Reported-by: email@example.com Broken-in: 6e62c45 - firstname.lastname@example.org
Introduces a small backwards incompatible change to two results, err_temp to temperror and err_perm to permerror.
Documentation and test included. Fixed Conflicts: doc/doc-txt/ChangeLog
The variable rename in 4.82 PP/19 (commit 0fbd9bf) was incomplete, I missed changing the documentation. :(
…NU Hurd). Bug 1441 By Samuel Thibault
Patch by W.Breyha, tested by H.Schlittermann
Properly escape value passed to expand_string(). Check for NULL return from expand_string().
vi $(git whatchanged --since=2013-01-01 | grep '^:100' | sed 's/^[^M]*M//' | sort -u | fgrep -v test/) Did 2014 first, since otherwise every file I touched to update to 2013 would show as changed in 2014. Last invocation logged to git was during 2012. Will need to be more careful if auditing next year.
vi $(git whatchanged --since=2014-01-01 | grep '^:100' | sed 's/^[^M]*M//' | sort -u | fgrep -v test/)
…on with cutthrough routing
…combination with cuttrhough. Add check and paniclog attempts to do so. Bug 1411 (WONTFIX).
Rename proxy expansions conforming to Exim standards. Update documentation to reflect rename. Seperate restore socket function
Initial conf setting and expansions Logging setting whether to record proxy host, off by default Put PROXY processing before connect ACL Fix incoming address logging Add Proxy Protocol to ChangeLog Set window for Proxy Protocol header to be sent Update docs and EDITME.
The "local" builtin is not part of POSIX. We want it. Try harder to get a vaguely sane shell, rather than just a POSIX shell. Also, safeguard to error out more gracefully if invoked from outside the build process.
As of s11, Solaris & derivatives need libsocket and libnsl. Ensure they are searched for by autoconfig. This seems to be successfully ignored on Linux. Credit to Dave Edmondson (email@example.com) for the fix.
Some client libs set a global context, newer client libs set a global default which then needs to be reloaded.
Make it clearer in the spec, where talking about certificates, that MD5 in certs is a really Quite Bad idea.