Link [ pkgsrc | NetBSD | pkgsrc git mirror | PR fulltext-search | netbsd commit viewer ]


   
        usage: [branch:branch] [user:user] [path[@revision]] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN pkgtools/pkg)




switch to index mode

recent branches: MAIN (1m)  pkgsrc-2024Q1 (19d)  pkgsrc-2023Q4 (66d)  pkgsrc-2023Q2 (99d)  pkgsrc-2023Q3 (178d) 

2024-06-06 12:08:41 UTC Now

2023-12-22 14:30:55 UTC MAIN commitmail json YAML

graphics/opencv: disable stupid extern "C" that broke NetBSD build

For no good reason, perhaps for ancient LAPACK headers, the wrapper header
puts the includes into extern "C". This causes some compilers to complain
because LAPACK headers do C++ stuff if they see a C++ compiler and then
add extern "C" themselves.

(thor)

2023-12-22 13:38:31 UTC MAIN commitmail json YAML

fsviewer: Fix build by getting WINGs library flags via pkg-config
fsviewers build breaks because it can't find pango/pango.h
The WINGs library has the settings for this in its pkg-config file.
fsviewer uses WINGs so get the settings missing when building
from pkg-config.

(nros)

2023-12-22 13:25:10 UTC MAIN commitmail json YAML

doc: Updated devel/py-nihtest to 1.3.0

(wiz)

2023-12-22 13:25:02 UTC MAIN commitmail json YAML

py-nihtest: update to 1.3.0.

# 1.3.0 [2023-12-22]

- Add set-modification-time.
- Fix inline stdin data.
- Improve error handling.
- Require python 3.9.

(wiz)

2023-12-22 08:00:47 UTC MAIN commitmail json YAML

doc: Updated mail/neomutt to 20231221

(wiz)

2023-12-22 08:00:38 UTC MAIN commitmail json YAML

neomutt: update to 20231221.

2023-12-21  Richard Russon  \<rich@flatcap.org\>
* Features
  - #4126 - add alias 'tags:'
* Bug Fixes
  - #4115 - create HelpBar after colours
  - #4116 - Fix Batch Sending of Emails
  - #4119 - Fix Header Cache Key Handling
  - #4121 - mutt_oauth2.py: error out if ENCRYPTION_PIPE was not supplied
  - #4124 - config: fix flag overlaps
  - #4125 - compose: restore view-text/pager/mailcap
  - color: fix attr_color_copy()
  - fix :color dump
  - fix leak in completion
  - force mail check on current mailbox after `<imap-fetch-mail>`
  - Allow sending an empty mail
  - mutt_oauth2.py: Use readline to overcome macOS input() restrictions
* Changed Config
  - add $history_format: '%s'
* Translations
  - 100% Czech
  - 100% German
  - 100% Lithuanian
  - 100% Serbian
  - 100% Slovak
  - 100% Turkish
  - 99% Spanish
  - 99% Hungarian
* Coverity defects
  - #4111 Educate Coverity about ARRAYs
  - fix defects
* Build
  - #4098 - build: use fallthrough attribute
  - #4100 - build: split maildir and mh types
  - #4101 - version: drop default features
  - #4108 - strip non-conditionals
  - #4122 - add github action to check for unused functions (xunused)
  - update fedora action
  - coverage: fix build for lcov v2
  - tests: fix error cases
* Code
  - #4097 - config: add DT_ON_STARTUP
  - #4104 - Change mutt_default_save() and addr_hook() to take a buffer
  - #4105 - Use buffer pool in tests
  - #4106 - Switch some buffers to use the buffer pool
  - #4109 - Improve the Progress Bar
  - #4117 - remove MxOps::path_parent() and mutt_path_parent()
  - #4120 - remove unused functions
  - #4131 - move editor test code
  - #4133 - move log_disp_null() into test folder
  - #4137 - move config string name functions into tests
  - add: hook_new()/hook_free()
  - fix more printf-style params
  - rename compare to equal
  - hcache: renaming for clarity

(wiz)

2023-12-22 07:35:45 UTC MAIN commitmail json YAML

doc: Updated graphics/opencv-contrib-face to 3.4.17

(thor)

2023-12-22 07:35:24 UTC MAIN commitmail json YAML

doc: Updated graphics/opencv to 3.4.17

(thor)

2023-12-22 07:35:07 UTC MAIN commitmail json YAML

opencv: version 3.4.17 with proper explicit BLAS (CBLAS + LAPACKE) usage

This does the small bugfix update from 3.4.16 to 3.4.17 and adds proper usage
of BLAS stuff. There was linkage to BLAS before via numpy, but the internal
explicit BLAS-using code was not built, as the CMake machinery did not find it.

This commit drops an actually counterproductive patch and adds pkg-config
calls to find the BLAS-related libraries. Note that vor opencv-contrib-face,
the BLAS choice during its build doesn't really enter the result, apparently,
but the build process does use it and it would not help to confuse matters there.

I am not sure if the buildlink3.mk should also add blas.buildlink3.mk now. It
does not feature numpy right now. Should it?

Next step should be move towards 4.x at least.

Upstream:

December, 2021

OpenCV 3.4.17 has been released. Bug fixes, optimizations and other enhancements
are propagated into OpenCV 4.5.5.

Long-lived OpenCV 3.x release series is here since 2015. We are going to reduce
support of 3.x branch in the future to move forward to OpenCV 5.0.

(thor)

2023-12-22 02:42:20 UTC MAIN commitmail json YAML

2023-12-21 22:28:59 UTC MAIN commitmail json YAML

doc/TODO: + libdrm-2.4.119, tor-browser-13.0.8.

(wiz)

2023-12-21 21:24:32 UTC MAIN commitmail json YAML

doc: Updated graphics/wallust to 2.8.0

(pin)

2023-12-21 21:24:09 UTC MAIN commitmail json YAML

graphics/wallust: update to 2.8.0

new minor version: 2.8.0
- automate the creation of wallust.toml (missing word wrapping) [82c2911b11]
- implement color saturation optionally [24afe5754f]
- and avaliable with --saturation cli flag [67f0fde295]
- ensure a readable contrast in between palettes [b9f35899b6]
- colorspaces:
    - labmixed: truly mix colors, instead of the old workaround of only mixing
      luminance, by converting to rgb. [7b015e7cbf]
    - internals:
        - implement gather_cols() [7f4df61f58]
            = gather_cols_lazy() [ed488ca9d7]
        - implement .set_luminance() [18ff9ac6b3]
        - store an additional array of most prominent first [45a0b0260a]
        - hardcode lightest and darkest values intead of calculating them,
          ensuring a constant palette, which probably fixed monochromes
          palettes a bit [c48e5c7460]
- filters:
    - resized: respect aspect ratio [62885455c0e034c3c0765bdecb085b28128344f0}
    - add 16 variation of all other filters schemes [0e3f8ff125]
    - internals: accept Cols instead of raw [u8] [be41968427]
- sort cli flags in alphabetical order [925e59aa72]
- sort subcommand cli flags in alphabetical order [53043d23e5]
- support "this-name" as well as "thisname" either in the config file and the
  command line (e.g. wallust image.png -c labmixed is the same as wallust
  image.png -c lab-mixed) [08f1b0559c]
- --update-current/-u cli flag to only update terminal colors in the current
  session [7f4df61f58]
- add alpha template variable inside wallust.toml [67ede320d7]
- add {alpha_dec} to templates variable, indicates a decimal representation
  for the alpha value [077440c8b1]
- add a debug subcommad [225543f7bb]
- reword a bit descriptions of wallust.toml
- update dependencies

(pin)

2023-12-21 16:34:12 UTC MAIN commitmail json YAML

yubikey-manager-qt: fix build

(wiz)

2023-12-21 14:18:15 UTC MAIN commitmail json YAML

update homepage and master site

(zafer)

2023-12-21 14:11:08 UTC MAIN commitmail json YAML

master site moved to gitlab. oldest version is 0.8.9. needs update.

(zafer)

2023-12-21 13:46:56 UTC MAIN commitmail json YAML

2023-12-21 13:10:01 UTC MAIN commitmail json YAML

2023-12-21 13:07:17 UTC MAIN commitmail json YAML

update homepage and master site

(zafer)

2023-12-21 12:24:37 UTC MAIN commitmail json YAML

geeqie: fix locale files installation when PKGLOCALEDIR is not share

(nros)

2023-12-21 10:46:15 UTC MAIN commitmail json YAML

2023-12-21 09:31:32 UTC MAIN commitmail json YAML

doc/TODO: + enigma-1.30.

(wiz)

2023-12-21 08:57:02 UTC MAIN commitmail json YAML

the previous change broke checksum, fix it

(spz)

2023-12-21 08:50:25 UTC MAIN commitmail json YAML

biolibc-tools: fix installation of manpages for users of a custom PKGMANDIR

(nros)

2023-12-21 08:16:56 UTC MAIN commitmail json YAML

2023-12-21 08:14:57 UTC MAIN commitmail json YAML

doc/TODO: + grub2-2.12.

(wiz)

2023-12-21 07:07:05 UTC MAIN commitmail json YAML

uhd: remove patch that was removed from distinfo during update

(wiz)

2023-12-21 07:04:57 UTC MAIN commitmail json YAML

doc: libssh2 terrapin vuln

(wiz)

2023-12-21 07:04:30 UTC MAIN commitmail json YAML

doc: Updated security/libssh2 to 1.11.0nb2

(wiz)

2023-12-21 07:04:19 UTC MAIN commitmail json YAML

2023-12-21 02:58:40 UTC MAIN commitmail json YAML

2023-12-21 02:55:38 UTC MAIN commitmail json YAML

2023-12-21 02:54:46 UTC MAIN commitmail json YAML

2023-12-21 02:53:53 UTC MAIN commitmail json YAML

2023-12-21 02:27:26 UTC MAIN commitmail json YAML

graphics/ImageMagick6: PKG_OPTIONS_VAR shouldn't conflict with graphics/ImageMagick

(charlotte)

2023-12-21 01:14:41 UTC MAIN commitmail json YAML

editors/xjed: Reset PKGREVISION

(should have happened with update)

Thanks to pin@ for pointing this out.

(gdt)

2023-12-20 21:37:26 UTC MAIN commitmail json YAML

doc: Updated devel/cargo-modules to 0.13.1

(pin)

2023-12-20 21:37:01 UTC MAIN commitmail json YAML

devel/cargo-modules: update to 0.13.1

[0.13.1] - 2023-12-20
Changed
- Bumped MSRV from 1.68.2 to 1.70.0
- Updated dependencies:
    - rust-analyzer from 0.0.189 to 0.0.190

(pin)

2023-12-20 21:01:53 UTC MAIN commitmail json YAML

doc/TODO: + qemu-8.2.

(wiz)

2023-12-20 18:52:12 UTC MAIN commitmail json YAML

py-progressbar2: also needs wheel to build wheel

(nros)

2023-12-20 18:48:02 UTC MAIN commitmail json YAML

doc: erlang terrapin vuln

(wiz)

2023-12-20 18:47:27 UTC MAIN commitmail json YAML

doc: erlang* updated to 26.2.1

(wiz)

2023-12-20 18:47:06 UTC MAIN commitmail json YAML

Fix build on case sensitive filesystems

No PKGREVISION bump as no change in any built packages

(abs)

2023-12-20 18:46:53 UTC MAIN commitmail json YAML

erlang*: update to 26.2.1

Contains a Terrapin fix for erlang ssh.

26.2.1

---------------------------------------------------------------------
--- POTENTIAL INCOMPATIBILITIES -------------------------------------
---------------------------------------------------------------------

  OTP-18897    Application(s): ssh

              With this change (being response to CVE-2023-48795),
              ssh can negotiate "strict KEX" OpenSSH extension with
              peers supporting it; also
              'chacha20-poly1305@openssh.com' algorithm becomes a
              less preferred cipher.

              If strict KEX availability cannot be ensured on both
              connection sides, affected encryption modes(CHACHA and
              CBC) can be disabled with standard ssh configuration.
              This will provide protection against vulnerability, but
              at a cost of affecting interoperability. See
              Configuring algorithms in SSH.

---------------------------------------------------------------------
--- OTP-26.2.1 ------------------------------------------------------
---------------------------------------------------------------------

--- Fixed Bugs and Malfunctions ---

  OTP-18903    Application(s): otp

              Updated copyright and license information.

---------------------------------------------------------------------
--- erts-14.2.1 -----------------------------------------------------
---------------------------------------------------------------------

The erts-14.2.1 application can be applied independently of other
applications on a full OTP 26 installation.

--- Fixed Bugs and Malfunctions ---

  OTP-18902    Application(s): erts

              Removed unnecessary PCRE source tar-ball.

26.2

Highlights #

    process_info/2 now supports lookup of values for specific keys in the process dictionary.

Potential incompatibilities: #

    common_test now returns an error when a suite with a badly defined group is executed.

(wiz)

2023-12-20 18:38:39 UTC MAIN commitmail json YAML

2023-12-20 17:10:09 UTC MAIN commitmail json YAML

doc: dropbear terrapin vuln

(wiz)

2023-12-20 17:09:45 UTC MAIN commitmail json YAML

doc: Updated security/dropbear to 2022.83nb1

(wiz)

2023-12-20 17:09:36 UTC MAIN commitmail json YAML

dropbear: update to 2022.83nb1.

