Link [ pkgsrc | NetBSD | pkgsrc git mirror | PR fulltext-search | netbsd commit viewer ]


   
        usage: [branch:branch] [user:user] [path[@revision]] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN pkgtools/pkg)




switch to index mode

recent branches: MAIN (54m)  pkgsrc-2024Q1 (15d)  pkgsrc-2023Q4 (42d)  pkgsrc-2023Q2 (75d)  pkgsrc-2023Q3 (154d) 

2024-05-13 12:43:33 UTC Now

2024-05-11 06:22:27 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.83

(fox)

2024-05-11 06:21:52 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.83

Changes since v1.82

v1.83 - 10.05.2024
- In this version I have addressed some annoyances users have mentioned:
  1) Now you cannot edit pattern notes/data while the pattern editor is
    not visible. This further prevents accidental song edits.
  2) While in extended pattern editor mode, show a status bar with global
    volume, pattern edit status (to see if you are editing), and time elapsed.
  3) It was not possible to issue a Note Insert (Insert key) or Line Insert
    (Shift+Insert) on some keyboards.
    Added extra keybindings:
      Ctrl+Return      = Insert Note (same as Insert)
      Ctrl+Shift+Return = Insert Line (same as Shift+Insert)
- Updated the Keybindings help text to reflect the extra keybindings
- Windows/macOS: Updated SDL to v2.30.3

(fox)

2024-05-10 06:46:36 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.18.15

(fox)

2024-05-10 06:46:02 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.18.15

Changes since 0.18.14:

Changelog
[0.18.15] - 2024-05-09

Bug Fixes

  * Correct command for latest tag in deb-package.sh

Documentation

  * Add how to find man pages in terminal and online. Partly fixes #967
  * Correct heading levels in markdown
  * Move heading out of collapsed section
  * Add some keywords for benefit of ctrl-f

Features

  * Return to original commit at the end of deb-package.sh
  * Add optional tag argument to deb-package.sh

Miscellaneous Tasks

  * Release eza v0.18.15

(fox)

2024-05-05 07:33:44 UTC MAIN commitmail json YAML

doc: Updated sysutils/pfetch to 1.0.1

(fox)

2024-05-05 07:33:17 UTC MAIN commitmail json YAML

sysutils/pfetch: Update to 1.0.1

Changes since 0.6.0:

1.0.1

This is a minor release to fix disk usage not working at all in bash

1.0.0

First release!

This brings many improvements over the last version from dylanaraps, including
support for Windows (Cygwin, MSYS2, busybox-w32), GNU Hurd, and MorphOS, and
many Linux distros, new information like disk usage and resolution, and lots
of general improvements all throughout the script.

(fox)

2024-04-27 08:09:15 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.18.13

(fox)

2024-04-27 08:08:45 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.18.13

Changes since 0.18.11:

eza v0.18.13

Description

So tiny :3

Changelog
[0.18.13] - 2024-04-25

Features

  * Generate completion/manpage tarballs on release

Miscellaneous Tasks

  * Release eza v0.18.13

(fox)

2024-04-23 07:14:57 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.82

(fox)

2024-04-23 07:14:17 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.82

Changes since v1.79.2

v1.82 - 12.04.2024
- MIDI is enabled again for Windows XP (I came up with a solution)
- Fixed: MIDI was actually not working in v1.81 :(
- Fixed: Possible crash on startup or on exit (related to MIDI).
        COULD still happen on Mac, but I haven't experienced it yet!

v1.81 - 09.04.2024
- Windows: Error message boxes were rendered wrongly on Windows XP
- Windows: Disable MIDI support on Windows XP because it was buggy
  (would crash on exit on some systems/interfaces). If you really need to
  use MIDI with the FT2 clone, please consider using an OS that is not
  over 23 years old!
- MSVC: Use v141 platform toolset for 32-bit Windows build
- Rewrote some of the MIDI init/close code, as it looked like it could be
  buggy.

v1.80 - 09.04.2024
- Doing note transpose on the whole song wouldn't count overflowing notes
  properly (it would sometimes not show a warning message first).
- Windows/macOS: Updated SDL to v2.30.2

(fox)

2024-04-11 06:53:19 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.18.10

(fox)

2024-04-11 06:52:56 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.18.10

Changes since 0.18.9:

eza v0.18.10

Changelog
[0.18.10] - 2024-04-11

Bug Fixes

  * Bump trycmd from 0.15.0 to 0.15.1

Miscellaneous Tasks

  * Release eza v0.18.10

Build

  * Bump nu-ansi-term from 0.49.0 to 0.50.0

(fox)

2024-03-27 09:15:22 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.18.9

(fox)

2024-03-27 09:15:02 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.18.9

Changes since 0.18.8:

eza v0.18.9

Changelog
[0.18.9] - 2024-03-27

Features

  * Switch out ansiterm crate for nu_ansi_term

Miscellaneous Tasks

  * Release eza v0.18.9

Build

  * Bump DeterminateSystems/nix-installer-action from 9 to 10
  * Bump plist from 1.6.0 to 1.6.1
  * Bump rayon from 1.9.0 to 1.10.0
  * Bump git2 from 0.18.2 to 0.18.3

(fox)

2024-03-23 00:40:14 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.79.2

(fox)

2024-03-23 00:39:40 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.79.2

Changes since v1.79

v1.79.2 - 18.03.2024
- Fix mouse issues.

(fox)

2024-03-23 00:24:59 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.7.0

(fox)

2024-03-23 00:24:29 UTC MAIN commitmail json YAML

security/wolfssl: Update to 5.7.0

Changes since 5.6.6:

wolfSSL Release 5.7.0 (Mar 20, 2024)

NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024

NOTE: In future releases, --enable-des3 (which is disabled by default) will
be insufficient in itself to enable DES3 in TLS cipher suites. A new option,
--enable-des3-tls-suites, will need to be supplied in addition. This option
should only be used in backward compatibility scenarios, as it is inherently
insecure.

NOTE: This release switches the default ASN.1 parser to the new ASN template
code. If the original ASN.1 code is preferred define WOLFSSL_ASN_ORIGINAL to
use it. See PR #7199.

Vulnerabilities

  * [High] CVE-2024-0901 Potential denial of service and out of bounds read.
    Affects TLS 1.3 on the server side when accepting a connection from a
    malicious TLS 1.3 client. If using TLS 1.3 on the server side it is
    recommended to update the version of wolfSSL used. Fixed in this GitHub
    pull request #7099

  * [Med] CVE-2024-1545 Fault Injection vulnerability in
    RsaPrivateDecryption function that potentially allows an attacker thathas
    access to the same system with a victims process to perform aRowhammer
    fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang,Qingni Shen
    for the report (Peking University, The University of WesternAustralia)."
    Fixed in this GitHub pull request #7167

  * [Med] Fault injection attack with EdDSA signature operations. This
    affects ed25519 sign operations where the system could be susceptible to
    Rowhammer attacks. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni
    Shen for the report (Peking University, The University of Western
    Australia). Fixed in this GitHub pull request #7212

New Feature Additions

  * Added --enable-experimental configure flag to gate out features that are
    currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs
    require the --enable-experimental flag.

POST QUANTUM SUPPORT ADDITIONS

  * Experimental framework for using wolfSSL窶冱 XMSS implementation (PR 7161)
  * Experimental framework for using wolfSSL窶冱 LMS implementation (PR 7283)
  * Experimental wolfSSL Kyber implementation and assembly optimizations,
    enabled with --enable-experimental --enable-kyber (PR 7318)
  * Experimental support for post quantum dual key/signature certificates. A
    few known issues and sanitizer checks are in progress with this feature.
    Enabled with the configure flags --enable-experimental
    --enable-dual-alg-certs (PR 7112)
  * CryptoCb support for PQC algorithms (PR 7110)

OTHER FEATURE ADDITIONS

  * The Linux kernel module now supports registration of AES-GCM, AES-XTS,
    AES-CBC, and AES-CFB with the kernel cryptosystem through the new
    --enable-linuxkm-lkcapi-register option, enabling automatic use of
    wolfCrypt implementations by the dm-crypt/luks and ESP subsystems. In
    particular, wolfCrypt AES-XTS with 窶兎nable-aesni is faster than the
    native kernel implementation.
  * CryptoCb hook to one-shot CMAC functions (PR 7059)
  * BER content streaming support for PKCS7_VerifySignedData and sign/
    encrypt operations (PR 6961 & 7184)
  * IoT-Safe SHA-384 and SHA-512 support (PR 7176)
  * I/O callbacks for content and output with PKCS7 bundle sign/encrypt to
    reduce peak memory usage (PR 7272)
  * Microchip PIC24 support and example project (PR 7151)
  * AutoSAR shim layer for RNG, SHA256, and AES (PR 7296)
  * wolfSSL_CertManagerUnloadIntermediateCerts API to clear intermediate
    certs added to certificate store (PR 7245)
  * Implement SSL_get_peer_signature_nid and SSL_get_peer_signature_type_nid
    (PR 7236)

Enhancements and Optimizations

  * Remove obsolete user-crypto functionality and Intel IPP support (PR 7097)
  * Support for RSA-PSS signatures with CRL use (PR 7119)
  * Enhancement for AES-GCM use with Xilsecure on Microblaze (PR 7051)
  * Support for crypto cb only build with ECC and NXP CAAM (PR 7269)
  * Improve liboqs integration adding locking and init/cleanup functions (PR
    7026)
  * Prevent memory access before clientSession->serverRow and
    clientSession->serverIdx are sanitized (PR 7096)
  * Enhancements to reproducible build (PR 7267)
  * Update Arduino example TLS Client/Server and improve support for ESP32
    (PR 7304 & 7177)
  * XC32 compiler version 4.x compatibility (PR 7128)
  * Porting for build on PlayStation 3 and 4 (PR 7072)
  * Improvements for Espressif use; SHA HW/SW selection and use on ESP32-C2/
    ESP8684, wolfSSL_NewThread() type, component cmake fix, and update TLS
    client example for ESP8266 (PR 7081, 7173, 7077, 7148, 7240)
  * Allow crypto callbacks with SHA-1 HW (PR 7087)
  * Update OpenSSH port to version 9.6p1(PR 7203)
  * ARM Thumb2 enhancements, AES-GCM support for GCM_SMALL, alignment fix on
    key, fix for ASM clobber list (PR 7291,7301,7221)
  * Expand heap hint support for static memory build with more x509 functions
    (PR 7136)
  * Improving ARMv8 ChaCha20 ASM (alignment) (PR 7182)
  * Unknown extension callback wolfSSL_CertManagerSetUnknownExtCallback added
    to CertManager (PR 7194)
  *  Implement wc_rng_new_ex for use with devID窶冱 with crypto callback (PR
    7271)
  * Allow reading 0-RTT data after writing 0.5-RTT data (PR 7102)
  * Send alert on bad PSK binder error (PR 7235)
  * Enhancements to CMake build files for use with cross compiling (PR 7188)

Fixes

  * Fix for checking result of MAC verify when no AAD is used with AES-GCM
    and Xilinx Xilsecure (PR 7051)
  * Fix for Aria sign use (PR 7082)
  * Fix for invalid dh_ffdhe_test test case using Intel QuickAssist (PR 7085)
  * Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES
    GCM and CCM support with TLS (PR 7018)
  * Fixes for STM32 PKA use with ECC (PR 7098)
  * Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation
    (PR 7070)
  * Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
  * Siphash x64 asm fix for use with older compilers (PR 7299)
  * Fix for SGX build with SP (PR 7308)
  * Fix to Make it mandatory that the cookie is sent back in new ClientHello
    when seen in a HelloRetryRequest with (PR 7190)
  * Fix for wrap around behavior with BIO pairs (PR 7169)
  * OCSP fixes for parsing of response correctly when there was a revocation
    reason and returning correct error value with date checks (PR 7241 & 7255)
  * Fix build with NO_STDIO_FILESYSTEM and improve checks for XGETENV (PR
    7150)
  * Fix for DTLS sequence number and cookie when downgrading DTLS version (PR
    7214)
  * Fix for write_dup use with chacha-poly cipher suites (PR 7206)
  * Fix for multiple handshake messages in one record failing with
    OUT_OF_ORDER_E when downgrading from TLS 1.3 to TLS 1.2 (PR 7141)
  * Fix for AES ECB build with Thumb and alignment (PR 7094)
  * Fix for negotiate handshake until the end in wolfSSL_read/wolfSSL_write
    if hitting an edge case with want read/write (PR 7237)

(fox)

2024-03-18 18:51:11 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.79

(fox)

2024-03-18 18:50:22 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.79

Changes since v1.77.1

v1.79 - 18.03.2024
- Fullscreen mode code has been refactored, as I apparently had coded it the
  wrong way. "Stretched" mode always fills the whole screen now too, and other
  issues may have been fixed as well.

v1.78 - 17.03.2024
- Fixed: It was possible to deadlock the tracker by attempting to load samples
  that had a filesize of zero bytes, or if the sample was in use by another
  program.
- Fullscreen mode has received more bugfixes. Hopefully it should be better
  now. Please note that the "stretched" mode does not fill the entire screen
  in many cases. The mouse pixel mapping can also be off on some Linux systems.

(fox)

2024-03-17 07:13:48 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.77.1

(fox)

2024-03-17 07:13:04 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.77.1

Changes since v1.76

v1.77 - 11.03.2024
- Fullscreen issues have been mostly resolved for Macs with a notch in the
  display. It may still have a slight error in how the mouse maps to the
  pixels on the screen, but it's still MUCH more usable than it was! Another
  problem is that the mouse cursor can sometimes flicker for a split second
  (temporarily change into the OS cursor, then back to the FT2 cursor). Also
  fixed an issue with fullscreen on Linux, but some systems may still have
  severe issues with the mouse position mapping...
- The 32-point sinc resampling interpolator was reduced to 16-point again
  because of the trade-off not being big enough, and it was slightly wrongly
  implemented and would alias a little bit in some cases. I'll implement a
  better sinc interpolator in the future, if I ever stumble across a nice and
  simple implementation. Please let me know if you have one!
- Windows/macOS: Updated SDL to v2.30.1

(fox)

2024-03-08 17:16:05 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.76

(fox)

2024-03-08 17:15:20 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.76

Changes since v1.75

v1.76 - 23.02.2024
- The 16-point sinc resampling interpolator has been upgraded to 32-point for
  better sound quality in the tracker (if you have selected "Sinc (32 point)").
  This interpolator is so good that a lot of old XM tunes will sound muddy
  because of lo-fi samples. I recommend that you experiment with the choice of
  interpolators. "Cubic spline" is a good choice if you listen to a wide variety
  of XMs, while "Sinc (32 point)" is the best option if you create your own
  tunes using hi-fi samples, or if you mostly listen to XMs with hi-fi samples
  (or if you can accept a muddy/filtered sound from lo-fi samples).
- Removed 32-bit specific code (32-bit binaries now support all features)
- Removed text fading from "about screen" (more is less)
- Windows/macOS: Updated SDL to v2.30.0

(fox)

2024-03-08 15:37:08 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.18.6

(fox)

2024-03-08 15:36:39 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.18.6

Changes since 0.18.6:

eza v0.18.6

Changelog

Bug Fixes

  * NetBSD did not have fflagstostr and as such did not build properly
  * Fix total-size option
  * Add fortran to source filetypes
  * Fix absolute_path() for broken symlinks
  * Update line numbers in panic messages in tests

Features

  * Add filetype and icon for age
  * Adding icons for graphql extensions
  * Add nim icons
  * Use fsharp icon for fsproj files (similar to cs/csproj)
  * Add new icons, diverse selection
  * Adding more haskell related icons
  * Adding more icons for docker specific files
  * Adding more dockerfile icons
  * Add --absolute flag
  * Add shell completions for --absolute flag

Miscellaneous Tasks

  * Cleaning dirs
  * Release eza v0.18.6

Refactor

  * Port grid and grid-details to new uutils-term-grid

Testing

  * Add integration tests and powertests for --absolute flag
  * Add directory symlink to tests/itest/

Build

  * Bump log from 0.4.20 to 0.4.21
  * Bump rayon from 1.8.1 to 1.9.0

Ci

  * Add NetBSD to CI.
  * Fix warnings.
  * Add FreeBSD to CI.
  * Add OpenBSD to CI.

(fox)

2024-02-18 02:37:37 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.75

(fox)

2024-02-18 02:37:05 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.75

Changes since v1.74

v1.75 - 08.01.2023
- Note transpose (block), instrument remapping (block), Cut Block (ALT+F3) and
  Copy Block (ALT+F4) had issues if you had made a block selection in the last
  channel/track in a pattern. Thanks to Roz for finding this and reporting it,
  and sorry to all the people who may have had this bug without knowing what
  was going on!

(fox)

2024-02-18 02:19:27 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 1.5.1

(fox)

2024-02-18 02:19:07 UTC MAIN commitmail json YAML

www/jira-cli: Update to 1.5.1

Changes since 1.4.0:

v1.5.1

## What's Changed
- fix: Properly close created files by @beatbrot in #702
- fix: Skip auth type prompt if already set by @ankitpokhrel in #701

## New Contributors
- @beatbrot made their first contribution in #702

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.5.0...v1.5.1

v1.5.0

This release brings the support for mTLS authentication along with some other features like setting affects version, updating the estimate, etc.

## What's added?
- feat: Enable issue edit to read body from stdin by @erpel in #619
- feat: Affects version by @damianoneill in #642
- feat: Add mtls authentication for client certificate auth by @markhatc- in
  #615
- feat: Add support for updating the estimate by @chapmanc in #669

## What's fixed?
- fix: Issue with no-input on create by @ankitpokhrel in #655
- fix: Jira init broken due to authtype value by @ankitpokhrel in #694
- fix: Bring bearer back by @ankitpokhrel in #696
- fix: Respect jira timezone by @ankitpokhrel in #697

## Other changes
- chore: Bump go & alpine versions by @pbnj in #691
- ci: Upgrade workflow + linter by @ankitpokhrel in #695
- dep: Upgrade all by @ankitpokhrel in #643

## New Contributors
- @erpel made their first contribution in #619
- @damianoneill made their first contribution in #642
- @pbnj made their first contribution in #691
- @chapmanc made their first contribution in #669

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.4.0...v1.5.0

(fox)

2024-02-18 01:51:28 UTC MAIN commitmail json YAML

doc: Updated sysutils/htop to 3.3.0

(fox)

2024-02-18 01:51:01 UTC MAIN commitmail json YAML

sysutils/htop: Update to 3.3.0

Changes since 3.2.2:

What's new in version 3.3.0

* Multiple refactorings and code improvements
* Shorten docker container IDs to 12 characters
* Settings: preserve empty header
* Fix execlp() argument without pointer cast
* OpenFilesScreen: Make column sizing dynamic for file size, offset and inode
* Add support for "truss" (FreeBSD equivalent of "strace")
* Darwin: add NetworkIOMeter support
* HeaderLayout: add "3 columns - 40/30/30", "... 30/40/30" & "... 30/30/40"
* Meter: use correct unicode characters for digit '9'
* Note in manual re default memory units of KiB
* Add column for process container name
* Add logic to filter the container name (+type) from the CGroup name
* Change NetworkIOMeter value unit from KiB/s to bytes/second
* Cap DiskIOMeter "utilisation" percentage at 100%
* PCP platform implementation of frontswap and zswap accounting
* Shorten podman/libpod container IDs to 12 characters
* Write configuration to temporary file first
* Incorporate shared memory in bar text
* Move shared memory next to used memory
* Correct order of memory meter in help
* Add recalculate to Ctrl-L refresh
* Update process list on thread visibility toggling
* Support dynamic screens with 'top-most' entities beyond processes
* Introduce Row and Table classes for screens beyond top-processes
* Rework ZramMeter and remove MeterClass.comprisedValues
* More robust logic for CPU process percentages (Linux & PCP)
* Show year as start time for processes older than a year
* Short-term fix for docker container detection
* default color preset: use bold blue for better visibility
* Document 'O' keyboard shortcut
* Implement logic for '--max-iterations'
* Update F5 key label on tab switch (Tree <-> List)
* Force re-sorting of the process list view after switching between list/treeview mode
* Linux: (hack) work around the fact that Zswapped pages may be SwapCached
* Linux: implement zswap support
* {Memory,Swap}Meter: add "compressed memory" metrics
* Darwin: add DiskIOMeter support
* Fix scroll relative to followed process
* ZramMeter: update bar mode
* Use shared real memory on FreeBSD
* Increase Search and Filter max string length to 128
* Improve CPU computation code
* Remove LXC special handling for the CPU count
* Create new File Descriptor meter
* PCP: add IRQ PSI meter
* Linux: add IRQ PSI meter
* Linux: highlight username if process has elevated privileges
* Add support for scheduling policies
* Add a systemd user meter to monitor user units.
* FreeBSD: remove duplicate zfs ARC size subtraction

(fox)

2024-02-18 01:01:01 UTC MAIN commitmail json YAML

doc: Updated audio/din to 58.1

(fox)

2024-02-18 01:00:05 UTC MAIN commitmail json YAML

audio/din: Update to 58.1

Changes since 57:

DIN Is Noise 58:
  /*
    position affects velocity and acceleration vectors
      instead of just velocity vectors
        Menu > Drone Tools > Position affects Vectors
  *\
  /* rotate acceleration *\
  /* rotation direction switch on velocity, accelerations *\
  /* reverse orbital direction *\
  * drone & voice volume displayed on microtonal keyboard is absolute not %
  * improved documentation, see https://dinisnoise.org/docs/
  :( fixed visual modulation behaviour on drones :)
  - removed Boost library requirement to build DIN Is Noise from source code.

