Refactor: libcrmcommon: Use our own logging for gnutls.
Refactor: libcrmcommon: Move tls priority detection into a function.
Refactor: libs: Move tls-specific code from remote.c to tls.c.
Feature: libcrmcommon: Add pcmk__x509_enabled.
Feature: sysconfig: Add env settings needed for X509 authentication.
Refactor: libcrmcommon: Change the type of tls_session...
Refactor: libcrmcommon: pcmk__new_tls_session can take a cert cred type.
Refactor: libcrmcommon: Add pcmk__tls_t.
Refactor: libs: Use pcmk__tls_t in the client TLS code as well.
Refactor: libcrmcommon: Deprecate crm_gnutls_global_init.
Refactor: libcrmcommon: Simplify args to pcmk__new_tls_session.
Feature: daemons: Set up X509 auth in based if enabled.
Feature: libcrmcommon: If the server supports certs, require them...
Merge pull request #3758 from clumens/certs-3.0
Feature: libs: Log if a TLS certificate is close to expiration.
Feature: libcib: Enable TLS certs for remote CIB operations.
Doc: Pacemaker Administration: Explain use of TLS certificates.
Refactor: libcib: Unindent code in cib_new.
Refactor: libcib: Rearrange cib_remote_signon a bit.
Refactor: libcrmcommon: Use our own logging for gnutls.
Refactor: libcrmcommon: Move tls priority detection into a function.
Refactor: libcrmcommon: Change the type of tls_session...
Feature: sysconfig: Add env settings needed for X509 authentication.
Refactor: libs: Move tls-specific code from remote.c to tls.c.
Feature: libcrmcommon: Add pcmk__x509_enabled.
Refactor: libcrmcommon: pcmk__new_tls_session can take a cert cred type.
Refactor: libcrmcommon: Add pcmk__tls_t.
Refactor: libs: Use pcmk__tls_t in the client TLS code as well.
Refactor: libcrmcommon: Deprecate crm_gnutls_global_init.
Refactor: libcrmcommon: Simplify args to pcmk__new_tls_session.
Feature: daemons: Set up X509 auth in based if enabled.
Feature: libcrmcommon: If the server supports certs, require them...
Feature: libs: Log if a TLS certificate is close to expiration.
Feature: libcib: Enable TLS certs for remote CIB operations.
Doc: Pacemaker Administration: Explain use of TLS certificates.
Merge pull request #3738 from clumens/certs
Build: spec: try finding and using libaio.so.x library name
Refactor: tests: ability to specify a libaio name
Merge pull request #157 from gao-yan/log-tests-error-libaio.so
Low: xml: Fix ACL xpath typo from 986cc5c4
Merge pull request #3755 from nrwahl2/nrwahl2-T898
Fix: scheduler: avoid memory leak in bundles
Merge pull request #3753 from kgaillot/fixes
Test: cts-schemas: Add test for ACL validity after other transformations
Fix: xml: Ensure ACL permissions are valid after XSL transformations
Fix: xml: Preserve ACL reference behavior for replaced constraints
Merge pull request #3754 from nrwahl2/nrwahl2-backport
Test: cts-scheduler: Remove sed needed for backwards compat.
Merge pull request #3752 from clumens/cts-substitute-3.0
Since the risk of corner cases is so high, and our time for 3.0.0 is limited, I think the best approach would be to log a warning if a CIB contains ACLs with xpaths and the upgrade adds or renames any element or attribute. (We could possibly check whether an xpath exists that refers to an attribute, to reduce the scope a bit.) Something like: "WARNING: CIB syntax changes may invalidate ACLs that use 'xpath'. It is strongly recommended to run 'cibadmin --upgrade' then go through the updated CIB carefully to ensure ACLs still match the desired intent."
Test: cts-schemas: Add test for ACL validity after other transformations
Fix: xml: Ensure ACL permissions are valid after XSL transformations
Fix: xml: Preserve ACL reference behavior for replaced constraints
Merge pull request #3747 from nrwahl2/nrwahl2-T898
Merge pull request #2000 from ClusterLabs/fix-openstack-cinder-start
openstack-cinder-volume: wait for volume to be available
@kgaillot Can you weigh in when you have a chance? I know things are especially busy.
I figure it's unwise to work on the case until we agree upon how we ought to address it -- if at all.
Test: cts-scheduler: Remove sed needed for backwards compat.
Merge pull request #3744 from clumens/cts-substitute
Low: log: Allow CIB upgrade messages to start with W, I, D
Doc: xml: Correct documentation of colocation/order lifetime transform
Low: xml: Warn if schema transformation drops nagios/upstart resources
Low: xml: Warn if schema transformation drops rkt bundles
Low: xml: Warn if schema transformation drops restart-type meta-attr
Low: xml: Warn if schema transformation drops can_fail or...
Low: xml: Warn if schema transformation drops colocation/order lifetimes
Test: cts-scheduler: Split multiple top-level location constraint rules
Low: xml: Info if schema transformation drops empty groups or clones
Test: cts-scheduler: Drop nvpairs without value attribute
Low: xml: Warn if schema transformation drops moon phase
Low: xml: Warn if schema transformation drops remove-after-stop property
Merge pull request #3750 from nrwahl2/nrwahl2-backport
Low: log: Allow CIB upgrade messages to start with W, I, D
Doc: xml: Correct documentation of colocation/order lifetime transform
Low: xml: Warn if schema transformation drops nagios/upstart resources
Low: xml: Warn if schema transformation drops rkt bundles
Low: xml: Warn if schema transformation drops restart-type meta-attr
Low: xml: Warn if schema transformation drops can_fail or...
Low: xml: Warn if schema transformation drops colocation/order lifetimes
Test: cts-scheduler: Split multiple top-level location constraint rules
Test: cts-scheduler: Drop nvpairs without value attribute