Include terrapin fix and bump PKGREVISION to make clear this
is not 2022.83.

2022.83 - 14 November 2022

Features and Changes:
  Note >> for compatibility/configuration changes

- >> Disable DROPBEAR_DSS by default
  It is only 1024 bit and uses sha1, most distros disable it by default already.

- Added DROPBEAR_RSA_SHA1 option to allow disabling sha1 rsa signatures.
  >> RSA with sha1 will be disabled in a future release (rsa keys will continue
  to work OK, with sha256 signatures used instead).

- Add option for requiring both password and pubkey (-t)
  Patch from Jackkal

- Add 'no-touch-required' and 'verify-required' options for sk keys
  Patch from Egor Duda

  - >> DROPBEAR_SK_KEYS config option now replaces separate DROPBEAR_SK_ECDSA
  and DROPBEAR_SK_ED25519 options.

- Add 'permitopen' option for authorized_keys to restrict forwarded ports
  Patch from Tuomas Haikarainen

- >> Added LTM_CFLAGS configure argument to set flags for building
  bundled libtommath. This also restores the previous arguments used
  in 2020.81 (-O3 -funroll-loops). That gives a big speedup for RSA
  key generation, which regressed in 2022.82.
  There is a tradeoff with code size, so -Os can be used if required.
  https://github.com/mkj/dropbear/issues/174
  Reported by David Bernard

- Add '-z' flag to disable setting QoS traffic class. This may be necessary
  to work with broken networks or network drivers, exposed after changes to use
  AF21 in 2022.82
  https://github.com/mkj/dropbear/issues/193
  Reported by yuhongwei380, patch from Petr Štetiar

- Allow overriding user shells with COMPAT_USER_SHELLS
  Based on a patch from Matt Robinson

- Improve permission error message
  Patch from k-kurematsu

- >> Remove HMAC_MD5 entirely

Regression fixes from 2022.82:

- Fix X11 build

- Fix build warning

- Fix compilation when disabling pubkey authentication
  Patch from MaxMougg

- Fix MAX_UNAUTH_CLIENTS regression
  Reported by ptpt52

- Avoid using slower prime testing in bundled libtomcrypt when DSS is disabled
  https://github.com/mkj/dropbear/issues/174
  Suggested by Steffen Jaeckel

- Fix Dropbear plugin support
  https://github.com/mkj/dropbear/issues/194
  Reported by Struan Bartlett

Other fixes:

- Fix long standing incorrect compression size check. Dropbear
  (client or server) would erroneously exit with
  "bad packet, oversized decompressed"
  when receiving a compressed packet of exactly the maximum size.

- Fix missing setsid() removed in 2020.79
  https://github.com/mkj/dropbear/issues/180
  Reported and debugged by m5jt and David Bernard

- Try keyboard-interactive auth before password, in dbclient.
  This was unintentionally changed back in 2013
  https://github.com/mkj/dropbear/pull/190
  Patch from Michele Giacomoli

- Drain the terminal when reading the fingerprint confirmation response
  https://github.com/mkj/dropbear/pull/191
  Patch from Michele Giacomoli

- Fix utx wtmp variable typo. This has been wrong for a long time but
  only recently became a problem when wtmp was detected.
  https://github.com/mkj/dropbear/pull/189
  Patch from Michele Giacomoli

- Improve configure test for hardening options.
  Fixes building on AIX
  https://github.com/mkj/dropbear/issues/158

- Fix debian/dropbear.init newline
  From wulei-student

Infrastructure:

- Test off-by-default compile options

- Set -Wundef to catch typos in #if statements

2022.82 - 1 April 2022

Features and Changes:
  Note >> for compatibility/configuration changes

- Implemented OpenSSH format private key handling for dropbearconvert.
  Keys can be read in OpenSSH format or the old PEM format.
  >> Keys are now written in OpenSSH format rather than PEM.
  ED25519 support is now correct. DSS keys are still PEM format.

- Use SHA256 for key fingerprints

- >> Reworked -v verbose printing, specifying multiple times will increase
  verbosity. -vvvv is equivalent to the old DEBUG_TRACE -v level, it
  can be configured at compile time in localoptions.h (see default_options.h)
  Lower -v options can be used to check connection progress or algorithm
  negotiation.
  Thanks to Hans Harder for the implementation

  localoptions.h DEBUG_TRACE should be set to 4 for the same result as the
  previous DEBUG_TRACE 1.

- Added server support for U2F/FIDO keys (ecdsa-sk and ed25519-sk) in
  authorized_keys. no-touch-required option isn't allowed yet.
  Thanks to Egor Duda for the implementation

- autoconf output (configure script etc) is now committed to version control.
  >> It isn't necessary to run "autoconf" any more on a checkout.

- sha1 will be omitted from the build if KEX/signing/MAC algorithms don't
  require it. Instead sha256 is used for random number generation.
  See sysoptions.h to see which algorithms require which hashes.

- Set SSH_PUBKEYINFO environment variable based on the authorized_keys
  entry used for auth. The first word of the comment after the key is used
  (must only have characters a-z A-Z 0-9 .,_-+@)
  Patch from Hans Harder, modified by Matt Johnston

- Let dbclient multihop mode be used with '-J'.
  Patch from Hans Harder

- Allow home-directory relative paths ~/path for various settings
  and command line options.
  *_PRIV_FILENAME DROPBEAR_PIDFILE SFTPSERVER_PATH MOTD_FILENAME
  Thanks to Begley Brothers Inc

  >> The default DROPBEAR_DEFAULT_CLI_AUTHKEY has now changed, it now needs
  a tilde prefix.

- LANG environment variable is carried over from the Dropbear server process
  From Maxim Kochetkov

- Add /usr/sbin and /sbin to $PATH when logging in as root.
  Patch from Raphaël Hertzog
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903403

- Added client option "-o DisableTrivialAuth". It disallows a server immediately
  giving successful authentication (without presenting any password/pubkey prompt).
  This avoids a UI confusion issue where it may appear that the user is accepting
  a SSH agent prompt from their local machine, but are actually accepting a prompt
  sent immediately by the remote server.
  CVE-2021-36369 though the description there is a bit confused. It only applies
  to Dropbear as a client.
  Thanks to Manfred Kaiser from Austrian MilCERT

- Add -q client option to hide remote banner, from Hans Harder

- Add -e option to pass all server environment variables to child processes.
  This should be used with caution.
  Patch from Roland Vollgraf (github #118)

- >> Use DSCP for QoS traffic classes. Priority (tty) traffic is now set to
  AF21 "interactive". Previously TOS classes were used, they are not used by
  modern traffic classifiers. Non-tty traffic is left at default priority.

- >> Disable dh-group1 key exchange by default. It has been disabled server
  side by default since 2018.

- >> Removed Twofish cipher

Fixes:

- Fix flushing channel data when pty was allocated (github #85)
  Data wasn't completely transmitted at channel close.
  Reported and initial patch thanks to Yousong Zhou

- Dropbear now re-executes itself rather than just forking for each connection
  (only on Linux). This allows ASLR to randomise address space for each
  connection as a security mitigation. It should not have any visible impact
  - if there are any performance impacts in the wild please report it.

- Check authorized_keys permissions as the user, fixes NFS squash root.
  Patch from Chris Dragan (github #107)

- A missing home directory is now non-fatal, starting in / instead

- Fixed IPv6 [address]:port parsing for dbclient -b
  Reported by Fabio Molinari

- Improve error logging so that they are logged on the server rather than being
  sent to the client over the connection

- Max window size is increased to 10MB, more graceful fallback if it's invalid.

- Fix correctness of Dropbear's handling of global requests.
  Patch from Dirkjan Bussink

- Fix some small bugs found by fuzzers, null pointer dereference crash and leaks
  (post authentication)

- $HOME variable is used before /etc/passwd when expanding paths such as
  ~/.ssh/id_dropbear (for the client). Patch from Matt Robinson

- C89 build fixes from Guillaume Picquet

Infrastructure:

- Improvements to fuzzers. Added post-auth fuzzer, and a mutator that can
  handle the structure of SSH packet streams. Added cifuzz to run on commits
  and pull requests.
  Thanks to OSS-Fuzz for the tools/clusters and reward funding.

- Dropbear source tarballs generated by release.sh are now reproducible from a
  Git or Mercurial checkout, they will be identical on any system. Tested
  on ubuntu and macos.

- Added some integration testing using pytest. Currently this has tests
  for various channel handling edge cases, ASLR fork randomisation,
  dropbearconvert, and SSH_PUBKEYINFO

- Set up github actions. This runs the pytest suite and other checks.
  - build matrix includes c89, dropbearmulti, bundled libtom, macos, DEBUG_TRACE
  - test for configure script regeneration
  - build a tarball for external reproducibility

(wiz)

2023-12-20 17:06:05 UTC MAIN commitmail json YAML

doc: terrapin for proftpd vuln

(wiz)

2023-12-20 17:05:15 UTC MAIN commitmail json YAML

doc: Updated net/proftpd to 1.3.8b

(wiz)

2023-12-20 17:05:01 UTC MAIN commitmail json YAML

proftpd*: update to 1.3.8b

1.3.8b - Released 19-Dec-2023
--------------------------------
- Issue 1735 - Compiling ProFTPD 1.3.8a mod_sftp, mod_tls using libressl 3.7.3
  fails.
- Issue 1756 - Build system fails for specific module names.
- Issue 1760 - mod_sftp is affected by "Terrapin" Prefix Truncation Attacks in
  SSH Specification (CVE-2023-48795).

1.3.8a - Released 08-Oct-2023
--------------------------------
- Issue 1581 - mod_sftp fails to handle SFTP requests to truncate files to
  zero size.
- Issue 1584 - mod_sftp improperly handles SFTP WRITE requests for files opened
  for appending.
- Issue 1568 - Build-time detection of Linux POSIX ACL support broken since
  1.3.8rc2.
- Issue 1590 - Unable to load mod_rewrite as a dynamic module due to
  incomplete/missing library linker flags.
- Issue 1597 - <Class> section is allowed to be in <Global>, but From directive
  is not.
- Issue 1617 - ExtendedLog SSH, SFTP classes not working as expected.
- Issue 1646 - mod_sftp does not handle multiple concurrent open file
  handles/transfers well for logging.
- Issue 1679 - "TLSRequired off" plus Protocols directive causes mod_tls to
  terminate the session abruptly.
- Issue 1689 - mod_tls fails to compile against OpenSSL 3.0.8 due to missing
  ENGINE_METHOD_ flags.
- Issue 1659 - Unknown named connection error when using different SQL backends.
- Issue 1697 - mod_sql is not properly closing all named backend connections on
  session exit.
- Issue 1694 - SSH key exchanges fail unexpectedly with "unable to write X
  bytes of raw data" errors due to small ProFTPD buffer.
- Issue 1678 - High session memory usage caused by SFTP outgoing data buffering.
- Issue 1683 - Out-of-bounds buffer read when handling FTP commands.
- Issue 1712 - SFTP algorithm settings in <Global> section not being used.

1.3.8 - Released 04-Dec-2022
--------------------------------
- Issue 1488 - 1.3.8rc4 failing to build mod_sftp with OpenSSL 1.1.0 due to
  X448 check.
- Issue 1494 - 1.3.8rc4 failing to build on Solaris due to missing type
  declarations.
- Issue 1500 - mod_ifsession doesn't change the effect of SFTPMaxChannels.
- Issue 1533 - mod_tls module unexpectedly allows TLS handshake after
  authentication in some configurations.
- Issue 1528 - Disable FSCachePolicy by default.
- Issue 1539 - Avoid logging "session closed" messages unless there is a
  corresponding "session opened" log message, to avoid user confusion.
- Issue 1550 - Implement support for the CSID FTP command.
- Bug 4491 - unable to verify signed data: signature type 'rsa-sha2-512' does
  not match publickey algorithm 'ssh-rsa'.
- Issue 1560 - mod_auth_otp improperly allows keyboard-interactive logins for
  users lacking OTP entries.

1.3.8rc4 - Released 23-Jul-2022
--------------------------------
- Issue 1434 - mod_sftp should fail on startup when SFTP and TLS are both
  enabled for a vhost.
- Issue 1440 - DelayTable not properly using documented default value.  This
  is a regression caused by the changes for Bug#4020.
- Issue 1444 - Support customizing SSH ciphers, digests, key exchanges via
  SFTPClientMatch.
- Issue 1448 - Ensure that mod_sftp algorithms work properly with OpenSSL 3.x.
- Issue 1445 - BanOnEvent BadProtocol triggers segfault.
- Issue 1439 - SFTP "check-file" implementation computes incorrect results.
- Issue 1457 - Implement SFTPHostKeys directive for configuring the SSH host
  key algorithms.
- Issue 1437 - Implement the "curve448-sha512" SSH key exchange algorithm.
- Issue 1472 - Include directive broken when using wildcards for directory
  components.
- Bug 4485 - mod_sftp fails to build using OpenSSL 1.0.x: undefined reference
  to `EVP_MD_CTX_reset'.
- Issue 1476 - Reload after omitting explicit ModulePath value causes fatal
  module load failures.