(fox)

2023-12-30 03:09:10 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.17.0

(fox)

2023-12-30 03:08:48 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.17.0

Patch out incorrect call to fflagstostr(3) in NetBSD to avoid build breakage.

Changes since 0.16.3:

eza v0.17.3

Description

BREAKING CHANGES:

Extend the +<FORMAT> custom time style, accept an optional
...<newline><FORMAT_2> to support setting a different custom time
style for recent files.

  * The behavior changes if the previous format string
    already contains <newline>. Previously <newline>s are used as-is,
    now the first newline will be interpreted as separation for non-recent
    and recnet format; any content after the second newline, if any, are
    simply ignored.
  * The implementation rejects some previously accepted
    inputs, primarily empty non-recent format string. --time-style=+
    and --time-style='+<newline>' will now get a panic message.

Changelog
Bug Fixes

  * Add color scale mode to the bash completions
  * Add color scale mode to the fish completions
  * Quote symbolic links correctly when their destinations contain spaces

Documentation

  * Modify documentation about custom time style

Features

  * Add BSD file flags
  * Add Windows file attributes
  * [breaking] Support different custom time style for non-recent/recent files

Miscellaneous Tasks

  * Release eza v0.17.0

Testing

  * Regen powertests
  * Regenerate
  * Add tests for non-recent/recent custom time style
  * Update powertest expected help message output

Build

  * Update flake.lock
  * Bump DeterminateSystems/nix-installer-action from 8 to 9
  * Bump once_cell from 1.18.0 to 1.19.0
  * Bump libc from 0.2.150 to 0.2.151

Ci

  * Remove labeler

(fox)

2023-12-28 22:08:15 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.16.3

(fox)

2023-12-28 22:02:37 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.16.3

Changes since 0.16.2:

eza v0.16.3

Changelog
[0.16.3] - 2023-12-07

Bug Fixes

  * Add bare git_repos fn if feature git is disabled
  * Fixing color of size unit
  * Color-scale broked size for colors

Miscellaneous Tasks

  * Release eza v0.16.3

Testing

  * Fix powertests post-release

Build

  * Bump percent-encoding from 2.3.0 to 2.3.1
  * Bump actions/labeler from 4 to 5

(fox)

2023-12-28 21:34:53 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.74

(fox)

2023-12-28 21:34:00 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.74

Changes since v1.73

v1.74 - 16.12.2023
- Added a cubic spline audio interpolation option
- Windows/macOS: Updated SDL to v2.28.5

(fox)

2023-12-28 13:05:46 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.6.6

(fox)

2023-12-28 13:05:18 UTC MAIN commitmail json YAML

security/wolfssl: Update to 5.6.6

Changes since 5.6.4:

wolfSSL Release 5.6.6 (Dec 19, 2023)

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024

REMINDER: When working with AES Block Cipher algorithms, wc_AesInit() should
always be called first to initialize the Aes structure, before calling other
Aes API functions. Recently we found several places in our documentation,
comments, and codebase where this pattern was not observed. We have since
fixed this omission in several PRs for this release.

Vulnerabilities

  * [Medium] CVE-2023-6935: After review of the previous RSA timing fix in
    wolfSSL 5.6.4, additional changes were found to be required. A complete
    resistant change is delivered in this release. This fix is for the Marvin
    attack, leading to being able to decrypt a saved TLS connection and
    potentially forge a signature after probing with a very large number of
    trial connections. This issue is around RSA decryption and affects the
    optional static RSA cipher suites on the server side, which are considered
    weak, not recommended to be used and are off by default in wolfSSL (even
    with --enable-all). Static RSA cipher suites were also removed from the
    TLS 1.3 protocol and are only present in TLS 1.2 and lower. All padding
    versions of RSA decrypt are affected since the code under review is
    outside of the padding processing. Information about the private keys is
    NOT compromised in affected code. It is recommended to disable static RSA
    cipher suites and update the version of wolfSSL used if using RSA private
    decryption alone outside of TLS. Thanks to Hubert Kario for the report.
    The fix for this issue is located in the following GitHub Pull Request:
    #6955.

  * [Low] CVE-2023-6936: A potential heap overflow read is possible in servers
    connecting over TLS 1.3 when the optional WOLFSSL_CALLBACKS has been
    defined. The out of bounds read can occur when a server receives a
    malicious malformed ClientHello. Users should either discontinue use of
    WOLFSSL_CALLBACKS on the server side or update versions of wolfSSL to
    5.6.6. Thanks to the tlspuffin fuzzer team for the report which was
    designed and developed by; Lucca Hirschi (Inria, LORIA), Steve Kremer
    (Inria, LORIA), and Max Ammann (Trail of Bits). The fix for this issue is
    located in the following GitHub Pull Request: #6949.

  * [Low] A side channel vulnerability with AES T-Tables is possible in a very
    controlled environment where precision sub-cache-line inspection can
    happen, such as inside an Intel SGX enclave. This can lead to recovery of
    the AES key. To prevent this type of attack, wolfSSL added an AES
    bitsliced implementation which can be enabled with the
    "--enable-aes-bitsliced" configure option. Thanks to Florian Sieck,
    Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas
    Eisenbarth, and Yuval Yarom for the  report (Universities of Lübeck,
    Melbourne, Adelaide and Bochum). The fix for this issue is located in the
    following GitHub Pull Request: #6854.

  * [Low] CVE-2023-6937: wolfSSL prior to 5.6.6 did not check that messages in
    a single (D)TLS record do not span key boundaries. As a result, it was
    possible to combine (D)TLS messages using different keys into one (D)TLS
    record. The most extreme edge case is that, in (D)TLS 1.3, it was possible
    that an unencrypted (D)TLS 1.3 record from the server containing first a
    ServerHello message and then the rest of the first server flight would be
    accepted by a wolfSSL client. In (D)TLS 1.3 the handshake is encrypted
    after the ServerHello but a wolfSSL client would accept an unencrypted
    flight from the server. This does not compromise key negotiation and
    authentication so it is assigned a low severity rating. Thanks to Johannes
    Wilson for the report (Sectra Communications and Linköping University).
    The fix for this issue is located in the following GitHub Pull Request:
    #7029.

New Feature Additions

  * Build option for disabling CRL date checks (WOLFSSL_NO_CRL_DATE_CHECK)
    (PR 6927)
  * Support for STM32WL55 and improvements to PKA ECC support (PR 6937)
  * Add option to skip cookie exchange on DTLS 1.3 session resumption
    (PR 6929)
  * Add implementation of SRTP KDF and SRTCP KDF (--enable-srtp-kdf) (PR 6888)
  * Add wolfSSL_EXTENDED_KEY_USAGE_free() (PR 6916)
  * Add AES bitsliced implementation that is cache attack safe
    (--enable-aes-bitsliced) (PR 6854)
  * Add memcached support and automated testing (PR 6430, 7022)
  * Add Hardware Encryption Acceleration for ESP32-C3, ESP32-C6, and ESP32-S2
    (PR 6990)
  * Add (D)TLS 1.3 support for 0.5-RTT data (PR 7010)

Enhancements and Optimizations

  * Better built in testing of “--sys-ca-certs” configure option (PR 6910)
  * Updated CMakeLists.txt for Espressif wolfSSL component usage (PR 6877)
  * Disable TLS 1.1 by default (unless SSL 3.0 or TLS 1.0 is enabled)
    (PR 6946)
  * Add “--enable-quic” to “--enable-all” configure option (PR 6957)
  * Add support to SP C implementation for RSA exponent up to 64-bits
    (PR 6959)
  * Add result of “HAVE___UINT128_T” to options.h for CMake builds (PR 6965)
  * Add optimized assembly for AES-GCM on ARM64 using hardware crypto
    instructions (PR 6967)
  * Add built-in cipher suite tests for DTLS 1.3 PQC (PR 6952)
  * Add wolfCrypt test and unit test to ctest (PR 6977)
  * Move OpenSSL compatibility crypto APIs into ssl_crypto.c file (PR 6935)
  * Validate time generated from XGMTIME() (PR 6958)
  * Allow wolfCrypt benchmark to run with microsecond accuracy (PR 6868)
  * Add GitHub Actions testing with nginx 1.24.0 (PR 6982)
  * Allow encoding of CA:FALSE BasicConstraint during cert generation
    (PR 6953)
  * Add CMake option to enable DTLS-SRTP (PR 6991)
  * Add CMake options for enabling QUIC and cURL (PR 7049)
  * Improve RSA blinding to make code more constant time (PR 6955)
  * Refactor AES-NI implementation macros to allow dynamic fallback to C
    (PR 6981)
  * Default to native Windows threading API on MinGW (PR 7015)
  * Return better error codes from OCSP response check (PR 7028)
  * Updated Espressif ESP32 TLS client and server examples (PR 6844)
  * Add/clean up support for ESP-IDF v5.1 for a variety of ESP32 chips
    (PR 7035, 7037)
  * Add API to choose dynamic certs based on client ciphers/sigalgs (PR 6963)
  * Improve Arduino IDE 1.5 project file to match recursive style (PR 7007)
  * Simplify and improve apple-universal build script (PR 7025)

Fixes

  * Fix for async edge case with Intel QuickAssist/Cavium Nitrox (PR 6931)
  * Fix for building PKCS#7 with RSA disabled (PR 6902)
  * Fix for advancing output pointer in wolfSSL_i2d_X509() (PR 6891)
  * Fix for EVP_EncodeBlock() appending a newline (PR 6900)
  * Fix for wolfSSL_RSA_verify_PKCS1_PSS() with RSA_PSS_SALTLEN_AUTO (PR 6938)
  * Fixes for CODESonar reports around isalpha() and isalnum() calls (PR 6810)
  * Fix for SP ARM64 integer math to avoid compiler optimization issues
    (PR 6942)
  * Fix for SP Thumb2 inline assembly to add IAR build support (PR 6943, 6971)
  * Fix for SP Thumb2 to make functions not inlined (PR 6993)
  * Fix for SP Cortex-M assembly large build with IAR (PR 6954)
  * Fix for SP ARM64 assembly montgomery reduction by 4 (PR 6947)
  * Fix for SP ARM64 P-256 for not inlining functions for iOS compatibilit
    (PR 6979)
  * Fix for WOLFSSL_CALLBACKS and potential memory error (PR 6949)
  * Fixes for wolfSSL’s Zephyr OS port (PR 6930)
  * Fix for build errors when building for NXP mmCAU (FREESCALE_MMCAU)
    (PR 6970)
  * Fix for TLS 1.3 SendBuffered() return code in non-blocking mode (PR 7001)
  * Fix for TLS Hmac_UpdateFinal() when padding byte is invalid (PR 6998)
  * Fix for ARMv8 AES-GCM streaming to check size of IV before storing
    (PR 6996)
  * Add missing calls to wc_AesInit() before wc_AesSetKey() (PR 7011)
  * Fix build errors with DTLS 1.3 enabled but TLS 1.2 disabled (PR 6976)
  * Fixes for building wolfSSL in Visual Studio (PR 7040)

(fox)

2023-12-03 15:35:17 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.16.2

(fox)

2023-12-03 15:34:38 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.16.2

Changes since 0.16.1:

eza v0.16.2

Changelog
[0.16.2] - 2023-11-30

Bug Fixes

  * Calculate width correctly when using grid icons & classify
  * Fix the windows build

Miscellaneous Tasks

  * Release eza v0.16.2

Testing

  * Fix version tests

Build

  * Bump webiny/action-conventional-commits from 1.1.0 to 1.2.0
  * Bump DeterminateSystems/nix-installer-action from 7 to 8
  * Bump windows-sys from 0.48.0 to 0.52.0

(fox)

2023-11-28 17:06:40 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.16.1

(fox)

2023-11-28 17:06:14 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.16.1

Changes since 0.16.0:

eza v0.16.1

Description

Changelog

Bug Fixes

  * Don't panic with todo!() on inaccessible dir
  * Don't panic if the btime of a file is Err
  * Lifetime annotations and manpage/shell completion nits
  * Reflow help

Features

  * Handle formatting and display of binary extended attributes.
  * Add netbsd and freebsd support for extended attributes

Miscellaneous Tasks

  * Update flake inputs
  * Release eza v0.16.1

Testing

  * Vars mocking
  * Display and meta options
  * Filtering and sorting
  * Long view options
  * Regenerate --help tests

Build

  * Sign release tags

(fox)

2023-11-20 06:05:51 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.16.0

(fox)

2023-11-20 06:05:24 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.16.0

Changes since 0.15.0:

eza v0.16.0

Description

Updates once again :3

We fixed the accidental breaking change with --color-scale suddenly
requiring an argument introduced in v0.15.3, now it defaults to all.

Changelog

Bug Fixes

  * Fix cross compilation
  * Snap requires a base
  * Move --smart-group to long view options
  * Colo[u]r-scale didn't have a base value
  * Fix snapcraft.yaml formatting

Documentation

  * Add comments for bzip variants
  * Added the fact that total-size is unix only

Features

  * Add some file extensions
  * Abort on panic (saving 0.1 M)
  * Add powertest

Miscellaneous Tasks

  * Ignore blame from #644
  * Stabilize powertest version

Testing

  * Implements tests using the generated directory
  * Powertests using generated testdirs
  * Add hashed versions of powertests

eza v0.15.3

Description

Adding to your weekly bug fixes, features and what not, let me introduce you
to --color-scale, which was just added.

Changelog

[0.15.3] - 2023-11-09

Bug Fixes

  * Changed quote in --almost-all completion
  * Reformat help.rs
  * Allow unused macro rule arms

Documentation

  * Improve CONTRIBUTING.md, README.md
  * Improve README.md
  * Introduce INSTALL.md

Features

  * Create EZA_ICONS_AUTO environment variable
  * Create EZA_ICONS_AUTO environment variable
  * Demo gif and gif generation recipe
  * Add ocaml icon filetypes
  * Add PRQL
  * Add --color-scale

Miscellaneous Tasks

  * Add to CODEOWNERS file to make sure I get ping'd on files being touched
  * Add myself to codeowners to watch modifications on parsing
  * Improve the PR template
  * Release eza v0.15.3

Refactor

  * Remove commented out test code
  * Finalize decay -> color_scale

Build

  * Refactor flake
  * Bump DeterminateSystems/nix-installer-action from 4 to 7
  * Bump libc from 0.2.149 to 0.2.150
  * Bump rustix from 0.38.13 to 0.38.21

Ci

  * Refactor pre-commit-hooks
  * Refactor publish workflow

eza v0.15.2

Bug Fixes

  * Correct width when --no-quotes is used
  * Clippy lint and add option to grid-details
  * --smart-group only worked for current user

Features

  * Add Typst to the recognized files

Miscellaneous Tasks

  * Release eza v0.15.2

Refactor

  * Replace lazy_static with once_cell
  * Replace plain values with TextColours

Testing

  * Added more content to the dir generator
  * Changed size of one of the files

eza v0.15.1

Now with --total-size (size of all files in directories)

Changelog

Bug Fixes

  * Fmt, windows, and nix fixes
  * Reverted autofmt changes
  * Don窶冲 display target窶冱 size if we窶决e not dereferencing
  * Updated match indents
  * Changed flag name
  * Only store top-level recursive dir size
  * Changed windows methods
  * Underscored unused windows variables
  * Added device for filesystem to hashmap
  * Display offset for filenames with spaces
  * Fix clippy warnings
  * Fix doc-tests on RecursiveSize
  * Fix dead_code warnings on Windows

Documentation

  * Added flag to readme
  * Added flag to man
  * Fix doc-tests formatting and address other documentation review requests

Features

  * Added recursive directory parser
  * Added flag to completions
  * Add a new filetype for source code files
  * Add a new icons for source code files and other files
  * Support for displaying blocksize on directories

Miscellaneous Tasks

  * Release eza v0.15.1

Refactor

  * Move total-size calculations to File
  * Add RecursiveSize type to simplify total-size calculation

(fox)

2023-11-19 10:37:19 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.73

(fox)

2023-11-19 10:36:39 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.73

Changes since v1.72.1

v1.73 - 30.10.2023
- Sample editor: Shift + mouse-wheel = scroll sample data view
- Windows/macOS: Updated SDL to v2.28.4

(fox)

2023-11-19 10:27:02 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.6.4

(fox)

2023-11-19 10:26:36 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.6.4

Changes since v5.6.3:

wolfSSL Release 5.6.4 (October 30, 2023)

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Old CyaSSL/CtaoCrypt shim layer was removed in this release (5.6.4)

Vulnerabilities

  * [Medium] A fix was added, but still under review for completeness, for a
    Bleichenbacher style attack, leading to being able to decrypt a saved TLS
    connection and potentially forge a signature after probing with a large
    number of trial connections. This issue is around RSA decryption and
    affects static RSA cipher suites on the server side, which are not
    recommended to be used and are off by default. Static RSA cipher suites
    were also removed from the TLS 1.3 protocol and only present in TLS 1.2
    and lower. All padding versions of RSA decrypt are affected since the code
    under review is outside of the padding processing. Information about the
    private keys is NOT compromised in affected code. It's recommended to
    disable static RSA cipher suites and update the version of wolfSSL used if
    using RSA private decryption alone outside of TLS. The fix is located in
    this pull request (#6896)

New Feature Additions

  * DTLS 1.3 PQC: support fragmenting the second ClientHello message. This
    allows arbitrarily long keys to be used, opening up support for all PQC
    ciphersuites in DTLS 1.3.
  * SM2/SM3/SM4: Chinese cipher support including TLS 1.3 and 1.2 cipher
    suites. SM2 SP implementation available.
  * Ability to parse ASN1 only with SMIME_read_PKCS7
  * Added support for MemUse Entropy on Windows
  * Added Ada Bindings for wolfSSL
  * Added a PEM example that converts to and from DER/PEM.
  * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and
    verify-only options.
  * Added support for the AES EAX mode of operation
  * Port for use with Hitch (https://github.com/varnish/hitch) added
  * Add XTS API's to handle multiple sectors in new port ot VeraCrypt

Enhancements and Optimizations

  * Turned on SNI by default on hosts with resources
  * Improved support for Silicon Labs Simplicity Studio and the ERF32 Gecko
    SDK
  * Thumb-2 and ARM32 Curve25519 and Ed25519 assembly have significantly
    improved performance.
  * Thumb-2 AES assembly code added.
  * Thumb-2 and ARM32 SP implementations of RSA, DH and ECC have
    significantly improved performance.
  * Minor performance improvements to SP ECC for Intel x64.
  * AES-XTS assembly code added for Intel x64, Aarch64 and ARM32.
  * Added support for X963 KDFs to ECIES.
  * Added 32-bit type only implementation of AES GMULT using tables.
  * Add support for nginx version 1.25.0
  * Add support for Kerberos version 5 1.21.1
  * Check all CRL entries in case a single issuer has multiple CRL's loaded
  * CRL verify the entire chain including loaded CA's
  * Added example for building wolfSSL as an Apple universal binary
    framework using configure
  * Sniffer tool now supports decrypting TLS sessions using secrets obtained
    from a SSLKEYLOGFILE
  * Updates made for EBSNET port
  * Update "--enable-jni" to include additional defines for expanded JNI
    support. Also includes JCE and JSSE builds under the single enable option
    now.

