Link [ pkgsrc | NetBSD | pkgsrc git mirror | PR fulltext-search | netbsd commit viewer ]


   
        usage: [branch:branch] [user:user] [path[@revision]] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN pkgtools/pkg)




switch to index mode

recent branches: MAIN (1h)  pkgsrc-2024Q1 (14d)  pkgsrc-2023Q4 (41d)  pkgsrc-2023Q2 (74d)  pkgsrc-2023Q3 (153d) 

2024-05-12 13:46:28 UTC Now

2017-05-06 15:29:10 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5400 - requested by sevan
devel/glib2: build fix

Revisions pulled up:
- devel/glib2/Makefile                                          1.232

---
  Module Name:    pkgsrc
  Committed By:  jperkin
  Date:          Thu May  4 12:19:13 UTC 2017

  Modified Files:
          pkgsrc/devel/glib2: Makefile

  Log Message:
  Add broken python scripts to CHECK_WRKREF_SKIP too.

(bsiegert)

2017-05-06 15:19:40 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5396 - requested by sevan
lang/go: bugfix

Revisions pulled up:
- lang/go/Makefile                                              1.51
- lang/go/distinfo                                              1.47
- lang/go/patches/patch-src_runtime_mem__bsd.go                1.1
- lang/go/patches/patch-src_syscall_syscall__solaris.go        deleted

---
  Module Name:    pkgsrc
  Committed By:  fhajny
  Date:          Tue May  2 17:15:31 UTC 2017

  Modified Files:
          pkgsrc/lang/go: Makefile distinfo
  Added Files:
          pkgsrc/lang/go/patches: patch-src_runtime_mem__bsd.go
  Removed Files:
          pkgsrc/lang/go/patches: patch-src_syscall_syscall__solaris.go

  Log Message:
  * Remove patch adding syscall.Dup2() for SunOS, software should be using
  unix.Dup2() instead.
    https://github.com/joyent/pkgsrc/pull/492
  * Improve handling of low-memory situations on Illumos.
    https://github.com/joyent/pkgsrc/pull/493

(bsiegert)

2017-05-06 15:18:43 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5395 - requested by sevan
net/xymon: build fix

Revisions pulled up:
- net/xymon/Makefile                                            1.49

---
  Module Name:    pkgsrc
  Committed By:  spz
  Date:          Wed May  3 05:29:41 UTC 2017

  Modified Files:
          pkgsrc/net/xymon: Makefile

  Log Message:
  chmod the right files, the .sh are just an identical wrapper now

(bsiegert)

2017-05-06 15:12:53 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5394 - requested by sevan
textproc/mdoclint: bugfix

Revisions pulled up:
- textproc/mdoclint/files/mdoclint                              1.67

---
  Module Name:    pkgsrc
  Committed By:  wiz
  Date:          Tue May  2 13:53:14 UTC 2017

  Modified Files:
          pkgsrc/textproc/mdoclint/files: mdoclint

  Log Message:
  Bug fix from Ingo Schwarze: also look for empty lines in unfilled blocks.

(bsiegert)

2017-05-06 15:11:40 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5393 - requested by sevan
net/tor: point update (ensure package remains functional)

Revisions pulled up:
- net/tor/Makefile                                              1.119
- net/tor/distinfo                                              1.80

---
  Module Name:    pkgsrc
  Committed By:  wiz
  Date:          Tue May  2 11:16:02 UTC 2017

  Modified Files:
          pkgsrc/net/tor: Makefile distinfo

  Log Message:
  Updated tor to 0.3.0.6.

  Changes in version 0.3.0.6 - 2017-04-26
    Tor 0.3.0.6 is the first stable release of the Tor 0.3.0 series.

    With the 0.3.0 series, clients and relays now use Ed25519 keys to
    authenticate their link connections to relays, rather than the old
    RSA1024 keys that they used before. (Circuit crypto has been
    Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced
    the guard selection and replacement algorithm to behave more robustly
    in the presence of unreliable networks, and to resist guard-
    capture attacks.

    This series also includes numerous other small features and bugfixes,
    along with more groundwork for the upcoming hidden-services revamp.

    Per our stable release policy, we plan to support the Tor 0.3.0
    release series for at least the next nine months, or for three months
    after the first stable release of the 0.3.1 series: whichever is
    longer. If you need a release with long-term support, we recommend
    that you stay with the 0.2.9 series.

    Below are the changes since 0.2.9.10. For a list of only the changes
    since 0.3.0.5-rc, see the ChangeLog file.

    o Major features (directory authority, security):
      - The default for AuthDirPinKeys is now 1: directory authorities
        will reject relays where the RSA identity key matches a previously
        seen value, but the Ed25519 key has changed. Closes ticket 18319.

    o Major features (guard selection algorithm):
      - Tor's guard selection algorithm has been redesigned from the
        ground up, to better support unreliable networks and restrictive
        sets of entry nodes, and to better resist guard-capture attacks by
        hostile local networks. Implements proposal 271; closes
        ticket 19877.

    o Major features (next-generation hidden services):
      - Relays can now handle v3 ESTABLISH_INTRO cells as specified by
        prop224 aka "Next Generation Hidden Services". Service and clients
        don't use this functionality yet. Closes ticket 19043. Based on
        initial code by Alec Heifetz.
      - Relays now support the HSDir version 3 protocol, so that they can
        can store and serve v3 descriptors. This is part of the next-
        generation onion service work detailled in proposal 224. Closes
        ticket 17238.

    o Major features (protocol, ed25519 identity keys):
      - Clients now support including Ed25519 identity keys in the EXTEND2
        cells they generate. By default, this is controlled by a consensus
        parameter, currently disabled. You can turn this feature on for
        testing by setting ExtendByEd25519ID in your configuration. This
        might make your traffic appear different than the traffic
        generated by other users, however. Implements part of ticket
        15056; part of proposal 220.
      - Relays now understand requests to extend to other relays by their
        Ed25519 identity keys. When an Ed25519 identity key is included in
        an EXTEND2 cell, the relay will only extend the circuit if the
        other relay can prove ownership of that identity. Implements part
        of ticket 15056; part of proposal 220.
      - Relays now use Ed25519 to prove their Ed25519 identities and to
        one another, and to clients. This algorithm is faster and more
        secure than the RSA-based handshake we've been doing until now.
        Implements the second big part of proposal 220; Closes
        ticket 15055.

    o Major features (security):
      - Change the algorithm used to decide DNS TTLs on client and server
        side, to better resist DNS-based correlation attacks like the
        DefecTor attack of Greschbach, Pulls, Roberts, Winter, and
        Feamster. Now relays only return one of two possible DNS TTL
        values, and clients are willing to believe DNS TTL values up to 3
        hours long. Closes ticket 19769.

    o Major bugfixes (client, onion service, also in 0.2.9.9):
      - Fix a client-side onion service reachability bug, where multiple
        socks requests to an onion service (or a single slow request)
        could cause us to mistakenly mark some of the service's
        introduction points as failed, and we cache that failure so
        eventually we run out and can't reach the service. Also resolves a
        mysterious "Remote server sent bogus reason code 65021" log
        warning. The bug was introduced in ticket 17218, where we tried to
        remember the circuit end reason as a uint16_t, which mangled
        negative values. Partially fixes bug 21056 and fixes bug 20307;
        bugfix on 0.2.8.1-alpha.

    o Major bugfixes (crash, directory connections):
      - Fix a rare crash when sending a begin cell on a circuit whose
        linked directory connection had already been closed. Fixes bug
        21576; bugfix on 0.2.9.3-alpha. Reported by Alec Muffett.

    o Major bugfixes (directory authority):
      - During voting, when marking a relay as a probable sybil, do not
        clear its BadExit flag: sybils can still be bad in other ways
        too. (We still clear the other flags.) Fixes bug 21108; bugfix
        on 0.2.0.13-alpha.

    o Major bugfixes (DNS):
      - Fix a bug that prevented exit nodes from caching DNS records for
        more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha.

    o Major bugfixes (IPv6 Exits):
      - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects
        any IPv6 addresses. Instead, only reject a port over IPv6 if the
        exit policy rejects that port on more than an IPv6 /16 of
        addresses. This bug was made worse by 17027 in 0.2.8.1-alpha,
        which rejected a relay's own IPv6 address by default. Fixes bug
        21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.

    o Major bugfixes (parsing):
      - Fix an integer underflow bug when comparing malformed Tor
        versions. This bug could crash Tor when built with
        --enable-expensive-hardening, or on Tor 0.2.9.1-alpha through Tor
        0.2.9.8, which were built with -ftrapv by default. In other cases
        it was harmless. Part of TROVE-2017-001. Fixes bug 21278; bugfix
        on 0.0.8pre1. Found by OSS-Fuzz.
      - When parsing a malformed content-length field from an HTTP
        message, do not read off the end of the buffer. This bug was a
        potential remote denial-of-service attack against Tor clients and
        relays. A workaround was released in October 2016, to prevent this
        bug from crashing Tor. This is a fix for the underlying issue,
        which should no longer matter (if you applied the earlier patch).
        Fixes bug 20894; bugfix on 0.2.0.16-alpha. Bug found by fuzzing
        using AFL (http://lcamtuf.coredump.cx/afl/).

    o Major bugfixes (scheduler):
      - Actually compare circuit policies in ewma_cmp_cmux(). This bug
        caused the channel scheduler to behave more or less randomly,
        rather than preferring channels with higher-priority circuits.
        Fixes bug 20459; bugfix on 0.2.6.2-alpha.

    o Major bugfixes (security, also in 0.2.9.9):
      - Downgrade the "-ftrapv" option from "always on" to "only on when
        --enable-expensive-hardening is provided." This hardening option,
        like others, can turn survivable bugs into crashes--and having it
        on by default made a (relatively harmless) integer overflow bug
        into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001);
        bugfix on 0.2.9.1-alpha.

    o Minor feature (client):
      - Enable IPv6 traffic on the SocksPort by default. To disable this,
        a user will have to specify "NoIPv6Traffic". Closes ticket 21269.

    o Minor feature (fallback scripts):
      - Add a check_existing mode to updateFallbackDirs.py, which checks
        if fallbacks in the hard-coded list are working. Closes ticket
        20174. Patch by haxxpop.

    o Minor feature (protocol versioning):
      - Add new protocol version for proposal 224. HSIntro now advertises
        version "3-4" and HSDir version "1-2". Fixes ticket 20656.

    o Minor features (ciphersuite selection):
      - Allow relays to accept a wider range of ciphersuites, including
        chacha20-poly1305 and AES-CCM. Closes the other part of 15426.
      - Clients now advertise a list of ciphersuites closer to the ones
        preferred by Firefox. Closes part of ticket 15426.

    o Minor features (controller):
      - Add "GETINFO sr/current" and "GETINFO sr/previous" keys, to expose
        shared-random values to the controller. Closes ticket 19925.
      - When HSFETCH arguments cannot be parsed, say "Invalid argument"
        rather than "unrecognized." Closes ticket 20389; patch from
        Ivan Markin.

    o Minor features (controller, configuration):
      - Each of the *Port options, such as SocksPort, ORPort, ControlPort,
        and so on, now comes with a __*Port variant that will not be saved
        to the torrc file by the controller's SAVECONF command. This
        change allows TorBrowser to set up a single-use domain socket for
        each time it launches Tor. Closes ticket 20956.
      - The GETCONF command can now query options that may only be
        meaningful in context-sensitive lists. This allows the controller
        to query the mixed SocksPort/__SocksPort style options introduced
        in feature 20956. Implements ticket 21300.

    o Minor features (diagnostic, directory client):
      - Warn when we find an unexpected inconsistency in directory
        download status objects. Prevents some negative consequences of
        bug 20593.

    o Minor features (directory authorities):
      - Directory authorities now reject descriptors that claim to be
        malformed versions of Tor. Helps prevent exploitation of
        bug 21278.
      - Reject version numbers with components that exceed INT32_MAX.
        Otherwise 32-bit and 64-bit platforms would behave inconsistently.
        Fixes bug 21450; bugfix on 0.0.8pre1.

    o Minor features (directory authority):
      - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
        default) to control whether authorities should try to probe relays
        by their Ed25519 link keys. This option will go away in a few
        releases--unless we encounter major trouble in our ed25519 link
        protocol rollout, in which case it will serve as a safety option.

    o Minor features (directory cache):
      - Relays and bridges will now refuse to serve the consensus they
        have if they know it is too old for a client to use. Closes
        ticket 20511.

    o Minor features (ed25519 link handshake):
      - Advertise support for the ed25519 link handshake using the
        subprotocol-versions mechanism, so that clients can tell which
        relays can identity themselves by Ed25519 ID. Closes ticket 20552.

    o Minor features (entry guards):
      - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not
        break regression tests.
      - Require UseEntryGuards when UseBridges is set, in order to make
        sure bridges aren't bypassed. Resolves ticket 20502.

    o Minor features (fallback directories):
      - Allow 3 fallback relays per operator, which is safe now that we
        are choosing 200 fallback relays. Closes ticket 20912.
      - Annotate updateFallbackDirs.py with the bandwidth and consensus
        weight for each candidate fallback. Closes ticket 20878.
      - Display the relay fingerprint when downloading consensuses from
        fallbacks. Closes ticket 20908.
      - Exclude relays affected by bug 20499 from the fallback list.
        Exclude relays from the fallback list if they are running versions
        known to be affected by bug 20499, or if in our tests they deliver
        a stale consensus (i.e. one that expired more than 24 hours ago).
        Closes ticket 20539.
      - Make it easier to change the output sort order of fallbacks.
        Closes ticket 20822.
      - Reduce the minimum fallback bandwidth to 1 MByte/s. Part of
        ticket 18828.
      - Require fallback directories to have the same address and port for
        7 days (now that we have enough relays with this stability).
        Relays whose OnionOO stability timer is reset on restart by bug
        18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for
        this issue. Closes ticket 20880; maintains short-term fix
        in 0.2.8.2-alpha.
      - Require fallbacks to have flags for 90% of the time (weighted
        decaying average), rather than 95%. This allows at least 73% of
        clients to bootstrap in the first 5 seconds without contacting an
        authority. Part of ticket 18828.
      - Select 200 fallback directories for each release. Closes
        ticket 20881.

    o Minor features (fingerprinting resistence, authentication):
      - Extend the length of RSA keys used for TLS link authentication to
        2048 bits. (These weren't used for forward secrecy; for forward
        secrecy, we used P256.) Closes ticket 13752.

    o Minor features (geoip):
      - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
        Country database.

    o Minor features (geoip, also in 0.2.9.9):
      - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
        Country database.

    o Minor features (infrastructure):
      - Implement smartlist_add_strdup() function. Replaces the use of
        smartlist_add(sl, tor_strdup(str)). Closes ticket 20048.

    o Minor features (linting):
      - Enhance the changes file linter to warn on Tor versions that are
        prefixed with "tor-". Closes ticket 21096.

    o Minor features (logging):
      - In several places, describe unset ed25519 keys as "<unset>",
        rather than the scary "AAAAAAAA...AAA". Closes ticket 21037.

    o Minor features (portability, compilation):
      - Autoconf now checks to determine if OpenSSL structures are opaque,
        instead of explicitly checking for OpenSSL version numbers. Part
        of ticket 21359.
      - Support building with recent LibreSSL code that uses opaque
        structures. Closes ticket 21359.

    o Minor features (relay):
      - We now allow separation of exit and relay traffic to different
        source IP addresses, using the OutboundBindAddressExit and
        OutboundBindAddressOR options respectively. Closes ticket 17975.
        Written by Michael Sonntag.

    o Minor features (reliability, crash):
      - Try better to detect problems in buffers where they might grow (or
        think they have grown) over 2 GB in size. Diagnostic for
        bug 21369.

    o Minor features (testing):
      - During 'make test-network-all', if tor logs any warnings, ask
        chutney to output them. Requires a recent version of chutney with
        the 21572 patch. Implements 21570.

    o Minor bugfix (control protocol):
      - The reply to a "GETINFO config/names" request via the control
        protocol now spells the type "Dependent" correctly. This is a
        breaking change in the control protocol. (The field seems to be
        ignored by the most common known controllers.) Fixes bug 18146;
        bugfix on 0.1.1.4-alpha.
      - The GETINFO extra-info/digest/<digest> command was broken because
        of a wrong base16 decode return value check, introduced when
        refactoring that API. Fixes bug 22034; bugfix on 0.2.9.1-alpha.

    o Minor bugfix (logging):
      - Don't recommend the use of Tor2web in non-anonymous mode.
        Recommending Tor2web is a bad idea because the client loses all
        anonymity. Tor2web should only be used in specific cases by users
        who *know* and understand the issues. Fixes bug 21294; bugfix
        on 0.2.9.3-alpha.

    o Minor bugfixes (bug resilience):
      - Fix an unreachable size_t overflow in base64_decode(). Fixes bug
        19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by
        Hans Jerry Illikainen.

    o Minor bugfixes (build):
      - Replace obsolete Autoconf macros with their modern equivalent and
        prevent similar issues in the future. Fixes bug 20990; bugfix
        on 0.1.0.1-rc.

    o Minor bugfixes (certificate expiration time):
      - Avoid using link certificates that don't become valid till some
        time in the future. Fixes bug 21420; bugfix on 0.2.4.11-alpha

    o Minor bugfixes (client):
      - Always recover from failures in extend_info_from_node(), in an
        attempt to prevent any recurrence of bug 21242. Fixes bug 21372;
        bugfix on 0.2.3.1-alpha.
      - When clients that use bridges start up with a cached consensus on
        disk, they were ignoring it and downloading a new one. Now they
        use the cached one. Fixes bug 20269; bugfix on 0.2.3.12-alpha.

    o Minor bugfixes (code correctness):
      - Repair a couple of (unreachable or harmless) cases of the risky
        comparison-by-subtraction pattern that caused bug 21278.

    o Minor bugfixes (config):
      - Don't assert on startup when trying to get the options list and
        LearnCircuitBuildTimeout is set to 0: we are currently parsing the
        options so of course they aren't ready yet. Fixes bug 21062;
        bugfix on 0.2.9.3-alpha.

    o Minor bugfixes (configuration):
      - Accept non-space whitespace characters after the severity level in
        the `Log` option. Fixes bug 19965; bugfix on 0.2.1.1-alpha.
      - Support "TByte" and "TBytes" units in options given in bytes.
        "TB", "terabyte(s)", "TBit(s)" and "terabit(s)" were already
        supported. Fixes bug 20622; bugfix on 0.2.0.14-alpha.

    o Minor bugfixes (configure, autoconf):
      - Rename the configure option --enable-expensive-hardening to
        --enable-fragile-hardening. Expensive hardening makes the tor
        daemon abort when some kinds of issues are detected. Thus, it
        makes tor more at risk of remote crashes but safer against RCE or
        heartbleed bug category. We now try to explain this issue in a
        message from the configure script. Fixes bug 21290; bugfix
        on 0.2.5.4-alpha.

    o Minor bugfixes (consensus weight):
      - Add new consensus method that initializes bw weights to 1 instead
        of 0. This prevents a zero weight from making it all the way to
        the end (happens in small testing networks) and causing an error.
        Fixes bug 14881; bugfix on 0.2.2.17-alpha.

    o Minor bugfixes (crash prevention):
      - Fix an (currently untriggerable, but potentially dangerous) crash
        bug when base32-encoding inputs whose sizes are not a multiple of
        5. Fixes bug 21894; bugfix on 0.2.9.1-alpha.

