* Mon Feb 18 2019 Martin Hauke <mardnh@gmx.de>
- Use HTTPS for all URLs
- Verify source signature
* Thu Feb 14 2019 Martin Hauke <mardnh@gmx.de>
- Update to version 1.5.7
Broker:
- Ensure that an error occurs if `per_listener_settings true` is
given after other security options.
- Fix case where old unreferenced msg_store messages were being
saved to the persistence file, bloating its size unnecessarily.
Library:
- Fix `mosquitto_topic_matches_sub()` not returning MOSQ_ERR_INVAL
for invalid subscriptions like `topic/#abc`. This only affects
the return value, not the match/no match result, which was
already correct.
* Wed Feb 13 2019 Martin Hauke <mardnh@gmx.de>
- Update to version 1.5.6
Security:
* Fix CVE-2018-12551 (bsc#1125021): If Mosquitto is configured to
use a password file for authentication, any malformed data in
the password file will be treated as valid. This typically means
that the malformed data becomes a username and no password.
If this occurs, clients can circumvent authentication and get
access to the broker by using the malformed username. In
particular, a blank line will be treated as a valid empty username.
Other security measures are unaffected. Users who have only used
the mosquitto_passwd utility to create and modify their password
files are unaffected by this vulnerability.
* Fix CVE-2018-12550 (bsc#1125021): If an ACL file is empty, or
has only blank lines or comments, then mosquitto treats the ACL
file as not being defined, which means that no topic access is
denied. Although denying access to all topics is not a useful
configuration, this behaviour is unexpected and could lead
to access being incorrectly granted in some circumstances. This
is now fixed.
* Fix CVE-2018-12546 (bsc#1125019): If a client publishes a retained
message to a topic that they have access to, and then their access
to that topic is revoked, the retained message will still be
delivered to future subscribers. This behaviour may be undesirable
in some applications, so a configuration option `check_retain_source`
has been introduced to enforce checking of the retained message
source on publish.
Broker:
* Fixed comment handling for config options that have optional
arguments.
* Improved documentation around bridge topic remapping.
* Handle mismatched handshakes (e.g. QoS1 PUBLISH with QoS2
reply) properly.
* Fix spaces not being allowed in the bridge remote_username
option.
* Allow broker to always restart on Windows when using
`log_dest file`.
* Fix Will not being sent for Websockets clients.
* Windows: Fix possible crash when client disconnects.
* Fixed durable clients being unable to receive messages when
offline, when per_listener_settings was set to true.
* Add log message for the case where a client is disconnected for
sending a topic with invalid UTF-8.
Library:
* Fix TLS connections not working over SOCKS.
* Don't clear SSL context when TLS connection is closed, meaning
if a user provided an external SSL_CTX they have less chance of
leaking references.
* Mon Dec 17 2018 mardnh@gmx.de
- FIX CVE-2018-20145: mosquitto: ACL bypass (bnc#1119536)
- Update to version 1.5.5
Security:
* If `per_listener_settings` is set to true, then the `acl_file` setting was
ignored for the "default listener" only. This has been fixed. This does not
affect any listeners defined with the `listener` option.
Broker:
* Add `socket_domain` option to allow listeners to disable IPv6 support.
This is required to work around a problem in libwebsockets that means
sockets only listen on IPv6 by default if IPv6 support is compiled in.
* When using ADNS, don't ask for all network protocols when connecting,
because this can lead to confusing "Protocol not supported" errors if the
network is down.
* Fix outgoing retained messages not being sent by bridges on initial
connection.
* Don't reload auth_opt_ options on reload, to match the behaviour of the
other plugin options.
* Print message on error when installing/uninstalling as a Windows service.
* All non-error connect/disconnect messages are controlled by the
`connection_messages` option.
Library:
* Fix reconnect delay backoff behaviour.
* Don't call on_disconnect() twice if keepalive tests fail.
Client:
* Always print leading zeros in mosquitto_sub when output format is hex.
Build:
* Fix building where TLS-PSK is not available.