Fixes

  * Fixed error handling when decrypted pre-master secret is too long when
    using static RSA.
  * Added a fix for keymod use with i.MX RT1170 CAAM blobs
  * Added a fix for AES-GCM use with Petalinux Xilinx
  * Fixed wc_SignatureGenerate_ex to not call verify twice
  * Fixed wolfCrypt FIPS DLL on Win32
  * Fixed TFM math library big-endian reading implementation when a zero
    length buffer is passed in.
  * Fixed NO_CERT configurations to build correctly.
  * Fixed ARM AES-GCM streaming assembly when 窶兎nable-opensslextra defined.
  * Added modulus checks to heap math implementation of mp_exptmod().
  * Fixed Windows assembly code to handle that certain XMM registers are
    non-volatile.
  * Aarch64 SP ECC implementation of sp_256_mont_dbl_4 has the register list
    for the assembly code fixed to include all used registers.
  * mp_sqrt_mod_prime fixed to limit the number of iterations of a loop to
    handle malicious non-prime values being passed in.
  * Ignore session ID's shorter than 32 bytes instead of erroring out

(fox)

2023-10-21 14:49:28 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.24.0

(fox)

2023-10-21 14:48:54 UTC MAIN commitmail json YAML

textproc/bat: Update to 0.24.0

Changes since 0.23.0:

v0.24.0
Features

  * Add environment variable BAT_PAGING, see #2629 (@einfachIrgendwer0815)
  * Add opt-in (--features lessopen) support for LESSOPEN and LESSCLOSE.
    See #1597, #1739, #2444, #2602, and #2662 (@Anomalocaridid)

Bugfixes

  * Fix more not being found on Windows when provided via BAT_PAGER, see
    #2570, #2580, and #2651 (@mataha)
  * Switched default behavior of --map-syntax to be case insensitive #2520
  * Updated version of serde_yaml to 0.9. See #2627 (@Raghav-Bell)
  * Fix arithmetic overflow in LineRange::from and LineRange::parse_range,
    see #2674, #2698 (@skoriop)
  * Fix paging not happening when stdout is interactive but stdin is not,
    see #2574 (@Nigecat)
  * Make -pp override --paging and vice versa when passed as a later argument,
    see #2660 (@J-Kappes)

Other

  * Output directory for generated assets (completion, manual) can be
    customized, see #2515 (@tranzystorek-io)
  * Use the is-terminal crate instead of atty, see #2530 (@nickelc)
  * Add Winget Releaser workflow, see #2519 (@sitiom)
  * Bump MSRV to 1.70, see #2651 (@mataha)

Syntaxes

  * Associate os-release with bash syntax, see #2587 (@cyqsimon)
  * Associate Containerfile with Dockerfile syntax, see #2606
    (@einfachIrgendwer0815)
  * Replaced quotes with double quotes so fzf integration example script
    works on windows and linux. see #2095 (@johnmatthiggins)
  * Associate ksh files with bash syntax, see #2633 (@johnmatthiggins)
  * Associate sarif files with JSON syntax, see #2695 (@rhysd)
  * Associate ron files with rust syntax, see #2427 (@YeungOnion)
  * Add support for WebGPU Shader Language, see #2692 (@rhysd)
  * Add .dpkg-new and .dpkg-tmp to ignored suffixe, see #2595 (@scop)
  * fix: Add syntax mapping *.jsonl => json, see #2539 (@WinterCore)
  * Update Julia syntax, see #2553 (@dependabot)
  * add NSIS support, see #2577 (@idleberg)
  * Update ssh-config, see #2697 (@mrmeszaros)

bat as a library

  * Add optional output_buffer arg to Controller::run() and
    Controller::run_with_error_handler(), see #2618 (@Piturnah)

(fox)

2023-10-21 14:27:46 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.72.1

(fox)

2023-10-21 14:27:13 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.72.1

Changes since v1.69

v1.72 - 07.10.2023
- Block Cut (ALT+F3) and Block Copy (ALT+F4) was broken in v1.70

v1.71 - 04.10.2023
- CTRL+A/ALT+A keybindings were swapped (thanks to MIDRA2ADVANCE for telling me)

v1.70 - 01.10.2023
- Bugfix: Shrink Pattern ("Srnk.") could lead to a pattern length of 0
- Better variable sanitation for some pattern editing routines, may (?)
  prevent some rare crashes.
- CTRL+F5 (Paste Pattern) had wrong button names in its message box when asking
  to adjust the pattern length after pasting.
- Changed the above message box text to be easier to understand
- Removed audio dithering for 16-bit audio bit depth mode. It seemed to be
  wrongly implemented anyway.
- Some small changes done to the about screen
- Windows/macOS: Updated SDL to v2.28.3
- Code cleanup

(fox)

2023-10-21 14:21:40 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.15.0

(fox)

2023-10-21 14:21:14 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.15.0

Changes since 0.14.2:

eza v0.15.0

Changelog

[0.15.0] - 2023-10-19

Bug Fixes

  * Reenable debug symbols in debug builds
  * Clippy lint
  * Merge conflict with main

Documentation

  * Correct color option spellings

Features

  * Add option --smart-group
  * Add completions, man for --smart-group
  * Add icons=always,auto,never. dont display icons in a tty|piped
  * Fix auto value for colors and icons + documentation
  * [breaking] Remove --no-icons in favor of --icons=always,auto,never.
    default is auto

Miscellaneous Tasks

  * Upgrade to uutils_term_grid from unmaintained term_grid
  * Release eza v0.15.0

Build

  * Bump DeterminateSystems/nix-installer-action from 5 to 6

Ci

  * Remove stalebot, is super annoying
  * Adjust test case to icons=auto (no icons should show due to tty)

(fox)

2023-10-15 20:16:26 UTC MAIN commitmail json YAML

2023-09-24 14:23:39 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.13.0

(fox)

2023-09-24 14:22:47 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.13.0

Changes since 0.12.0:

eza v0.13.0

Description breaking changes

Another Monday, another eza.

We're very close to having integration testing sorted, very very close.
That means clap is soon gonna be merged, and then we'll be proper into
the release candidate. Until then, we only had a slight breaking change,
and we assumed users would prefer getting updates.

    BREAKING CHANGE: The style codes for huge file and units where
    documented to be nt and ut but the code was using nh and uh.
    The code has been updated to match the documented style codes.
    EXA_COLORS using style codes nh and uh will need to be updated to
    use nt and ut.

Changelog

Features

  * Add completion files in deb packaging script
  * Adds filtering for Windows hidden files
  * Support --mount option on Mac
  * Lazy loading of a files extended attributes and absolute path

Bug Fixes

  * Crate can't contain broken symlink
  * Remove executable flag from fish completion file
  * Use proc_mounts only on linux
  * Hotfix harmful documentation
  * Fix hyperlinks on Windows
  * Nix flake check also builds the package
  * [breaking] Change number_huge and unit_huge to match the man page short codes

Documentation

  * Added cafkafk suggestions
  * Fix codeblocks in zsh completions
  * Update README.md
  * Document filetypes theme and rename trait
  * Link directly to space
  * Add Mac support for the --mount option in the man page
  * Add SAFETY comments to unsafe code blocks
  * Update deb instructions to use keyring
  * Fix chmod in deb installation instructions
  * Add potential gpg install to deb installation instructions
  * Document character style pairs in the code and match with man page
  * Add install instructions for Void Linux
  * Documentation of 'sn' and 'sb' conflicted with later docs
  * Document dimmed and italic style codes

Miscellaneous Tasks

  * Augment gitter size in README

Performance

  * Add criterion for benchmarking

Refactor

  * Refactor just in crossfile
  * DRY up justfile
  * Ignore missing MSVC docker image
  * Removed unused imports, mark mods as allow unused
  * Format code
  * Move ALL_MOUNTS to fs::mounts
  * Migrate ALL_MOUNTS from lazy_static to OnceLock

Testing

  * Stabalised unit-tests.yml
  * Autogenerate testing dir
  * Autogenerate test dirs
  * Generate device files
  * Add unit tests that test both exa and ls style codes together
  * Address variable names

Build

  * Add musl binary for linux
  * Fix checksums
  * Add TODOs to targets
  * Set optlevel to 3

Ci

  * Add nix Flake check to flake.yml
  * Removed nix build in favor of nix flake check
  * Include bash completion script in treefmt and fixed shellcheck formatting in completion script
  * Fix windows build
  * Fix spelling attemps -> attempts

New Contributors

  * @cocoliliace made their first contribution in #322
  * @raylu made their first contribution in #332
  * @tranzystorek-io made their first contribution in #363

Full Changelog: https://github.com/eza-community/eza/compare/v0.12.0...v0.13.0

(fox)

2023-09-15 05:56:10 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.12.0

(fox)

2023-09-15 05:55:50 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.12.0

Changes since 0.11.1:

eza v0.12.0 (final rust v1.65 release)

Changelog

Bug Fixes

  * Expand --all help
  * RUSTSEC-2020-0071
  * Generalize gitignore to ignore all eza deb packages
  * Canonicalize errors when the destination of a symbolic link is bad
  * Handle other canonicalize errors in hyperlinks and git
  * Fix windows build when canonicalize returns an error
  * Change trycmd config to use test/itest folder for testing
  * Revert to old apt install command suggestion and add hint
  * Remove stray backslashes
  * Is_some_and is an unstable Rust feature until 1.70
  * Revert "Support for Windows Hidden Files"
  * Shellcheck warnings
  * Revert "Support for Windows Hidden Files"
  * Shellcheck warnings
  * Exit 13 on os error 13
  * Rewrite comment
  * Improve trace strings
  * Tracing typo

Documentation

  * Expand --all documentation
  * Add pthorpe92 gist
  * Remove xtests section from readme
  * Add deprecation warning to xtests/readme
  * Add deprecation warning to just xtest commands
  * Add deprecation warning to vagrantfile
  * Add MacPorts install info
  * Add gentoo
  * Fix gentoo install
  * Add docs for --git-repos & --git-repos-no-status
  * Fix gpg armor flag for deb release in readme
  * Add better explanation of git repos + no status
  * Add scoop install info
  * Remove color specifications. change unknown git repo status to ~
  * Fix missing color specification from man page

Features

  * Add audit workflow
  * Add trycmd as dev-dependency
  * Add minimal trycmd binary
  * Add a few trycmd tests as example
  * Document and change output for --git-repos
  * Add apt installation workflow
  * Adds filtering on Windows hidden files
  * Adds filtering on Windows hidden files
  * Adds filtering on Windows hidden files
  * Added shellcheck to treefmt
  * Adds filtering on Windows hidden files
  * Add PERMISSION_DENIED exit code

Miscellaneous Tasks

  * Bump chrono from 0.4.27 to 0.4.30
  * Removal of xtests
  * Removal of vagrant
  * Remove deprecated devtools
  * Run spellcheck

Refactor

  * Over-engineer deb-package.sh
  * Hide xtests folder
  * Split trycmd into tests for all, unix and windows
  * Limit unit-tests run on workflow change to unit-tests itself
  * Moved generateTest.sh to devtools/
  * Renamed the file
  * Add tracing to various code parts
  * Make std::process::exit global

Revert

  * "Support for Windows Hidden Files"

Styling

  * Remove TODO message on the absolute_path property
  * Fix shellcheck issues in deb-package.sh
  * Fix shellcheck issues in deb-package.sh
  * Fix shellcheck issues in deb-package.sh

Testing

  * Remove vhs from flake
  * Remove vhs-runner files
  * Dump trycmd from nix sandbox
  * Fix name of trydump
  * Add trycmd
  * Add nix feature
  * Add example long tests for sandbox
  * Set itests files to unix epoch
  * Set itest files to unix epoch
  * Refactor setting unix epoch
  * Auto discard old definitions
  * Fix test reference
  * Add long_all_nix.toml
  * Add long_blocksize_nix.toml
  * Add long_extended_nix.toml
  * Add long_git_nix.toml
  * Add long_git_repos_nix.toml
  * Add long_git_repos_no_status_nix.toml
  * Add long_grid_nix.toml
  * Add long_header_nix.toml
  * Add long_icons_nix.toml
  * Add long_octal_nix.toml
  * Add long_time_style_relative_nix.toml
  * Freeze nix tests
  * Fix trydump when no files to delete
  * Adding more content to test
  * Modified unix and all tests
  * Regenerate nix tests
  * Convert windows tests with new itest dir
  * Fixed windows tests being wrong
  * Added a test generator
  * Add more unix_tests
  * Fixed unix tests to remove any distro specific
  * Removed git test breaking on nix

Build

  * Add compression, checksum gen for bin
  * Update flake.lock, cargo.lock
  * Add deny.toml
  * Remove org warnings
  * Remove itest
  * Update flake.lock
  * Add itest, idump
  * Make trycmd part of checks

Ci

  * Don't use nix feature on ci
  * Enforce conventional commits
  * Enforce conventional commits

New Contributors

  * @NekoiNemo made their first contribution in #253
  * @sevz17 made their first contribution in #268
  * @herbygillot made their first contribution in #266
  * @m-czernek made their first contribution in #287
  * @sitiom made their first contribution in #302
  * @MartinFillon made their first contribution in #288
  * @aidandenlinger made their first contribution in #303
  * @alamb3142 made their first contribution in #225
  * @9glenda made their first contribution in #293

Full Changelog: https://github.com/eza-community/eza/compare/v0.11.1...v0.12.0

(fox)

2023-09-12 08:02:02 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.69

(fox)

2023-09-12 08:01:24 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.69

Changes since v1.68

v1.69 - 03.08.2023
- Bugfix: The 'pattern expand' feature was heavily broken and would mess up the
  pattern data (and potentially crash the program).
- Bugfix: The program crash message could overflow and not show the full text on
  some systems.

(fox)

2023-09-12 07:55:41 UTC MAIN commitmail json YAML

doc: Updated audio/din to 57

(fox)

2023-09-12 07:55:11 UTC MAIN commitmail json YAML

audio/din: Update to 57

Changes since 56:

DIN Is Noise 57:

:( fixed crash if Scale notes label on Settings page was clicked :)
  :( fixed reset of note polygon radius in Mondrian :)
  :( fixed lingering close button when switching ui screens using keyboard short cuts :)

  /*
      auto pause can now pause auto rotation or pause auto flip
      direction of rotation of launched drones

        set at Auto pause section in Menu > Drone Params > Defaults
  *\

  /* 0 limit on drone master volume, AM and FM depths *\

  /*
    change of keyboard shortcuts for better drone handling on the
    microtonal keyboard

    middle mouse click to set drone scale / rotate center (pink cross)
    to mouse cursor

    f - find drone center of selected drones
voice phrase recorder shares this shortcut
but only triggers if voice is active

    r - rotate selected drones about center

    t - scale selected drones about center

      hold SHIFT to scale only vertically (only volume changes)
      hold CTRL to scale only horizontally (only pitch changes)

    SPACE - freeze / thaw drones

    For selected drones:

      n - clear drone selection

      y, u - change AM depth and bpm
      o, p - change FM depth and bpm

      - - change handle size
      = - change trail length

      j - flip drone motion

            flips drone velocity

              try on launched drones after turning on
              Menu > Drone Defaults > Select on Creation

            and AM/FM direction

              try on drones of a drone pendulum
              or a drone mesh

  /*

  /*
    new keyboard shortcuts for mouse slider

      ` - toggle ~ on parameter spinner
      0 - toggle 0 on parameter spinner

  *\

  /*
    while moving drone center (the pink cross):

      SHIFT to move along vertical
      CTRL to move along horizontal
  *\

  /*
    On Gravity:

      tip -> mouse - gravity tracks mouse
      tip -> drone -  gravity tracks drone tip
                      instead of touching it

                        only works after
                        Tip to drone

  *\

  /*

    String of characters to bit pattern to box fill texture
    in Mondrian. A cheap experiment with polygon stippling
    in OpenGL.

      OFF by default
      Click Menu > Misc > Texture to toggle
      sd)s is default string. Change and see!
      Also change Step.

  */

  * improved drone AM and FM position set
  * improved Sine Mixer
  * improved binaural drones instrument
  * improved mouse slider
  * improved cursor cross hairs

(fox)

2023-09-12 05:54:02 UTC MAIN commitmail json YAML

doc: Remove duplicate entry for sysutils/eza

(fox)

2023-09-12 01:23:51 UTC MAIN commitmail json YAML

doc: Updated sysutils/eza to 0.11.1

(fox)

2023-09-12 01:23:22 UTC MAIN commitmail json YAML

sysutils/eza: Update to 0.11.1

- Take ownership of the package.
- Regenerate the man pages.

Changes since 0.11.0:

eza 0.11.1

Description

Since last release, there are some notable changes:

  * We now provide binaries for releases
  * eza now respects timezone on windows
  * We fixed the punctuation color that A LOT of users complained about
  * We now highlight mounted directories (linux only)
  * A lot of new icons
  * .git is hidden when using --git-ignore
  * Bright color options.

In general, there has been a huge uptick in activity, we went from around
~100 stars to ~1.5k in the span of a week. This seems to be mostly due to
exa being "deprecated", and that being around the top of hackernews for some
days.

We've also seen a large growth in distributions packaging eza, which is very
exciting.

Changelog

Bug Fixes

  * Add vendored-libgit2 feature to git2 dependency
  * Filename escaping (last character lost sometimes, no hyperlink)
  * Build for Windows with chrono

Documentation

  * Explain vendored-libgit2
  * Add homebrew, misc fixes
  * Fix code of conduct link
  * Update archlinux
  * Add star history
  * Add informaton about lazy_static
  * Remove broken dependabot link
  * Add bright color options in man pages
  * Add bright color support in readme changelog

Features

  * Add highlighting of mounted directories (Linux only)
  * Add backlog of icons from various exa pull requests and others
  * Mark .git as ignored, which hides it when using --git-ignore
  * Add backlog of icons from various exa issues
  * Expose git2 feature vendored-libgit2
  * Add build commands to deb-package.sh
  * Support the MSRV of Rust (1.65.0)
  * Add bright colour options, change punctuation default
  * Use chrono crate to handle datetime-related features

Miscellaneous Tasks

  * Bump actions/checkout from 3 to 4

Testing

  * Stabilize testing without sandbox
  * Disable gif rendering

Build

  * Add release binaries
  * Fix binary gen
  * Add armhf binary

Deps

  * Change ansi_term to ansiterm from rustadopt

(fox)

2023-09-11 12:26:10 UTC MAIN commitmail json YAML

sysutils/eza: Add the shell completions.

Address pkglint issues.

(fox)

2023-09-11 12:23:03 UTC MAIN commitmail json YAML

doc: Removed sysutils/exa successor sysutils/eza

(fox)

2023-09-11 12:20:23 UTC MAIN commitmail json YAML

sysutils/exa: Remove package and SUBDIR entry.

exa's upstream has been abandoned and switched to eza.