1.3.8rc3 - Released 23-Apr-2022
--------------------------------
- Issue 1323 - Support SSH hostkey rotation via OpenSSH extensions.
- Issue 1325 - NLST does not behave consistently for relative paths.
- Bug 3759 - Support AES Galois Counter Mode (AES-GCM) in SSH.  Support for
  the "aes128-gcm@openssh.com" and "aes256-gcm@openssh.com" ciphers has been
  added to mod_sftp.
- Issue 1333 - Implement an LDAPConnectTimeout directive, to configure the
  timeout used when connecting to LDAP servers.
- Issue 1330 - Implement OpenSSH "Encrypt-Then-MAC" (ETM) algorithm extensions.
- Issue 1346 - Implement AllowForeignAddress class matching for passive data
  transfers.
- Issue 1353 - Implement support for PCRE2.
- Bug 4466 - ProFTPD won't start with several locales.
- Issue 1367 - Auth sources providing space-bearing user/group names cause
  compliance issues with MLSD/MLST responses.
- Bug 4467 - DeleteAbortedStores removes successfully transferred files
  unexpectedly.
- Issue 1383 - Omit EPRT/EPSV from FEAT response when denied by <Limit>
  configuration.
- Issue 1379 - Support uploading to symlinked files.
- Issue 1401 - Keepalive socket options should be set using IPPROTO_TCP, not
  SOL_SOCKET.
- Issue 1402 - TCP keepalive SocketOptions should apply to control as well as
  data connection.
- Issue 1396 - ProFTPD always uses the same PassivePorts port for first
  transfer.
- Issue 1410 - mod_sftp needs to handle unknown SSH messages in an
  RFC-compliant manner, ignoring rather than disconnecting.
- Issue 1418 - Improve handling of some globally applied configuration
  directives.
- Issue 1369 - Name-based virtual hosts not working as expected after upgrade
  from 1.3.7a to 1.3.7b.

1.3.8rc2 - Released 29-Aug-2021
--------------------------------
- Bug 4401 - mod_sftp crashes when handling aes256-ctr OpenSSH-specific key
  with some old OpenSSL versions.
- Issue 1273 - Improve mod_tls log messages for unsupported older TLS protocol
  requests.
- Issue 1284 - Fix memory disclosure to RADIUS servers by mod_radius.
- Issue 1282 - Properly handle <VirtualHost> sections that use interface/device
  names.
- Bug 4315 - mod_ifsession fails to reset directory config lookup after
  <Directory> section merges.
- Issue 1296 - Support <Limit> configurations for HELP command.
- Issue 1300 - PCRE expressions with capture groups are not being handled
  properly.
- Issue 1307 - AuthUserFile permissions check fails during SIGHUP, causing
  ProFTPD to stop.
- Issue 1286 - Add support for the libidn2 library, over libidn, for e.g.
  mod_rewrite mappings.
- Bug 4443 - Changed the default behavior of mod_tls, such that TLS
  renegotiations on control/data connections are not requested by default.
  TLS renegotiations have a long and sordid history; many SSL/TLS libraries no
  longer implement them, or disable them by default.
- Issue 1319 - mod_auth_otp should honor RequireTableEntry semantics for SFTP
  logins.

1.3.8rc1 - Released 13-Jun-2021
--------------------------------
- Issue 1063 - FTPS data transfers using TLSv1.3 might segfault when session
  tickets cannot be decrypted.
- Issue 1070 - Implement support for Redis 6.x AUTH semantics.
- Issue 1068 - Define an OpenSSL API version compatibility macro, currently
  set to OpenSSL 1.0.0 and later.
- Bug 4405 - Memory use-after-free in mod_sftp causes unexpected
  login/authentication issues.
- Bug 4402 - Inappropriate handling of aborted FTP data transfers causes issues
  for some FTP clients.
- Issue 1084 - Implement support for configuring TLSv1.3 ciphersuites.
- Issue 1086 - Update TLSRenegotiate to work properly for TLSv1.3 sessions.
- Issue 1079 - prxs fails to detect module-specific configure/Makefile,
  leading to unexpected module load errors.
- Issue 1074 - TLS SNI connections to name-based VirtualHosts with
  TLSCertificateChainFile fail unexpectedly.
- Issue 1089 - Deprecate the MultilineRFC2228 directive.
- Issue 1067 - Generate new DH parameters for mod_tls, mod_sftp for 1.3.8.
- Issue 1101 - Update TLS minimum supported DH parameter size to 2048.
- Issue 811 - Support adding custom key/values to RedisLogOnCommand.
- Issue 1106 - TLS SNI can cause mod_quotatab to crash due to null pointer
  dereferences.
- Issue 1076 - TLS client-initiated renegotiations are supported unexpectedly.
- Issue 1105 - Improper handling of multiple IP addresses, ServerAliases in
  <VirtualHost> sections.
- Issue 1048 - Support using weak TLS certificates via the new AllowWeakSecurity
  TLSOption.
- Issue 1149 - mod_quotatab_sql failing due to SQL syntax errors.  This is a
  regression caused by Issue #392.
- Issue 1061 - Freeing uninitialized memory causes SFTP issues with ed25519
  keys.
- Issue 1111 - "Corrupted MAC on input" errors using SFTP umac-64@openssh.com
  digest.
- Issue 1171 - PassivePort randomization is broken due to SO_REUSEPORT option.
- Issue 1072 - Support configurable certificate settings in Redis SSL/TLS
  connections.
- Issue 369 - Provide function for obtaining memory pool information as e.g.
  JSON.
- Issue 1134 - AuthUserFile-based logins, directory listings are very slow due
  to unbuffered reads.
- Issue 1193 - Improper checking for reused TLS session for data transfers
  using OpenSSL 1.1.1.
- Issue 1168 - Improve error handling of OpenSSH host keys converted to PEM
  format.
- Issue 1179 - TLSRSACertificateKeyFile sanity checks fail unexpectedly for
  passphrase-protected keys.
- Issue 1174 - ftptop segfaults when using libncursesw on Gentoo.
- Issue 1204 - Once TLSTimeoutHandshake is reached, internal "timed out" flag
  never reset.
- Issue 1133 - Support include files in mod_wrap2 allow/deny tables.
- Issue 1200 - Disconnect SFTP clients that request unsupportable protocol
  versions.
- Issue 1207 - On Gentoo, "./configure --disable-ncurses" fails to link ftptop,
  due to "undefined reference to symbol 'stdscr'" error.
- Issue 1212 - mod_sql_mysql needs to quote table names due to reserved MySQL
  keywords.
- Issue 1175 - Unable to set per-user TLSOptions using mod_ifsession.
- Issue 754 - Some mod_snmp counters were not being incremented properly.
- Issue 548 - `make install` target should install only, not recompile any code.
- Bug 4428 - <VirtualHost> name resolution does not include all associated
  IPv6 records.
- Issue 1230 - Stack overflow due to unlimited recursion possible when parsing
  JSON text.
- Issue 1232 - Unable to use %{env:FTPS} in a SQLNamedQuery.  The fix is to now
  use %{note:FTPS} instead.
- Issue 1170 - Implement support for user/host combination bans in mod_ban.
- Issue 1246 - mod_sftp_sql crashes (sigsegv) on NULL key.
- Issue 1237 - ftpasswd should default to SHA256, not MD5.
- Issue 490 - Support syntax checks on AuthUserFiles, AuthGroupFiles on startup.

(wiz)

2023-12-20 16:43:12 UTC MAIN commitmail json YAML

doc: Added security/terrapin-scanner version 1.0.3

(schmonz)

2023-12-20 16:43:06 UTC MAIN commitmail json YAML

Add and enable terrapin-scanner.

(schmonz)

2023-12-20 16:43:04 UTC MAIN commitmail json YAML

Add terrapin-scanner: Scan SSH servers and clients for Terrapin vulnerability

The Terrapin Vulnerability Scanner is a small utility program written in
Go, which can be used to determine the vulnerability of an SSH client or
server against the Terrapin Attack. The vulnerability scanner requires a
single connection with the peer to gather all supported algorithms.
However, it does not perform a fully fledged SSH key exchange, will
never attempt authentication on a server, and does not perform the
attack in practice. Instead, vulnerability is determined by checking the
supported algorithms and support for known countermeasures (strict key
exchange). This may falsely claim vulnerability in case the peer
supports countermeasures unknown to this tool.

(schmonz)

2023-12-20 15:07:29 UTC MAIN commitmail json YAML

fcitx5-gtk: Fix linking with libxkbcommon on non-wayland platforms
fcitx5-gtk:s configure step claims that libxkbcommon is optional
but it always links to XKBCommon::XKBCommon. libxbcommon is pulled
in via buildlink3.mk from gtk3 on wayland platforms. On non-wayland
platforms it is not pulled in causing build breakage. Include
libxkbcommons buildlink3.mk in the Makefile to make sure it is
available unconditionally.
No revbump is done in this commit since it is a build fix, all
built packages are already linked to libxkbcommon.

(nros)

2023-12-20 12:03:25 UTC MAIN commitmail json YAML

2023-12-20 10:31:34 UTC MAIN commitmail json YAML

leptonica: fix build for packages that use liptonica with gcc 12 and C++ on Solaris

(nros)

2023-12-20 08:11:40 UTC MAIN commitmail json YAML

doc: Updated sysutils/xcp to 0.16.0

(pin)

2023-12-20 08:11:17 UTC MAIN commitmail json YAML

sysutils/xcp: update to 0.16.0

- Add reflink support for filesystems that support it (XFS, Btrfs, bcachefs).
- Add CI for FreeBSD (thanks to @yurivict for bug reports and suggestions).
- The parblock driver now works with MacOS.
- Test cleanup and optimisation of stress tests.

(pin)

2023-12-20 00:00:35 UTC MAIN commitmail json YAML

mk/bsd.pkg.mk: started freeze for pkgsrc-2023Q4 branch [gdt 2023-12-20]

(gdt)

2023-12-19 23:58:05 UTC MAIN commitmail json YAML

doc: Updated editors/xjed to 0.99.19nb1

(gdt)

2023-12-19 23:57:55 UTC MAIN commitmail json YAML

editors/xjed: Update to 0.99.19

Upstream does not seem to publish any changes, and does not even have tags.

Update prepared in wip by Kevin Bloom.
Committed after two weeks with no response from $MAINTAINER.

(gdt)

2023-12-19 23:56:13 UTC MAIN commitmail json YAML

doc: Updated editors/jed to 0.99.19

(gdt)

2023-12-19 23:56:00 UTC MAIN commitmail json YAML

2023-12-19 21:10:47 UTC MAIN commitmail json YAML

py-progressbar2: uses setuptools as build engine for wheel

(nros)

2023-12-19 17:26:09 UTC MAIN commitmail json YAML

2023-12-19 17:25:32 UTC MAIN commitmail json YAML

2023-12-19 17:24:36 UTC MAIN commitmail json YAML

2023-12-19 17:23:44 UTC MAIN commitmail json YAML

2023-12-19 17:23:13 UTC MAIN commitmail json YAML

2023-12-19 17:22:32 UTC MAIN commitmail json YAML

2023-12-19 15:08:00 UTC MAIN commitmail json YAML

2023-12-19 14:50:37 UTC MAIN commitmail json YAML

update homepage. fetch from backup.

(zafer)

2023-12-19 14:41:19 UTC MAIN commitmail json YAML

2023-12-19 14:34:58 UTC MAIN commitmail json YAML

2023-12-19 14:31:45 UTC MAIN commitmail json YAML

update homepage. provide archive.

(zafer)

2023-12-19 14:23:46 UTC MAIN commitmail json YAML

update homepage

(zafer)

2023-12-19 14:22:07 UTC MAIN commitmail json YAML

provide archive

(zafer)

2023-12-19 13:42:30 UTC MAIN commitmail json YAML

doc: Updated wm/marswm to 0.5.3

(pin)

2023-12-19 13:42:04 UTC MAIN commitmail json YAML

wm/marswm: update to 0.5.3

- Adding mars-help to quickstart guide
- Adding mars-help example
- Adding Canvas::dimensions()
- Fix error messages being printed to stdout

(pin)

2023-12-19 13:07:59 UTC MAIN commitmail json YAML

doc: Updated shells/oh-my-posh to 19.3.0

(pin)

2023-12-19 13:07:38 UTC MAIN commitmail json YAML

shells/oh-my-posh: update to 19.3.0

Features
- node: match lts versions (db32446), closes #4555

(pin)

2023-12-19 13:01:37 UTC MAIN commitmail json YAML

x11/qt5-qttools: really make llvm dependency go away with explicit switch

This adds the explicit switch to qmake to avoid pulling in llvm even from
the environment by accident. It only changes the result for people who
tried disabling the suggested llvm option but hat interference.

(thor)

2023-12-19 12:47:08 UTC MAIN commitmail json YAML

update homepage and master site

(zafer)

2023-12-19 12:43:53 UTC MAIN commitmail json YAML

update homepage and master site

(zafer)

2023-12-19 12:42:08 UTC MAIN commitmail json YAML

update homepage and master site

(zafer)

2023-12-19 12:38:45 UTC MAIN commitmail json YAML

update master site and homepage

(zafer)

2023-12-19 12:36:37 UTC MAIN commitmail json YAML

x11/qt5-qtmultimedia: fix backend choices (esp. deactivate openal)

This enables and disables audio backends explicitly via QMAKE_ARGS and
includes a patch from FreeBSD that adds the missing knob vor openal.