- Update to version 1.5.4
Security:
* When using a TLS enabled websockets listener with "require_certificate"
enabled, the mosquitto broker does not correctly verify client certificates.
This is now fixed. All other security measures operate as expected, and in
particular non-websockets listeners are not affected by this.
Broker:
* Process all pending messages even when a client has disconnected. This means
a client that send a PUBLISH then DISCONNECT quickly, then disconnects will
have its DISCONNECT message processed properly and so no Will will be sent.
* $SYS/broker/clients/disconnected should never be negative.
* Give better error message if a client sends a password without a username.
* Fix bridge not honoring restart_timeout.
* Don't disconnect a client if an auth plugin denies access to SUBSCRIBE.
Library:
* Fix memory leak that occurred if mosquitto_reconnect() was used when TLS
errors were present.
* Fix TLS connections when using an external event loop with
mosquitto_loop_read() and mosquitto_write().
Build:
* Fix clients not being compiled with threading support when using CMake.
* Use _GNU_SOURCE to fix build errors in websockets and getaddrinfo usage.
* Thu Oct 25 2018 mardnh@gmx.de
- Update to version 1.5.3
Security:
* Fix CVE-2018-12543. If a message is sent to Mosquitto with a topic that
begins with $, but is not $SYS, then an assert that should be unreachable is
triggered and Mosquitto will exit.
Broker:
* Elevate log level to warning for situation when socket limit is hit.
* Fix retained messages not sent by bridges on outgoing topics at the first
connection.
* Fix duplicate clients being added to by_id hash before the old client was
removed.
- Update to version 1.5.2
Broker:
* Fix incorrect call to setsockopt() for TCP_NODELAY.
* Fix excessive CPU usage when the number of sockets exceeds the system limit.
* Fix round_robin false behaviour.
* Fix segfault on HUP when bridges and security options are configured.
Library:
* Fix situation where username and password is used with SOCKS5 proxy.
* Fix SOCKS5 behaviour when passing IP addresses.
* Sun Aug 19 2018 mardnh@gmx.de
- Update to version 1.5.1
Broker:
* Fix plugin cleanup function not being called on exit of the broker.
* Print more OpenSSL errors when loading certificates/keys fail.
* Use AF_UNSPEC etc. instead of PF_UNSPEC to comply with POSIX.
* Remove use of AI_ADDRCONFIG, which means the broker can be used on systems
where only the loopback interface is defined.
* Fix IPv6 addresses not being able to be used as bridge addresses.
* All clients now time out if they exceed their keepalive*1.5, rather than
just reach it. This was inconsistent in two places.
* Fix segfault on startup if bridge CA certificates could not be read.
* Fix problem opening listeners on Pi caused by unsigned char being default.
* ACL patterns that do not contain either %c or %u now produce a warning in
the log.
* Fix bridge publishing failing when per_listener_settings was true.
* Fix `use_identity_as_username true` not working.
* Fix UNSUBACK messages not being logged.
* Fix possible endian issue when reading the `memory_limit` option.
* Fix building for libwebsockets < 1.6.
* Fix accessor functions for username and client id when used in plugin auth
check.
Library:
* Fix some places where return codes were incorrect, including to the
on_disconnect() callback. This has resulted in two new error codes,
MOSQ_ERR_KEEPALIVE and MOSQ_ERR_LOOKUP.
* Fix connection problems when mosquitto_loop_start() was called before
mosquitto_connect_async().
Clients:
* When compiled using WITH_TLS=no, the default port was incorrectly being set
to -1. This has been fixed.
* Fix compiling on Mac OS X <10.12.
Build:
* Fixes for building on NetBSD.
* Fixes for building on FreeBSD.
* Add support for compiling with static libwebsockets library.
* Thu May 03 2018 mardnh@gmx.de
- Update to version 1.5
Security:
* Fix memory leak that could be caused by a malicious CONNECT packet. This
does not yet have a CVE assigned. Closes #533493 (on Eclipse bugtracker)
Broker features:
* Add per_listener_settings to allow authentication and access control to be
per listener.
