -rpath parameter is not required, so + it has been removed from configure.in. + * Removed "Suggests: " field in control file for libcurl0. It suggested + to install curl and libcurl-dev too but it really doesn't make sense + (this change was really applied in -1). + + -- Domenico Andreoli Tue, 28 Nov 2000 14:27:29 +0100 + +curl (7.4.2-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Fri, 17 Nov 2000 16:19:23 +0100 + +curl (7.2.1-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Mon, 4 Sep 2000 01:22:44 +0200 + +curl (7.1-3) unstable; urgency=low + + * Added "Suggests: " field in control file for libcurl0. Now curl and + libcurl-dev are suggested upon installation of libcurl0. + + -- Domenico Andreoli Mon, 14 Aug 2000 15:01:08 +0200 + +curl (7.1-2) unstable; urgency=low + + * Fixed a line that did not install development manpages. + + -- Domenico Andreoli Thu, 10 Aug 2000 14:32:23 +0200 + +curl (7.1-1) unstable; urgency=low + + * New upstream release. + * libcurl is now a separate package, it provides shared libraries and + includes to allow developing for other applications. + + -- Domenico Andreoli Wed, 9 Aug 2000 01:21:25 +0200 + +curl (6.5.2-4) unstable; urgency=low + + * Some missing build dependencies (autoconf, automake, libtool) added. + + -- Domenico Andreoli Sat, 8 Jul 2000 00:13:16 +0200 + +curl (6.5.2-3) unstable; urgency=low + + * Due to some policy and technical restrictions, curl's source package + has been splitted again in two, one for main archive and one for non-US. + + -- Domenico Andreoli Tue, 4 Jul 2000 15:52:14 +0200 + +curl (6.5.2-2) unstable; urgency=low + + * Added a Build-Depends in order to compile curl-ssl only if + libssl09-dev is installed. + * Documentation reflects the new location of curl debian packages + home page (http://curl-deb.sourceforge.net). + * Corrected minor spelling errors in README.Debian. + + -- Domenico Andreoli Sat, 17 Jun 2000 01:13:19 +0200 + +curl (6.5.2-1) unstable; urgency=low + + * New upstream release. + * Now curl and curl-ssl binary packages are generated from the same + debian source package. + * Uploads and downloads are now performed simultaneously (closes: #56627). + + -- Domenico Andreoli Sat, 25 Mar 2000 01:06:35 +0100 + +curl (6.4-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Sun, 30 Jan 2000 02:21:32 +0100 + +curl (6.3.1-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Sat, 11 Dec 1999 17:38:13 +0100 + +curl (6.2-1) unstable; urgency=low + + * New upstream release. + * No hack to compile without SSL is required anymore. Fixed by + upstream maintainer. + + -- Domenico Andreoli Mon, 1 Nov 1999 00:37:32 +0100 + +curl (6.0-1) unstable; urgency=low + + * New upstream release. + + -- Domenico Andreoli Mon, 27 Sep 1999 22:28:13 +0200 + +curl (5.11-1.1) unstable; urgency=low + + * Put sources into the right section. + + -- Domenico Andreoli Mon, 30 Aug 1999 03:14:21 +0200 + +curl (5.11-1) unstable; urgency=low + + * New upstream release. + * New debian maintainer. + + -- Domenico Andreoli Fri, 27 Aug 1999 11:50:04 +0200 + +curl (5.9-2) unstable; urgency=low + + * Moved to non-US, and compiled against ssl (closes: #40099). + + -- Leon Breedt Sat, 3 Jul 1999 15:46:54 +0200 + +curl (5.9-1) unstable; urgency=low + + * New upstream release. + + -- Leon Breedt Sun, 23 May 1999 21:51:30 +0200 + +curl (5.8-1) unstable; urgency=low + + * Initial Release. + + -- Leon Breedt Sun, 9 May 1999 18:55:48 +0200 diff --git a/debian/control b/debian/control new file mode 100644 index 00000000000000..953ffb419b2ec6 --- /dev/null +++ b/debian/control @@ -0,0 +1,201 @@ +Source: curl +Section: web +Priority: optional +Maintainer: Debian Curl Maintainers +Uploaders: Carlos Henrique Lima Melara , + Samuel Henrique , + Sergio Durigan Junior +Build-Depends: + debhelper-compat (= 13), + autoconf, + automake, + ca-certificates, + dh-exec, + groff-base, + libbrotli-dev, + libgnutls28-dev, + libidn2-dev, + libkrb5-dev, + libldap2-dev, + libnghttp2-dev, + libpsl-dev, + librtmp-dev, + libssh-dev, + libssh2-1-dev, + libssl-dev, + libtool, + libzstd-dev, + locales-all , + openssh-server , + python3:native , + python3-impacket , + gnutls-bin [amd64 arm64 armel armhf i386 mips64el mipsel s390x powerpc ppc64 riscv64] , + quilt, + stunnel4 , + zlib1g-dev, +Build-Conflicts: autoconf2.13, automake1.4 +Standards-Version: 4.6.2 +Vcs-Git: https://salsa.debian.org/debian/curl.git +Vcs-Browser: https://salsa.debian.org/debian/curl +Homepage: https://curl.se/ +Rules-Requires-Root: no + +Package: curl +Architecture: any +Depends: ${shlibs:Depends}, ${misc:Depends}, libcurl4 (= ${binary:Version}) +Multi-Arch: foreign +Description: command line tool for transferring data with URL syntax + curl is a command line tool for transferring data with URL syntax, supporting + DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, + POP3S, RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP. + . + curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form + based upload, proxies, cookies, user+password authentication (Basic, Digest, + NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a + busload of other useful tricks. + +Package: libcurl4 +Architecture: any +Section: libs +Depends: ${shlibs:Depends}, ${misc:Depends} +Recommends: ca-certificates +Pre-Depends: ${misc:Pre-Depends} +Conflicts: libcurl3 +Replaces: libcurl3 +Multi-Arch: same +Description: easy-to-use client-side URL transfer library (OpenSSL flavour) + libcurl is an easy-to-use client-side URL transfer library, supporting DICT, + FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, + RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP. + . + libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP + form based upload, proxies, cookies, user+password authentication (Basic, + Digest, NTLM, Negotiate, Kerberos), file transfer resume, http proxy tunneling + and more! + . + libcurl is free, thread-safe, IPv6 compatible, feature rich, well supported, + fast, thoroughly documented and is already used by many known, big and + successful companies and numerous applications. + . + SSL support is provided by OpenSSL. + +Package: libcurl3-gnutls +Architecture: any +Section: libs +Depends: ${shlibs:Depends}, ${misc:Depends} +Recommends: ca-certificates +Pre-Depends: ${misc:Pre-Depends} +Multi-Arch: same +Description: easy-to-use client-side URL transfer library (GnuTLS flavour) + libcurl is an easy-to-use client-side URL transfer library, supporting DICT, + FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, + RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP. + . + libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP + form based upload, proxies, cookies, user+password authentication (Basic, + Digest, NTLM, Negotiate, Kerberos), file transfer resume, http proxy tunneling + and more! + . + libcurl is free, thread-safe, IPv6 compatible, feature rich, well supported, + fast, thoroughly documented and is already used by many known, big and + successful companies and numerous applications. + . + SSL support is provided by GnuTLS. + +Package: libcurl4-openssl-dev +Architecture: any +Section: libdevel +Provides: libcurl-dev, + libcurl-ssl-dev, + libcurl3-openssl-dev, + libcurl4-dev, + libcurl3-dev +Conflicts: libcurl4-gnutls-dev, libssl1.0-dev +Depends: ${misc:Depends}, libcurl4 (= ${binary:Version}) +Suggests: libcurl4-doc, + libidn-dev, + libkrb5-dev, + libldap2-dev, + librtmp-dev, + libssh2-1-dev, + libssl-dev, + pkg-config, + zlib1g-dev +Multi-Arch: same +Description: development files and documentation for libcurl (OpenSSL flavour) + libcurl is an easy-to-use client-side URL transfer library, supporting DICT, + FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, + RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP. + . + libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP + form based upload, proxies, cookies, user+password authentication (Basic, + Digest, NTLM, Negotiate, Kerberos), file transfer resume, http proxy tunneling + and more! + . + libcurl is free, thread-safe, IPv6 compatible, feature rich, well supported, + fast, thoroughly documented and is already used by many known, big and + successful companies and numerous applications. + . + This package provides the development files (ie. includes, static library, + manual pages) that allow one to build software which uses libcurl. + . + SSL support is provided by OpenSSL. + +Package: libcurl4-gnutls-dev +Architecture: any +Section: libdevel +Provides: libcurl-dev, + libcurl-ssl-dev, + libcurl3-gnutls-dev, + libcurl4-dev +Conflicts: libcurl4-openssl-dev +Depends: ${misc:Depends}, libcurl3-gnutls (= ${binary:Version}) +Suggests: libcurl4-doc, + libgnutls28-dev, + libidn-dev, + libkrb5-dev, + libldap2-dev, + librtmp-dev, + libssh2-1-dev, + pkg-config, + zlib1g-dev +Multi-Arch: same +Description: development files and documentation for libcurl (GnuTLS flavour) + libcurl is an easy-to-use client-side URL transfer library, supporting DICT, + FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, + RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP. + . + libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP + form based upload, proxies, cookies, user+password authentication (Basic, + Digest, NTLM, Negotiate, Kerberos), file transfer resume, http proxy tunneling + and more! + . + libcurl is free, thread-safe, IPv6 compatible, feature rich, well supported, + fast, thoroughly documented and is already used by many known, big and + successful companies and numerous applications. + . + This package provides the development files (ie. includes, static library, + manual pages) that allow one to build software which uses libcurl. + . + SSL support is provided by GnuTLS. + +Package: libcurl4-doc +Section: doc +Architecture: all +Multi-Arch: foreign +Depends: ${misc:Depends} +Description: documentation for libcurl + libcurl is an easy-to-use client-side URL transfer library, supporting DICT, + FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, + RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP. + . + libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP + form based upload, proxies, cookies, user+password authentication (Basic, + Digest, NTLM, Negotiate, Kerberos), file transfer resume, http proxy tunneling + and more! + . + libcurl is