    o Minor bugfixes (dead code):
      - Remove a redundant check for PidFile changes at runtime in
        options_transition_allowed(): this check is already performed
        regardless of whether the sandbox is active. Fixes bug 21123;
        bugfix on 0.2.5.4-alpha.

    o Minor bugfixes (descriptors):
      - Correctly recognise downloaded full descriptors as valid, even
        when using microdescriptors as circuits. This affects clients with
        FetchUselessDescriptors set, and may affect directory authorities.
        Fixes bug 20839; bugfix on 0.2.3.2-alpha.

    o Minor bugfixes (directory mirrors):
      - Allow relays to use directory mirrors without a DirPort: these
        relays need to be contacted over their ORPorts using a begindir
        connection. Fixes one case of bug 20711; bugfix on 0.2.8.2-alpha.
      - Clarify the message logged when a remote relay is unexpectedly
        missing an ORPort or DirPort: users were confusing this with a
        local port. Fixes another case of bug 20711; bugfix
        on 0.2.8.2-alpha.

    o Minor bugfixes (directory system):
      - Bridges and relays now use microdescriptors (like clients do)
        rather than old-style router descriptors. Now bridges will blend
        in with clients in terms of the circuits they build. Fixes bug
        6769; bugfix on 0.2.3.2-alpha.
      - Download all consensus flavors, descriptors, and authority
        certificates when FetchUselessDescriptors is set, regardless of
        whether tor is a directory cache or not. Fixes bug 20667; bugfix
        on all recent tor versions.

    o Minor bugfixes (documentation):
      - Update the tor manual page to document every option that can not
        be changed while tor is running. Fixes bug 21122.

    o Minor bugfixes (ed25519 certificates):
      - Correctly interpret ed25519 certificates that would expire some
        time after 19 Jan 2038. Fixes bug 20027; bugfix on 0.2.7.2-alpha.

    o Minor bugfixes (fallback directories):
      - Avoid checking fallback candidates' DirPorts if they are down in
        OnionOO. When a relay operator has multiple relays, this
        prioritizes relays that are up over relays that are down. Fixes
        bug 20926; bugfix on 0.2.8.3-alpha.
      - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py.
        Fixes bug 20877; bugfix on 0.2.8.3-alpha.
      - Stop failing when a relay has no uptime data in
        updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha.

    o Minor bugfixes (hidden service):
      - Clean up the code for expiring intro points with no associated
        circuits. It was causing, rarely, a service with some expiring
        introduction points to not open enough additional introduction
        points. Fixes part of bug 21302; bugfix on 0.2.7.2-alpha.
      - Resolve two possible underflows which could lead to creating and
        closing a lot of introduction point circuits in a non-stop loop.
        Fixes bug 21302; bugfix on 0.2.7.2-alpha.
      - Stop setting the torrc option HiddenServiceStatistics to "0" just
        because we're not a bridge or relay. Instead, we preserve whatever
        value the user set (or didn't set). Fixes bug 21150; bugfix
        on 0.2.6.2-alpha.

    o Minor bugfixes (hidden services):
      - Make hidden services check for failed intro point connections,
        even when they have exceeded their intro point creation limit.
        Fixes bug 21596; bugfix on 0.2.7.2-alpha. Reported by Alec Muffett.
      - Make hidden services with 8 to 10 introduction points check for
        failed circuits immediately after startup. Previously, they would
        wait for 5 minutes before performing their first checks. Fixes bug
        21594; bugfix on 0.2.3.9-alpha. Reported by Alec Muffett.
      - Stop ignoring misconfigured hidden services. Instead, refuse to
        start tor until the misconfigurations have been corrected. Fixes
        bug 20559; bugfix on multiple commits in 0.2.7.1-alpha
        and earlier.

    o Minor bugfixes (IPv6):
      - Make IPv6-using clients try harder to find an IPv6 directory
        server. Fixes bug 20999; bugfix on 0.2.8.2-alpha.
      - When IPv6 addresses have not been downloaded yet (microdesc
        consensus documents don't list relay IPv6 addresses), use hard-
        coded addresses for authorities, fallbacks, and configured
        bridges. Now IPv6-only clients can use microdescriptors. Fixes bug
        20996; bugfix on b167e82 from 19608 in 0.2.8.5-alpha.

    o Minor bugfixes (memory leak at exit):
      - Fix a small harmless memory leak at exit of the previously unused
        RSA->Ed identity cross-certificate. Fixes bug 17779; bugfix
        on 0.2.7.2-alpha.

    o Minor bugfixes (onion services):
      - Allow the number of introduction points to be as low as 0, rather
        than as low as 3. Fixes bug 21033; bugfix on 0.2.7.2-alpha.

    o Minor bugfixes (portability):
      - Use "OpenBSD" compiler macro instead of "OPENBSD" or "__OpenBSD__".
        It is supported by OpenBSD itself, and also by most OpenBSD
        variants (such as Bitrig). Fixes bug 20980; bugfix
        on 0.1.2.1-alpha.

    o Minor bugfixes (portability, also in 0.2.9.9):
      - Avoid crashing when Tor is built using headers that contain
        CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
        without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix
        on 0.2.9.1-alpha.
      - Fix Libevent detection on platforms without Libevent 1 headers
        installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.

    o Minor bugfixes (relay):
      - Avoid a double-marked-circuit warning that could happen when we
        receive DESTROY cells under heavy load. Fixes bug 20059; bugfix
        on 0.1.0.1-rc.
      - Honor DataDirectoryGroupReadable when tor is a relay. Previously,
        initializing the keys would reset the DataDirectory to 0700
        instead of 0750 even if DataDirectoryGroupReadable was set to 1.
        Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish".

    o Minor bugfixes (testing):
      - Fix Raspbian build issues related to missing socket errno in
        test_util.c. Fixes bug 21116; bugfix on 0.2.8.2. Patch by "hein".
      - Remove undefined behavior from the backtrace generator by removing
        its signal handler. Fixes bug 21026; bugfix on 0.2.5.2-alpha.
      - Use bash in src/test/test-network.sh. This ensures we reliably
        call chutney's newer tools/test-network.sh when available. Fixes
        bug 21562; bugfix on 0.2.9.1-alpha.

    o Minor bugfixes (tor-resolve):
      - The tor-resolve command line tool now rejects hostnames over 255
        characters in length. Previously, it would silently truncate them,
        which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
        Patch by "junglefowl".

    o Minor bugfixes (unit tests):
      - Allow the unit tests to pass even when DNS lookups of bogus
        addresses do not fail as expected. Fixes bug 20862 and 20863;
        bugfix on unit tests introduced in 0.2.8.1-alpha
        through 0.2.9.4-alpha.

    o Minor bugfixes (util):
      - When finishing writing a file to disk, if we were about to replace
        the file with the temporary file created before and we fail to
        replace it, remove the temporary file so it doesn't stay on disk.
        Fixes bug 20646; bugfix on 0.2.0.7-alpha. Patch by fk.

    o Minor bugfixes (Windows services):
      - Be sure to initialize the monotonic time subsystem before using
        it, even when running as an NT service. Fixes bug 21356; bugfix
        on 0.2.9.1-alpha.

    o Minor bugfixes (Windows):
      - Check for getpagesize before using it to mmap files. This fixes
        compilation in some MinGW environments. Fixes bug 20530; bugfix on
        0.1.2.1-alpha. Reported by "ice".

    o Code simplification and refactoring:
      - Abolish all global guard context in entrynodes.c; replace with new
        guard_selection_t structure as preparation for proposal 271.
        Closes ticket 19858.
      - Extract magic numbers in circuituse.c into defined variables.
      - Introduce rend_service_is_ephemeral() that tells if given onion
        service is ephemeral. Replace unclear NULL-checkings for service
        directory with this function. Closes ticket 20526.
      - Refactor circuit_is_available_for_use to remove unnecessary check.
      - Refactor circuit_predict_and_launch_new for readability and
        testability. Closes ticket 18873.
      - Refactor code to manipulate global_origin_circuit_list into
        separate functions. Closes ticket 20921.
      - Refactor large if statement in purpose_needs_anonymity to use
        switch statement instead. Closes part of ticket 20077.
      - Refactor the hashing API to return negative values for errors, as
        is done as throughout the codebase. Closes ticket 20717.
      - Remove data structures that were used to index or_connection
        objects by their RSA identity digests. These structures are fully
        redundant with the similar structures used in the
        channel abstraction.
      - Remove duplicate code in the channel_write_*cell() functions.
        Closes ticket 13827; patch from Pingl.
      - Remove redundant behavior of is_sensitive_dir_purpose, refactor to
        use only purpose_needs_anonymity. Closes part of ticket 20077.
      - The code to generate and parse EXTEND and EXTEND2 cells has been
        replaced with code automatically generated by the
        "trunnel" utility.

    o Documentation (formatting):
      - Clean up formatting of tor.1 man page and HTML doc, where <pre>
        blocks were incorrectly appearing. Closes ticket 20885.

    o Documentation (man page):
      - Clarify many options in tor.1 and add some min/max values for
        HiddenService options. Closes ticket 21058.

    o Documentation:
      - Change '1' to 'weight_scale' in consensus bw weights calculation
        comments, as that is reality. Closes ticket 20273. Patch
        from pastly.
      - Clarify that when ClientRejectInternalAddresses is enabled (which
        is the default), multicast DNS hostnames for machines on the local
        network (of the form *.local) are also rejected. Closes
        ticket 17070.
      - Correct the value for AuthDirGuardBWGuarantee in the manpage, from
        250 KBytes to 2 MBytes. Fixes bug 20435; bugfix on 0.2.5.6-alpha.
      - Include the "TBits" unit in Tor's man page. Fixes part of bug
        20622; bugfix on 0.2.5.1-alpha.
      - Small fixes to the fuzzing documentation. Closes ticket 21472.
      - Stop the man page from incorrectly stating that HiddenServiceDir
        must already exist. Fixes 20486.
      - Update the description of the directory server options in the
        manual page, to clarify that a relay no longer needs to set
        DirPort in order to be a directory cache. Closes ticket 21720.

    o Removed features:
      - The AuthDirMaxServersPerAuthAddr option no longer exists: The same
        limit for relays running on a single IP applies to authority IP
        addresses as well as to non-authority IP addresses. Closes
        ticket 20960.
      - The UseDirectoryGuards torrc option no longer exists: all users
        that use entry guards will also use directory guards. Related to
        proposal 271; implements part of ticket 20831.

    o Testing:
      - Add tests for networkstatus_compute_bw_weights_v10.
      - Add unit tests circuit_predict_and_launch_new.
      - Extract dummy_origin_circuit_new so it can be used by other
        test functions.
      - New unit tests for tor_htonll(). Closes ticket 19563. Patch
        from "overcaffeinated".
      - Perform the coding style checks when running the tests and fail
        when coding style violations are found. Closes ticket 5500.

(bsiegert)

2017-05-06 15:08:52 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5404 - requested by sevan
graphics/tiff: security fix

Revisions pulled up:
- graphics/tiff/Makefile                                        1.127-1.129
- graphics/tiff/distinfo                                        1.73-1.75
- graphics/tiff/patches/patch-libtiff_tif_dir.c                1.1
- graphics/tiff/patches/patch-libtiff_tif_dirread.c            1.2
- graphics/tiff/patches/patch-libtiff_tif_dirwrite.c            1.1
- graphics/tiff/patches/patch-tools_tiffcp.c                    1.2
- graphics/tiff/patches/patch-tools_tiffcrop.c                  1.1-1.2

---
  Module Name:    pkgsrc
  Committed By:  he
  Date:          Fri May  5 19:16:58 UTC 2017

  Modified Files:
          pkgsrc/graphics/tiff: Makefile
  Added Files:
          pkgsrc/graphics/tiff/patches: patch-tools_tiffcrop.c

  Log Message:
  Apply fix from upstream to fix CVE-2016-10092, ref.
  http://bugzilla.maptools.org/show_bug.cgi?id=2620 and
  https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a
  Bump PKGREVISION.

---
  Module Name:    pkgsrc
  Committed By:  he
  Date:          Fri May  5 19:28:23 UTC 2017

  Modified Files:
          pkgsrc/graphics/tiff: distinfo

  Log Message:
  Forgot "make mps", this one belongs to the previous update, 4.0.7nb3.

---
  Module Name:    pkgsrc
  Committed By:  he
  Date:          Fri May  5 20:06:03 UTC 2017

  Modified Files:
          pkgsrc/graphics/tiff: Makefile distinfo
          pkgsrc/graphics/tiff/patches: patch-tools_tiffcp.c

  Log Message:
  Apply fix for CVE-2016-10093
  http://bugzilla.maptools.org/show_bug.cgi?id=2610
  https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec
  Bump PKGREVISION.

---
  Module Name:    pkgsrc
  Committed By:  sevan
  Date:          Fri May  5 20:14:05 UTC 2017

  Modified Files:
          pkgsrc/graphics/tiff: Makefile distinfo
          pkgsrc/graphics/tiff/patches: patch-libtiff_tif_dirread.c
              patch-tools_tiffcrop.c
  Added Files:
          pkgsrc/graphics/tiff/patches: patch-libtiff_tif_dir.c
              patch-libtiff_tif_dirwrite.c

  Log Message:
  CVE-2017-7596
  CVE-2017-7597
  CVE-2017-7599
  CVE-2017-7600
  https://github.com/vadz/libtiff/commit/3144e57770c1e4d26520d8abee750f8ac8b75490
  Dependency for applying advisory patch.
  +http://bugzilla.maptools.org/show_bug.cgi?id=2535
  +https://github.com/vadz/libtiff/commit/0abd094b6e5079c4d8be733829240491cb230f3d
  Bump rev.

(bsiegert)

2017-05-06 15:01:21 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5399 - requested by sevan
graphics/tiff: security fix

Revisions pulled up:
- graphics/tiff/Makefile                                        1.126
- graphics/tiff/distinfo                                        1.72
- graphics/tiff/patches/patch-libtiff_tif_dirread.c            1.1
- graphics/tiff/patches/patch-libtiff_tif_getimage.c            1.1
- graphics/tiff/patches/patch-libtiff_tif_jpeg.c                1.1
- graphics/tiff/patches/patch-libtiff_tif_ojpeg.c              1.1
- graphics/tiff/patches/patch-libtiff_tif_read.c                1.1
- graphics/tiff/patches/patch-libtiff_tif_unix.c                1.1
- graphics/tiff/patches/patch-libtiff_tif_win32.c              1.1
- graphics/tiff/patches/patch-libtiff_tiffio.h                  1.1
- graphics/tiff/patches/patch-tools_tiffcp.c                    1.1

---
  Module Name:    pkgsrc
  Committed By:  sevan
  Date:          Wed May  3 23:00:59 UTC 2017

  Modified Files:
          pkgsrc/graphics/tiff: Makefile distinfo
  Added Files:
          pkgsrc/graphics/tiff/patches: patch-libtiff_tif_dirread.c
              patch-libtiff_tif_getimage.c patch-libtiff_tif_jpeg.c
              patch-libtiff_tif_ojpeg.c patch-libtiff_tif_read.c
              patch-libtiff_tif_unix.c patch-libtiff_tif_win32.c
              patch-libtiff_tiffio.h patch-tools_tiffcp.c

  Log Message:
  Add security patches & bump rev.
  via FreeBSD bz #216658

  https://nvd.nist.gov/vuln/detail/CVE-2017-5225
  http://bugzilla.maptools.org/show_bug.cgi?id=2656
  http://bugzilla.maptools.org/show_bug.cgi?id=2657
  https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7

  https://nvd.nist.gov/vuln/detail/CVE-2017-7592
  http://bugzilla.maptools.org/show_bug.cgi?id=2658
  https://github.com/vadz/libtiff/commit/48780b4fcc42

  https://nvd.nist.gov/vuln/detail/CVE-2017-7593
  http://bugzilla.maptools.org/show_bug.cgi?id=2651
  https://github.com/vadz/libtiff/commit/d60332057b95

  https://nvd.nist.gov/vuln/detail/CVE-2017-7594
  http://bugzilla.maptools.org/show_bug.cgi?id=2659
  https://github.com/vadz/libtiff/commit/8283e4d1b7e5
  https://github.com/vadz/libtiff/commit/2ea32f7372b6

  https://nvd.nist.gov/vuln/detail/CVE-2017-7595
  https://github.com/vadz/libtiff/commit/47f2fb61a3a64667bce1a8398a8fcb1b348ff122

  https://nvd.nist.gov/vuln/detail/CVE-2017-7598
  https://github.com/vadz/libtiff/commit/3cfd62d77c2a7e147a05bd678524c345fa9c2bb8

  https://nvd.nist.gov/vuln/detail/CVE-2017-7601
  https://github.com/vadz/libtiff/commit/0a76a8c765c7b8327c59646284fa78c3c27e5490

  https://nvd.nist.gov/vuln/detail/CVE-2017-7602
  https://github.com/vadz/libtiff/commit/66e7bd59520996740e4df5495a830b42fae48bc4

(bsiegert)

2017-05-06 13:49:31 UTC MAIN commitmail json YAML

Updated x11/mlterm to 3.8.1

(tsutsui)

2017-05-06 13:48:39 UTC MAIN commitmail json YAML

Update mlterm to 3.8.1.

Changes noted in doc/en/ReleaseNote:

ver 3.8.1
* Support wayland including libvte compatible library.
  (Build mlterm with --with-gui=wayland option.) (see doc/en/README.wayland)
* Support "compose_dec_special_font" / --decsp option on framebuffer and wayland.
* "line_space" option accepts negative value.
* Add "underline_offset" / --ulpos option.
* Rename wskbd_repeat_1 and wskbd_repeat_N options to kbd_repeat_1 and kbd_repeat_N.
* Enable --enable-anti-alias option of configure script by default.
* Add --enable-fontconfig option which enables fontconfig on framebuffer and wayland
  to configure script. (This option is enabled by default.)
* Add "use_aafont" option which gets mlterm to apply ~/.mlterm/*aafont configurations
  with the use of fontconfig on framebuffer and wayland.
  (The default value is true on wayland, while false on framebuffer.)
* Search alternative glyphs in other fonts automatically on framebuffer and wayland.
  (This feature is enabled if mlterm-{fb|wl} is built with freetype and fontconfig.)
* libvte compatible library supports vte 0.46.0 API.
* Bug fixes:
  Fix detection failuer of mouse event devices on framebuffer/linux. (Thanks to @nyarla)
  (See http://the.nyarla.net/entry/2017/03/25/142516 for details.)
  Fix segfault in using many colors by SGR 38;2;r;g;b or 48;2;r;g;b sequence.

(tsutsui)

2017-05-06 08:22:33 UTC MAIN commitmail json YAML

Updated mbone/rtptools to 1.21

(mef)

2017-05-06 08:22:23 UTC MAIN commitmail json YAML

Updated mbone/rtptools to 1.21
------------------------------
1.21 (July 2016)
    Yann E. MORIN (yann.morin.1998@free.fr): Buildroot [1] is a build-system
    targetting embedded devices. It is able to build toolchains for various
    architectures, based on the traditional GNU compiler collection gcc, the GNU
    binutils and various C libraries, such as GNU libc (glibc), uClibc [2] [3] or
    musl [4].

    glibc is a feature-full C library, which has had support for Yellow Pages
    (and the rest of the SUN RPC stuff) for a long time. However, circa the 2.14
    release, glibc stopped installing the RPC headers [5], on the principle that
    providing the RPC implementation would be better served by a third-party
    package, namely ti-rpc [6]. That did not happen in time, so installing the
    RPC headers from glibc was re-instated circa 2.16.

    uClibc (no longer maintained, replaced by a fork, uClibc-ng) is a fully
    configurable C library for embedded systems. It entirely lacks a SUN RPC
    implementation altogether.

    musl is standards-conforming, lightweight C library. It also entirely lacks a
    SUN RPC implementation.

