If a call to `vcpkg_replace_string` makes no changes i.e doesn't
effectively replace a string, A warning is logged.
This should also help identify ports that no longer need these calls to
fix things in `.pc` files etc.
* [entt] Remove incorrect version
* [libharu] Fix incorrect version git tree
* [libopensp] Fix incorrect version git tree
* [minizip] Fix incorrect version git tree
* [smf] Remove incorrect version
* [vlpp] Remove incorrect version
* [vulkan-headers] Remove incorrect version
* Don't use external ZLIB_DLL
* Update versions
* [minizip] Bump to zlib version
* Update versions
* [libkml] Fix mingw build
* [libkml] Modernize
* [libkml] Fix minizip dependency
* [libkml] No DLL
* Update versions
* [libkml] Update mingw patch
* Update versions
* Update versions
* [zlib] Update to 1.2.13
This picks up the official fix for CVE-2022-37434.
* Cherry pick installing the correct license from https://github.com/microsoft/vcpkg/pull/27242/
* Update version database.
* More version database.
* Also update minizip.
* Also guard ZLIB_DLL properties for BUILD_SHARED_LIBS.
* Version database.
* Fix minizip usage.
Co-authored-by: Kai Pastor <dg0yt@darc.de>
* Bulk remove vcpkg_fail_port_install calls.
Interesting ones have been split out into separate reviews, where "interesting" means "anything more than just deleting the call to vcpkg_fail_port_install",
In support of https://github.com/microsoft/vcpkg/pull/21502
* Update version database.
* Revert google benchmark changes already submitted as https://github.com/microsoft/vcpkg/pull/22728
* Repair version database.
* [minizip] support iOS triplets
* DISABLE_INSTALL_TOOLS when VCPKG_TARGET_IS_IOS
* [minizip] update git-tree SHA
* [minizip] IOAPI_NO_64 in Android
* add a patch to use standard C API
* [minizip] update port SHA