free, thread-safe, IPv6 compatible, feature rich, well supported, + fast, thoroughly documented and is already used by many known, big and + successful companies and numerous applications. + . + This package provides the documentation files for libcurl. diff --git a/debian/copyright b/debian/copyright new file mode 100644 index 00000000000000..a9cbd5a1fa05ac --- /dev/null +++ b/debian/copyright @@ -0,0 +1,534 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: curl +Source: https://curl.se/ + +Files: * +Copyright: 1997-2022, Daniel Stenberg, , et al. +License: curl + +Files: debian/* +Copyright: 1999, Leon Breedt + 2005, Luk Claes + 2005, LaMont Jones + 2004-2005, Matthias Klose + 2005-2006, Martin Pitt + 2008, Andreas Schuldei + 2000-2010, Domenico Andreoli + 1999-2010, Domenico Andreoli + 2010-2011, Ramakrishnan Muthukrishnan + 2007, 2011, 2018, Steve Langasek + 2011-2020, Alessandro Ghedini + 2021, Bruno Kleinert + 2021, Jeremy Bicha + 2014-2011, Helmut Grohne + 2022, Paul Gevers + 2013, 2022, Salvatore Bonaccorso + 2022, Sergio Durigan Junior + 2021-2022, Samuel Henrique + 2023 John Scott +License: curl + +Files: debian/tests/LDAP-bindata.c +Copyright: 2019 Ryan Tandy + 2023 John Scott +License: OLDAP-2.8 + +Files: packages/vms/backup_gnv_curl_src.com + packages/vms/build_curl-config_script.com + packages/vms/build_gnv_curl.com + packages/vms/build_gnv_curl_pcsi_desc.com + packages/vms/build_gnv_curl_pcsi_text.com + packages/vms/build_gnv_curl_release_notes.com + packages/vms/build_libcurl_pc.com + packages/vms/clean_gnv_curl.com + packages/vms/config_h.com + packages/vms/curl_gnv_build_steps.txt + packages/vms/curl_startup.com + packages/vms/generate_config_vms_h_curl.com + packages/vms/generate_vax_transfer.com + packages/vms/gnv_conftest.c_first + packages/vms/gnv_curl_configure.sh + packages/vms/gnv_libcurl_symbols.opt + packages/vms/gnv_link_curl.com + packages/vms/make_gnv_curl_install.sh + packages/vms/make_pcsi_curl_kit_name.com + packages/vms/pcsi_gnv_curl_file_list.txt + packages/vms/pcsi_product_gnv_curl.com + packages/vms/report_openssl_version.c + packages/vms/setup_gnv_curl_build.com + packages/vms/stage_curl_install.com + packages/vms/vms_eco_level.h +Copyright: 2009-2022, John Malmberg +License: ISC + +Files: lib/curl_des.c + lib/curl_des.h + lib/system_win32.c + lib/system_win32.h + lib/vauth/krb5_sspi.c + lib/vauth/vauth.c + lib/vauth/vauth.h + lib/version_win32.c + lib/version_win32.h + projects/build-openssl.bat + projects/checksrc.bat + projects/generate.bat + tests/libtest/lib1520.c +Copyright: 2012-2022, Steve Holme, +License: curl + +Files: m4/xc-am-iface.m4 + m4/xc-cc-check.m4 + m4/xc-lt-iface.m4 + m4/xc-translit.m4 + m4/xc-val-flgs.m4 + m4/zz40-xc-ovr.m4 + m4/zz50-xc-ovr.m4 + m4/zz60-xc-ovr.m4 +Copyright: 2011-2022, Daniel Stenberg +License: ISC + +Files: compile + depcomp + missing + test-driver +Copyright: 1996-2021, Free Software Foundation, Inc. +License: GPL-2+ with Autoconf-data exception + +Files: lib/vtls/mbedtls.c + lib/vtls/mbedtls.h + lib/vtls/mbedtls_threadlock.c + lib/vtls/mbedtls_threadlock.h +Copyright: 2010-2011, Hoi-Ho Chan, + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: tests/libtest/lib1506.c + tests/libtest/lib1508.c + tests/libtest/lib1510.c + tests/libtest/lib1512.c +Copyright: 2013-2022, Linus Nielsen Feltzing +License: curl + +Files: config.guess + config.sub +Copyright: 1992-2022, Free Software Foundation, Inc. +License: GPL-3+ with Autoconf-data exception + +Files: lib/inet_ntop.c + lib/inet_pton.c +Copyright: 1996-2022, Internet Software Consortium. +License: ISC + +Files: tests/certs/scripts/genroot.sh + tests/certs/scripts/genserv.sh +Copyright: 2000-2020, EdelWeb for EdelKey and OpenEvidence +License: curl + +Files: lib/smb.c + lib/smb.h +Copyright: 2014, 2018, Bill Nagel , Exacq Technologies + 2018-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/curl_sha256.h + lib/sha256.c +Copyright: 2017, Florin Petriuc, + 2018-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/conncache.c + lib/conncache.h +Copyright: 2012-2016, Linus Nielsen Feltzing, + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: tests/appveyor.pm + tests/azure.pm +Copyright: 2020-2022, Daniel Stenberg, , et al. + 2020-2022, Marc Hoersken, +License: curl + +Files: lib/vtls/schannel.c + lib/vtls/schannel_verify.c +Copyright: 2012, Mark Salisbury, + 2012-2016, Marc Hoersken, + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/socks_gssapi.c + lib/socks_sspi.c +Copyright: 2011-2012, Markus Moeller, + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/vtls/sectransp.c + lib/vtls/sectransp.h +Copyright: 2012-2017, Nick Zitzmann, . + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/vauth/digest_sspi.c + lib/vauth/krb5_gssapi.c +Copyright: 2014-2019, Steve Holme, . + 2015-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/vtls/rustls.c + lib/vtls/rustls.h +Copyright: 2020-2022, Jacob Hoffman-Andrews, +License: curl + +Files: tests/libtest/lib1908.c + tests/libtest/lib1910.c +Copyright: 2013-2022, Linus Nielsen Feltzing, +License: curl + +Files: docs/libcurl/opts/CURLOPT_PREREQDATA.3 + docs/libcurl/opts/CURLOPT_PREREQFUNCTION.3 +Copyright: 2022, Max Dymond, , et al. +License: curl + +Files: lib/vtls/bearssl.c + lib/vtls/bearssl.h +Copyright: 2019-2022, Michael Forney, +License: curl + +Files: tests/libtest/lib1526.c + tests/libtest/lib1527.c +Copyright: 1998-2022, Vijay Panghal, , et al. +License: curl + +Files: m4/libtool.m4 + ltmain.sh +Copyright: 1996-2022, Free Software Foundation, Inc. +License: GPL-2+ with Libtool exception + +Files: lib/krb5.c +Copyright: 1995-1999, Kungliga Tekniska Högskolan + 2004-2022, Daniel Stenberg +License: BSD-3-clause + +Files: tests/server/tftpd.c +Copyright: 1983, Regents of the University of California. + 2005-2022, Daniel Stenberg, , et al. +License: BSD-4-Clause-UC + +Files: aclocal.m4 + m4/ltsugar.m4 + m4/ltversion.m4 + m4/ltoptions.m4 + m4/lt~obsolete.m4 +Copyright: 1996-2022, Free Software Foundation, Inc. +License: FSFULLR + +Files: install-sh +Copyright: 1994, X Consortium +License: X11 + +Files: lib/mqtt.h +Copyright: 2019-2022, Björn Stenberg, +License: curl + +Files: lib/mqtt.c +Copyright: 2019, Björn Stenberg, + 2020-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/curl_rtmp.c +Copyright: 2012, Howard Chu, + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/openldap.c +Copyright: 2010, Howard Chu, + 2011-2022, Daniel Stenberg, , et al. +License: curl + +Files: tests/server/fake_ntlm.c +Copyright: 2010, Mandy Wu, + 2011-2022, Daniel Stenberg, , et al. +License: curl + +Files: lib/vtls/schannel.h +Copyright: 2012, Marc Hoersken, , et al. + 2012-2022, Daniel Stenberg, , et al. +License: curl + +Files: tests/libtest/lib1525.c +Copyright: 1998, Vijay Panghal, , et al. + 1998-2022, Daniel Stenberg, , et al. +License: curl + +Files: docs/libcurl/libcurl.m4 +Copyright: 2006-2022, David Shaw +License: curl + +Files: tests/pathhelp.pm +Copyright: 2016-2022, Evgeny Grin (Karlson2k), . +License: curl + +Files: lib/curl_rtmp.h +Copyright: 2010-2022, Howard Chu, +License: curl + +Files: projects/build-wolfssl.bat +Copyright: 2012-2020, Steve Holme, . + 2015-2022, Jay Satiro, . +License: curl + +Files: docs/examples/crawler.c +Copyright: 2018-2022, Jeroen Ooms +License: curl + +Files: tests/libtest/libprereq.c +Copyright: 2021-2022, Max Dymond, +License: curl + +Files: tests/libtest/lib3010.c +Copyright: 2020-2022, Nicolas Sterchele, +License: curl + +Files: lib/vssh/libssh.c +Copyright: 2017-2022, Red Hat, Inc. +License: curl + +Files: lib/vauth/gsasl.c +Copyright: 2020-2022, Simon Josefsson, , et al. +License: curl + +License: curl + All rights reserved. + . + Permission to use, copy, modify, and distribute this software for any purpose + with or without fee is hereby granted, provided that the above copyright + notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN + NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, + DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR + OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE + OR OTHER DEALINGS IN THE SOFTWARE. + . + Except as contained in this notice, the name of a copyright holder shall not + be used in advertising or otherwise to promote the sale, use or other dealings + in this Software without prior written authorization of the copyright holder. + +License: BSD-3-Clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the Institute nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +License: BSD-4-Clause-UC + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + 3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + This product includes software developed by the University of + California, Berkeley and its contributors. + 4. Neither the name of the University nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. +Comment: Clause 3 has been deleted: + July 22, 1999 + . + To All Licensees, Distributors of Any Version of BSD: + . + As you know, certain of the Berkeley Software Distribution ("BSD") source + code files require that further distributions of products containing all or + portions of the software, acknowledge within their advertising materials + that such products contain software developed by UC Berkeley and its + contributors. + . + Specifically, the provision reads: + . + " * 3. All advertising materials mentioning features or use of this software + * must display the following acknowledgement: + * This product includes software developed by the University of + * California, Berkeley and its contributors." + . + Effective immediately, licensees and distributors are no longer required to + include the acknowledgement within advertising materials. Accordingly, the + foregoing paragraph of those BSD Unix files containing it is hereby deleted + in its entirety. + . + William Hoskins + Director, Office of Technology Licensing + University of California, Berkeley + +License: ISC + Permission to use, copy, modify, and/or distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES + WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR + ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF + OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +License: GPL-2+ with Autoconf-data exception + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2, or (at your option) + any later version. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program. If not, see . + As a special exception to the GNU General Public License, if you + distribute this file as part of a program that contains a + configuration script generated by Autoconf, you may include it under + the same distribution terms that you use for the rest of that program. + +License: X11 + Permission is hereby granted, free of charge, to any person obtaining a copy + of this software and associated documentation files (the "Software"), to + deal in the Software without restriction, including without limitation the + rights to use, copy, modify, merge, publish, distribute, sublicense, and/or + sell copies of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + . + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + X CONSORTIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN + AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNEC- + TION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + . + Except as contained in this notice, the name of the X Consortium shall not + be used in advertising or otherwise to promote the sale, use or other deal- + ings in this Software without prior written authorization from the X Consor- + tium. + +License: GPL-2+ with Libtool exception + GNU Libtool is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + . + As a special exception to the GNU General Public License, + if you distribute this file as part of a program or library that + is built using GNU Libtool, you may include this file under the + same distribution terms that you use for the rest of that program. + . + GNU Libtool is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with GNU Libtool; see the file COPYING. If not, a copy + can be downloaded from http://www.gnu.org/licenses/gpl.html, + or obtained by writing to the Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian systems, the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2'. + +License: GPL-3+ with Autoconf-data exception + This program is free software: you can redistribute it and/or modify it + under the terms of the GNU General Public License as published by the + Free Software Foundation, either version 3 of the License, or (at your + option) any later version. + . + This program is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General + Public License for more details. + . + You should have received a copy of the GNU General Public License along + with this program. If not, see . + . + As a special exception, the respective Autoconf Macro's copyright owner + gives unlimited permission to copy, distribute and modify the configure + scripts that are the output of Autoconf when processing the Macro. You + need not follow the terms of the GNU General Public License when using + or distributing such scripts, even though portions of the text of the + Macro appear in them. The GNU General Public License (GPL) does govern + all other use of the material that constitutes the Autoconf Macro. + . + This special exception to the GPL applies to versions of the Autoconf + Macro released by the Autoconf Archive. When you make and distribute a + modified version of the Autoconf Macro, you may extend this special + exception to the GPL to apply to your modified version as well. + +License: FSFULLR + This file is free software; the Free Software Foundation + gives unlimited permission to copy and/or distribute it, + with or without modifications, as long as this notice is preserved. + +License: OLDAP-2.8 + The OpenLDAP Public License + Version 2.8, 17 August 2003 + . + Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following conditions are met: + . + 1. Redistributions in source form must retain copyright statements and notices, + . + 2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and + . + 3. Redistributions must contain a verbatim copy of this document. + . + The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version number. You may use this Software under terms of this license revision or under the terms of any subsequent revision of the license. + , + THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + . + The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at all times remain with copyright holders. + . + OpenLDAP is a registered trademark of the OpenLDAP Foundation. + . + Permission to copy and distribute verbatim copies of this document is granted. diff --git a/debian/curl.install b/debian/curl.install new file mode 100755 index 00000000000000..6c48bc8f8b795a --- /dev/null +++ b/debian/curl.install @@ -0,0 +1,3 @@ +#!/usr/bin/dh-exec +usr/bin/curl + usr/share/zsh/* diff --git a/debian/gbp.conf b/debian/gbp.conf new file mode 100644 index 00000000000000..9c9e11e98947dd --- /dev/null +++ b/debian/gbp.conf @@ -0,0 +1,15 @@ +[DEFAULT] +pristine-tar = True +cleaner = /bin/true +ignore-branch = True +debian-branch = debian/unstable +sign-tags = True + +[import-orig] +filter-pristine-tar = True + +[pq] +patch-numbers = False + +[dch] +multimaint-merge = True diff --git a/debian/libcurl3-gnutls.install b/debian/libcurl3-gnutls.install new file mode 100644 index 00000000000000..58c3413832567d --- /dev/null +++ b/debian/libcurl3-gnutls.install @@ -0,0 +1 @@ +usr/lib/*/libcurl-gnutls.so.4* diff --git a/debian/libcurl3-gnutls.links b/debian/libcurl3-gnutls.links new file mode 100755 index 00000000000000..43fb7847c3526e --- /dev/null +++ b/debian/libcurl3-gnutls.links @@ -0,0 +1,3 @@ +#!/bin/sh + +echo usr/lib/$DEB_HOST_MULTIARCH/libcurl-gnutls.so.4 usr/lib/$DEB_HOST_MULTIARCH/libcurl-gnutls.so.3 diff --git a/debian/libcurl3-gnutls.lintian-overrides b/debian/libcurl3-gnutls.lintian-overrides new file mode 100644 index 00000000000000..4775db98631df1 --- /dev/null +++ b/debian/libcurl3-gnutls.lintian-overrides @@ -0,0 +1 @@ +libcurl3-gnutls: package-name-doesnt-match-sonames libcurl-gnutls4 diff --git a/debian/libcurl3-gnutls.symbols b/debian/libcurl3-gnutls.symbols new file mode 100644 index 00000000000000..8fc7ea055f5408 --- /dev/null +++ b/debian/libcurl3-gnutls.symbols @@ -0,0 +1,97 @@ +libcurl-gnutls.so.4 libcurl3-gnutls #MINVER# +* Build-Depends-Package: libcurl4-gnutls-dev + CURL_GNUTLS_3@CURL_GNUTLS_3 7.16.2 + HIDDEN@HIDDEN 7.16.2 + curl_easy_cleanup@CURL_GNUTLS_3 7.16.2 + curl_easy_duphandle@CURL_GNUTLS_3 7.16.2 + curl_easy_escape@CURL_GNUTLS_3 7.16.2 + curl_easy_getinfo@CURL_GNUTLS_3 7.16.2 + curl_easy_header@CURL_GNUTLS_3 7.83.0 + curl_easy_init@CURL_GNUTLS_3 7.16.2 + curl_easy_nextheader@CURL_GNUTLS_3 7.83.0 + curl_easy_option_by_id@CURL_GNUTLS_3 7.74.0 + curl_easy_option_by_name@CURL_GNUTLS_3 7.74.0 + curl_easy_option_next@CURL_GNUTLS_3 7.74.0 + curl_easy_pause@CURL_GNUTLS_3 7.18.0 + curl_easy_perform@CURL_GNUTLS_3 7.16.2 + curl_easy_recv@CURL_GNUTLS_3 7.18.2 + curl_easy_reset@CURL_GNUTLS_3 7.16.2 + curl_easy_send@CURL_GNUTLS_3 7.18.2 + curl_easy_setopt@CURL_GNUTLS_3 7.16.2 + curl_easy_strerror@CURL_GNUTLS_3 7.16.2 + curl_easy_unescape@CURL_GNUTLS_3 7.16.2 + curl_easy_upkeep@CURL_GNUTLS_3 7.63.0 + curl_escape@CURL_GNUTLS_3 7.16.2 + curl_formadd@CURL_GNUTLS_3 7.16.2 + curl_formfree@CURL_GNUTLS_3 7.16.2 + curl_formget@CURL_GNUTLS_3 7.16.2 + curl_free@CURL_GNUTLS_3 7.16.2 + curl_getdate@CURL_GNUTLS_3 7.16.2 + curl_getenv@CURL_GNUTLS_3 7.16.2 + curl_global_cleanup@CURL_GNUTLS_3 7.16.2 + curl_global_init@CURL_GNUTLS_3 7.16.2 + curl_global_init_mem@CURL_GNUTLS_3 7.16.2 + curl_global_sslset@CURL_GNUTLS_3 7.56.1 + curl_global_trace@CURL_GNUTLS_3 8.3.0 + curl_maprintf@CURL_GNUTLS_3 7.16.2 + curl_mfprintf@CURL_GNUTLS_3 7.16.2 + curl_mime_addpart@CURL_GNUTLS_3 7.56.1 + curl_mime_data@CURL_GNUTLS_3 7.56.1 + curl_mime_data_cb@CURL_GNUTLS_3 7.56.1 + curl_mime_encoder@CURL_GNUTLS_3 7.56.1 + curl_mime_filedata@CURL_GNUTLS_3 7.56.1 + curl_mime_filename@CURL_GNUTLS_3 7.56.1 + curl_mime_free@CURL_GNUTLS_3 7.56.1 + curl_mime_headers@CURL_GNUTLS_3 7.56.1 + curl_mime_init@CURL_GNUTLS_3 7.56.1 + curl_mime_name@CURL_GNUTLS_3 7.56.1 + curl_mime_subparts@CURL_GNUTLS_3 7.56.1 + curl_mime_type@CURL_GNUTLS_3 7.56.1 + curl_mprintf@CURL_GNUTLS_3 7.16.2 + curl_msnprintf@CURL_GNUTLS_3 7.16.2 + curl_msprintf@CURL_GNUTLS_3 7.16.2 + curl_multi_add_handle@CURL_GNUTLS_3 7.16.2 + curl_multi_assign@CURL_GNUTLS_3 7.16.2 + curl_multi_cleanup@CURL_GNUTLS_3 7.16.2 + curl_multi_fdset@CURL_GNUTLS_3 7.16.2 + curl_multi_get_handles@CURL_GNUTLS_3 8.4.0 + curl_multi_info_read@CURL_GNUTLS_3 7.16.2 + curl_multi_init@CURL_GNUTLS_3 7.16.2 + curl_multi_perform@CURL_GNUTLS_3 7.16.2 + curl_multi_poll@CURL_GNUTLS_3 7.66.0 + curl_multi_remove_handle@CURL_GNUTLS_3 7.16.2 + curl_multi_setopt@CURL_GNUTLS_3 7.16.2 + curl_multi_socket@CURL_GNUTLS_3 7.16.2 + curl_multi_socket_action@CURL_GNUTLS_3 7.16.3 + curl_multi_socket_all@CURL_GNUTLS_3 7.16.2 + curl_multi_strerror@CURL_GNUTLS_3 7.16.2 + curl_multi_timeout@CURL_GNUTLS_3 7.16.2 + curl_multi_wait@CURL_GNUTLS_3 7.28.0 + curl_multi_wakeup@CURL_GNUTLS_3 7.68.0 + curl_mvaprintf@CURL_GNUTLS_3 7.16.2 + curl_mvfprintf@CURL_GNUTLS_3 7.16.2 + curl_mvprintf@CURL_GNUTLS_3 7.16.2 + curl_mvsnprintf@CURL_GNUTLS_3 7.16.2 + curl_mvsprintf@CURL_GNUTLS_3 7.16.2 + curl_pushheader_byname@CURL_GNUTLS_3 7.44.0 + curl_pushheader_bynum@CURL_GNUTLS_3 7.44.0 + curl_share_cleanup@CURL_GNUTLS_3 7.16.2 + curl_share_init@CURL_GNUTLS_3 7.16.2 + curl_share_setopt@CURL_GNUTLS_3 7.16.2 + curl_share_strerror@CURL_GNUTLS_3 7.16.2 + curl_slist_append@CURL_GNUTLS_3 7.16.2 + curl_slist_free_all@CURL_GNUTLS_3 7.16.2 + curl_strequal@CURL_GNUTLS_3 7.16.2 + curl_strnequal@CURL_GNUTLS_3 7.16.2 + curl_unescape@CURL_GNUTLS_3 7.16.2 + curl_url@CURL_GNUTLS_3 7.63.0 + curl_url_cleanup@CURL_GNUTLS_3 7.63.0 + curl_url_dup@CURL_GNUTLS_3 7.63.0 + curl_url_get@CURL_GNUTLS_3 7.63.0 + curl_url_set@CURL_GNUTLS_3 7.63.0 + curl_url_strerror@CURL_GNUTLS_3 7.80.0 + curl_version@CURL_GNUTLS_3 7.16.2 + curl_version_info@CURL_GNUTLS_3 7.16.2 + curl_ws_meta@CURL_GNUTLS_3 7.86.0 + curl_ws_recv@CURL_GNUTLS_3 7.86.0 + curl_ws_send@CURL_GNUTLS_3 7.86.0 diff --git a/debian/libcurl4-doc.docs b/debian/libcurl4-doc.docs new file mode 100644 index 00000000000000..0db8516af33149 --- /dev/null +++ b/debian/libcurl4-doc.docs @@ -0,0 +1,6 @@ +README +docs/*.md +docs/FAQ +docs/KNOWN_BUGS +docs/THANKS +docs/TODO diff --git a/debian/libcurl4-doc.examples b/debian/libcurl4-doc.examples new file mode 100644 index 00000000000000..684a743a4ecd55 --- /dev/null +++ b/debian/libcurl4-doc.examples @@ -0,0 +1 @@ +docs/examples/* diff --git a/debian/libcurl4-doc.links b/debian/libcurl4-doc.links new file mode 100644 index 00000000000000..ea9601b0d92fdf --- /dev/null +++ b/debian/libcurl4-doc.links @@ -0,0 +1,10 @@ +/usr/share/man/man3/curl_strequal.3 /usr/share/man/man3/curl_strnequal.