    TI-RPC is a stand-alone package. It may or may not be available (because the
    user may not need SUN RPC stuff on an embedded device, for example). Besides,
    it is not yet as feature-full as the implementation in glibc, though for all
    practical means, it is totally useable.

    So, there are cases where a SUN RPC implementation is not available.

    This patch makes it so that the use of Yellow Pages is conditional on the
    presence of a SUN RPC implementation, by checking at ./configure whether the
    required header is present, and disabling the corresponding code if the
    header is missing.

    At the same time, the legacy, long unsupported AM_C_PROTOTYPES directive is
    also removed, as it makes recent-ish autoconf fail.

(mef)

2017-05-06 04:39:43 UTC MAIN commitmail json YAML

Updated graphics/flickrnet to 3.24.0

(mef)

2017-05-06 04:39:31 UTC MAIN commitmail json YAML

Updated graphics/flickernet 3.17.0 to 3.24.0
--------------------------------------------
Version Downloads Last updated
                -------        ---------      ------------
FlickrNet API... 3.24.0 (this version) 585 Monday, February 6, 2017
FlickrNet API... 3.22.0 2,278 Friday, February 12, 2016
- Upload now uses substantially less memory, Issue #13
- Refactoring tests
- Add simple retry on Web Exception 502 Bad Gateway
  - a common error returned by Flickr API

FlickrNet API... 3.20.0 193         Tuesday, February 9, 2016
FlickrNet API... 3.19.0 510         Monday, February 1, 2016

(mef)

2017-05-06 02:00:22 UTC MAIN commitmail json YAML

Reduce diff with pkgsrc-wip

No functional change

(kamil)

2017-05-06 01:38:43 UTC MAIN commitmail json YAML

2017-05-06 01:07:05 UTC MAIN commitmail json YAML

Updated fonts/Hasklig to 1.1

(mef)

2017-05-06 01:06:43 UTC MAIN commitmail json YAML

Updated fonts/Hasklig to 1.1
----------------------------
v1.1
  - New ligatures ->>, :::, >=>, <=<, <=>, <->
  - Switched to newer version of calt code by Nikita Prokopov. It
    "doesn窶冲 apply ligatures to long sequences of chars, e.g. !!!!,
    >>>>, etc"
  - Fixed ++ and +++ line inconsistency in heavy italic weights
v1.0
  - Updates to the latest version of SCP
  - Hasklig moves to a ligature substitution mechanism borrowed from
    the excellent Fira Code by Nikita Prokopov

(mef)

2017-05-06 00:57:01 UTC MAIN commitmail json YAML

Updated fonts/Hack-ttf to 2.020

(mef)

2017-05-06 00:56:50 UTC MAIN commitmail json YAML

Updated fonts/Hack-ttf to 2.020
-------------------------------
From: https://github.com/chrissimpkins/Hack/blob/master/CHANGELOG.md
Version 2.020
    divided the vertical stroke in the pipe glyph (U+007C), italic and bold italic sets
    modified U+007C hints in TrueType builds at 6, 7, 10, 11, 12, 13, 14 ppem italic set
    modified U+007C hints in TrueType builds at 6, 7, 10, 14 ppem bold italic set
    modified slant angle and stroke length (U+005C), italic and bold italic sets
    centered U+007C and U+005C, all sets
    modified zero (U+0030) oval fill hints in regular set
    added Powerline glyphs to the bold, italic, and bold italic sets
    U+2502 upper terminal to 1950, lower terminal to -530, all sets
    U+2503 upper terminal to 1950, lower terminal to -530, all sets
    U+250C lower terminal to -530, all sets
    ... (more too many lines ommitted) ...

(mef)

2017-05-05 23:54:13 UTC MAIN commitmail json YAML

2017-05-05 23:20:50 UTC MAIN commitmail json YAML

Reduce diff with pkgsrc-wip/libunwind

(kamil)

2017-05-05 23:13:05 UTC MAIN commitmail json YAML

2017-05-05 22:56:37 UTC MAIN commitmail json YAML

Reduce diff with pkgsrc-wip/lldb-git

(kamil)

2017-05-05 22:47:00 UTC MAIN commitmail json YAML

Reduce diff with pkgsrc-wip/clang-git

This also fixes linking with libstdc++ in clang and should make it usable.

(kamil)

2017-05-05 21:46:50 UTC MAIN commitmail json YAML

Synchronize llvm/Makefile with pkgsrc-wip/llvm-git/Makefile

There shouldn't be functional change in produced binary package.

(kamil)

2017-05-05 21:03:10 UTC MAIN commitmail json YAML

Note update of graphics/tiff to 4.0.7nb4.

(he)

2017-05-05 20:14:05 UTC MAIN commitmail json YAML

2017-05-05 20:06:03 UTC MAIN commitmail json YAML

2017-05-05 19:28:23 UTC MAIN commitmail json YAML

Forgot "make mps", this one belongs to the previous update, 4.0.7nb3.

(he)

2017-05-05 19:17:32 UTC MAIN commitmail json YAML

Note update of graphics/tiff to 4.0.7nb3.

(he)

2017-05-05 19:16:58 UTC MAIN commitmail json YAML

2017-05-05 18:12:24 UTC MAIN commitmail json YAML

2017-05-05 17:38:00 UTC MAIN commitmail json YAML

Move C++11 setting before the first inclusion of compiler.mk. Reuse the
results instead of multiply inclusions.

(joerg)

2017-05-05 16:28:13 UTC MAIN commitmail json YAML

Links against libtermcap.

(jperkin)

2017-05-05 16:22:29 UTC MAIN commitmail json YAML

2017-05-05 15:47:34 UTC MAIN commitmail json YAML

Added www/py-model_mommy version 1.3.2

(adam)

2017-05-05 15:46:41 UTC MAIN commitmail json YAML

Model-mommy offers you a smart way to create fixtures for testing in Django.
With a simple and powerful API you can create many objects with a single line
of code.

(adam)

2017-05-05 15:24:59 UTC MAIN commitmail json YAML

Add api SMF instance.  From Jorge Schrauwen in joyent/pkgsrc#490.

(jperkin)

2017-05-05 11:04:31 UTC MAIN commitmail json YAML

Updated textproc/coccigrep to 1.16

(leot)

2017-05-05 11:04:15 UTC MAIN commitmail json YAML

Update textproc/coccigrep to 1.16

pkgsrc changes:
- Switch MASTER_SITES to MASTER_SITE_GITHUB that also contains newer
  releases
- Delete PYTHON_VERSIONS_INCOMPATIBLE, now coccigrep is compatible
  also with Python 3.

Changes:
1.16
----
- Add support for Python 3.4

1.15
----
- Add Python 3 support

1.14
----
- Various bug fixes and improvements

(leot)

2017-05-05 09:04:35 UTC MAIN commitmail json YAML

R: add some missing PLIST.Darwin entries

(maya)

2017-05-05 08:23:01 UTC MAIN commitmail json YAML

php-intl: help CentOS6 builds by requiring a GCC that recognises -std=c++11

(maya)

2017-05-05 07:34:06 UTC MAIN commitmail json YAML

splint: use the standard check for C99 before including a C99 header

If PR pkg/47405 was not fixed before (it probably was), this should
definitely do the trick.

(maya)

2017-05-05 06:50:29 UTC MAIN commitmail json YAML

Updated databases/py-ldap to 2.4.38; databases/py-ldap3 to 2.2.3

(adam)

2017-05-05 06:50:01 UTC MAIN commitmail json YAML

Changes 2.2.3:
abstraction layer query converts int values to string (thanks dgadmin)
CaseInsensitiveDictWithAlias doesn窶冲 raise an exception anymore if alias is set multiple times to the same key
friendly names in AttrDef are properly managed when performing commits in Writer cursors
no more errors when server returns an empty schema (thanks Glen)
range attributes in entries are properly recognized when auto_range is False
fixed random errors in auto_range searches (thanks James)
fixed checking of malformed schema
added configuration parameter IGNORE_MALFORMED_SCHEMA to not raise exception for servers that don窶冲 follow the LDAP RFCs (defaults to False)
test config moved to test/config.py
testcase_id generated randomly for each test
added ATTRIBUTES_EXCLUDED_FROM_OBJECT_DEF parmeter to exclude some attribute from automatic populate of ObjectDef in Abstract Layer (helpful for AD)
added IGNORED_MANDATORY_ATTRIBUTES_IN_OBJECT_DEF parmeter to exclude some attribute from mandatory attribute list in ObjectDef in Abstract Layer (helpful for AD)
fixed error when using implicit assigning in WritableEntry
added LDAPInvalidValueError Exception
in Python 3 byte filter are converted to unicode before parsing
RESPONSE_DN_ENCODING parameter renamed to ADDITIONAL_ENCODINGS
to_unicode(value, encoding=None, additional_encodings=False) now checks for additional encoodings in ADDITIONAL_ENCODINGS list if additional_encoding is set to True
Reusable strategy uses not lazy Restartable connections

(adam)

2017-05-05 06:44:22 UTC MAIN commitmail json YAML

Changes 2.4.38:

Lib/slapdtest.py
* SlapdObject now evaluates env var SLAPD for optionally pointing
  to OpenLDAP's slapd executable (e.g. with OpenLDAP LTB builds)
* added LDAPI support in slaptest.SlapdObject which is internally used
  in methods ldapadd() and ldapwhoami()
* added method slaptest.SlapdObject.ldapmodify()
* fixed enabling logger in slaptest
* directory name now contains port to be able to run several SlapdObject
  instances side-by-side (e.g. with replication)
* added authz-regexp mapping to rootdn for user running the test
* internally use SASL/EXTERNAL via LDAPI to bind
* SlapdObject.server_id used as serverID in slapd.conf for MMR
* Removed method SlapdObject.started() because SlapdTestCase.setUpClass()
  will be used to add initial entries

Tests/
* ReconnectLDAPObject is also tested by sub-classing test class

(adam)

2017-05-05 01:56:08 UTC MAIN commitmail json YAML

Updated devel/pkgconf to 1.3.5

(mef)

2017-05-05 01:55:56 UTC MAIN commitmail json YAML

Updated devel/pkgconf 1.0.1 to 1.3.5
------------------------------------
Changes from 1.3.4 to 1.3.5:
----------------------------
* Bug fixes:
  - fix --variable output for compatibility some broken configure scripts when they
    request the same variable from multiple packages

Changes from 1.3.3 to 1.3.4:
----------------------------
* Bug fixes:
  - fix a quoting issue exposed by the Go testsuite

Changes from 1.3.2 to 1.3.3:
----------------------------
* Bug fixes:
  - back out disabling the dependency resolver for single-package queries, it caused
    too many regressions.

* Enhancements:
  - allow explicitly disabling the dependency resolver via new environment variable,
    PKG_CONFIG_MINIMUM_TRAVERSE_DEPTH=1.  while pkgconf could already do this using
    --minimum-traverse-depth=1, other pkg-config implementations do not have this
    option, so adding an environment variable allows to make better use of this
    feature (other implementations won't error due to unknown option this way)

Changes from 1.3.1 to 1.3.2:
----------------------------
* Bug fixes:
  - rewrite handling of --modversion, --print-variables and --variable to not require
    the dependency resolver
  - ensure we disable the dependency resolver in all cases where it is a single-package
    query (1.3.1 did not go far enough)

Changes from 1.3.0 to 1.3.1:
----------------------------
* Features:
  - implement --short-errors

* Bug fixes:
  - only consider a single package at a time with --print-requires, --print-requires-private,
    --print-provides, --modversion, --print-variable and --print-variables

* Enhancements:
  - synchronized latest freedesktop.org changes to pkg.m4
  - improve error reporting with legacy --atleast-version and similar flags.

Changes from 1.2.0 to 1.3.0:
----------------------------
* Features:
  - pkgconf --debug now provides a facility for tracing most relevant libpkgconf operations
  - libpkgconf: add warn and trace handlers for warnings
  - replace realpath() with faster, lighter weight path normalization function (#112)
  - pkgconf CLI now emulates pkg-config quoting rules precisely, while allowing direct access
    to the actual fragments via libpkgconf

* Bug fixes:
  - pkg: properly separate static and virtual packages so they are not inappropriately
    optimized out of the dependency graph (#108)
  - argvsplit: do not consider ' and " to have similar rules to escape sequences (#111)
  - pkg: strip trailing whitespace when parsing .pc files

* Enhancements:
  - argvsplit basically rewritten from scratch
  - many code fixes spotted by coverity
  - add PKG_CONFIG_DONT_RELOCATE_PATHS and --dont-relocate-paths environment variables to
    disable path relocation feature if needed
  - remove extra whitespace that was present for compatibility with older pkg-config releases (#113)

Changes from 1.1.0 to 1.2.0:
----------------------------
* Features:
  - new --path option lists the .pc files which provided the requested dependencies
  - new path relocation API: pkgconf_path_relocate(), which wraps functions such as
    realpath() and cygwin_conv_path().
  - new --with-path option adds a path to the search list
  - new --define-prefix and --dont-define-prefix features enable automatic prefix
    detection for relocatable SDKs.  this is mostly useful on windows.

* Bug fixes:
  - fragments: fix even more edge cases involving token concatenation
  - path lists: don't attempt to collect path inodes if the filter is disabled
  - path lists: explicitly avoid uninitialised data for the path inode cache
  - client: properly handle --keep-system-cflags and --keep-system-libs

* Enhancements:
  - windows: build libpkgconf as a DLL
  - fragments: only munge fragments if sysroot_dir is actually set
  - overall API: resolver flags have been moved to being a client-object setting
    instead of used for every function invocation

Changes from 1.0.1 to 1.1.0:
----------------------------
* Features:
  - new Provides system allows alternate .pc files to provide a dependency
  - stable library API (with documentation): http://pkgconf.readthedocs.io/

* Enhancements:
  - make it possible to programmatically declare dependencies instead of just using the parser
  - testsuite migrated to run under kyua
  - provide a libpkgconf.pc file for consumers to use
  - pkgconf client: new --pure flag to enable dependency graph optimization in --static mode
  - significant .pc parser speedups using bsearch(3).
  - handle -idirafter in the same way as -isystem CFLAGS
  - learn toolchain "system" paths from GCC environment variables, if present
  - filter duplicate PKG_CONFIG_PATH (and other) entries by inode

* Bug fixes:
  - fragments: fix another edge case involving empty tokens being concatenated onto previous tokens (#99)
  - libpkgconf: remove dependencies on config.h in public headers

(mef)

2017-05-05 01:19:47 UTC MAIN commitmail json YAML

Updated devel/pkg-config to 0.29.2

(mef)

2017-05-05 01:19:36 UTC MAIN commitmail json YAML

Updated devel/pkg-config to 0.29.2
----------------------------------
pkg-config 0.29.2
=================

- Improved pkg-config's recursive package list expansion performance.
  Thanks to Matthew Hanna for the fix.
- Handle an empty prefix setting correctly when --define-prefix is used.
  (#97453)
- Lazily load pc files instead of reading all available pc files during
  initialization. Thanks to Marco Diego Aur辿lio Mesquita for the fix.
  (#98215)
- Check the CPATH environment variable when determining system include
  paths like GCC does. Document the system search path behavior. Thanks
  to v4hn for the fix. (#99224)
- Make PKG_CHECK_MODULES show the module list rather than the variable
  prefix in configure output. Thanks to Russ Albery for the fix.
  (#98334)
- Fix bundled glib build with GCC 6. (#98334)
- Handle -isystem and -idirafter when PKG_CONFIG_SYSROOT_DIR is set.
  (#97337)
- Check the INCLUDE environment variable when determining system include
  paths on Windows builds when --msvc-syntax is used. (#94729)

(mef)

2017-05-05 00:16:07 UTC MAIN commitmail json YAML

Updated devel/p5-Test-Deep to 1.127

(mef)

2017-05-05 00:15:53 UTC MAIN commitmail json YAML

Updated devel/p5-Test-Deep to 1.127
-----------------------------------
1.127    2017-05-04
        - no code changes from previous release

1.126_001 2017-04-17
        - do not eagerly convert simple scalars into tests in the all, any, and
          none tests; this was breaking LeafWrapper application

(mef)

2017-05-05 00:11:29 UTC MAIN commitmail json YAML

Updated ham/fldigi to 4.0.3

(mef)

2017-05-05 00:11:16 UTC MAIN commitmail json YAML

Updated ham/fldigi 3.23.21 to 4.0.3
---------------------------
=Version 4.0.3=
2017-04-30  David Freese  <iam_w1hkj@w1hkj.com>
c9b9bb9: OS X Wizard
a8a6e09: cw decoder
7e552c4: CW wait

=Version 4.0.2=
2017-04-14  keith bellairs  <keith@bellairs.org>
7432793: Lotw Match

2017-04-13  David Freese  <iam_w1hkj@w1hkj.com>
ed5850e: flrigi bw synch
9723972: Clang 8.1.0
97024a9: Sound card
1549193: Revert "wefax"
c85b75e: IFKP image processing
ef39743: Macro Save
4396c43: CW end-of-transmit
2f1d709: Font Initialization
a1d4122: OS X socket connect
835d823: Winkeyer exit process

=Version 4.0.1=
f40e79d: Socket connect

=Version 4.0.0=
7efc9b2: OS X 10.12 build
ffd6f09: STATION_CALLSIGN
f0f3763: Free BSD mods
b163605: Logbook mods
167f064: ru-po-update
5354812: Default Tx Audio
fac5963: remove sprintf
a9db866: Documentation update
b522581: n3fjp logger search
c565b03: fopen -> fl_fopen
abd9554: 48 bar macro
5f5776c: CW decoder
9c0f906: DX cluster
016799a: Logbook support
b4e227b: WinKeyer
1fe26c1: fsq ifkp s/n computation
d576fd8: fltk version update
2a1a8c3: Macro Date Time Formats

2017-02-24  Keith Bellairs  <keith@bellairs.org>
627eb31: lotw addition

2017-02-23  David Freese  <iam_w1hkj@w1hkj.com>
0507110: THOR/IFKP Image transfers

2017-02-23  Giuseppe Ciaccio  <giuseppe.ciaccio@unige.it>
95b51b6: OSS bug fix

2017-02-21  David Freese  <iam_w1hkj@w1hkj.com>
f462dd7: ifkp s/n update
376f7f5: PSKMAIL PTT fault protection
bcec5aa: Logbook File Handling
cbdea29: n3fjp contest update
fccb4eb: fsq s/n update
1786a5e: README update
67bc122: Russian UTF-8 translation
9decf04: Tooltips

2017-01-30  Jae Stutzman  <k5jae@stutzman.net>
fef4e93: Hamlib/RigCAT/XMLRPC Interface

(pkgsrc changes)
- Drop patch, upstream fixed it (slightly different from ours)
    our patch        if ( ptr2          && (unsigned)(ptr2 - ptr) <= p)
    upstream        if ((ptr2 != NULL) && (unsigned)(ptr2 - ptr) <= p)
- +.include "ham/flxmlrpc/buildlink3.mk"

(mef)

2017-05-05 00:07:40 UTC MAIN commitmail json YAML

Added ham/flxmlrpc version 0.1.4

(mef)

2017-05-05 00:05:40 UTC MAIN commitmail json YAML

Import flxmlrpc-0.1.4 as ham/flxmlrpc.