* Add limited support for reloading listener settings. This allows settings
for an already defined listener to be reloaded, but port numbers must not be
changed.
* Add ability to deny access to SUBSCRIBE messages as well as the current
read/write accesses. Currently for auth plugins only.
* Reduce calls to malloc through the use of UHPA.
* Outgoing messages with QoS>1 are no longer retried after a timeout period.
Messages will be retried when a client reconnects. This change in behaviour
can be justified by considering when the timeout may have occurred.
+ If a connection is unreliable and has dropped, but without one end
noticing, the messages will be retried on reconnection. Sending
additional PUBLISH or PUBREL would not have changed anything.
+ If a client is overloaded/unable to respond/has a slow connection then
sending additional PUBLISH or PUBREL would not help the client catch
up. Once the backlog has cleared the client will respond. If it is not
able to catch up, sending additional duplicates would not help either.
* Add use_subject_as_username option for certificate based client
authentication to use the entire certificate subject as a username, rather
than just the CN. Closes #469467.
* Change sys tree printing output. This format shouldn't be relied upon and
may change at any time. Closes #470246.
* Minimum supported libwebsockets version is now 1.3.
* Add systemd startup notification and services. Closes #471053.
* Reduce unnecessary malloc and memcpy when receiving a message and storing
it. Closes #470258.
* Support for Windows XP has been dropped.
* Bridge connections now default to using MQTT v3.1.1.
* mosquitto_db_dump tool can now output some stats on clients.
* Perform utf-8 validation on incoming will, subscription and unsubscription
topics.
* new $SYS/broker/store/messages/count (deprecates $SYS/broker/messages/stored)
* new $SYS/broker/store/messages/bytes
* max_queued_bytes feature to limit queues by real size rather than
than just message count. Closes Eclipse #452919 or Github #100
* Add support for bridges to be configured to only send notifications to the
local broker.
* Add set_tcp_nodelay option to allow Nagle's algorithm to be disabled on
client sockets. Closes #433.
* The behaviour of allow_anonymous has changed. In the old behaviour, the
default if not set was to allow anonymous access. The new behaviour is to
default is to allow anonymous access unless another security option is set.
For example, if password_file is set and allow_anonymous is not set, then
anonymous access will be denied. It is still possible to allow anonymous
access by setting it explicitly.
Broker fixes:
* Fix UNSUBSCRIBE with no topic is accepted on MQTT 3.1.1. Closes #665.
* Produce an error if two bridges share the same local_clientid.
* Miscellaneous fixes on Windows.
* queue_qos0_messages was not observing max_queued_** limits
* When using the include_dir configuration option sort the files
alphabetically before loading them. Closes #17.
* IPv6 is no longer disabled for websockets listeners.
* Remove all build timestamp information including $SYS/broker/timestamp.
Close #651.
* Correctly handle incoming strings that contain a NULL byte. Closes #693.
* Use constant time memcmp for password comparisons.
* Fix incorrect PSK key being used if it had leading zeroes.
* Fix memory leak if a client provided a username/password for a listener with
use_identity_as_username configured.
* Fix use_identity_as_username not working on websockets clients.
* Don't crash if an auth plugin returns MOSQ_ERR_AUTH for a username check on
a websockets client. Closes #490.
* Fix 08-ssl-bridge.py test when using async dns lookups. Closes #507.
* Lines in the config file are no longer limited to 1024 characters long.
Closes #652.
* Fix $SYS counters of messages and bytes sent when message is sent over
a Websockets. Closes #250.
* Fix upgrade_outgoing_qos for retained message. Closes #534.
* Fix CONNACK message not being sent for unauthorised connect on websockets.
Closes #8.
* Maximum connections on Windows increased to 2048.
* When a client with an in-use client-id connects, if the old client has a
will, send the will message. Closes #26.
* Fix parsing of configuration options that end with a space. Closes #804.
Client library features:
* Outgoing messages with QoS>1 are no longer retried after a timeout period.
Messages will be retried when a client reconnects.
* DNS-SRV support is now disabled by default.