(thor)

2023-12-19 12:35:20 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:34:36 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:34:05 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:33:03 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:32:24 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:31:49 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:31:09 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:29:55 UTC MAIN commitmail json YAML

2023-12-19 12:29:02 UTC MAIN commitmail json YAML

doc: Updated math/armadillo to 12.6.7

(thor)

2023-12-19 12:28:50 UTC MAIN commitmail json YAML

math/armadillo: C++ linear algebra library

longer form:

Armadillo is a high quality linear algebra library (matrix maths) for the
C++ language, aiming towards a good balance between speed and ease of use

Provides high-level syntax and functionality deliberately similar
to Matlab

Useful for algorithm development directly in C++, or quick conversion
of research code into production environments

Provides efficient classes for vectors, matrices and cubes; dense and
sparse matrices are supported

Integer, floating point and complex numbers are supported

A sophisticated expression evaluator (based on template meta-programming)
automatically combines several operations to increase speed and efficiency

Dynamic evaluation automatically chooses optimal code paths based on
detected matrix structures

Various matrix decompositions (eigen, SVD, QR, etc) are provided
through integration with LAPACK, or one of its high performance drop-in
replacements (eg. MKL or OpenBLAS)

Can automatically use OpenMP multi-threading (parallelisation) to speed
up computationally expensive operations

Distributed under the permissive Apache 2.0 license, useful for both
open-source and proprietary (closed-source) software

Can be used for machine learning, pattern recognition, computer vision,
signal processing, bioinformatics, statistics, finance, etc

(thor)

2023-12-19 12:25:35 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Perl-Critic to 1.152

(mef)

2023-12-19 12:25:23 UTC MAIN commitmail json YAML

(devel/p5-Perl-Critic) Updated 1.150 to 1.152

1.152 Mon Oct 16 10:32:04 PM CDT 2023

    Now requires PPI 1.177.

    [Fixes]
    Fix a test failure for Subroutines::RequireArgUnpacking. Thanks, Christian
    Walde. (GH #1048)

    Fixed a test failure in t/06_violation.t on Perl 5.39.1 or above. Thanks,
    Yves Orton. (GH #1037)

(mef)

2023-12-19 12:23:51 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:23:18 UTC MAIN commitmail json YAML

math/superlu: fix buildlink to runtime dep for shared lib change

(thor)

2023-12-19 12:21:50 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Parse-PMFile to 0.44

(mef)

2023-12-19 12:21:41 UTC MAIN commitmail json YAML

(devel/p5-Parse-PMFile) Updated 0.42 to 0.44

0.44 2023/04/27
  - Allow to parse class|role NAME VERSION

0.43 2020/12/12
  - Avoid instantiating `Safe` compartment if operating in "unsafe" mode.
    (GH#12; bleargh45++)

(mef)

2023-12-19 12:20:00 UTC MAIN commitmail json YAML

doc: Updated devel/p5-PAR-Packer to 1.059

(mef)

2023-12-19 12:19:51 UTC MAIN commitmail json YAML

(devel/p5-PAR-Packer) Updated 1.052 to 1.059

1.059  2023-07-20

- correctly propagate the exit value of a packed executable

  Get the exit value from perl_destruct() instead of perl_run().
  These may be different, e.g. if the value of $? is set in an END block.

- clean up tests a bit
- set up GitHub CI and add cpanfile (for CI only)
- check more return codes in myldr/*.c

1.058  2023-06-12

- patch DynaLoader.pm to make intercepting DynaLoader::bootstrap work again
  for Perl >= 5.35 on Windows (see #74)

  $do_expand was changed in perl 5.36 from an (implicit) "local" variable
  to "my". This breaks how PAR::Heavy intercepts calls to
  DynaLoader::bootstrap: monkey-patching DynaLoader::bootstrap,
  DynaLoader::dl_findfile and DynaLoader::bootstrap while setting
  "local $DynaLoader::do_expand = 1".

- reorganize modules etc used in tests
- add test to run an XS module from a .par file
- add a test for loading XS "glue" DLLs

- remove unused code for packed DLLs ("pp --link ...")
  - nobody packs (non-XS) DLLs as embedded "FILE"s
  - nobody uses a $Config{version) sub directory when packing DLLs below
    "shlib/" in the zip

1.057  2022-11-29

- use a different method to mark executable built from "pp --clean ..."

  - scripts/par.pl: don't patch the string "__PASS_PAR_CLEAN__              \0" in the
    "boot" section of the executable and ...
  - myldr/boot.c: ... stop looking for the patched string
  - scripts/par.pl: add "\0CLEAN" in lieu of "\0CACHE" (and drop the 40-byte
    cache name below that) in the "trailer" section when generating a packed
    executable when META.yml indicates "--clean" was specified)
  - myldr/mktmpdir.c: allow "\0CLEAN" as an alternative to "\0CACHE"
    and set PAR_CLEAN=1 in that case
  - myldr/mktmpdir.c: implement find_par_magic() akin the one in script/par.pl

- better CLT detection in MacOS (#70) [plk <Philip@kime.org.uk>]

- use Getopt::ArgvFile with resolveEnvVars=1
  suggested by Johan Vromans (@sciurius on GitHub)

1.056  2022-09-05

- Fix #66: patch myldr/boot for "pp --clean ..." without side effects

  - make sure myldr/boot contains exactly one string of the form
    "__PASS_PAR_CLEAN__              \0" so that there are no
    duplicates that may get split on chunk boundaries
    (myldr/boot_embedded_files.c)
  - simplify patching of this string (in $loader) to
    "__PASS_PAR_CLEAN__=1            \0" in script/par.pl
  - add a test for #66 (check for ephemeral vs persistent cache directory)

- Revert "Fixes #62: rs6000_71 (AIX) "An offset in the .loader section header is too large.""

  PAR_CLEAN is set too late: at this point PAR_TEMP has already
  been set (and populated) to a persistent cache directory
  (/tmp/par-USER/cache-SHA1) instead of an ephemeral one (/tmp/par-USER/temp-PID).

- Some code cleanup
  - replace some magic numbers with constants
  - use string interpolation (instead of concatenation)
  - clean up some convoluted C code

1.055  2022-07-03

- Fix #62: rs6000_71 (AIX) "An offset in the .loader section header is too large."

  Communicate pp option "--clean" to the generated executable in a
  different way. Previously this was done by patching "__ENV_PAR_..." strings
  **in the executable being built** and interpreting these strings in
  par.pl **at runtime**. Though hacky, this seemingly worked on any OS
  (without rendering the executable invalid).
  But the only information ever passed was the value of PAR_CLEAN and this was
  gleaned at build time from the value of JSONPath $par.clean from META.yml
  in the zip (set by pp by option "--clean").
  Instead read and interpret "META.yml" in par.pl **at runtime**.

- Fix: merge PR #58 from Philip@kime.org.uk:

  Adding support for running MacOS Universal binaries created via 'lipo'
  from already pp'ed and signed thin binaries

- Make writing stuff more robust: check return value of print()
  and close() in some places.

1.054  2022-01-27

- Temporarily disable t/90-gh41.t (system("\\\\?\\some-absolute-path") fails)

1.053  2022-01-25

- Fix: merge PR #56 from from Philip Kime <Philip@kime.org.uk>:
  Updating OSX codesign fix util with fix for automatically added ad-hoc signatures on OSX 12+

- Fix: merge PR #42 from Andrew-Kulpa/master:
  Get exe size from file handle instead of path

- Fix: prevent TABs in literal makefile fragments from being expanded

- Cleanups:
  - par_findprog(): pass a copy of argument `path卒 to strtok()
  - simplify searching for PAR magic
  - consolidate die()s
  - add a test for GitHub #41
  - add error message when exec'ing the custom perl fails in myldr/boot
  - untangle %require_list and %ModuleCache

(mef)

2023-12-19 12:17:54 UTC MAIN commitmail json YAML

2023-12-19 12:16:36 UTC MAIN commitmail json YAML

doc: Updated devel/p5-PAR-Dist to 0.52

(mef)

2023-12-19 12:16:27 UTC MAIN commitmail json YAML

(devel/p5-PAR-Dist) Updated 0.51 to 0.52

0.52  2023-06-07

- change bugtracker to GitHub issues

- quote all version numbers in META.yml files in test *.par
  files to avoid CPAN Testers failures like
  http://www.cpantesters.org/cpan/report/973fa832-ec54-11ed-98b0-b3c3213a625c

(mef)

2023-12-19 12:14:54 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 12:14:30 UTC MAIN commitmail json YAML

doc: Updated devel/p5-PAR to 1.019

(mef)

2023-12-19 12:14:21 UTC MAIN commitmail json YAML

(devel/p5-PAR) Updated 1.0.17 to 1.0.19

1.019  2023-11-01

- register XS DLLs extracted into $PAR_TEMP/inc with %PAR::Heavy::FullCache

  This solves the problems mentioned in GitHub PR #8
  ("Special case Gtk related dlls to dl_load from the unpacked inc dir")
  with applications using modules Gtk2, Pango, Cairo and others (this is
  a Windows only problem)

- Heavy.pm: use strict; use warnings
  Thanks @shawnlaffan

1.018  2022-09-28

- Fix #6: PAR fails to test its build on MSWin32 with Perl-5.36.0

  Makefile.PL:  Quote t/gen-hello-par.pl for Windows
  Merge PR #5 by Tim Hoke <Tim.Hoke@veritas.com>

(mef)

2023-12-19 12:01:46 UTC MAIN commitmail json YAML

rubyforge has been shut down in 2014.

(zafer)

2023-12-19 11:53:01 UTC MAIN commitmail json YAML

math/superlu: fix pkg-config usage and hence BLAS usage

(thor)

2023-12-19 11:37:19 UTC MAIN commitmail json YAML

2023-12-19 11:10:33 UTC MAIN commitmail json YAML

update master site

(zafer)

2023-12-19 11:08:47 UTC MAIN commitmail json YAML

update master site and homepage

(zafer)

2023-12-19 11:05:05 UTC MAIN commitmail json YAML

defunct master site. update homepage.

(zafer)

2023-12-19 11:04:03 UTC MAIN commitmail json YAML

update homepage and master site

(zafer)

2023-12-19 11:02:09 UTC MAIN commitmail json YAML

defunct master site. update homepage.

(zafer)

2023-12-19 10:34:19 UTC MAIN commitmail json YAML

doc: Updated math/superlu to 6.0.1

(thor)

2023-12-19 10:34:09 UTC MAIN commitmail json YAML

math/superlu: update to 6.0.1, build shared lib, fix BLAS usage

This now links against the correct BLAS and installs a shared lib, as is
more customary for us. Upstream Changes:

October 17, 2020  Version 5.2.2
    Applied a number of patches, merged a number of PRs.
Septtember 29, 2021  Version 5.3.0
    Added CI with github Actions.
    Applied a number of patches.
    Cleaned up warnings.
April 5, 2023  Version 6.0.0
    Add 64-bit indexing support and METIS ordering option.
August 5, 2023  Version 6.0.1
    Minor fixes, mostly documentation and clean up warnings

(thor)

2023-12-19 09:49:49 UTC MAIN commitmail json YAML

doc: Added devel/crates-query version 0.1.1

(pin)

2023-12-19 09:49:23 UTC MAIN commitmail json YAML

Add crates-query

(pin)

2023-12-19 09:48:20 UTC MAIN commitmail json YAML

devel/crates-query: import package

Command line tool to query crates.io index.

It contains several query subcommands:
* Dependencies - list-a-given-crates-dependencies
* Rust Version - get-the-minimum-rust-version
* Features - query-features-available
* Versions - get-versions-published

By default crates-query will always use the latest available, but a specific
version can be specified using the --ver flag.

(pin)

2023-12-19 09:47:32 UTC MAIN commitmail json YAML

biology/Makefile: add recently added libpll package

(thor)

2023-12-19 09:37:14 UTC MAIN commitmail json YAML

devel/R-tclkl2: remove controlled failure as pkg/56696 is resolved

My changes fixing the tcl install that broke this package went in. No
need to bail out anymore without DISPLAY.

(thor)

2023-12-19 01:00:27 UTC MAIN commitmail json YAML

2023-12-19 00:49:52 UTC MAIN commitmail json YAML

accountsservice: minor patch cleanup

Improve library inclusion and explicit linking. Also fix some code
formatting, plus spelling and grammar tweaks. (We still don't
correctly include util.h, because the upstream project uses its
own header file by that name, which is woven all over the place.
That should be fixed later.) Noted while reviewing the NetBSD support
patch set.

The (now rather dated) 0.6.42 release is (co-incidentally?) the last
version before various function signature changes that assume a glibc-
specific structure exists that's passed around. This of course doesn't
work on NetBSD. There's more than one way to fix this: OpenBSD added a
whole bunch more #ifdefs; a more elegant method would be to abstract
these expectations. The upstream project has recently landed a patch
set that sort of does the latter (simply copies the glibc struct if it
isn't found), but that hasn't made it into a release yet.