This is flxmlrpc, an implementation of the XmlRpc protocol
written in C++, based upon XmlRpc++0.7 and modified to provide additional XmlRpc
Variable types.  It is used in fldigi, flrig, flnet, flmsg, flarq, flamp, fllog;
a suite of programs written for amateur radio emergency communications.

flxmlrpc is designed to make it easy to incorporate xmlrpc client and server
support into C++ applications. Or use both client and server objects in your
application for easy peer-to-peer support.

(mef)

2017-05-04 22:48:24 UTC MAIN commitmail json YAML

Add missing BUILD_DEPENDS.

(wiz)

2017-05-04 21:20:04 UTC MAIN commitmail json YAML

Updated textproc/py-lxml to 3.7.3

(adam)

2017-05-04 21:19:29 UTC MAIN commitmail json YAML

Changes 3.7.3:
Bugs fixed
* GH-218 was ineffective in Python 3.
* GH-222: lxml.html.submit_form() failed in Python 3.

(adam)

2017-05-04 20:29:53 UTC MAIN commitmail json YAML

Updated devel/py-prompt_toolkit to 1.0.14; time/py-dateutil to 2.6.0; devel/py-jupyter_client to 5.0.1; devel/py-ipykernel to 4.6.1

(adam)

2017-05-04 20:28:33 UTC MAIN commitmail json YAML

Changes 4.6.1:
- Fix eventloop-integration bug preventing Qt windows/widgets from displaying with ipykernel 4.6.0 and IPython ≥ 5.2.
- Avoid deprecation warnings about naive datetimes when working with jupyter_client ≥ 5.0.

(adam)

2017-05-04 20:24:06 UTC MAIN commitmail json YAML

Python 2.7 requires py-scandir

(adam)

2017-05-04 20:23:31 UTC MAIN commitmail json YAML

2017-05-04 19:53:41 UTC MAIN commitmail json YAML

Fix PLIST for Python 2.x

(adam)

2017-05-04 19:47:48 UTC MAIN commitmail json YAML

Changes 5.0.1:
- Update internal protocol version number to 5.1,
  which should have been done in 5.0.0.

(adam)

2017-05-04 19:45:57 UTC MAIN commitmail json YAML

Version 2.6.0:

* Added PEP-495-compatible methods to address ambiguous and imaginary dates in
time zones in a backwards-compatible way. Ambiguous dates and times can now
be safely represented by all dateutil time zones.

* Added new methods for working with ambiguous and imaginary dates to the tz
module. datetime_ambiguous() determines if a datetime is ambiguous for a given
zone and datetime_exists() determines if a datetime exists in a given zone.
This works for all fold-aware datetimes, not just those provided by dateutil.

* Fixed an issue where dst() in Portugal in 1996 was returning the wrong value
in tz.tzfile objects

* Fixed an issue where zoneinfo.ZoneInfoFile errors were not being properly
deep-copied.

* Refactored tzwin and tzrange as a subclass of a common class, tzrangebase, as
there was substantial overlapping functionality. As part of this change,
tzrange and tzstr now expose a transitions() function, which returns the
DST on and off transitions for a given year.

* Deprecated zoneinfo.gettz() due to confusion with tz.gettz(), in favor of
get() method of zoneinfo.ZoneInfoFile objects.

* For non-character, non-stream arguments, parser.parse now raises TypeError
instead of AttributeError.

* Fixed an issue where tzfile objects were not properly handling dst() and
tzname() when attached to datetime.time objects.

* /usr/share/lib/zoneinfo was added to TZPATHS for compatibility with Solaris
systems.

* tzoffset and tzrange objects now accept either a number of seconds or a
datetime.timedelta() object wherever previously only a number of seconds was
allowed.

* datetime.timedelta objects can now be added to relativedelta objects.

* Refactored relativedelta.weekday and rrule.weekday into a common base class
to reduce code duplication.

(adam)

2017-05-04 19:30:51 UTC MAIN commitmail json YAML

Changes 1.0.14:
Fixes:
- Handle arguments in the $EDITOR and $VISUAL env variable.
- Added missing explicit loops for Futures in asyncio_posix eventloop.
- Fallback to default terminal size if reported as 0.
- Don't save undo state when receiving CPRResponse.
- Set VMIN terminal flag to 1 when entering raw mode.
  (Fixes a bug on Solaris.)
- Fix `previous_key_sequences`.

(adam)

2017-05-04 19:25:03 UTC MAIN commitmail json YAML

Updated textproc/py-jsonschema to 2.6.0; textproc/py-jinja2 to 2.9.6; fonts/fontforge to 20161004. Added graphics/libspiro version 0.5.20150702

(adam)

2017-05-04 19:23:18 UTC MAIN commitmail json YAML

This release introduces a new icon set, new functionality for custom icon selection graphics, support for GlyphOrderAndAliasDB files, and support for Unicode 9.0.

It also fixes a number of small bugs relating to certain bitmap typefaces, stroke expansion, handling of CID ranges, and the user interface.

There are two tags and package sets. 20161004 is the original release, and 20161005 adds support for Ubuntu 16.04 and 16.10.

(adam)

2017-05-04 19:21:35 UTC MAIN commitmail json YAML

Spiro is the creation of Raph Levien. It simplifies the drawing of beautiful
curves.

Using bezier splines an artist can easily draw curves with the same slope on
either side of an on-curve point. Spiros, on the other hand, are based on
clothoid splines which make it easy to maintain constant curvature as well as
constant slope. Such curves will simply look nicer.

Raph Levien's spiro splines only use on-curve points and so are easier to use
and more intuitive to the artist.

This library will take an array of spiro control points and convert them into
a series of bezier splines which can then be used in the myriad of ways the
world has come to use beziers.

(adam)

2017-05-04 18:44:12 UTC MAIN commitmail json YAML

Add GCC_VERSION_SUFFIX, which can be used i.e. on SuSE systems to select
between different compiler versions.

(joerg)

2017-05-04 18:30:56 UTC MAIN commitmail json YAML

Simplify PATH handling. Use full pkgsrc path for cwrappers, but skip the
cwrapper directory itself.

(joerg)

2017-05-04 18:29:48 UTC MAIN commitmail json YAML

Unconditionally use standard headers, nothing defines the guards.

(joerg)

2017-05-04 18:11:09 UTC MAIN commitmail json YAML

2017-05-04 17:46:53 UTC MAIN commitmail json YAML

v2.6.0
Support for Python 2.6 has been dropped.
Improve a few error messages for uniqueItems and additionalProperties
Fix an issue with ErrorTree's handling of multiple errors

(adam)

2017-05-04 17:39:16 UTC MAIN commitmail json YAML

Note GCC7PKGREVISION bump.

(maya)

2017-05-04 17:38:23 UTC MAIN commitmail json YAML

gcc7: unbreak non-linux after GCC r243219.
GCC target/80600. Thanks joerg.
Fix wip package reference, thanks Kai-Uwe Eckhardt.

Bump PKGREVISION

(maya)

2017-05-04 16:40:02 UTC MAIN commitmail json YAML

Updated lang/nodejs to 7.10.0

(fhajny)

2017-05-04 16:39:36 UTC MAIN commitmail json YAML

Update lang/nodejs to 7.10.0.

- crypto: add randomFill and randomFillSync
- meta: Added new collaborators
  - add lucamaraschi to collaborators
  - add DavidCai1993 to collaborators
  - add jkrems to collaborators
  - add AnnaMag to collaborators
- process: fix crash when Promise rejection is a Symbol
- url: make WHATWG URL more spec compliant
- v8:
  - fix stack overflow in recursive method
  - fix build errors with g++ 7

(fhajny)

2017-05-04 15:12:34 UTC MAIN commitmail json YAML

Set RUBY_RAILS_SUPPORTED to 32 and utlize it.

(taca)

2017-05-04 15:11:25 UTC MAIN commitmail json YAML

Do not include "rails.mk" here.

(taca)

2017-05-04 15:10:34 UTC MAIN commitmail json YAML

Do not include "rails.mk" here.

(taca)

2017-05-04 15:09:10 UTC MAIN commitmail json YAML

Include "rails.mk" if RUBY_RAILS_SUPPORTED is defined.

(taca)

2017-05-04 15:06:18 UTC MAIN commitmail json YAML

Set RUBY_RAILS_SUPPORTED to 42 and utilize it.

(taca)

2017-05-04 15:03:59 UTC MAIN commitmail json YAML

Set RUBY_RAILS_SUPPORTED to 32 and utilize it.

(taca)

2017-05-04 12:53:35 UTC MAIN commitmail json YAML

Updated security/putty to 0.69

(ryoon)

2017-05-04 12:52:35 UTC MAIN commitmail json YAML

Update to 0.69

* Convert to use GTK 3 to fix build

Changelog:
These features are new in 0.69 (released 2017-04-29):

    Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even the names we missed when we thought we'd fixed this in 0.68. See vuln-indirect-dll-hijack-2.
    Windows PuTTY should work with MIT Kerberos again, after our DLL hijacking defences broke it.
    Jump lists should now appear again on the PuTTY shortcut in the Windows Start Menu.
    You can now explicitly configure SSH terminal mode settings not to be sent to the server, if your server objects to them.

(ryoon)

2017-05-04 12:26:59 UTC MAIN commitmail json YAML

Updated www/php-nextcloud to 11.0.3

(ryoon)

2017-05-04 12:26:06 UTC MAIN commitmail json YAML

Update to 11.0.3

Changelog:
Server

    Use the correct principal for shared addressbooks (server/3608)
    Fix saving backup codes by using a correct data uri (server/3652)
    Update icewind/streams to 0.5.2 (server/32931)
    Fix string comparison and return docs (server/3665)
    Typecast shared mount's storage_id to int as documented + some refactor to avoid similar bugs (server/3658)
    Use a proper date format for transfer ownership (server/3700)
    DAV sharing permissions should not depend on the order (server/3722)
    Add new user agent of windows 10 dav backend (server/37641)
    Add back appstoreenabled config switch (server/37671)
    Call right function after sudo mode (server/3820)
    Dont allow empty wildcard search (server/3842)
    Remove single quotes around search query like in user search (server/3849)
    Fix mimetype detection on public uploads for the workflow engine (server/3765)
    Fix branding and show Nextcloud (server/39691)
    Fix reshare with user activity message (server/39812)
    Create correct VCard and return correct error codes (server/4029)
    Prevent migration from ownCloud 10 to Nextcloud 11 (server/34151)
    Make sure transparency is an integer when saving a calendar (server/4167)
    Make public links work with master key (server/42071)
    Don't try to render the avatars if avatars are disabled (server/4214)
    Reduce error message text (server/42281)
    Don't list on public calendar endpoints (server/4229)
    Fix upload of folders in Chrome (server/4154)
    Make sure blob columns are correctly converted as parameters (server/4233)
    Save the scope of an auth token in the session (server/4225)
    Take share by mail into consideration if we calculate the access list (server/4242)
    Also add the root of external storages to the file id list (server/4237)
    Fix LDAP description (server/42382)
    Remove the double password confirmation on changing cron (server/4236)
    Fix scheduling plugin on legacy caldav endpoint (server/4235)
    Directly fix invalid values of DTEND and DTSTART (server/4234)
    Make JobList::next() lock free (server/4254)
    Don't remove owner property for public calendars (server/4272)
    Add capabilities for share by mail (server/42511)
    Dont use the permissions mask while scanning (server/4278)
    Add missing maintenance plugin to new DAV endpoint (server/4290)
    Fix bug with shared_by for own calendars if shared (server/4301)
    Translation string corrected > 1 user (server/4377)

Activity

    Fix activities for "Files drop" on external storages (activity/118)

User_SAML

    Bump to php-saml 2.10.5 (user_saml/1001)

Logreader

    Small screen layout improvements (logreader/2bcd915969386ceb77c7f91dfd5fc19fd3212346
    Fix log filtering (logreader/4095dfc62dcceb3c59a3f581baa5589737d0e6f3)
    Greatly speedup log iteration (logreader/71a4c6849641f821e80d96674c57a69fe7a8aa9e)
    Search more rows (logreader/b9d00b5599ac8a76862895266f1c23096391aad8)
    Stop iterating if we dont have a valid file handle (logreader/a87a8e653ecae5efef6342e645b98f2878219c87)
    Don't return a LogIterator on a broken handle (logreader/39069108f99d463b1cb8bc944f3ef24324b9f43d)
    More robust log iteration (logreader/c0eb04d55bf1dee94ef523dae0e3b0e6afc272a6)
    Use proper iso date format (logreader/13a31181a6d72d084797a71f49f2c5edee8c8dae)
    Automatically try to fix some common escape errors from copy-pasted log entries (logreader/031db2a7f9b9f8cee42acf6eae7d993d31d4660a)
    Fix stack trace parsing of incorrectly escaped logentries (logreader/538667770edfdd48374ef33e9c15498ed98ece60)
    Highlight entries from the same request when clicking on an entry (logreader/2d1ccd0e4cca32220fcbe0b4d79d1cd23f0e73a5)
    Fix copy paste info searchfield (logreader/0e91b2f46649a720feb7c3b6b8266b8657db5574)
    Fix reset search after 0 results (logreader/50bec8ecf7edd81cfb96a35089283c0d879b41f3)
    Allow searching for requestId and user (logreader/7f84e55bb4a1e4086ab0918a6bf58ad3885bbd91)
    Allow searching in url (logreader/7833d97cf85fd351d2f7550d67d21bd0c2a815f4)
    Fix infinite scroll (logreader/cbe874c6c068b9156ad8456edf31d112da40cbc9)
    Dont show loading indicator if we already have entries (logreader/d26a08dc0540126177e8d20c3e243b44c5a399c4)

Gallery

    Fix upload after core changes (gallery/b4ac4429841cfe2b7ea260dfb37fcde25580143c2)
    Update JavaScript libraries (gallery/247)

(ryoon)

2017-05-04 12:21:45 UTC MAIN commitmail json YAML

2017-05-04 12:19:13 UTC MAIN commitmail json YAML

Add broken python scripts to CHECK_WRKREF_SKIP too.

(jperkin)

2017-05-04 10:43:59 UTC MAIN commitmail json YAML

Updated www/py-tornado to 4.5.1; devel/py-pexpect to 4.2.1

(adam)

2017-05-04 10:43:28 UTC MAIN commitmail json YAML

Version 4.2.1
* Fix to allow running ``env`` in replwrap-ed bash.
* Raise more informative exception from pxssh if it fails to connect.
* Change ``passmass`` example to not log passwords entered.

(adam)

2017-05-04 09:50:21 UTC MAIN commitmail json YAML

What's new in Tornado 4.5

`tornado.log`
- Improved detection of libraries for colorized logging.

`tornado.httputil`
- `.url_concat` once again treats None as equivalent to an empty sequence.

(adam)

2017-05-04 07:48:27 UTC MAIN commitmail json YAML

Remove rdoc.mk now.

(taca)

2017-05-04 07:47:22 UTC MAIN commitmail json YAML

Remove RUBY_RDOC_PKGSRC_VERS.

(taca)

2017-05-04 07:44:41 UTC MAIN commitmail json YAML

Remove setting RUBY_RDOC_REQD and using "rdoc.mk".

(taca)

2017-05-04 07:42:49 UTC MAIN commitmail json YAML

Note remove of devel/ruby-rdoc package.

(taca)

2017-05-04 07:42:28 UTC MAIN commitmail json YAML

Remove ruby-rdoc package since rdoc bultin ruby*-base is enough to use.

(taca)

2017-05-04 07:41:47 UTC MAIN commitmail json YAML

Delete ruby-rdoc.

(taca)

2017-05-04 07:37:09 UTC MAIN commitmail json YAML

Drop use of RUBY_RDOC_REQD.  Since current all ruby*-base packages
contains rdoc version 4.1.0 or later, there is no reason to require
sepatate devel/ruby-rdoc pacakge.

So, RUBY_RDOC_REQD is already noop, no PKGREVISION bump.

(taca)

2017-05-03 23:37:47 UTC MAIN commitmail json YAML

oops, add gcc7 here, too.

I would like to know if other people have trouble with it.

(maya)

2017-05-03 23:00:59 UTC MAIN commitmail json YAML

2017-05-03 22:29:20 UTC MAIN commitmail json YAML

fix PLIST when the official-mozilla-branding option is enabled

(snj)

2017-05-03 19:35:18 UTC MAIN commitmail json YAML

Updated devel/py-py to 1.4.33

(adam)

2017-05-03 19:33:10 UTC MAIN commitmail json YAML

Changes 1.4.33: Clean up tox.ini and use tox-travis to run on Travis

(adam)

2017-05-03 19:31:02 UTC MAIN commitmail json YAML

Updated devel/py-codestyle to 2.3.1

(adam)

2017-05-03 19:29:58 UTC MAIN commitmail json YAML

Changes 2.3.1:
Bugs:
* Fix regression in detection of E302 and E306

(adam)

2017-05-03 18:38:58 UTC MAIN commitmail json YAML

+ abcmidi-20170416, asterisk-13.14.1, claws-mail-3.15.0,
  libgphoto2-2.5.13, libmtp-1.1.13, lyx-2.3.0, mame-0.185,
  phpmyadmin-4.7.0, py-tornado-4.5.1, xfce4-desktop-4.13.0.

(wiz)

2017-05-03 16:50:06 UTC MAIN commitmail json YAML

Updated databases/mongo-tools to 3.4.4

(fhajny)

2017-05-03 16:49:54 UTC MAIN commitmail json YAML

Update databases/mongo-tools to 3.4.4

3.4.2
- PreProcessing is failling with "got invalid document size"
- mongo-replay crashes during playback
- nil pointer derereference when error occurs

3.4.1
- Stats collection has large playback performance impact
- Add option to set capture buffer size to avoid packet loss
- Playback file contains full reply payload
- mongoreplay: out of bounds error in "shortenreply" during record
- Add test for restoring a collection with a default collation
- nil pointer dereference in mongoreplay when error on new playback
  file creation

3.2.10
- Don't create intents for system.profile.metadata.json files
- tools do not respect readPreference=secondary when connecting to a
  mongos
- Mongodump SSL and GSSAPI authentication
- No numeric version in -version output
- Backport to v3.2
- Issue only one ApplyOps cmd per oplog entry

3.2.9
- Make -version spit out a bit more information.

3.2.8
- Mongostat with discover can find the same node twice in a sharded
  cluster
- mongostat -discover does not alias localhost to the target hostname
- mongoimport returns exit code 0 even when error prevents records
  from being inserted
- Wrong error message while using mongoimport
- add a "-assertExists" option to mongoexport
- Use v3.2.7 for qa tests
- mongoimport types jstest fails on functions

(fhajny)

2017-05-03 13:46:53 UTC MAIN commitmail json YAML

Introduce CHECK_SHLIBS_BLACKLIST which allows users to specify a list of
regexps that will cause the checks to fail if they match resolved RPATHs.