* Add mosquitto_subscribe_simple() This is a helper function to make
retrieving messages from a broker very straightforward. Examples of its use
are in examples/subscribe_simple.
* Add mosquitto_subscribe_callback() This is a helper function to make
processing messages from a broker very straightforward. An example of its use
is in examples/subscribe_simple.
* Connections now default to using MQTT v3.1.1.
* Add mosquitto_validate_utf8() to check whether a string is valid UTF-8
according to the UTF-8 spec and to the additional restrictions imposed by
the MQTT spec.
* Topic inputs are checked for UTF-8 validity.
* Add mosquitto_userdata function to allow retrieving the client userdata
member variable. Closes #111.
* Add mosquitto_pub_topic_check2(), mosquitto_sub_topic_check2(), and
mosquitto_topic_matches_sub2() which are identical to the similarly named
functions but also take length arguments.
* Add mosquitto_connect_with_flags_callback_set(), which allows a second
connect callback to be used which also exposes the connect flags parameter.
Closes #738 and #128.
* Add MOSQ_OPT_SSL_CTX option to allow a user specified SSL_CTX to be used
instead of the one generated by libmosquitto. This allows greater control
over what options can be set. Closes #715.
* Add MOSQ_OPT_SSL_CTX_WITH_DEFAULTS to work with MOSQ_OPT_SSL_CTX and have
the default libmosquitto SSL_CTX configuration applied to the user provided
SSL_CTX. Closes #567.
Client library fixes:
* Fix incorrect PSK key being used if it had leading zeroes.
* Initialise "result" variable as soon as possible in
mosquitto_topic_matches_sub. Closes #654.
* No need to close socket again if setting non-blocking failed. Closes #649.
* Fix mosquitto_topic_matches_sub() not correctly matching foo/bar against
foo/+/#. Closes #670.
* SNI host support added.
Client features:
* Add -F to mosquitto_sub to allow the user to choose the output format.
* Add -U to mosquitto_sub for unsubscribing from topics.
* Add -c (clean session) to mosquitto_pub.
* Add --retained-only to mosquitto_sub to exit after receiving all retained
messages.
* Add -W to allow mosquitto_sub to stop processing incoming messages after a
timeout.
* Connections now default to using MQTT v3.1.1.
* Default to using port 8883 when using TLS.
* mosquitto_sub doesn't continue to keep connecting if CONNACK tells it the
connection was refused.
Client fixes:
* Correctly handle empty files with "mosquitto_pub -l". Closes #676.
Build:
* Add WITH_STRIP option (defaulting to "no") that when set to "yes" will strip
executables and shared libraries when installing.
* Add WITH_STATIC_LIBRARIES (defaulting to "no") that when set to "yes" will
build and install static versions of the client libraries.
* Don't run TLS-PSK tests if TLS-PSK disabled at compile time. Closes #636.
* Support for openssl versions 1.0.0 and 1.0.1 has been removed as these are
no longer supported by openssl.
Documentation:
* Replace mentions of deprecated 'c_rehash' with 'openssl rehash'.
- Remove patch:
* mosquitto-1.4.12-use-SOURCE_DATE_EPOCH.patch (not longer needed)
- Support for tcp-wrapper is broken atm, disable for now
Version: 1.4.15-bp150.2.4
* Thu Mar 01 2018 mardnh@gmx.de
- Update to version 1.4.15
Security:
* Fix CVE-2017-7652. If a SIGHUP is sent to the broker when there are no more
file descriptors, then opening the configuration file will fail and security
settings will be set back to their default values.
* Fix CVE-2017-7651. Unauthenticated clients can cause excessive memory use by
setting "remaining length" to be a large value. This is now mitigated by
limiting the size of remaining length to valid values. A "memory_limit"
configuration option has also been added to allow the overall memory used by
the broker to be limited.
Broker:
* Use constant time memcmp for password comparisons.
* Fix incorrect PSK key being used if it had leading zeroes.
* Fix memory leak if a client provided a username/password for a listener with
use_identity_as_username configured.
* Fix use_identity_as_username not working on websockets clients.