"exa is unmaintained, use the fork eza instead."

More information at the respective repositories
- https://github.com/ogham/exa
- https://github.com/eza-community/eza

(fox)

2023-07-01 17:07:06 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.68

(fox)

2023-07-01 17:06:18 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.68

Changes since v1.66

v1.68 - 29.06.2023
- Windows: On double-click of file associated with program, de-minimize window
  (if minimized) and set input focus.
- De-minimize window (if minimized) and set focus after drag n' drop of file
- Windows/macOS: Updated SDL to v2.28.0

v1.67 - 25.04.2023
- The song-to-WAV export screen now defaults to the tracker's bit depth and
  audio rate. This was actually the behavior for earlier versions of the FT2
  clone, but I decided to change it back.
- The song-to-WAV exporter now allows rates up to 384kHz
- Alpha-based fade in for the about screen content (who cares..? :-)
- Some small text string changes (config and song-to-WAV export screen)
- Windows/macOS: Updated SDL to v2.26.5

(fox)

2023-07-01 17:01:46 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.6.3

(fox)

2023-07-01 17:01:09 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.6.3

Changes since v5.6.0:

wolfSSL Release 5.6.3 (Jun 16, 2023)

Release 5.6.3 of wolfSSL embedded TLS has 4 bug fixes:

* Fix for setting the atomic macro options introduced in release 5.6.2. This
  issue affects GNU gcc autoconf builds. The fix resolves a potential mismatch of
  the generated macros defined in options.h file and the macros used when the
  wolfSSL library is compiled. In version 5.6.2 this mismatch could result in
  unstable runtime behavior.
* Fix for invalid suffix error with Windows build using the macro
  GCM_TABLE_4BIT.
* Improvements to Encrypted Memory support (WC_PROTECT_ENCRYPTED_MEM)
  implementations for modular exponentiation in SP math-all (sp_int.c) and TFM
  (tfm.c).
* Improvements to SendAlert for getting output buffer.

wolfSSL Release 5.6.2 (Jun 09, 2023)

Release 5.6.2 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024

Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
* [Low] In cases where a malicious agent could analyze cache timing at a very
  detailed level, information about the AES key used could be leaked during T/S
  Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool
  (https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box
  lookups was added in wolfSSL to help mitigate this potential attack and is now
  on by default with RISC-V builds and can be enabled on other builds if desired
  by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan
  Wichelmann, Christopher Peredy, Florian Sieck, Anna P辰tschke, Thomas Eisenbarth
  (University of L端beck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on
  RISC-V. Fixed in the following GitHub pull request
  https://github.com/wolfSSL/wolfssl/pull/6309
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK
  (pre shared key) extension nor a KSE (key share extension) when connecting to a
  malicious server, a default predictable buffer gets used for the IKM value when
  generating the session master secret. Using a potentially known IKM value when
  generating the session master secret key compromises the key generated, allowing
  an eavesdropper to reconstruct it and potentially allowing surreptitious access
  to or meddling with message contents in the session. This issue does not affect
  client validation of connected servers, nor expose private key information, but
  could result in an insecure TLS 1.3 session when not controlling both sides of
  the connection. We recommend that TLS 1.3 client side users update the version
  of wolfSSL used. Thanks to Johannes from Sectra Communications and Link旦ping
  University for the report. Fixed in the following GitHub pull request
  https://github.com/wolfSSL/wolfssl/pull/6412

New Feature Additions

New Ports and Expansions
* Add support for STM32H5
* Add support for Renesas TSIP v1.17
* Add Renesas SCE RSA crypto-only support
* STARCORE DSP port and example builds added
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed
  attributes to use with PKCS7 bundle creation
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR

New Build Options
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text
  --enable-asn-print. Utility app is located in the directory ./examples/asn1/
* Add introspection for math build, wc_GetMathInfo() to get information about
  the math library compiled into the linked wolfSSL library
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security.
  Enabled with the autoconf flag --enable-harden-tls.
* Add option to support disabling thread local storage, --disable-threadlocal
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest
  algorithms with DSA Sign/Verify
* Implement atomic operations interface. Macros auto-detect if atomic operations
  are expected to be available, can be turned off with the macro
  WOLFSSL_NO_ATOMICS
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
* Expand crypto callback to have a device ID find callback function with
  wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND

Enhancements and Optimizations

Optimizations
* Increased performance with ChaCha20 C implementation and general XOR
  operations
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled
  through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET

Memory Optimizations
* Improvements to stack usage and management with SP int math library
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library
  when linking with cURL
* Memory usage improvement with reducing the size of alignment needed with AES
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
* Fixes and improvements for building edge cases such as crypto callback without
  hash-drbg with low footprint options
* Support HAVE_SESSION_TICKET build option without depending on realloc

Documentation
* Instructions for GPDMA on STM32 configuration added
* Add in instructions for compiling with zephyr on STM32
* Documentation fixup for wolfSSL_get_chain_cert()
* Fix the file pointed to in the TI RTOS documentation that we maintain
* Documentation for wolfSSL_CertManagerFreeCRL
* Updates made to AES and Chacha documentation
* Update Japanese comments for Ed25519, AES, and other miscellaneous items

Tests
* Add in an option for easily testing malloc failures when building with
  WOLFSSL_MEM_FAIL_COUNT macro
* Updated in process for using Expect vs Assert to facilitate more malloc
  failure tests
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
* ESP32 platform-specific VisualGDB test & benchmark projects
* Update to dependencies in docker container file used for tests
* Fix up for base 10 output with bundled benchmark application

Port Updates
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS
  and update of includes
* Update RIOT-OS to not compile out use of writev by default
* Update Micrium port to enable use of STM32_RNG
* Micrium updates for XMEMOVE and XSTRTOK use
* Various Espressif HW crypto, SHA2, AES, MP updates
* Added in ASIO build option with CMake builds

General Enhancements
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware
  key, by default 2048 bit key is used
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
* Allow user to override XSTAT by defining the macro XSTAT when compiling
* Support UPN and SID with x509 certificate extensions and custom OID build
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline
  encryption
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate
  before/after checks
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6

Fixes
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash
  length passed in is larger than the key size. Thanks to Maximilian for the
  report.
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
* In async mode, don't retry decrypting if a valid error is encountered on a
  packet parse attempt
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream
  ciphers
* Fix siphash assembly so that no register is left behind
* Fix to not send a TLS 1.3 session ID resume response when resuming and
  downgrading to a protocol less than TLS 1.3
* Fix overwriting serialNumber by favouriteDrink when generating a certificate
  using Cert struct
* Fix for the default realloc used with EspressIf builds
* Track SetDigest usage to avoid invalid free under error conditions
* DTLS v1.3 fix for epoch 0 check on plaintext message
* Fix for session ticket memory leak in wolfSSL_Cleanup
* Fixes for propagating SendAlert errors when the peer disconnects
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and
  destination overlap in memcpy" when using --enable-aesgcm-stream
* Fix for potential out-of-bounds write edge case in fp_mod_2d with
  --enable-fastmath math library
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on
  error
* Fix for async ECC shared secret state
* Fix for better error checking with sp_gcd with SP int math library
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
* Fix for double free edge case in InitOCSPRequest when handling a memory
  allocation failure
* X509 NAME Entry fix for leaking memory on error case
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
* Fix for FIPS ECC integrity check with crypto callback set
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
* DTLS 1.3 fix for using the correct label when deriving the resumption key
* OCSP fix for GetDateInfo edge case with non ASN template builds
* Allow a user set certificate callback function to override the skipAddCA flag
  when parsing a certificate
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
* Fixes and improvements for handling failures with memory allocations
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z
  is one (affine ordinates)

Build Fixes
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for
  options.h creation with CMake when using USER_SETTINGS
* CMake fixes and improvements for use with mingw32
* Fix for building with wpas and x509 small options
* Check if colrm is available for options.h creation when using autoconf
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
* Fix PKCS#7 build with NO_PKCS7_STREAM
* Fix compilation error in CC-RX and remove unnecessary public key import
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
* For to not advertise support for RSA in TLS extensions when compiled with
  NO_RSA

(fox)

2023-07-01 16:57:13 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 1.4.0

(fox)

2023-07-01 16:56:41 UTC MAIN commitmail json YAML

www/jira-cli: Update to 1.4.0

Changes since 1.3.0:

v1.4.0

This release adds support for Jira v9, a serverinfo command to quickly check
your Jira server build info, lets you set resolution, assignee and comment on
issue move, and many more.

## What's added?
- feat(tui): Allow issue transition from the ui by @ankitpokhrel in #544
- feat(tui): Add help page by @ankitpokhrel in #563
- feat: Filter by multiple statuses by @ankitpokhrel in #573
- feat: Support for adding watcher to Issue by @ankitpokhrel in #584
- feat: Allow different jira server for API and for UI by @markhatch in #613

## What's fixed?
- fix: Shell completion for Fish and PowerShell by @ankitpokhrel in #553
- fix: Worklog comment don't work together with prompt by @ankitpokhrel in #562
- fix: Use http client wrapper instead of round trip by @ankitpokhrel in #530
- fix: Try to detect if JIRA v8 server is not using the createmeta REST endpoint
  by @tristianc in #574
- fix: Issue with -c flag on config generation by @ankitpokhrel in #582
- fix: Issue with value assignment in init by @ankitpokhrel in #606
- fix: Issue with epic field on create by @ankitpokhrel in #607
- fix: Comment author name is not always displayed by @ankitpokhrel in (#618)

## Other changes
- ehc: Improve PAGER selection by @ankitpokhrel in #570
- dep: Upgrade cobra to v1.7.0 by @dbirks in #608
- ci: Upgrade actions by @ankitpokhrel in #590

## New Contributors
- @tristianc made their first contribution in #574
- @dbirks made their first contribution in #608
- @markhatch made their first contribution in #613

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.3.0...v1.4.0

(fox)

2023-04-17 21:33:34 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.66

(fox)

2023-04-17 21:32:56 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.66

Changes since v1.65

v1.66 - 13.04.2023
- Added a 16 point sinc interpolation option (higher quality)
- Changed some settings for the default configuration:
  1) Palette theme = Dark mode
  2) Scopes = Lined
  Note: Your existing configuration will not be changed!
- Changed the layout a little in the Config section (Audio / "I/O Devices")
- Removed the 192kHz audio output setting. This was a bit extreme to begin with.
  Note: You can still select this rate when exporting songs to WAV.
- Some code cleanup

(fox)

2023-03-30 07:34:17 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.6.0

(fox)

2023-03-30 07:33:53 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.6.0

Changes since v5.5.4:

wolfSSL Release 5.6.0 (Mar 24, 2023)

Release 5.6.0 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality
criteria. https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * This
release makes ASN Template the default with ./configure, the previous ASN
parsing can be built with --enable-asn=original

Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions
* ASN template is now the default ASN parsing implementation when compiling with
  configure
* Added in support for TLS v1.3 Encrypted Client Hello (ECH) and HPKE (Hybrid
  Public Key Encryption)
* DTLS 1.3 stateless server ClientHello parsing support added

Ports
* Add RX64/RX71 SHA hardware support
* Port to RT1170 and expand NXP CAAM driver support
* Add NuttX integration files for ease of use
* Updated Stunnel support for version 5.67 Compatibility Layer
* Add in support for AES-CCM with EVP
* BN compatibility API refactoring and separate API created
* Expanding public key type cipher suite list strings support

Misc.
* Support pthread_rwlock and add enable option
* Add wolfSSL_CertManagerLoadCABuffer_ex() that takes a user certificate chain
  flag and additional verify flag options
* Docker build additions for wolfSSL library and wolfCLU application
* Add favorite drink pilot attribute type to get it from the encoding
* Added in support for indefinite length BER parsing with PKCS12
* Add dynamic session cache which allocates sessions from the heap with macro
  SESSION_CACHE_DYNAMIC_MEM

Improvements / Optimizations

Tests
* Additional CI (continuous integration) testing and leveraging of GitHub
  workflows
* Add CI testing for wpa_supplicant, OpenWrt and OpenVPN using GitHub workflows
* Add compilation of Espressif to GitHub workflows tests
* Refactoring and improving error results with wolfCrypt unit test application
* Minor warning fixes from Coverity static analysis scan
* Add new SHA-512/224 and SHA-512/256 tests
* Used codespell and fixed some minor typos

Ports
* Improve TLS1.2 client authentication to use TSIP
* Updated Kyber macro to be WOLFSSL_HAVE_KYBER and made changes that make Kyber
  work on STM32
* AES-GCM Windows assembly additions
* CRLF line endings, trailing spaces for C# Wrapper Projects Compatibility Layer
* Update PubKey and Key PEM-to-DER APIs to support return of needed DER size
* Allow reading ENC EC PRIVATE KEY as well via wolfSSL_PEM_read_bio_ECPrivateKey
* Improve wolfSSL_EC_POINT_cmp to handle Jacobian ordinates
* Fix issue with BIO_reset() and add BIO_FLAGS_MEM_RDONLY flag support for read
  only BIOs

SP
* In SP math library rework mod 3 and use count leading zero instruction
* Fix with SP ECC sign to reject the random k generated when r is 0
* With SP math add better detection of when add won't work and double is needed
  with point_add_qz1 internal function
* With SP int fail when buffer writing to is too small for number rather than
  discarding the extra values

Builds
* Define WOLFSSL_SP_SMALL_STACK if wolfSSL is build with --enable-smallstack
* Fix CMake to exclude libm when DH is not enabled
* Allow building of SAKKE as external non-FIPS algorithm with wolfmikey product
* Add option to add library suffix, --with-libsuffix
* ASN template compile option WOLFSSL_ASN_INT_LEAD_0_ANY to allow leading zeros
* Add user_settings.h template for wolfTPM to
  examples/configs/user_settings_wolftpm.h
* Purge the AES variant of Dilithium
* Expand WOLFSSL_NO_ASN_STRICT to allow parsing of explicit ECC public key
* Remove relocatable text in ARMv7a AES assembly for use with FIPS builds
* Expand checking for hardware that supports ARMv7a neon with autotools
  configure
* Sanity check on allocation fails with DSA and FP_ECC build when zeroizing
  internal buffer
* Additional TLS alerts sent when compiling with WOLFSSL_EXTRA_ALERTS macro
  defined

Benchmarking
* Update wolfCrypt benchmark Windows build files to support x64 Platform
* Add SHA512/224 and SHA512/256 benchmarks, fixed CVS macro and display sizes
* Separate AES-GCM streaming runs when benchmarked
* No longer call external implementation of Kyber from benchmark
* Fix for benchmarking shake with custom block size
* Fixes for benchmark help -alg list and block format Documentation/Examples
* Document use of wc_AesFree() and update documentation of Ed25519 with Doxygen
* Move the wolfSSL Configuration section higher in QUIC.md
* Add Japanese Doxygen documentation for cmac.h, quic.h and remove incomplete
  Japanese doxygen in asn_public.h
* Espressif examples run with local wolfSSL now with no additional setup needed
* Added a fix for StartTLS use In the example client
* Add a base-line user_settings.h for use with FIPS 140-3 in XCode example app

Optimizations
* AES-NI usage added for AES modes ECB/CTR/XTS

Misc
* Update AES-GCM stream decryption to allow long IVs
* Internal refactor to use wolfSSL_Ref functions when incrementing or
  decrementing the structures reference count and fixes for static analysis
  reports
* Cleanup function logging making adjustments to the debug log print outs
* Remove realloc dependency in DtlsMsgCombineFragBuckets function
* Refactor to use WOLFSSL_CTX窶冱 cipher suite list when possible
* Update internal padding of 0窶冱 with DSA sign and additional tests with
  mp_to_unsigned_bin_len function
* With DTLS SRTP use wolfSSL_export_keying_material instead of wc_PRF_TLS
* Updated macro naming from HAVE_KYBER to be WOLFSSL_HAVE_KYBER
* Update AES XTS encrypt to handle in-place encryption properly
* With TLS 1.3 add option to require only PSK with DHE

Fixes

Ports
* Fix for AES use with CAAM on imx8qxp with SECO builds
* Fix for PIC32 crypto HW and unused TLSX_SetResponse
* Fix warning if ltime is unsigned seen with QNX build
* Updates and fix for Zephyr project support
* Include sys/time.h for WOLFSSL_RIOT_OS
* Move X509_V errors from enums to defines for use with HAProxy CLI
* Fix IAR compiler warnings resolved
* Fix for STM32 Hash peripherals (like on F437) with FIFO depth = 1
* ESP32 fix for SHA384 init with hardware acceleration

Builds
* Add WOLFSSL_IP_ALT_NAME macro define to --enable-curl
* Fixes for building with C++17 and avoiding clashing with byte naming
* Fixes SP math all build issue with small-stack and no hardening
* Fix for building with ASN template with NO_ASN_TIME defined
* Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined
* Don't allow aesgcm-stream option with kcapi
* Fix DTLS test case for when able to read peers close notify alert on FreeBSD
  systems
* Fix for "expression must have a constant value" in tls13.c with Green Hills
  compiler
* Fixes for building KCAPI with opensslextra enabled
* Fix warnings of shadows min and subscript with i486-netbsd-gcc compiler
* Fix issue with async and WOLFSSL_CHECK_ALERT_ON_ERR
* Fix for PKCS7 with asynchronous crypto enabled

Math Library
* SP Aarch64 fix for conditional changed in asm needing "cc" and fix for ECC
  P256 mont reduce
* In SP builds add sanity check with DH exp. to check the output length for
  minimum size
* In SP math fix scalar length check with EC scalar multiply
* With SP int fix handling negative character properly with read radix
* Add error checks before setting variable err in SP int with the function
  sp_invmod_mont_ct
* Fix to add sanity check for malloc of zero size in fastmath builds
* In fastmath fix a possible overflow in fp_to_unsigned_bin_len length check
* Heapmath fast mod. reduce fix

Compatibility Layer
* Fixes for encoding/decoding ecc public keys and ensure i2d public key
  functions do not include any private key information
* Fix for EVP_EncryptUpdate to update outl on empty input
* Fix SE050 RSA public key loading and RSA/ECC SE050 TLS Compatibility
* Rework EC API and validate point after setting it
* Fix for X509 RSA PSS with compatibility layer functions
* Fix size of structures used with SHA operations when built with opensslextra
  for Espressif hardware accelerated hashing
* Added sanity check on key length with wolfSSL_CMAC_Init function
* Fix for return value type conversion of bad mutex error in logging function
* Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
* Fix unguarded XFPRINTF calls with opensslextra build
* Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
* Fix for potential ASN1_STRING leak in wolfSSL_X509_NAME_ENTRY_create_by_txt
  and wolfSSL_X509_NAME_ENTRY_create_by_NID when memory allocation fails

Misc.
* Add sanity check to prevent an out of bounds read with OCSP response decoding
* Sanity check to not allow 0 length with bit string and integer when parsing
  ASN1 syntax
* Adjust RNG sanity checks and remove error prone first byte comparison
* With PKCS7 add a fix for GetAsnTimeString() to correctly increment internal
  data pointer
* PKCS7 addition of sequence around algo parameters with authenvelop
* DSA fixes for clearing mp_int before re-reading data and avoid mp_clear
  without first calling mp_init
* Fix for SRTP setting bitfield when it is encoded for the TLS extension
* Fix for handling small http headers when doing CRL verification
* Fix for ECCSI hash function to validate the output size and curve size
* Fix for value of givenName and name being reversed with CSR generation
* Fix for error type returned (OCSP_CERT_UNKNOWN) with OCSP verification
* Fix for a potential memory leak with ProcessCSR when handling OCSP responses
* Fix for VERIFY_SKIP_DATE flag not ignoring date errors when set
* Fix for zlib decompression buffer issue with PKCS7
* Fix for DTLS message pool send size used and DTLS server saving of the
  handshake sequence
* Fix to propagate WOLFSSL_TICKET_RET_CREATE error return value from
  DoDecryptTicket()
* Fix for handling long session IDs with TLS 1.3 session tickets
* Fix for AES-GCM streaming when caching an IV
* Fix for test case with older selftest that returns bad padding instead of salt
  len error
* Add fix for siphash cache and added in additional tests
* Fix potential out of bounds memset to 0 in error case with session export
  function used with --enable-sessionexport builds
* Fix possible NULL dereference in TLSX_CSR_Parse with TLS 1.3
* Fix for sanity check on RSA pad length with no padding using the build macro
  WC_RSA_NO_PADDING

(fox)

2023-03-13 15:00:42 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.65

(fox)

2023-03-13 14:59:54 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.65

Changes since v1.63

v1.65 - 03.03.2023
- Quick fix for volume ramp delta (could be slightly off in v1.64)

v1.64 - 03.03.2023
- Increased number of precision bits for song BPM, playback time counter and
  audio->video syncing. This is a minor change and does very little in practice
  as the previous precision was already quite good.
- Audio/video sync timestamps are reset every half an hour to prevent possible
  sync drifting after several hours of playing a song without a single song stop
  (resets timestamp) in-between.
- The HPC timers are reset every half an hour instead of every hour.
  Video (if no vsync) and the scopes use these timers.
- Small code refactor for how the song is timed/ticked. Longer song-to-WAV
  renders may have a filesize change of a few bytes, but this is actually
  more correct.

