Link [ pkgsrc | NetBSD | pkgsrc git mirror | PR fulltext-search | netbsd commit viewer ]


   
        usage: [branch:branch] [user:user] [path[@revision]] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN pkgtools/pkg)




switch to index mode

recent branches: MAIN (32m)  pkgsrc-2024Q1 (15d)  pkgsrc-2023Q4 (43d)  pkgsrc-2023Q2 (75d)  pkgsrc-2023Q3 (155d) 

2024-05-13 20:14:58 UTC Now

2020-05-28 15:26:23 UTC MAIN commitmail json YAML

mozjs60: fix configuration failure

The added patch hacks the virtualenv configuration process which sometimes
finds invalid modification times and try to restart a broken configuration.

(triaxx)

2020-05-28 15:24:13 UTC MAIN commitmail json YAML

x11/qt4-pgsql: suppress USE_TOOLS+=perl warning

(rillig)

2020-05-28 15:23:34 UTC MAIN commitmail json YAML

x11/qt4-mysql: suppress USE_TOOLS+=perl warning

(rillig)

2020-05-28 15:21:17 UTC MAIN commitmail json YAML

x11/qt4-tiff: suppress USE_TOOLS+=perl warning

(rillig)

2020-05-28 15:20:01 UTC MAIN commitmail json YAML

x11/qt4-sqlite3: suppress USE_TOOLS+=perl warning

(rillig)

2020-05-28 15:15:51 UTC MAIN commitmail json YAML

databases/libgda: remove unknown configure option

(rillig)

2020-05-28 15:08:27 UTC MAIN commitmail json YAML

help2man: SOEXT may not change, needs SUBST_NOOP_OK

(nia)

2020-05-28 14:47:36 UTC MAIN commitmail json YAML

mk/tools: not all linuxes have bash (e.g. alpine)

(nia)

2020-05-28 14:44:19 UTC MAIN commitmail json YAML

2020-05-28 14:21:51 UTC MAIN commitmail json YAML

doc: Updated graphics/libmypaint to 1.6.1

(ryoon)

2020-05-28 14:21:22 UTC MAIN commitmail json YAML

libmypaint: Update to 1.6.1

Changelog:
1.6.1 - libtool '-release' flag no longer used

1.6.0
This minor version release includes:

    The new mypaint_brush_stroke_to_2_linearsRGB function.
    Some performance improvements, particularly improved auto-vectorization in the spectral->rgb conversion function (thanks to SleepProgger).
    Improved documentation (still lacking a comprehensive overview).
    New translations for Croatian, Portuguese, Valencian, English (UK) and Dutch

(ryoon)

2020-05-28 14:16:46 UTC MAIN commitmail json YAML

archivers: Enable quazip

(ryoon)

2020-05-28 14:15:53 UTC MAIN commitmail json YAML

doc: Added archivers/quazip version 0.9

(ryoon)

2020-05-28 14:15:12 UTC MAIN commitmail json YAML

archivers/quazip: import quazip-0.9

QuaZIP is the C++ wrapper for Gilles Vollant's ZIP/UNZIP package
(AKA Minizip) using Trolltech's Qt library.

If you need to write files to a ZIP archive or read files from one
using QIODevice API, QuaZIP is exactly the kind of tool you need.

(ryoon)

2020-05-28 12:24:59 UTC MAIN commitmail json YAML

doc: Removed x11/libgnomekbd2 successor x11/libgnomekbd

(nia)

2020-05-28 12:22:08 UTC MAIN commitmail json YAML

2020-05-28 12:15:09 UTC MAIN commitmail json YAML

doc: Removed time/gtodo

(nia)

2020-05-28 12:12:51 UTC MAIN commitmail json YAML

2020-05-28 12:09:03 UTC MAIN commitmail json YAML

doc: Removed editors/notecase

(nia)

2020-05-28 12:07:15 UTC MAIN commitmail json YAML

Updated databases/redis, devel/py-joblib

(adam)

2020-05-28 12:06:28 UTC MAIN commitmail json YAML

py-joblib: updated 0.15.1

Release 0.15.1
- Make joblib work on Python 3 installation that do not ship with the lzma
  package in their standard library.

(adam)

2020-05-28 12:06:17 UTC MAIN commitmail json YAML

editors: remove notecase

"The free NoteCase Outliner has been discontinued in 2008, in favor of a much advanced variant of the program called NoteCase Pro.

NoteCase Pro, albeit a commercial product, can be used for free with some limitations, but even the free mode of NoteCase Pro is much more advanced than the old NoteCase.

Proceed to NoteCase Pro: ..."

(nia)

2020-05-28 12:02:44 UTC MAIN commitmail json YAML

redis: updated to 6.0.4

Redis 6.0.4
===========

Upgrade urgency CRITICAL: this release fixes a severe replication bug.

Redis 6.0.4 fixes a critical replication bug caused by a new feature introduced
in Redis 6. The feature, called "meaningful offset" and strongly wanted by
myself (antirez) was an improvement that avoided that masters were no longer
able, during a failover where they were demoted to replicas, to partially
synchronize with the new master. In short the feature was able to avoid full
synchronizations with RDB. How did it work? By trimming the replication backlog
of the final "PING" commands the master was sending in the replication channel:
this way the replication offset would no longer go "after" the one of the
promoted replica, allowing the master to just continue in the same replication
history, receiving only a small data difference.

However after the introduction of the feature we (the Redis core team) quickly
understood there was something wrong: the apparently harmless feature had
many bugs, and the last bug we discovered, after a joined effort of multiple
people, we were not even able to fully understand after fixing it. Enough was
enough, we decided that the complexity cost of this feature was too high.
So Redis 6.0.4 removes the feature entirely, and fixes the data corruption that
it was able to cause.

However there are two facts to take in mind.

Fact 1: Setups using chained replication, that means that certain replicas
are replicating from other replicas, up to Redis 6.0.3 can experience data
corruption. For chained replication we mean that:

    +--------+          +---------+        +-------------+
    | master |--------->| replica |-------->| sub-replica |
    +--------+          +---------+        +-------------+

People using chained replication SHOULD UPGRADE ASAP away from Redis 6.0.0,
6.0.1, 6.0.2 or 6.0.3 to Redis 6.0.4.

To be clear, people NOT using this setup, but having just replicas attached
directly to the master, SHOUDL NOT BE in danger of any problem. But we
are no longer confident on 6.0.x replication implementation complexities
so we suggest to upgrade to 6.0.4 to everybody using an older 6.0.3 release.
We just so far didn't find any bug that affects Redis 6.0.3 that does not
involve chained replication.

People starting with Redis 6.0.4 are fine. People with Redis 5 are fine.
People upgrading from Redis 5 to Redis 6.0.4 are fine.
TLDR: The problem is with users of 6.0.0, 6.0.1, 6.0.2, 6.0.3.

Fact 2: Upgrading from Redis 6.0.x to Redis 6.0.4, IF AND ONLY IF you
use chained replication, requires some extra care:

1. Once you attach your new Redis 6.0.4 instance as a replica of the current
  Redis 6.0.x master, you should wait for the first full synchronization,
  then you should promote it right away, if your setup involves chained
  replication. Don't give it the time to do a new partial synchronization
  in the case the link between the master and the replica  will break in
  the mean time.

2. As an additional care, you may want to set the replication ping period
  to a very large value (for instance 1000000) using the following command:

      CONFIG SET repl-ping-replica-period 1000000

  Note that if you do "1" with care, "2" is not needed.
  However if you do it, make sure to later restore it to its default:

      CONFIG SET repl-ping-replica-period 10

So this is the main change in Redis 6. Later we'll find a different way in
order to achieve what we wanted to achieve with the Meaningful Offset feature,
but without the same complexity.

Other changes in this release:

* PSYNC2 tests improved.
* Fix a rare active defrag edge case bug leading to stagnation
* Fix Redis 6 asserting at startup in 32 bit systems.
* Redis 6 32 bit is now added back to our testing environments.
* Fix server crash for STRALGO command,
* Implement sendfile for RDB transfer.
* TLS fixes.
* Make replication more resistant by disconnecting the master if we
  detect a protocol error. Basically we no longer accept inline protocol
  from the master.
* Other improvements in the tests.

(adam)

2020-05-28 12:02:35 UTC MAIN commitmail json YAML

doc: Removed audio/gnome-vfs-cdda

(nia)

2020-05-28 12:00:46 UTC MAIN commitmail json YAML

2020-05-28 11:56:23 UTC MAIN commitmail json YAML

doc: Removed sysutils/gnome-vfs-monikers

(nia)

2020-05-28 11:55:35 UTC MAIN commitmail json YAML

2020-05-28 11:53:14 UTC MAIN commitmail json YAML

Updated devel/protobuf, devel/py-protobuf

(adam)

2020-05-28 11:52:13 UTC MAIN commitmail json YAML

protobuf py-protobuf: updated to 3.12.2

Protocol Buffers v3.12.2

C++
Simplified the template export macros to fix the build for mingw32.

(adam)

2020-05-28 11:49:24 UTC MAIN commitmail json YAML

doc: Removed www/browser-bookmarks-menu

(nia)

2020-05-28 11:39:41 UTC MAIN commitmail json YAML

2020-05-28 11:13:30 UTC MAIN commitmail json YAML

doc: Updated net/rclone to 1.52.0

(leot)

2020-05-28 11:13:17 UTC MAIN commitmail json YAML

rclone: Update to 1.52.0

pkgsrc changes:
- Update patches due file renames

Changes:
1.52.0
------
Special thanks to Martin Michlmayr for proof reading and correcting all
the docs and Edward Barker for helping re-write the front page.