(jperkin)

2017-05-03 12:37:11 UTC MAIN commitmail json YAML

Updated databases/mysql55-client to 5.5.56

(mef)

2017-05-03 12:37:02 UTC MAIN commitmail json YAML

Updated database/mysql55-{client,server} to 5.5.56
-------------------------------------------------------------------
(From https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-56.html)

Changes in MySQL 5.5.56 (2017-05-02, General availability)

Binary packages for MySQL 5.5.56 are identical to those for MySQL
5.5.55, except for the version number. The change in 5.5.56 for Bug
#25942414 is applicable only to those who build from source.

Security Notes

  For the WITH_SSL CMake option, no is no longer a permitted value or
the default value. The default is now bundled. Consequently, MySQL now
is always built with SSL support. (Bug #25942414)
-------------------------------------------------------------------
(pkgsrc changes)
- Removed ssl option both from PKG_{SUPPORTED,SUGGESTED}_OPTIONS.
  This may give error if ssl is explicitly designated, but I believe
  that is the (kind of) upstream intension.
  (or left ssl in SUPPORTED and ignore it ?)

(mef)

2017-05-03 11:48:16 UTC MAIN commitmail json YAML

php71: require a GCC version newer than the one in PHP bug #74527
on i386, re-fixing the build on i386 in a simpler way.

(maya)

2017-05-03 11:45:25 UTC MAIN commitmail json YAML

php71: revert my previous commit.
Next commit will require a newer GCC on i386 re-fixing the build.

This is to make pullups easier maybe.

(maya)

2017-05-03 11:43:49 UTC MAIN commitmail json YAML

Updated lang/nodejs4 to 4.8.3

(fhajny)

2017-05-03 11:43:39 UTC MAIN commitmail json YAML

Update lang/nodejs4 to 4.8.3.

- module: The module loading global fallback to the Node executable's
  directory now works correctly on Windows.
- src: fix base64 decoding in rare edgecase
- tls: fix rare segmentation faults when using TLS

(fhajny)

2017-05-03 11:41:36 UTC MAIN commitmail json YAML

php70: require a GCC version newer than the one in PHP bug #74527
on i386. It doesn't appear with any pkgsrc compiler I've tried
(GCC 6, 5, 4.9). Fixes i386 build.

(maya)

2017-05-03 11:41:20 UTC MAIN commitmail json YAML

Remove double line committed by mistake

(fhajny)

2017-05-03 11:19:42 UTC MAIN commitmail json YAML

2017-05-03 11:19:04 UTC MAIN commitmail json YAML

libressl: update to 2.5.4

We have released LibreSSL 2.5.4, which will be arriving in the
LibreSSL directory of your local OpenBSD mirror soon. It includes the following
changes:

  * Reverted a previous change that forced consistency between return
    value and error code when specifing a certificate verification
    callback, since this breaks the documented API. When a user supplied
    callback always returns 1, and later code checks the error code to
    potentially abort post verification, this will result in incorrect
    successul certificate verification.

  * Switched Linux getrandom() usage to non-blocking mode, continuing to
    use fallback mechanims if unsuccessful. This works around a design
    flaw in Linux getrandom(2) where early boot usage in a library makes
    it impossible to recover if getrandom(2) is not yet initialized.

  * Fixed a bug caused by the return value being set early to signal
    successful DTLS cookie validation. This can mask a later failure and
    result in a positive return value being returned from
    ssl3_get_client_hello(), when it should return a negative value to
    propagate the error.

  * Fixed a build error on non-x86/x86_64 systems running Solaris.

We have released LibreSSL 2.5.3, based on OpenBSD 6.1, which will be the new
stable release series. LibreSSL 2.3.x support has also ended. LibreSSL 2.5.3
contains the following changes from the previous stable release.

* libtls now supports ALPN and SNI

* libtls adds a new callback interface for integrating custom IO functions.
    Thanks to Tobias Pape.

* libtls now handles 4 cipher suite groups:
    "secure" (TLSv1.2+AEAD+PFS)
    "compat" (HIGH:!aNULL)
    "legacy" (HIGH:MEDIUM:!aNULL)
    "insecure" (ALL:!aNULL:!eNULL)
  This allows for flexibility and finer grained control, rather than having
  two extremes (an issue raised by Marko Kreen some time ago).

* Tightened error handling for tls_config_set_ciphers().

* libtls now always loads CA, key and certificate files at the time the
  configuration function is called. This simplifies code and results in a single
  memory based code path being used to provide data to libssl.

* Added support for OCSP intermediate certificates.

* Added functions used by stunnel and exim from BoringSSL - this brings in
  X509_check_host, X509_check_email, X509_check_ip, and X509_check_ip_asc.

* Added initial support for iOS, thanks to Jacob Berkman.

* Improved behavior of arc4random on Windows when using memory leak analysis
  software.

* Correctly handle an EOF that occurs prior to the TLS handshake completing.
    Reported by Vasily Kolobkov, based on a diff from Marko Kreen.

* Limit the support of the "backward compatible" ssl2 handshake to only be
  used if TLS 1.0 is enabled.

* Fix incorrect results in certain cases on 64-bit systems when BN_mod_word()
  can return incorrect results. BN_mod_word() now can return an error condition.
  Thanks to Brian Smith.

* Added constant-time updates to address CVE-2016-0702

* Fixed undefined behavior in BN_GF2m_mod_arr()

* Removed unused Cryptographic Message Support (CMS)

* More conversions of long long idioms to time_t

* Improved compatibility by avoiding printing NULL strings with printf.

* Reverted change that cleans up the EVP cipher context in EVP_EncryptFinal()
  and EVP_DecryptFinal(). Some software relies on the previous behaviour.

* Avoid unbounded memory growth in libssl, which can be triggered by a TLS
  client repeatedly renegotiating and sending OCSP Status Request TLS extensions.

* Avoid falling back to a weak digest for (EC)DH when using SNI with libssl.

* X509_cmp_time() now passes a malformed GeneralizedTime field as an error.
  Reported by Theofilos Petsios.

* Detect zero-length encrypted session data early, instead of when malloc(0)
  fails or the HMAC check fails. Noted independently by jsing@ and Kurt Cancemi.

* Check for and handle failure of HMAC_{Update,Final} or EVP_DecryptUpdate().

* Massive update and normalization of manpages, conversion to mandoc format.
  Many pages were rewritten for clarity and accuracy. Portable doc links are
  up-to-date with a new conversion tool.

* Curve25519 Key Exchange support.

* Support for alternate chains for certificate verification.

* Code cleanups, CBB conversions, further unification of DTLS/SSL handshake
  code, further ASN1 macro expansion and removal.

* Private symbols are now hidden in libssl and libcrypto.

* Friendly certificate verification error messages in libtls, peer
  verification is now always enabled.

* Added OCSP stapling support to libtls and nc.

* Added ocspcheck utility to validate a certificate against its OCSP responder
  and save the reply for stapling

* Enhanced regression tests and error handling for libtls.

* Added explicit constant and non-constant time BN functions, defaulting to
  constant time wherever possible.

* Moved many leaked implementation details in public structs behind opaque
  pointers.

* Added ticket support to libtls.

* Added support for setting the supported EC curves via
  SSL{_CTX}_set1_groups{_list}() - also provide defines for the previous
  SSL{_CTX}_set1_curves{_list} names. This also changes the default list of
  curves to be X25519, P-256 and P-384. All other curves must be manually
  enabled.

* Added -groups option to openssl(1) s_client for specifying the curves to be
  used in a colon-separated list.

* Merged client/server version negotiation code paths into one, reducing much
  duplicate code.

* Removed error function codes from libssl and libcrypto.

* Fixed an issue where a truncated packet could crash via an OOB read.

* Added SSL_OP_NO_CLIENT_RENEGOTIATION option that disallows client-initiated
  renegotiation. This is the default for libtls servers.

* Avoid a side-channel cache-timing attack that can leak the ECDSA private
  keys when signing. This is due to BN_mod_inverse() being used without the
  constant time flag being set. Reported by Cesar Pereida Garcia and Billy
  Brumley (Tampere University of Technology). The fix was developed by Cesar
  Pereida Garcia.

* iOS and MacOS compatibility updates from Simone Basso and Jacob Berkman.

* Added the recallocarray(3) memory allocation function, and converted various
  places in the library to use it, such as CBB and BUF_MEM_grow. recallocarray(3)
  is similar to reallocarray. Newly allocated memory is cleared similar to
  calloc(3). Memory that becomes unallocated while shrinking or moving existing
  allocations is explicitly discarded by unmapping or clearing to 0.

* Added new root CAs from SECOM Trust Systems / Security Communication of Japan.

* Added EVP interface for MD5+SHA1 hashes.

* Fixed DTLS client failures when the server sends a certificate request.

* Correct handling of padding when upgrading an SSLv2 challenge into an
  SSLv3/TLS connection.

* Allow protocols and ciphers to be set on a TLS config object in libtls.

* Improved nc(1) TLS handshake CPU usage and server-side error reporting.

* Add a constant time version of BN_gcd and use it default for BN_gcd to avoid
  the possibility of sidechannel timing attacks against RSA private key
  generation - Thanks to Alejandro Cabrera

We have released LibreSSL 2.5.2, which will be arriving in the
LibreSSL directory of your local OpenBSD mirror soon. It includes the following
changes:

    * Added the recallocarray(3) memory allocation function, and converted
      various places in the library to use it, such as CBB and BUF_MEM_grow.
      recallocarray(3) is similar to reallocarray. Newly allocated memory
      is cleared similar to calloc(3). Memory that becomes unallocated
      while shrinking or moving existing allocations is explicitly
      discarded by unmapping or clearing to 0.

    * Added new root CAs from SECOM Trust Systems / Security Communication
      of Japan.

    * Added EVP interface for MD5+SHA1 hashes.

    * Fixed DTLS client failures when the server sends a certificate
      request.

    * Correct handling of padding when upgrading an SSLv2 challenge into
      an SSLv3/TLS connection.

    * Allow protocols and ciphers to be set on a TLS config object in
      libtls.

    * Improved nc(1) TLS handshake CPU usage and server-side error
      reporting.

The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.

(maya)

2017-05-03 11:04:06 UTC MAIN commitmail json YAML

Updated lang/nodejs6 to 6.10.3

(fhajny)

2017-05-03 11:03:44 UTC MAIN commitmail json YAML

Update lang/nodejs6 to 6.10.3

- module: The module loading global fallback to the Node executable's
  directory now works correctly on Windows.
- src: fix base64 decoding in rare edgecase
- tls: fix rare segmentation faults when using TLS

(fhajny)

2017-05-03 10:43:13 UTC MAIN commitmail json YAML

Updated devel/ivykis to 0.42

(fhajny)

2017-05-03 10:43:02 UTC MAIN commitmail json YAML

Update devel/ivykis to 0.42.

- Fix ->set_poll_timeout() related bug with timers that expire at time zero.

(fhajny)

2017-05-03 09:33:49 UTC MAIN commitmail json YAML

Updated devel/cmake to 3.8.1

(adam)

2017-05-03 09:33:06 UTC MAIN commitmail json YAML

Changes in 3.8.1 since 3.8.0:
* FindOpenSSL: Add more library name alternatives
* FindBoost: Restore tolerance of backslashes in paths
* Tests: Fix FindModulesExecuteAll when KDE4 is installed
* Tests: Simplify CMakeOnly.AllFindModules policy settings
* FindBoost: Fix library directory for VS 2017
* CPack/RPM doc: CPACK_RPM_BUILDREQUIRES docs
* source_group: Fix TREE with root that is not current source dir
* FindMatlab: Add support for Matlab 2017a
* VS: Fix project reference inspection in VS IDE
* FindBoost: Allow testing for multiple compiler suffixes
* FindBoost: Support prebuilt Windows binaries from SourceForge
* VS2017: Verify Windows 8.1 SDK before using it

(adam)

2017-05-03 09:10:18 UTC MAIN commitmail json YAML

Updated textproc/the_silver_searcher to 1.0.3

(leot)

2017-05-03 09:10:08 UTC MAIN commitmail json YAML

Update textproc/the_silver_searcher to 1.0.3

Changes:
1.0.3
=====
- Add .es6 to js file types
- Add support for log file types
- Add elm file type support
- Add twig to languages
- Add .gradle to groovy flie types
- Misc bug fixes and improvements

(leot)

2017-05-03 08:45:45 UTC MAIN commitmail json YAML

Update salt to 2016.11.4

(sborrill)

2017-05-03 08:38:46 UTC MAIN commitmail json YAML

2017-05-03 08:34:23 UTC MAIN commitmail json YAML

Add support to USE_LANGUAGES for C++ standards from c++0x to gnu++14.

This allows packages to specify the version of the standard that they
require, and the infrastructure then distils that down in a similar way
to GCC_REQD to the newest standard, avoiding clashes with different -std
requirements based on CXXFLAGS.

Broad concensus on tech-pkg and tested in bulk builds.

(jperkin)

2017-05-03 08:24:57 UTC MAIN commitmail json YAML

2017-05-03 06:59:30 UTC MAIN commitmail json YAML

Updated benchmarks/dnsperf to 2.1.0.0

(mef)

2017-05-03 06:59:13 UTC MAIN commitmail json YAML

Updated benchmarks/dnsperl to 2.1.0.0
-------------------------------------
dnsperf 2.1.0.0
Release Notes
************************
December 15, 2015

In addition to various bug fixes, the following new capabilities
were added in this release:

- The -C option was added to resperf. This option enables the local
  server to act as multiple clients.  By default, the local server
  acts as a single client.

- the -T option was added to dnsperf. This option separates the
  number of clients from the number of threads and allows more
  clients to be simulated effectively.  Note that using this option
  impacts CPU and memory, so we recommend limiting the number of
  threads.

(mef)

2017-05-03 05:29:41 UTC MAIN commitmail json YAML

chmod the right files, the .sh are just an identical wrapper now

(spz)

2017-05-03 01:00:01 UTC MAIN commitmail json YAML

Updated benchmarks/fio to 2.19

(mef)

2017-05-03 00:59:46 UTC MAIN commitmail json YAML

Updated benchmarks/fio to 2.19
------------------------------
  (Explicit ChangeLog/Release Note not known, sorry)

(mef)

2017-05-03 00:54:59 UTC MAIN commitmail json YAML

gcc7: cleanup some accidential wip package and gcc-java leftovers

(maya)

2017-05-03 00:22:08 UTC MAIN commitmail json YAML

Note GCC 7.1.0 addition

(maya)

2017-05-03 00:21:03 UTC MAIN commitmail json YAML

Add GCC 7.1.0

GCC Java removed, package now uses ISL 0.16.1

Release notes:

We are proud to announce the next, major release of the
GNU Compiler Collection, 7.1.  This year we celebrated the 30th
anniversary of the first GCC beta release and this month
we will celebrate 30 years since the GCC 1.0 release.

GCC 7.1 is a major release containing substantial new
functionality not available in GCC 6.x or previous GCC releases.

The C++ frontend now has experimental support for all of the current C++17
draft, with the -std=c++1z and -std=gnu++1z options, and the libstdc++
library has most of the C++17 draft library features implemented too.

This releases features various improvements in the emitted diagnostics,
including improved locations, location ranges, suggestions for misspelled
identifiers, option names, fix-it hints and various new warnings
have been added.

The optimizers have been improved, with improvements appearing in all of
intra- and inter-procedural optimizations, link time optimizations and
various target backends, including, but not limited to, additions of store
merging pass, code hoisting optimization, loop splitting, and
shrink wrapping improvements.

The Address Sanitizer can now report uses of variables after leaving their
scope.  GCC now can be configured for OpenMP 4.5 offloading to NVidia PTX
GPGPUs.

Some code that compiled successfully with older GCC versions might require
some code adjustments, see http://gcc.gnu.org/gcc-7/porting_to.html for
details.

See

  https://gcc.gnu.org/gcc-7/changes.html

for more information about changes in GCC 7.1.

(maya)

2017-05-02 18:32:50 UTC MAIN commitmail json YAML

Updated x11/dmenu to 4.7

(leot)

2017-05-02 18:32:34 UTC MAIN commitmail json YAML

Update x11/dmenu to 4.7.

Changes:
4.7
===
New features
------------
- Add embedding support with -w option.
  This option can be used to xembed dmenu into an application. This is
  useful in particular for surf.
- config.h: add config option for word delimiters.

Noteworthy fixes
----------------
- die() on calloc failure.
- Sync new drw from libsl and minor fixes.
- arg.h: fixed argv checks order.
- Regression fix: Do not crash on e.g. dmenu < /dev/null
- Shut up glibc about _BSD_SOURCE being deprecated.
- Xinerama: correct variable declarations in preprocessor conditional.
- Small man page improvements.

Thanks in particular to the contributors
----------------------------------------
- Andrew Gregory
- Klemens Nanni
- Lucas Gabriel Vuotto
- Markus Teich
- Quentin Rameau
- S. Gilles
- Thomas Gardner

(leot)

2017-05-02 17:15:31 UTC MAIN commitmail json YAML

* Remove patch adding syscall.Dup2() for SunOS, software should be using unix.Dup2() instead.
  https://github.com/joyent/pkgsrc/pull/492
* Improve handling of low-memory situations on Illumos.
  https://github.com/joyent/pkgsrc/pull/493

(fhajny)

2017-05-02 17:07:18 UTC MAIN commitmail json YAML

Updated security/go-crypto-acme to 0.0.20170502

(fhajny)

2017-05-02 17:06:30 UTC MAIN commitmail json YAML

2017-05-02 17:02:05 UTC MAIN commitmail json YAML

2017-05-02 17:01:08 UTC MAIN commitmail json YAML

Added devel/go-sys version 0.0.20170427

(fhajny)

2017-05-02 17:00:53 UTC MAIN commitmail json YAML

Import go-sys from 20170427 as devel/go-sys.

This repository holds supplemental Go packages for low-level
interactions with the operating system.

(fhajny)

2017-05-02 14:45:24 UTC MAIN commitmail json YAML

Updated net/nsd to 4.1.16

(ryoon)

2017-05-02 14:44:38 UTC MAIN commitmail json YAML

Update to 4.1.16

Changelog:
Apr 25, 2017
Features
    zone parser can parse acronyms for algorithms ED25519 and ED448.
    Fix 1243: Option to make NSD emit really minimal responses, minimal-responses: yes in nsd.conf.

Bugfixes
    Calculate new udb index after growing the array, fix from Chaofeng Liu.
    Fix missing _t to _type conversion for disable-radix-tree option.
    Printout serial error with hint it may be too big.
    Fix 1228: OpenSSL include is not guarded with HAVE_SSL
    Patch for expire state in multi-master when masters includes broken master, from Manabu Sonoda.
    minor manpage fix.

(ryoon)

2017-05-02 13:59:25 UTC MAIN commitmail json YAML

Updated textproc/mdoclint to 1.48

(wiz)

2017-05-02 13:59:10 UTC MAIN commitmail json YAML

1.48: remove -P option; mandoc does most of these checks already
and the remaining ones were recently added.

>From Ingo Schwarze.

(wiz)

2017-05-02 13:53:14 UTC MAIN commitmail json YAML

Bug fix from Ingo Schwarze: also look for empty lines in unfilled blocks.