(fox)

2023-02-05 13:11:00 UTC MAIN commitmail json YAML

doc: Updated sysutils/htop to 3.2.2

(fox)

2023-02-05 13:10:40 UTC MAIN commitmail json YAML

sysutils/htop: Update to 3.2.2

Changes since 3.2.1:

What's new in version 3.2.2

* CPUMeter now can show frequency in text mode
* Add option to render distribution path prefixes shadowed
* DiskIOMeter converts to bytes per second (not per interval)
* DiskIOMeter uses complete units, including missing "iB/s"
* DiskIOMeter indicates read and write in meter mode
* NetworkIOMeter converts to packets per second, shows packet rate
* Allow continued process following when changing display settings
* Update the panel header when changing to another tab
* Drop margin around the header if there are no meters
* Use Unicode replacement character for non-printable characters
* Default color preset uses bold blue for better visibility
* Update the Panel header on sort order inversions ('I')
* Toggle the header meters with pound key
* Fix ScreenPanel to handle quitting the panel while renaming
* Add fallback for HOME environment variable using passwd database
* Replace meaningless ID column with FD column in lock screen
* Use device format in the lock screen matching the files screen
* On Linux, improvements to file-descriptor lock detection
* On Linux, further distinguish systemd states in the SystemdMeter
* On Linux, improvements to cgroup and container identification
* On Linux, support openat(2) without readlinkat(2) platforms
* On Darwin, fix current process buffer handling for busy systems
* On DragonFly BSD, fix incorrect processor time of processes
* On FreeBSD, fix an issue with the memory graph not showing correctly
* On FreeBSD, add support for displaying shared memory usage
* On PCP, use pmLookupDescs(3) if available for efficiency
* On PCP, normalize generic columns values for consistent display
* On PCP, changes preparing for configurable, dynamic screens
* Handle invalid process columns from the configuration file
* Avoid undefined behaviour with deeply nested processes
* Fix crash when removing the currently active screen
* Prevent possible crash on a very early error path
* Include automake for Debian/Ubuntu
* Restore non-mouse support
* Reject unsupported command line arguments
* Document idle process state
* Clarify M_TRS/M_DRS columns

(fox)

2023-02-04 16:22:15 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.3.1.1

(fox)

2023-02-04 16:21:58 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.3.1.1

Changes since 3.3.0.4:

===============
Version 3.3.1.1
===============

Hard patch on the master branch.

Bug corrected:

    * "ModuleNotFoundError: No module named 'ujson'" #2246
    * Remove surrounding quotes for quoted command arguments #2247 (related to #2239)

===============
Version 3.3.1
===============

Enhancements:

    * Minor change on the help screen
    * Refactor some loop in the processes function
    * Replace json by ujson #2201

Bug corrected:

    * Unable to see docker related information #2180
    * CSV export dependent on sort order for docker container cpu #2156
    * Error when process list is displayed in Programs mode #2209
    * Console formatting permanently messed up when other text printed #2211
    * API GET uptime returns formatted string, not seconds as the doc says #2158
    * Glances UI is breaking for multiline commands #2189

Documentation and CI:

    * Add unitary test for memory profiling
    * Update memory profile chart
    * Add run-docker-ubuntu-* in Makefile
    * The open-web-browser option was missing dashes #2219
    * Correct regexp in glances.conf file example
    * What is CW from network #2222 (related to discussion #2221)
    * Change Glances repology URL
    * Add example for the date format
    * Correct Flake8 configuration file
    * Drop UT for Python 3.5 and 3.6 (no more available in Ubuntu 22.04)
    * Correct unitary test with Python 3.5
    * Update Makefile with comments
    * Update Python minimal requirement for py3nvlm
    * Update security policy (user can open private issue directly in Github)
    * Add a simple run script. Entry point for IDE debuger

Cyber security update:

    * Security alert on ujson < 5.4
    * Merge pull request #2243 from nicolargo/renovate/nvidia-cuda-12.x
    * Merge pull request #2244 from nicolargo/renovate/crazy-max-ghaction-docker-meta-4.x
    * Merge pull request #2228 from nicolargo/renovate/zeroconf-0.x
    * Merge pull request #2242 from nicolargo/renovate/crazy-max-ghaction-docker-meta-4.x
    * Merge pull request #2239 from mfridge/action-command-split
    * Merge pull request #2165 from nicolargo/renovate/zeroconf-0.x
    * Merge pull request #2199 from nicolargo/renovate/alpine-3.x
    * Merge pull request #2202 from chncaption/oscs_fix_cdr0ts8au51t49so8c6g
    * Bump loader-utils from 2.0.0 to 2.0.3 in /glances/outputs/static #2187 - Update Web lib

Contributors for this version:

    * Nicolargo
    * renovate[bot]
    * chncaption
    * fkwong
    * *mfridge

And also a big thanks to @RazCrimson (https://github.com/RazCrimson) for the support to the Glances community !

(fox)

2023-02-04 16:11:23 UTC MAIN commitmail json YAML

doc: Updated audio/din to 56

(fox)

2023-02-04 16:10:56 UTC MAIN commitmail json YAML

audio/din: Update to 56

Changes since 55:

DIN Is Noise 56:

  /*
    new drone movements: rail and strafe

      rail moves a drone along its velocity vector
      strafe moves a drone lateral (perpendicular) to the velocity vector

        access rail and strafe using Drone Tools > Move / Rail / Strafe option list
          click on the option to activate
          then just move mouse up or down to rail or strafe

      interesting fx possible if the drone velocity vectors are
      auto rotating / flipping / pausing when railing or strafing!
  *\

  /*
      new auto pause for auto rotating drone velocity and/or accleration vectors

      basically, pause rotating every few seconds for a few seconds
        set values of 'every few seconds' and 'for a few seconds' from:
          Drone Params > Defaults for new drones OR
          Drone Params > Motion for existing drones
  *\

  /*
      new auto flip (= change direction of) rotation of curves on
      any curve editor
  *\

  /*
    new Curves tab on Menu of all curve editors
      lists curves available for editing
      can turn on/off curves for better/easier & targeted editing
  *\

  * improved FFT display and handling on waveform editors
  * improved waveform display on keyboard-keyboard
  * improved auto flip of rotation of velocity/acceleration vectors of drones
  @ launched drones from muted drones are not muted (default until DIN55)
    @ they serve no purpose, you can just select the launcher and
      stop launching :)
  - Fractaliser does not change curve name on apply
  ! fixed Menu > Drone tools > Immortalize to turn mortal launched drones immortal
  ! fixed resizing of Sine_Mixer harmonics/phases widget when moving Sine_Mixer

(fox)

2023-02-04 15:57:38 UTC MAIN commitmail json YAML

www/jira-cli: Add the missed out changes for go modules.

(fox)

2023-02-04 15:50:09 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 1.3.0

(fox)

2023-02-04 15:49:35 UTC MAIN commitmail json YAML

www/jira-cli: Update to 1.3.0

Changes since 1.1.0:

v1.3.0

This release contains some features and enhancements + upgrades all
dependencies.

## What's Changed/Fixed?
- feat: Allow to set reporter on issue create by @ankitpokhrel in #539
- feat: Use single char ellipsis instead of triple dot by @ankitpokhrel in #540
- ehc: Make assignee operation atomic on create by @ankitpokhrel in #531
- ehc: Auto fallback to plain output on notty by @ankitpokhrel in #538
- ehc: Add warning for invalid custom field by @ankitpokhrel in #528 (Original work by @martinpovolny on #525)
- fix(build): Invalid commit hash in docker image by @ankitpokhrel in #535

## Dependency Upgrades
- dep: Upgrade all packages by @ankitpokhrel in #532
- dep: Upgrade golang to v1.19 by @ankitpokhrel in #534
- ci: Upgrade golangci-lint to v1.50.1 by @ankitpokhrel in #536

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.2.0...v1.3.0

v1.2.0

This release adds support for Jira v9, a serverinfo command to quickly check
your Jira server build info, lets you set resolution, assignee and comment on
issue move, and many more.

## What's added?
- feat: Add serverinfo command by @ankitpokhrel in #440
- feat: Support for Jira v9 by @ankitpokhrel in #447
- feat: Allow to set start datetime on worklog add by @ankitpokhrel in #453
- feat: Make date time input in worklog flexible by @ankitpokhrel in #465
- feat: Add support for project datatype in custom fields by @oveaurs in #482
- feat: Add weblink to issue (#446) by @Syd7 in #483
- feat: Resolution, assignee & comment on issue move by @ankitpokhrel in #492
- feat: Filter issues by the absence of label(s) by @martinpovolny in #505
- feat: Add labels to the issue listing by @martinpovolny in #506
- feat: Allow setting of fixed columns in the list of issues, epics and sprints
  by @martinpovolny in #509

## What's fixed?
- fix: Option to show issues from all projects in sprint list by @ankitpokhrel
  in #475
- fix: Discrepancy in --insecure flag by @ankitpokhrel in #507
- fix: Make board selection optional by @ankitpokhrel in #502
- fix: Improve support for pager by @ankitpokhrel in #503
- fix: Respect editor env vars in Windows by @ankitpokhrel in #524

## Other changes
- ci: Multi-arch docker image by @ankitpokhrel in #508
- doc: Add link to project in help by @ankitpokhrel in #456
- doc: Add Nix package by @bryanasdev000 in #458
- doc: Update help for completion cmd by @ankitpokhrel in #491
- doc: Add scoop installation process by @alkuzad in #497

## New Contributors
- @bryanasdev000 made their first contribution in #458
- @oveaurs made their first contribution in #482
- @Syd7 made their first contribution in #483
- @alkuzad made their first contribution in #497
- @martinpovolny made their first contribution in #505

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.1.0...v1.2.0

(fox)

2023-02-04 15:20:14 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.5.4

(fox)

2023-02-04 15:19:51 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.5.4

Changes since v5.5.3:

wolfSSL Release 5.5.4 (Dec 21, 2022)

Release 5.5.4 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* QUIC related changes for HAProxy integration and config option
* Support for Analog Devices MAXQ1080 and MAXQ1065
* Testing and build of wolfSSL with NuttX
* New software based entropy gatherer with configure option
  --enable-entropy-memuseOP
* NXP SE050 feature expansion and fixes, adding in RSA support and conditional
  compile of AES and CMAC
* Support for multi-threaded sniffer

Improvements / Optimizations

Benchmark and Tests
* Add alternate test case for unsupported static memory API when testing mutex
  allocations
* Additional unit test cases added for AES CCM 256-bit
* Initialize and free AES object with benchmarking AES-OFB
* Kyber with DTLS 1.3 tests added
* Tidy up Espressif ESP32 test and benchmark examples
* Rework to be able to run API tests individually and add display of time taken
  per test

Build and Port Improvements
* Add check for 64-bit ABI on MIPS64 before declaring a 64-bit CPU
* Add support to detect SIZEOF_LONG in armclang and diab
* Added in a simple example working on Rx72n
* Update azsphere support to prevent compilation of file included inline
* --enable-brainpool configure option added and default to on when custom curves
    are also on
* Add RSA PSS salt defines to engine builds if not FIPS v2

Post Quantum
* Remove kyber-90s and route all Kyber through wolfcrypt
* Purge older version of NTRU and SABER from wolfSSL

SP Math
* Support static memory build with sp-math
* SP C, SP int: improve performance
* SP int: support mingw64 again
* SP int: enhancements to guess 64-bit type and check on NO_64BIT macro set
  before using long long
* SP int: check size required when using sp_int on stack
* SP: --enable-sp-asm now enables SP by default if not set
* SP: support aarch64 big endian

DTLS
* Allow DTLS 1.3 to compile when FIPS is enabled
* Allow for stateless DTLS client hello parsing

Misc.
* Easier detection of DRBG health when using Intel窶冱 RDRAND by updating the
  structures status value
* Detection of duplicate known extensions with TLS
* PKCS#11 handle a user PIN that is a NULL_PTR, compile time check in finding
  keys, add initialization API
* Update max Cert Policy size based on RFC 5280
* Add Android CA certs path for wolfSSL_CTX_load_system_CA_certs()
* Improve logic for enabling system CA certs on Apple devices
* Stub functions to allow for cpuid public functions with non-intel builds
* Increase RNG_SECURITY_STRENGTH for FIPS
* Improvements in OpenSSL Compat ERR Queue handling
* Support ASN1/DER CRLs in LoadCertByIssuer
* Expose more ECC math functions and improve async shared secret
* Improvement for sniffer error messages
* Warning added that renegotiation in TLS 1.3 requires session ticket
* Adjustment for TLS 1.3 post auth support
* Rework DH API and improve PEM read/write

## Fixes

Build Fixes
* Fix --enable-devcrypto build error for sys without u_int8_t type
* Fix casts in evp.c and build issue in ParseCRL
* Fixes for compatibility layer building with heap hint and OSSL callbacks
* fix compile error due to Werro=undef on gcc-4.8
* Fix mingw-w64 build issues on windows
* Xcode project fixes for different build settings
* Initialize variable causing failures with gcc-11 and gcc-12 with a unique
  wolfSSL build configuration
* Prevent WOLFSSL_NO_MALLOC from breaking RSA certificate verification
* Fixes for various tests that do not properly handle `WC_PENDING_E` with
  async. builds
* Fix for misc `HashObject` to be excluded for `WOLFCRYPT_ONLY`

OCSP Fixes
* Correctly save next status with OCSP response verify
* When the OCSP responder returns an unknown exception, continue through to
  checking the CRL

Math Fixes
* Fix for implicit conversion with 32-bit in SP math
* Fix for error checks when modulus is even with SP int build
* Fix for checking of err in _sp_exptmod_nct with SP int build
* ECC cofactor fix when checking scalar bits
* ARM32 ASM: don't use ldrd on user data
* SP int, fix when ECC specific size code included

Port Fixes
* Fixes for STM32 PKA ECC (not 256-bit) and improvements for AES-GCM
* Fix for cryptocell signature verification with ECC
* Benchmark devid changes, CCM with SECO fix, set IV on AES import into SECO

Compat. Layer Fixes
* Fix for handling DEFAULT:... cipher suite list
* Fix memory leak in wolfSSL_X509_NAME_ENTRY_get_object
* Set alt name type to V_ASN1_IA5STRING
* Update name hash functions wolfSSL_X509_subject_name_hash and
  wolfSSL_X509_issuer_name_hash to hash the canonical form of subject
* Fix wolfSSL_set_SSL_CTX() to be usable during handshake
* Fix X509_get1_ocsp to set num of elements in stack
* X509v3 EXT d2i: fix freeing of aia
* Fix to remove recreation of certificate with wolfSSL_PEM_write_bio_X509()
* Link newly created x509 store's certificate manager to self by default to
  assist with CRL verification
* Fix for compatibility `EC_KEY_new_by_curve_name` to not create a key if the
  curve is not found

Misc.
* Free potential signer malloc in a fail case
* fix other name san parsing and add RID cert to test parsing
* WOLFSSL_OP_NO_TICKET fix for TLSv1.2
* fix ASN template parsing of X509 subject directory attribute
* Fix the wrong IV size with the cipher suite
  TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256
* Fix incorrect self signed error return when compiled with certreq and certgen.
* Fix wrong function name in debug comment with wolfSSL_X509_get_name_oneline()
* Fix for decryption after second handshake with async sniffer
* Allow session tickets to properly resume when using PQ KEMs
* Add sanity overflow check to DecodeAltNames input buffer access

(fox)

2023-02-04 15:11:42 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.63

(fox)

2023-02-04 15:11:06 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.63

Changes since v1.61

v1.63 - 24.01.2023
- For users with >60Hz displays: *hopefully* fixed possible slowdown/timing
  problems after leaving the program open for many hours.
- Windows/macOS: Updated SDL to v2.26.2

v1.62 - 28.11.2022
- Because of a bug in FT2, pattern loop commands will manipulate the row the
  next pattern will begin at (should be 0). However, this can overflow the
  number of rows (length) for that pattern and cause out-of-bounds reads. Set to
  row 0 in this case. This fixes for example "ambrozia.xm" in the transition
  from song end to song start.

(fox)

2022-11-12 15:19:25 UTC MAIN commitmail json YAML

doc: Updated security/libdecaf to 1.0.2

(fox)

2022-11-12 15:19:03 UTC MAIN commitmail json YAML

security/libdecaf: Update to v1.0.2

Changes since v1.0.1:

July 13, 2022:
    Fix a security bug and an issue.

    Point::steg_encode was leaving the 24 high bits of the buffer as zero.
    It also ignored the size parameter.  The size parameter has now been
    removed, the zeros fixed and a test added to make sure that it is fixed.

    Per https://github.com/MystenLabs/ed25519-unsafe-libs, deprecate eddsa
    signing with separate pubkey and privkey input. Instead decaf_ed*_keypair_sign.

    Release v1.0.2.

(fox)

2022-11-12 06:19:53 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.3.0.4

(fox)

2022-11-12 06:19:26 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.3.0.4

Changes since 3.2.7:

===============
Version 3.3.0.4
===============

Refactor the Docker images factory, from now, only Alpine image wll be
provided.

The following Docker images (nicolargo/glances) are availables:

- *latest-full* for a full Alpine Glances image (latest release) with all
  dependencies
- *latest* for a basic Alpine Glances (latest release) version with minimal
  dependencies (Bottle and Docker)
- *dev* for a basic Alpine Glances image (based on development branch) with
  all dependencies (Warning: may be instable)

===============
Version 3.3.0.2
===============

Bug corrected:
    * Password files in same configuration dir in effect #2143
    * Fail to load config file on Python 3.10 #2176

===============
Version 3.3.0.1
===============

Just a version to rebuild the Docker images.