* Don't crash if an auth plugin returns MOSQ_ERR_AUTH for a username check on
a websockets client. Closes #490.
* Fix 08-ssl-bridge.py test when using async dns lookups. Closes #507.
* Lines in the config file are no longer limited to 1024 characters long.
Closes #652.
* Fix $SYS counters of messages and bytes sent when message is sent over
a Websockets. Closes #250.
* Fix upgrade_outgoing_qos for retained message. Closes #534.
* Fix CONNACK message not being sent for unauthorised connect on websockets.
Closes #8.
Client library:
* Fix incorrect PSK key being used if it had leading zeroes.
* Initialise "result" variable as soon as possible in
mosquitto_topic_matches_sub. Closes #654.
* No need to close socket again if setting non-blocking failed. Closes #649.
* Fix mosquitto_topic_matches_sub() not correctly matching foo/bar against
foo/+/#. Closes #670.
Clients:
* Correctly handle empty files with "mosquitto_pub -l". Closes #676.
Build:
* Don't run TLS-PSK tests if TLS-PSK disabled at compile time. Closes #636.
* Mon Oct 02 2017 mardnh@gmx.de
- Update to 1.4.14
* Broker:
- Fix regression from 1.4.13 where persistence data was not
being saved.
* Thu Sep 07 2017 jengelh@inai.de
- Fix incorrect RPM groups.
- Remove repeated license declaration from description.
Trim package descriptions for size.
- Errors from user creation must not be ignored.
* Fri Jul 07 2017 antoine.belvire@opensuse.org
- Add mosquitto-1.4.12-use-SOURCE_DATE_EPOCH.patch: Determine build
timestamp from latest revision of .changes file in order to make
the build reproducible and avoid useless republishing.
* Wed Jul 05 2017 mardnh@gmx.de
- Update to 1.4.13
* Security:
- Fix CVE-2017-9868. The persistence file was readable
by all local users, potentially allowing sensitive
information to be leaked.
This can also be fixed administratively, by restricting
access to the directory in which the persistence file
is stored.
* Broker:
- Fix for poor websockets performance.
- Fix lazy bridges not timing out for idle_timeout.
- Fix problems with large retained messages over websockets.
- Set persistence file to only be readable by owner,
except on Windows.
- Fix CONNECT check for reserved=0, as per MQTT v3.1.1
check MQTT-3.1.2-3.
- When the broker stop, wills for any connected clients
are now "sent".
- Auth plugins can be configured to disable the check for +# in
usernames/client ids with the auth_plugin_deny_special_chars
option. Partially closes #462.
- Restrictions for CVE-2017-7650 have been relaxed - '/' is
allowed in usernames/client ids. Remainder of fix for #462.
Clients:
- Don't use / in auto-generated client ids.
* Mon May 29 2017 mardnh@gmx.de
- Update to 1.4.12
* Security:
- Fix CVE-2017-7650, which allows clients with username or
client id set to '#' or '+' to bypass pattern based ACLs or
third party plugins. The fix denies message sending or
receiving of messages for clients with a '#' or '+' in their
username or client id and if the message is subject to a
pattern ACL check or plugin check.
* Broker:
- Fix mosquitto.db from becoming corrupted due to client
messages being
persisted with no stored message. Closes #424.
- Fix bridge not restarting properly. Closes #428.
- Fix unitialized memory in gets_quiet on Windows. Closes #426.
- Fix building with WITH_ADNS=no for systems that don't use
glibc. Closes #415.
- Fixes to readme.md.
- Fix deprecation warning for OpenSSL 1.1. PR #416.
- Don't segfault on duplicate bridge names. Closes #446.
- Fix CVE-2017-7650.
* Sun Mar 19 2017 mrueckert@suse.de
- update to 1.4.11
- Broker:
- Fix crash when "lazy" type bridge attempts to reconnect.
Closes #259.
- maximum_connections now applies to websockets listeners.
Closes #271.
- Allow bridges to use TLS with IPv6.
- Don't error on zero length persistence files. Closes #316.
- For http only websockets clients, close files served over
http in all cases when the client disconnects. Closes #354.
