Log: xml: Warn about post-transform behavior changes for ACLs with xpath
Fix: scheduler: avoid memory leak in bundles
Low: libcrmcluster: initialize from in pcmk__cpg_message_data()
Log: libcrmcluster: avoid redundant log for invalid CPG messages
Low: libcrmcluster: don't assert for CPG decompression error
Refactor: libcrmcluster: move peer caching up in pcmk__cpg_message_data()
Log: libcrmcluster: improve messages in pcmk__cpg_message_data()
Fix: libcrmcluster: restore CPG header size compatibility
Merge pull request #3760 from kgaillot/release3
Refactor: libcrmcommon: pcmk__x509_enabled doesn't need an arg.
Feature: daemons: Enable TLS support for Pacemaker Remote nodes.
Low: libcrmcommon: Set *tls = NULL in a few more locations.
Feature: liblrmd: Enable TLS support for Pacemaker Remote clients.
Doc: sysconfig: Explain permissions needed on TLS-related files.
Feature: sysconfig: Document using certificates for remote nodes.
Doc: Pacemaker Explained: Add documentation for TLS options.
Refactor: libcrmcommon: Only set gnutls priorities when needed.
Merge pull request #3759 from clumens/remote-tls
Low: libcrmcluster: initialize from in pcmk__cpg_message_data()
Log: libcrmcluster: avoid redundant log for invalid CPG messages
Low: libcrmcluster: don't assert for CPG decompression error
Refactor: libcrmcluster: move peer caching up in pcmk__cpg_message_data()
Log: libcrmcluster: improve messages in pcmk__cpg_message_data()
Fix: libcrmcluster: restore CPG header size compatibility
Merge pull request #3757 from kgaillot/fixes
Refactor: libcib: Unindent code in cib_new.
Refactor: libcib: Rearrange cib_remote_signon a bit.
Refactor: libcrmcommon: Use our own logging for gnutls.
Refactor: libcrmcommon: Move tls priority detection into a function.
Refactor: libs: Move tls-specific code from remote.c to tls.c.
Feature: libcrmcommon: Add pcmk__x509_enabled.
Feature: sysconfig: Add env settings needed for X509 authentication.
Refactor: libcrmcommon: Change the type of tls_session...
Refactor: libcrmcommon: pcmk__new_tls_session can take a cert cred type.
Refactor: libcrmcommon: Add pcmk__tls_t.
Refactor: libs: Use pcmk__tls_t in the client TLS code as well.
Refactor: libcrmcommon: Deprecate crm_gnutls_global_init.
Refactor: libcrmcommon: Simplify args to pcmk__new_tls_session.
Feature: daemons: Set up X509 auth in based if enabled.
Feature: libcrmcommon: If the server supports certs, require them...
Merge pull request #3758 from clumens/certs-3.0
Feature: libs: Log if a TLS certificate is close to expiration.
Feature: libcib: Enable TLS certs for remote CIB operations.
Doc: Pacemaker Administration: Explain use of TLS certificates.
Refactor: libcib: Unindent code in cib_new.
Refactor: libcib: Rearrange cib_remote_signon a bit.
Refactor: libcrmcommon: Use our own logging for gnutls.
Refactor: libcrmcommon: Move tls priority detection into a function.
Refactor: libcrmcommon: Change the type of tls_session...
Feature: sysconfig: Add env settings needed for X509 authentication.
Refactor: libs: Move tls-specific code from remote.c to tls.c.
Feature: libcrmcommon: Add pcmk__x509_enabled.
Refactor: libcrmcommon: pcmk__new_tls_session can take a cert cred type.
Refactor: libcrmcommon: Add pcmk__tls_t.
Refactor: libs: Use pcmk__tls_t in the client TLS code as well.
Refactor: libcrmcommon: Deprecate crm_gnutls_global_init.
Refactor: libcrmcommon: Simplify args to pcmk__new_tls_session.
Feature: daemons: Set up X509 auth in based if enabled.
Feature: libcrmcommon: If the server supports certs, require them...
Feature: libs: Log if a TLS certificate is close to expiration.
Feature: libcib: Enable TLS certs for remote CIB operations.
Doc: Pacemaker Administration: Explain use of TLS certificates.
Merge pull request #3738 from clumens/certs
Build: spec: try finding and using libaio.so.x library name
Refactor: tests: ability to specify a libaio name
Merge pull request #157 from gao-yan/log-tests-error-libaio.so
Low: xml: Fix ACL xpath typo from 986cc5c4
Merge pull request #3755 from nrwahl2/nrwahl2-T898
Fix: scheduler: avoid memory leak in bundles
Merge pull request #3753 from kgaillot/fixes
Test: cts-schemas: Add test for ACL validity after other transformations
Fix: xml: Ensure ACL permissions are valid after XSL transformations
Fix: xml: Preserve ACL reference behavior for replaced constraints
Merge pull request #3754 from nrwahl2/nrwahl2-backport
Test: cts-scheduler: Remove sed needed for backwards compat.
Merge pull request #3752 from clumens/cts-substitute-3.0
Since the risk of corner cases is so high, and our time for 3.0.0 is limited, I think the best approach would be to log a warning if a CIB contains ACLs with xpaths and the upgrade adds or renames any element or attribute. (We could possibly check whether an xpath exists that refers to an attribute, to reduce the scope a bit.) Something like: "WARNING: CIB syntax changes may invalidate ACLs that use 'xpath'. It is strongly recommended to run 'cibadmin --upgrade' then go through the updated CIB carefully to ensure ACLs still match the desired intent."
Test: cts-schemas: Add test for ACL validity after other transformations
Fix: xml: Ensure ACL permissions are valid after XSL transformations