===============
Version 3.3.0
===============

Enhancements:

    * Migration from AngularJS to Angular/React/Vue #2100 (many thanks to
      @fr4nc0is)
    * Improve the IP module with a link to Censys #2105
    * Add the public IP information to the WebUI #2105
    * Add an option to show a configurable clock/time module to display #2150
    * Add sort information on Docker plugin (console mode). Related to #2138
    * Password files in same configuration dir in effect #2143
    * If the container name is long, then display the start, not the end -
      Related to #1732
    * Make the Web UI same than Console for CPU plugin
    * [WINDOWS] Reorganise CPU stats display #2131
    * Remove the static exportable_plugins list from glances_export.py #1556
    * Limiting data exported for economic storage #1443

Bug corrected:

    * glances.conf FS hide not applying #1666
    * AMP: regex with special chars #2152
    * fix(help-screen): add missing shortcuts and columnize algorithmically
      #2135
    * Correct issue with the regexp filter (use fullmatch instead of match)
    * Errors when running Glances as web service #1702
    * Apply alias to Duplicate sensor name #1686
    * Make the hide function in sensors section compliant with lower/upercase
      #1590
    * Web UI truncates the days part of CPU time counter of the process list
      #2108
    * Correct alignement issue with the diskio plugin (Console UI)

Documentation and CI:

    * Refactor Docker file CI
    * Add Codespell to the CI pipeline #2148
    * Please add docker-compose example and document example. #2151
    * [DOC] Glances failed to start and some other issues - BSD #2106
    * [REQUEST Docker image] Output log to stdout #2128 (for debian)
    * Fix code scanning alert - Clear-text logging of sensitive information
      #2124
    * Improve makefile (with online documentation)
    * buildx failed with: ERROR: failed to solve: python:3.10-slim-buster: no
      match for platform in manifest #2120
    * [Update docs] Can I export only the fields I need in csv report? #2113
    * Windows Python 3 installation fails on dependency package "future" #2109

Contributors for this version:

    * fr4nc0is : a very special thanks to @fr4nc0is for his huge work on the
      Glances v3.3.0 WebUI !!!
    * Kostis Anagnostopoulos
    * Kian-Meng Ang
    * dependabot[bot]
    * matthewaaronthacker
    * and your servant Nicolargo

(fox)

2022-11-12 06:03:20 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.61

(fox)

2022-11-12 06:02:48 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.61

Changes since v1.58

v1.61 - 07.11.2022
- For the volume column in pattern edit mode, allow the two keys to the left
  of backspace to work as '-' and '+'. This is for some keyboard layouts where
  it was impossible to insert volume slide down/up effects.

v1.60 - 11.10.2022
- Windows/macOS: Updated SDL to v2.24.1

v1.59 - 03.10.2022
- The default Disk Op. directory is now set to the user's desktop
- The WAV export screen now has a checkbox for setting BPM precision to FT2.
  This means to use less precise BPMs, which will match FT2's WAV output
  length.
- The default audio frequency and bit depth in the WAV export screen are now
  set to 44100 and 16-bit, and changing the audio frequency and bit depth in
  the config screen will not affect these settings anymore.
- Updated the help text (made a note about the new WAV export BPM mode)

(fox)

2022-11-12 05:53:09 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.5.3

(fox)

2022-11-12 05:52:26 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.5.3

Changes since v5.5.1:

wolfSSL Release 5.5.3 (Nov 2, 2022)

Release 5.5.3 of wolfSSL embedded TLS has the following bug fix:

Fixes

* Fix for possible buffer zeroization overrun introduced at the end of v5.5.2
  release cycle in GitHub pull request 5743
  (https://github.com/wolfSSL/wolfssl/pull/5743) and fixed in pull request 5757
  (https://github.com/wolfSSL/wolfssl/pull/5757). In the case where a specific
  memory allocation failed or a hardware fault happened there was the potential
  for an overrun of 0窶冱 when masking the buffer used for (D)TLS 1.2 and lower
  operations. (D)TLS 1.3 only and crypto only users are not affected by the
  issue. This is not related in any way to recent issues reported in OpenSSL.

wolfSSL Release 5.5.2 (Oct 28, 2022)

Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
* [Med] In the case that the WOLFSSL_CALLBACKS macro is set when building
  wolfSSL, there is a potential heap over read of 5 bytes when handling TLS 1.3
  client connections. This heap over read is limited to wolfSSL builds
  explicitly setting the macro WOLFSSL_CALLBACKS, the feature does not get
  turned on by any other build options. The macro WOLFSSL_CALLBACKS is intended
  for debug use only, but if having it enabled in production, users are
  recommended to disable WOLFSSL_CALLBACKS. Users enabling WOLFSSL_CALLBACKS are
  recommended to update their version of wolfSSL. Thanks to Lucca Hirschi and
  Steve Kremer from LORIA, Inria and Max Ammann from Trail of Bits for finding
  and reporting the bug with the tlspuffin tool developed partly at LORIA and
  Trail of Bits. CVE 2022-42905

Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions
* Add function wolfSSL_CTX_load_system_CA_certs to load system CA certs into a
  WOLFSSL_CTX and --sys-ca-certs option to example client
* Add wolfSSL_set1_host to OpenSSL compatible API
* Added the function sk_X509_shift
* AES x86 ASM for AES-CBC and GCM performance enhancements
* Add assembly for AES for ARM32 without using crypto hardware instructions
* Xilinx Versal port and hardware acceleration tie in
* SP Cortex-M support for ICCARM

Enhancements
* Add snifftest vcxproj file and documentation
* Nucleus Thread Types supported
* Handle certificates with RSA-PSS signature that have RSAk public keys
* Small stack build improvements
* DTLS 1.3 improvements for Alerts and unit tests
* Add a binary search for CRL
* Improvement of SSL/CTX_set_max_early_data() for client side
* Remove unused ASN1_GENERALIZEDTIME enum value from wolfssl/ssl.h
* Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
* Add dtlscid.test to 窶藁ake check窶� unit testing
* Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt
* ForceZero enabled with USE_FAST_MATH
* Add TLS 1.3 support of ticketNonce sizes bigger than MAX_TICKET_NONCE_SZ
* FIPSv2 builds on win10 adjust for new fastmath default in settings.h
* Add IRQ install for Aruix example

Fixes
* When looking up the session by ID on the server, check that the protocol
  version of the SSL and session match on TLS 1.3 or not
* Fix for potential EVP_PKEY_DH memory leak with OPENSSL_EXTRA
* Curve448 32-bit C code: handle corner case
* Fixup builds using WOLFSSL_LOG_PRINTF
* Correct DIST_POINT_NAME type value
* Do not perform IV Wrap test when using cert3389 inlined armasm
* Fix for Linux kernel module and stdio.h
* (D)TLS: send alert on version mismatch
* Fix PKCS#7 SignedData verification when signer cert is not first in SET
* Fix bug with wolfIO_TcpConnect not working with timeout on Windows
* Fix output length bug in SP non-blocking ECC shared secret gen
* Fix build with enable-fastmath and disable-rsa
* Correct wolfSSL_sk_X509_new in OpenSSL compatible API
* Fixes for SP and x86_64 with MSVC
* Fix wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
* Fix redundant file include with TI RTOS build
* Fix wolfCrypt only build with wincrypt.h
* DTLS 1.2: Reset state when sending HelloVerifyRequest

(fox)

2022-10-01 12:00:31 UTC MAIN commitmail json YAML

doc: Updated chat/ircd-hybrid to 8.2.43

(fox)

2022-10-01 11:59:40 UTC MAIN commitmail json YAML

chat/ircd-hybrid: Update to 8.2.43

Changes since 8.2.42:

-- Noteworthy changes in version 8.2.43 (2022-09-26)
  * Due to ongoing protocol modernizations and deprecation of old backwards
    compatibility code, ircd-hybrid is now no longer link compatible to
    8.2.33 and below. As for the Anope IRC Services, 2.0.8 is the minimum
    supported version now.
  * Implemented channel mode `V`. `INVITE` cannot be used on channels with
    that mode set.
  * `WHOIS` on clients connected via TLS now also shows some details about
    the TLS version and cipher being used
  * Removed user mode `d` (debugging notices)

(fox)

2022-10-01 11:47:28 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.5.1

(fox)

2022-10-01 11:47:10 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.5.1

Changes since v5.5.0:

wolfSSL Release 5.5.1 (Sep 28, 2022) Latest

Vulnerabilities
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers
  using session ticket resumption. When built with --enable-session-ticket and
  making use of TLS 1.3 server code in wolfSSL, there is the possibility of a
  malicious client to craft a malformed second ClientHello packet that causes
  the server to crash. This issue is limited to when using both
  --enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3
  servers, and having --enable-session-ticket, should update to the latest
  version of wolfSSL. Thanks to Max at Trail of Bits for the report and
  "LORIA, INRIA, France" for research on tlspuffin.

New Feature Additions
* Add support for non-blocking ECC key gen and shared secret gen for
  P-256/384/521
* Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
* Port to NXP RT685 with FreeRTOS
* Add option to build post quantum Kyber API (--enable-kyber)
* Add post quantum algorithm sphincs to wolfCrypt
* Config. option to force no asm with SP build (--enable-sp=noasm)
* Allow post quantum keyshare for DTLS 1.3

Enhancements
* DTLSv1.3: Do HRR Cookie exchange by default
* Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
* Update ide win10 build files to add missing sp source files
* Improve Workbench docs
* Improve EVP support for CHACHA20_POLY1305
* Improve wc_SetCustomExtension documentation
* RSA-PSS with OCSP and add simple OCSP response DER verify test case
* Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h
* Don't over-allocate memory for DTLS fragments
* Add WOLFSSL_ATECC_TFLXTLS for Atmel port
* SHA-3 performance improvements with x86_64 assembly
* Add code to fallback to S/W if TSIP cannot handle
* Improves entropy with VxWorks
* Make time in milliseconds 64-bits for longer session ticket lives
* Support for setting cipher list with bytes
* wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements
* Add to RSAES-OAEP key parsing for pkcs7
* Add missing DN nid to work with PrintName()
* SP int: default to 16 bit word size when NO_64BIT defined
* Limit the amount of fragments we store per a DTLS connection and error out
  when max limit is reached
* Detect when certificate's RSA public key size is too big and fail on loading
  of certificate

Fixes
* Fix for async with OCSP non-blocking in ProcessPeerCerts
* Fixes for building with 32-bit and socket size sign/unsigned mismatch
* Fix Windows CMakeList compiler options
* TLS 1.3 Middle-Box compat: fix missing brace
* Configuration consistency fixes for RSA keys and way to force disable of
  private keys
* Fix for Aarch64 Mac M1 SP use
* Fix build errors and warnings for MSVC with DTLS 1.3
* Fix HMAC compat layer function for SHA-1
* Fix DTLS 1.3 do not negotiate ConnectionID in HelloRetryRequest
* Check return from call to wc_Time
* SP math: fix build configuration with opensslall
* Fix for async session tickets
* SP int mp_init_size fixes when SP_WORD_SIZE == 8
* Ed. function to make public key now checks for if the private key flag is set
* Fix HashRaw WC_SHA256_DIGEST_SIZE for wc_Sha256GetHash
* Fix for building with PSK only
* Set correct types in wolfSSL_sk_*_new functions
* Sanity check that size passed to mp_init_size() is no more than SP_INT_DIGITS

(fox)

2022-10-01 10:42:31 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.58

(fox)

2022-10-01 10:42:04 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.58

Changes since v1.57

v1.58 - 20.09.2022
- The windowed-sinc interpolator was reverted to 8 points at 8192 phases. It
  sounded better for certain lo-fi samples the way it used to be. The
  alias/distortion fix (v1.57) is still kept, for cleaner sound.
- Windows/macOS: Updated SDL from 2.0.22 to 2.24.0
- Fixed #ifdef hacks when using SDL 2.24.0 and later (new version number scheme)

(fox)

2022-10-01 09:47:29 UTC MAIN commitmail json YAML

doc: Updated audio/din to 55

(fox)

2022-10-01 09:46:56 UTC MAIN commitmail json YAML

audio/din: Update to 55

Fix build in Darwin.

Changes since 54:

DIN Is Noise 55:
  /*
      an overhaul of Gravity

      as before, you can click and move the base or
      the tip of the gravity arrow to adjust its position,
      direction and strength.

      to (auto) animate the gravity arrow:

        assign a drone to base of gravity
        assign another drone to tip of gravity

        move or visual FM / AM modulate one or both these drones
        and gravity moves accordingly.

        animating gravity influences the trajectory of launched
        drones :)

      click 'Base to manual' and 'Tip to manual' to detach
      assigned drones from base and the tip respectively.

      you can now manually edit the base and tip again.

      click 'Select base', 'Select tip' or 'Select both'
      to select the assigned drones. Useful for moving,
      for visual AM/FM, to mute them etc.

      eg., you could mute the assigned drones by clicking
      'Select both' and then Menu > Drone Tools > Mute

  /*

  /* adjust position/phase of visual drone modulation (AM and FM)

      Menu > Drone Params > AM Position
      Menu > Drone Params > FM Position

      eg., at 0 position with AM and FM BPMs equal, the trail/path
      of the modulating drones is elliptical.

  /* set AM BPM to FM BPM of drones and vice-versa
  /* flip velocity direction of launched drone with respect to the launcher
    if -ve flag is set in drone velocity defaults
  /* opacity parameter for oscilloscope
  * optimised oscilloscope
    * faster sample add
    * faster drawing
  * changed shape of drone handles
  * optimised snap lines drawing on curve editors
  ! fixed OpenGL drawing bugs for affected OpenGL drivers on Windows !
    ! in oscilloscope !
    ! in waveform display on waveform editors !
    ! when hz/vol displayed on drones !
  ! fixed crash if drones as they are fading in when creating drone mesh
    are modulated or moved !

(fox)

2022-09-17 18:54:25 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.22.1

(fox)

2022-09-17 18:53:33 UTC MAIN commitmail json YAML

textproc/bat: Update to 0.22.1

Changes since 0.21.0:

v0.22.1
Bugfixes

  * Bring back pre-processing of ANSI escape characters to so that some
    common bat use cases starts working again. See #2308 (@Enselic)

v0.22.0
Features

  * Make the default macOS theme depend on Dark Mode. See #2197, #1746
    (@Enselic)
  * Support for separate system and user config files. See #668
    (@patrickpichler)

Bugfixes

  * Prevent fork nightmare with PAGER=batcat. See #2235 (@johnmatthiggins)
  * Make --no-paging/-P override --paging=... if passed as a later arg, see
    #2201 (@themkat)
  *  --map-syntax and --ignored-suffix now works together, see #2093 (@czzrr)
  * Strips byte order mark from output when in non-loop-through mode.
    See #1922 (@dag-h)

Other

  * Relaxed glibc requirements on amd64, see #2106 and #2194 (@sharkdp)
  * Improved fish completions. See #2275 (@zgracem)
  * Stop pre-processing ANSI escape characters. Syntax highlighting on ANSI
    escaped input is not supported. See #2185 and #2189 (@Enselic)

Syntaxes

  * NSE (Nmap Scripting Engine) is mapped to Lua, see #2151 (@Cre3per)
  * Correctly color fstab dump and pass fields, see #2246 (@yuvalmo)
  * Update Command Help syntax, see #2255
  * Julia: Fix syntax highlighting for function name starting with struct,
    see #2230
  * Minor update to LiveScript, see #2291
  * Associate .mts and .cts files with the TypeScript syntax. See #2236
    (@kidonng)
  * Fish history is mapped to YAML. See #2237 (@kidonng)

bat as a library

  * Make bat::PrettyPrinter::syntaxes() iterate over new bat::Syntax struct
    instead of &syntect::parsing::SyntaxReference. See #2222 (@Enselic)
  * Clear highlights after printing, see #1919 and #1920 (@rhysd)

(fox)

2022-09-05 12:47:10 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.57

(fox)

2022-09-05 12:46:37 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.57

Changes since v1.56

v1.57 - 04.09.2022
- macOS: Fixed problems with not being able to record/sample audio (again)
- Fixed some aliasing issues in the windowed-sinc interpolator (deltas > 1.5)
- The windpowed-sinc interpolator now has 16 points instead of 8, and double
  the phase precision. This should increase the audio quality, but could also
  make the program run slower on very low end systems (like a Pi, for example).

(fox)

2022-09-04 08:42:22 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.5.0

(fox)

2022-09-04 08:41:57 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.5.0

Changes since v5.4.0:

wolfSSL Release 5.5.0 (Aug 30, 2022)

Note:
** If not free窶冓ng FP_ECC caches per thread by calling wc_ecc_fp_free there is a
  possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
  to confirm they are free窶冓ng FP_ECC caches per thread if enabled to avoid
  this issue.

Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
* [Low] Fault injection attack on RAM via Rowhammer leads to ECDSA key
  disclosure. Users doing operations with private ECC keys such as server side
  TLS connections and creating ECC signatures, who also have hardware that could
  be targeted with a sophisticated Rowhammer attack should update the version of
  wolfSSL and compile using the macro WOLFSSL_CHECK_SIG_FAULTS. Thanks to Yarkin
  Doroz, Berk Sunar, Koksal Must, Caner Tol, and Kristi Rahman all affiliated
  with the Vernam Applied Cryptography and Cybersecurity Lab at Worcester
  Polytechnic Institute for the report.
* [Low] In wolfSSL version 5.3.0 if compiled with --enable-session-ticket and
  the client has non-empty session cache, with TLS 1.2 there is the possibility
  of a man in the middle passing a large session ticket to the client and
  causing a crash due to an invalid free. There is also the potential for a
  malicious TLS 1.3 server to crash a client in a similar manner except in TLS
  1.3 it is not susceptible to a man in the middle attack. Users on the client
  side with 窶兎nable-session-ticket compiled in and using wolfSSL version 5.3.0
  should update their version of wolfSSL. Thanks to Max at Trail of Bits for the
  report and "LORIA, INRIA, France" for research on tlspuffin.
* [Low] If using wolfSSL_clear to reset a WOLFSSL object (vs the normal
  wolfSSL_free/wolfSSL_new) it can result in runtime issues. This exists with
  builds using the wolfSSL compatibility layer (--enable-opnesslextra) and only
  when the application is making use of wolfSSL_clear instead of
  SSL_free/SSL_new. In the case of a TLS 1.3 resumption, after continuing to use
  the WOLFSSH object after having called wolfSSL_clear, an application could
  crash. It is suggested that users calling wolfSSL_clear update the version of
  wolfSSL used. Thanks to Max at Trail of Bits for the report and "LORIA, INRIA,
  France" for research on tlspuffin.
* Potential DoS attack on DTLS 1.2. In the case of receiving a malicious
  plaintext handshake message at epoch 0 the connection will enter an error
  state reporting a duplicate message. This affects both server and client
  side. Users that have DTLS enabled and in use should update their version of
  wolfSSL to mitigate the potential for a DoS attack.