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_maprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_mfprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_msnprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_msprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_mvaprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_mvfprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_mvprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_mvsnprintf.3 +/usr/share/man/man3/curl_mprintf.3 /usr/share/man/man3/curl_mvsprintf.3 diff --git a/debian/libcurl4-gnutls-dev.install b/debian/libcurl4-gnutls-dev.install new file mode 100644 index 00000000000000..1045c12741ba2c --- /dev/null +++ b/debian/libcurl4-gnutls-dev.install @@ -0,0 +1,6 @@ +usr/bin/curl-config +usr/lib/*/libcurl-gnutls.a +usr/lib/*/libcurl-gnutls.so +usr/lib/*/pkgconfig/libcurl.pc +usr/include +../../docs/libcurl/libcurl.m4 usr/share/aclocal diff --git a/debian/libcurl4-gnutls-dev.links b/debian/libcurl4-gnutls-dev.links new file mode 100755 index 00000000000000..9bd88d64d08954 --- /dev/null +++ b/debian/libcurl4-gnutls-dev.links @@ -0,0 +1,4 @@ +#!/bin/sh + +echo /usr/lib/$DEB_HOST_MULTIARCH/libcurl-gnutls.a /usr/lib/$DEB_HOST_MULTIARCH/libcurl.a +echo /usr/lib/$DEB_HOST_MULTIARCH/libcurl-gnutls.so /usr/lib/$DEB_HOST_MULTIARCH/libcurl.so diff --git a/debian/libcurl4-openssl-dev.install b/debian/libcurl4-openssl-dev.install new file mode 100644 index 00000000000000..0946927dfd8c2b --- /dev/null +++ b/debian/libcurl4-openssl-dev.install @@ -0,0 +1,6 @@ +usr/bin/curl-config +usr/lib/*/libcurl.a +usr/lib/*/libcurl.so +usr/lib/*/pkgconfig/libcurl.pc +usr/include +../../docs/libcurl/libcurl.m4 usr/share/aclocal diff --git a/debian/libcurl4.install b/debian/libcurl4.install new file mode 100644 index 00000000000000..2a9d1c3d553e3c --- /dev/null +++ b/debian/libcurl4.install @@ -0,0 +1 @@ +usr/lib/*/libcurl.so.4* diff --git a/debian/libcurl4.symbols b/debian/libcurl4.symbols new file mode 100644 index 00000000000000..e17dcc9c4319e0 --- /dev/null +++ b/debian/libcurl4.symbols @@ -0,0 +1,97 @@ +libcurl.so.4 libcurl4 #MINVER# +* Build-Depends-Package: libcurl4-openssl-dev + CURL_OPENSSL_4@CURL_OPENSSL_4 7.16.2 + HIDDEN@HIDDEN 7.16.2 + curl_easy_cleanup@CURL_OPENSSL_4 7.16.2 + curl_easy_duphandle@CURL_OPENSSL_4 7.16.2 + curl_easy_escape@CURL_OPENSSL_4 7.16.2 + curl_easy_getinfo@CURL_OPENSSL_4 7.16.2 + curl_easy_header@CURL_OPENSSL_4 7.83.0 + curl_easy_init@CURL_OPENSSL_4 7.16.2 + curl_easy_nextheader@CURL_OPENSSL_4 7.83.0 + curl_easy_option_by_id@CURL_OPENSSL_4 7.74.0 + curl_easy_option_by_name@CURL_OPENSSL_4 7.74.0 + curl_easy_option_next@CURL_OPENSSL_4 7.74.0 + curl_easy_pause@CURL_OPENSSL_4 7.18.0 + curl_easy_perform@CURL_OPENSSL_4 7.16.2 + curl_easy_recv@CURL_OPENSSL_4 7.18.2 + curl_easy_reset@CURL_OPENSSL_4 7.16.2 + curl_easy_send@CURL_OPENSSL_4 7.18.2 + curl_easy_setopt@CURL_OPENSSL_4 7.16.2 + curl_easy_strerror@CURL_OPENSSL_4 7.16.2 + curl_easy_unescape@CURL_OPENSSL_4 7.16.2 + curl_easy_upkeep@CURL_OPENSSL_4 7.63.0 + curl_escape@CURL_OPENSSL_4 7.16.2 + curl_formadd@CURL_OPENSSL_4 7.16.2 + curl_formfree@CURL_OPENSSL_4 7.16.2 + curl_formget@CURL_OPENSSL_4 7.16.2 + curl_free@CURL_OPENSSL_4 7.16.2 + curl_getdate@CURL_OPENSSL_4 7.16.2 + curl_getenv@CURL_OPENSSL_4 7.16.2 + curl_global_cleanup@CURL_OPENSSL_4 7.16.2 + curl_global_init@CURL_OPENSSL_4 7.16.2 + curl_global_init_mem@CURL_OPENSSL_4 7.16.2 + curl_global_sslset@CURL_OPENSSL_4 7.56.1 + curl_global_trace@CURL_OPENSSL_4 8.3.0 + curl_maprintf@CURL_OPENSSL_4 7.16.2 + curl_mfprintf@CURL_OPENSSL_4 7.16.2 + curl_mime_addpart@CURL_OPENSSL_4 7.56.1 + curl_mime_data@CURL_OPENSSL_4 7.56.1 + curl_mime_data_cb@CURL_OPENSSL_4 7.56.1 + curl_mime_encoder@CURL_OPENSSL_4 7.56.1 + curl_mime_filedata@CURL_OPENSSL_4 7.56.1 + curl_mime_filename@CURL_OPENSSL_4 7.56.1 + curl_mime_free@CURL_OPENSSL_4 7.56.1 + curl_mime_headers@CURL_OPENSSL_4 7.56.1 + curl_mime_init@CURL_OPENSSL_4 7.56.1 + curl_mime_name@CURL_OPENSSL_4 7.56.1 + curl_mime_subparts@CURL_OPENSSL_4 7.56.1 + curl_mime_type@CURL_OPENSSL_4 7.56.1 + curl_mprintf@CURL_OPENSSL_4 7.16.2 + curl_msnprintf@CURL_OPENSSL_4 7.16.2 + curl_msprintf@CURL_OPENSSL_4 7.16.2 + curl_multi_add_handle@CURL_OPENSSL_4 7.16.2 + curl_multi_assign@CURL_OPENSSL_4 7.16.2 + curl_multi_cleanup@CURL_OPENSSL_4 7.16.2 + curl_multi_fdset@CURL_OPENSSL_4 7.16.2 + curl_multi_get_handles@CURL_OPENSSL_4 8.4.0 + curl_multi_info_read@CURL_OPENSSL_4 7.16.2 + curl_multi_init@CURL_OPENSSL_4 7.16.2 + curl_multi_perform@CURL_OPENSSL_4 7.16.2 + curl_multi_poll@CURL_OPENSSL_4 7.66.0 + curl_multi_remove_handle@CURL_OPENSSL_4 7.16.2 + curl_multi_setopt@CURL_OPENSSL_4 7.16.2 + curl_multi_socket@CURL_OPENSSL_4 7.16.2 + curl_multi_socket_action@CURL_OPENSSL_4 7.16.3 + curl_multi_socket_all@CURL_OPENSSL_4 7.16.2 + curl_multi_strerror@CURL_OPENSSL_4 7.16.2 + curl_multi_timeout@CURL_OPENSSL_4 7.16.2 + curl_multi_wait@CURL_OPENSSL_4 7.28.0 + curl_multi_wakeup@CURL_OPENSSL_4 7.68.0 + curl_mvaprintf@CURL_OPENSSL_4 7.16.2 + curl_mvfprintf@CURL_OPENSSL_4 7.16.2 + curl_mvprintf@CURL_OPENSSL_4 7.16.2 + curl_mvsnprintf@CURL_OPENSSL_4 7.16.2 + curl_mvsprintf@CURL_OPENSSL_4 7.16.2 + curl_pushheader_byname@CURL_OPENSSL_4 7.44.0 + curl_pushheader_bynum@CURL_OPENSSL_4 7.44.0 + curl_share_cleanup@CURL_OPENSSL_4 7.16.2 + curl_share_init@CURL_OPENSSL_4 7.16.2 + curl_share_setopt@CURL_OPENSSL_4 7.16.2 + curl_share_strerror@CURL_OPENSSL_4 7.16.2 + curl_slist_append@CURL_OPENSSL_4 7.16.2 + curl_slist_free_all@CURL_OPENSSL_4 7.16.2 + curl_strequal@CURL_OPENSSL_4 7.16.2 + curl_strnequal@CURL_OPENSSL_4 7.16.2 + curl_unescape@CURL_OPENSSL_4 7.16.2 + curl_url@CURL_OPENSSL_4 7.63.0 + curl_url_cleanup@CURL_OPENSSL_4 7.63.0 + curl_url_dup@CURL_OPENSSL_4 7.63.0 + curl_url_get@CURL_OPENSSL_4 7.63.0 + curl_url_set@CURL_OPENSSL_4 7.63.0 + curl_url_strerror@CURL_OPENSSL_4 7.80.0 + curl_version@CURL_OPENSSL_4 7.16.2 + curl_version_info@CURL_OPENSSL_4 7.16.2 + curl_ws_meta@CURL_OPENSSL_4 7.86.0 + curl_ws_recv@CURL_OPENSSL_4 7.86.0 + curl_ws_send@CURL_OPENSSL_4 7.86.0 diff --git a/debian/patches/04_workaround_as_needed_bug.patch b/debian/patches/04_workaround_as_needed_bug.patch new file mode 100644 index 00000000000000..5fc81d86f33c41 --- /dev/null +++ b/debian/patches/04_workaround_as_needed_bug.patch @@ -0,0 +1,40 @@ +Description: Work around libtool --as-needed reordering bug +Origin: vendor +Bug-Debian: http://bugs.debian.org/347650 +Forwarded: not-needed +Author: Alessandro Ghedini +Reviewed-by: Alessandro Ghedini +Last-Update: 2016-08-03 + +Index: curl/ltmain.sh +=================================================================== +--- curl.orig/ltmain.sh ++++ curl/ltmain.sh +@@ -7488,6 +7488,11 @@ func_mode_link () + arg=$func_stripname_result + ;; + ++ -Wl,--as-needed|-Wl,--no-as-needed) ++ deplibs="$arg $deplibs" ++ continue ++ ;; ++ + -Wl,*) + func_stripname '-Wl,' '' "$arg" + args=$func_stripname_result +@@ -7887,6 +7892,15 @@ func_mode_link () + lib= + found=false + case $deplib in ++ -Wl,--as-needed|-Wl,--no-as-needed) ++ if test "$linkmode,$pass" = "prog,link"; then ++ compile_deplibs="$deplib $compile_deplibs" ++ finalize_deplibs="$deplib $finalize_deplibs" ++ else ++ deplibs="$deplib $deplibs" ++ fi ++ continue ++ ;; + -mt|-mthreads|-kthread|-Kthread|-pthread|-pthreads|--thread-safe \ + |-threads|-fopenmp|-openmp|-mp|-xopenmp|-omp|-qsmp=*) + if test prog,link = "$linkmode,$pass"; then diff --git a/debian/patches/08_enable-zsh.patch b/debian/patches/08_enable-zsh.patch new file mode 100644 index 00000000000000..7ba7febc94ef56 --- /dev/null +++ b/debian/patches/08_enable-zsh.patch @@ -0,0 +1,22 @@ +Description: Enable zsh completion generation +Origin: vendor +Forwarded: not-needed +Author: Alessandro Ghedini +Reviewed-by: Alessandro Ghedini +Last-Update: 2016-08-03 + +Index: curl/Makefile.am +=================================================================== +--- curl.orig/Makefile.am ++++ curl/Makefile.am +@@ -133,8 +133,8 @@ CLEANFILES = $(VC14_LIBVCXPROJ) \ + + bin_SCRIPTS = curl-config + +-SUBDIRS = lib src +-DIST_SUBDIRS = $(SUBDIRS) tests packages scripts include docs ++SUBDIRS = lib src scripts ++DIST_SUBDIRS = $(SUBDIRS) tests packages include docs + + pkgconfigdir = $(libdir)/pkgconfig + pkgconfig_DATA = libcurl.pc diff --git a/debian/patches/11_omit-directories-from-config.patch b/debian/patches/11_omit-directories-from-config.patch new file mode 100644 index 00000000000000..70529663a825e7 --- /dev/null +++ b/debian/patches/11_omit-directories-from-config.patch @@ -0,0 +1,55 @@ +Description: In order to (partially) multi-arch-ify curl-config, remove all + mention of @includedir@ and @libdir@ from the script. On Debian, the actual + header and library directories are architecture-dependent, but will always be + in the C compiler's default search path, so -I and -L options are not + necessary (and may be harmful in multi-arch environments.) +Origin: vendor +Bug-Debian: http://bugs.debian.org/731998 +Forwarded: not-needed +Author: Benjamin Moody +Reviewed-by: Alessandro Ghedini +Last-Update: 2017-01-10 + +Index: curl/curl-config.in +=================================================================== +--- curl.orig/curl-config.in ++++ curl/curl-config.in +@@ -25,7 +25,6 @@ + + prefix="@prefix@" + exec_prefix=@exec_prefix@ +-includedir=@includedir@ + cppflag_curl_staticlib=@CPPFLAG_CURL_STATICLIB@ + + usage() +@@ -149,19 +148,11 @@ while test $# -gt 0; do + else + CPPFLAG_CURL_STATICLIB="" + fi +- if test "X@includedir@" = "X/usr/include"; then +- echo "$CPPFLAG_CURL_STATICLIB" +- else +- echo "${CPPFLAG_CURL_STATICLIB}-I@includedir@" +- fi ++ echo "$CPPFLAG_CURL_STATICLIB" + ;; + + --libs) +- if test "X@libdir@" != "X/usr/lib" -a "X@libdir@" != "X/usr/lib64"; then +- CURLLIBDIR="-L@libdir@ " +- else +- CURLLIBDIR="" +- fi ++ CURLLIBDIR="" + if test "X@ENABLE_SHARED@" = "Xno"; then + echo ${CURLLIBDIR}-lcurl @LIBCURL_LIBS@ + else +@@ -174,7 +165,7 @@ while test $# -gt 0; do + + --static-libs) + if test "X@ENABLE_STATIC@" != "Xno" ; then +- echo "@libdir@/libcurl.