* New backends
  * Tardigrade backend for use with storj.io (Caleb Case)
  * Union re-write to have multiple writable remotes (Max Sum)
  * Seafile for Seafile server (Fred @creativeprojects)
* New commands
  * backend: command for backend specific commands (see backends)
    (Nick Craig-Wood)
  * cachestats: Deprecate in favour of `rclone backend stats cache:`
    (Nick Craig-Wood)
  * dbhashsum: Deprecate in favour of `rclone hashsum DropboxHash` (Nick Craig-Wood)
* New Features
  * Add `--header-download` and `--header-upload` flags for setting
    HTTP headers when uploading/downloading (Tim Gallant)
  * Add `--header` flag to add HTTP headers to every HTTP transaction
    (Nick Craig-Wood)
  * Add `--check-first` to do all checking before starting transfers
    (Nick Craig-Wood)
  * Add `--track-renames-strategy` for configurable matching criteria for
    `--track-renames` (Bernd Schoolmann)
  * Add `--cutoff-mode` hard,soft,catious (Shing Kit Chan & Franklyn Tackitt)
  * Filter flags (eg `--files-from -`) can read from stdin (fishbullet)
  * Add `--error-on-no-transfer` option (Jon Fautley)
  * Implement `--order-by xxx,mixed` for copying some small and some big
    files (Nick Craig-Wood)
  * Allow `--max-backlog` to be negative meaning as large as possible
    (Nick Craig-Wood)
  * Added `--no-unicode-normalization` flag to allow Unicode filenames to
    remain unique (Ben Zenker)
  * Allow `--min-age`/`--max-age` to take a date as well as a duration
    (Nick Craig-Wood)
  * Add rename statistics for file and directory renames (Nick Craig-Wood)
  * Add statistics output to JSON log (reddi)
  * Make stats be printed on non-zero exit code (Nick Craig-Wood)
  * When running `--password-command` allow use of stdin (Sébastien Gross)
  * Stop empty strings being a valid remote path (Nick Craig-Wood)
  * accounting: support WriterTo for less memory copying (Nick Craig-Wood)
  * build
    * Update to use go1.14 for the build (Nick Craig-Wood)
    * Add `-trimpath` to release build for reproduceable builds
      (Nick Craig-Wood)
    * Remove GOOS and GOARCH from Dockerfile (Brandon Philips)
  * config
    * Fsync the config file after writing to save more reliably
      (Nick Craig-Wood)
    * Add `--obscure` and `--no-obscure` flags to `config create`/`update`
      (Nick Craig-Wood)
    * Make `config show` take `remote:` as well as `remote` (Nick Craig-Wood)
  * copyurl: Add `--no-clobber` flag (Denis)
  * delete: Added `--rmdirs` flag to delete directories as well (Kush)
  * filter: Added `--files-from-raw` flag (Ankur Gupta)
  * genautocomplete: Add support for fish shell (Matan Rosenberg)
  * log: Add support for syslog LOCAL facilities (Patryk Jakuszew)
  * lsjson: Add `--hash-type` parameter and use it in lsf to speed up
    hashing (Nick Craig-Wood)
  * rc
    * Add `-o`/`--opt` and `-a`/`--arg` for more structured input
      (Nick Craig-Wood)
    * Implement `backend/command` for running backend specific commands
      remotely (Nick Craig-Wood)
    * Add `mount/mount` command for starting `rclone mount` via the
      API (Chaitanya)
  * rcd: Add Prometheus metrics support (Gary Kim)
  * serve http
    * Added a `--template` flag for user defined markup (calistri)
    * Add Last-Modified headers to files and directories (Nick Craig-Wood)
  * serve sftp: Add support for multiple host keys by repeating `--key` flag
    (Maxime Suret)
  * touch: Add `--localtime` flag to make `--timestamp` localtime not UTC
    (Nick Craig-Wood)
* Bug Fixes
  * accounting
    * Restore "Max number of stats groups reached" log line (MichaÅ‚ Matczuk)
    * Correct exitcode on Transfer Limit Exceeded flag. (Anuar Serdaliyev)
    * Reset bytes read during copy retry (Ankur Gupta)
    * Fix race clearing stats (Nick Craig-Wood)
  * copy: Only create empty directories when they don't exist on the remote
    (Ishuah Kariuki)
  * dedupe: Stop dedupe deleting files with identical IDs (Nick Craig-Wood)
  * oauth
    * Use custom http client so that `--no-check-certificate` is honored by
      oauth token fetch (Mark Spieth)
    * Replace deprecated oauth2.NoContext (Lars Lehtonen)
  * operations
    * Fix setting the timestamp on Windows for multithread copy
      (Nick Craig-Wood)
    * Make rcat obey `--ignore-checksum` (Nick Craig-Wood)
    * Make `--max-transfer` more accurate (Nick Craig-Wood)
  * rc
    * Fix dropped error (Lars Lehtonen)
    * Fix misplaced http server config (Xiaoxing Ye)
    * Disable duplicate log (ElonH)
  * serve dlna
    * Cds: don't specify childCount at all when unknown (Dan Walters)
    * Cds: use modification time as date in dlna metadata (Dan Walters)
  * serve restic: Fix tests after restic project removed vendoring
    (Nick Craig-Wood)
  * sync
    * Fix incorrect "nothing to transfer" message using `--delete-before`
      (Nick Craig-Wood)
    * Only create empty directories when they don't exist on the remote
      (Ishuah Kariuki)
* Mount
  * Add `--async-read` flag to disable asynchronous reads (Nick Craig-Wood)
  * Ignore `--allow-root` flag with a warning as it has been removed upstream
    (Nick Craig-Wood)
  * Warn if `--allow-non-empty` used on Windows and clarify docs
    (Nick Craig-Wood)
  * Constrain to go1.13 or above otherwise bazil.org/fuse fails to compile
    (Nick Craig-Wood)
  * Fix fail because of too long volume name (evileye)
  * Report 1PB free for unknown disk sizes (Nick Craig-Wood)
  * Map more rclone errors into file systems errors (Nick Craig-Wood)
  * Fix disappearing cwd problem (Nick Craig-Wood)
  * Use ReaddirPlus on Windows to improve directory listing performance (Nick Craig-Wood)
  * Send a hint as to whether the filesystem is case insensitive or not (Nick Craig-Wood)
  * Add rc command `mount/types` (Nick Craig-Wood)
  * Change maximum leaf name length to 1024 bytes (Nick Craig-Wood)
* VFS
  * Add `--vfs-read-wait` and `--vfs-write-wait` flags to control time
    waiting for a sequential read/write (Nick Craig-Wood)
  * Change default `--vfs-read-wait` to 20ms (it was 5ms and not configurable)
    (Nick Craig-Wood)
  * Make `df` output more consistent on a rclone mount. (Yves G)
  * Report 1PB free for unknown disk sizes (Nick Craig-Wood)
  * Fix race condition caused by unlocked reading of Dir.path (Nick Craig-Wood)
  * Make File lock and Dir lock not overlap to avoid deadlock (Nick Craig-Wood)
  * Implement lock ordering between File and Dir to eliminate deadlocks
    (Nick Craig-Wood)
  * Factor the vfs cache into its own package (Nick Craig-Wood)
  * Pin the Fs in use in the Fs cache (Nick Craig-Wood)
  * Add SetSys() methods to Node to allow caching stuff on a node
    (Nick Craig-Wood)
  * Ignore file not found errors from Hash in Read.Release (Nick Craig-Wood)
  * Fix hang in read wait code (Nick Craig-Wood)
* Local
  * Speed up multi thread downloads by using sparse files on Windows
    (Nick Craig-Wood)
  * Implement `--local-no-sparse` flag for disabling sparse files
    (Nick Craig-Wood)
  * Implement `rclone backend noop` for testing purposes (Nick Craig-Wood)
  * Fix "file not found" errors on post transfer Hash calculation
    (Nick Craig-Wood)
* Cache
  * Implement `rclone backend stats` command (Nick Craig-Wood)
  * Fix Server Side Copy with Temp Upload (Brandon McNama)
  * Remove Unused Functions (Lars Lehtonen)
  * Disable race tests until bbolt is fixed (Nick Craig-Wood)
  * Move methods used for testing into test file (greatroar)
  * Add Pin and Unpin and canonicalised lookup (Nick Craig-Wood)
  * Use proper import path go.etcd.io/bbolt (Robert-André Mauchin)
* Crypt
  * Calculate hashes for uploads from local disk (Nick Craig-Wood)
      * This allows crypted Jottacloud uploads without using local disk
      * This means crypted s3/b2 uploads will now have hashes
  * Added `rclone backend decode`/`encode` commands to replicate functionality
    of `cryptdecode` (Anagh Kumar Baranwal)
  * Get rid of the unused Cipher interface as it obfuscated the code
    (Nick Craig-Wood)
* Azure Blob
  * Implement streaming of unknown sized files so `rcat` is now supported
    (Nick Craig-Wood)
  * Implement memory pooling to control memory use (Nick Craig-Wood)
  * Add `--azureblob-disable-checksum` flag (Nick Craig-Wood)
  * Retry `InvalidBlobOrBlock` error as it may indicate block concurrency
    problems (Nick Craig-Wood)
  * Remove unused `Object.parseTimeString()` (Lars Lehtonen)
  * Fix permission error on SAS URL limited to container (Nick Craig-Wood)
* B2
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Ignore directory markers at the root also (Nick Craig-Wood)
  * Force the case of the SHA1 to lowercase (Nick Craig-Wood)
  * Remove unused `largeUpload.clearUploadURL()` (Lars Lehtonen)
* Box
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Implement About to read size used (Nick Craig-Wood)
  * Add token renew function for jwt auth (David Bramwell)
  * Added support for interchangeable root folder for Box backend (Sunil Patra)
  * Remove unnecessary iat from jws claims (David)
* Drive
  * Follow shortcuts by default, skip with `--drive-skip-shortcuts`
    (Nick Craig-Wood)
  * Implement `rclone backend shortcut` command for creating shortcuts
    (Nick Craig-Wood)
  * Added `rclone backend` command to change `service_account_file` and
    `chunk_size` (Anagh Kumar Baranwal)
  * Fix missing files when using `--fast-list` and `--drive-shared-with-me`
    (Nick Craig-Wood)
  * Fix duplicate items when using `--drive-shared-with-me` (Nick Craig-Wood)
  * Extend `--drive-stop-on-upload-limit` to respond to
    `teamDriveFileLimitExceeded`. (harry)
  * Don't delete files with multiple parents to avoid data loss
    (Nick Craig-Wood)
  * Server side copy docs use default description if empty (Nick Craig-Wood)
* Dropbox
  * Make error insufficient space to be fatal (harry)
  * Add info about required redirect url (Elan Ruusamäe)
* Fichier
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Implement custom pacer to deal with the new rate limiting (buengese)
* FTP
  * Fix lockup when using concurrency limit on failed connections
    (Nick Craig-Wood)
  * Fix lockup on failed upload when using concurrency limit (Nick Craig-Wood)
  * Fix lockup on Close failures when using concurrency limit (Nick Craig-Wood)
  * Work around pureftp sending spurious 150 messages (Nick Craig-Wood)
* Google Cloud Storage
  * Add support for `--header-upload` and `--header-download` (Nick Craig-Wood)
  * Add `ARCHIVE` storage class to help (Adam Stroud)
  * Ignore directory markers at the root (Nick Craig-Wood)
* Googlephotos
  * Make the start year configurable (Daven)
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Create feature/favorites directory (Brandon Philips)
  * Fix "concurrent map write" error (Nick Craig-Wood)
  * Don't put an image in error message (Nick Craig-Wood)
* HTTP
  * Improved directory listing with new template from Caddy project (calisro)
* Jottacloud
  * Implement `--jottacloud-trashed-only` (buengese)
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Use `RawURLEncoding` when decoding base64 encoded login token (buengese)
  * Implement cleanup (buengese)
  * Update docs regarding cleanup, removed remains from old auth, and added
    warning about special mountpoints. (albertony)
* Mailru
  * Describe 2FA requirements (valery1707)
* Onedrive
  * Implement `--onedrive-server-side-across-configs` (Nick Craig-Wood)
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Fix occasional 416 errors on multipart uploads (Nick Craig-Wood)
  * Added maximum chunk size limit warning in the docs (Harry)
  * Fix missing drive on config (Nick Craig-Wood)
  * Make error `quotaLimitReached` to be fatal (harry)
* Opendrive
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
* Pcloud
  * Added support for interchangeable root folder for pCloud backend
    (Sunil Patra)
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Fix initial config "Auth state doesn't match" message (Nick Craig-Wood)
* Premiumizeme
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Prune unused functions (Lars Lehtonen)
* Putio
  * Add support for `--header-upload` and `--header-download` (Nick Craig-Wood)
  * Make downloading files use the rclone http Client (Nick Craig-Wood)
  * Fix parsing of remotes with leading and trailing / (Nick Craig-Wood)
* Qingstor
  * Make `rclone cleanup` remove pending multipart uploads older than 24h
    (Nick Craig-Wood)
  * Try harder to cancel failed multipart uploads (Nick Craig-Wood)
  * Prune `multiUploader.list()` (Lars Lehtonen)
  * Lint fix (Lars Lehtonen)
* S3
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Use memory pool for buffer allocations (Maciej Zimnoch)
  * Add SSE-C support for AWS, Ceph, and MinIO (Jack Anderson)
  * Fail fast multipart upload (MichaÅ‚ Matczuk)
  * Report errors on bucket creation (mkdir) correctly (Nick Craig-Wood)
  * Specify that Minio supports URL encoding in listings (Nick Craig-Wood)
  * Added 500 as retryErrorCode (MichaÅ‚ Matczuk)
  * Use `--low-level-retries` as the number of SDK retries
    (Aleksandar Janković)
  * Fix multipart abort context (Aleksandar Jankovic)
  * Replace deprecated `session.New()` with `session.NewSession()`
    (Lars Lehtonen)
  * Use the provided size parameter when allocating a new memory pool
    (Joachim Brandon LeBlanc)
  * Use rclone's low level retries instead of AWS SDK to fix listing retries
    (Nick Craig-Wood)
  * Ignore directory markers at the root also (Nick Craig-Wood)
  * Use single memory pool (MichaÅ‚ Matczuk)
  * Do not resize buf on put to memBuf (MichaÅ‚ Matczuk)
  * Improve docs for `--s3-disable-checksum` (Nick Craig-Wood)
  * Don't leak memory or tokens in edge cases for multipart upload
    (Nick Craig-Wood)
* Seafile
  * Implement 2FA (Fred)
* SFTP
  * Added `--sftp-pem-key` to support inline key files (calisro)
  * Fix post transfer copies failing with 0 size when using
    `set_modtime=false` (Nick Craig-Wood)
* Sharefile
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
* Sugarsync
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
* Swift
  * Add support for `--header-upload` and `--header-download` (Nick Craig-Wood)
  * Fix cosmetic issue in error message (Martin Michlmayr)
* Union
  * Implement multiple writable remotes (Max Sum)
  * Fix server-side copy (Max Sum)
  * Implement ListR (Max Sum)
  * Enable ListR when upstreams contain local (Max Sum)
* WebDAV
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)
  * Fix `X-OC-Mtime` header for Transip compatibility (Nick Craig-Wood)
  * Report full and consistent usage with `about` (Yves G)
* Yandex
  * Add support for `--header-upload` and `--header-download` (Tim Gallant)

(leot)

2020-05-28 10:44:59 UTC MAIN commitmail json YAML

doc: Updated games/easyrpg-player to 0.6.2.1

(nia)

2020-05-28 10:44:48 UTC MAIN commitmail json YAML

2020-05-28 10:26:19 UTC MAIN commitmail json YAML

doc: Updated audio/fluidsynth to 2.1.3

(nia)

2020-05-28 10:25:58 UTC MAIN commitmail json YAML

fluidsynth: Update to 2.1.3

Changes:

- fix a cross-compilation failure from Win32 to WinARM
- fix issues while fluid_player is seeking
- fix a NULL pointer dereference if synth.dynamic-sample-loading is enabled
- fix a NULL pointer dereference in delete_rvoice_mixer_threads()
- fix a NULL pointer dereference in the soundfont loader
- fix dsound driver playing garbage when terminating fluidsynth
- avoid memory leaks when using libinstpatch

(nia)

2020-05-28 09:16:55 UTC MAIN commitmail json YAML

woof: add missing pkg-config tool

(wiz)

2020-05-28 07:53:14 UTC MAIN commitmail json YAML

doc: Updated devel/pcre2 to 10.35nb1

(wiz)

2020-05-28 07:53:05 UTC MAIN commitmail json YAML

pcre2: update to 10.35nb1.

Fix cleanup alloc_chunk() in sljitProtExec for NetBSD using upstream
patch.

(wiz)

2020-05-28 06:17:02 UTC MAIN commitmail json YAML

time: reorder

(markd)

2020-05-28 06:15:51 UTC MAIN commitmail json YAML

print: reorder

(markd)

2020-05-27 19:37:44 UTC MAIN commitmail json YAML

2020-05-27 15:03:06 UTC MAIN commitmail json YAML

Updated security/py-nacl, devel/py-test-cov

(adam)

2020-05-27 15:02:39 UTC MAIN commitmail json YAML

py-test-cov: updated to 2.9.0

2.9.0:
* Fixed ``RemovedInPytest4Warning`` when using Pytest 3.10.
* Made pytest startup faster when plugin not active by lazy-importing.
* Various CI improvements.
* Various Python support updates (drop EOL 3.4, test against 3.8 final).
* Changed ``--cov-append`` to always enable ``data_suffix`` (a coverage setting).
  Contributed by Harm Geerts in
* Changed ``--cov-append`` to handle loading previous data better
  (fixes various path aliasing issues).
* Various other testing improvements, github issue templates, example updates.
* Fixed internal failures that are caused by tests that change the current working directory by
  ensuring a consistent working directory when coverage is called.

(adam)

2020-05-27 15:01:08 UTC MAIN commitmail json YAML

py-nacl: updated to 1.4.0

1.4.0:
* Update ``libsodium`` to 1.0.18.
* **BACKWARDS INCOMPATIBLE:** We no longer distribute 32-bit ``manylinux1``
  wheels. Continuing to produce them was a maintenance burden.
* Added support for Python 3.8, and removed support for Python 3.4.
* Add low level bindings for extracting the seed and the public key
  from crypto_sign_ed25519 secret key
* Add low level bindings for deterministic random generation.
* Add ``wheel`` and ``setuptools`` setup_requirements in ``setup.py``
* Fix checks on very slow builders
* Add low-level bindings to ed25519 arithmetic functions
* Update low-level blake2b state implementation
* Fix wrong short-input behavior of SealedBox.decrypt()
* Raise CryptPrefixError exception instead of InvalidkeyError when trying
  to check a password against a verifier stored in a unknown format
* Add support for minimal builds of libsodium. Trying to call functions
  not available in a minimal build will raise an UnavailableError
  exception. To compile a minimal build of the bundled libsodium, set
  the SODIUM_INSTALL_MINIMAL environment variable to any non-empty
  string (e.g. ``SODIUM_INSTALL_MINIMAL=1``) for setup.

(adam)

2020-05-27 14:56:37 UTC MAIN commitmail json YAML

Updated www/py-meinheld, sysutils/py-supervisor

(adam)

2020-05-27 14:56:16 UTC MAIN commitmail json YAML

py-supervisor: updated to 4.2.0

4.2.0:

- When ``supervisord`` is run in the foreground, a new ``--silent`` option
  suppresses the main log from being echoed to ``stdout`` as it normally
  would.

- Parsing ``command=`` now supports a new expansion, ``%(numprocs)d``, that
  expands to the value of ``numprocs=`` in the same section.

- Web UI buttons no longer use background images.

- The Web UI now has a link to view ``tail -f stderr`` for a process in
  addition to the existing ``tail -f stdout`` link.  Based on a
  patch by OuroborosCoding.

- The HTTP server will now send an ``X-Accel-Buffering: no`` header in
  logtail responses to fix Nginx proxy buffering.

- When ``supervisord`` reaps an unknown PID, it will now log a description
  of the ``waitpid`` status.

- Fixed a bug introduced in 4.0.3 where ``supervisorctl tail -f foo | grep bar``
  would fail with the error ``NoneType object has no attribute 'lower'``.  This
  only occurred on Python 2.7 and only when piped.

(adam)

2020-05-27 14:53:46 UTC MAIN commitmail json YAML

py-meinheld: updated to 1.0.2

1.0.2
* Fix: HTTP Request Smuggling

(adam)

2020-05-27 14:33:02 UTC MAIN commitmail json YAML

doc: Updated net/knot to 2.9.5

(ryoon)

2020-05-27 14:32:02 UTC MAIN commitmail json YAML

knot: Update to 2.9.5

Changelog:
Monday, May 25, 2020
Bugfixes:
        Old ZSK can be withdrawn too early during a ZSK rollover if maximum zone TTL is computed automatically
        Server responds SERVFAIL to ANY queries on empty non-terminal nodes

Improvements:
        Also module onlinesign returns minimized responses to ANY queries
        Linking against libcap-ng can be disabled via a configure option

(ryoon)

2020-05-27 14:20:42 UTC MAIN commitmail json YAML

Updated devel/py-modulegraph, devel/py-rope

(adam)

2020-05-27 14:20:24 UTC MAIN commitmail json YAML

py-rope: updated to 0.17.0

New release 0.17.0:
Make tests compatible with Python 3.8
Use context manager for open()
Don窶冲 use UserDict (!!!) and collections.MutableMapping.
assertEquals has been deprecated for long time (-> assertEqual)
Remove weird escpaing of 's' character, which is the syntax error these days.
Add testing for Python 3.8 as well
Fix pattern for matching short strings
Work with deprecated types and using aliased ones.
Don't use underscored _ast, but use ast instead
Direct import from collections is getting deprecated.
Use .is_alive method instead of a deprecated .isAlive in threading.Thread
Fix simple typo: sitaution -> situation
Two more assertEquals happened.

(adam)

2020-05-27 14:14:47 UTC MAIN commitmail json YAML

py-modulegraph: updated to 0.18

0.18
* Avoid exception when one of the items on "packages" is not a package
  (modulegraph.find_modules.find_needed_modules)
* ``Modulegraph.foldReferences()`` called the wrong method

(adam)

2020-05-27 14:00:21 UTC MAIN commitmail json YAML

security/openssh

(sevan)

2020-05-27 13:49:27 UTC MAIN commitmail json YAML

Update to OpenSSH 8.3

OpenSSH 8.3 was released on 2020-05-27. It is available from the
mirrors listed at https://www.openssh.com/.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
https://www.openssh.com/donations.html

Future deprecation notice
=========================

It is now possible[1] to perform chosen-prefix attacks against the
SHA-1 algorithm for less than USD$50K. For this reason, we will be
disabling the "ssh-rsa" public key signature algorithm by default in a
near-future release.