- Fix error message when websockets http_dir directory does not
exist.
- Improve password utility error message. Closes #379.
- Clients:
- Use of --ciphers no longer requires you to also pass
- -tls-version. Closes #380.
- Client library:
- Clients can now use TLS with IPv6.
- Fix potential socket leakage when reconnecting. Closes #304.
- Fix potential negative timeout being passed to pselect.
Closes #329.
- update 1.4.10
- Broker:
- Fix TLS operation with websockets listeners and libwebsockts
2.x. Closes #186.
- Don't disconnect client on HUP before reading the pending
data. Closes #7.
- Fix some $SYS messages being incorrectly persisted. Closes
[#191].
- Support OpenSSL 1.1.0.
- Call fsync after persisting data to ensure it is correctly
written. Closes #189.
- Fix persistence saving of subscription QoS on big-endian
machines.
- Fix will retained flag handling on Windows. Closes #222.
- Broker now displays an error if it is unable to open the log
file. Closes #234.
- Client library:
- Support OpenSSL 1.1.0.
- Fixed the C++ library not allowing SOCKS support to be used.
Closes #198.
- Fix memory leak when verifying a server certificate with a
subjectAltName section. Closes #237.
- Build:
- Don't attempt to install docs when WITH_DOCS=no. Closes #184.
* Tue Jun 28 2016 mrueckert@suse.de
- update to 1.4.9
- Broker:
- Ensure websockets clients that previously connected with
clean session set to false have their queued messages
delivered immediately on reconnecting. Closes #476314.
- Reconnecting client with clean session set to false doesn't
start with mid=1 again.
- Will topic isn't truncated by one byte when using a
mount_point any more.
- Network errors are printed correctly on Windows.
- Fix incorrect $SYS heap memory reporting when using ACLs.
- Bridge config parameters couldn't contain a space, this has
been fixed. Closes #150.
- Fix saving of persistence messages that start with a '/'.
Closes #151.
- Fix reconnecting for bridges that use TLS on Windows. Closes
[#154].
- Broker and bridges can now cope with unknown incoming PUBACK,
PUBREC, PUBREL, PUBCOMP without disconnecting. Closes #57.
- Fix websockets listeners not being able to bind to an IP
address. Closes #170.
- mosquitto_passwd utility now correctly deals with unknown
command line arguments in all cases. Closes #169.
- Fix publishing of $SYS/broker/clients/maximum
- Fix order of #includes in lib/send_mosq.c to ensure struct
mosquitto doesn't differ between source files when websockets
is being used. Closes #180.
- Fix possible rare crash when writing out persistence file and
a client has incomplete messages inflight that it has been
denied the right to publish.
- Client library:
- Fix the case where a message received just before the
keepalive timer expired would cause the client to miss the
keepalive timer.
- Return value of pthread_create is now checked.
- _mosquitto_destroy should not cancel threads that weren't
created by libmosquitto. Closes #166.
- Clients can now cope with unknown incoming PUBACK, PUBREC,
PUBREL, PUBCOMP without disconnecting. Closes #57.
- Fix mosquitto_topic_matches_sub() reporting matches on some
invalid subscriptions.
- Clients:
- Handle some unchecked malloc() calls. Closes #1.
- Build:
- Fix string quoting in CMakeLists.txt. Closes #4.
- Fix building on Visual Studio 2015. Closes #136.
* Mon Mar 28 2016 mrueckert@suse.de
- update to 1.4.8
- Broker:
- Wills published by clients connected to a listener with
mount_point defined now correctly obey the mount point. This
was a potential security risk because it allowed clients to
publish messages outside of their restricted mount point.
This is only affects brokers where the mount_point option is
in use. Closes #487178.
- Fix detection of broken connections on Windows.
Closes #485143.
- Close stdin etc. when daemonised. Closes #485589.
- Fix incorrect detection of FreeBSD and OpenBSD.
Closes #485131.
- Client library:
- mosq->want_write should be cleared immediately before a call
to SSL_write, to allow clients using mosquitto_want_write()
to get accurate results.