New Feature Additions
* QUIC support added, for using wolfSSL with QUIC implementations like ngtcp2
* SE050 port additions and fixes
* Added support for Dilithium post quantum algorithm use with TLS
* Support for RSA-PSS signed certificates
* Support for Infineon AURIX IDE
* Add Zephyr support for nRF5340 with CryptoCell-312

Enhancements
* Expanded ABI support by 50 APIs to include wolfCrypt and Certificates making a
  total of 113 ABIs controlled and maintained
* DTLS 1.3 partial support for ConnectionID as described by RFC9146 and RFC9147
* Added support for X509_CRL_print function
* Remove deprecated algorithms in Renesas cs+ project
* Support more build options disable/enable with i.MX CAAM build
* wolfSSL_CTX_set_options and wolfSSL_CTX_get_options functions added to non
  compatibility layer builds
* TFM: change inline x86 asm code to compile with clang
* Improvements to error queue and fix for behavior of wolfSSL_ERR_get_error
* scripts/makedistsmall.sh script added for creating a small source/header only
  package
* TLS 1.3: restrict extension validity by message, Extensions ServerName,
  SupportedGroups and ALPN must not appear in server_hello
* Add liboqs integration to CMake build system
* Adds wolfSSL_PEM_read_RSAPrivateKey() to the OpenSSL compatible API
* Added support for P384 pre-share in bundled example server
* Replace clz assembly instruction in ARM 32 builds when not supported
* Integrate chacha20-poly1305 into the EVP interface
* Additional validation that extensions appear in correct messages
* Allow SAN to be critical with ASN template build
* Support wolfSSL_CTX_set1_curves_list being available when X25519 and/or X448
  only defined
* Adds wolfSSL_PEM_read_RSA_PUBKEY() to the OpenSSL compatible API
* Match OpenSSL self signed error return with compatibility layer build
* Added wolfSSL_dtls_create_peer and wolfSSL_dtls_free_peer to help with Python
  and Go wrappers for DTLS

Fixes
* DTLS 1.3 asynchronous use case fixes
* Fix handling of counter to support incrementing across all bytes in ARM crypto
  asm
* Fixes for ED25519/ED448 private key with public key export (RFC8410)
* Fix for build with NO_TLS macro
* Fix for write dup function to copy over TLS version
* Fix to handle path lengths of 0 when checking certificate CA path lengths
* Fix for CMake not installing sp_int.h for SP math all
* When WOLFSSL_VALIDATE_ECC_IMPORT is defined ECC import validates private key
  value is less than order
* PSA crypto fixes
* Fix for not having default pkcs7 signed attributes
* DTLS socket and timeout fixes
* SP int: exptmod ensure base is less than modulus
* Fix for AddPacketInfo with WOLFSSL_CALLBACKS to not pass encrypted TLS 1.3
  handshake messages to callbacks
* Fix for sniffer to ensure the session was polled before trying to reprocess it

(fox)

2022-09-04 08:25:34 UTC MAIN commitmail json YAML

doc: Updated chat/ircd-hybrid to 8.2.42

(fox)

2022-09-04 08:25:09 UTC MAIN commitmail json YAML

chat/ircd-hybrid: Update to 8.2.42

Changes since 8.2.41:

-- Noteworthy changes in version 8.2.42 (2022-08-28)
  * Added support for reproducible builds using the `SOURCE_DATE_EPOCH` environment
    variable. See https://reproducible-builds.org/docs/source-date-epoch/ for more
    information.
  * Extban `$Q` of type acting has been implemented. This extban prevents
    matching users from using the `KICK` command.
  * Implemented channel mode `Q`. `KICK` cannot be used on channels with that mode set.
  * Implemented user mode `Z`. Users with that mode set may only receive private
    messages from other users that are connected via TLS.
  * Fixed issue where `WHO nick` on invisible clients (user mode i`) wouldn't work

(fox)

2022-08-21 04:09:29 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 1.1.0

(fox)

2022-08-21 04:08:50 UTC MAIN commitmail json YAML

www/jira-cli: Update to 1.1.0

Changes since 1.0.0:

This release fixes the issue with screen flickering and insecure TLS config +
adds some features.

## What's added?
- feat: Ability to add worklog by @ankitpokhrel in #410
- feat: Make selection highlight customizable by @ankitpokhrel in #419

## What's fixed?
- fix: Flickering issue by @ankitpokhrel in #436
- fix: Issue with insecure TLS config by @ankitpokhrel in #413
- fix: Issue with default assignee and unassign from tui by @ankitpokhrel in
  #405
- fix(minor): Use pointer receiver to avoid heavy copying by @ankitpokhrel
  in #426

## Other notable changes
- ehc: Increase max col width + some cleanup by @ankitpokhrel in #427
- chore: Remove deprecated ioutil usage by @ankitpokhrel in #422

New Contributors
- @stavares843 made their first contribution in #423

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.0.0...v1.1.0

(fox)

2022-08-08 09:28:39 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.2.7

(fox)

2022-08-08 09:28:06 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.2.7

Changes since 3.2.6.4:

===============
Version 3.2.7
===============

Enhancements:

    * Config to disable all plugins by default (or enable an exclusive list) #2089
    * Keybind(s) for modifying nice level #2081
    * [WEBUI] Reorganize help screen #2037
    * Add a Json stdout option #2060
    * Improve error message when export error occures
    * Improve error message when MQTT error occures
    * Change the way core are displayed
    * Remove unused key in the process list
    * Refactor top menu of the curse interface
    * Improve Irix display for the load plugin

Bug corrected:

    * In the sensor plugin thresholds in the configuration file should overwrite system ones #2058
    * Drive names truncated in Web UI #2055
    * Correct issue with CPU label

Documentation and CI:

    * Improve makefile help #2078
    * Add quote to the update command line (already ok for the installation). Related to #2073
    * Make Glances (almost) compliant with REUSE #2042
    * Update README for Debian package users
    * Update documentation for Docker
    * Update docs for new shortcut
    * Disable Pyright on the Git actions pipeline
    * Refactor comments
    * Except datutil import error
    * Another dep issue solved in the Alpine Docker + issue in the outdated method

Contributors for this version:

    * Nicolargo
    * Sylvain MOUQUET
    * FastThenLeft
    * Jiajie Chen
    * dbrennand
    * ewuerger

(fox)

2022-08-08 09:00:28 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.56

(fox)

2022-08-08 08:58:42 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.56

Changes since v1.55

v1.56 - 11.07.2022
- Fixed some possible issues with fullscreen in Linux (still buggy)
- Fixed some issues with restoring the window size and image stretch mode when
  loading or resetting the config when the program is running.
- Bugfix: Focus was lost when drag-n-dropping a file onto the tracker,
  which meant that the first following mouse click was ignored.
- Windows/macOS: Updated SDL from 2.0.20 to 2.0.22

(fox)

2022-08-08 08:20:56 UTC MAIN commitmail json YAML

doc: Updated chat/ircd-hybrid to 8.2.41

(fox)

2022-08-08 08:17:18 UTC MAIN commitmail json YAML

chat/ircd-hybrid: Update to 8.2.41

Changes since 8.2.40:

-- Noteworthy changes in version 8.2.41 (2022-07-15)
  * Fixed issue where WHO didn't work on channel names with two or more
    consequent asterisk characters
  * IRCv3 WHOX has been implemented. See doc/who.txt for more information
    about the new WHO options and features.
  * Clients that are connected via TLS are now flagged with the letter S in
    the who reply

(fox)

2022-08-08 08:15:36 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.4.0

(fox)

2022-08-08 08:03:46 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.4.0

Changes since v5.3.0:

wolfSSL Release 5.4.0 (July 11, 2022)

Note:
** Future releases of wolfSSL will turn off TLS 1.1 by default
** Release 5.4.0 made SP math the default math implementation. To make an
  equivalent build as 窶電isable-fastmath from previous versions of wolfSSL, now
  requires using the configure option 窶兎nable-heapmath instead.

Release 5.4.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities

* [High] Potential for DTLS DoS attack. In wolfSSL versions before 5.4.0 the
  return-routability check is wrongly skipped in a specific edge case. The check
  on the return-routability is there for stopping attacks that either consume
  excessive resources on the server, or try to use the server as an amplifier
  sending an excessive amount of messages to a victim IP. If using DTLS 1.0/1.2
  on the server side users should update to avoid the potential DoS
  attack. CVE-2022-34293
* [Medium] Ciphertext side channel attack on ECC and DH operations. Users on
  systems where rogue agents can monitor memory use should update the version of
  wolfSSL and change private ECC keys. Thanks to Sen Deng from Southern
  University of Science and Technology (SUSTech) for the report.
* [Medium] Public disclosure of a side channel vulnerability that has been fixed
  since wolfSSL version 5.1.0. When running on AMD there is the potential to
  leak private key information with ECDSA operations due to a ciphertext side
  channel attack. Users on AMD doing ECDSA operations with wolfSSL versions less
  than 5.1.0 should update their wolfSSL version used. Thanks to professor
  Yinqian Zhang from Southern University of Science and Technology (SUSTech),
  his Ph.D. student Mengyuan Li from The Ohio State University, and his M.S
  students Sen Deng and Yining Tang from SUStech along with other collaborators;
  Luca Wilke, Jan Wichelmann and Professor Thomas Eisenbarth from the University
  of Lubeck, Professor Shuai Wang from Hong Kong University of Science and
  Technology, Professor Radu Teodorescu from The Ohio State University, Huibo
  Wang, Kang Li and Yueqiang Cheng from Baidu Security and Shoumeng Yang from
  Ant Financial Services Group.
CVE-2020-12966
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
CVE-2021-46744
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033

New Feature Additions

DTLS 1.3

* Support for using the new DTLSv1.3 protocol was added
* Enhancements to bundled examples for an event driven server with DTLS 1.3 was
  added

Ports

* Update for the version of VxWorks supported, adding in support for version 6.x
* Support for new DPP and EAP-TEAP/EAP-FAST in wpa_supplicant
* Update for TSIP version support, adding support for version 1.15 for RX65N and
  RX72N
* Improved TSIP build to handle having the options WOLFSSL_AEAD_ONLY defined or
  NO_AES_CBC defined
* Added support for offloading TLS1.3 operations to Renesas RX boards with TSIP

Misc.

* Constant time improvements due to development of new constant time tests
* Initial translation of API headers to Japanese and expansion of Japanese help
  message support in example applications
* Add support for some FPKI (Federal PKI) certificate cases, UUID, FASC-N, PIV
  extension for use with smart cards
* Add support for parsing additional CSR attributes such as unstructured name
  and content type
* Add support for Linux getrandom() when defining the macro WOLFSSL_GETRANDOM
* Add TLS 1.2 ciphersuite ECDHE_PSK_WITH_AES_128_GCM_SHA256 from RFC 8442
* Expand CAAM support with QNX to include i.MX8 boards and add AES-CTR support
* Enhanced glitching protection by hardening the TLS encrypt operations

Math and Performance

SP Math Additions

* Support for ARMv3, ARMv6 and ARMv7a
    - Changes and improvements to get SP building for armv7-a
    - Updated assembly for moving large immediate values on ARMv6
    - Support for architectures with no ldrd/strd and clz
* Reworked generation using common asm ruby code for 32bit ARM
* Enable wolfSSL SP math all by default (sp_int.c)
* Update SP math all to not use sp_int_word when SQR_MUL_ASM is available

SP Math Fixes

* Fixes for constant time with div function
* Fix casting warnings for Windows builds and assembly changes to support
  XMM6-15 being non-volatile
* Fix for div_word when not using div function
* Fixes for user settings with SP ASM and ED/Curve25519 small
* Additional Wycheproof tests ran and fixes
* Fix for SP math ECC non-blocking to always check `hashLen`
* Fix for SP math handling edge case with submod

Improvements and Optimizations

Compatibility Layer

* Provide access to "Finished" messages outside of compatibility layer builds
* Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive
* Fix control command issues with AES-GCM, control command EVP_CTRL_GCM_IV_GEN
* Add support for importing private only EC key to a WOLFSSL_EVP_PKEY struct
* Add support for more extensions to wolfSSL_X509_print_ex
* Update for internal to DER (i2d) AIPs to move the buffer pointer when passed
  in and the operation is successful
* Return subject and issuer X509_NAME object even when not set

Ports

* Renesas RA6M4 example update and fixes
* Support multi-threaded use cases with Renesas SCE protected mode and TSIP
* Add a global variable for heap-hint for use with TSIP
* Changes to support v5.3.0 cube pack for STM32
* Use the correct mutex type for embOS
* ESP-IDF build cleanup and enhancements, adding in note regarding ESP-IDF
  Version
* Support for SEGGER embOS and emNET
* Fix to handle WOLFSSL_DTLS macro in Micrium build

Build Options

* Support for verify only and no-PSS builds updated
* Add the enable options wolfssh (mapped to the existing 窶兎nable-ssh)
* Remove WOLFSSL_ALT_NAMES restriction on notBefore/notAfter use in Cert struct
* Move several more definitions outside the BUILDING_WOLFSSL gate with linux
  kernel module build
* Modify --enable-openssh to not enable non-FIPS algos for FIPS builds
* Remove the Python wrappers from wolfSSL source (use pip install instead of
  using wolfSSL with Python and our separate Python repository)
* Add --enable-openldap option to configure.ac for building the OpenLDAP port
* Resolve DTLS build to handle not having 窶兎nable-hrrcookie when not needed
* Add an --enable-strongswan option to configure.ac for building the Strongswan
  port
* Improve defaults for 64-bit BSDs in configure
* Crypto only build can now be used openssl extra
* Update ASN template build to properly handle WOLFSSL_CERT_EXT and
  HAVE_OID_ENCODING
* Allow using 3DES and MD5 with FIPS 140-3, as they fall outside of the FIPS
  boundary
* Add the build option --enable-dh=const which replaces setting the macro
  WOLFSSL_DH_CONST and now conditionally link to -lm as needed
* Add the macro WOLFSSL_HOSTNAME_VERIFY_ALT_NAME_ONLY which is used to verify
  hostname/ip address using alternate name (SAN) only and does not use the
  common name
* WOLFSSL_DTLS_NO_HVR_ON_RESUME macro added (off by default to favor more
  security). If defined, a DTLS server will not do a cookie exchange on
  successful client resumption: the resumption will be faster (one RTT less) and
  will consume less bandwidth (one ClientHello and one HelloVerifyRequest
  less). On the other hand, if a valid SessionID is collected, forged
  clientHello messages will consume resources on the server.
* Misc.
* Refactoring of some internal TLS functions to reduce the memory usage
* Make old less secure TimingPadVerify implementation available
* Add support for aligned data with clang LLVM
* Remove subject/issuer email from the list of alt. Email names in the
  DecodedCerts struct
* Zeroizing of pre-master secret buffer in TLS 1.3
* Update to allow TLS 1.3 application server to send session ticket
* Improve the sniffer asynchronous test case to support multiple concurrent
  streams
* Clean up wolfSSL_clear() and add more logging
* Update to not error out on bad CRL next date if using NO_VERIFY when parsing
* Add an example C# PSK client
* Add ESP-IDF WOLFSSL_ESP8266 setting for ESP8266 devices
* Support longer sigalg list for post quantum use cases and inter-op with OQS's
  OpenSSL fork
* Improve AES-GCM word implementation of GMULT to be constant time
* Additional sanity check with Ed25519/Ed448, now defaults to assume public key
  is not trusted
* Support PSK ciphersuites in benchmark apps
* FIPS in core hash using SHA2-256 and SHA2-384
* Add ability to store issuer name components when parsing a certificate
* Make the critical extension flags in DecodedCert always available
* Updates to the default values for basic constraint with X509窶冱
* Support using RSA OAEP with no malloc and add additional sanity checks
* Leverage async code paths to support WANT_WRITE while sending packet fragments
* New azsphere example for continuous integration testing
* Update RSA key generation function to handle pairwise consistency tests with
  static memory pools used
* Resolve build time warning by passing in and checking output length with
  internal SetCurve function
* Support DTLS bidirectional shutdown in the examples
* Improve DTLS version negotiation and downgrade capability

General Fixes

* Fixes for STM32 Hash/PKA, add some missing mutex frees, and add an additional
  benchmark
* Fix missing return checks in KSDK ED25519 code
* Fix compilation warnings from IAR
* Fixes for STM32U5/H7 hash/crypto support
* Fix for using track memory feature with FreeRTOS
* Fixup XSTR processing for MICRIUM
* Update Zephyr fs.h path
* DTLS fixes with WANT_WRITE simulations
* Fixes for BER use with PKCS7 to have additional sanity checks and guards on
  edge cases
* Fix to handle exceptional edge case with TFM mp_exptmod_ex
* Fix for stack and heap measurements of a 32-bit build
* Fix to allow enabling AES key wrap (direct) with KCAPI
* Fix --enable-openssh FIPS detection syntax in configure.ac
* Fix to move wolfSSL_ERR_clear_error outside gate for OPENSSL_EXTRA
* Remove MCAPI project's dependency on zlib version
* Only use __builtin_offset on supported GCC versions (4+)
* Fix for c89 builds with using WOLF_C89
* Fix 64bit postfix for constants building with powerpc
* Fixed async Sniffer with TLS v1.3, async removal of `WC_HW_WAIT_E` and
  sanitize leak
* Fix for QAT ECC to gate use of HW based on marker
* Fix the supported version extension to always check minDowngrade
* Fix for TLS v1.1 length sanity check for large messages
* Fixes for loading a long DER/ASN.1 certificate chain
* Fix to expose the RSA public DER export functions with certgen
* Fixes for building with small version of SHA3
* Fix configure with WOLFSSL_WPAS_SMALL
* Fix to free PKCS7 recipient list in error cases
* Sanity check to confirm ssl->hsHashes is not NULL before attempting to
  dereference it
* Clear the leftover byte count in Aes struct when setting IV

(fox)

2022-07-05 10:45:52 UTC MAIN commitmail json YAML

doc: Updated chat/ircd-hybrid to 8.2.40

(fox)

2022-07-05 10:45:30 UTC MAIN commitmail json YAML

chat/ircd-hybrid: Updates to 8.2.40

Changes since 8.2.39:

-- Noteworthy changes in version 8.2.40 (2022-07-02)
* 'channel::disable_fake_channels' now also blocks strikethrough text (0x1E (30))
* 'KNOCK' can now be used on private channels. Channel mode 'K' may be used instead
  to control whether or not 'KNOCK' is allowed on a channel.
* Support for '/dev/poll' has been dropped
* 'INFO' now also reports configured values of 'channel::default_join_flood_count'
  and 'channel::default_join_flood_time'
* The founder 'q' and admin 'a' channel prefix modes have been implemented.
  These are optional and can be enabled with the new 'channel::enable_owner'
  and 'channel::enable_admin' configuration directives.
* Channel half-ops may now kick other half-ops
* Extban '$K' of type acting has been implemented. This extban prevents
  matching users from using the 'KNOCK' command.
* Server-side channel mode locking 'MLOCK' has been implemented
* Fixed server name leak in 'WHOWAS' with 'serverhide::hide_services' enabled

(fox)

2022-07-05 10:42:53 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 1.0.0

(fox)

2022-07-05 10:42:23 UTC MAIN commitmail json YAML

www/jira-cli: Update to 1.0.0

Changes since 0.3.0:

We reached v1.0.0

## Breaking changes
- fix!: Replace limit flag with paginate by @ankitpokhrel in #359
- fix!: Append components on edit instead of overriding by @ankitpokhrel in #368
- feat!: Append label to an issue, show labels at issue list view by @stchar in #300
- refactor!: Move boards and project list to subcommand by @ankitpokhrel in #314

## What's added?
- feat: Support custom fields on issue create by @ankitpokhrel in #319
- feat: Add support to read from .netrc by @adolsalamanca in #329
- feat: Add support for OS keyrings/-chains by @boyvanamstel in #348
- feat: Support auth with personal access tokens by @marek-veber / @ankitpokhrel in #327
- feat: Allow to set fixVersions on issue creation by @ankitpokhrel in #276
- feat: Allow insecure TLS by @ankitpokhrel in #305
- feat: Add --no-browser option to open cmd by @ankitpokhrel in #308
- feat: Add search option for boards on jira init by @ankitpokhrel in #322
- feat: Add issues unlink command by @sushilkg in #347
- feat: Support refresh for issues list by @GZLiew in #325
- feat: Ability to delete issue by @ankitpokhrel in #336
- feat: Allow to set custom fields on epic create by @ankitpokhrel in #364
- feat: Allow to edit release-info/fixVersions by @ankitpokhrel in #365
- feat: Allow removing labels on edit by @ankitpokhrel in #371
- feat: Support creating issues with custom subtask type by @danobi in #372
- feat: Allow removing component on edit by @ankitpokhrel in #374
- feat: Allow removing fixVersions on edit by @ankitpokhrel in #376
- feat: Support custom fields on issue edit by @ankitpokhrel in #377
- feat: Jira init non-interactive by @ankitpokhrel in #381
- feat: Show subtasks in issue view by @ankitpokhrel in #382
- feat: Allow project filter in raw jql by @ankitpokhrel in #395

## What's fixed?
- fix: Makefile compatiblity with Make 3.81 by @danmichaelo in #252
- fix: Config generation issue by @ankitpokhrel in #275
- fix(cfg): Strip trailing slash on server name by @ankitpokhrel in #295
- fix: Jira client should respect timeout opt by @ankitpokhrel in #304
- fix: Respect GLAMOUR_STYLE env on issue view by @ankitpokhrel in #317
- fix: Get subtask handle from config by @ankitpokhrel in #296
- fix: Jira wiki parser by @ankitpokhrel in #326
- fix: Display correctly columns in list sprint command help by @adolsalamanca in #320
- fix: Panic on empty sub-list by @ankitpokhrel in #330
- fix: Issue with assigning user by @ankitpokhrel in #321
- fix: OOM bug on issue view by @ankitpokhrel in #350
- fix: Assign parent key as is on edit by @ankitpokhrel in #351
- fix: Add additional check for total boards returned by @ankitpokhrel in #360
- fix: Issue with query param in user assignment by @ankitpokhrel in #380
- fix: Subtask clone by @ankitpokhrel in #383
- fix: editing issue with custom field in non interactive mode by @DrudgeRajen in #391

## Dependency updates
- dep: Upgrade charmbracelet/glamour to 0.5.0 by @ankitpokhrel in #309
- dep: Upgrade rivo/tview to latest by @ankitpokhrel in #310
- dep: Upgrade outdated packages by @ankitpokhrel in #311
- dep: Upgrade cobra to 1.4.0 by @ankitpokhrel in #373

## Other notable changes
- Use md ext for tmp file to trigger vim syntax by @ElementalWarrior in #318

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v0.3.0...v1.0.0

(fox)

2022-06-20 02:30:42 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.55

(fox)

2022-06-20 02:30:10 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to 1.55

Changes since v1.54

v1.55 - 14.06.2022
- Fixed crash when using "Copy smp." on an empty dest. or source instrument
- Fixed: Using "Copy Ins." on an empty source instrument resulted in a
  non-sensical system message.
- Reset pattern loop states on "Play Song", fixes a potential bug

(fox)

2022-06-08 06:12:18 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.2.6.4

(fox)

2022-06-08 06:11:34 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.2.6.4

Changes since 3.2.5:

===============
Version 3.2.6
===============

Enhancement requests:

    * Create a Show option in the configuration file to only show some stats #2052
    * Use glances.conf file inside docker-compose folder for Docker images
    * Optionally disable public ip #2030
    * Update public ip at intervals #2029

Bug corrected:

    * Unitary tests should run loopback interface #2051
    * Add python-datutil dep for Focker plugin #2045
    * Add venv to list of .PHONY in Makefile #2043
    * Glances API Documentation displays non valid json #2036

A big thanks to @RazCrimson for his contribution !