This algorithm is unfortunately still used widely despite the
existence of better alternatives, being the only remaining public key
signature algorithm specified by the original SSH RFCs.

The better alternatives include:

* The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
  algorithms have the advantage of using the same key type as
  "ssh-rsa" but use the safe SHA-2 hash algorithms. These have been
  supported since OpenSSH 7.2 and are already used by default if the
  client and server support them.

* The ssh-ed25519 signature algorithm. It has been supported in
  OpenSSH since release 6.5.

* The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These
  have been supported by OpenSSH since release 5.7.

To check whether a server is using the weak ssh-rsa public key
algorithm, for host authentication, try to connect to it after
removing the ssh-rsa algorithm from ssh(1)'s allowed list:

    ssh -oHostKeyAlgorithms=-ssh-rsa user@host

If the host key verification fails and no other supported host key
types are available, the server software on that host should be
upgraded.

A future release of OpenSSH will enable UpdateHostKeys by default
to allow the client to automatically migrate to better algorithms.
Users may consider enabling this option manually. Vendors of devices
that implement the SSH protocol should ensure that they support the
new signature algorithms for RSA keys.

[1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
    Application to the PGP Web of Trust" Leurent, G and Peyrin, T
    (2020) https://eprint.iacr.org/2020/014.pdf

Security
========

* scp(1): when receiving files, scp(1) could be become desynchronised
  if a utimes(2) system call failed. This could allow file contents
  to be interpreted as file metadata and thereby permit an adversary
  to craft a file system that, when copied with scp(1) in a
  configuration that caused utimes(2) to fail (e.g. under a SELinux
  policy or syscall sandbox), transferred different file names and
  contents to the actual file system layout.

  Exploitation of this is not likely as utimes(2) does not fail under
  normal circumstances. Successful exploitation is not silent - the
  output of scp(1) would show transfer errors followed by the actual
  file(s) that were received.

  Finally, filenames returned from the peer are (since openssh-8.0)
  matched against the user's requested destination, thereby
  disallowing a successful exploit from writing files outside the
  user's selected target glob (or directory, in the case of a
  recursive transfer). This ensures that this attack can achieve no
  more than a hostile peer is already able to achieve within the scp
  protocol.

Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

* sftp(1): reject an argument of "-1" in the same way as ssh(1) and
  scp(1) do instead of accepting and silently ignoring it.

Changes since OpenSSH 8.2
=========================

The focus of this release is bug fixing.

New Features
------------

* sshd(8): make IgnoreRhosts a tri-state option: "yes" to ignore
  rhosts/shosts, "no" allow rhosts/shosts or (new) "shosts-only"
  to allow .shosts files but not .rhosts.

* sshd(8): allow the IgnoreRhosts directive to appear anywhere in a
  sshd_config, not just before any Match blocks; bz3148

* ssh(1): add %TOKEN percent expansion for the LocalFoward and
  RemoteForward keywords when used for Unix domain socket forwarding.
  bz#3014

* all: allow loading public keys from the unencrypted envelope of a
  private key file if no corresponding public key file is present.

* ssh(1), sshd(8): prefer to use chacha20 from libcrypto where
  possible instead of the (slower) portable C implementation included
  in OpenSSH.

* ssh-keygen(1): add ability to dump the contents of a binary key
  revocation list via "ssh-keygen -lQf /path" bz#3132

Bugfixes
--------

* ssh(1): fix IdentitiesOnly=yes to also apply to keys loaded from
  a PKCS11Provider; bz#3141

* ssh-keygen(1): avoid NULL dereference when trying to convert an
  invalid RFC4716 private key.

* scp(1): when performing remote-to-remote copies using "scp -3",
  start the second ssh(1) channel with BatchMode=yes enabled to
  avoid confusing and non-deterministic ordering of prompts.

* ssh(1), ssh-keygen(1): when signing a challenge using a FIDO token,
  perform hashing of the message to be signed in the middleware layer
  rather than in OpenSSH code. This permits the use of security key
  middlewares that perform the hashing implicitly, such as Windows
  Hello.

* ssh(1): fix incorrect error message for "too many known hosts
  files." bz#3149

* ssh(1): make failures when establishing "Tunnel" forwarding
  terminate the connection when ExitOnForwardFailure is enabled;
  bz#3116

* ssh-keygen(1): fix printing of fingerprints on private keys and add
  a regression test for same.

* sshd(8): document order of checking AuthorizedKeysFile (first) and
  AuthorizedKeysCommand (subsequently, if the file doesn't match);
  bz#3134

* sshd(8): document that /etc/hosts.equiv and /etc/shosts.equiv are
  not considered for HostbasedAuthentication when the target user is
  root; bz#3148

* ssh(1), ssh-keygen(1): fix NULL dereference in private certificate
  key parsing (oss-fuzz #20074).

* ssh(1), sshd(8): more consistency between sets of %TOKENS are
  accepted in various configuration options.

* ssh(1), ssh-keygen(1): improve error messages for some common
  PKCS#11 C_Login failure cases; bz#3130

* ssh(1), sshd(8): make error messages for problems during SSH banner
  exchange consistent with other SSH transport-layer error messages
  and ensure they include the relevant IP addresses bz#3129

* various: fix a number of spelling errors in comments and debug/error
  messages

* ssh-keygen(1), ssh-add(1): when downloading FIDO2 resident keys
  from a token, don't prompt for a PIN until the token has told us
  that it needs one. Avoids double-prompting on devices that
  implement on-device authentication.

* sshd(8), ssh-keygen(1): no-touch-required FIDO certificate option
  should be an extension, not a critical option.

* ssh(1), ssh-keygen(1), ssh-add(1): offer a better error message
  when trying to use a FIDO key function and SecurityKeyProvider is
  empty.

* ssh-add(1), ssh-agent(8): ensure that a key lifetime fits within
  the values allowed by the wire format (u32). Prevents integer
  wraparound of the timeout values. bz#3119

* ssh(1): detect and prevent trivial configuration loops when using
    ProxyJump. bz#3057.

Portability
-----------

* Detect systems where signals flagged with SA_RESTART will interrupt
  select(2). POSIX permits implementations to choose whether
  select(2) will return when interrupted with a SA_RESTART-flagged
  signal, but OpenSSH requires interrupting behaviour.

* Several compilation fixes for HP/UX and AIX.

* On platforms that do not support setting process-wide routing
  domains (all excepting OpenBSD at present), fail to accept a
  configuration attempts to set one at process start time rather than
  fatally erroring at run time. bz#3126

* Improve detection of egrep (used in regression tests) on platforms
  that offer a poor default one (e.g. Solaris).

* A number of shell portability fixes for the regression tests.

* Fix theoretical infinite loop in the glob(3) replacement
  implementation.

* Fix seccomp sandbox compilation problems for some Linux
  configurations bz#3085

* Improved detection of libfido2 and some compilation fixes for some
  configurations when --with-security-key-builtin is selected.

OpenSSH 8.2 was released on 2020-02-14. It is available from the
mirrors listed at https://www.openssh.com/.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
https://www.openssh.com/donations.html

Future deprecation notice
=========================

It is now possible[1] to perform chosen-prefix attacks against the
SHA-1 hash algorithm for less than USD$50K. For this reason, we will
be disabling the "ssh-rsa" public key signature algorithm that depends
on SHA-1 by default in a near-future release.

This algorithm is unfortunately still used widely despite the
existence of better alternatives, being the only remaining public key
signature algorithm specified by the original SSH RFCs.

The better alternatives include:

* The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
  algorithms have the advantage of using the same key type as
  "ssh-rsa" but use the safe SHA-2 hash algorithms. These have been
  supported since OpenSSH 7.2 and are already used by default if the
  client and server support them.

* The ssh-ed25519 signature algorithm. It has been supported in
  OpenSSH since release 6.5.

* The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These
  have been supported by OpenSSH since release 5.7.

To check whether a server is using the weak ssh-rsa public key
algorithm for host authentication, try to connect to it after
removing the ssh-rsa algorithm from ssh(1)'s allowed list:

    ssh -oHostKeyAlgorithms=-ssh-rsa user@host

If the host key verification fails and no other supported host key
types are available, the server software on that host should be
upgraded.

A future release of OpenSSH will enable UpdateHostKeys by default
to allow the client to automatically migrate to better algorithms.
Users may consider enabling this option manually.

[1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
    Application to the PGP Web of Trust" Leurent, G and Peyrin, T
    (2020) https://eprint.iacr.org/2020/014.pdf

Security
========

* ssh(1), sshd(8), ssh-keygen(1): this release removes the "ssh-rsa"
  (RSA/SHA1) algorithm from those accepted for certificate signatures
  (i.e. the client and server CASignatureAlgorithms option) and will
  use the rsa-sha2-512 signature algorithm by default when the
  ssh-keygen(1) CA signs new certificates.

  Certificates are at special risk to the aforementioned SHA1
  collision vulnerability as an attacker has effectively unlimited
  time in which to craft a collision that yields them a valid
  certificate, far more than the relatively brief LoginGraceTime
  window that they have to forge a host key signature.

  The OpenSSH certificate format includes a CA-specified (typically
  random) nonce value near the start of the certificate that should
  make exploitation of chosen-prefix collisions in this context
  challenging, as the attacker does not have full control over the
  prefix that actually gets signed. Nonetheless, SHA1 is now a
  demonstrably broken algorithm and futher improvements in attacks
  are highly likely.

  OpenSSH releases prior to 7.2 do not support the newer RSA/SHA2
  algorithms and will refuse to accept certificates signed by an
  OpenSSH 8.2+ CA using RSA keys unless the unsafe algorithm is
  explicitly selected during signing ("ssh-keygen -t ssh-rsa").
  Older clients/servers may use another CA key type such as
  ssh-ed25519 (supported since OpenSSH 6.5) or one of the
  ecdsa-sha2-nistp256/384/521 types (supported since OpenSSH 5.7)
  instead if they cannot be upgraded.

Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

* ssh(1), sshd(8): the above removal of "ssh-rsa" from the accepted
  CASignatureAlgorithms list.

* ssh(1), sshd(8): this release removes diffie-hellman-group14-sha1
  from the default key exchange proposal for both the client and
  server.

* ssh-keygen(1): the command-line options related to the generation
  and screening of safe prime numbers used by the
  diffie-hellman-group-exchange-* key exchange algorithms have
  changed. Most options have been folded under the -O flag.

* sshd(8): the sshd listener process title visible to ps(1) has
  changed to include information about the number of connections that
  are currently attempting authentication and the limits configured
  by MaxStartups.

* ssh-sk-helper(8): this is a new binary. It is used by the FIDO/U2F
  support to provide address-space isolation for token middleware
  libraries (including the internal one). It needs to be installed
  in the expected path, typically under /usr/libexec or similar.

Changes since OpenSSH 8.1
=========================

This release contains some significant new features.

FIDO/U2F Support
----------------

This release adds support for FIDO/U2F hardware authenticators to
OpenSSH. U2F/FIDO are open standards for inexpensive two-factor
authentication hardware that are widely used for website
authentication.  In OpenSSH FIDO devices are supported by new public
key types "ecdsa-sk" and "ed25519-sk", along with corresponding
certificate types.

ssh-keygen(1) may be used to generate a FIDO token-backed key, after
which they may be used much like any other key type supported by
OpenSSH, so long as the hardware token is attached when the keys are
used. FIDO tokens also generally require the user explicitly authorise
operations by touching or tapping them.

Generating a FIDO key requires the token be attached, and will usually
require the user tap the token to confirm the operation:

  $ ssh-keygen -t ecdsa-sk -f ~/.ssh/id_ecdsa_sk
  Generating public/private ecdsa-sk key pair.
  You may need to touch your security key to authorize key generation.
  Enter file in which to save the key (/home/djm/.ssh/id_ecdsa_sk):
  Enter passphrase (empty for no passphrase):
  Enter same passphrase again:
  Your identification has been saved in /home/djm/.ssh/id_ecdsa_sk
  Your public key has been saved in /home/djm/.ssh/id_ecdsa_sk.pub

This will yield a public and private key-pair. The private key file
should be useless to an attacker who does not have access to the
physical token. After generation, this key may be used like any other
supported key in OpenSSH and may be listed in authorized_keys, added
to ssh-agent(1), etc. The only additional stipulation is that the FIDO
token that the key belongs to must be attached when the key is used.

FIDO tokens are most commonly connected via USB but may be attached
via other means such as Bluetooth or NFC. In OpenSSH, communication
with the token is managed via a middleware library, specified by the
SecurityKeyProvider directive in ssh/sshd_config(5) or the
$SSH_SK_PROVIDER environment variable for ssh-keygen(1) and
ssh-add(1). The API for this middleware is documented in the sk-api.h
and PROTOCOL.u2f files in the source distribution.

OpenSSH includes a middleware ("SecurityKeyProvider=internal") with
support for USB tokens. It is automatically enabled in OpenBSD and may
be enabled in portable OpenSSH via the configure flag
--with-security-key-builtin. If the internal middleware is enabled
then it is automatically used by default. This internal middleware
requires that libfido2 (https://github.com/Yubico/libfido2) and its
dependencies be installed. We recommend that packagers of portable
OpenSSH enable the built-in middleware, as it provides the
lowest-friction experience for users.

Note: FIDO/U2F tokens are required to implement the ECDSA-P256
"ecdsa-sk" key type, but hardware support for Ed25519 "ed25519-sk" is
less common. Similarly, not all hardware tokens support some of the
optional features such as resident keys.

The protocol-level changes to support FIDO/U2F keys in SSH are
documented in the PROTOCOL.u2f file in the OpenSSH source
distribution.

There are a number of supporting changes to this feature:

* ssh-keygen(1): add a "no-touch-required" option when generating
  FIDO-hosted keys, that disables their default behaviour of
  requiring a physical touch/tap on the token during authentication.
  Note: not all tokens support disabling the touch requirement.

* sshd(8): add a sshd_config PubkeyAuthOptions directive that
  collects miscellaneous public key authentication-related options
  for sshd(8). At present it supports only a single option
  "no-touch-required". This causes sshd to skip its default check for
  FIDO/U2F keys that the signature was authorised by a touch or press
  event on the token hardware.

* ssh(1), sshd(8), ssh-keygen(1): add a "no-touch-required" option
  for authorized_keys and a similar extension for certificates. This
  option disables the default requirement that FIDO key signatures
  attest that the user touched their key to authorize them, mirroring
  the similar PubkeyAuthOptions sshd_config option.

* ssh-keygen(1): add support for the writing the FIDO attestation
  information that is returned when new keys are generated via the
  "-O write-attestation=/path" option. FIDO attestation certificates
  may be used to verify that a FIDO key is hosted in trusted
  hardware. OpenSSH does not currently make use of this information,
  beyond optionally writing it to disk.

FIDO2 resident keys
-------------------

FIDO/U2F OpenSSH keys consist of two parts: a "key handle" part stored
in the private key file on disk, and a per-device private key that is
unique to each FIDO/U2F token and that cannot be exported from the
token hardware. These are combined by the hardware at authentication
time to derive the real key that is used to sign authentication
challenges.

For tokens that are required to move between computers, it can be
cumbersome to have to move the private key file first. To avoid this
requirement, tokens implementing the newer FIDO2 standard support
"resident keys", where it is possible to effectively retrieve the key
handle part of the key from the hardware.

OpenSSH supports this feature, allowing resident keys to be generated
using the ssh-keygen(1) "-O resident" flag. This will produce a
public/private key pair as usual, but it will be possible to retrieve
the private key part from the token later. This may be done using
"ssh-keygen -K", which will download all available resident keys from
the tokens attached to the host and write public/private key files
for them. It is also possible to download and add resident keys
directly to ssh-agent(1) without writing files to the file-system
using "ssh-add -K".

Resident keys are indexed on the token by the application string and
user ID. By default, OpenSSH uses an application string of "ssh:" and
an empty user ID. If multiple resident keys on a single token are
desired then it may be necessary to override one or both of these
defaults using the ssh-keygen(1) "-O application=" or "-O user="
options. Note: OpenSSH will only download and use resident keys whose
application string begins with "ssh:"

Storing both parts of a key on a FIDO token increases the likelihood
of an attacker being able to use a stolen token device. For this
reason, tokens should enforce PIN authentication before allowing
download of keys, and users should set a PIN on their tokens before
creating any resident keys.