@libext@" @LDFLAGS@ @LIBCURL_LIBS@ ++ echo -Wl,-Bstatic -lcurl -Wl,-Bdynamic @LDFLAGS@ @LIBCURL_LIBS@ + else + echo "curl was built with static libraries disabled" >&2 + exit 1 diff --git a/debian/patches/90_gnutls.patch b/debian/patches/90_gnutls.patch new file mode 100644 index 00000000000000..b41f8d083d4a1f --- /dev/null +++ b/debian/patches/90_gnutls.patch @@ -0,0 +1,190 @@ +From: Ramakrishnan Muthukrishnan +Date: Thu, 3 Aug 2023 18:35:34 -0400 +Subject: Build with GnuTLS. + +Origin: vendor +Forwarded: not-needed +Reviewed-by: Alessandro Ghedini +Last-Update: 2018-05-23 +--- + docs/examples/Makefile.am | 4 ++-- + lib/Makefile.am | 42 +++++++++++++++++++++--------------------- + lib/libcurl.vers.in | 2 +- + src/Makefile.am | 4 ++-- + tests/http/clients/Makefile.am | 4 ++-- + tests/http/clients/Makefile.in | 20 ++++++++++---------- + tests/libtest/Makefile.am | 8 ++++---- + 7 files changed, 42 insertions(+), 42 deletions(-) + +--- a/docs/examples/Makefile.am ++++ b/docs/examples/Makefile.am +@@ -51,9 +51,9 @@ LIBS = $(BLANK_AT_MAKETIME) + + # Dependencies + if USE_EXPLICIT_LIB_DEPS +-LDADD = $(LIBDIR)/libcurl.la @LIBCURL_LIBS@ ++LDADD = $(LIBDIR)/libcurl-gnutls.la @LIBCURL_LIBS@ + else +-LDADD = $(LIBDIR)/libcurl.la ++LDADD = $(LIBDIR)/libcurl-gnutls.la + endif + + # This might hold -Werror +--- a/lib/Makefile.am ++++ b/lib/Makefile.am +@@ -31,7 +31,7 @@ EXTRA_DIST = Makefile.mk config-win32.h config-win32ce.h config-plan9.h \ + config-os400.h setup-os400.h $(CMAKE_DIST) setup-win32.h .checksrc \ + Makefile.soname + +-lib_LTLIBRARIES = libcurl.la ++lib_LTLIBRARIES = libcurl-gnutls.la + + if BUILD_UNITTESTS + noinst_LTLIBRARIES = libcurlu.la +@@ -67,55 +67,55 @@ AM_CFLAGS = + # Makefile.inc provides the CSOURCES and HHEADERS defines + include Makefile.inc + +-libcurl_la_SOURCES = $(CSOURCES) $(HHEADERS) +-libcurlu_la_SOURCES = $(CSOURCES) $(HHEADERS) ++libcurl_gnutls_la_SOURCES = $(CSOURCES) $(HHEADERS) ++libcurlu_gnutls_la_SOURCES = $(CSOURCES) $(HHEADERS) + +-libcurl_la_CPPFLAGS_EXTRA = +-libcurl_la_LDFLAGS_EXTRA = +-libcurl_la_CFLAGS_EXTRA = ++libcurl_gnutls_la_CPPFLAGS_EXTRA = ++libcurl_gnutls_la_LDFLAGS_EXTRA = ++libcurl_gnutls_la_CFLAGS_EXTRA = + + if CURL_LT_SHLIB_USE_VERSION_INFO +-libcurl_la_LDFLAGS_EXTRA += $(VERSIONINFO) ++libcurl_gnutls_la_LDFLAGS_EXTRA += $(VERSIONINFO) + endif + + if CURL_LT_SHLIB_USE_NO_UNDEFINED +-libcurl_la_LDFLAGS_EXTRA += -no-undefined ++libcurl_gnutls_la_LDFLAGS_EXTRA += -no-undefined + endif + + if CURL_LT_SHLIB_USE_MIMPURE_TEXT +-libcurl_la_LDFLAGS_EXTRA += -mimpure-text ++libcurl_gnutls_la_LDFLAGS_EXTRA += -mimpure-text + endif + + if CURL_LT_SHLIB_USE_VERSIONED_SYMBOLS +-libcurl_la_LDFLAGS_EXTRA += -Wl,--version-script=libcurl.vers ++libcurl_gnutls_la_LDFLAGS_EXTRA += -Wl,--version-script=libcurl.vers + else + # if symbol-hiding is enabled, hide them! + if DOING_CURL_SYMBOL_HIDING +-libcurl_la_LDFLAGS_EXTRA += -export-symbols-regex '^curl_.*' ++libcurl_gnutls_la_LDFLAGS_EXTRA += -export-symbols-regex '^curl_.*' + endif + endif + + if USE_CPPFLAG_CURL_STATICLIB +-libcurl_la_CPPFLAGS_EXTRA += -DCURL_STATICLIB ++libcurl_gnutls_la_CPPFLAGS_EXTRA += -DCURL_STATICLIB + else + if HAVE_WINDRES +-libcurl_la_SOURCES += $(LIB_RCFILES) ++libcurl_gnutls_la_SOURCES += $(LIB_RCFILES) + $(LIB_RCFILES): $(top_srcdir)/include/curl/curlver.h + endif + endif + + if DOING_CURL_SYMBOL_HIDING +-libcurl_la_CPPFLAGS_EXTRA += -DCURL_HIDDEN_SYMBOLS +-libcurl_la_CFLAGS_EXTRA += $(CFLAG_CURL_SYMBOL_HIDING) ++libcurl_gnutls_la_CPPFLAGS_EXTRA += -DCURL_HIDDEN_SYMBOLS ++libcurl_gnutls_la_CFLAGS_EXTRA += $(CFLAG_CURL_SYMBOL_HIDING) + endif + +-libcurl_la_CPPFLAGS = $(AM_CPPFLAGS) $(libcurl_la_CPPFLAGS_EXTRA) +-libcurl_la_LDFLAGS = $(AM_LDFLAGS) $(libcurl_la_LDFLAGS_EXTRA) $(CURL_LDFLAGS_LIB) $(LIBCURL_LIBS) +-libcurl_la_CFLAGS = $(AM_CFLAGS) $(libcurl_la_CFLAGS_EXTRA) ++libcurl_gnutls_la_CPPFLAGS = $(AM_CPPFLAGS) $(libcurl_gnutls_la_CPPFLAGS_EXTRA) ++libcurl_gnutls_la_LDFLAGS = $(AM_LDFLAGS) $(libcurl_gnutls_la_LDFLAGS_EXTRA) $(CURL_LDFLAGS_LIB) $(LIBCURL_LIBS) ++libcurl_gnutls_la_CFLAGS = $(AM_CFLAGS) $(libcurl_gnutls_la_CFLAGS_EXTRA) + +-libcurlu_la_CPPFLAGS = $(AM_CPPFLAGS) -DCURL_STATICLIB -DUNITTESTS +-libcurlu_la_LDFLAGS = $(AM_LDFLAGS) -static $(LIBCURL_LIBS) +-libcurlu_la_CFLAGS = $(AM_CFLAGS) ++libcurlu_gnutls_la_CPPFLAGS = $(AM_CPPFLAGS) -DCURL_STATICLIB -DUNITTESTS ++libcurlu_gnutls_la_LDFLAGS = $(AM_LDFLAGS) -static $(LIBCURL_LIBS) ++libcurlu_gnutls_la_CFLAGS = $(AM_CFLAGS) + + CHECKSRC = $(CS_$(V)) + CS_0 = @echo " RUN " $@; +--- a/lib/libcurl.vers.in ++++ b/lib/libcurl.vers.in +@@ -6,7 +6,7 @@ HIDDEN + _save*; + }; + +-CURL_@CURL_LT_SHLIB_VERSIONED_FLAVOUR@4 ++CURL_@CURL_LT_SHLIB_VERSIONED_FLAVOUR@3 + { + global: curl_*; + local: *; +--- a/src/Makefile.am ++++ b/src/Makefile.am +@@ -70,9 +70,9 @@ CFLAGS += @CURL_CFLAG_EXTRAS@ + LIBS = $(BLANK_AT_MAKETIME) + + if USE_EXPLICIT_LIB_DEPS +-curl_LDADD = $(top_builddir)/lib/libcurl.la @LIBCURL_LIBS@ ++curl_LDADD = $(top_builddir)/lib/libcurl-gnutls.la @LIBCURL_LIBS@ + else +-curl_LDADD = $(top_builddir)/lib/libcurl.la @SSL_LIBS@ @ZLIB_LIBS@ @CURL_NETWORK_AND_TIME_LIBS@ ++curl_LDADD = $(top_builddir)/lib/libcurl-gnutls.la @SSL_LIBS@ @ZLIB_LIBS@ @CURL_NETWORK_AND_TIME_LIBS@ + endif + + # if unit tests are enabled, build a static library to link them with +--- a/tests/data/test1538 ++++ b/tests/data/test1538 +@@ -133,8 +133,7 @@ e97: proxy handshake error + e98: SSL Client Certificate required + e99: Unrecoverable error in select/poll + e100: A value or data field grew larger than allowed +-e101: ECH attempted but failed +-e102: Unknown error ++e101: Unknown error + m-1: Please call curl_multi_perform() soon + m0: No error + m1: Invalid multi handle +diff --git a/tests/http/clients/Makefile.am b/tests/http/clients/Makefile.am +index 8fdc190..ddc9be4 100644 +--- a/tests/http/clients/Makefile.am ++++ b/tests/http/clients/Makefile.am +@@ -51,9 +51,9 @@ LIBS = $(BLANK_AT_MAKETIME) + + # Dependencies + if USE_EXPLICIT_LIB_DEPS +-LDADD = $(LIBDIR)/libcurl.la @LIBCURL_LIBS@ ++LDADD = $(LIBDIR)/libcurl-gnutls.la @LIBCURL_LIBS@ + else +-LDADD = $(LIBDIR)/libcurl.la ++LDADD = $(LIBDIR)/libcurl-gnutls.la + endif + + # This might hold -Werror +--- a/tests/libtest/Makefile.am ++++ b/tests/libtest/Makefile.am +@@ -49,11 +49,11 @@ CLEANFILES = lib1521.c + LIBS = $(BLANK_AT_MAKETIME) + + if USE_EXPLICIT_LIB_DEPS +-SUPPORTFILES_LIBS = $(top_builddir)/lib/libcurl.la @LIBCURL_LIBS@ +-TESTUTIL_LIBS = $(top_builddir)/lib/libcurl.la @LIBCURL_LIBS@ ++SUPPORTFILES_LIBS = $(top_builddir)/lib/libcurl-gnutls.la @LIBCURL_LIBS@ ++TESTUTIL_LIBS = $(top_builddir)/lib/libcurl-gnutls.la @LIBCURL_LIBS@ + else +-SUPPORTFILES_LIBS = $(top_builddir)/lib/libcurl.la @CURL_NETWORK_LIBS@ +-TESTUTIL_LIBS = $(top_builddir)/lib/libcurl.la @CURL_NETWORK_AND_TIME_LIBS@ ++SUPPORTFILES_LIBS = $(top_builddir)/lib/libcurl-gnutls.la @CURL_NETWORK_LIBS@ ++TESTUTIL_LIBS = $(top_builddir)/lib/libcurl-gnutls.la @CURL_NETWORK_AND_TIME_LIBS@ + endif + + # Dependencies (may need to be overridden) diff --git a/debian/patches/Remove-curl-s-LDFLAGS-from-curl-config-static-libs.patch b/debian/patches/Remove-curl-s-LDFLAGS-from-curl-config-static-libs.patch new file mode 100644 index 00000000000000..4dec4b0cf706f4 --- /dev/null +++ b/debian/patches/Remove-curl-s-LDFLAGS-from-curl-config-static-libs.patch @@ -0,0 +1,42 @@ +From: Simon McVittie +Date: Tue, 22 Nov 2022 21:20:51 +0000 +Subject: Remove curl's LDFLAGS from curl-config --static-libs + +On current Debian bookworm, the LDFLAGS consist of +-L/usr/lib/${triplet}/mit-krb5 originating from +`pkg-config --libs-only-L mit-krb5-gssapi` from krb5-multidev, plus +some linker options that are intended for curl itself rather than for +dependent packages. None of these are really desirable, and they create +divergence between architectures that would prevent libcurl-*-dev from +being Multi-Arch: same. + +The -L flag is not really needed, for the same reason that -L@libdir@ +isn't. curl Build-Depends on libkrb5-dev, which doesn't need a special +-L flag to find libgssapi_krb5, and the various libcurl-*-dev packages +have Suggests on libkrb5-dev rather than on krb5-multidev for static +linking. + +The other options (currently `-Wl,-z-relro -Wl,-z,now`) are intended +for libcurl itself, and if dependent packages want those options then +they should set them from their own packaging. + +Bug-Debian: https://bugs.debian.org/1024668 +Forwarded: not-needed +Signed-off-by: Simon McVittie +--- + curl-config.in | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +Index: curl/curl-config.in +=================================================================== +--- curl.orig/curl-config.in ++++ curl/curl-config.in +@@ -165,7 +165,7 @@ while test $# -gt 0; do + + --static-libs) + if test "X@ENABLE_STATIC@" != "Xno" ; then +- echo -Wl,-Bstatic -lcurl -Wl,-Bdynamic @LDFLAGS@ @LIBCURL_LIBS@ ++ echo -Wl,-Bstatic -lcurl -Wl,-Bdynamic @LIBCURL_LIBS@ + else + echo "curl was built with static libraries disabled" >&2 + exit 1 diff --git a/debian/patches/add_errorcodes_upstream_file.patch b/debian/patches/add_errorcodes_upstream_file.patch new file mode 100644 index 00000000000000..c09b92538d2ba4 --- /dev/null +++ b/debian/patches/add_errorcodes_upstream_file.patch @@ -0,0 +1,106 @@ +Description: Add upstream file that missed the tarball for 8.5.0 + More context at https://github.com/curl/curl/issues/12462#issuecomment-1843569943 +Author: Samuel Henrique +Forwarded: not-needed +--- /dev/null ++++ b/tests/errorcodes.pl +@@ -0,0 +1,99 @@ ++#!