(gutteridge)

2023-12-18 23:12:06 UTC MAIN commitmail json YAML

doc: Updated sysutils/u-boot-pinephone to 2021.01

(gutteridge)

2023-12-18 22:49:45 UTC MAIN commitmail json YAML

2023-12-18 22:49:15 UTC MAIN commitmail json YAML

textproc/itstool: depend on py-libxml2 with the re-added symbols to un-break

(thor)

2023-12-18 22:48:07 UTC MAIN commitmail json YAML

doc: Updated geography/pdal-lib to 2.5.6

(thor)

2023-12-18 22:47:54 UTC MAIN commitmail json YAML

pdal-lib: update to 2.5.6

Among various bug fixes, these are the changes since 2.2.0:

2.5.6
    bug fixes

2.5.5
    bug fixes

2.5.4
    bug fixes

2.5.3
    bug fixes

2.5.2
Enhancements

    Provided allow_empty option to readers.gdal #3984

2.5.1
Enhancements

    Optional debug in filters.csf to improve performance #3952 (thanks
    @n4z4m3!)
    Connection classes for readers.copc and readers.ept consolidated
    (#3962)

2.5.0
Changes of Note

    TileDB 2.3 now required for TileDB read/write support (#3722)
    readers.fbx and readers.mrsid have been removed (#3841)
    Make PDAL Locale agnostic (#3873) Thanks @jjimenezshaw!
    Non-public symbols are now hidden on unix (#3931) Thanks @abellgithub!
    PipelineExecutor class is now deprecated (#3937)

New Stages

    readers.ptx (Thanks @dbrookes96!) supports reading the PTX
    format(#3718)
    writers.fbi and readers.fbi supports TerraSolid binary format(#3822)
    (Thanks @alavenant!)
    filters.trajectory estimates trajectory for certain data
    configurations (#3743)
    filters.geomdistance computes the (2D) distance of points to a given
    geometry (#3891)
    readers.stac dereferences STAC Catalogs to read point cloud data
    (#3915)
    filters.expression uses the same syntax as where to filter data
    (#3930)

Enhancements

    boundary_json GeoJSON added to pdal info output (#3750)
    Sort COPC output by GPSTime if available (#3747)
    filters.zsmooth enabled by default (#3785)
    update googletest to 1.12.1 by in (#3917)
    Support GDAL 64bit integer types if they are defined (#3795)
    PROJJSON output now added to pdal info output (#3780)
    QuickInfo now supports adding Metadata (#3894)
    stage-n-push support for writers.copc (#3790)
    pdal translate will not overwrite data by default (#3794)
    'bounds' option to limit filters.overlay usage (#3815)
    wmain usage of pdal comand for wide filename character support on
    Windows (#3824)
    binmode added to writers.gdal to count only points inside pixels
    (#3840)
    attr_dims and ogr_options options to writers.ogr (#3837) Thanks
    @rcoup!
    Add metadata to readers.las QuickInfo (#3897)
    writers.copc.threads option (#3910)
    Support spaces in dimension names (#3907)
    writers.copc.a_srs option (#3908)
    readers.copc outputs copc_info metadata on read (#3936)

2.4.3
Changes of Note

    A significant memory leak in LAZ decompression was fixed #3814
    PDAL's website is migrating to @readthedocs Thanks @j9ac9k! #3782

Enhancements

    writers.copc remote file writing was added #3819
    filters.overlay bounds option added #3815
    laz-perf vendored code updated to 3.1.0 release #3821
    Arbiter credentials now support profiles #3792

2.4.2
Changes of Note

None
Enhancements

    #3769 workshop documentation updates (Thanks @j9ac9k!)

2.4.1
Changes of Note

    writers.copc now sorts chunks by GPStime, allowing better compression.
    Various warnings for newer compilers have been eliminated.

Enhancements

    Errors from the geotiff library are now directed to the console
    (standard error).
    readers.bpf now adds a count of the number of points to metadata.
    The pdal info command now always writes a GeoJSON metadata entry of
    the area boundary called boundary_json.

2.4.0
Changes of Note

    A compiler that supports C++17 is now required to build PDAL or
    include PDAL headers in your code.
    The PDAL_STATIC_BUILD cmake option has been removed. We do not
    support building PDAL as a static library, though it may work.
    The behavior of readers.ept when specifying both bounds and polygon
    options has changed such that a point must pass both the filters
    independently in order to be accepted. (#3506)
    readers.ept will now ignore the spatial reference on a clip region
    if the point source has no spatial reference. This behavior is
    consistent with filters.crop. (#3580)
    readers.las and writers.las no longer support the laszip library. Both
    stages now use the lazperf library, which is embedded into the PDAL
    library. The compression option is still accepted in readers.las, but
    is ignored. The compression option on writers.las still accepts the
    LASZIP and LAZPERF , but those values are treated the same as TRUE.
    PDAL now builds on MinGW, though future support depends on community
    contributions.
    Source code supporting las and ept has been moved to a private
    namespace.

New Stages

    readers.copc and writers.copc have been added to support reading
    and writing of COPC files.
    readers.smrmsg was added to read from post-processed MMS accuracy
    files to be used with SBET data.

Enhancements

    The performance of filters.litree has been improved. (#3518)
    Support for time query/storage in readers.tiledb and writers.tiledb
    has been added. (#3495)
    Added various remote access support (AWS Fargate, AWS session token
    support, Azure SAS token support). (#3496)
    An error is now reported when reading a pipeline with multiple
    leaf nodes.
    Support for beam direction and origin in readers.rxp has been
    added. (#3565)
    Add a cmake macro PDAL_CREATE_PLUGIN that may simplify the creation
    of some PDAL plugin stages. (#3588)
    writers.null is now streamable. (#3591)
    Added support for multiple output files in writers.ply (#3617 -
    Thanks @longhuan2018)
    filters.csf now permits selective output of debugging/analysis
    files. (#3488)
    Comments in JSON input files (pipelines) are now supported. (#3670)
    Added support in writers.las for creating VLRs from metadata. (#3683)
    Added query support origin query in version 1.1 of EPT. (#3505)

2.3.0
Changes of Note

    GDAL version 3 is now required. (#3428)
    readers.tiledb now defaults to unordered reads. (#3267)
    readers.tiledb now supports Hilbert ordering. (#3345)
    writers.pcd now writes 32-bit floating point for X, Y and Z by
    default. (#3286)
    The GDAL error handler is redirected to its destination when PDAL
    logging stops. (#3244)

New Command

    Added pdal eval to print a classification report from two input
    point clouds. (#3346)
    Added pdal chamfer to calculate the chamfer distance, a metric used
    to quantify the similarity of two point clouds by evaluating the mean
    square distance of nearest neighbor correspondences between clouds.

New Stages

    filters.gpstimeconvert allows conversion between the various GPS
    time standards.
    filters.teaser uses the truncated least squares estimation and
    semidefinite relaxation (TEASER) algorithm to create a rigid
    transformation between two datasets.
    readers.draco reads the Draco format.
    writers.draco writes the Draco format.
    filters.zsmooth sets a dimension to a value determined by nearby
    points. (#3408)

Removed Stages

    readers.oci
    writers.oci

Enhancements

    pdal pipeline and pdal translate now support a --dims option that
    allows the stored dimensions to be easily controlled. (#3310)
    readers.las now reports and terminates on some previously undetected
    LAS file errors. (#3226)
    Added override_srs and default_srs options to readers.gdal to allow
    a raster with only NODATA to have an SRS. (#3271)
    Support was added for MSVC 2019. (#3292)
    Added text output of GeoTIFF keys to metadata when reading LAS
    data. (#3299)
    Added programmatic support to merge summary statistics. (#3321)
    Extra dimension names in a LAS file containing characters deemed
    illegal by PDAL are now converted by default to legal PDAL dimension
    names. (#3325)
    The sample filter is now streamable. (#3275)
    Added the --error_on_failure option to filters.reprojection to allow
    the program to terminate if a projection operation fails. (#3316)
    Added the --start option to readers.las to allow skipping some number
    of points. (#3313)
    Set the `ACCEPT_ENCODING' curl option to enable automatic
    decompression of HTTP replies.
    Improve error messages for LAS where a specified point format is
    not permitted. (#3324)
    Add the --where option to all writers. (#3319)
    Added a --nosrs option to readers.las to avoid reading the SRS
    information. (#3441)
    Improved performance of readers.ept in stream mode. (#3331)

(thor)

2023-12-18 22:46:42 UTC MAIN commitmail json YAML

u-boot-pinephone: update to 2021.01

A slight bump from 2021.01-rc3. Switches us to the centralized version
provided in sysutils/u-boot. Prompted mostly to also pick up a build
fix for py-setuptools 69.0.

(gutteridge)

2023-12-18 22:45:58 UTC MAIN commitmail json YAML

doc: Updated ham/uhd to 4.6.0.0

(mef)

2023-12-18 22:44:41 UTC MAIN commitmail json YAML

(ham/uhd) Updated 004.004 to 004.006

Change Log for Releases
==============================

## 004.006.000.000
* ci
  - only build docker images once per week
  - propagate testLength to RF ATS
  - replace deprecated ruamel.yaml methods
  - use build farm for windows builds
* cmake
  - Fix make_x410 and make_x440 targets
* deb
  - copyright file update to eliminate errors and warnings
* docs
  - X440: Add FBX to daughterboard list
  - X440: Corrected web link syntax in FBX doc.
  - x440: Add X440_X4_200 to image flavors
  - Add dual-rate documentation
* examples
  - L band capture example using dual rate
* fpga
  - ci: Add X440_X4_200 to pipelines
  - lib: Allow buffering in eth_ipv4_chdr_adapter
  - n3xx: Add CE clock
  - rfnoc: Add clock info to backend ifc
  - rfnoc: radio: Add clock index parameters
  - tools: Add X440_X4_200 to X440 package
  - x400: Add CE clock
  - x400: Add X440 200 MHz variant with DDC/DUC
  - x400: Split DRAM interface into two banks
  - x400: Update PL DRAM speed bin
  - x400: bump minor revision
  - x400: pps_sync cleanup
  - x400: propagate pps_sync changes
  - x400: update signals to run on two domains
  - x440: cpld: led control cleanup
  - x440: remove extra synchronizer
* images
  - bump x4xx fpga images
  - update non-x4xx images
* lib
  - rfnoc: Add clock info fields to client zero
  - rfnoc: Add support for auto-clock discovery
  - x4xx: Use auto clock ID in x400_radio_control
* mpm
  - x440: Add lookup table for default MCR per DSP bandwidth
  - x440: Multi-Tile Sync disabled when using dual rate
  - x400: Align FPGA revision
  - x400: match HDL PPS updates
  - x400: make PRC a multiple of both rfdc rates
  - fix timekeeper misalignment
* multi_usrp
  - Added module_serial to info
* rfnoc
  - Enable SEP throttle register
  - image builder: Add clock index support to image builder
* utils
  - init device with gpsdo sources in query_gpsdo_sensors
* x4xx
  - Add support for auto clock ID
  - FPGA designs now use a replay block per utilized DRAM bank
* x440
  - Add support for using radio block specific master clock rates
  - X4_440 and X4_1600 fpga image now contain 2 replay blocks
    (number of ports per replay block halved compared to previous release)