Other New Features
------------------

* sshd(8): add an Include sshd_config keyword that allows including
  additional configuration files via glob(3) patterns. bz2468

* ssh(1)/sshd(8): make the LE (low effort) DSCP code point available
  via the IPQoS directive; bz2986,

* ssh(1): when AddKeysToAgent=yes is set and the key contains no
  comment, add the key to the agent with the key's path as the
  comment. bz2564

* ssh-keygen(1), ssh-agent(1): expose PKCS#11 key labels and X.509
  subjects as key comments, rather than simply listing the PKCS#11
  provider library path. PR138

* ssh-keygen(1): allow PEM export of DSA and ECDSA keys; bz3091

* ssh(1), sshd(8): make zlib compile-time optional, available via the
  Makefile.inc ZLIB flag on OpenBSD or via the --with-zlib configure
  option for OpenSSH portable.

* sshd(8): when clients get denied by MaxStartups, send a
  notification prior to the SSH2 protocol banner according to
  RFC4253 section 4.2.

* ssh(1), ssh-agent(1): when invoking the $SSH_ASKPASS prompt
  program, pass a hint to the program to describe the type of
  desired prompt.  The possible values are "confirm" (indicating
  that a yes/no confirmation dialog with no text entry should be
  shown), "none" (to indicate an informational message only), or
  blank for the original ssh-askpass behaviour of requesting a
  password/phrase.

* ssh(1): allow forwarding a different agent socket to the path
  specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent
  option to accepting an explicit path or the name of an environment
  variable in addition to yes/no.

* ssh-keygen(1): add a new signature operations "find-principals" to
  look up the principal associated with a signature from an allowed-
  signers file.

* sshd(8): expose the number of currently-authenticating connections
  along with the MaxStartups limit in the process title visible to
  "ps".

Bugfixes
--------

* sshd(8): make ClientAliveCountMax=0 have sensible semantics: it
  will now disable connection killing entirely rather than the
  current behaviour of instantly killing the connection after the
  first liveness test regardless of success. bz2627

* sshd(8): clarify order of AllowUsers / DenyUsers vs AllowGroups /
  DenyGroups in the sshd(8) manual page. bz1690

* sshd(8): better describe HashKnownHosts in the manual page. bz2560

* sshd(8): clarify that that permitopen=/PermitOpen do no name or
  address translation in the manual page. bz3099

* sshd(8): allow the UpdateHostKeys feature to function when
  multiple known_hosts files are in use. When updating host keys,
  ssh will now search subsequent known_hosts files, but will add
  updated host keys to the first specified file only. bz2738

* All: replace all calls to signal(2) with a wrapper around
  sigaction(2). This wrapper blocks all other signals during the
  handler preventing races between handlers, and sets SA_RESTART
  which should reduce the potential for short read/write operations.

* sftp(1): fix a race condition in the SIGCHILD handler that could
  turn in to a kill(-1); bz3084

* sshd(8): fix a case where valid (but extremely large) SSH channel
  IDs were being incorrectly rejected. bz3098

* ssh(1): when checking host key fingerprints as answers to new
  hostkey prompts, ignore whitespace surrounding the fingerprint
  itself.

* All: wait for file descriptors to be readable or writeable during
  non-blocking connect, not just readable. Prevents a timeout when
  the server doesn't immediately send a banner (e.g. multiplexers
  like sslh)

* sshd_config(5): document the sntrup4591761x25519-sha512@tinyssh.org
  key exchange algorithm. PR#151

Portability
-----------

* sshd(8): multiple adjustments to the Linux seccomp sandbox:
  - Non-fatally deny IPC syscalls in sandbox
  - Allow clock_gettime64() in sandbox (MIPS / glibc >= 2.31)
  - Allow clock_nanosleep_time64 in sandbox (ARM) bz3100
  - Allow clock_nanosleep() in sandbox (recent glibc) bz3093

* Explicit check for memmem declaration and fix up declaration if the
  system headers lack it. bz3102

OpenSSH 8.1 was released on 2019-10-09. It is available from the
mirrors listed at https://www.openssh.com/.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Security
========

* ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer
  overflow bug was found in the private key parsing code for the XMSS
  key type. This key type is still experimental and support for it is
  not compiled by default. No user-facing autoconf option exists in
  portable OpenSSH to enable it. This bug was found by Adam Zabrocki
  and reported via SecuriTeam's SSD program.

* ssh(1), sshd(8), ssh-agent(1): add protection for private keys at
  rest in RAM against speculation and memory side-channel attacks like
  Spectre, Meltdown and Rambleed. This release encrypts private keys
  when they are not in use with a symmetric key that is derived from a
  relatively large "prekey" consisting of random data (currently 16KB).

Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

* ssh-keygen(1): when acting as a CA and signing certificates with
  an RSA key, default to using the rsa-sha2-512 signature algorithm.
  Certificates signed by RSA keys will therefore be incompatible
  with OpenSSH versions prior to 7.2 unless the default is
  overridden (using "ssh-keygen -t ssh-rsa -s ...").

Changes since OpenSSH 8.0
=========================

This release is focused on bug-fixing.

New Features
------------

* ssh(1): Allow %n to be expanded in ProxyCommand strings

* ssh(1), sshd(8): Allow prepending a list of algorithms to the
  default set by starting the list with the '^' character, E.g.
  "HostKeyAlgorithms ^ssh-ed25519"

* ssh-keygen(1): add an experimental lightweight signature and
  verification ability. Signatures may be made using regular ssh keys
  held on disk or stored in a ssh-agent and verified against an
  authorized_keys-like list of allowed keys. Signatures embed a
  namespace that prevents confusion and attacks between different
  usage domains (e.g. files vs email).

* ssh-keygen(1): print key comment when extracting public key from a
  private key.  bz#3052

* ssh-keygen(1): accept the verbose flag when searching for host keys
  in known hosts (i.e. "ssh-keygen -vF host") to print the matching
  host's random-art signature too. bz#3003

* All: support PKCS8 as an optional format for storage of private
  keys to disk.  The OpenSSH native key format remains the default,
  but PKCS8 is a superior format to PEM if interoperability with
  non-OpenSSH software is required, as it may use a less insecure
  key derivation function than PEM's.

Bugfixes
--------

* ssh(1): if a PKCS#11 token returns no keys then try to login and
  refetch them. Based on patch from Jakub Jelen; bz#2430

* ssh(1): produce a useful error message if the user's shell is set
  incorrectly during "match exec" processing. bz#2791

* sftp(1): allow the maximum uint32 value for the argument passed
  to -b which allows better error messages from later validation.
  bz#3050

* ssh(1): avoid pledge sandbox violations in some combinations of
  remote forwarding, connection multiplexing and ControlMaster.

* ssh-keyscan(1): include SHA2-variant RSA key algorithms in KEX
  proposal; allows ssh-keyscan to harvest keys from servers that
  disable old SHA1 ssh-rsa. bz#3029

* sftp(1): print explicit "not modified" message if a file was
  requested for resumed download but was considered already complete.
  bz#2978

* sftp(1): fix a typo and make <esc><right> move right to the
  closest end of a word just like <esc><left> moves left to the
  closest beginning of a word.

* sshd(8): cap the number of permitopen/permitlisten directives
  allowed to appear on a single authorized_keys line.

* All: fix a number of memory leaks (one-off or on exit paths).

* Regression tests: a number of fixes and improvements, including
  fixes to the interop tests, adding the ability to run most tests
  on builds that disable OpenSSL support, better support for running
  tests under Valgrind and a number of bug-fixes.

* ssh(1), sshd(8): check for convtime() refusing to accept times that
  resolve to LONG_MAX Reported by Kirk Wolf bz2977

* ssh(1): slightly more instructive error message when the user
  specifies multiple -J options on the command-line. bz3015

* ssh-agent(1): process agent requests for RSA certificate private
  keys using correct signature algorithm when requested. bz3016

* sftp(1): check for user@host when parsing sftp target. This
  allows user@[1.2.3.4] to work without a path.  bz#2999

* sshd(8): enlarge format buffer size for certificate serial
  number so the log message can record any 64-bit integer without
  truncation. bz#3012

* sshd(8): for PermitOpen violations add the remote host and port to
  be able to more easily ascertain the source of the request. Add the
  same logging for PermitListen violations which where not previously
  logged at all.

* scp(1), sftp(1): use the correct POSIX format style for left
  justification for the transfer progress meter. bz#3002

* sshd(8) when examining a configuration using sshd -T, assume any
  attribute not provided by -C does not match, which allows it to work
  when sshd_config contains a Match directive with or without -C.
  bz#2858

* ssh(1), ssh-keygen(1): downgrade PKCS#11 "provider returned no
  slots" warning from log level error to debug. This is common when
  attempting to enumerate keys on smartcard readers with no cards
  plugged in. bz#3058

* ssh(1), ssh-keygen(1): do not unconditionally log in to PKCS#11
  tokens. Avoids spurious PIN prompts for keys not selected for
  authentication in ssh(1) and when listing public keys available in
  a token using ssh-keygen(1). bz#3006

Portability
-----------

* ssh(1): fix SIGWINCH delivery of Solaris for multiplexed sessions
  bz#3030

* ssh(1), sshd(8): fix typo that prevented detection of Linux VRF

* sshd(8): add no-op implementation of pam_putenv to avoid build
  breakage on platforms where the PAM implementation lacks this
  function (e.g. HP-UX). bz#3008

* sftp-server(8): fix Solaris privilege sandbox from preventing
  the legacy sftp rename operation from working (was refusing to
  allow hard links to files owned by other users). bz#3036

* All: add a proc_pidinfo()-based closefrom() for OS X to avoid
  the need to brute-force close all high-numbered file descriptors.
  bz#3049

* sshd(8): in the Linux seccomp-bpf sandbox, allow mprotect(2) with
  PROT_(READ|WRITE|NONE) only. This syscall is used by some hardened
  heap allocators. Github PR#142

* sshd(8): in the Linux seccomp-bpf sandbox, allow the s390-specific
  ioctl for ECC hardware support.

* All: use "doc" man page format if the mandoc(1) tool is present on
  the system. Previously configure would not select the "doc" man
  page format if mandoc was present but nroff was not.

* sshd(8): don't install duplicate STREAMS modules on Solaris; check
  if STREAMS modules are already installed on a pty before installing
  since when compiling with XPG>=4 they will likely be installed
  already. Prevents hangs and duplicate lines on the terminal.
  bz#2945 and bz#2998,

(sevan)

2020-05-27 13:00:58 UTC MAIN commitmail json YAML

Updated sysutils/py-crontab, www/py-beautifulsoup4

(adam)

2020-05-27 13:00:40 UTC MAIN commitmail json YAML

py-beautifulsoup4: updated to 4.9.1

4.9.1:

* Added a keyword argument 'on_duplicate_attribute' to the
  BeautifulSoupHTMLParser constructor (used by the html.parser tree
  builder) which lets you customize the handling of markup that
  contains the same attribute more than once, as in:
  <a href="url1" href="url2">

* Added a distinct subclass, GuessedAtParserWarning, for the warning
  issued when BeautifulSoup is instantiated without a parser being
  specified.

* Added a distinct subclass, MarkupResemblesLocatorWarning, for the
  warning issued when BeautifulSoup is instantiated with 'markup' that
  actually seems to be a URL or the path to a file on
  disk.

* The new NavigableString subclasses (Stylesheet, Script, and
  TemplateString) can now be imported directly from the bs4 package.

* If you encode a document with a Python-specific encoding like
  'unicode_escape', that encoding is no longer mentioned in the final
  XML or HTML document. Instead, encoding information is omitted or
  left blank.

* Fixed test failures when run against soupselect 2.0.

(adam)

2020-05-27 12:58:57 UTC MAIN commitmail json YAML

2020-05-27 12:27:54 UTC MAIN commitmail json YAML

Updated lang/py-six, net/py-botocore, net/py-boto3, net/py-awscli

(adam)

2020-05-27 12:24:24 UTC MAIN commitmail json YAML

py-awscli: updated to 1.18.67

1.18.67
api-change:quicksight: Update quicksight command to latest version
api-change:macie: Update macie command to latest version
api-change:elasticache: Update elasticache command to latest version
api-change:ec2: Update ec2 command to latest version
api-change:dlm: Update dlm command to latest version
api-change:ssm: Update ssm command to latest version

1.18.66
api-change:iotsitewise: Update iotsitewise command to latest version
api-change:autoscaling: Update autoscaling command to latest version

1.18.65
api-change:codebuild: Update codebuild command to latest version
api-change:s3: Update s3 command to latest version
api-change:ec2: Update ec2 command to latest version
api-change:synthetics: Update synthetics command to latest version

1.18.64
api-change:codedeploy: Update codedeploy command to latest version
api-change:securityhub: Update securityhub command to latest version
api-change:chime: Update chime command to latest version
api-change:medialive: Update medialive command to latest version
api-change:backup: Update backup command to latest version
api-change:application-autoscaling: Update application-autoscaling command to latest version
api-change:appmesh: Update appmesh command to latest version

1.18.63
api-change:health: Update health command to latest version
bugfix:s3: Mute warnings for not restored glacier deep archive objects if --ignore-glacier-warnings option enabled. Fixes #4039
api-change:transcribe: Update transcribe command to latest version
api-change:ec2: Update ec2 command to latest version
api-change:chime: Update chime command to latest version

1.18.62
api-change:qldb: Update qldb command to latest version
api-change:ecs: Update ecs command to latest version
api-change:dynamodb: Update dynamodb command to latest version
api-change:macie2: Update macie2 command to latest version
api-change:chime: Update chime command to latest version
api-change:ec2: Update ec2 command to latest version

1.18.61
api-change:ecr: Update ecr command to latest version
api-change:glue: Update glue command to latest version
api-change:cloudformation: Update cloudformation command to latest version
api-change:sts: Update sts command to latest version

1.18.60
api-change:imagebuilder: Update imagebuilder command to latest version
api-change:ec2: Update ec2 command to latest version

1.18.59
api-change:elasticache: Update elasticache command to latest version
api-change:macie2: Update macie2 command to latest version

1.18.58
api-change:iotsitewise: Update iotsitewise command to latest version
api-change:workmail: Update workmail command to latest version

(adam)

2020-05-27 12:23:12 UTC MAIN commitmail json YAML

py-boto3: updated to 1.13.17

1.13.17
api-change:elasticache: [botocore] Update elasticache client to latest version
api-change:dlm: [botocore] Update dlm client to latest version
api-change:quicksight: [botocore] Update quicksight client to latest version
api-change:ssm: [botocore] Update ssm client to latest version
api-change:ec2: [botocore] Update ec2 client to latest version
api-change:macie: [botocore] Update macie client to latest version

1.13.16
api-change:autoscaling: [botocore] Update autoscaling client to latest version
api-change:iotsitewise: [botocore] Update iotsitewise client to latest version

1.13.15
api-change:synthetics: [botocore] Update synthetics client to latest version
api-change:codebuild: [botocore] Update codebuild client to latest version
api-change:s3: [botocore] Update s3 client to latest version
api-change:ec2: [botocore] Update ec2 client to latest version

1.13.14
api-change:backup: [botocore] Update backup client to latest version
api-change:codedeploy: [botocore] Update codedeploy client to latest version
api-change:securityhub: [botocore] Update securityhub client to latest version
api-change:chime: [botocore] Update chime client to latest version
api-change:medialive: [botocore] Update medialive client to latest version
api-change:application-autoscaling: [botocore] Update application-autoscaling client to latest version
api-change:appmesh: [botocore] Update appmesh client to latest version

1.13.13
api-change:transcribe: [botocore] Update transcribe client to latest version
api-change:ec2: [botocore] Update ec2 client to latest version
api-change:health: [botocore] Update health client to latest version
api-change:chime: [botocore] Update chime client to latest version

1.13.12
api-change:chime: [botocore] Update chime client to latest version
api-change:qldb: [botocore] Update qldb client to latest version
api-change:ec2: [botocore] Update ec2 client to latest version
api-change:ecs: [botocore] Update ecs client to latest version
api-change:dynamodb: [botocore] Update dynamodb client to latest version
api-change:macie2: [botocore] Update macie2 client to latest version