/usr/bin/env perl ++#*************************************************************************** ++# _ _ ____ _ ++# Project ___| | | | _ \| | ++# / __| | | | |_) | | ++# | (__| |_| | _ <| |___ ++# \___|\___/|_| \_\_____| ++# ++# Copyright (C) Daniel Stenberg, , et al. ++# ++# This software is licensed as described in the file COPYING, which ++# you should have received as part of this distribution. The terms ++# are also available at https://curl.se/docs/copyright.html. ++# ++# You may opt to use, copy, modify, merge, publish, distribute and/or sell ++# copies of the Software, and permit persons to whom the Software is ++# furnished to do so, under the terms of the COPYING file. ++# ++# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY ++# KIND, either express or implied. ++# ++# SPDX-License-Identifier: curl ++# ++########################################################################### ++ ++# Check that libcurl-errors.3 and the public header files have the same set of ++# error codes. ++ ++use strict; ++use warnings; ++ ++# we may get the dir roots pointed out ++my $root=$ARGV[0] || "."; ++my $manpge = "$root/docs/libcurl/libcurl-errors.3"; ++my $curlh = "$root/include/curl"; ++my $errors=0; ++ ++my @hnames; ++my %wherefrom; ++my @mnames; ++my %manfrom; ++ ++sub scanheader { ++ my ($file)=@_; ++ open H, "<$file"; ++ my $line = 0; ++ while() { ++ $line++; ++ if($_ =~ /^ (CURL(E|UE|SHE|HE|M)_[A-Z0-9_]*)/) { ++ my ($name)=($1); ++ if(($name !~ /OBSOLETE/) && ($name !~ /_LAST\z/)) { ++ push @hnames, $name; ++ if($wherefrom{$name}) { ++ print STDERR "double: $name\n"; ++ } ++ $wherefrom{$name}="$file:$line"; ++ } ++ } ++ } ++ close(H); ++} ++ ++sub scanmanpage { ++ my ($file)=@_; ++ open H, "<$file"; ++ my $line = 0; ++ while() { ++ $line++; ++ if($_ =~ /^\.IP \"(CURL(E|UE|SHE|HE|M)_[A-Z0-9_]*)/) { ++ my ($name)=($1); ++ push @mnames, $name; ++ $manfrom{$name}="$file:$line"; ++ } ++ } ++ close(H); ++} ++ ++ ++opendir(my $dh, $curlh) || die "Can't opendir $curlh: $!"; ++my @hfiles = grep { /\.h$/ } readdir($dh); ++closedir $dh; ++ ++for(sort @hfiles) { ++ scanheader("$curlh/$_"); ++} ++scanmanpage($manpge); ++ ++print "Result\n"; ++for my $h (sort @hnames) { ++ if(!$manfrom{$h}) { ++ printf "$h from %s, not in man page\n", $wherefrom{$h}; ++ } ++} ++ ++for my $m (sort @mnames) { ++ if(!$wherefrom{$m}) { ++ printf "$m from %s, not in any header\n", $manfrom{$m}; ++ } ++} diff --git a/debian/patches/build-Divide-mit-krb5-gssapi-link-flags-between-LDFLAGS-a.patch b/debian/patches/build-Divide-mit-krb5-gssapi-link-flags-between-LDFLAGS-a.patch new file mode 100644 index 00000000000000..a2842702160c9b --- /dev/null +++ b/debian/patches/build-Divide-mit-krb5-gssapi-link-flags-between-LDFLAGS-a.patch @@ -0,0 +1,32 @@ +From: Simon McVittie +Date: Tue, 22 Nov 2022 20:43:41 +0000 +Subject: build: Divide mit-krb5-gssapi link flags between LDFLAGS and LIBS + +From the comments nearby about not having --libs-only-L, it looks as +though the intention was to apply a split like this to all dependency +libraries where possible, and the only reason it was not done for +Kerberos is that krb5-config doesn't have that feature and pkg-config +was originally not supported here. For example, zlib, libssh and librtmp +all have their flags from pkg-config split in this way. + +Now that pkg-config is supported here, we can do the intended split. + +Signed-off-by: Simon McVittie +--- + configure.ac | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +Index: curl/configure.ac +=================================================================== +--- curl.orig/configure.ac ++++ curl/configure.ac +@@ -1890,7 +1890,8 @@ if test x"$want_gss" = xyes; then + gss_libs=`$GSSAPI_ROOT/bin/$host_alias-krb5-config --libs gssapi` + LIBS="$gss_libs $LIBS" + elif test "$PKGCONFIG" != "no" ; then +- gss_libs=`$PKGCONFIG --libs mit-krb5-gssapi` ++ LDFLAGS="$LDFLAGS `$PKGCONFIG --libs-only-L mit-krb5-gssapi`" ++ gss_libs=`$PKGCONFIG --libs-only-l mit-krb5-gssapi` + LIBS="$gss_libs $LIBS" + elif test -f "$KRB5CONFIG"; then + dnl krb5-config doesn't have --libs-only-L or similar, put everything diff --git a/debian/patches/dist_add_tests_errorcodes_pl_to_the_tarball.patch b/debian/patches/dist_add_tests_errorcodes_pl_to_the_tarball.patch new file mode 100644 index 00000000000000..91b0b1f292319d --- /dev/null +++ b/debian/patches/dist_add_tests_errorcodes_pl_to_the_tarball.patch @@ -0,0 +1,46 @@ +From da8c1d15782c8161b455a7ee90197c16ae5edb90 Mon Sep 17 00:00:00 2001 +From: Daniel Stenberg +Date: Wed, 6 Dec 2023 09:40:30 +0100 +Subject: [PATCH] dist: add tests/errorcodes.pl to the tarball + +Used by test 1477 + +Reported-by: Xi Ruoyao +Follow-up to 0ca3a4ec9a7 +Fixes #12462 +Closes #12463 +--- + tests/Makefile.am | 20 +++++++++++--------- + 1 file changed, 11 insertions(+), 9 deletions(-) + +diff --git a/tests/Makefile.am b/tests/Makefile.am +index 17e9ad04938ebb..c6ae7a97afd93e 100644 +--- a/tests/Makefile.am ++++ b/tests/Makefile.am +@@ -26,15 +26,17 @@ HTMLPAGES = testcurl.html runtests.html + PDFPAGES = testcurl.pdf runtests.pdf + MANDISTPAGES = runtests.1.dist testcurl.1.dist + +-EXTRA_DIST = appveyor.pm azure.pm badsymbols.pl check-deprecated.pl CMakeLists.txt \ +- devtest.pl dictserver.py directories.pm disable-scan.pl error-codes.pl extern-scan.pl FILEFORMAT.md \ +- processhelp.pm ftpserver.pl getpart.pm globalconfig.pm http-server.pl http2-server.pl \ +- http3-server.pl manpage-scan.pl manpage-syntax.pl markdown-uppercase.pl mem-include-scan.pl \ +- memanalyze.pl negtelnetserver.py nroff-scan.pl option-check.pl options-scan.pl \ +- pathhelp.pm README.md rtspserver.pl runner.pm runtests.1 runtests.pl secureserver.pl \ +- serverhelp.pm servers.pm smbserver.py sshhelp.pm sshserver.pl stunnel.pem symbol-scan.pl \ +- testcurl.1 testcurl.pl testutil.pm tftpserver.pl util.py valgrind.pm \ +- valgrind.supp version-scan.pl check-translatable-options.pl ++EXTRA_DIST = appveyor.pm azure.pm badsymbols.pl check-deprecated.pl \ ++ CMakeLists.txt devtest.pl dictserver.py directories.pm disable-scan.pl \ ++ error-codes.pl extern-scan.pl FILEFORMAT.md processhelp.pm ftpserver.pl \ ++ getpart.pm globalconfig.pm http-server.pl http2-server.pl http3-server.pl \ ++ manpage-scan.pl manpage-syntax.pl markdown-uppercase.pl mem-include-scan.pl \ ++ memanalyze.pl negtelnetserver.py nroff-scan.pl option-check.pl \ ++ options-scan.pl pathhelp.pm README.md rtspserver.pl runner.pm runtests.1 \ ++ runtests.pl secureserver.pl serverhelp.pm servers.pm smbserver.py sshhelp.pm \ ++ sshserver.pl stunnel.pem symbol-scan.pl testcurl.1 testcurl.pl testutil.pm \ ++ tftpserver.pl util.py valgrind.pm valgrind.supp version-scan.pl \ ++ check-translatable-options.pl errorcodes.pl + + DISTCLEANFILES = configurehelp.pm + diff --git a/debian/patches/openldap_fix_an_LDAP_crash.patch b/debian/patches/openldap_fix_an_LDAP_crash.patch new file mode 100644 index 00000000000000..ae2d7d476cc8ed --- /dev/null +++ b/debian/patches/openldap_fix_an_LDAP_crash.patch @@ -0,0 +1,35 @@ +From fa6e123929de94064f1b1cb135f30b0a945ba399 Mon Sep 17 00:00:00 2001 +From: Patrick Monnerat +Date: Wed, 27 Dec 2023 11:19:17 +0100 +Subject: [PATCH] openldap: fix an LDAP crash + +Reported-by: Ozan Cansel +Fixes #12593 +Closes #12600 +--- + lib/openldap.c | 12 ++++++++---- + 1 file changed, 8 insertions(+), 4 deletions(-) + +diff --git a/lib/openldap.c b/lib/openldap.c +index c9417fbe2a1c2b..fcc9f91f44c3d9 100644 +--- a/lib/openldap.c ++++ b/lib/openldap.c +@@ -887,10 +887,14 @@ static CURLcode oldap_do(struct Curl_easy *data, bool *done) + + result = oldap_url_parse(data, &lud); + if(!result) { +- Sockbuf *sb; +- /* re-install the libcurl SSL handlers into the sockbuf. */ +- ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb); +- ber_sockbuf_add_io(sb, &ldapsb_tls, LBER_SBIOD_LEVEL_TRANSPORT, data); ++#ifdef USE_SSL ++ if(ssl_installed(conn)) { ++ Sockbuf *sb; ++ /* re-install the libcurl SSL handlers into the sockbuf. */ ++ ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb); ++ ber_sockbuf_add_io(sb, &ldapsb_tls, LBER_SBIOD_LEVEL_TRANSPORT, data); ++ } ++#endif + + rc = ldap_search_ext(li->ld, lud->lud_dn, lud->lud_scope, + lud->lud_filter, lud->lud_attrs, 0, diff --git a/debian/patches/series b/debian/patches/series new file mode 100644 index 00000000000000..b8193a167de968 --- /dev/null +++ b/debian/patches/series @@ -0,0 +1,9 @@ +# Packaging patches. +build-Divide-mit-krb5-gssapi-link-flags-between-LDFLAGS-a.patch +11_omit-directories-from-config.patch +Remove-curl-s-LDFLAGS-from-curl-config-static-libs.patch + +# Do not add patches below. +# Used to generate packages for the other crypto libraries. +add_errorcodes_upstream_file.patch +90_gnutls.patch diff --git a/debian/rules b/debian/rules new file mode 100755 index 00000000000000..03488a6a9a4b48 --- /dev/null +++ b/debian/rules @@ -0,0 +1,184 @@ +#! /usr/bin/make -f + +# Include pkg-info to make use of DEB_VERSION +include /usr/share/dpkg/pkg-info.mk + +# enable all hardening options (see #763372) +export DEB_BUILD_MAINT_OPTIONS = hardening=+all + +DEB_BUILD_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_BUILD_GNU_TYPE) +DEB_HOST_MULTIARCH ?= $(shell dpkg-architecture -qDEB_HOST_MULTIARCH) + +CONFIGURE_ARGS = -- --disable-dependency-tracking \ + --disable-symbol-hiding --enable-versioned-symbols \ + --enable-threaded-resolver --with-lber-lib=lber \ + --with-gssapi=/usr --with-nghttp2 \ + --includedir=/usr/include/$(DEB_HOST_MULTIARCH) \ + --with-zsh-functions-dir=/usr/share/zsh/vendor-completions + +# disable libssh2 on Ubuntu (see #888449) +ifeq ($(shell dpkg-vendor --derives-from Ubuntu && echo yes),yes) + CONFIGURE_ARGS += --with-libssh --without-libssh2 +else + CONFIGURE_ARGS += --without-libssh --with-libssh2 +endif + + +ifneq (,$(filter parallel=%,$(DEB_BUILD_OPTIONS))) + NUMJOBS = $(patsubst parallel=%,%,$(filter parallel=%,$(DEB_BUILD_OPTIONS))) + MAKEFLAGS += -j$(NUMJOBS) +endif + +export DEB_CFLAGS_MAINT_APPEND = -D_DEB_HOST_ARCH=\"$(DEB_HOST_MULTIARCH)\" -DCURL_PATCHSTAMP=\"$(DEB_VERSION)\" +export DEB_CXXFLAGS_MAINT_APPEND = -D_DEB_HOST_ARCH=\"$(DEB_HOST_MULTIARCH)\" -DCURL_PATCHSTAMP=\"$(DEB_VERSION)\" + +ifneq ($(filter pkg.curl.openssl-only,$(DEB_BUILD_PROFILES)),) + DEB_BUILD_PROFILES += pkg.curl.no-gnutls +endif +ifneq ($(filter pkg.curl.gnutls-only,$(DEB_BUILD_PROFILES)),) + DEB_BUILD_PROFILES += pkg.curl.no-openssl +endif + +%: + dh $@ + +override_dh_auto_configure: +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) + mkdir -p debian/build +endif +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) + mkdir -p debian/build-gnutls +endif +# pop the last patch (gnutls) + quilt pop +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) +# get the source without gnutls patch + tar -cf - --exclude=debian/build* --exclude=.pc . \ + | tar -xf - -C debian/build +endif +# push the last patch which must be gnutls + quilt push +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) +# get the source with gnutls patch applied + tar -cf - --exclude=debian/build* --exclude=.pc . \ + | tar -xf - -C debian/build-gnutls +endif +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) + cd debian/build && \ + ./buildconf && \ + cp ../../ltmain.sh . && \ + dh_auto_configure ${CONFIGURE_ARGS} --with-openssl \ + --with-ca-path=/etc/ssl/certs \ + --enable-ech --enable-httpsrr \ + --with-ca-bundle=/etc/ssl/certs/ca-certificates.crt +endif +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) + cd debian/build-gnutls && \ + ./buildconf && \ + cp ../../ltmain.sh . && \ + dh_auto_configure ${CONFIGURE_ARGS} --with-gnutls \ + --with-ca-path=/etc/ssl/certs +endif + +override_dh_auto_build: +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) + cd debian/build && dh_auto_build +endif +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) + cd debian/build-gnutls && dh_auto_build +endif + +# Test parameters that are passed to runtests.pl. +# -n disables valgrind usage +TESTS_GENERAL_PARAMETERS += -n + +# These tests fail if a IPv6-only builder is used: +# https://bugs.debian.org/1032343 +# https://github.com/curl/curl/issues/10682 +TESTS_FAILS_ON_IPV6_ONLY_MACHINES ?