(wiz)

2017-05-02 13:37:33 UTC MAIN commitmail json YAML

2017-05-02 13:28:18 UTC MAIN commitmail json YAML

Updated print/poppler to 0.54.0

(wiz)

2017-05-02 13:27:59 UTC MAIN commitmail json YAML

poppler*: update to 0.54.0:

Release 0.54.0
        core:
        * Make XRef reconstruction a bit better. Bug #100509

        glib:
        * Expose movie play mode. Bug #99625
        * demo: Show play mode in movie properties view

        qt5:
        * Compile with -DQT_NO_CAST_FROM_BYTEARRAY. Bug #100311

        utils:
        * pdfimages: don't fail listing if inline image data contains 'EI'. Bug #100737

Release 0.53.0
        core:
        * Form support improvements
        * SplashOutputDev: Fix memory leak when rendering images with colormap and matte color
        * Minor fix in GlobalParams documentation

        qt5:
        * Expose form calculate order
        * Expose Form additional actions

        utils:
        * pdfimages: support 16bpc png and tiff images. Bug #99988
        * pdftohtml: fix small memory leak when constructing some filenames
        * pdfinfo: fix leak when printing JS

        build sytem:
        * Compile in C++11 mode

(wiz)

2017-05-02 12:31:52 UTC MAIN commitmail json YAML

Updated www/nginx-devel to 1.13.0

(fhajny)

2017-05-02 12:31:43 UTC MAIN commitmail json YAML

* Update www/nginx-devel to 1.13.0.
* Update naxsi to 0.55.3

Changes with nginx 1.13.0                                        25 Apr 2017

- Change: SSL renegotiation is now allowed on backend connections.
- Feature: the "rcvbuf" and "sndbuf" parameters of the "listen"
  directives of the mail proxy and stream modules.
- Feature: the "return" and "error_page" directives can now be used to
  return 308 redirections.
  Thanks to Simon Leblanc.
- Feature: the "TLSv1.3" parameter of the "ssl_protocols" directive.
- Feature: when logging signals nginx now logs PID of the process which
  sent the signal.
- Bugfix: in memory allocation error handling.
- Bugfix: if a server in the stream module listened on a wildcard
  address, the source address of a response UDP datagram could differ
  from the original datagram destination address.

Changes with nginx 1.11.13                                      04 Apr 2017

- Feature: the "http_429" parameter of the "proxy_next_upstream",
  "fastcgi_next_upstream", "scgi_next_upstream", and
  "uwsgi_next_upstream" directives.
  Thanks to Piotr Sikora.
- Bugfix: in memory allocation error handling.
- Bugfix: requests might hang when using the "sendfile" and
  "timer_resolution" directives on Linux.
- Bugfix: requests might hang when using the "sendfile" and "aio_write"
  directives with subrequests.
- Bugfix: in the ngx_http_v2_module.
  Thanks to Piotr Sikora.
- Bugfix: a segmentation fault might occur in a worker process when
  using HTTP/2.
- Bugfix: requests might hang when using the "limit_rate",
  "sendfile_max_chunk", "limit_req" directives, or the $r->sleep()
  embedded perl method with subrequests.
- Bugfix: in the ngx_http_slice_module.

Changes with nginx 1.11.12                                      24 Mar 2017

- Bugfix: nginx might hog CPU; the bug had appeared in 1.11.11.

Changes with nginx 1.11.11                                      21 Mar 2017

- Feature: the "worker_shutdown_timeout" directive.
- Feature: vim syntax highlighting scripts improvements.
  Thanks to Wei-Ko Kao.
- Bugfix: a segmentation fault might occur in a worker process if the
  $limit_rate variable was set to an empty string.
- Bugfix: the "proxy_cache_background_update",
  "fastcgi_cache_background_update", "scgi_cache_background_update",
  and "uwsgi_cache_background_update" directives might work incorrectly
  if the "if" directive was used.
- Bugfix: a segmentation fault might occur in a worker process if
  number of large_client_header_buffers in a virtual server was
  different from the one in the default server.
- Bugfix: in the mail proxy server.

Changes with nginx 1.11.10                                      14 Feb 2017

- Change: cache header format has been changed, previously cached
  responses will be invalidated.
- Feature: support of "stale-while-revalidate" and "stale-if-error"
  extensions in the "Cache-Control" backend response header line.
- Feature: the "proxy_cache_background_update",
  "fastcgi_cache_background_update", "scgi_cache_background_update",
  and "uwsgi_cache_background_update" directives.
- Feature: nginx is now able to cache responses with the "Vary" header
  line up to 128 characters long (instead of 42 characters in previous
  versions).
- Feature: the "build" parameter of the "server_tokens" directive.
  Thanks to Tom Thorogood.
- Bugfix: "[crit] SSL_write() failed" messages might appear in logs
  when handling requests with the "Expect: 100-continue" request header
  line.
- Bugfix: the ngx_http_slice_module did not work in named locations.
- Bugfix: a segmentation fault might occur in a worker process when
  using AIO after an "X-Accel-Redirect" redirection.
- Bugfix: reduced memory consumption for long-lived requests using
  gzipping.

(fhajny)

2017-05-02 12:28:40 UTC MAIN commitmail json YAML

Updated www/nginx to 1.12.0

(fhajny)

2017-05-02 12:28:31 UTC MAIN commitmail json YAML

* Update www/nginx to 1.12.0.
* Update naxsi to 0.55.3.

Approximate changelog since nginx 1.10.3 follows.

Changes with nginx 1.12.0                                        12 Apr 2017
- 1.12.x stable branch.

Changes with nginx 1.11.13                                      04 Apr 2017
- Feature: the "http_429" parameter of the "proxy_next_upstream",
  "fastcgi_next_upstream", "scgi_next_upstream", and
  "uwsgi_next_upstream" directives.
  Thanks to Piotr Sikora.
- Bugfix: in memory allocation error handling.
- Bugfix: requests might hang when using the "sendfile" and
  "timer_resolution" directives on Linux.
- Bugfix: requests might hang when using the "sendfile" and "aio_write"
  directives with subrequests.
- Bugfix: in the ngx_http_v2_module.
  Thanks to Piotr Sikora.
- Bugfix: a segmentation fault might occur in a worker process when
  using HTTP/2.
- Bugfix: requests might hang when using the "limit_rate",
  "sendfile_max_chunk", "limit_req" directives, or the $r->sleep()
  embedded perl method with subrequests.
- Bugfix: in the ngx_http_slice_module.

Changes with nginx 1.11.12                                      24 Mar 2017
- Bugfix: nginx might hog CPU; the bug had appeared in 1.11.11.

Changes with nginx 1.11.11                                      21 Mar 2017
- Feature: the "worker_shutdown_timeout" directive.
- Feature: vim syntax highlighting scripts improvements.
  Thanks to Wei-Ko Kao.
- Bugfix: a segmentation fault might occur in a worker process if the
  $limit_rate variable was set to an empty string.
- Bugfix: the "proxy_cache_background_update",
  "fastcgi_cache_background_update", "scgi_cache_background_update",
  and "uwsgi_cache_background_update" directives might work incorrectly
  if the "if" directive was used.
- Bugfix: a segmentation fault might occur in a worker process if
  number of large_client_header_buffers in a virtual server was
  different from the one in the default server.
- Bugfix: in the mail proxy server.

Changes with nginx 1.11.10                                      14 Feb 2017
- Change: cache header format has been changed, previously cached
  responses will be invalidated.
- Feature: support of "stale-while-revalidate" and "stale-if-error"
  extensions in the "Cache-Control" backend response header line.
- Feature: the "proxy_cache_background_update",
  "fastcgi_cache_background_update", "scgi_cache_background_update",
  and "uwsgi_cache_background_update" directives.
- Feature: nginx is now able to cache responses with the "Vary" header
  line up to 128 characters long (instead of 42 characters in previous
  versions).
- Feature: the "build" parameter of the "server_tokens" directive.
  Thanks to Tom Thorogood.
- Bugfix: "[crit] SSL_write() failed" messages might appear in logs
  when handling requests with the "Expect: 100-continue" request header
  line.
- Bugfix: the ngx_http_slice_module did not work in named locations.
- Bugfix: a segmentation fault might occur in a worker process when
  using AIO after an "X-Accel-Redirect" redirection.
- Bugfix: reduced memory consumption for long-lived requests using
  gzipping.

Changes with nginx 1.11.9                                        24 Jan 2017
- Bugfix: nginx might hog CPU when using the stream module; the bug had
  appeared in 1.11.5.
- Bugfix: EXTERNAL authentication mechanism in mail proxy was accepted
  even if it was not enabled in the configuration.
- Bugfix: a segmentation fault might occur in a worker process if the
  "ssl_verify_client" directive of the stream module was used.
- Bugfix: the "ssl_verify_client" directive of the stream module might
  not work.
- Bugfix: closing keepalive connections due to no free worker
  connections might be too aggressive.
  Thanks to Joel Cunningham.
- Bugfix: an incorrect response might be returned when using the
  "sendfile" directive on FreeBSD and macOS; the bug had appeared in
  1.7.8.
- Bugfix: a truncated response might be stored in cache when using the
  "aio_write" directive.
- Bugfix: a socket leak might occur when using the "aio_write"
  directive.

Changes with nginx 1.11.8                                        27 Dec 2016
- Feature: the "absolute_redirect" directive.
- Feature: the "escape" parameter of the "log_format" directive.
- Feature: client SSL certificates verification in the stream module.
- Feature: the "ssl_session_ticket_key" directive supports AES256
  encryption of TLS session tickets when used with 80-byte keys.
- Feature: vim-commentary support in vim scripts.
  Thanks to Armin Grodon.
- Bugfix: recursion when evaluating variables was not limited.
- Bugfix: in the ngx_stream_ssl_preread_module.
- Bugfix: if a server in an upstream in the stream module failed, it
  was considered alive only when a test connection sent to it after
  fail_timeout was closed; now a successfully established connection is
  enough.
- Bugfix: nginx/Windows could not be built with 64-bit Visual Studio.
- Bugfix: nginx/Windows could not be built with OpenSSL 1.1.0.

Changes with nginx 1.11.7                                        13 Dec 2016

- Change: now in case of a client certificate verification error the
  $ssl_client_verify variable contains a string with the failure
  reason, for example, "FAILED:certificate has expired".
- Feature: the $ssl_ciphers, $ssl_curves, $ssl_client_v_start,
  $ssl_client_v_end, and $ssl_client_v_remain variables.
- Feature: the "volatile" parameter of the "map" directive.
- Bugfix: dependencies specified for a module were ignored while
  building dynamic modules.
- Bugfix: when using HTTP/2 and the "limit_req" or "auth_request"
  directives client request body might be corrupted; the bug had
  appeared in 1.11.0.
- Bugfix: a segmentation fault might occur in a worker process when
  using HTTP/2; the bug had appeared in 1.11.3.
- Bugfix: in the ngx_http_mp4_module.
  Thanks to Congcong Hu.
- Bugfix: in the ngx_http_perl_module.

(fhajny)

2017-05-02 11:25:52 UTC MAIN commitmail json YAML

Updated ImageMagick to 7.0.5.5.

2017-04-24  7.0.5-5 Cristy  <quetzlzacatenango@image...>
  * Release ImageMagick version 7.0.5-5, GIT revision 19908:bc92979:20170424.

2017-03-26  7.0.5-5 Cristy  <quetzlzacatenango@image...>
  * Minimize buffer copies to improve OpenCL performance.
  * Morphology thinning is no longer a no-op (reference
    https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=31650).
  * Patch two PCD writer problems, corrupt output and dark pixels (reference
    https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=3164).
  * Support ICC based PDF's (reference
    https://github.com/ImageMagick/ImageMagick/issues/417).
  * Fix improper EPS clip path rendering (reference
    http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=31722).

(wiz)

2017-05-02 11:24:42 UTC MAIN commitmail json YAML

Updated graphics/ImageMagick to 7.0.5.5

(wiz)

2017-05-02 11:16:22 UTC MAIN commitmail json YAML

2017-05-02 11:16:02 UTC MAIN commitmail json YAML

Updated tor to 0.3.0.6.

Changes in version 0.3.0.6 - 2017-04-26
  Tor 0.3.0.6 is the first stable release of the Tor 0.3.0 series.

  With the 0.3.0 series, clients and relays now use Ed25519 keys to
  authenticate their link connections to relays, rather than the old
  RSA1024 keys that they used before. (Circuit crypto has been
  Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced
  the guard selection and replacement algorithm to behave more robustly
  in the presence of unreliable networks, and to resist guard-
  capture attacks.

  This series also includes numerous other small features and bugfixes,
  along with more groundwork for the upcoming hidden-services revamp.

  Per our stable release policy, we plan to support the Tor 0.3.0
  release series for at least the next nine months, or for three months
  after the first stable release of the 0.3.1 series: whichever is
  longer. If you need a release with long-term support, we recommend
  that you stay with the 0.2.9 series.

  Below are the changes since 0.2.9.10. For a list of only the changes
  since 0.3.0.5-rc, see the ChangeLog file.

  o Major features (directory authority, security):
    - The default for AuthDirPinKeys is now 1: directory authorities
      will reject relays where the RSA identity key matches a previously
      seen value, but the Ed25519 key has changed. Closes ticket 18319.

  o Major features (guard selection algorithm):
    - Tor's guard selection algorithm has been redesigned from the
      ground up, to better support unreliable networks and restrictive
      sets of entry nodes, and to better resist guard-capture attacks by
      hostile local networks. Implements proposal 271; closes
      ticket 19877.

  o Major features (next-generation hidden services):
    - Relays can now handle v3 ESTABLISH_INTRO cells as specified by
      prop224 aka "Next Generation Hidden Services". Service and clients
      don't use this functionality yet. Closes ticket 19043. Based on
      initial code by Alec Heifetz.
    - Relays now support the HSDir version 3 protocol, so that they can
      can store and serve v3 descriptors. This is part of the next-
      generation onion service work detailled in proposal 224. Closes
      ticket 17238.

  o Major features (protocol, ed25519 identity keys):
    - Clients now support including Ed25519 identity keys in the EXTEND2
      cells they generate. By default, this is controlled by a consensus
      parameter, currently disabled. You can turn this feature on for
      testing by setting ExtendByEd25519ID in your configuration. This
      might make your traffic appear different than the traffic
      generated by other users, however. Implements part of ticket
      15056; part of proposal 220.
    - Relays now understand requests to extend to other relays by their
      Ed25519 identity keys. When an Ed25519 identity key is included in
      an EXTEND2 cell, the relay will only extend the circuit if the
      other relay can prove ownership of that identity. Implements part
      of ticket 15056; part of proposal 220.
    - Relays now use Ed25519 to prove their Ed25519 identities and to
      one another, and to clients. This algorithm is faster and more
      secure than the RSA-based handshake we've been doing until now.
      Implements the second big part of proposal 220; Closes
      ticket 15055.

  o Major features (security):
    - Change the algorithm used to decide DNS TTLs on client and server
      side, to better resist DNS-based correlation attacks like the
      DefecTor attack of Greschbach, Pulls, Roberts, Winter, and
      Feamster. Now relays only return one of two possible DNS TTL
      values, and clients are willing to believe DNS TTL values up to 3
      hours long. Closes ticket 19769.

  o Major bugfixes (client, onion service, also in 0.2.9.9):
    - Fix a client-side onion service reachability bug, where multiple
      socks requests to an onion service (or a single slow request)
      could cause us to mistakenly mark some of the service's
      introduction points as failed, and we cache that failure so
      eventually we run out and can't reach the service. Also resolves a
      mysterious "Remote server sent bogus reason code 65021" log
      warning. The bug was introduced in ticket 17218, where we tried to
      remember the circuit end reason as a uint16_t, which mangled
      negative values. Partially fixes bug 21056 and fixes bug 20307;
      bugfix on 0.2.8.1-alpha.

  o Major bugfixes (crash, directory connections):
    - Fix a rare crash when sending a begin cell on a circuit whose
      linked directory connection had already been closed. Fixes bug
      21576; bugfix on 0.2.9.3-alpha. Reported by Alec Muffett.

  o Major bugfixes (directory authority):
    - During voting, when marking a relay as a probable sybil, do not
      clear its BadExit flag: sybils can still be bad in other ways
      too. (We still clear the other flags.) Fixes bug 21108; bugfix
      on 0.2.0.13-alpha.

  o Major bugfixes (DNS):
    - Fix a bug that prevented exit nodes from caching DNS records for
      more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha.

  o Major bugfixes (IPv6 Exits):
    - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects
      any IPv6 addresses. Instead, only reject a port over IPv6 if the
      exit policy rejects that port on more than an IPv6 /16 of
      addresses. This bug was made worse by 17027 in 0.2.8.1-alpha,
      which rejected a relay's own IPv6 address by default. Fixes bug
      21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.

  o Major bugfixes (parsing):
    - Fix an integer underflow bug when comparing malformed Tor
      versions. This bug could crash Tor when built with
      --enable-expensive-hardening, or on Tor 0.2.9.1-alpha through Tor
      0.2.9.8, which were built with -ftrapv by default. In other cases
      it was harmless. Part of TROVE-2017-001. Fixes bug 21278; bugfix
      on 0.0.8pre1. Found by OSS-Fuzz.
    - When parsing a malformed content-length field from an HTTP
      message, do not read off the end of the buffer. This bug was a
      potential remote denial-of-service attack against Tor clients and
      relays. A workaround was released in October 2016, to prevent this
      bug from crashing Tor. This is a fix for the underlying issue,
      which should no longer matter (if you applied the earlier patch).
      Fixes bug 20894; bugfix on 0.2.0.16-alpha. Bug found by fuzzing
      using AFL (http://lcamtuf.coredump.cx/afl/).

  o Major bugfixes (scheduler):
    - Actually compare circuit policies in ewma_cmp_cmux(). This bug
      caused the channel scheduler to behave more or less randomly,
      rather than preferring channels with higher-priority circuits.
      Fixes bug 20459; bugfix on 0.2.6.2-alpha.

  o Major bugfixes (security, also in 0.2.9.9):
    - Downgrade the "-ftrapv" option from "always on" to "only on when
      --enable-expensive-hardening is provided." This hardening option,
      like others, can turn survivable bugs into crashes--and having it
      on by default made a (relatively harmless) integer overflow bug
      into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001);
      bugfix on 0.2.9.1-alpha.

  o Minor feature (client):
    - Enable IPv6 traffic on the SocksPort by default. To disable this,
      a user will have to specify "NoIPv6Traffic". Closes ticket 21269.

  o Minor feature (fallback scripts):
    - Add a check_existing mode to updateFallbackDirs.py, which checks
      if fallbacks in the hard-coded list are working. Closes ticket
      20174. Patch by haxxpop.

  o Minor feature (protocol versioning):
    - Add new protocol version for proposal 224. HSIntro now advertises
      version "3-4" and HSDir version "1-2". Fixes ticket 20656.

  o Minor features (ciphersuite selection):
    - Allow relays to accept a wider range of ciphersuites, including
      chacha20-poly1305 and AES-CCM. Closes the other part of 15426.
    - Clients now advertise a list of ciphersuites closer to the ones
      preferred by Firefox. Closes part of ticket 15426.

  o Minor features (controller):
    - Add "GETINFO sr/current" and "GETINFO sr/previous" keys, to expose
      shared-random values to the controller. Closes ticket 19925.
    - When HSFETCH arguments cannot be parsed, say "Invalid argument"
      rather than "unrecognized." Closes ticket 20389; patch from
      Ivan Markin.