1.13.11
api-change:sts: [botocore] Update sts client to latest version
api-change:ecr: [botocore] Update ecr client to latest version
api-change:glue: [botocore] Update glue client to latest version
api-change:cloudformation: [botocore] Update cloudformation client to latest version

1.13.10
api-change:ec2: [botocore] Update ec2 client to latest version
api-change:imagebuilder: [botocore] Update imagebuilder client to latest version

1.13.9
api-change:elasticache: [botocore] Update elasticache client to latest version
api-change:macie2: [botocore] Update macie2 client to latest version

1.13.8
api-change:workmail: [botocore] Update workmail client to latest version
api-change:iotsitewise: [botocore] Update iotsitewise client to latest version
enchancement:Endpoints: [botocore] Improved endpoint resolution for clients with unknown regions

(adam)

2020-05-27 12:22:20 UTC MAIN commitmail json YAML

py-botocore: updated to 1.16.17

1.16.17
api-change:elasticache: Update elasticache client to latest version
api-change:dlm: Update dlm client to latest version
api-change:quicksight: Update quicksight client to latest version
api-change:ssm: Update ssm client to latest version
api-change:ec2: Update ec2 client to latest version
api-change:macie: Update macie client to latest version

1.16.16
api-change:autoscaling: Update autoscaling client to latest version
api-change:iotsitewise: Update iotsitewise client to latest version

1.16.15
api-change:synthetics: Update synthetics client to latest version
api-change:codebuild: Update codebuild client to latest version
api-change:s3: Update s3 client to latest version
api-change:ec2: Update ec2 client to latest version

1.16.14
api-change:backup: Update backup client to latest version
api-change:codedeploy: Update codedeploy client to latest version
api-change:securityhub: Update securityhub client to latest version
api-change:chime: Update chime client to latest version
api-change:medialive: Update medialive client to latest version
api-change:application-autoscaling: Update application-autoscaling client to latest version
api-change:appmesh: Update appmesh client to latest version

1.16.13
api-change:transcribe: Update transcribe client to latest version
api-change:ec2: Update ec2 client to latest version
api-change:health: Update health client to latest version
api-change:chime: Update chime client to latest version

1.16.12
api-change:chime: Update chime client to latest version
api-change:qldb: Update qldb client to latest version
api-change:ec2: Update ec2 client to latest version
api-change:ecs: Update ecs client to latest version
api-change:dynamodb: Update dynamodb client to latest version
api-change:macie2: Update macie2 client to latest version

1.16.11
api-change:sts: Update sts client to latest version
api-change:ecr: Update ecr client to latest version
api-change:glue: Update glue client to latest version
api-change:cloudformation: Update cloudformation client to latest version

1.16.10
api-change:ec2: Update ec2 client to latest version
api-change:imagebuilder: Update imagebuilder client to latest version

1.16.9
api-change:elasticache: Update elasticache client to latest version
api-change:macie2: Update macie2 client to latest version

1.16.8
api-change:workmail: Update workmail client to latest version
api-change:iotsitewise: Update iotsitewise client to latest version
enchancement:Endpoints: Improved endpoint resolution for clients with unknown regions

(adam)

2020-05-27 12:14:31 UTC MAIN commitmail json YAML

py-six: updated to 1.15.0

1.15.0:
Optimize `six.ensure_str` and `six.ensure_binary`.

(adam)

2020-05-27 11:42:34 UTC MAIN commitmail json YAML

doc: Updated mail/thunderbird-l10n to 68.8.1

(ryoon)

2020-05-27 11:42:10 UTC MAIN commitmail json YAML

thunderbird-l10n: Update to 68.8.1

* Sync with mail/thunderbird-68.8.1.

(ryoon)

2020-05-27 11:41:17 UTC MAIN commitmail json YAML

doc: Updated mail/thunderbird to 68.8.1

(ryoon)

2020-05-27 11:40:29 UTC MAIN commitmail json YAML

thunderbird: Update to 68.8.1

Changelog:
Fixes:
fixed IMAP stability improvements
fixed HTML tags in IRC topic changes were rendered incorrectly
fixed MailExtensions: Websockets could not be used

(ryoon)

2020-05-27 11:10:19 UTC MAIN commitmail json YAML

syncthing-gtk: Overhaul SUBST of /usr paths

This had a SUBST block to fix /usr/share to ${PREFIX}/share.  It was
doing this to files where the pattern didn't match, and also missed
fixin up /usr/bin.  Split into a bin and a share SUBST, and loosen the
regexp (specifically, to match /syncthing rather than just
/syncthing-gtk).  Tested to basically work on NetBSD 8.  Desktop files
etc. appear much better than before.

(Found by newish SUBST noop check.)

(gdt)

2020-05-27 08:00:51 UTC MAIN commitmail json YAML

Updated net/py-zeroconf, databases/py-pypika

(adam)

2020-05-27 08:00:33 UTC MAIN commitmail json YAML

py-pypika: updated to 0.37.7

0.37.7:
Bug fixes

(adam)

2020-05-27 07:58:09 UTC MAIN commitmail json YAML

py-zeroconf: updated to 0.26.3

0.26.3
Improved readability of logged incoming data.
Threads are given unique names now to aid debugging.
Fixed a regression where get_service_info() called within a listener add_service method would deadlock, timeout and incorrectly return None.

(adam)

2020-05-27 05:29:40 UTC MAIN commitmail json YAML

cups-base: Fix a wrong copypasta.

Thanks to leot@ for kindly reporting the problem.

(triaxx)

2020-05-26 22:44:16 UTC MAIN commitmail json YAML

py-ldapdomaindump: add ALTERNATIVES

(adam)

2020-05-26 22:41:21 UTC MAIN commitmail json YAML

Removed net/py-dnspython

(adam)

2020-05-26 22:40:24 UTC MAIN commitmail json YAML

2020-05-26 22:39:28 UTC MAIN commitmail json YAML

sshfp: fix HOMEPAGE and DEPENDS

(adam)

2020-05-26 22:34:28 UTC MAIN commitmail json YAML

Removed security/py-cryptodomex

(adam)

2020-05-26 22:33:20 UTC MAIN commitmail json YAML

2020-05-26 22:30:50 UTC MAIN commitmail json YAML

py-impacket: fix DEPENDS; fix PLIST; fix binaries with Python version suffix; bump revision

(adam)

2020-05-26 22:27:27 UTC MAIN commitmail json YAML

py-keyring: PYTHON_VERSIONS_INCOMPATIBLE before pyversion.mk

(adam)

2020-05-26 22:22:18 UTC MAIN commitmail json YAML

doc: Updated sysutils/xfce4-thunar to 1.8.15

(gutteridge)

2020-05-26 22:21:25 UTC MAIN commitmail json YAML

xfce4-thunar: update to 1.8.15

Change log:

1.8.15
======
- Only open devices after successful mount attempt (Bug #16831)
- Fix shortcut support for addressbar (Bug #4537 and Bug #13680)
- Fix crash in bulk renamer on repeated rename (Bug #16824)
- Add checks for thumbnailer 0 handles (Bug #14122)
- Replace 'thunar_return_if_fail (THUNAR_IS_DEVICE (device))' with
standard 'if (..)' to prevent possible crashes. (Bug #13404)
- Fix check if folder is fully loaded when expanding path in tree view.
Prevents 100% CPU load and loosing sync with main view in some cases.
(Bug #15762)
- Fixes 100%CPU on tree-view in some rare cases (Bug #16024)
- Delete native files faster (Bug #16641)
- Support libxfce4ui XfceTitledDialog new API (Bug #16616)
- Translation Updates:
  Albanian, Amharic, Arabic, Armenian, Armenian (Armenia), Basque,
  Belarusian, Bengali, Bulgarian, Catalan, Chinese (China), Chinese (Hong
  Kong), Chinese (Taiwan), Croatian, Czech, Danish, Dutch, English
  (Australia), English (United Kingdom), Esperanto, Estonian, Finnish,
  French, Galician, German, Greek, Hebrew, Hungarian, Icelandic,
  Indonesian, Interlingue, Italian, Japanese, Kazakh, Korean, Latvian,
  Lithuanian, Malay, Norwegian Bokm奪l, Norwegian Nynorsk, Occitan (post
  1500), Panjabi (Punjabi), Persian (Iran), Polish, Portuguese,
  Portuguese (Brazil), Romanian, Russian, Serbian, Slovak, Spanish,
  Swedish, Telugu, Thai, Turkish, Uighur, Ukrainian, Urdu, Urdu
  (Pakistan), Vietnamese

(gutteridge)

2020-05-26 21:43:05 UTC MAIN commitmail json YAML

py-ipcalc: Sort PLIST

(leot)

2020-05-26 21:42:43 UTC MAIN commitmail json YAML

py-ipcalc: Use MASTER_SITE_PYPI for MASTER_SITES

(leot)

2020-05-26 21:31:12 UTC MAIN commitmail json YAML

sshfp: register missing dependency

Bumps PKGREVISION.

(khorben)

2020-05-26 21:29:22 UTC MAIN commitmail json YAML

doc: Added net/py-ipcalc version 1.99.0

(khorben)

2020-05-26 21:29:10 UTC MAIN commitmail json YAML

net/Makefile: add py-ipcalc

(khorben)

2020-05-26 21:28:37 UTC MAIN commitmail json YAML

py-ipcalc: package version 1.99.0

This module allows you to perform IP subnet calculations, there is support for
both IPv4 and IPv6 CIDR notation.

This is required by dane(1) from security/sshfp.

(khorben)

2020-05-26 21:18:35 UTC MAIN commitmail json YAML

doc: Updated security/sshfp to 1.2.2

(khorben)

2020-05-26 21:18:15 UTC MAIN commitmail json YAML

sshfp: update to 1.2.2

I believe this makes this package somewhat usable again, as it seems to require
Python 2.7 in order to work. At the moment "sshfp -s hostname" works. The new
dane(1) utility requires additional dependencies to work, which are not in
pkgsrc yet. I have imported a new Python package required for sshfp(1) though.

v1.2.2:
- Fix -4 / -6 flags [Chris]
- Throw errors on stderr to improve pipe usage [Ludwig Nusse]
- openSUSE package information on import error [Ludwig Nusse]
- Fix nameserver by IP address (ldns workaround [Chris]
- Fix case where AAAA is found but no IPv6 is available [Paul]

v1.2.1:
- Fix copyright information to clearly make it is all GPLv2+ [Paul]

v1.2.0:
- dane : Added the dane command (See IETF DANE working group) [Paul]
- sshfp: Fix quiet for external commands [James Brown]
- sshfp: Merged in subprocess changes [James Brown]
- sshfp: Use optparse, some code refactoring [James Brown]
- sshfp: Added -U UDP option [James Brown]
- sshfp: Rename of some functions [James Brown]
- sshfp: doclifted man page, generate when needed using xmlto [Paul]

v1.1.6:
- Fix quiet for external commands [James Brown]
- Merged in subprocess changes [James Brown]
- Use optparse, some code refactoring [James Brown]
- Added -U UDP option [James Brown]
- Rename of some functions [James Brown]
- doclifted man page, generate when needed using xmlto [Paul]

v1.1.5
- Fixes for https://bugs.launchpad.net/ubuntu/+source/sshfp/+bug/355886
- Fix for sha Deprecation warning [Martin Jackson]
- Fix for use of os.popen3 [Martin Jackson]
- Sync debian/ with Debian (thanks)
- Various small pylint fixes [Simon Deziel]

v1.1.4
- Fixes to man page [Maximiliano Curia]
- Fixes to Makefile for Debian [Maximiliano Curia]

(khorben)

2020-05-26 20:53:28 UTC MAIN commitmail json YAML

doc: Updated devel/cloc to 1.86

(fcambus)

2020-05-26 20:53:13 UTC MAIN commitmail json YAML

cloc: update to 1.86.

Release Notes:

New Languages and File Types:
    o ASP.NET Core Blazor WASM (*.razor)
    o Bazel
    o dhall
    o Raku (renamed from Perl6)
    o Squirrel
    o SugarSS
    o Svelte
    o TNSDL
    o Remove .tsv as a RobotFramework extension
    o Add .inl as a C++ extension.
    o Add #_ as a Closure comment marker.

Updates:
    o Provide alternate algorithms for --git --diff:
      --git-diff-rel computes differences of only files that have changed
                    between the two git commits (this is now the default
                    action with "--git --diff")
      --git-diff-all computes differences between all files in the repo
                    between the two git commits (this was the default
                    action with "--git --diff" behavior in 1.84)
    o New cloc releases will be accompanied by Docker instances on
      Dockerhub.
    o Support reading file names from a STDIN pipe.
    o Check unrecognized files to see if they contain XML.
    o Switch --vcs supports an 'auto' option to automatically determine
      if one is counting in a subversion or git repository.
    o Expand git archives in user-provided scratch directory with --sdir.
    o Mask comment markers in Kotlin raw strings.
    o Make output more deterministic with secondary sort of results.
    o Avoid computation of log(0).
    o Improve --strip-str-comments logic.
    o Improve handling of triple quotes (Python, Groovy, Gradle).
    o New switch --diff-list-file, to perform diff's using a provided
      list file containing file pairs to compare.
    o New switch --ignore-case-ext to ignore upper/lowercase of
      file extension.

Bug Fixes:
    o Fix --exclude-list-file with --diff.
    o Fix creation of empty tar file if this happens during --git --diff.
    o Restore --exclude-lang functionality with --diff.

(fcambus)

2020-05-26 20:46:35 UTC MAIN commitmail json YAML

doc: Added net/py-dnspython version 1.16.0

(khorben)

2020-05-26 20:46:00 UTC MAIN commitmail json YAML

net/Makefile: add py-dnspython

(khorben)

2020-05-26 20:45:21 UTC MAIN commitmail json YAML

py-dnspython: package version 1.16.0

dnspython is a DNS toolkit for Python. It supports almost all record types. It
can be used for queries, zone transfers, and dynamic updates. It supports TSIG
authenticated messages and EDNS0.

dnspython provides both high and low level access to DNS. The high level
classes perform queries for data of a given name, type, and class, and return
an answer set. The low level classes allow direct manipulation of DNS zones,
messages, names, and records.

(khorben)

2020-05-26 20:43:59 UTC MAIN commitmail json YAML

doc: Updated devel/fossil to 2.11

(js)

2020-05-26 20:42:51 UTC MAIN commitmail json YAML

Update devel/fossil to 2.11

Changes for Version 2.11 (2020-05-25)

  *  Support Markdown in the default ticket configuration.
  *  Timestamp strings in object names can now omit punctation. So, for
    example, "202004181942" and "2020-04-18 19:42" mean the same thing.
  *  Enhance backlink processing so that it works with Markdown-formatted
    tickets and so that it works for wiki pages.
    fossil rebuild is needed to take full advantage of this fix.
    Fossil will continue to work without the rebuild, but the new
    backlinks will be missing.
  *  The algorithm for finding the location of the configuration database
    is enhanced to be XDG-compliant.
  *  Add a hide/show feature to associated wiki display on check-in and
    branch information pages.
  *  Enhance the fossil info command so that it works with no arguments
    even if not within an open check-out.
  *  Many improvements to the forum and especially email notification
    of forum posts, in response to community feedback after switching
    SQLite support from a mailing list over to the forum.
  *  Minimum length of a self-registered user ID increased from 3 to 6
    characters.
  *  When the "vfx" query parameter is used on the /timeline page, it
    causes the complete text of forum posts to be displayed.
  *  Rework the "fossil grep" command to be more useful.
  *  Expose the redirect-to-https setting to the settings command.
  *  Improve support for CGI on IIS web servers.
  *  The /ext page can now render index files, in the same way as the
    embedded docs.
  *  Most commands now support the Unix-conventional "--" flag to treat
    all following arguments as filenames instead of flags.
  *  Added the mimetypes config setting (versionable) to enable mimetype
    overrides and custom definitions.
  *  Add an option on the /Admin/Timeline setup page to set a default
    timeline style other than "Modern".
  *  In embedded documentation, hyperlink URLs of the form
    "/doc/$CURRENT/..." the "$CURRENT" text is translated into the
    check-in hash for the document currently being viewed.
  *  Added the /phantoms webpage that shows all phantom artifacts.
  *  Enhancements to phantom processing to try to reduce
    bandwidth-using chatter about phantoms on the sync protocol.
  *  Security: Fossil now assumes that the schema of every
    database it opens has been tampered with by an adversary and takes
    extra precautions to ensure that such tampering is harmless.
  *  Security: Fossil now puts the Content-Security-Policy in the HTTP
    reply header, in addition to also leaving it in the HTML <head>
    section, so that it is always available, even if a custom skin
    overrides the HTML <head> and omits the CSP in the process.
  *  Output of the fossil diff -y command automatically adjusts
    according to the terminal width.
  *  The Content-Security-Policy is now set using the default-csp
    setting.
  *  Merge conflicts caused via the merge and update commands no longer
    leave temporary files behind unless the new --keep-merge-files flag
    is used.
  *  The /artifact_stats page is now accessible to all users if the new
    "artifact_stats_enable" setting is turned on. There is a new
    checkbox under the /Admin/Access menu to turn that capability on
    and off.
  *  Add the fossil tls-config command for viewing the TLS configuration
    and the list of SSL Cert exceptions.
  *  Captchas all include a button to read the captcha using an audio
    file, so that they can be completed by the visually impaired.
  *  Stop using the IP address as part of the login cookie.
  *  Bug fix: fix the SSL cert validation logic so that if an exception
    is allowed for particular site, the exception expires as soon as the
    cert changes values.
  *  Bug fix: the FTS search into for forum posts is now kept up-to-date
    correctly.
  *  Bug fix: the "fossil git export" command is now working on Windows
  *  Bug fix: display Technote items on the timeline correctly
  *  Bug fix: fix the capability summary matrix of the Security Audit
    page so that it does not add "anonymous" capabilities to the
    "nobody" user.
  *  Update internal Unicode character tables, used in regular expression
    handling, from version 12.1 to 13.
  *  Many documentation enhancements.
  *  Many minor enhancements to existing features.