= $(addprefix ~, 300 301 303 304 306 309 310 325 364 400 401 403 406 407 408 409 410 414 417 560 678 987 988 989 1112 1272 1470 1561 1562 1630 1631 1632 2034 2037 2041 3000 3001 3102) + +TESTS_GENERAL_PARAMETERS += $(TESTS_FAILS_ON_IPV6_ONLY_MACHINES) + +# ignore ECH symbol +TESTS_GENERAL_PARAMETERS += ~1119 ~1139 ~1477 ~1478 ~1538 + +override_dh_auto_test: +ifeq ($(filter nocheck,$(DEB_BUILD_PROFILES)),) +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) +# OpenSSL tests. + cd debian/build && VERBOSE=1 \ + TFLAGS="$(TESTS_GENERAL_PARAMETERS)" \ + $(MAKE) test-nonflaky +endif +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) +# GnuTLS tests. + cd debian/build-gnutls && VERBOSE=1 \ + TFLAGS="$(TESTS_GENERAL_PARAMETERS)" \ + $(MAKE) test-nonflaky +endif +endif + +override_dh_install: +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) + ${MAKE} -C debian/build \ + DESTDIR=$(shell pwd)/debian/tmp install +endif +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) + ${MAKE} -C debian/build-gnutls \ + DESTDIR=$(shell pwd)/debian/tmp-gnutls install +endif + find debian/tmp* -name '*.la' -delete +ifeq ($(filter pkg.curl.no-openssl,$(DEB_BUILD_PROFILES)),) + dh_install -pcurl -plibcurl4 -plibcurl4-openssl-dev -plibcurl4-doc \ + --sourcedir=debian/tmp +endif +ifeq ($(filter pkg.curl.no-gnutls,$(DEB_BUILD_PROFILES)),) + dh_install -plibcurl3-gnutls -plibcurl4-gnutls-dev \ + --sourcedir=debian/tmp-gnutls +endif +# Modify curl-config to make it architecture-independent: +# 1. In --static-libs output, replace the output of krb5-config (which +# currently includes architecture-specific paths) with a call at +# runtime to krb5-config. Of course, this will only work correctly +# if the installed libkrb5-dev matches the architecture of the +# program you're linking, or if libkrb5-dev is made +# multiarch-compatible at some point in the future. For dynamic +# linking this has no impact. +# 2. In --configure output, replace the architecture-specific paths +# used for --libdir and --libexecdir with a literal backquoted call +# to dpkg-architecture. This is functionally equivalent to the way +# debhelper actually invokes configure, and indicates to the user +# (who runs curl-config --configure in order to learn about how the +# library was compiled) that they are in fact using a multi-arch +# package. +# 3. Likewise, replace the architecture name used for --build (and +# build_alias) with a literal backquoted call to dpkg-architecture. +# 4. In --configure output, remove +# -fdebug-prefix-map=/buildd/specific/random/path=. and +# -ffile-prefix-map=/buildd/specific/random/path=. +# 5. Remove -D_DEB_HOST_ARCH from CFLAGS. This is a (hopefully +# temporary) hack needed to properly build curl with NSS PEM +# support in Debian. + sed -e "/-lcurl /s|`krb5-config --libs gssapi`|\`krb5-config --libs gssapi\`|" \ + -e "/--prefix/s|/$(DEB_HOST_MULTIARCH)'|/'\\\\\`dpkg-architecture -qDEB_HOST_MULTIARCH\\\\\`|g" \ + -e "/--prefix/s|=$(DEB_BUILD_GNU_TYPE)'|='\\\\\`dpkg-architecture -qDEB_BUILD_GNU_TYPE\\\\\`|g" \ + -e "/-fdebug-prefix-map=/s|\(-fdebug-prefix-map=\)/[^ ]*=.||" \ + -e "/-ffile-prefix-map=/s|\(-ffile-prefix-map=\)/[^ ]*=.||" \ + -e "/-D_DEB_HOST_ARCH=/s|-D_DEB_HOST_ARCH=\\\\\"[^ ']*\\\\\"||" \ + -i `find . -name curl-config` +# When we get here, everything has been properly installed. Because +# of debhelper-compat 13, we have to remove some files that are +# otherwise flagged as not installed and will cause the build to fail. + rm -rfv debian/tmp/usr/share/man/* \ + debian/tmp/usr/share/fish/* \ + debian/tmp/usr/share/aclocal/* + +override_dh_installchangelogs: + dh_installchangelogs CHANGES + +override_dh_compress: + dh_compress -X.pdf + +override_dh_auto_clean: + $(RM) -r debian/build* debian/tmp* + dh_auto_clean diff --git a/debian/salsa-ci.yml b/debian/salsa-ci.yml new file mode 100644 index 00000000000000..5d783e88992698 --- /dev/null +++ b/debian/salsa-ci.yml @@ -0,0 +1,6 @@ +--- +include: + - https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/recipes/debian.yml + +variables: + DEB_BUILD_OPTIONS: nocheck diff --git a/debian/source/format b/debian/source/format new file mode 100644 index 00000000000000..163aaf8d82b6c5 --- /dev/null +++ b/debian/source/format @@ -0,0 +1 @@ +3.0 (quilt) diff --git a/debian/tests/LDAP-bindata.c b/debian/tests/LDAP-bindata.c new file mode 100644 index 00000000000000..b3180d193d9c02 --- /dev/null +++ b/debian/tests/LDAP-bindata.c @@ -0,0 +1,354 @@ +/* SPDX-FileCopyrightText: 2019 Ryan Tandy + * SPDX-FileCopyrightText: 2023 John Scott + * SPDX-License-Identifier: OLDAP-2.8 */ + +/* This test will spin up slapd, set a binary attribute, and check that libcurl can read it. */ +#define _POSIX_C_SOURCE 200809L +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#if __STDC_NO_VLA__ +#error VLA support is required +#endif + +/* Note that this is different from the ldap_perror() that older LDAP APIs traditionally ship with. */ +static void ldap_perror(int p, const char msg[restrict static 1]) { + const char *const u8details = ldap_err2string(p); + const int r = ldap_x_utf8s_to_mbs(NULL, u8details, 0, NULL); + if(r == -1) { + fputs("Failed to convert LDAP error message string to the locale's multibyte encoding\n", stderr); + /* The converter function doesn't need to allocate any resources and the strings + * we get from OpenLDAP obviously should be valid UTF-8, so this should be impossible. */ + abort(); + } + + assert(r < INT_MAX); + char mbsdetails[r+1]; + const int c = ldap_x_utf8s_to_mbs(mbsdetails, u8details, sizeof(mbsdetails), NULL); + if(c == -1) { + fputs("Failed to convert LDAP error message string to the locale's multibyte encoding\n", stderr); + abort(); + } + assert(c == r); + if(fprintf(stderr, "%s: %s\n", msg, mbsdetails) < 0) { + perror("Failed to print error message"); + /* If we can't print to standard error, this might be the only error indication we get. */ + abort(); + } +} + +int main(void) { + if(!setlocale(LC_ALL, "")) { + fputs("Failed to enable default locale\n", stderr); + exit(EXIT_FAILURE); + } + /* Note that OpenLDAP (and often libcurl) handle UTF-8 strings regardless of the locale. + * That's why ldap_perror() does the conversion. */ + + /* This needs to be run as root. */ + assert(!geteuid()); + + if(setenv("DEBIAN_FRONTEND", "noninteractive", true) == -1) { + perror("Failed to set DEBIAN_FRONTEND environment variable"); + exit(EXIT_FAILURE); + } + if(setenv("DEBCONF_DEBUG", "user|developer", true) == -1) { + perror("Failed to set DEBCONF_DEBUG environment variable"); + exit(EXIT_FAILURE); + } + + FILE *const debconf = popen("debconf-set-selections --verbose", "w"); + if(!debconf) { + perror("Failed to open pipe and invoke debconf-set-selections"); + exit(EXIT_FAILURE); + } + + if(fputs("slapd slapd/password1 password Password\n" + "slapd slapd/password2 password Password\n" + "slapd slapd/domain string example.com\n" + "slapd slapd/organization string example.com\n", debconf) == EOF) { + perror("Failed to send slapd configuration parameters over pipe"); + if(pclose(debconf) == -1) { + perror("Failed to close pipe"); + } + exit(EXIT_FAILURE); + } + + int w = pclose(debconf); + if(w == -1) { + perror("Failed to close pipe"); + exit(EXIT_FAILURE); + } + if(!WIFEXITED(w) || WEXITSTATUS(w) != EXIT_SUCCESS) { + fputs("debconf-set-selections terminated abnormally\n", stderr); + exit(EXIT_FAILURE); + } + + w = system("dpkg-reconfigure --frontend=noninteractive --priority=critical slapd && service slapd restart"); + if(w == -1) { + perror("Failed to reconfigure and restart slapd"); + exit(EXIT_FAILURE); + } + if(!WIFEXITED(w) || WEXITSTATUS(w) != EXIT_SUCCESS) { + fputs("dpkg-reconfigure failed abnormally or we failed to restart slapd\n", stderr); + exit(EXIT_FAILURE); + } + + /* Now slapd should be running so we can add an entry */ + int p; + if((p = ldap_set_option(NULL, LDAP_OPT_DEBUG_LEVEL, &(int){0xFFFF})) + || (p = ldap_set_option(NULL, LDAP_OPT_PROTOCOL_VERSION, &(int){LDAP_VERSION3}))) { + ldap_perror(p, "Failed to set libldap option"); + exit(EXIT_FAILURE); + } + LDAP *ldp; + if(p = ldap_initialize(&ldp, u8"ldapi:///")) { + ldap_perror(p, "Failed to initialize libldap"); + exit(EXIT_FAILURE); + } + unsigned int counter = 0; + while (p = ldap_connect(ldp)) { + counter++; + fprintf(stderr, "ldapi:// connection failed, retrying (count=%u)\n", counter); + if (counter >= 10) { + ldap_perror(p, "Failed to connect to slapd over UNIX domain socket"); + if (p = ldap_unbind_ext(ldp, NULL, NULL)) { + ldap_perror(p, "Failed to deinitialize libldap"); + } + exit(EXIT_FAILURE); + } + sleep(1); + } + if(p = ldap_sasl_bind_s(ldp, u8"CN=admin,DC=example,DC=com", LDAP_SASL_SIMPLE, &(struct berval){.bv_len = strlen(u8"Password"), .bv_val = u8"Password"}, NULL, NULL, NULL)) { + ldap_perror(p, "Failed to bind to directory server"); + if(p = ldap_unbind_ext(ldp, NULL, NULL)) { + ldap_perror(p, "Failed to deinitialize libldap"); + } + exit(EXIT_FAILURE); + } + + /* The compound literals are necessary for const-correctness. */ + LDAPMod *makeorg[] = { + &(LDAPMod) { + .mod_type = (char[]) { + u8"ou" + }, + .mod_values = (char *[]) { + (char[]) { + u8"Accounts" + }, + NULL + } + }, + &(LDAPMod) { + .mod_type = (char[]) { + u8"objectClass" + }, + .mod_values = (char *[]) { + (char[]) { + u8"top" + }, + (char[]) { + u8"organizationalUnit" + }, + NULL + } + }, + &(LDAPMod) { + .mod_op = LDAP_MOD_BVALUES, + .mod_type = (char[]) { + u8"description" + }, + .mod_bvalues = (struct berval *[]) { + &(struct berval) { + /* Do not include the null character. */ + .bv_len = sizeof(U"Hello, world") - sizeof(char32_t), + .bv_val = (char *)(char32_t[]) { + U"Hello, world" + } + }, + NULL + } + }, + NULL + }; + + if(p = ldap_add_ext_s(ldp, u8"OU=Accounts,DC=example,DC=com", makeorg, NULL, NULL)) { + ldap_perror(p, "Failed to create organizational unit"); + if(p = ldap_unbind_ext(ldp, NULL, NULL)) { + ldap_perror(p, "Failed to unbind from directory server"); + } + exit(EXIT_FAILURE); + } + + if(p = ldap_unbind_ext(ldp, NULL, NULL)) { + ldap_perror(p, "Failed to unbind from directory server"); + exit(EXIT_FAILURE); + } + + const char *tmpdir = getenv("TMPDIR"); + if(!tmpdir) { + tmpdir = "/tmp/"; + } + if(setenv("AUTOPKGTEST_ARTIFACTS", tmpdir, false) == -1) { + perror("Failed to set environment variable"); + exit(EXIT_FAILURE); + } + const char *const autopkgtest_artifacts = getenv("AUTOPKGTEST_ARTIFACTS"); + assert(autopkgtest_artifacts); + if(chdir(autopkgtest_artifacts) == -1) { + fprintf(stderr, "Failed to change directory into %s: %s\n", autopkgtest_artifacts, strerror(errno)); + exit(EXIT_FAILURE); + } + + /* Now here's where libcurl comes in. */ + CURLcode s = curl_global_init(CURL_GLOBAL_DEFAULT); + if(s) { + fprintf(stderr, "Failed to initialize libcurl: %s\n", curl_easy_strerror(s)); + exit(EXIT_FAILURE); + } + if(atexit(curl_global_cleanup)) { + fputs("Failed to register exit handler\n", stderr); + curl_global_cleanup(); + exit(EXIT_FAILURE); + } + + LDAPURLDesc url_desc = { + /* This really should be ldapi, but libcurl knows we're using a UNIX domain socket anyway and we don't want to confuse it. */ + .lud_scheme = (char[]){ u8"ldap" }, + .lud_host = (char[]){ u8"localhost" }, + .lud_dn = (char[]){ u8"DC=example,DC=com" }, + .lud_attrs = (char *[]){ (char[]){ u8"description" }, NULL }, + .lud_scope = LDAP_SCOPE_ONELEVEL, + .lud_filter = (char[]){ u8"(description=*)" } + }; + char *const u8url = ldap_url_desc2str(&url_desc); + if(!u8url) { + fputs("Failed to generate LDAP URL\n", stderr); + exit(EXIT_FAILURE); + } + + CURL *const c = curl_easy_init(); + if(!c) { + fputs("Failed to get libcurl handle\n", stderr); + ldap_memfree(u8url); + exit(EXIT_FAILURE); + } + + FILE *const ldif = fopen("curl.ldif", "w+x"); + if(!ldif) { + fprintf(stderr, "Failed to create curl.ldif in %s: %s\n", autopkgtest_artifacts, strerror(errno)); + curl_easy_cleanup(c); + ldap_memfree(u8url); + exit(EXIT_FAILURE); + } + char errbuf[CURL_ERROR_SIZE]; + if((s = curl_easy_setopt(c, CURLOPT_VERBOSE, 1L)) + || (s = curl_easy_setopt(c, CURLOPT_WRITEDATA, (void *)ldif)) + || (s = curl_easy_setopt(c, CURLOPT_ERRORBUFFER, errbuf)) + || (s = curl_easy_setopt(c, CURLOPT_UNIX_SOCKET_PATH, "/run/slapd/ldapi")) + || (s = curl_easy_setopt(c, CURLOPT_URL, u8url))) { + fprintf(stderr, "Failed to set libcurl option: %s\n", curl_easy_strerror(s)); + curl_easy_cleanup(c); + ldap_memfree(u8url); + if(fclose(ldif) == EOF) { + perror("Failed to close file"); + } + exit(EXIT_FAILURE); + } + ldap_memfree(u8url); + + if(s = curl_easy_perform(c)) { + fprintf(stderr, "Failed to fetch LDAP data with libcurl: %s: %s\n", curl_easy_strerror(s), errbuf); + curl_easy_cleanup(c); + if(fclose(ldif) == EOF) { + perror("Failed to close file"); + } + exit(EXIT_FAILURE); + } + curl_easy_cleanup(c); + + const long ldif_size = ftell(ldif); + if(ldif_size == -1) { + perror("Failed to determine position on stream"); + if(fclose(ldif) == EOF) { + perror("Failed to close file"); + } + exit(EXIT_FAILURE); + } + if(fseek(ldif, 0, SEEK_SET) == -1) { + perror("Failed to change position on stream"); + if(fclose(ldif) == EOF) { + perror("Failed to close file"); + } + exit(EXIT_FAILURE); + } + + /* Now let's use getdelim() to try reading the entire file. + * Since LDIF is a text format, there shouldn't be any NULL bytes in it, + * but we're still going to check since that's the purpose of this test. */ + char *u8ldif = NULL; + ssize_t u8ldifreadlen = getdelim(&u8ldif, &(size_t){0}, '\0', ldif); + if(u8ldifreadlen == -1) { + free(u8ldif); + if(ferror(ldif)) { + perror("Failed to read from LDIF file"); + } else { + fputs("Failed to read from LDIF file: empty file\n", stderr); + } + if(fclose(ldif) == EOF) { + perror("Failed to close file"); + } + exit(EXIT_FAILURE); + } + + if(fclose(ldif) == EOF) { + perror("Failed to close file"); + free(u8ldif); + exit(EXIT_FAILURE); + } + + if(u8ldifreadlen != ldif_size) { + fputs("The LDIF from CURL contains null bytes! That's not right.\n", stderr); + free(u8ldif); + exit(EXIT_FAILURE); + } + + /* Finally, let's see if we can read the attribute without loss of information. */ + struct berval attrname, attrvalue; + char *cookie = u8ldif; + for(char *line = ldif_getline(&cookie); line; line = ldif_getline(&cookie)) { + if(!(p = ldif_parse_line2(line, &attrname, &attrvalue, NULL))) { + if(!strncmp(attrname.bv_val, u8"description", attrname.bv_len)) { + break; + } + ldap_memfree(attrname.bv_val); + ldap_memfree(attrvalue.bv_val); + } + } + free(u8ldif); + if(p) { + ldap_perror(p, "Failed to parse LDIF line"); + exit(EXIT_FAILURE); + } + + ldap_memfree(attrname.bv_val); + if(memcmp(attrvalue.bv_val, U"Hello, world", sizeof(U"Hello, world") - sizeof(char32_t))) { + ldap_memfree(attrvalue.bv_val); + fputs("Binary attribute comparison failed!\n", stderr); + exit(EXIT_FAILURE); + } + ldap_memfree(attrvalue.bv_val); + /* success */ +} diff --git a/debian/tests/control b/debian/tests/control new file mode 100644 index 00000000000000..74b3de9cddba11 --- /dev/null +++ b/debian/tests/control @@ -0,0 +1,11 @@ +Tests: upstream-tests-openssl +Depends: curl, @builddeps@ +Restrictions: allow-stderr + +Tests: upstream-tests-gnutls +Depends: @builddeps@ +Restrictions: allow-stderr + +Tests: curl-ldapi-test +Depends: gcc, libc-dev, libcurl4-openssl-dev | libcurl-dev, libldap-dev, slapd, pkgconf +Restrictions: allow-stderr, isolation-container, needs-root diff --git a/debian/tests/curl-ldapi-test b/debian/tests/curl-ldapi-test new file mode 100644 index 00000000000000..44554316de44d4 --- /dev/null +++ b/debian/tests/curl-ldapi-test @@ -0,0 +1,24 @@ +#!/bin/sh + +set -e + +cleanup() { + if [ $? -ne 0 ]; then + set +e + echo "## Something failed, gathering logs" + echo + echo "## syslog" + tail -n 50 /var/log/syslog + echo + echo "## slapd journal" + journalctl -u slapd + fi +} + +trap cleanup EXIT + +echo "## Building ldap-test app" +gcc debian/tests/LDAP-bindata.c $(pkgconf --cflags --libs ldap libcurl) -o "$AUTOPKGTEST_TMP"/ldap-test + +echo "## calling ldap-test" +"$AUTOPKGTEST_TMP"/ldap-test diff --git a/debian/tests/upstream-tests-gnutls b/debian/tests/upstream-tests-gnutls new file mode 100644 index 00000000000000..2f8a53c4a833dc --- /dev/null +++ b/debian/tests/upstream-tests-gnutls @@ -0,0 +1,37 @@ +#!/bin/sh +set -e + +# Building curl is required because libauthretry (from "make test") requires +# libcurl. +# +# It might be possible to patch the makefile to have libauthretry link against +# the system's installed libcurl, patches welcome. +# +# gnutls tests run against the built curl and libcurl rather than the installed +# one as we don't ship a curl linked against gnutls (only gnutls libraries). + +export DEB_BUILD_PROFILES="pkg.curl.gnutls-only" +export VERBOSE=1 + +# Don't skip tests which fail on ipv6-only environments for autopkgtests. +# I'm not aware of runners with this configuration for debci, and a retry +# should be easy enough it it happens. +# References: +# https://bugs.debian.org/1032343 +# https://github.com/curl/curl/issues/10682 +export TESTS_FAILS_ON_IPV6_ONLY_MACHINES="" + +echo "dh_update_autotools_config" +dh_update_autotools_config + +echo "dh_autoreconf" +dh_autoreconf + +echo "debian/rules override_dh_auto_configure " +debian/rules override_dh_auto_configure + +echo "debian/rules override_dh_auto_build" +debian/rules override_dh_auto_build + +echo "debian/rules override_dh_auto_test" +debian/rules override_dh_auto_test diff --git a/debian/tests/upstream-tests-openssl b/debian/tests/upstream-tests-openssl new file mode 100644 index 00000000000000..2ede329ad603cd --- /dev/null +++ b/debian/tests/upstream-tests-openssl @@ -0,0 +1,40 @@ +#!/bin/sh +set -e + +# Building curl is required because libauthretry (from "make test") requires +# libcurl. +# +# It might be possible to patch the makefile to have libauthretry link against +# the system's installed libcurl, patches welcome. +# +# openssl tests run against the system's installed curl. + +export DEB_BUILD_PROFILES="pkg.curl.openssl-only" +export VERBOSE=1 +TESTS_GENERAL_PARAMETERS="-c /usr/bin/curl" +TESTS_GENERAL_PARAMETERS="-vc /usr/bin/curl" +export TESTS_GENERAL_PARAMETERS + +# Don't skip tests which fail on ipv6-only environments for autopkgtests. +# I'm not aware of runners with this configuration for debci, and a retry +# should be easy enough it it happens. +# References: +# https://bugs.debian.org/1032343 +# https://github.com/curl/curl/issues/10682 +export TESTS_FAILS_ON_IPV6_ONLY_MACHINES="" + +echo "dh_update_autotools_config" +dh_update_autotools_config + +echo "dh_autoreconf" +dh_autoreconf + +echo "debian/rules override_dh_auto_configure " +debian/rules override_dh_auto_configure + +echo "debian/rules override_dh_auto_build" +debian/rules override_dh_auto_build + +echo "debian/rules override_dh_auto_test" +debian/rules override_dh_auto_test + diff --git a/debian/upstream/metadata b/debian/upstream/metadata new file mode 100644 index 00000000000000..6734e7fa22fe3c --- /dev/null +++ b/debian/upstream/metadata @@ -0,0 +1,5 @@ +--- +Bug-Database: https://github.com/bagder/curl/issues +Bug-Submit: https://github.com/curl/curl/issues +Repository: https://github.com/curl/curl.git +Repository-Browse: https://github.com/curl/curl diff --git a/debian/watch b/debian/watch new file mode 100644 index 00000000000000..16554190532f18 --- /dev/null +++ b/debian/watch @@ -0,0 +1,3 @@ +version=4 +opts=pgpmode=auto \ + https://curl.se/download/ download/curl-([\d\.]+).tar.gz