  o Minor features (controller, configuration):
    - Each of the *Port options, such as SocksPort, ORPort, ControlPort,
      and so on, now comes with a __*Port variant that will not be saved
      to the torrc file by the controller's SAVECONF command. This
      change allows TorBrowser to set up a single-use domain socket for
      each time it launches Tor. Closes ticket 20956.
    - The GETCONF command can now query options that may only be
      meaningful in context-sensitive lists. This allows the controller
      to query the mixed SocksPort/__SocksPort style options introduced
      in feature 20956. Implements ticket 21300.

  o Minor features (diagnostic, directory client):
    - Warn when we find an unexpected inconsistency in directory
      download status objects. Prevents some negative consequences of
      bug 20593.

  o Minor features (directory authorities):
    - Directory authorities now reject descriptors that claim to be
      malformed versions of Tor. Helps prevent exploitation of
      bug 21278.
    - Reject version numbers with components that exceed INT32_MAX.
      Otherwise 32-bit and 64-bit platforms would behave inconsistently.
      Fixes bug 21450; bugfix on 0.0.8pre1.

  o Minor features (directory authority):
    - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
      default) to control whether authorities should try to probe relays
      by their Ed25519 link keys. This option will go away in a few
      releases--unless we encounter major trouble in our ed25519 link
      protocol rollout, in which case it will serve as a safety option.

  o Minor features (directory cache):
    - Relays and bridges will now refuse to serve the consensus they
      have if they know it is too old for a client to use. Closes
      ticket 20511.

  o Minor features (ed25519 link handshake):
    - Advertise support for the ed25519 link handshake using the
      subprotocol-versions mechanism, so that clients can tell which
      relays can identity themselves by Ed25519 ID. Closes ticket 20552.

  o Minor features (entry guards):
    - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not
      break regression tests.
    - Require UseEntryGuards when UseBridges is set, in order to make
      sure bridges aren't bypassed. Resolves ticket 20502.

  o Minor features (fallback directories):
    - Allow 3 fallback relays per operator, which is safe now that we
      are choosing 200 fallback relays. Closes ticket 20912.
    - Annotate updateFallbackDirs.py with the bandwidth and consensus
      weight for each candidate fallback. Closes ticket 20878.
    - Display the relay fingerprint when downloading consensuses from
      fallbacks. Closes ticket 20908.
    - Exclude relays affected by bug 20499 from the fallback list.
      Exclude relays from the fallback list if they are running versions
      known to be affected by bug 20499, or if in our tests they deliver
      a stale consensus (i.e. one that expired more than 24 hours ago).
      Closes ticket 20539.
    - Make it easier to change the output sort order of fallbacks.
      Closes ticket 20822.
    - Reduce the minimum fallback bandwidth to 1 MByte/s. Part of
      ticket 18828.
    - Require fallback directories to have the same address and port for
      7 days (now that we have enough relays with this stability).
      Relays whose OnionOO stability timer is reset on restart by bug
      18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for
      this issue. Closes ticket 20880; maintains short-term fix
      in 0.2.8.2-alpha.
    - Require fallbacks to have flags for 90% of the time (weighted
      decaying average), rather than 95%. This allows at least 73% of
      clients to bootstrap in the first 5 seconds without contacting an
      authority. Part of ticket 18828.
    - Select 200 fallback directories for each release. Closes
      ticket 20881.

  o Minor features (fingerprinting resistence, authentication):
    - Extend the length of RSA keys used for TLS link authentication to
      2048 bits. (These weren't used for forward secrecy; for forward
      secrecy, we used P256.) Closes ticket 13752.

  o Minor features (geoip):
    - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
      Country database.

  o Minor features (geoip, also in 0.2.9.9):
    - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
      Country database.

  o Minor features (infrastructure):
    - Implement smartlist_add_strdup() function. Replaces the use of
      smartlist_add(sl, tor_strdup(str)). Closes ticket 20048.

  o Minor features (linting):
    - Enhance the changes file linter to warn on Tor versions that are
      prefixed with "tor-". Closes ticket 21096.

  o Minor features (logging):
    - In several places, describe unset ed25519 keys as "<unset>",
      rather than the scary "AAAAAAAA...AAA". Closes ticket 21037.

  o Minor features (portability, compilation):
    - Autoconf now checks to determine if OpenSSL structures are opaque,
      instead of explicitly checking for OpenSSL version numbers. Part
      of ticket 21359.
    - Support building with recent LibreSSL code that uses opaque
      structures. Closes ticket 21359.

  o Minor features (relay):
    - We now allow separation of exit and relay traffic to different
      source IP addresses, using the OutboundBindAddressExit and
      OutboundBindAddressOR options respectively. Closes ticket 17975.
      Written by Michael Sonntag.

  o Minor features (reliability, crash):
    - Try better to detect problems in buffers where they might grow (or
      think they have grown) over 2 GB in size. Diagnostic for
      bug 21369.

  o Minor features (testing):
    - During 'make test-network-all', if tor logs any warnings, ask
      chutney to output them. Requires a recent version of chutney with
      the 21572 patch. Implements 21570.

  o Minor bugfix (control protocol):
    - The reply to a "GETINFO config/names" request via the control
      protocol now spells the type "Dependent" correctly. This is a
      breaking change in the control protocol. (The field seems to be
      ignored by the most common known controllers.) Fixes bug 18146;
      bugfix on 0.1.1.4-alpha.
    - The GETINFO extra-info/digest/<digest> command was broken because
      of a wrong base16 decode return value check, introduced when
      refactoring that API. Fixes bug 22034; bugfix on 0.2.9.1-alpha.

  o Minor bugfix (logging):
    - Don't recommend the use of Tor2web in non-anonymous mode.
      Recommending Tor2web is a bad idea because the client loses all
      anonymity. Tor2web should only be used in specific cases by users
      who *know* and understand the issues. Fixes bug 21294; bugfix
      on 0.2.9.3-alpha.

  o Minor bugfixes (bug resilience):
    - Fix an unreachable size_t overflow in base64_decode(). Fixes bug
      19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by
      Hans Jerry Illikainen.

  o Minor bugfixes (build):
    - Replace obsolete Autoconf macros with their modern equivalent and
      prevent similar issues in the future. Fixes bug 20990; bugfix
      on 0.1.0.1-rc.

  o Minor bugfixes (certificate expiration time):
    - Avoid using link certificates that don't become valid till some
      time in the future. Fixes bug 21420; bugfix on 0.2.4.11-alpha

  o Minor bugfixes (client):
    - Always recover from failures in extend_info_from_node(), in an
      attempt to prevent any recurrence of bug 21242. Fixes bug 21372;
      bugfix on 0.2.3.1-alpha.
    - When clients that use bridges start up with a cached consensus on
      disk, they were ignoring it and downloading a new one. Now they
      use the cached one. Fixes bug 20269; bugfix on 0.2.3.12-alpha.

  o Minor bugfixes (code correctness):
    - Repair a couple of (unreachable or harmless) cases of the risky
      comparison-by-subtraction pattern that caused bug 21278.

  o Minor bugfixes (config):
    - Don't assert on startup when trying to get the options list and
      LearnCircuitBuildTimeout is set to 0: we are currently parsing the
      options so of course they aren't ready yet. Fixes bug 21062;
      bugfix on 0.2.9.3-alpha.

  o Minor bugfixes (configuration):
    - Accept non-space whitespace characters after the severity level in
      the `Log` option. Fixes bug 19965; bugfix on 0.2.1.1-alpha.
    - Support "TByte" and "TBytes" units in options given in bytes.
      "TB", "terabyte(s)", "TBit(s)" and "terabit(s)" were already
      supported. Fixes bug 20622; bugfix on 0.2.0.14-alpha.

  o Minor bugfixes (configure, autoconf):
    - Rename the configure option --enable-expensive-hardening to
      --enable-fragile-hardening. Expensive hardening makes the tor
      daemon abort when some kinds of issues are detected. Thus, it
      makes tor more at risk of remote crashes but safer against RCE or
      heartbleed bug category. We now try to explain this issue in a
      message from the configure script. Fixes bug 21290; bugfix
      on 0.2.5.4-alpha.

  o Minor bugfixes (consensus weight):
    - Add new consensus method that initializes bw weights to 1 instead
      of 0. This prevents a zero weight from making it all the way to
      the end (happens in small testing networks) and causing an error.
      Fixes bug 14881; bugfix on 0.2.2.17-alpha.

  o Minor bugfixes (crash prevention):
    - Fix an (currently untriggerable, but potentially dangerous) crash
      bug when base32-encoding inputs whose sizes are not a multiple of
      5. Fixes bug 21894; bugfix on 0.2.9.1-alpha.

  o Minor bugfixes (dead code):
    - Remove a redundant check for PidFile changes at runtime in
      options_transition_allowed(): this check is already performed
      regardless of whether the sandbox is active. Fixes bug 21123;
      bugfix on 0.2.5.4-alpha.

  o Minor bugfixes (descriptors):
    - Correctly recognise downloaded full descriptors as valid, even
      when using microdescriptors as circuits. This affects clients with
      FetchUselessDescriptors set, and may affect directory authorities.
      Fixes bug 20839; bugfix on 0.2.3.2-alpha.

  o Minor bugfixes (directory mirrors):
    - Allow relays to use directory mirrors without a DirPort: these
      relays need to be contacted over their ORPorts using a begindir
      connection. Fixes one case of bug 20711; bugfix on 0.2.8.2-alpha.
    - Clarify the message logged when a remote relay is unexpectedly
      missing an ORPort or DirPort: users were confusing this with a
      local port. Fixes another case of bug 20711; bugfix
      on 0.2.8.2-alpha.

  o Minor bugfixes (directory system):
    - Bridges and relays now use microdescriptors (like clients do)
      rather than old-style router descriptors. Now bridges will blend
      in with clients in terms of the circuits they build. Fixes bug
      6769; bugfix on 0.2.3.2-alpha.
    - Download all consensus flavors, descriptors, and authority
      certificates when FetchUselessDescriptors is set, regardless of
      whether tor is a directory cache or not. Fixes bug 20667; bugfix
      on all recent tor versions.

  o Minor bugfixes (documentation):
    - Update the tor manual page to document every option that can not
      be changed while tor is running. Fixes bug 21122.

  o Minor bugfixes (ed25519 certificates):
    - Correctly interpret ed25519 certificates that would expire some
      time after 19 Jan 2038. Fixes bug 20027; bugfix on 0.2.7.2-alpha.

  o Minor bugfixes (fallback directories):
    - Avoid checking fallback candidates' DirPorts if they are down in
      OnionOO. When a relay operator has multiple relays, this
      prioritizes relays that are up over relays that are down. Fixes
      bug 20926; bugfix on 0.2.8.3-alpha.
    - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py.
      Fixes bug 20877; bugfix on 0.2.8.3-alpha.
    - Stop failing when a relay has no uptime data in
      updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha.

  o Minor bugfixes (hidden service):
    - Clean up the code for expiring intro points with no associated
      circuits. It was causing, rarely, a service with some expiring
      introduction points to not open enough additional introduction
      points. Fixes part of bug 21302; bugfix on 0.2.7.2-alpha.
    - Resolve two possible underflows which could lead to creating and
      closing a lot of introduction point circuits in a non-stop loop.
      Fixes bug 21302; bugfix on 0.2.7.2-alpha.
    - Stop setting the torrc option HiddenServiceStatistics to "0" just
      because we're not a bridge or relay. Instead, we preserve whatever
      value the user set (or didn't set). Fixes bug 21150; bugfix
      on 0.2.6.2-alpha.

  o Minor bugfixes (hidden services):
    - Make hidden services check for failed intro point connections,
      even when they have exceeded their intro point creation limit.
      Fixes bug 21596; bugfix on 0.2.7.2-alpha. Reported by Alec Muffett.
    - Make hidden services with 8 to 10 introduction points check for
      failed circuits immediately after startup. Previously, they would
      wait for 5 minutes before performing their first checks. Fixes bug
      21594; bugfix on 0.2.3.9-alpha. Reported by Alec Muffett.
    - Stop ignoring misconfigured hidden services. Instead, refuse to
      start tor until the misconfigurations have been corrected. Fixes
      bug 20559; bugfix on multiple commits in 0.2.7.1-alpha
      and earlier.

  o Minor bugfixes (IPv6):
    - Make IPv6-using clients try harder to find an IPv6 directory
      server. Fixes bug 20999; bugfix on 0.2.8.2-alpha.
    - When IPv6 addresses have not been downloaded yet (microdesc
      consensus documents don't list relay IPv6 addresses), use hard-
      coded addresses for authorities, fallbacks, and configured
      bridges. Now IPv6-only clients can use microdescriptors. Fixes bug
      20996; bugfix on b167e82 from 19608 in 0.2.8.5-alpha.

  o Minor bugfixes (memory leak at exit):
    - Fix a small harmless memory leak at exit of the previously unused
      RSA->Ed identity cross-certificate. Fixes bug 17779; bugfix
      on 0.2.7.2-alpha.

  o Minor bugfixes (onion services):
    - Allow the number of introduction points to be as low as 0, rather
      than as low as 3. Fixes bug 21033; bugfix on 0.2.7.2-alpha.

  o Minor bugfixes (portability):
    - Use "OpenBSD" compiler macro instead of "OPENBSD" or "__OpenBSD__".
      It is supported by OpenBSD itself, and also by most OpenBSD
      variants (such as Bitrig). Fixes bug 20980; bugfix
      on 0.1.2.1-alpha.

  o Minor bugfixes (portability, also in 0.2.9.9):
    - Avoid crashing when Tor is built using headers that contain
      CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
      without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix
      on 0.2.9.1-alpha.
    - Fix Libevent detection on platforms without Libevent 1 headers
      installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.

  o Minor bugfixes (relay):
    - Avoid a double-marked-circuit warning that could happen when we
      receive DESTROY cells under heavy load. Fixes bug 20059; bugfix
      on 0.1.0.1-rc.
    - Honor DataDirectoryGroupReadable when tor is a relay. Previously,
      initializing the keys would reset the DataDirectory to 0700
      instead of 0750 even if DataDirectoryGroupReadable was set to 1.
      Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish".

  o Minor bugfixes (testing):
    - Fix Raspbian build issues related to missing socket errno in
      test_util.c. Fixes bug 21116; bugfix on 0.2.8.2. Patch by "hein".
    - Remove undefined behavior from the backtrace generator by removing
      its signal handler. Fixes bug 21026; bugfix on 0.2.5.2-alpha.
    - Use bash in src/test/test-network.sh. This ensures we reliably
      call chutney's newer tools/test-network.sh when available. Fixes
      bug 21562; bugfix on 0.2.9.1-alpha.

  o Minor bugfixes (tor-resolve):
    - The tor-resolve command line tool now rejects hostnames over 255
      characters in length. Previously, it would silently truncate them,
      which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
      Patch by "junglefowl".

  o Minor bugfixes (unit tests):
    - Allow the unit tests to pass even when DNS lookups of bogus
      addresses do not fail as expected. Fixes bug 20862 and 20863;
      bugfix on unit tests introduced in 0.2.8.1-alpha
      through 0.2.9.4-alpha.

  o Minor bugfixes (util):
    - When finishing writing a file to disk, if we were about to replace
      the file with the temporary file created before and we fail to
      replace it, remove the temporary file so it doesn't stay on disk.
      Fixes bug 20646; bugfix on 0.2.0.7-alpha. Patch by fk.

  o Minor bugfixes (Windows services):
    - Be sure to initialize the monotonic time subsystem before using
      it, even when running as an NT service. Fixes bug 21356; bugfix
      on 0.2.9.1-alpha.

  o Minor bugfixes (Windows):
    - Check for getpagesize before using it to mmap files. This fixes
      compilation in some MinGW environments. Fixes bug 20530; bugfix on
      0.1.2.1-alpha. Reported by "ice".

  o Code simplification and refactoring:
    - Abolish all global guard context in entrynodes.c; replace with new
      guard_selection_t structure as preparation for proposal 271.
      Closes ticket 19858.
    - Extract magic numbers in circuituse.c into defined variables.
    - Introduce rend_service_is_ephemeral() that tells if given onion
      service is ephemeral. Replace unclear NULL-checkings for service
      directory with this function. Closes ticket 20526.
    - Refactor circuit_is_available_for_use to remove unnecessary check.
    - Refactor circuit_predict_and_launch_new for readability and
      testability. Closes ticket 18873.
    - Refactor code to manipulate global_origin_circuit_list into
      separate functions. Closes ticket 20921.
    - Refactor large if statement in purpose_needs_anonymity to use
      switch statement instead. Closes part of ticket 20077.
    - Refactor the hashing API to return negative values for errors, as
      is done as throughout the codebase. Closes ticket 20717.
    - Remove data structures that were used to index or_connection
      objects by their RSA identity digests. These structures are fully
      redundant with the similar structures used in the
      channel abstraction.
    - Remove duplicate code in the channel_write_*cell() functions.
      Closes ticket 13827; patch from Pingl.
    - Remove redundant behavior of is_sensitive_dir_purpose, refactor to
      use only purpose_needs_anonymity. Closes part of ticket 20077.
    - The code to generate and parse EXTEND and EXTEND2 cells has been
      replaced with code automatically generated by the
      "trunnel" utility.

  o Documentation (formatting):
    - Clean up formatting of tor.1 man page and HTML doc, where <pre>
      blocks were incorrectly appearing. Closes ticket 20885.

  o Documentation (man page):
    - Clarify many options in tor.1 and add some min/max values for
      HiddenService options. Closes ticket 21058.

  o Documentation:
    - Change '1' to 'weight_scale' in consensus bw weights calculation
      comments, as that is reality. Closes ticket 20273. Patch
      from pastly.
    - Clarify that when ClientRejectInternalAddresses is enabled (which
      is the default), multicast DNS hostnames for machines on the local
      network (of the form *.local) are also rejected. Closes
      ticket 17070.
    - Correct the value for AuthDirGuardBWGuarantee in the manpage, from
      250 KBytes to 2 MBytes. Fixes bug 20435; bugfix on 0.2.5.6-alpha.
    - Include the "TBits" unit in Tor's man page. Fixes part of bug
      20622; bugfix on 0.2.5.1-alpha.
    - Small fixes to the fuzzing documentation. Closes ticket 21472.
    - Stop the man page from incorrectly stating that HiddenServiceDir
      must already exist. Fixes 20486.
    - Update the description of the directory server options in the
      manual page, to clarify that a relay no longer needs to set
      DirPort in order to be a directory cache. Closes ticket 21720.

  o Removed features:
    - The AuthDirMaxServersPerAuthAddr option no longer exists: The same
      limit for relays running on a single IP applies to authority IP
      addresses as well as to non-authority IP addresses. Closes
      ticket 20960.
    - The UseDirectoryGuards torrc option no longer exists: all users
      that use entry guards will also use directory guards. Related to
      proposal 271; implements part of ticket 20831.

  o Testing:
    - Add tests for networkstatus_compute_bw_weights_v10.
    - Add unit tests circuit_predict_and_launch_new.
    - Extract dummy_origin_circuit_new so it can be used by other
      test functions.
    - New unit tests for tor_htonll(). Closes ticket 19563. Patch
      from "overcaffeinated".
    - Perform the coding style checks when running the tests and fail
      when coding style violations are found. Closes ticket 5500.