## 004.005.000.000
* b200
  - Fix invalid RF switch positions
* ci
  - add attempt number to uhd build artifact name on failure
  - Add conditions for embedded builds, HW tests
  - add pytest args option to test dev pipeline
  - add step for x440 embedded runs
  - Allow internal fileserver usage for MS installer builds
  - Auto-detect conditionals for pipeline stages
  - Default to internal fileserver for FPGA images
  - Disable PR runs for draft PRs
  - Enable X440
  - Fix swallowed return codes in CI script steps
  - Fix the chocolately version to use
  - fixup typo in x440 sdr-test0 template
  - increase build timeouts to 90 minutes
  - increase win docker image build timeout
  - modify default sfp0 and reboot
  - Remove Fedora 35 and add Fedora 37
  - restrict analyze changeset pool
  - select docker image repo directly at container endpoint definitions
  - select docker registry based on branch
  - splitup x410 test stage in hardware test dev pipeline
  - Update CLA Assistant to v2.3.0
  - update docker builds to run twice a week
  - update docker service connection
  - update to build docker builds for all release branches
  - updates for new E320 in devtest system
* clang
  - Apply clang-formatting to all C/C++ files
  - Modify files for treatment with clang-format
  - Update clang-format for version 14
* cmake
  - Fix auto-detection of Python install directory
  - Fix linking DPDK when installed at non-standard location
* cpld
  - Adapt CPLD updater for future X4x0 dboards
* debian
  - Fix copyright dates in changelog
* devtest
  - add exemptions for x440 python API test
  - correct docstrings with example being run
  - disable rx_samples_to_file_test for x440
  - fix typo in error message
  - gpio test updates
  - remove API calls that now error
  - remove benchmark_rate test for x440
* docs
  - Add page on timed commands
  - add python package requirement for usrpctl MPM reset
  - add updated msgpack rpc package
  - b200: Improve docs (auto MCR, GPIOs)
  - Document throttle stream arg
  - Fix argument for uhd_image_loader in E3xx docs
  - Fix docstring for get_block_chain()
  - fix typo and consistency in usrpctl docs
  - Improve documentation on timekeepers
  - Make X410 dboard a subpage of the X4xx page
  - rfnoc: Document RFNoC overrun handling algorithm
  - Update clocking theory of operations for X4xx
  - update docs for reset command
  - update FPGA build docs
  - update remote streaming supported version
  - Update X4x0 manual
  - Update X4xx manual wrt. self-cal
  - x410: Document UC_200 image flavor
  - x440: Added FBX to UM daughterboards page
  - x440: Extend X4x0 Usage Manual for x440
  - x440: Fixed incorrect use of paragraph elements
* examples
  - Add power controls to rx_ascii_art_dft.cpp
  - Add throttle to replay_capture.py
  - Amend tx_waveforms.py to use DramTransmitter
  - Fix play region in replay_capture.py
  - Remove default --ref and --pps values
  - rx_samples_to_file: multi_streamer option
* experts
  - Add force_dirty() call
* extension
  - windows: Fixed linking extension example to uhd.lib
* fpga
  - Add BUILD_BASE_DIR option to makefiles
  - Add BUILD_SEED variable
  - Add time changed pulse to timekeeper
  - Add X440/FBX support
  - ci: Add MAX_CPU to pool demands
  - ci: Add X410_UC_200 to default bitfiles
  - ci: Add X410_UC_200 to release pipeline
  - ci: Enable publishing to internal server
  - ci: Fix branches
  - ci: Include modified manifest in artifacts
  - ci: Support parallel jobs for IP builds
  - ci: Use different seed for each job attempt
  - ci: Use repeat_fpga_build for pipeline builds
  - Clear clang-format settings for FPGA code
  - docs: Add system memory recommendations
  - docs: Clarify design tool requirements
  - Fix RFNoC OOT Makefile inclusion
  - lib: Add axis_pkt_throttle.sv
  - lib: Add clock_div module
  - lib: Add ctrl_port_to_wb_i2c module
  - lib: Fix IPv4 CHDR TUSER width
  - lib: Fix Vivado warnings
  - lib: rfnoc: Add resize capability to chdr_stream_endpoint
  - lib: rfnoc: Make RFNoC packet gates removable
  - lib: rfnoc: Remove redundant packet gate
  - lib: rfnoc: Support multiple port widths on crossbar
  - Reformat javascript in doc
  - rfnoc: Add DEVICE_FAMILY to stream endpoint
  - rfnoc: Add throttle to stream endpoints
  - rfnoc: Add ULTRASCALE to chdr_ingress_fifo
  - Synchronize X300 RX frontends on time change
  - tools: Add repeat_fpga_build.py
  - tools: Add X410_UC_200 image to X410 package
  - Update all RFNoC image core files
  - Update RFNoC YAML copyright
  - x400: Add 1x64, 2x64, and 1x128 DRAM interconnect
  - x400: Add CG_200 RFNoC image cores
  - x400: Add ifdef to remove QSFP wrappers when unused
  - x400: Add support for X4C, C1, and UC variants
  - x400: Add X440 to default make targets
  - x400: Add X4C_200 RFNoC image cores
  - x400: Fix DB1 timekeeper strobe
  - x400: Fix PRC divider register map
  - x400: Fix SPI trigger clock crossing
  - x400: Make transport adapter width configurable
  - x400: Remove CPU_W parameter
  - x400: Set QSFP LEDs on startup
  - x400: sim: Add 10 GbE with wide CHDR
  - x400: Use x410_200 image core for x410_100 images
  - x440: fbx: clean up I2C triggers
  - x4xx: Refactor MB CPLD code for future devices
  - x4xx: Rename x410 -> x4xx for common DTS files
* github
  - Fix URL for mailing list
* host
  - Add cstdint include to fix gcc-13 compile.
  - Add in OpenBSD support to uhd::path_expandvars
  - Bump minimum gcc version to 7.3.0
  - doc: Add documentation for tertiary, quaternary QSFP adapter
  - fix & improve EAL args for DPDK v21.11
  - fix build with DPDK v22.11 LTS
  - improve DPDK frame_size error message
  - docs: Fix link to MSVC Redistributable Package
  - python: Update last_gain at end of run_rx_cal loop
* images
  - Add X410_UC_200 to manifest
  - add X440 dependencies to manifest
  - bump x4xx fpga images
  - bump x4xx fpga images
  - update FPGA images for E3xx, X3xx, N3xx
  - Update manifest for SEP throttling
  - Update X410 manifest
* lib
  - Add default virtual dtor to filter_node
  - Add X440/FBX support
  - fbx: Remove unused lambda captures
  - Fix time-cast for dboard_iface::sleep()
  - Mark select x400_dboard_iface methods as const
  - Mark selected x400_dboard_iface child methods final
  - max287x: Remove unused class attributes
  - mb_controller: Minor fixes to logging, formatting
  - rfnoc: Fix linter issue regarding virtual dtor
  - rfnoc: Fix logic in can_connect_device_to_device()
  - rfnoc: Use device cache for rfnoc_graph::make()
  - tests: Mark mock pop_host_tasks() as override
  - mpm: Add MPM synchronization API
* mpm
  - Add ability to query enabled state of ADC/DAC blocks
  - Add dboard_info to db_iface initialization
  - Add LogRuntimeError class
  - Add revE support to zbx_update_cpld
  - Add support for X440/FBX
  - allow for mpm device to tell host to reboot mpm
  - bist: Improve --help message
  - Bump compat number to 5.0
  - dboard_iface: Remove {set/get}_if_freq() APIs
  - dboard_manager: Fix linter issues in dboard_manager/base.py
  - Demote sync_tiles() error to warning
  - Disable PRC to DB if not required
  - e3xx: Fix inheritance order for DB classes
  - enable Xilinx API for PLL config
  - fix get_product_id in x4xx BIST
  - fix GPS lock sensor method name
  - Fix test utilities
  - Fix ZBX CPLD updater
  - lmk04832: Move general APIs to base class
  - Move get_dboard_class_from_pid()
  - move pop_host_tasks to PeriphManagerBase
  - mpmutils: Add parse_multi_device_arg() function
  - mpmutils: Fix Pylint warning
  - Normalize name for gps_locked sensor
  - periph_manager: Remove vestigial Python-six
  - Refactor LMK04832X4xx and LMK03328X4xx
  - rfdc_ctrl: Change latency argument to signed
  - rfdc: Enhance converter checks
  - rfdc: Remove set_sample_rate() API call
  - Simplify x4xx_bist nsync_fabric
  - Update X440 clock policy
  - Updated default MCR for X440
  - utils: Add LogWrapper
  - x440: Move clock info logging out of policy
  - x4xx: Add additional args parsing in init()
  - x4xx: Add intermediate clock settings to clock policy
  - x4xx: add intermediate clocking setting
  - x4xx: Add logging for metal and rfdc versions
  - x4xx: Add master_clock_rates argument to _set_ref_clock_freq()
  - x4xx: add multiple latency detect iterations
  - x4xx: Add rfdc rate as a sensor to X4xx dboards
  - x4xx: Add UC FPGA type
  - X4xx: Change reset strategy to cover all X4xx
  - x4xx: Check for tear_down()'s existence
  - x4xx: Conditionally initialize DB flash
  - x4xx: Enable DBs to have updateable_components
  - x4xx: Enable MMCM configuration based on policy
  - x4xx: Enable MPM sync API for X410
  - x4xx: Explicitly pass MCR values to set_sync_source()
  - x4xx: Extend x4xx_rfdc_regs
  - x4xx: Factor clock control out of X4xxClockManager
  - x4xx: filter MCR list
  - x4xx: Improve SPLL comments
  - x4xx: Introduce X4xxClockPolicy
  - x4xx: Let RFDC control use clock policy
  - x4xx: Make sysref_delay part of clock policy
  - x4xx: mb_cpld: Add missing bitfields
  - x4xx: Minor preparations to x4xx.py for X440 support
  - x4xx: Move all clock control to single class
  - x4xx: Move common DB tasks from ZBX class to mixin
  - x4xx: Move enable_iq_swap to x4xx_rfdc_ctrl.py
  - x4xx: Move get_master_clock_rate() to DB-RPC
  - x4xx: Move MB CPLD creation to factory
  - x4xx: Move SPLL sync before RFDC config
  - x4xx: Optimize clock configuration at init
  - x4xx: Prepare clock management for multi-mcr
  - x4xx: Refactor x4xx_rfdc_ctrl
  - x4xx: Remove get_cal_eeprom_spi_node()
  - x4xx: Remove internal_temp_sensor
  - x4xx: Rename 'both' argument to 'all'
  - x4xx: rfdc: Add get_converter_rate() API
  - x4xx: rfdc: Pull fabric words value from registers
  - x4xx: Separate RFDC and MMCM resets
  - x4xx: Separate RFDC reset from its configuration
  - x4xx: Shut down tiles on tear_down()
  - x4xx: Trust the clock policy's default MCR
  - fpga: x4xx: Major updates in preparation for future devices
* multi_usrp
  - rfnoc: Added warning when handling tune_request
* octoclock
  - Fix uhd_usrp_probe error
* python
  - Add 'const' to get_continuous_tone(); improve sanity-checks
  - Add DramTransmitter class
  - Add X440 to image builder
  - Fix subdev_spec_t wrapping
  - multi_usrp: Remove spurious print
  - rfnoc: Add radio_control.get_{ticks,time}_now
  - signal: Add more waveforms to get_continuous_tone()
  - stream: Overload TxStreamer.recv_async_msg()
  - Wrap direction_t
  - Wrap stream_cmd_t::stream_mode
* Replay buffered TX streamer
  - Fix gaps in TX
* rfnoc
  - Add options for RFNoC image core headers
  - Add set_command_time and clear_command_time binding to Python API.
  - Allow interruption of streaming during overrun handling
  - Coerce replay packets to atomic item size
  - Demote some de-init DEBUG messages
  - Enable SEP throttle register
  - Fix disconnecting back-edges from graphs
  - Fix doxygen comments in rfnoc_graph
  - Fix sync calls for multi-timekeeper operation
  - Improve Doxygen for sync calls
  - Make edge comparison more flexible
  - radio: Always prefer register-based time access
  - radio: Make default SPP a multiple of max CHDR width
  - replay: Make default IPP a multiple of max CHDR width
  - Set DEVICE_FAMILY on stream endpoints
  - Support multiple CHDR widths in RFNoC image builder
  - update switchboard forwarding on property set
* SelfCal
  - Add startup_tile() for cal_mode selection
  - Enable parameters in self-cal executable
  - Expose config parameters
  - Remove self-cal from boot and fpga update
  - Trigger if clocking has changed
* tests
  - add delayed streaming start args
  - add packet capture raw udp tests
  - add streaming tests for UC_200 bitfile
  - benchmark_rate improvements
  - Fix Python warnings in parse_benchmark_rate.py
  - fix when the rx cmd's stream_now is set
* tools
  - Add changeset analyzer
  - Add clang-formatting tools
  - add devtest rule for changeset_analyzer
  - Remove fpga directory from Debian build
  - run all tests for manifest update
  - Update upload_debs.sh script
* UBX
  - Add VCO band calibration and map access
  - Initialize UBX set_tx_freq freq_lo variables to 0.0
  - Shift IF for RX frequencies <100 MHz
* uhd
  - doc: Add documentation for ADC self calibration
  - multi_usrp: Support multiple timekeepers on rfnoc devices
  - Update changelog with 4.1.0.x releases
  - x4xx: Add methods to query number of chans, samp rate
  - x4xx: Refactor ADC self cal
* usrpctl
  - add reset command
* utils
  - Add X4xx ADC threshold query script
  - Fix usrp2_recovery.py for Python3
* x4xx
  - get bool for force_reinit arg
  - pass reboot mpm command to host on new clock config for x440
  - Update BIST to match clocking refactoring
* x4xx_bist
  - replace set_clock_source for x440

(mef)

2023-12-18 22:29:43 UTC MAIN commitmail json YAML

games/ufoai: fix stray DESTDIR in binaries

(rillig)

2023-12-18 21:57:35 UTC MAIN commitmail json YAML

u-boot & u-boot-pinecube: fix pinecube builds

As of py-setuptools 69.0, PEP 440 versioning is strictly enforced, so
builds that invoked pylibfdt were failing with a version string that
included "u-boot-" in it.

(gutteridge)

2023-12-18 21:16:47 UTC MAIN commitmail json YAML

doc: paramiko vuln

(wiz)

2023-12-18 21:16:14 UTC MAIN commitmail json YAML

doc: Updated security/py-paramiko to 3.4.0

(wiz)

2023-12-18 21:16:05 UTC MAIN commitmail json YAML

py-paramiko: update to 3.4.0.