(js)

2020-05-26 18:37:30 UTC pkgsrc-2020Q1 commitmail json YAML

Pullup ticket #6212 - requested by nia
audio/adplay: dependent update

Revisions pulled up:
- audio/adplay/Makefile                                        1.4
- audio/adplay/distinfo                                        1.2
- audio/adplay/patches/patch-configure                          1.1

---
  Module Name: pkgsrc
  Committed By: nia
  Date: Thu May 21 21:00:49 UTC 2020

  Modified Files:
  pkgsrc/audio/adplay: Makefile distinfo
  Added Files:
  pkgsrc/audio/adplay/patches: patch-configure

  Log Message:
  adplay: Work around breakage caused by adplug-2.3.2

  Pointed out by joerg

(bsiegert)

2020-05-26 18:37:25 UTC pkgsrc-2020Q1 commitmail json YAML

Pullup ticket #6211 - requested by nia
audio/adplug: security fix

Revisions pulled up:
- audio/adplug/Makefile                                        1.11
- audio/adplug/PLIST                                            1.4
- audio/adplug/distinfo                                        1.8

---
  Module Name: pkgsrc
  Committed By: nia
  Date: Thu May 21 13:39:55 UTC 2020

  Modified Files:
  pkgsrc/audio/adplug: Makefile PLIST distinfo

  Log Message:
  adplug: Update to 2.3.2

  Changes for version 2.3.2:
  --------------------------
  - Bug fixes:
    - FMOPL: Fix global variable pointer double-free (CVE-2018-17825)
    - HERAD: Fix compilation on GCC 4.2.1
    - ADL: Calling rewind() before update() causes access violation
    - Move OPL reset/init code to rewind() for some players

(bsiegert)

2020-05-26 18:33:19 UTC pkgsrc-2020Q1 commitmail json YAML

Pullup ticket #6210 - requested by adam
www/py-httplib2: security fix

Revisions pulled up:
- www/py-httplib2/Makefile                                      1.24-1.25
- www/py-httplib2/distinfo                                      1.21-1.22

---
  Module Name:    pkgsrc
  Committed By:  adam
  Date:          Wed May 20 15:29:53 UTC 2020

  Modified Files:
          pkgsrc/www/py-httplib2: Makefile distinfo

  Log Message:
  py-httplib2: updated to 0.18.0

  0.18.0
  IMPORTANT security vulnerability CWE-93 CRLF injection
  Force %xx quote of space, CR, LF characters in uri.
  Special thanks to Recar https://github.com/Ciyfly for discrete notification.
  https://cwe.mitre.org/data/definitions/93.html

  0.17.4
  Ship test suite in source dist
  https://github.com/httplib2/httplib2/pull/168

---
  Module Name:    pkgsrc
  Committed By:  adam
  Date:          Thu May 21 06:19:59 UTC 2020

  Modified Files:
          pkgsrc/www/py-httplib2: Makefile distinfo

  Log Message:
  py-httplib2: updated to 0.18.1

  0.18.1
  explicit build-backend workaround for pip build isolation bug
  "AttributeError: 'module' object has no attribute '__legacy__'" on pip install

(bsiegert)

2020-05-26 18:26:07 UTC pkgsrc-2020Q1 commitmail json YAML

Pullup ticket #6202 - requested by maya
chat/irssi: bugfix

Revisions pulled up:
- chat/irssi/Makefile                                          1.98-1.99
- chat/irssi/distinfo                                          1.52
- chat/irssi/patches/patch-src_fe-text_term-terminfo.c          1.1

---
  Module Name: pkgsrc
  Committed By: maya
  Date: Mon May 18 18:38:31 UTC 2020

  Modified Files:
  pkgsrc/chat/irssi: Makefile distinfo
  Added Files:
  pkgsrc/chat/irssi/patches: patch-src_fe-text_term-terminfo.c

  Log Message:
  irssi: grab pull request from upstream fixing hangs with ctrl+space

  bump pkgrevision

---
  Module Name: pkgsrc
  Committed By: maya
  Date: Mon May 18 19:15:38 UTC 2020

  Modified Files:
  pkgsrc/chat/irssi: Makefile

  Log Message:
  irssi: remove random debug leftover

(bsiegert)

2020-05-26 16:54:06 UTC MAIN commitmail json YAML

Updated lang/nodejs12, net/py-prometheus_client

(adam)

2020-05-26 16:53:40 UTC MAIN commitmail json YAML

py-prometheus_client: updated to 0.8.0

0.8.0:
[FEATURE] Added ASGI application
[FEATURE] Add support for parsing timestamps in Prometheus exposition format.
[FEATURE] Add target_info to registries
[ENHANCEMENT] Handle empty and slashes in label values for pushgateway
[ENHANCEMENT] Various updates for latest OpenMetrics draft spec
[ENHANCEMENT] Add HELP output for auto-created metrics
[ENHANCEMENT] Use mmap.PAGESIZE constant as value for first read.
[ENHANCEMENT] Add __repr__ method to metric objects, make them debug friendly.
[ENHANCEMENT] Add observability check to metrics
[BUGFIX] Fix urlparse in python >= 3.7.6
[BUGFIX] Cleaning up name before appending unit on name
[BUGFIX] Allow for OSError on Google App Engine

(adam)

2020-05-26 16:50:00 UTC MAIN commitmail json YAML

nodejs12: updated to 12.17.0

Version 12.17.0 'Erbium' (LTS):

Notable Changes

ECMAScript Modules - --experimental-modules flag removal
AsyncLocalStorage API (experimental)
REPL previews
REPL reverse-i-search
REPL substring-based search
Error monitoring
Monitoring uncaught exceptions
File system APIs
Console groupIndentation option
maxStringLength option for util.inspect()
Stable N-API release 6
Stable diagnostic reports
Increase of the default server headers timeout

(adam)

2020-05-26 15:31:09 UTC MAIN commitmail json YAML

Updated emulators/wine, databases/prometheus

(adam)

2020-05-26 15:30:49 UTC MAIN commitmail json YAML

prometheus: updated to 2.18.1

2.18.1:
[BUGFIX] TSDB: Fixed snapshot API.

2.18.0:
[CHANGE] Federation: Only use local TSDB for federation (ignore remote read).
[CHANGE] Rules: rule_evaluations_total and rule_evaluation_failures_total have a rule_group label now.
[FEATURE] Tracing: Added experimental Jaeger support
[ENHANCEMENT] TSDB: Significantly reduce WAL size kept around after a block cut.
[ENHANCEMENT] Discovery: Add architecture meta label for EC2.
[BUGFIX] UI: Fixed wrong MinTime reported by /status.
[BUGFIX] React UI: Fixed multiselect legend on OSX.
[BUGFIX] Remote Write: Fixed blocked resharding edge case.
[BUGFIX] Remote Write: Fixed remote write not updating on relabel configs change.

(adam)

2020-05-26 15:20:23 UTC MAIN commitmail json YAML

wine: updated to 4.0.4

Bugs fixed in 4.0.4 (total 65):
* NEXON client installers using embedded IE browser control: buttons don't respond to click (Lunia Senki, Combat Arms, War Rock)
* Microsoft Document Explorer 2008 crashes when using MS Help 2 URL from command line (ieframe's WebBrowser COM object doesn't support aggregation)
* Password Safe crashes with page fault when renaming entries
* Brothers In Arms Hell's Highway : Setup asks for DVD for every .cab file (SetupPromptForDiskA/W should only show a dialog if the file doesn't exist)
* LegoLand: crashes at main menu without native directmusic
* TSDoctor 1.0.58 fails to run
* treeview wstr overrun in TVN_GETDISPINFOW (ExamXML crashes when opening an XML file)
* UFO: Extraterrestrials Gold - crash at start caused by wine's built-in dsound/directmusic
* GdipGraphicsClear() needs to overwrite pixels, not alpha blend (Text misrendered in Brain Workshop)
* Skyrim (Steam) hangup on quit
* In The Adventures Of Lomax some graphic elements flicker, disappear or are garbled
* Problems with Russian localization in page setup dialog
* using winegcc with stdin passes arguments in the wrong position to gcc
* FXCM Trading Station II installer reports 'OLE error 80004001' when running as 'Windows Vista' or higher ('ITaskbarList3::ThumbBarSetImageList' is a stub)
* 64-bit dlls/msdaps/row_server_p.c generates build warnings (discarded "const" qualifier)
* Broken geometry in Indiana Jones and the Emperor's Tomb
* Broken Sword: The Angel of Death demo needs IDirectSoundFXI3DL2Reverb interface
* The Moment of Silence launcher unusable (displays only black)
* Wine with freetype 2.7 causes font rendering issues
* The Witcher 2: Assassins of Kings - menus and subtitles rendered incorrectly (with built-in d3dx9)
* VSDC Video Editor. Crashes in ole32 when opening.
* HashMyFiles: Drag & Drop from native File Managers (Dolphin, Nautilus, ...) does not work
* Multiple .NET applications (Chime, DxO Photolab 2 trial) crash, need  RegisterApplicationRecoveryCallback  to return S_OK
* Tetris for Windows has wrong colors for the game pieces and the score box
* HotS - taking screenshot causes client crash, needs d3dx11_42.dll.D3DX11SaveTextureToFileW
* Far Cry 5 Cannot Steer Land Vehicles
* Multiple applications need msvcr120.dll.?_Yield@_Context@details@Concurrency@@SAXXZ (Darkest Dungeon, Noita, Amazon Kindle for PC)
* Shed installer - text overflow in browse-for-folder dialog
* Abiword 2.6.8 comboboxes should have a white background color
* 亮Torrent has squares in its update dialog
* Smoke not rendering properly in Castlevania: Lords of Shadow 2
* IVMU Social Network Client (500 series) crashes when selecting menu / settings
* Adobe DNG Converter 11.2+ runs into Call to unimplemented function api-ms-win-core-winrt-error-l1-1-0.dll.GetRestrictedErrorInfo
* winetricks -q --verify dotnet461 crashes under win64
* type command in cmd.exe with two files and stdout redirect, behavior is different
* boolean type defined as 'unsigned char' rather than 'char'
* 32-bit LAVFilters 0.74.x installer fails to register 64-bit AX codec/filters in Wow64 environment (32-bit regsvr32.exe needs to support 64-bit dll registration and vice versa by re-exec with proper bitness)
* Multiple 64-bit game and application crash reporting tools need x86_64 'ntdll.RtlCaptureStackBackTrace' implementation
* Glide wrapper - Configuration buttons misbehaving
* Accel World vs. Sword Art Online needs WTSRegisterSessionNotificationEx() to return true.
* ListBox LB_SETSEL doesn't scroll to newly selected item
* _putws outputs NULs, other wchar.h functions don't
* ExHIBIT (Sample Project): Can't select menu item in the title screen
* Zoom Edit&Share 5.0.0.0: installer crashes starting with wine-3.19
* commit "winex11.drv: Wake up the display on user input." introduced severe performance issues with atomic modesetting kernel drivers
* iCloud refuses to install: "Your computer is missing Media features."
* putty.exe displays an error at startup when placed in a path with accented characters.
* Magic: The Gathering Arena installer needs powershell.exe (cannot find it)
* FindFirstFileExW believes every directory entry has been read if NtQueryDirectoryFile underfills buffer
* FindFirstFileExW seems to be missing FILE_OPEN_FOR_BACKUP_INTENT flag to NtOpenFile
* Need for Speed: Carbon - Autosculpt causes geometry corruption and GL_INVALID_OPERATION error
* Blur: cars have no wheels when Wine is compiled with Ryzen optimisations
* Nextiva: Logging in fails with "Client is unable to connect to the server."
* IGMP source specific multicast does not create join requests for source
* NtCreateFile incorrectly returns STATUS_OBJECT_NAME_NOT_FOUND when RootDirectory is populated
* R-Studio (file recovery tool) wants ntoskrnl.exe.IoCreateUnprotectedSymbolicLink
* motec i2 pro v1.0 data logger fails to start
* Multiple applications need shcore.dll.GetScaleFactorForMonitor stub (Karafun player, Sync)
* UPlay fails to start : "Error at hooking API NtProtectVirtualMemory" (UPlay's hooking engine can't handle ENDBR32 instruction inserted at non-hotpatch API entries due to distro build environments '-fcf-protection')
* Visual C++ Express 2005 needs shell32.PathResolveW implementation (or fake success)
* Wrong color mapping with client-side graphics on 256-color X server
* IXMLDOMDocument_load() paths aren't URL-unescaped (Microsoft Document Explorer 2008 startup error)
* Building wine on CentOS7 fails due to lack of libkrb5
* Dell Latitude E6440 BIOS updater crashes on unimplemented function ntoskrnl.exe.KeSetImportanceDpc
* Arma Cold War Assault: Cursor stuck at low fps since Wine 5.0-rc6

(adam)

2020-05-26 15:02:50 UTC MAIN commitmail json YAML

(devel/p5-Module-Install-RTx) Avoid installing *.orig after patch

(mef)

2020-05-26 14:14:50 UTC MAIN commitmail json YAML

7kaa: fix gettext ldflags

(nia)

2020-05-26 13:47:51 UTC MAIN commitmail json YAML

musicpd: cc1plus: warning: command line option '-std=gnu99' is valid for C/ObjC but not for C++

(nia)

2020-05-26 13:11:01 UTC MAIN commitmail json YAML

2020-05-26 12:52:59 UTC MAIN commitmail json YAML

qt5-qtbase: for obscure reasons Qt5PrintSupport_QCupsPrinterSupportPlugin.cmake is not installed on Darwin

(nia)

2020-05-26 12:51:40 UTC MAIN commitmail json YAML

Updated databases/sqlite3, databases/sqlite3-docs, databases/sqlite3-tcl, devel/lemon

(adam)

2020-05-26 12:50:53 UTC MAIN commitmail json YAML

sqlite3: updated to 3.32.1

Changes in version 3.32.1:

Fix two long-standing bugs that allow malicious SQL statements to crash the process that is running SQLite. These bugs were announced by a third-party approximately 24 hours after the 3.32.0 release but are not specific to the 3.32.0 release.

Other minor compiler-warning fixes and whatnot.

(adam)

2020-05-26 12:41:25 UTC MAIN commitmail json YAML

2020-05-26 12:40:08 UTC MAIN commitmail json YAML

wine: Add pkg-config to USE_TOOLS

(nia)

2020-05-26 12:22:57 UTC MAIN commitmail json YAML

samba4: Fix ads suggested option.

This is enabled later for suitable platforms, so adding it here either made
that test completely pointless, or added the option twice.