(wiz)

2017-05-02 11:02:52 UTC MAIN commitmail json YAML

Updated mail/rspamd to 1.5.6

(wiz)

2017-05-02 11:02:36 UTC MAIN commitmail json YAML

Updated rspamd to 1.5.6.

1.5.6:
* [Feature] Add unigramms support in bayes
* [Feature] Allow configurable sign headers for DKIM
* [Feature] Allow to add unigramm metatokens from Lua
* [Feature] DKIM Signing: envelope match exception for local IPs
* [Feature] UCL: register parser variables from Lua
* [Fix] Always try to adjust filename
* [Fix] Do extra copy to ensure that original content is never touched
* [Fix] Fix SPOOF_REPLYTO rule
* [Fix] Ignore Rmilter added Received
* [Fix] More fixes for hashed email dnsbls
* [Fix] Plug memory leak in chartable module
* [WebUI] Display multiple alerts at once

(wiz)

2017-05-02 10:57:16 UTC MAIN commitmail json YAML

Updated py-setuptools to 35.0.2.

v35.0.2
-------

* #1015: Fix test failures on Python 3.7.

* #1024: Add workaround for Jython #2581 in monkey module.

(wiz)

2017-05-02 10:51:32 UTC MAIN commitmail json YAML

2017-05-02 10:50:49 UTC MAIN commitmail json YAML

2017-05-02 10:50:30 UTC MAIN commitmail json YAML

Updated py-protobuf to 3.3.0.

same as protobuf 3.3.0

(wiz)

2017-05-02 10:49:54 UTC MAIN commitmail json YAML

Updated devel/protobuf to 3.3.0

(wiz)

2017-05-02 10:49:30 UTC MAIN commitmail json YAML

Updated protobuf to 3.3.0.

2017-04-05 version 3.3.0 (C++/Java/Python/PHP/Objective-C/C#/Ruby/JavaScript)
  Planned Future Changes
  * There are some changes that are not included in this release but are
    planned for the near future:
      - Preserve unknown fields in proto3: please read this doc:

          https://docs.google.com/document/d/1KMRX-G91Aa-Y2FkEaHeeviLRRNblgIahbsk4wA14gRk/view

        for the timeline and follow up this github issue:

          https://github.com/google/protobuf/issues/272

        for discussion.
      - Make C++ implementation C++11 only: we plan to require C++11 to build
        protobuf code starting from 3.4.0 or 3.5.0 release. Please join this
        github issue:

          https://github.com/google/protobuf/issues/2780

        to provide your feedback.

  C++
  * Fixed map fields serialization of DynamicMessage to correctly serialize
    both key and value regardless of their presence.
  * Parser now rejects field number 0 correctly.
  * New API Message::SpaceUsedLong() that窶冱 equivalent to
    Message::SpaceUsed() but returns the value in size_t.
  * JSON support
    - New flag always_print_enums_as_ints in JsonPrintOptions.
    - New flag preserve_proto_field_names in JsonPrintOptions. It will instruct
      the JSON printer to use the original field name declared in the .proto
      file instead of converting them to lowerCamelCase when printing JSON.
    - JsonPrintOptions.always_print_primtive_fields now works for oneof message
      fields.
    - Fixed a bug that doesn窶冲 allow different fields to set the same json_name
      value.
    - Fixed a performance bug that causes excessive memory copy when printing
      large messages.
  * Various performance optimizations.

  Java
  * Map field setters eagerly validate inputs and throw NullPointerExceptions
    as appropriate.
  * Added ByteBuffer overloads to the generated parsing methods and the Parser
    interface.
  * proto3 enum's getNumber() method now throws on UNRECOGNIZED values.
  * Output of JsonFormat is now locale independent.

  Python
  * Added FindServiceByName() in the pure-Python DescriptorPool. This works only
    for descriptors added with DescriptorPool.Add(). Generated descriptor_pool
    does not support this yet.
  * Added a descriptor_pool parameter for parsing Any in text_format.Parse().
  * descriptor_pool.FindFileContainingSymbol() now is able to find nested
    extensions.
  * Extending empty [] to repeated field now sets parent message presence.

  PHP
  * Added file option php_class_prefix. The prefix will be prepended to all
    generated classes defined in the file.
  * When encoding, negative int32 values are sign-extended to int64.
  * Repeated/Map field setter accepts a regular PHP array. Type checking is
    done on the array elements.
  * encode/decode are renamed to serializeToString/mergeFromString.
  * Added mergeFrom, clear method on Message.
  * Fixed a bug that oneof accessor didn窶冲 return the field name that is
    actually set.
  * C extension now works with php7.
  * This is the first GA release of PHP. We guarantee that old generated code
    can always work with new runtime and new generated code.

  Objective-C
  * Fixed help for GPBTimestamp for dates before the epoch that contain
    fractional seconds.
  * Added GPBMessageDropUnknownFieldsRecursively() to remove unknowns from a
    message and any sub messages.
  * Addressed a threading race in extension registration/lookup.
  * Increased the max message parsing depth to 100 to match the other languages.
  * Removed some use of dispatch_once in favor of atomic compare/set since it
    needs to be heap based.
  * Fixes for new Xcode 8.3 warnings.

  C#
  * Fixed MapField.Values.CopyTo, which would throw an exception unnecessarily
    if provided exactly the right size of array to copy to.
  * Fixed enum JSON formatting when multiple names mapped to the same numeric
    value.
  * Added JSON formatting option to format enums as integers.
  * Modified RepeatedField<T> to implement IReadOnlyList<T>.
  * Introduced the start of custom option handling; it's not as pleasant as it
    might be, but the information is at least present. We expect to extend code
    generation to improve this in the future.
  * Introduced ByteString.FromStream and ByteString.FromStreamAsync to
    efficiently create a ByteString from a stream.
  * Added whole-message deprecation, which decorates the class with [Obsolete].

  Ruby
  * Fixed Message#to_h for messages with map fields.
  * Fixed memcpy() in binary gems to work for old glibc, without breaking the
    build for non-glibc libc窶冱 like musl.

  Javascript
  * Added compatibility tests for version 3.0.0.
  * Added conformance tests.
  * Fixed serialization of extensions: we need to emit a value even if it is
    falsy (like the number 0).
  * Use closurebuilder.py in favor of calcdeps.py for compiling JavaScript.

(wiz)

2017-05-02 10:33:50 UTC MAIN commitmail json YAML

Updated devel/p5-Params-Validate to 1.27

(wiz)

2017-05-02 10:33:36 UTC MAIN commitmail json YAML

Updated p5-Params-Validate to 1.27.

1.27    2017-04-29

- When more than one required parameters are missing, the list of missing
  parameters in the error message is sorted by name. Patch by E. Choroba. GH
  #14.

(wiz)

2017-05-02 10:32:44 UTC MAIN commitmail json YAML

Updated audio/libopenmpt to 0.2.8043

(wiz)

2017-05-02 10:32:29 UTC MAIN commitmail json YAML

Updated libopenmpt to 0.2.8043.

libopenmpt 0.2-beta23 (2017-04-23)

    [Change] The libmpg123 binary download script on Windows now downloads libmpg123 1.24.0.
    [Change] MSVC builds of libopenmpt will now only load known DMO plugins.
    [Bug] foo_openmpt: Interpolation filter and volume ramping settings were confused in previous versions. This version resets both to the defaults.

(wiz)

2017-05-02 10:26:24 UTC MAIN commitmail json YAML

Updated fonts/harfbuzz to 1.4.6

(wiz)

2017-05-02 10:26:06 UTC MAIN commitmail json YAML

Updated harfbuzz to 1.4.6.

Overview of changes leading to 1.4.6
Sunday, April 23, 2017
====================================

- Graphite2: Fix RTL positioning issue.
- Backlist GDEF of more versions of Padauk and Tahoma.
- New, experimental, cmake alternative build system.

(wiz)

2017-05-02 09:40:10 UTC MAIN commitmail json YAML

Updated mail/neomutt to 20170428

(wiz)

2017-05-02 09:39:56 UTC MAIN commitmail json YAML

Updated neomutt to 20170428.

2017-04-28  Richard Russon  <rich@flatcap.org>
* Bug Fixes
  - Fix and simplify handling of GPGME in configure.ac (@gahr)
* Docs
  - Fix typo in README.neomutt (@l2dy)
* Upstream
  - Fix km_error_key() infinite loop and unget buffer pollution
  - Fix error message when opening a mailbox with no read permission

(wiz)

2017-05-02 08:15:03 UTC MAIN commitmail json YAML

Updated x11/xkbcomp to 1.4.0

(wiz)

2017-05-02 08:14:48 UTC MAIN commitmail json YAML

Updated xkbcomp to 1.4.0.

This xkbcomp release mostly contains a couple of bugfixes and parser
improvements. Notably, ignoring keycodes that X11 can never support
means that we can start using those keycodes, which xkbcommon
supports.

Benno Schulenberg (1):
      When overriding a key, adjust also its number of levels (#57242).

Daniel Stone (2):
      keycodes: Ignore high keycodes
      xkbcomp 1.4.0

Emil Velikov (1):
      autogen.sh: use quoted string variables

Mihail Konev (1):
      autogen: add default patch prefix

Peter Hutterer (1):
      autogen.sh: use exec instead of waiting for configure to finish

Ran Benita (1):
      When a file contains several maps, look for a default map

(wiz)

2017-05-02 03:40:36 UTC MAIN commitmail json YAML

php71: disable the use of a global register for execute_data on i386.

This seems to fix segfaults that occur on netbsd/i386 + gcc 4.8.5,
tested only in QEMU.

Upstream bug https://bugs.php.net/bug.php?id=74527

(maya)

2017-05-01 12:54:17 UTC MAIN commitmail json YAML

Fix build with latest cppunit.

(wiz)

2017-05-01 11:54:38 UTC MAIN commitmail json YAML

boost-libs: unconditionally disable fiber

It doesn't build even on netbsd+gcc5.4 (it did in the previous version)
Also helps SmartOS because we're currently not matching SmartOS with this
logic block, although matching GCC versions would do the trick.

Drop comment which isn't specific to fiber

(maya)

2017-05-01 10:13:47 UTC MAIN commitmail json YAML

Updated print/cups-filters to 1.13.5

(leot)

2017-05-01 10:13:29 UTC MAIN commitmail json YAML

Update print/cups-filters to 1.13.5

pkgsrc changes:
- Explicitly pass --disable-braille: needs liblouis that at the moment is not
  in pkgsrc. Despite that leave existents REPLACE_BASH to avoid any further work
  if we will enable it in the future. Please notice that bash:run is
  still needed despite that.

Changes:
1.13.5
------
- foomatic-rip: When called via the utility cupsfilter from
  CUPS, foomatic-rip was not able to read the PPD file with
  the file name supplied as environment variable PPD (Bug
  #1388).
- driverless: Improved error message output.
- libcupsfilters: Fixed error handling of the PPD file
  generator for driverless printing, so that callers get
  decent error messages.
- libcupsfilters: Do not generate a PPD file where the only
  output data format is JPEG, as JPEG does not support
  multi-page documents.
- libcupsfilters: Let PPD generator skip broken page size
  records and add warnings for debugging to the PPD.
- libcupsfilters: Updated PPD generator to match with the
  current GIT state of the one of CUPS.
- braille: Automatically select a table according to the
  current locale.
- braille: Update for liblouis table list.
- braille: Added support for text margins.
- cups-browsed: When creating a local queue for a remote CUPS
  printer, add the line '*APRemoteQueueID: ""' to the PPD file
  so that CUPS sets the CUPS_PRINTER_REMOTE bit for the
  printer type of the local queue (Bug #1386).

(leot)

2017-05-01 10:05:18 UTC pkgsrc-2017Q1 commitmail json YAML

Finally through with this huge backlog

(bsiegert)

2017-05-01 09:55:46 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5392 - requested by sevan
lang/go: build fix

Revisions pulled up:
- lang/go/version.mk                                            1.25

---
  Module Name:    pkgsrc
  Committed By:  maya
  Date:          Sun Apr 30 23:02:09 UTC 2017

  Modified Files:
          pkgsrc/lang/go: version.mk

  Log Message:
  go: match even more ARM with wildcards

  part 1 of PR pkg/52178 from aikchar

(bsiegert)

2017-05-01 09:55:02 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5391 - requested by sevan
net/vnc: build fix

Revisions pulled up:
- net/vnc/Makefile                                              1.56

---
  Module Name:    pkgsrc
  Committed By:  darcy
  Date:          Sun Apr 30 14:37:40 UTC 2017

  Modified Files:
          pkgsrc/net/vnc: Makefile

  Log Message:
  Old web site didn't work.  Here is one that does.

(bsiegert)

2017-05-01 09:53:40 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5390 - requested by sevan
lang/oracle-jdk8: build fix for Linux

Revisions pulled up:
- lang/oracle-jdk8/PLIST.linux-i386                            1.5

---
  Module Name:    pkgsrc
  Committed By:  dsainty
  Date:          Sun Apr 30 11:39:49 UTC 2017

  Modified Files:
          pkgsrc/lang/oracle-jdk8: PLIST.linux-i386

  Log Message:
  The PLIST for linux-i386 doesn't appear to quite match the distfile
  contents for the linux-i586 JDK, leading to package install failure.

  Fix that up.

(bsiegert)

2017-05-01 09:52:27 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5389 - requested by sevan
net/sipsak: build fix

Revisions pulled up:
- net/sipsak/Makefile                                          1.14-1.15
- net/sipsak/distinfo                                          1.5
- net/sipsak/patches/patch-header__f.c                          deleted
- net/sipsak/patches/patch-header__f.h                          deleted

---
  Module Name:    pkgsrc
  Committed By:  schwarz
  Date:          Sat Apr 29 10:01:07 UTC 2017

  Modified Files:
          pkgsrc/net/sipsak: Makefile

  Log Message:
  updated the download and home page URLs for sipsak

---
  Module Name:    pkgsrc
  Committed By:  schwarz
  Date:          Sat Apr 29 10:21:54 UTC 2017

  Modified Files:
          pkgsrc/net/sipsak: Makefile distinfo
  Removed Files:
          pkgsrc/net/sipsak/patches: patch-header__f.c patch-header__f.h

  Log Message:
  We do not need the inline removal patches since this can be achieved
  more easily with the existing substituion in Makefile (which initially
  had only been used for the Sunpro compiler).

(bsiegert)

2017-05-01 09:48:24 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5387 - requested by sevan
lang/perl5: bugfix

Revisions pulled up:
- lang/perl5/Makefile.common                                    1.29
- lang/perl5/distinfo                                          1.140
- lang/perl5/patches/patch-MANIFEST                            1.1
- lang/perl5/patches/patch-ext_File-Glob_bsd_glob.c            1.1
- lang/perl5/patches/patch-ext_File-Glob_t_rt131211.t          1.1

---
  Module Name:    pkgsrc
  Committed By:  sevan
  Date:          Fri Apr 28 22:59:48 UTC 2017

  Modified Files:
          pkgsrc/lang/perl5: Makefile.common distinfo
  Added Files:
          pkgsrc/lang/perl5/patches: patch-MANIFEST
              patch-ext_File-Glob_bsd_glob.c patch-ext_File-Glob_t_rt131211.t

  Log Message:
  Patch for issue raised in Russ Cox's "Glob Matching Can Be Simple And Fast Too" post.
  https://research.swtch.com/glob
  https://perl5.git.perl.org/perl.git/commit/33252c318625f3c6c89b816ee88481940e3e6f95

  Reviewed by: wiz

(bsiegert)

2017-05-01 09:44:41 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5386 - requested by sevan
net/iperf3: build fix

Revisions pulled up:
- net/iperf3/Makefile                                          1.5

---
  Module Name:    pkgsrc
  Committed By:  jperkin
  Date:          Fri Apr 28 14:12:14 UTC 2017

  Modified Files:
          pkgsrc/net/iperf3: Makefile

  Log Message:
  Requires C99 for some math functions.

(bsiegert)

2017-05-01 09:40:55 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5383 - requested by sevan
databases/leveldb: build fix for NetBSD

Revisions pulled up:
- databases/leveldb/distinfo                                    1.2
- databases/leveldb/patches/patch-build__detect__platform      1.1

---
  Module Name:    pkgsrc
  Committed By:  joerg
  Date:          Thu Apr 27 17:04:56 UTC 2017

  Modified Files:
          pkgsrc/databases/leveldb: distinfo
  Added Files:
          pkgsrc/databases/leveldb/patches: patch-build__detect__platform

  Log Message:
  Don't hard-code -lgcc_s on NetBSD.

(bsiegert)

2017-05-01 09:40:33 UTC MAIN commitmail json YAML

Updated net/youtube-dl to 20170501

(leot)

2017-05-01 09:40:19 UTC MAIN commitmail json YAML

Update net/youtube-dl to 20170501

Changes:
version 2017.05.01

Core
+ [extractor/common] Extract view count from JSON-LD
* [utils] Improve unified_timestamp
+ [utils] Add video/mp2t to mimetype2ext
* [downloader/external] Properly handle live stream downloading cancellation
  (#8932)
+ [utils] Add support for unicode whitespace in clean_html on python 2 (#12906)

Extractors
* [infoq] Make audio format extraction non fatal (#12938)
* [brightcove] Allow whitespace around attribute names in embedded code
+ [zaq1] Add support for zaq1.pl (#12693)
+ [xvideos] Extract duration (#12828)
* [vevo] Fix extraction (#12879)
+ [noovo] Add support for noovo.ca (#12792)
+ [washingtonpost] Add support for embeds (#12699)
* [yandexmusic:playlist] Fix extraction for python 3 (#12888)
* [anvato] Improve extraction (#12913)
    * Promote to regular shortcut based extractor
    * Add mcp to access key mapping table
    * Add support for embeds extraction
    * Add support for anvato embeds in generic extractor
* [xtube] Fix extraction for older FLV videos (#12734)
* [tvplayer] Fix extraction (#12908)

version 2017.04.28

Core
+ [adobepass] Use geo verification headers for all requests
- [downloader/fragment] Remove assert for resume_len when no fragments
  downloaded
+ [extractor/common] Add manifest_url for explicit group rendition formats
* [extractor/common] Fix manifest_url for m3u8 formats
- [extractor/common] Don't list master m3u8 playlists in format list (#12832)

Extractor
* [aenetworks] Fix extraction for shows with single season
+ [go] Add support for Disney, DisneyJunior and DisneyXD show pages
* [youtube] Recognize new locale-based player URLs (#12885)
+ [streamable] Add support for new embedded URL schema (#12844)
* [arte:+7] Relax URL regular expression (#12837)

(leot)

2017-05-01 09:38:31 UTC pkgsrc-2017Q1 commitmail json YAML

Pullup ticket #5382 - requested by sevan
security/py-kerberos: bugfix

Revisions pulled up:
- security/py-kerberos/Makefile                                1.2
- security/py-kerberos/distinfo                                1.2
- security/py-kerberos/patches/patch-src_kerberos.c            1.1

---
  Module Name:    pkgsrc
  Committed By:  markd
  Date:          Sun Apr 23 05:35:27 UTC 2017

  Modified Files:
          pkgsrc/security/py-kerberos: Makefile distinfo
  Added Files:
          pkgsrc/security/py-kerberos/patches: patch-src_kerberos.c

  Log Message:
  Merge upstream pull request #52 from kwlzn/kwlzn/none_principal_fix
  Allow `authGSSClientInit` principal kwarg to be None.

(bsiegert)