- :release:`3.4.0 <2023-12-18>`
- :feature:`-` `Transport` grew a new ``packetizer_class`` kwarg for overriding
  the packet-handler class used internally. Mostly for testing, but advanced
  users may find this useful when doing deep hacks.
- :bug:`-` Address `CVE 2023-48795<https://terrapin-attack.com/>`_ (aka the
  "Terrapin Attack", a vulnerability found in the SSH protocol re: treatment of
  packet sequence numbers) as follows:

    - The vulnerability only impacts encrypt-then-MAC digest algorithms in
      tandem with CBC ciphers, and ChaCha20-poly1305; of these, Paramiko
      currently only implements ``hmac-sha2-(256|512)-etm`` in tandem with
      ``AES-CBC``. If you are unable to upgrade to Paramiko versions containing
      the below fixes right away, you may instead use the
      ``disabled_algorithms`` connection option to disable the ETM MACs and/or
      the CBC ciphers (this option is present in Paramiko >=2.6).
    - As the fix for the vulnerability requires both ends of the connection to
      cooperate, the below changes will only take effect when the remote end is
      OpenSSH >= 9.6 (or equivalent, such as Paramiko in server mode, as of
      this patch version) and configured to use the new "strict kex" mode.
      Paramiko will always attempt to use "strict kex" mode if offered by the
      server, unless you override this by specifying ``strict_kex=False`` in
      `Transport.__init__`.
    - Paramiko will now raise an `SSHException` subclass (`MessageOrderError`)
      when protocol messages are received in unexpected order. This includes
      situations like receiving ``MSG_DEBUG`` or ``MSG_IGNORE`` during initial
      key exchange, which are no longer allowed during strict mode.
    - Key (re)negotiation -- i.e. ``MSG_NEWKEYS``, whenever it is encountered
      -- now resets packet sequence numbers. (This should be invisible to users
      during normal operation, only causing exceptions if the exploit is
      encountered, which will usually result in, again, `MessageOrderError`.)
    - Sequence number rollover will now raise `SSHException` if it occurs
      during initial key exchange (regardless of strict mode status).

  Thanks to Fabian B辰umer, Marcus Brinkmann, and J旦rg Schwenk for submitting
  details on the CVE prior to release.

- :bug:`-` Tweak ``ext-info-(c|s)`` detection during KEXINIT protocol phase;
  the original implementation made assumptions based on an OpenSSH
  implementation detail.

(wiz)

2023-12-18 20:11:30 UTC MAIN commitmail json YAML

u-boot: fix pine-h64 builds

As of py-setuptools 69.0, PEP 440 versioning is strictly enforced, so
builds that invoked pylibfdt were failing with a version string that
included "u-boot-" in it.

(gutteridge)

2023-12-18 20:00:44 UTC MAIN commitmail json YAML

u-boot-pinephone: address some pkglint issues, etc. (NFC)

(gutteridge)

2023-12-18 19:57:52 UTC MAIN commitmail json YAML

u-boot-pinephone: fix DESCR

(gutteridge)

2023-12-18 19:54:30 UTC MAIN commitmail json YAML

TODO: note vte3-0.74.2

(gutteridge)

2023-12-18 19:25:13 UTC MAIN commitmail json YAML

doc: add some ssh implementation vulns

(wiz)

2023-12-18 19:23:21 UTC MAIN commitmail json YAML

doc/TODO: + ufoai-2.5.

(wiz)

2023-12-18 19:20:26 UTC MAIN commitmail json YAML

doc: Updated devel/nss to 3.96.1

(wiz)

2023-12-18 19:20:13 UTC MAIN commitmail json YAML

nss: update to 3.96.1.

There was no 3.96.0 release.

Changes:
Bug 1869408 - Use pypi dependencies for MacOS worker in ./build_gyp.sh <https://hg.mozilla.org/projects/nss/rev/16ccde14ea6714ee0e6a602379194141578859a8>
Bug 1830978 - p7sign: add -a hash and -u certusage (also p7verify cleanups). <https://hg.mozilla.org/projects/nss/rev/425660da5f297d7583783eb27f877865289efc29>
Bug 1867408 - add a defensive check for large ssl_DefSend return values. <https://hg.mozilla.org/projects/nss/rev/1bda168c0da97e19e5f14bc4227c15c0a9f493bf>
Bug 1869378 - Add dependency to the taskcluster script for Darwin <https://hg.mozilla.org/projects/nss/rev/e934c6d1d4366d152e3307cb76af4c02667c9147>
Bug 1869378 - Upgrade version of the MacOS worker for the CI <https://hg.mozilla.org/projects/nss/rev/5463f2a14bd430fc793e29a07854dc647f61eae8>

(wiz)

2023-12-18 17:48:42 UTC MAIN commitmail json YAML

2023-12-18 17:32:37 UTC MAIN commitmail json YAML

2023-12-18 17:17:33 UTC MAIN commitmail json YAML

lsof: Fix build under NetBSD-current (10.99.x)

Get "lsof" to build after NetBSD-current's name cache changes

(tron)

2023-12-18 17:11:31 UTC MAIN commitmail json YAML

u-boot: fix nanopi-r2s and rock64 builds

As of py-setuptools 69.0, PEP 440 versioning is strictly enforced, so
builds that invoked pylibfdt were failing with a version string that
included "u-boot-" in it.

(gutteridge)

2023-12-18 17:07:34 UTC MAIN commitmail json YAML

doc: Updated security/libssh to 0.106

(wiz)

2023-12-18 17:07:25 UTC MAIN commitmail json YAML

libssh: update to 0.106.

version 0.10.6 (released 2023-12-18)
* Fix CVE-2023-6004: Command injection using proxycommand
* Fix CVE-2023-48795: Potential downgrade attack using strict kex
* Fix CVE-2023-6918: Missing checks for return values of MD functions
* Fix ssh_send_issue_banner() for CMD(PowerShell)
* Avoid passing other events to callbacks when poll is called recursively (#202)
* Allow @ in usernames when parsing from URI composes

(wiz)

2023-12-18 16:52:37 UTC MAIN commitmail json YAML

2023-12-18 16:25:55 UTC MAIN commitmail json YAML

doc: Updated security/py-paramiko to 3.3.1nb1

(wiz)

2023-12-18 16:25:43 UTC MAIN commitmail json YAML

py-paramiko: convert to wheel.mk

Update dependencies.

Bump PKGREVISION.

(wiz)

2023-12-18 16:13:42 UTC MAIN commitmail json YAML

doc: Updated www/squid6 to 6.6

(sborrill)

2023-12-18 16:13:23 UTC MAIN commitmail json YAML

squid6: update to 6.6

Changes since 6.5:
        - Bug 5328: Fix ESI build with libxml2 v2.12.0
        - Bug 5319: QOS Netfilter MARK preservation is always disabled
        - Bug 5318: peer_digest.cc:399: "fetch->pd && receivedData.data"
        - Bug 5317: FATAL attempt to read data from memory
        - Bug 5154: Do not open IPv6 sockets when IPv6 is disabled
        - FTP: Ignore credentials with a NUL-prefixed username
        - log_db_daemon: Fix DSN construction
        - Limit the number of allowed X-Forwarded-For hops
        - Do not update StoreEntry expiration after errorAppendEntry()
        - improve handling of response sending errors

(sborrill)

2023-12-18 16:11:27 UTC MAIN commitmail json YAML

doc: Updated security/py-asyncssh to 2.14.2

(wiz)

2023-12-18 16:11:17 UTC MAIN commitmail json YAML

py-asyncssh: update to 2.14.2.

Release 2.14.2 (18 Dec 2023)
----------------------------

* Implemented "strict kex" support and other countermeasures to
  protect against the Terrapin Attack described in `CVE-2023-48795
  <https://github.com/advisories/GHSA-hfmc-7525-mj55>`. Thanks once
  again go to Fabian B辰umer, Marcus Brinkmann, and J旦rg Schwenk for
  identifying and reporting this vulnerability and providing detailed
  analysis and suggestions about proposed fixes.

* Fixed config parser to properly an optional equals delimiter in all
  config arguments. Thanks go to Fawaz Orabi for reporting this issue.

* Fixed TCP send error handling to avoid race condition when receiving
  incoming disconnect message.

* Improved type signature in SSHConnection async context manager. Thanks
  go to Pieter-Jan Briers for providing this.

(wiz)

2023-12-18 16:09:47 UTC MAIN commitmail json YAML

py-libxml2: require fixed libxml2 version

(wiz)

2023-12-18 16:09:16 UTC MAIN commitmail json YAML

libxml2: revert previous

(wiz)

2023-12-18 16:08:32 UTC MAIN commitmail json YAML

textproc/libxml2, textproc/py-libxml2: fix dependencies and PKGREVISION

Make sure the fixed build of libxml2 with the deprecated symbols is pulled
in.

(thor)

2023-12-18 16:06:36 UTC MAIN commitmail json YAML

doc: Updated net/dhcpcd to 10.0.6

(roy)

2023-12-18 16:06:17 UTC MAIN commitmail json YAML

Import dhcpcd-10.0.6 with the following changes:

* privsep: Stop proxying stderr to console and fix some detachment issues
* non-privsep: Fix launcher hangup
* DHCP6: Allow the invalid interface name - to mean don't assign an address from a delegated prefix
* DHCP6: Load the configuration for the interface being activated from prefix delegation

(roy)

2023-12-18 15:57:12 UTC MAIN commitmail json YAML

doc: Updated security/putty to 0.80

(wiz)

2023-12-18 15:57:00 UTC MAIN commitmail json YAML

putty: update to 0.80.

PuTTY version 0.80 is released
------------------------------

This is a SECURITY UPDATE. We recommend that _everybody_ upgrade, as
soon as possible.

There is one security fix in this release:

- Fix for a newly discovered security issue known as the 'Terrapin'
  attack, also numbered CVE-2023-48795. The issue affects widely-used
  OpenSSH extensions to the SSH protocol: the ChaCha20+Poly1305
  cipher system, and 'encrypt-then-MAC' mode.

  In order to benefit from the fix, you must be using a fixed version
  of PuTTY _and_ a server with the fix, so that they can agree to
  adopt a modified version of the protocol. Alternatively, you may be
  able to reconfigure PuTTY to avoid selecting any of the affected
  modes.

  If PuTTY 0.80 connects to an SSH server without the fix, it will
  warn you if the initial protocol negotiation chooses an insecure
  mode to run the connection in, so that you can abandon the
  connection. If it's possible to alter PuTTY's configuration to
  avoid the problem, then the warning message will tell you how to do
  it.

As well as this security fix, there are two other ordinary bug fixes
in 0.80:

- On Windows, if you installed the MSI package, PuTTY could not find
  its help file. The help file was installed, but PuTTY wouldn't be
  able to open it, so the help buttons in its dialog boxes were
  missing.

- Sometimes, if you were looking at the terminal scrollback, the view
  position would be reset to the bottom of the scrollback unwantedly,
  if the server sent terminal output that didn't actually cause
  anything to be printed.

(wiz)

2023-12-18 15:53:27 UTC MAIN commitmail json YAML

devel/hdf5: rename unsafe-threads to hdf5-unsafe-threads and document it

(thor)

2023-12-18 15:52:20 UTC MAIN commitmail json YAML

py-asyncssh: bump PKGREVISION for previous

(wiz)

2023-12-18 15:52:05 UTC MAIN commitmail json YAML

py-asyncssh: convert to wheel.mk

Fix LICENSE while here.

(wiz)

2023-12-18 15:38:45 UTC MAIN commitmail json YAML

doc: Updated security/openssh to 9.6p1

(wiz)

2023-12-18 15:38:34 UTC MAIN commitmail json YAML

openssh: update to 9.6p1.

Changes since OpenSSH 9.5
=========================

This release contains a number of security fixes, some small features
and bugfixes.

Security
========

This release contains fixes for a newly-discovered weakness in the
SSH transport protocol, a logic error relating to constrained PKCS#11
keys in ssh-agent(1) and countermeasures for programs that invoke
ssh(1) with user or hostnames containing invalid characters.

* ssh(1), sshd(8): implement protocol extensions to thwart the
  so-called "Terrapin attack" discovered by Fabian Bäumer, Marcus
  Brinkmann and Jörg Schwenk. This attack allows a MITM to effect a
  limited break of the integrity of the early encrypted SSH transport
  protocol by sending extra messages prior to the commencement of
  encryption, and deleting an equal number of consecutive messages
  immediately after encryption starts. A peer SSH client/server
  would not be able to detect that messages were deleted.

  While cryptographically novel, the security impact of this attack
  is fortunately very limited as it only allows deletion of
  consecutive messages, and deleting most messages at this stage of
  the protocol prevents user user authentication from proceeding and
  results in a stuck connection.

  The most serious identified impact is that it lets a MITM to
  delete the SSH2_MSG_EXT_INFO message sent before authentication
  starts, allowing the attacker to disable a subset of the keystroke
  timing obfuscation features introduced in OpenSSH 9.5. There is no
  other discernable impact to session secrecy or session integrity.

  OpenSSH 9.6 addresses this protocol weakness through a new "strict
  KEX" protocol extension that will be automatically enabled when
  both the client and server support it. This extension makes
  two changes to the SSH transport protocol to improve the integrity
  of the initial key exchange.

  Firstly, it requires endpoints to terminate the connection if any
  unnecessary or unexpected message is received during key exchange
  (including messages that were previously legal but not strictly
  required like SSH2_MSG_DEBUG). This removes most malleability from
  the early protocol.

  Secondly, it resets the Message Authentication Code counter at the
  conclusion of each key exchange, preventing previously inserted
  messages from being able to make persistent changes to the
  sequence number across completion of a key exchange. Either of
  these changes should be sufficient to thwart the Terrapin Attack.

  More details of these changes are in the PROTOCOL file in the
  OpenSSH source distribition.

* ssh-agent(1): when adding PKCS#11-hosted private keys while
  specifying destination constraints, if the PKCS#11 token returned
  multiple keys then only the first key had the constraints applied.
  Use of regular private keys, FIDO tokens and unconstrained keys
  are unaffected.