(jperkin)

2020-05-26 12:16:37 UTC MAIN commitmail json YAML

doc: Updated audio/strawberry to 0.6.11

(nia)

2020-05-26 12:16:26 UTC MAIN commitmail json YAML

strawberry: Update to 0.6.11

0.6.11:

  Bugfixes:
    * Fixed MPRIS missing art url when playing albums with embedded cover.
    * Fixed updating local non collection songs when manually unsetting cover.
    * Fixed infinite loop and preceding crash when CSS background-color was set in qt5ct.
    * Fixed UI freeze when updating the database from a large Subsonic or Tidal collection.
    * Fixed crash when CD loading fails in devices.
    * Fixed CD devices showing up with having 0 songs after loading.
    * Fixed the album cover loading indicator being stuck if no cover providers were available.
    * Fixed the playing widget not updating artist, album or title after metadata has changed for a song when no album cover was loaded.

  Enhancements:
    * Sort songs in collection by song title instead of track if previous grouping is not the album.
    * Added option to switch on/off automatically searching for album covers to context settings.
    * Reset last played song when playlist is finished.
    * Checking content type of received HTTP request for image when receiving album covers.
    * Added option to scrobbler setting for turning off login error popup.
    * Made MusicBrainz and Discogs cover providers respect rate limiting.

  New features:
    * Added option to show/hide sidebar.
    * Added settings for selecting album cover and lyrics providers.
    * Added album covers from Musixmatch and Spotify.
    * Added lyrics from Genius, Musixmatch and ChartLyrics.

(nia)

2020-05-26 11:41:29 UTC MAIN commitmail json YAML

2020-05-26 11:35:46 UTC MAIN commitmail json YAML

libretro-stella: Remove sun ld hacks, appear to be no longer needed

(nia)

2020-05-26 11:30:50 UTC MAIN commitmail json YAML

2020-05-26 11:30:29 UTC MAIN commitmail json YAML

Requires more than 1h of CPU time.

(joerg)

2020-05-26 11:30:06 UTC MAIN commitmail json YAML

2020-05-26 11:29:17 UTC MAIN commitmail json YAML

2020-05-26 11:28:51 UTC MAIN commitmail json YAML

2020-05-26 11:28:05 UTC MAIN commitmail json YAML

2020-05-26 11:27:21 UTC MAIN commitmail json YAML

2020-05-26 11:27:02 UTC MAIN commitmail json YAML

2020-05-26 11:25:34 UTC MAIN commitmail json YAML

2020-05-26 11:25:02 UTC MAIN commitmail json YAML

2020-05-26 11:15:55 UTC MAIN commitmail json YAML

Added sysutils/xenkernel413 version 4.13.1
Added sysutils/xentools413 version 4.13.1

(bouyer)

2020-05-26 11:13:43 UTC MAIN commitmail json YAML

Add xenkernel413 and xentools413

(bouyer)

2020-05-26 11:12:11 UTC MAIN commitmail json YAML

Add xenkernel413 and xentools413 packages, version 4.13.1.
At this time xentools413 will only build on a very recent -current (as of
an hour ago or do - with /usr/include/xen/xenio.h 1.12 or newer)

Xen is a hypervisor which supports running multiple guest operating
systems on a single machine. Guest OSes (also called "domains")
can be either paravirtualised (i.e. make hypercalls in order to
access hardware), run in HVM (Hardware Virtualisation Mode) where
they will be presented with virtual devices, or a combination where
they use hypercalls to access hardware but manage memory themselves.
At boot, the xen kernel is loaded along with the guest kernel for
the first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.

(bouyer)

2020-05-26 11:11:48 UTC MAIN commitmail json YAML

doc: Updated chat/srain to 1.1.0

(nia)

2020-05-26 11:11:39 UTC MAIN commitmail json YAML

srain: Update to 1.1.0

2020-05-24 Version 1.1.0
========================

- Features:

  - Support multiple selection of message
  - Support jump to mentioned message
  - Nickname will be highlighted when mentioned
  - Auto build deb package

- Changes:

  - Improve fcous control of UI
  - Replace appdata with metainfo
  - Validate metainfo with appstream-util

- Bug fixes:

  - Some implicit declarations fixes
  - Some typo fixes

(nia)

2020-05-26 10:40:02 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.15.3

(fox)

2020-05-26 10:39:38 UTC MAIN commitmail json YAML

textproc/bat: Updates to 0.15.3

Changes since 0.15.1:

v0.15.3

Bugfixes

  * Cannot run bat with relative paths, see #1022
  * bat mishighlights Users that start with digits in SSH config, see #984

New syntaxes

  * SML, see #1005 (@kopecs)

Other

  * Some syntaxes and themes have been updated to the latest version

v0.15.2

Warning: this release suffers from #1022. bat will panic when called with a
relative file path.

Bugfixes

  * --map-syntax doesn't work with names provided through --file-name (@eth-p)
  * Fix syntax detection for files called 'rails', see #1008
  * Fix potential errors with syntax detection for symlinked files, see #1001

Other

  * Add padding above headers when not using a grid, see #968 and #981 (@pt2121)
  * bat now prints an error if an invalid syntax is specified via -l or
    --map-syntax, see #1004 (@eth-p)

bat as a library

  * PrettyPrinter::vcs_modification_markers has been marked deprecated when
    building without the git feature, see #997 and #1020 (@eth-p, @sharkdp)

Packaging

  * Compilation problems with onig_sys on various platforms have been resolved
    by upgrading to syntect 4.2, which includes a new onig version that allows
    to build onig_sys without the bindgen dependency. This removes the need for
    libclang(-dev) to be installed to compile bat. Package maintainers might
    want to remove clang as a build dependency. See #650 for more details.

(fox)

2020-05-26 09:45:17 UTC MAIN commitmail json YAML

2020-05-26 09:17:53 UTC MAIN commitmail json YAML

doc: Updated archivers/bsdtar to 3.4.3

(nia)

2020-05-26 09:17:33 UTC MAIN commitmail json YAML

doc: Updated archivers/libarchive to 3.4.3

(nia)

2020-05-26 09:16:43 UTC MAIN commitmail json YAML

libarchive: Update to 3.4.3

Libarchive 3.4.3 is a feature and bugfix release.

New features:

    support for pzstd compressed files (#1357)
    support for RHT.security.selinux tar extended attribute (#1348)

Important bugfixes:

    various zstd fixes and improvements (#1342 #1352 #1359)
    child process handling fixes (#1372)

Libarchive 3.4.2 is a feature and security release.

New features:

    support for atomic file extraction (bsdtar -x --safe-writes) (#1289)
    support for mbed TLS (PolarSSL) (#1301)

Important bugfixes:

    security fixes in RAR5 reader (#1280 #1326)
    compression buffer fix in XAR writer (#1317)
    fix uname and gname longer than 32 characters in PAX writer (#1319)
    fix segfault when archiving hard links in ISO9660 and XAR writers (#1325)
    fix support for extracting 7z archive entries with Delta filter (#987)

Libarchive 3.4.1 is a feature and security release.

New features:

    Unicode filename support for reading lha/lzh archives
    New pax write option "xattrhdr"

Important bugfixes:

    security fixes in wide string processing (#1276 #1298)
    security fixes in RAR5 reader (#1212 #1217 #1296)
    security fixes and optimizations to write filter logic (#351)
    security fix related to use of readlink(2) (1dae5a5)
    sparse file handling fixes (#1218 #1260)

Thanks to all contributors and bug reporters.
Special thanks to Christos Zoulas (@zoulasc) from NetBSD for the atomic file extraction feature.

(nia)

2020-05-26 08:40:26 UTC MAIN commitmail json YAML

doc: Updated print/cups-base to 2.3.3nb4
doc: Updated print/libcups to 2.3.3nb3

(triaxx)

2020-05-26 08:37:50 UTC MAIN commitmail json YAML

cups: add a comment to appease pkglint

(triaxx)

2020-05-26 08:36:56 UTC MAIN commitmail json YAML

2020-05-26 07:17:53 UTC MAIN commitmail json YAML

2020-05-26 02:04:04 UTC MAIN commitmail json YAML

Updated fonts/p5-Font-FreeType to 0.16

(wen)

2020-05-26 01:46:04 UTC MAIN commitmail json YAML

Update to 0.16

Upstream changes:
0.16 2020-05-12 dmol@cpan.org
- fix cpan-testers failures
- fix C++ usages instead of C

0.15 2020-05-11 dmol@cpan.org
- fix tests for RT#132543

0.14 2020-05-11 htl10@users.sourceforge.net
- update glyph->load method()

(wen)

2020-05-26 00:42:54 UTC MAIN commitmail json YAML

Mark as BROKEN for permission issues

(joerg)

2020-05-26 00:28:41 UTC MAIN commitmail json YAML

doc: Updated print/cups-base to 2.3.3nb3

(triaxx)

2020-05-25 21:20:10 UTC MAIN commitmail json YAML

doc/TODO: + mutt-1.14.2.

(wiz)

2020-05-25 20:28:01 UTC MAIN commitmail json YAML

Updated net/ndpi, net/ntopng

(adam)

2020-05-25 20:26:51 UTC MAIN commitmail json YAML

ntopng: updated to 4.0

ntopng 4.0:

Breakthroughs

* Plugins engine to tap into flows, hosts and other network elements
* Migration to Bootstrap 4 and Font Awesome 5 for a renewed ntopng look-and-feel with light and dark themes
* Processes and containers monitoring thanks to the eBPF integration via libebpfflow https://github.com/ntop/libebpfflow
* Active monitoring of hosts ICMP/ICMPv6/HTTP/HTTPS Round Trip Times (RTT)

New features
* X.509 client certificate authentication
* ERSPAN transparent ethernet bridging
* Webhook export module for exporting alarms
* Identifications of the hosts in broadcast domain
* Category Lists editor to manage ip/domain lists
* Handling of PEN fields from nProbe
* Added anomalous flows to the looking glass
* Visibility of ICMP port-unreachable flows IPv4
* TCP states filtering (est., connecting, closed and rst)
* Ability to serialize local hosts in the broadcast domain via MAC address
* Japanese, portugese/brazilian localization
* Added process memory, cpu load, InfluxDB, Redis status pages and charts
* Implement ntopng Plugins, self contained modules to extend the ntopng functionalities
* Implement ZMQ/Suricata companion interface
* SSL traffic analysis and alerts via JA3 fingerprint, unsafe ciphers detection
* SSH traffic analysis and alerts via HASSH fingerprint
* Host traffic profile generation via the (MUD) Manufacturer Usage Descriptor
* Experimental Prometheus timeseries export
* Introduce the System interface to manage system wide settings and status
* Read events from Suricata and generate alerts
* SNMP network topology visualization
* Automatic ntopng update check and upgrade
* Calculate host anomaly score and trigger alerts when it exceeds a threshold
* Add ability to extract timeseries data with a click
* Initial Marketplace droplet using Fabric
* Alerts on duplex status change on SNMP interface

Improvements
* View interfaces are now optimized for big networks and use less memory
* Systemd macros are now used to start/restart the ntopng services
* Handles n2disk traffic extractions from recording processes non managed by ntopng
* Interface in/out now available also for non PF_RING interfaces (read from /proc)
* Automatic InfluxDB rollup support
* MDNS discovery improvements
* Rework of the alerts engine and api for efficient engaged alerts triggering
* Faster ZMQ communication to nProbe thanks to the implementation of a binary TLV format
* Stats update for ZMQ interfaces is now based on the idle/active flows timeout
* Timeseries export improvements via queues, detect if InfluxDB is down and stop the export
* Implemented reusable Lua engine to reduce the overhead of periodic scripts
* Improve Lua error handling
* Exclude certain categories from Elephant/Long lived flows alerts

nEdge
* Ability to set up port forwarding
* Support for Ubuntu 18.04
* Fix users and other prefs deleted during nEdge data reset
* Japanese localization
* Block unsupported L3 protocols (currently only ARP and IPv4 are supported)
* DNS mapping port to avoid conflicts with system programs

Fixes
* Fixed export to mysql on shutdown in case of Pcap file in community mode
* Fixed failing SYN-scan detection
* Fixed ZMQ decompression errors with large templates
* Fixed possible XSS in login.lua referer param and `runtime.lua`
* Update geolocation due to changes in the library usage policy
* Fixes to support browsers dark mode
* Option `--zmq-encryption-key <pub key>` can be used with `-I <endpoint>` to encrypt data hi hierarchical mode
* Fixed nIndex missing data while performing some queries and throughput calculation

(adam)

2020-05-25 20:25:22 UTC MAIN commitmail json YAML

ndpi: updated to 3.2

nDPI 3.2:

New Features
* New API calls
  * Protocol detection: ndpi_is_protocol_detected
  * Categories: ndpi_load_categories_file / ndpi_load_category
  * JSON/TLV serialization: ndpi_serialize_string_boolean / ndpi_serialize_uint32_boolean
  * Patricia tree: ndpi_load_ipv4_ptree
  * Module initialization: ndpi_init_detection_module / ndpi_finalize_initalization
  * Base64 encoding: ndpi_base64_encode
  * JSON exprot: ndpi_flow2json
  * Print protocol: ndpi_get_l4_proto_name / ndpi_get_l4_proto_info
* Libfuzz integration
* Implemented Community ID hash (API call ndpi_flowv6_flow_hash and ndpi_flowv4_flow_hash)
* Detection of RCE in HTTP GET requests via PCRE
* Integration of the libinjection library to detect SQL injections and XSS type attacks in HTTP requests

New Supported Protocols and Services
* TLS
  * Added ALPN support
  * Added export of supported version in TLS header
* Added Telnet dissector with metadata extraction
* Added Zabbix dissector
* Added POP3/IMAP metadata extraction
* Added FTP user/password extraction
* Added NetBIOS metadata extraction
* Added Kerberos metadata extraction
* Implemented SQL Injection and XSS attack detection
* Host-based detection improvements and changes
  * Added Microsoft range
  * Added twitch.tv website
  * Added brasilbandalarga.com.br and .eaqbr.com.br as EAQ
  * Added 20.180.0.0/14, 20.184.0.0/13 range as Skype
  * Added 52.84.0.0/14 range as Amazon
  * Added ^pastebin.com
  * Changed 13.64.0.0/11 range from Skype to Microsoft
  * Refreshed Whatsapp server list, added *whatsapp-*.fbcdn.net IPs
* Added public DNSoverHTTPS servers

Improvements
* Reworked and improved the TLS dissector
* Reworked Kerberos dissector
* Improved DNS response decoding
* Support for DNS continuous flow dissection
* Improved Python bindings
* Improved Ethereum support
* Improved categories detection with streaming and HTTP
* Support for IP-based detection to compute the application protocol
* Renamed protocol 104 to IEC60870 (more meaningful)
* Added failed authentication support with FTP
* Renamed DNSoverHTTPS to handle bot DoH and DoT
* Implemented stacked DPI decoding
* Improvements for CapWAP and Bloomberg
* Improved SMB dissection
* Improved SSH dissection
* Added capwap support
* Modified API signatures for ndpi_ssl_version2str / ndpi_detection_giveup
* Removed ndpi_pref_http_dont_dissect_response / ndpi_pref_dns_dont_dissect_response (replaced by ndpi_extra_dissection_possible)

Fixes
* Fixed memory invalid access in SMTP and leaks in TLS
* Fixed a few memory leaks
* Fixrd invalid memory access in a few protocol dissectors (HTTP, memcached, Citrix, STUN, DNS, Amazon Video, TLS, Viber)
* Fixed IPv6 address format across the various platforms/distributions
* Fixed infinite loop in ndpi_workflow_process_packet
* Fixed SHA1 certificate detection
* Fixed custom protocol detection
* Fixed SMTP dissection (including email)
* Fixed Telnet dissection and invalid password report
* Fixed invalid category matching in HTTP
* Fixed Skype and STUN false positives
* Fixed SQL Injection detection
* Fixed invalid SMBv1 detection
* Fixed SSH dissection
* Fixed ndpi_ssl_version2str
* Fixed ndpi_extra_dissection_possible
* Fixed out of bounds read in ndpi_match_custom_category

Misc
* ndpiReader
  * CSV output enhancements
  * Added tunnelling decapsulation
  * Improved HTTP reporting

nDPI 3.0:

New Features
* nDPI now reports the protocol ASAP even when specific fields have not yet been dissected because such packets have not yet been observed. This is important for inline applications that can immediately act on traffic. Applications that need full dissection need to call the new API function ndpi_extra_dissection_possible() to check if metadata dissection has been completely performed or if there is more to read before declaring it completed.
* TLS (formerly identified as SSL in nDPI v2.x) is now dissected more deeply, certificate validity is extracted as well certificate SHA-1.
* nDPIreader can now export data in CSV format with option `-C`
* Implemented Sequence of Packet Length and Time (SPLT) and Byte Distribution (BD) as specified by Cisco Joy (https://github.com/cisco/joy). This allows malware activities on encrypted TLS streams. Read more at https://blogs.cisco.com/security/detecting-encrypted-malware-traffic-without-decryption
  * Available as library and in `ndpiReader` with option `-J`
* Promoted usage of protocol categories rather than protocol identifiers in order to classify protocols. This allows application protocols to be clustered in families and thus better managed by users/developers rather than using hundred of protocols unknown to most of the people.
* Added Inter-Arrival Time (IAT) calculation used to detect protocol misbehaviour (e.g. slow-DoS detection)
* Added data analysis features for computign metrics such as entropy, average, stddev, variance on a single and consistent place that will prevent when possible. This should ease traffic analysis on monitoring/security applications. New API calls have been implemented such as ndpi_data_XXX() to handle these calculations.
* Initial release of Python bindings available under nDPI/python.
* Implemented search of human readable strings for promoting data exfiltration detection
  * Available as library and in `ndpiReader` with option `-e`
* Fingerprints
  * JA3 (https://github.com/salesforce/ja3)
  * HASSH (https://github.com/salesforce/hassh)
  * DHCP
* Implemented a library to serialize/deserialize data in both Type-Length-Value (TLV) and JSON format
  * Used by nProbe/ntopng to exchange data via ZMQ

New Supported Protocols and Services

* DTLS (i.e. TLS over UDP)
* Hulu
* TikTok/Musical.ly
* WhatsApp Video
* DNSoverHTTPS
* Datasaver
* Line protocol
* Google Duo and Hangout merged
* WireGuard VPN
* IMO
* Zoom.us

Improvements

* TLS
  * Organizations
  * Ciphers
  * Certificate analysis
* Added PUBLISH/SUBSCRIBE methods to SIP
* Implemented STUN cache to enhance matching of STUN-based protocols
* Dissection improvements
  * Viber
  * WhatsApp
  * AmazonVideo
  * SnapChat
  * FTP
  * QUIC
  * OpenVPN support for UDP-based VPNs
  * Facebook Messenger mobile
  * Various improvements for STUN, Hangout and Duo
* Added new categories: CUSTOM_CATEGORY_ANTIMALWARE, NDPI_PROTOCOL_CATEGORY_MUSIC, NDPI_PROTOCOL_CATEGORY_VIDEO, NDPI_PROTOCOL_CATEGORY_SHOPPING, NDPI_PROTOCOL_CATEGORY_PRODUCTIVITY and NDPI_PROTOCOL_CATEGORY_FILE_SHARING
* Added NDPI_PROTOCOL_DANGEROUS classification

Fixes

* Fixed the dissection of certain invalid DNS responses
* Fixed Spotify dissection
* Fixed false positives with FTP and FTP_DATA
* Fix to discard STUN over TCP flows
* Fixed MySQL dissector
* Fix category detection due to missing initialization
* Fix DNS rsp_addr missing in some tiny responses
* Various hardening fixes

(adam)

2020-05-25 19:28:39 UTC MAIN commitmail json YAML

courier-authlib: Add missing bsd.prefs.mk include.

Required before testing PKGPATH, though the use of various PKGPATH tests
across the courier packages are pretty terrible and should be re-thought.

Fixes bulk builds.

(jperkin)

2020-05-25 17:54:03 UTC MAIN commitmail json YAML

Note update of lang/rust-bin to 1.42.0nb1.

(he)

2020-05-25 17:53:21 UTC MAIN commitmail json YAML

The ld.elf_so in NetBSD/8.x only obeys RPATH, not RUNPATH,
so fix to force RPATH usage on that platform.
Bump PKGREVISION for good measure.

(he)

2020-05-25 17:48:50 UTC MAIN commitmail json YAML

doc: Updated www/netsurf to 3.10

(leot)

2020-05-25 17:48:37 UTC MAIN commitmail json YAML

netsurf: Update to 3.10

pkgsrc changes:
- Remove patch-netsurf_content_handlers_html_html__interaction.c,
  patch-netsurf_utils_config.h, patch-netsurf_frontends_gtk_download.c: all
  present upstream now

Changes:
NetSurf 3.10 features many fixes, better performance and improved
functionality. In particular, handling of authentication, certificates
and fetch errors have been updated and unified. The GTK front end has
had a major overhaul too.

(leot)

2020-05-25 17:10:31 UTC MAIN commitmail json YAML

doc: Updated graphics/ansilove to 4.1.1

(fcambus)

2020-05-25 17:10:21 UTC MAIN commitmail json YAML

ansilove: update to 4.1.1.

ChangeLog:

AnsiLove/C 4.1.1 (2020-05-25)

- Various documentation tweaks and improvements
- Define timespecsub macro in compat.h if it doesn't exists
- Use CLOCK_REALTIME if CLOCK_MONOTONIC is not available
- Display processing time on exit
- Fix includes and add forward declarations in various source files

(fcambus)

2020-05-25 17:09:21 UTC MAIN commitmail json YAML

doc: Updated graphics/libansilove to 1.2.3

(fcambus)

2020-05-25 17:09:09 UTC MAIN commitmail json YAML

libansilove: update to 1.2.3.

ChangeLog:

libansilove 1.2.3 (2020-05-25)

- Call memset() to set all fontData struct fields to zero in all loaders
- Refactor error handling in ansilove_savefile()
- Add error handling for fwrite() in ansilove_savefile()
- Fix includes in various source files

(fcambus)

2020-05-25 15:25:45 UTC MAIN commitmail json YAML

doc: Updated textproc/ruby-libxml to 3.2.0

(taca)

2020-05-25 15:25:18 UTC MAIN commitmail json YAML

textproc/ruby-libxml: update to 3.2.0

Update ruby-libxml to 3.2.0.

== 3.2.0 / 2020-05-09 Charlie Savage

* Fix crash when creating an empty DTD
* Modernize tests to use Bundler to load gem
* Add libxml-ruby.rb file so gem loads in expted way.
* Add support for xmlSaveNoEmptyTags.
* Clean up extconf.rb file

(taca)

2020-05-25 15:22:52 UTC MAIN commitmail json YAML

doc: Updated sysutils/ruby-facter to 4.0.23

(taca)

2020-05-25 15:22:22 UTC MAIN commitmail json YAML

sysutils/ruby-facter: update to 4.0.23

Update ruby-facter to 4.0.23.

pkgsrc change:

* Update HOMEPAGE.
* Add proper dependency.

Changes are too many to write here, pleaes refer:
<https://github.com/puppetlabs/facter-ng/blob/master/CHANGELOG.md>.

(taca)

2020-05-25 15:19:20 UTC MAIN commitmail json YAML

doc: Added textproc/ruby-actionpack-xml_parser version 2.0.1

(taca)

2020-05-25 15:19:00 UTC MAIN commitmail json YAML

textproc/Makefile: add and enable ruby-actionpack-xml_parser

(taca)

2020-05-25 15:17:54 UTC MAIN commitmail json YAML

textproc/ruby-actionpack-xml_parser: add package version 2.0.1

Add ruby-actionpack-xml_parser package version 2.0.1 based on
wip/ruby-actionpack52-xml_parser.

A XML parameters parser for Action Pack (removed from core in Rails 4.0)

(taca)

2020-05-25 15:13:28 UTC MAIN commitmail json YAML

doc: Updated sysutils/ruby-chef to 16.0.287

(taca)

2020-05-25 15:12:57 UTC MAIN commitmail json YAML

sysutils/ruby-chef: update to 16.0.287

Update ruby-chef to 16.0.287.

Latest rubygems version is 16.1.0 but it chef require unpulished
bcrypt_pbkdf gem 1.1.0.rc1.  So, update to 16.0.287.

For more detail, please refer:
<https://github.com/chef/chef/blob/master/CHANGELOG.md>

(taca)

2020-05-25 15:12:07 UTC MAIN commitmail json YAML

doc: Updated misc/ruby-ohai to 16.0.20

(taca)

2020-05-25 15:11:18 UTC MAIN commitmail json YAML

misc/ruby-ohai: update to 16.0.20

Update ruby-ohai to 16.0.20 for ruby-chef 16.0.287.

16.0.20 (2020-04-28)

* Bump to version 16.0.0 #1420 (tas50)
* Allow chef-config 16 #1422 (tas50)
* Use is_a? to check the class in the DMI plugin #1423 (tas50)
* fix [#1406]: ensure optional_plugins to be array of symbols #1408 (salzig)
* Replace filesystem with filesystem2 on aix/solaris/bsd #1426 (tas50)
* Chefstyle fixes from Rubocop 0.80 #1431 (tas50)
* Minor testing updates #1432 (tas50)
* use bool instead of raise/rescue to detect linux user is exists #1434 (sawanoboly)
* Combine Linux / Windows fips plugins into a single plugin #1437 (tas50)
* Add logic to fetch the latest azure metadata version #1427 (tas50)
* Expose NIC channel params, coalesce params, and driver info... #1439 (matt-c-clark)
* Add a new interrupts plugin for Linux #1440 (davide125)
* Add a new ipc plugin for Linux #1441 (davide125)
* Fix test failure from missing require. #1442 (phiggins)
* Use native Expeditor gem caching & fix code owners #1443 (tas50)
* Cache gem installs in Buildkite on Windows as well #1444 (tas50)
* Make shard plugin more resilient and throw better errors #1446 (jaymzh)
* Fix chefstyle violations. #1449 (phiggins)
* Add a plugin for Windows mimicing the Unix dmi plugin #1445 (phiggins)
* Use correct DMI attribute name for product name #1451 (ramereth)
* Avoid constant warnings when reloading ohai plugins #1456 (tas50)

(taca)

2020-05-25 15:08:45 UTC MAIN commitmail json YAML

doc: Updated sysutils/ruby-chef-config to 16.0.287

(taca)

2020-05-25 15:08:18 UTC MAIN commitmail json YAML

sysutils/ruby-chef-config: update to 16.0.287

Update 16.0.287.

Latest rubygems version is 16.1.0 but it chef require unpulished
bcrypt_pbkdf gem 1.1.0.rc1.  So, update to 16.0.287.

For more detail, please refer:
<https://github.com/chef/chef/blob/master/CHANGELOG.md>

(taca)

2020-05-25 15:07:04 UTC MAIN commitmail json YAML

doc: Updated sysutils/ruby-chef-utils to 16.0.287

(taca)

2020-05-25 15:06:24 UTC MAIN commitmail json YAML

sysutils/ruby-chef-utils: update to 16.0.287

Update 16.0.287.

Latest rubygems version is 16.1.0 but it chef require unpulished
bcrypt_pbkdf gem 1.1.0.rc1.  So, update to 16.0.287.

For more detail, please refer:
<https://github.com/chef/chef/blob/master/CHANGELOG.md>

(taca)

2020-05-25 14:58:45 UTC MAIN commitmail json YAML

doc: Updated sysutils/capistrano to 3.14.0

(taca)

2020-05-25 14:58:17 UTC MAIN commitmail json YAML

sysutils/capistrano: update to 3.14.0

Update capistrano to 3.14.0.

3.14.0 (2020-05-06)

New Features

* Add custom prompt support for user input (#2055) @rolandasb

Documentation

* Update docs website icons, optimize images (#2056) @rolandasb

Housekeeping

* Fix CI builds for EOL Ruby versions (#2058) @mattbrictson

(taca)

2020-05-25 14:54:01 UTC MAIN commitmail json YAML

doc: Updated sysutils/puppet to 6.15.0

(taca)

2020-05-25 14:53:31 UTC MAIN commitmail json YAML

sysutils/puppet: update to 6.15.0

Update puppet to 6.15.0.

Changes are too many to write here, please refer release notes on
official Web.

<https://puppet.com/docs/puppet/latest/release_notes_puppet.html>

(taca)

2020-05-25 14:41:56 UTC MAIN commitmail json YAML

doc: Added www/ruby-request_store version 1.5.0

(taca)

2020-05-25 14:41:37 UTC MAIN commitmail json YAML

www/Makefile: add and enable ruby-request_store

(taca)

2020-05-25 14:40:23 UTC MAIN commitmail json YAML

www/ruby-request_store: add package version 1.5.0

Add ruby-request_store package version 1.5.0 from wip/ruby-request_store.

Ever needed to use a global variable in Rails? Ugh, that's the worst. If youq
need global state, you've probably reached for Thread.current. Like this:

    def self.foo
      Thread.current[:foo] ||= 0
    end

    def self.foo=(value)
      Thread.current[:foo] = value
    end

Ugh! I hate it. But you gotta do what you gotta do...

(taca)

2020-05-25 14:37:10 UTC MAIN commitmail json YAML

doc: Added textproc/ruby-csv version 3.1.5

(taca)

2020-05-25 14:36:53 UTC MAIN commitmail json YAML

textproc/Makefile: add and enable ruby-csv

(taca)

2020-05-25 14:35:40 UTC MAIN commitmail json YAML

textproc/ruby-csv: add package version 3.1.5

Add ruby-csv package version 3.1.5.

This library provides a complete interface to CSV files and data. It
offers tools to enable you to read and write to and from Strings or IO
objects, as needed.

(taca)

2020-05-25 14:32:07 UTC MAIN commitmail json YAML

doc: Added print/print/ruby-rbpdf-font and print/ruby-rbpdf

print/ruby-rbpdf-font version 1.19.1
print/ruby-rbpdf version 1.20.1

(taca)

2020-05-25 14:31:13 UTC MAIN commitmail json YAML

print/Makefile: add and enable ruby-rbpdf{,-font}

(taca)

2020-05-25 14:30:15 UTC MAIN commitmail json YAML

print/ruby-rbpdf: add package version 1.20.1

Add ruby-rbpdf package version 1.20.1.

A template plugin allowing the inclusion of ERB-enabled RBPDF template
files.

* Use UTF-8 encoding.
* RTL (Right-To-Left) languages support.
* HTML tag support.
* CSS minimum support.
* Image
- 8bit PNG image support without MiniMagick/RMagick library.
- PNG(with alpha channel)/JPEG/GIF image support. (use MiniMagick or
  RMagick library)

(taca)

2020-05-25 14:28:42 UTC MAIN commitmail json YAML

print/ruby-rbpdf-font: add package version 1.19.1

Add ruby-rbpdf-font package version 1.19.1 from wip/ruby-rbpdf-font.

RBPDF font files.

(taca)

2020-05-25 14:23:43 UTC MAIN commitmail json YAML

doc: Added textproc/ruby-htmlentities version 4.3.4

(taca)

2020-05-25 14:23:05 UTC MAIN commitmail json YAML

textproc/Makefile: add and enable ruby-htmlentities

(taca)

2020-05-25 14:21:57 UTC MAIN commitmail json YAML

textproc/ruby-htmlentities: add package version 4.3.4

Add ruby-htmlentities package version 4.3.4 from wip/ruby-htmlentities.

HTML entity encoding and decoding for Ruby

HTMLEntities is a simple library to facilitate encoding and decoding
of named (&yacute; and so on) or numerical (&#123; or &#x12a;)
entities in HTML and XHTML documents.

(taca)

2020-05-25 14:16:52 UTC MAIN commitmail json YAML

doc: Updated net/ruby-public_suffix to 4.0.5

(taca)

2020-05-25 14:16:24 UTC MAIN commitmail json YAML

net/ruby-public_suffix: update to 4.0.5

Update ruby-public_suffix to 4.0.5.

4.0.5 (2020-05-09)

Changed

- Updated definitions.

4.0.4 (2020-04-05)

Changed

- Updated definitions.

(taca)

2020-05-25 14:14:37 UTC MAIN commitmail json YAML

gpsbabel: Add comment about needed libusb version

(gdt)

2020-05-25 14:12:30 UTC MAIN commitmail json YAML

doc: Updated misc/ruby-mimemagic to 0.3.5

(taca)