* Thu Feb 11 2016 mrueckert@suse.de
- update to 1.4.7
- Broker:
- Fix support for libwebsockets 1.22.
- changes from 1.4.6
- Broker:
- Add support for libwebsockets 1.6.
- Client library:
- Fix _mosquitto_socketpair() on Windows, reducing the chance
of delays when publishing. Closes #483979.
- Clients:
- Fix "mosquitto_pub -l" stripping the final character on a
line. Closes #483981.
* Wed Dec 09 2015 mrueckert@suse.de
- enable websocket supports
* Wed Dec 09 2015 mrueckert@suse.de
- enable websocket supports
* Wed Dec 09 2015 mrueckert@suse.de
- enabled tcp wrapper support
* Mon Dec 07 2015 mrueckert@suse.de
- update to 1.4.5
- Broker
- Fix possible memory leak if bridge using SSL attempts to
connect to a host that is not up.
- Free unused topic tree elements (fix in 1.4.3 was
incomplete). Closes #468987.
- Clients
- ?mosquitto_pub -l? now no longer limited to 1024 byte lines.
Closes #478917.
* Fri Nov 06 2015 mrueckert@suse.de
- update to 1.4.4
- Broker:
- Don't leak sockets when outgoing bridge with multiple
addresses cannot connect. Closes #477571.
- Fix cross compiling of websockets. Closes #475807.
- Fix memory free related crashes on openwrt. Closes #475707.
- Fix excessive calls to message retry check.
* Thu Sep 10 2015 mrueckert@suse.de
- update to 1.4.3
- Broker
- Fix incorrect bridge notification on initial connection.
Closes #467096.
- Build fixes for OpenBSD.
- Fix incorrect behaviour for autosave_interval, most noticable
for autosave_interval=1. Closes #465438.
- Fix handling of outgoing QoS>0 messages for bridges that
could not be sent because the bridge connection was down.
- Free unused topic tree elements. Closes #468987.
- Fix some potential memory leaks. Closes #470253.
- Fix potential crash on libwebsockets error.
- Client library
- Add missing error strings to mosquitto_strerror.
- Handle fragmented TLS packets without a delay. Closes
[#470660].
- Fix incorrect loop timeout being chosen when using threaded
- interface and keepalive = 0. Closes #471334.
- Increment inflight messages count correctly. Closes #474935.
- Clients
- Report error string on connection failure rather than error
code.
* Fri May 08 2015 mrueckert@suse.de
- update to 1.4.2
Broker:
- Fix bridge prefixes only working for the first outgoing
message. Closes #464437.
- Fix incorrect bridge connection notifications on local broker.
- Fix persistent db writing on Windows. Closes #464779.
- ACLs are now checked before sending a will message.
- Fix possible crash when using bridges on Windows. Closes
[#465384].
- Fix parsing of auth_opt_ arguments with extra spaces/tabs.
- Broker will return CONNACK rc=5 when a username/password is not
authorised. This was being incorrectly set as rc=4.
- Fix handling of payload lengths>4096 with websockets.
Client library:
- Inflight message count wasn't being decreased for outgoing
messages using QoS 2, meaning that only up to 20 QoS 2 messages
could be sent. This has been fixed. Closes #464436.
- Fix CMake dependencies for C++ wrapper building. Closes
[#463884].
- Fix possibility of select() being called with a socket that is
>FD_SETSIZE. This is a fix for #464632 that will be followed
>up by removing the select() call in a future version.
- Fix calls to mosquitto_connect*_async() not completing.
* Fri May 01 2015 mrueckert@suse.de
- added mosquitto-1.4.1_apparmor.patch to make the profile work in
newer apparmor
* Fri May 01 2015 mrueckert@suse.de
- added mosquitto-1.4.1_apparmor.patch to make the profile work in
newer apparmor
* Fri May 01 2015 mrueckert@suse.de
- merge a few things from the other packages
- create dir structure in the config dir + readmes
- splitout the client
- provide the splitted devel package names
- install the apparmor profile
- install firewall config