* ssh(1): if an invalid user or hostname that contained shell
  metacharacters was passed to ssh(1), and a ProxyCommand,
  LocalCommand directive or "match exec" predicate referenced the
  user or hostname via %u, %h or similar expansion token, then
  an attacker who could supply arbitrary user/hostnames to ssh(1)
  could potentially perform command injection depending on what
  quoting was present in the user-supplied ssh_config(5) directive.

  This situation could arise in the case of git submodules, where
  a repository could contain a submodule with shell characters in
  its user/hostname. Git does not ban shell metacharacters in user
  or host names when checking out repositories from untrusted
  sources.

  Although we believe it is the user's responsibility to ensure
  validity of arguments passed to ssh(1), especially across a
  security boundary such as the git example above, OpenSSH 9.6 now
  bans most shell metacharacters from user and hostnames supplied
  via the command-line. This countermeasure is not guaranteed to be
  effective in all situations, as it is infeasible for ssh(1) to
  universally filter shell metacharacters potentially relevant to
  user-supplied commands.

  User/hostnames provided via ssh_config(5) are not subject to these
  restrictions, allowing configurations that use strange names to
  continue to be used, under the assumption that the user knows what
  they are doing in their own configuration files.

Potentially incompatible changes
--------------------------------

* ssh(1), sshd(8): the RFC4254 connection/channels protocol provides
  a TCP-like window mechanism that limits the amount of data that
  can be sent without acceptance from the peer. In cases where this
  limit was exceeded by a non-conforming peer SSH implementation,
  ssh(1)/sshd(8) previously discarded the extra data. From OpenSSH
  9.6, ssh(1)/sshd(8) will now terminate the connection if a peer
  exceeds the window limit by more than a small grace factor. This
  change should have no effect of SSH implementations that follow
  the specification.

New features
------------

* ssh(1): add a %j token that expands to the configured ProxyJump
  hostname (or the empty string if this option is not being used)
  that can be used in a number of ssh_config(5) keywords. bz3610

* ssh(1): add ChannelTimeout support to the client, mirroring the
  same option in the server and allowing ssh(1) to terminate
  quiescent channels.

* ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): add support for
  reading ED25519 private keys in PEM PKCS8 format. Previously
  only the OpenSSH private key format was supported.

* ssh(1), sshd(8): introduce a protocol extension to allow
  renegotiation of acceptable signature algorithms for public key
  authentication after the server has learned the username being
  used for authentication. This allows varying sshd_config(5)
  PubkeyAcceptedAlgorithms in a "Match user" block.

* ssh-add(1), ssh-agent(1): add an agent protocol extension to allow
  specifying certificates when loading PKCS#11 keys. This allows the
  use of certificates backed by PKCS#11 private keys in all OpenSSH
  tools that support ssh-agent(1). Previously only ssh(1) supported
  this use-case.

Bugfixes
--------

* ssh(1): when deciding whether to enable the keystroke timing
  obfuscation, enable it only if a channel with a TTY is active.

* ssh(1): switch mainloop from poll(3) to ppoll(3) and mask signals
  before checking flags set in signal handler. Avoids potential
  race condition between signaling ssh to exit and polling. bz3531

* ssh(1): when connecting to a destination with both the
  AddressFamily and CanonicalizeHostname directives in use,
  the AddressFamily directive could be ignored. bz5326

* sftp(1): correct handling of the limits@openssh.com option when
  the server returned an unexpected message.

* A number of fixes to the PuTTY and Dropbear regress/integration
  tests.

* ssh(1): release GSS OIDs only at end of authentication, avoiding
  unnecessary init/cleanup cycles. bz2982

* ssh_config(5): mention "none" is a valid argument to IdentityFile
  in the manual. bz3080

* scp(1): improved debugging for paths from the server rejected for
  not matching the client's glob(3) pattern in old SCP/RCP protocol
  mode.

* ssh-agent(1): refuse signing operations on destination-constrained
  keys if a previous session-bind operation has failed. This may
  prevent a fail-open situation in future if a user uses a mismatched
  ssh(1) client and ssh-agent(1) where the client supports a key type
  that the agent does not support.

Portability
-----------

* Better identify unsupported and unstable compiler flags, such as
  -fzero-call-used-regs which has been unstable across a several
  clang releases.

* A number of fixes to regression test reliability and log
  collection.

* Update the OpenSSL dependency in the RPM specification.

* sshd(8): for OpenSolaris systems that support privilege limitation
  via the getpflags() interface, prefer using the newer PRIV_XPOLICY
  to PRIV_LIMIT. bz2833

(wiz)

2023-12-18 14:25:32 UTC MAIN commitmail json YAML

2023-12-18 14:22:33 UTC MAIN commitmail json YAML

doc: Updated ham/nec2c to 1.3.1

(mef)

2023-12-18 14:22:24 UTC MAIN commitmail json YAML

(ham/nec2c) Updated 1.3 to 1.3.1

  Version 1.3.1: Fixed a bug in the fbar() in somnec.c reported by
  Ward Harriman, AE6TY, that caused corrupt results with wire dipoles
  close to ground and while using Sommerfeld/Norton approximation.

(mef)

2023-12-18 14:19:55 UTC MAIN commitmail json YAML

doc: Updated ham/xnec2c to 4.2.3

(mef)

2023-12-18 14:19:35 UTC MAIN commitmail json YAML

(ham/xnec2c) Updated 4.2.1 to 4.2.3

(From doc/xnec2c.html)
Version 4.2.2:

  Fixed a bug in the fbar() in somnec.c reported by Ward Harriman,
  AE6TY, that caused corrupt results with wire dipoles close to ground
  and while using Sommerfeld/Norton approximation.

Version 4.2.3:

  Fixed a bug in Child_Process() in fork.c which resulted in an
  out-of-bounds (by 1) write to the rc_config.input_file[] character
  array.

(mef)

2023-12-18 13:53:18 UTC MAIN commitmail json YAML

pkgtools/pkglint: update to 23.2.5

Changes since 23.2.4:

For Python packages that do not support Python 2, warn that egg.mk is
deprecated and should be replaced with wheel.mk.  Provide detailed
migration instructions.

(rillig)

2023-12-18 13:43:58 UTC MAIN commitmail json YAML

doc: Updated devel/p5-MooseX-SetOnce to 0.203

(mef)

2023-12-18 13:43:46 UTC MAIN commitmail json YAML

(devel/p5-MooseX-SetOnce) Updated 0.200002 to 0.203

0.203    2022-12-31 21:33:33-05:00 America/New_York
        - update author email contact info (again)
        - fix how perl version was declared (sorry)

0.202    2022-12-31 17:07:01-05:00 America/New_York
        - declare required perl version
        - update author email contact info (again)

0.201    2021-06-18 20:54:02-04:00 America/New_York
          update author email contact info

(mef)

2023-12-18 13:40:40 UTC MAIN commitmail json YAML

doc: Updated devel/p5-MooseX-App to 1.43nb2

(mef)

2023-12-18 13:40:25 UTC MAIN commitmail json YAML

(devel/p5-MooseX-App) Updated 1.42 to 1.43

1.43 2023-10-21
    - Remove duplicate license
    - Require Config::Any
    - Fix cmd_aliases for flags (fixed by William Barker)
    - Remove smartmatch (implemented by Petr Pisar)
    - Allow to override build date with SOURCE_DATE_EPOCH (implemented by Bernhard M. Wiedemann)

(mef)

2023-12-18 13:35:54 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-ScanDeps to 1.35

(mef)

2023-12-18 13:35:44 UTC MAIN commitmail json YAML

(devel/p5-Module-ScanDeps)

1.35  2023-11-05

- massive speed up, esp. for scripts using stuff from
  the Moose ecosystem, thanks to @shawnlaffan:

  - add package level caches for INC searches (_find_in_inc, _glob_in_inc)
  - faster add_deps on case insensitive systems AKA Windows

1.34  2023-09-24

- Fix issue #19 (AKA rschupp/PAR-Packer#78): invalid paths in zip file

  - Restore behaviour from version 1.31 when using "pp --execute ..." or
    "scandeps.pl --execute ...".

    When using "scan_deps(execute => 1, ...)", %INC as gleaned from
    running the script must be sanitized. Contrary to documentation
    "The  key  is the filename you specified (with module names
    converted to pathnames)" %INC *may* contain keys that are
    *absolute pathnames* (or start with "./relativ/path" when
    "relative/path" is in @PATH). Examples are autosplitted modules
    (for autosplit.ix and *.al files). pp will pack these absolute
    paths into the zip (Archive::Zip doesn't complain) which
    results in strange error messages when the packed executable
    tries to unpack them under CACHEDIR/inc on Windows.

    Add t/19-autosplit.t to test for this.
    Add IPC::Run3 to TEST_REQUIRES, used in t/19-autosplit.t

- Add GitHub CI

1.33  2023-08-04

- Recognize Moose/Moo/Mouse style inheritance ("extends")
  or composition ("with") statements.

- Add %Preload entries for known dependants of XS::Parse::Keyword.

  Note: XS::Parse::Keyword is loaded from XS code, grep.metacpan.org
  for calls of boot_xs_parse_keyword() in *.xs files.

1.32  2023-07-05

- Ensure $inc gets removed from the start of $File::Find::name

  On Windows, if $inc contains backslashes then it won't always get removed
  from the start of $File::Find::name because the latter may be canonicalized
  to only contain forward slashes.

- Provide dedicated test scripts for some tests instead of using
  the test scripts themselves: Test::More draws in all kinds of stuff,
  totally unpredictable

- Rewrite test helpers in t/Utils.pm to use Test::More's subtest feature

- Code cleanup; fix detection of 'do STRING' (cf PR #15)

- scandeps.pl:  sort items in "used by" column

- Handle spaces after quote operator, e.g. eval qq {Some::Module}

- Fixes #12: share dir not returned when require module is in an eval

- Recognize constructs like "eval qq{require Inline::C}".

- Recognize idioms like "if (eval { require Foo }) { ..."

- Add %preload rules for some Mojo resource files

  Fixes rschupp/PAR-Packer#44

- Bump perl dependency to guard against ancient perls without FindBin::again()

- Add tool to trace when (and from where) Perl searches for a module

(mef)

2023-12-18 13:33:35 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-Install-RTx to 0.43

(mef)

2023-12-18 13:33:24 UTC MAIN commitmail json YAML

(devel/p5-Module-Install-RTx) Updated 0.42 to 0.43

0.43 2022-02-09
- Fix "require" remove_files for perl 5.26+

(mef)

2023-12-18 13:31:07 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-Install to 1.21

(mef)

2023-12-18 13:30:55 UTC MAIN commitmail json YAML

(devel/p5-Module-Install) Updated 1.19 to 1.21

1.21  2023-04-28
  - fix tests broken by Module::Install::DSL removal

1.20  2023-04-27
  - Module::Install::DSL has been removed, as its use is highly discouraged.

(mef)

2023-12-18 13:27:32 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-Find to 0.16

(mef)

2023-12-18 13:27:20 UTC MAIN commitmail json YAML

(devel/p5-Module-Find) Updated 0.15 to 0.16

    0.16, 2022-08-01
            Fixes an issue where symlink tests failed on systems that do not
            support creation of symlinks. The issue appears on Windows
            systems due to changed behaviour in "File::Find" described in
            perl5/issue #19995 <https://github.com/Perl/perl5/issues/19995>
            Symlink tests were previously skipped if symlink() is not
            available, and now also if creation of a symlink is not
            possible.

            Fixes issue #9 <https://github.com/crenz/Module-Find/issues/9>.
            Note that on Windows system, the patch to "File::Find" from
            perl5/PR #20008 <https://github.com/Perl/perl5/pull/20008> will
            be required for proper operation.

(mef)

2023-12-18 13:24:29 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-ExtractUse to 0.345

(mef)

2023-12-18 13:24:16 UTC MAIN commitmail json YAML

(devel/p5-Module-ExtractUse) Updated 0.344 to 0.345

0.345  2023-01-16T17:12:05
    - Auto generate meta_yml_has_provides experimental Kwalitee. (Mohammad S Anwar)

(mef)

2023-12-18 13:22:40 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-CPANTS-Analyse to 1.02

(mef)

2023-12-18 13:22:26 UTC MAIN commitmail json YAML

(devel/p5-Module-CPANTS-Analyse) Updated 1.0.1 to 1.0.2

1.02 2023-09-10
  - Treat use v5.36 as use_warnings
  - Skip some of the manifest test if symlink is not available
  - Improve prereq sorting
  - Improve pod detection
  - Improve script detection
  - Use Parse::Distname to get a little more information from a distribution name
  - Dedupe possible licences
  - Add Object::Pad as use strict equivalent (Wesley Schwengle)
  - Fix has_license_in_source_file for distributions that contain only a
    script under bin or scripts (Sven Kirmess)

(mef)

2023-12-18 13:16:03 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Module-Build-Tiny to 0.047

(mef)

2023-12-18 13:15:53 UTC MAIN commitmail json YAML

(devel/p5-Module-Build-Tiny) Updated 0.046 to 0.047

0.047    2023-09-28 17:53:41+02:00 Europe/Brussels
          - Avoid using empty regex for backwards compatability

(mef)

2023-12-18 13:12:54 UTC MAIN commitmail json YAML

doc: Updated devel/p5-Mixin-Linewise to 0.111

(mef)