Thanks for others contributors:

    * Steven Conaway
    * aekoroglu

(fox)

2022-05-14 15:41:46 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.21.0

(fox)

2022-05-14 15:41:06 UTC MAIN commitmail json YAML

textproc/bat: Updates to 0.21.0

Changes since 0.20.0:

v0.21.0
Features

  * Correctly render tab stops in --show-all, see #2038 (@Synthetica9)
  * Add a --style=default option and make it the default. It is less verbose
    than full, see #2061 (@IsaacHorvath)
  * Enable BusyBox less as pager, see #2162 (@nfisher1226)
  * File extensions are now matched case-insensitively. See #1854, #2181
    (@Enselic)

Bugfixes

  * Bump regex dependency from 1.5.4 to 1.5.5 to fix CVE-2022-24713, see #2145,
    #2139 (@Enselic)
  * bat no longer crashes when encountering files that references missing
    syntaxes. See #915, #2181 (@Enselic)

Performance

  * Skip syntax highlighting on long lines (> 16384 chars) to help improve
    performance. See #2165 (@keith-hall)
  * Vastly improve startup time by lazy-loading syntaxes via syntect 5.0.0. This
    makes bat display small files ~75% faster than before. See #951, #2181
    (@Enselic)

Other

  * Include info about custom assets in --diagnostics if used. See #2107, #2144
    (@Enselic)

Syntaxes

  * Mapped clang-format config file (.clang-format) to YAML syntax
    (@TruncatedDinosour)
  * log syntax: improved handling of escape characters in double quoted
    strings. See #2123 (@keith-hall)
  * Associate /var/spool/mail/* and /var/mail/* with the Email syntax. See #2156
    (@cyqsimon)
  * Added cmd-help syntax to scope --help messages. See #2148 (@victor-gp)
  * Slightly adjust Zig syntax. See #2136 (@Enselic)
  * Associate .inf files with the INI syntax. See #2190 (@Enselic)

Themes
bat as a library

  * Allow configuration of show_nonprintable with PrettyPrinter, see #2142
  * The binary format of syntaxes.bin has been changed due to syntaxes now being
    lazy-loaded via syntect 5.0.0. See #2181 (@Enselic)
  * Mark bat::error::Error enum as #[non_exhaustive] to allow adding new
    variants without future semver breakage. See #2181 (@Enselic)
  * Change Error::SyntectError(syntect::LoadingError) to
    Error::SyntectError(syntect::Error). See #2181 (@Enselic)
  * Add Error::SyntectLoadingError(syntect::LoadingError) enum variant. See
    #2181 (@Enselic)

(fox)

2022-05-07 16:38:12 UTC MAIN commitmail json YAML

doc: Updated sysutils/htop to 3.2.0

(fox)

2022-05-07 16:37:49 UTC MAIN commitmail json YAML

sysutils/htop: Update to 3.2.0

Changes since 3.1.2:

What's new in version 3.2.0

* Support for displaying multiple tabs in the user interface
* Allow multiple filter and search terms (logical OR, separate by "|")
* Set correct default sorting direction (defaultSortDesc)
* Improve performance for process lookup and update
* Rework the IOMeters initial display
* Removed duplicate sections on COMM and EXE
* Highlight process UNINTERRUPTIBLE_WAIT state (D)
* Show only integer value when CPU% more than 99.9%
* Handle rounding ambiguity between 99.9 and 100.0%
* No longer leaves empty the last column in header
* Fix header layout and meters reset if a header column is empty
* Fix PID and UID column widths off-by-one error
* On Linux, read generic sysfs batteries
* On Linux, do not collect LRS per thread (it is process-wide)
* On Linux, dynamically adjust the SECATTR and CGROUP column widths
* On Linux, fix a crash in LXD
* On FreeBSD, add support for showing process emulation
* On Darwin, lazily set process TTY name
* Always set SIGCHLD to default handling
* Avoid zombie processes on signal races
* Ensure last line is cleared when SIGINT is received
* Instead of SIGTERM, pre-select the last sent signal
* Internal Hashtable performance and sizing improvements
* Add heuristics for guessing LXC or Docker from /proc/1/mounts
* Force elapsed time display to zero if process started in the future
* Avoid extremely large year values when printing time
* Fix division by zero when calculating IO rates
* Fix out of boundary writes in XUtils
* Fix custom thread name display issue
* Use AC_CANONICAL_HOST, not AC_CANONICAL_TARGET in configure.ac
* Support libunwind of LLVM

(fox)

2022-05-07 08:11:21 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.2.5

(fox)

2022-05-07 08:06:51 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.2.5

Changes since 3.2.4.2:

===============
Version 3.2.5
===============

Enhancement requests:

    * Add a Accumulated per program function to the Glances process list needs
      test new feature plugin/ps #2015
    * Including battery and AC adapter health in Glances enhancement new feature
      #1049
    * Display uptime of a docker container enhancement plugin/docker #2004
    * Add a code formatter enhancement #1964

Bugs corrected:

    * Threading.Event.isSet is deprecated in Python 3.10 #2017
    * Fix code scanning alert - Clear-text logging of sensitive information
      security #2006
    * The gpu temperature unit are displayed incorrectly in web ui bug #2002
    * Doc for 'alert' Restfull/JSON API response documentation #1994
    * Show the spinning state of a disk documentation #1993
    * Web server status check endpoint enhancement #1988
    * --time parameter being ignored for client/server mode bug #1978
    * Amp with pipe do not work documentation #1976
    * glances_ip.py plugin relies on low rating / malicious site domain bug
      security #1975
    * "N" command freezes/unfreezes the current time instead of show/hide bug
      #1974
    * Missing commands in help "h" screen enhancement needs contributor #1973
    * Grafana dashboards not displayed with influxdb2 enhancement needs
      contributor #1960
    * Glances reports different amounts of used memory than free -m or top
      documentation #1924
    * Missing: Help command doesn't have info on TCP Connections bug
      documentation enhancement needs contributor #1675
    * Docstring convention documentation enhancement #940

Thanks for the bug report and the patch: @RazCrimson, @Karthikeyan Singaravelan,
@Moldavite, @ledwards

(fox)

2022-05-07 07:48:13 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.3.0

(fox)

2022-05-07 07:47:36 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.3.0

Changes since v5.2.0:

Release 5.3.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions
Ports

  * Updated support for Stunnel to version 5.61
  * Add i.MX8 NXP SECO use for secure private ECC keys and expand
    cryptodev-linux for use with the RSA/Curve25519 with the Linux CAAM driver
  * Allow encrypt then mac with Apache port
  * Update Renesas TSIP version to 1.15 on GR-ROSE and certificate signature
    data for TSIP / SCE example
  * Add IAR MSP430 example, located in IDE/IAR-MSP430 directory
  * Add support for FFMPEG with the enable option --enable-ffmpeg, FFMPEG is
    used for recording and converting video and audio (https://ffmpeg.org/)
  * Update the bind port to version 9.18.0

Post Quantum

  * Add Post-quantum KEM benchmark for STM32
  * Enable support for using post quantum algorithms with embedded STM32 boards
    and port to STM32U585

Compatibility Layer Additions

  * Add port to support libspdm
    (https://github.com/DMTF/libspdm/blob/main/README.md), compatibility
    functions added for the port were:
      - ASN1_TIME_compare
      - DH_new_by_nid
      - OBJ_length, OBJ_get0_data,
      - EVP layer ChaCha20-Poly1305, HKDF
      - EC_POINT_get_affine_coordinates
      - EC_POINT_set_affine_coordinates
  * Additional functions added were:
      - EC_KEY_print_fp
      - EVP_PKEY_paramgen
      - EVP_PKEY_sign/verify functionality
      - PEM_write_RSAPublicKey
      - PEM_write_EC_PUBKEY
      - PKCS7_sign
      - PKCS7_final
      - SMIME_write_PKCS7
      - EC_KEY/DH_up_ref
      - EVP_DecodeBlock
      - EVP_EncodeBlock
      - EC_KEY_get_conv_form
      - BIO_eof
      - Add support for BIO_CTRL_SET and BIO_CTRL_GET
  * Add compile time support for the type SSL_R_NULL_SSL_METHOD_PASSED
  * Enhanced X509_NAME_print_ex() to support RFC5523 basic escape
  * More checks on OPENSSL_VERSION_NUMBER for API prototype differences
  * Add extended key usage support to wolfSSL_X509_set_ext
  * SSL_VERIFY_FAIL_IF_NO_PEER_CERT now can also connect with compatibility
    layer enabled and a TLS 1.3 PSK connection is used
  * Improve wolfSSL_BN_rand to handle non byte boundaries and top/bottom
    parameters
  * Changed X509_V_ERR codes to better match OpenSSL values used
  * Improve wolfSSL_i2d_X509_name to allow for a NULL input in order to get the
    expected resulting size
  * Enhance the smallstack build to reduce stack size farther when built with
    compatibility layer enabled

Misc.

* Sniffer asynchronous support addition, handling of DH shared secret and
  tested with Intel QuickAssist
* Added in support for OCSP with IPv6
* Enhance SP (single precision) optimizations for use with the ECC P521
* Add new public API wc_CheckCertSigPubKey() for use to easily check the
  signature of a certificate given a public key buffer
* Add CSR (Certificate Signing Request) userId support in subject name
* Injection and parsing of custom extensions in X.509 certificates
* Add WOLF_CRYPTO_CB_ONLY_RSA and WOLF_CRYPTO_CB_ONLY_ECC to reduce code size
  if using only crypto callback functions with RSA and ECC
* Created new --enable-engine configure flag used to build wolfSSL for use with
  wolfEngine
* With TLS 1.3 PSK, when WOLFSSL_PSK_MULTI_ID_PER_CS is defined multiple IDs
  for a cipher suite can be handled
* Added private key id/label support with improving the PK (Public Key)
  callbacks
* Support for Intel QuickAssist ECC KeyGen acceleration
* Add the function wolfSSL_CTX_SetCertCbCtx to set user context for certificate
  call back
* Add the functions wolfSSL_CTX_SetEccSignCtx(WOLFSSL_CTX* ctx, void userCtx)
  and wolfSSL_CTX_GetEccSignCtx(WOLFSSL_CTX ctx) for setting and getting a user
  context
* wolfRand for AMD --enable-amdrand

Fixes
PORT Fixes

  * KCAPI memory optimizations and page alignment fixes for ECC, AES mode fixes
    and reduction to memory usage
  * Add the new kdf.c file to the TI-RTOS build
  * Fix wait-until-done in RSA hardware primitive acceleration of ESP-IDF port
  * IOTSafe workarounds when reading files with ending 0窶冱 and for ECC
    signatures

Math Library Fixes

  * Sanity check with SP math that ECC points ordinates are not greater than
    modulus length
  * Additional sanity checks that _sp_add_d does not error due to overflow
  * Wycheproof fixes, testing integration, and fixes for AVX / AArch64 ASM edge
    case tests
  * TFM fp_div_2_ct rework to avoid potential overflow

Misc.

  * Fix for PKCS#7 with Crypto Callbacks
  * Fix for larger curve sizes with deterministic ECC sign
  * Fixes for building wolfSSL alongside openssl using --enable-opensslcoexist
  * Fix for compatibility layer handling of certificates with SHA256 SKID (Subject Key ID)
  * Fix for wolfSSL_ASN1_TIME_diff erroring out on a return value of 0 from mktime
  * Remove extra padding when AES-CBC encrypted with PemToDer
  * Fixes for TLS v1.3 early data with async.
  * Fixes for async disables around the DevCopy calls
  * Fixes for Windows AES-NI with clang compiler
  * Fix for handling the detection of processing a plaintext TLS alert packet
  * Fix for potential memory leak in an error case with TLSX supported groups
  * Sanity check on input size in DecodeNsCertType
  * AES-GCM stack alignment fixes with assembly code written for AVX/AVX2
  * Fix for PK callbacks with server side and setting a public key

Improvements/Optimizations
Build Options and Warnings

  * Added example user settings template for FIPS v5 ready
  * Automake file touch cleanup for use with Yocto devtool
  * Allow disabling forced 'make clean' at the end of ./configure by using
    --disable-makeclean
  * Enable TLS 1.3 early data when specifying --enable-all option
  * Disable PK Callbacks with JNI FIPS builds
  * Add a FIPS cert 3389 ready option, this is the fips-ready build
  * Support (no)inline with Wind River Diab compiler
  * ECDH_compute_key allow setting of globalRNG with FIPS 140-3
  * Add logic equivalent to configure.ac in settings.h for Poly1305
  * Fixes to support building opensslextra with SP math
  * CPP protection for extern references to x86_64 asm code
  * Updates and enhancements for Espressif ESP-IDF wolfSSL setup_win.bat
  * Documentation improvements with auto generation
  * Fix reproducible-build for working an updated version of libtool, version
    2.4.7
  * Fixes for Diab C89 and armclang
  * Fix mcapi_test.c to include the settings.h before crypto.h
  * Update and handle builds with NO_WOLFSSL_SERVER and NO_WOLFSSL_CLIENT
  * Fix for some macro defines with FIPS 140-3 build so that
    RSA_PKCS1_PSS_PADDING can be used with RSA sign/verify functions

Math Libraries

  * Add RSA/DH check for even modulus
  * Enhance TFM math to handle more alloc failure cases gracefully
  * SP ASM performance improvements mostly around AArch64
  * SP ASM improvements for additional cache attack resistance
  * Add RSA check for small difference between p and q
  * 6-8% performance increase with ECC operations using SP int by improving the
    Montgomery Reduction

Testing and Validation

  * All shell scripts in source tree now tested for correctness using shellcheck
    and bash -n
  * Added build testing under gcc-12 and -std=c++17 and fixed warnings
  * TLS 1.3 script test improvement to wait for server to write file
  * Unit tests for ECC r/s zeroness handling
  * CI server was expanded with a very 窶徠uiet窶� machine that can support multiple
    ContantTime tests ensuring ongoing mitigation against side-channel timing
    based attacks. Algorithms being assessed on this machine are: AES-CBC,
    AES-GCM, CHACHA20, ECC, POLY1305, RSA, SHA256, SHA512, CURVE25519.
  * Added new multi configuration windows builds to CI testing for greater
    testing coverage of windows use-cases

Misc.

  * Support for ECC import to check validity of key on import even if one of the
    coordinates (x or y) is 0
  * Modify example app to work with FreeRTOS+IoT
  * Ease of access for cert used for verifying a PKCS#7 bundle
  * Clean up Visual Studio output and intermediate directories
  * With TLS 1.3 fail immediately if a server sends empty certificate message
  * Enhance the benchmark application to support multi-threaded testing
  * Improvement for wc_EccPublicKeyToDer to not overestimate the buffer size
    required
  * Fix to check if wc_EccPublicKeyToDer has enough output buffer space
  * Fix year 2038 problem in wolfSSL_ASN1_TIME_diff
  * Various portability improvements (Time, DTLS epoch size, IV alloc)
  * Prefer status_request_v2 over status_request when both are present
  * Add separate "struct stat" definition XSTATSTRUCT to make overriding XSTAT
    easier for portability
  * With SipHash replace gcc specific ASM instruction with generic
  * Don't force a ECC CA when a custom CA is passed with -A
  * Add peer authentication failsafe for TLS 1.2 and below
  * Improve parsing of UID from subject and issuer name with the compatibility
    layer by
  * Fallback to full TLS handshake if session ticket fails
  * Internal refactoring of code to reduce ssl.c file size

(fox)

2022-05-07 07:43:05 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.54

(fox)

2022-05-07 07:33:45 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to v1.53

Changes since v1.52

v1.53 - 20.04.2022
- Fixed stuck/invisible checkbox after leaving the "Layout" config screen

(fox)

2022-05-07 07:27:24 UTC MAIN commitmail json YAML

doc: Updated audio/din to 54

(fox)

2022-05-07 07:26:41 UTC MAIN commitmail json YAML

audio/din: Update to 54

Changes since 53.1:

DIN Is Noise 54:

  NEW in DIN54:

  /*
    Drones Per Launch and Launches Per Minute for drone launchers
      Until DIN53.1 you could launch only 1 drone per launch.
      In DIN54, you can launch a bunch of drones every launch with
      launches per minute.

      Change drones per launch / launches per minute of an existing
      launcher from Menu > Drone Params > Motion > Drones Per Launch or
      Menu > Drone Params > Motion > Launches Per Minute

      for new launcher set in defaults:

      Menu > Drone Params > Defaults > Drones Per Launch
        default = 1
      Menu > Drone Params > Defaults > Launches Per Minute
        default = 60

      Tip:

        When there are many drones launched every launch, they will all launch
        along the direction (of velocity) of the launcher.  Their trajectory will
        therefore overlap, turn on Menu > Drone Params > Defaults > Velocity | Randomize
        to randomize their launch directions
  /*

  /*
    drone velocity modulation:
      affects all launched drones
      specify how amount of velocity (actually the speed!) changes from birth to death of a drone
        default is constant ie no change from velocity (ie the speed) at birth
          this is the behaviour in DIN53.1

      edit the change curve from Menu > Editors > Drone velocity modulation
  /*
  /*
    in Gravity widget:
      Size:
          if turned ON, gravity size continuously expands or contracts to Mouse or
          (1st selected) Drone position !warning! Big gravity sizes can move drones
          fast to max volume and get loud!

      To Screen + : puts base of gravity vector to the center of the screen
      To drones + : puts base of gravity vector to the center (magenta arrow) of selected drones.
        To drone  : puts base of gravity vector to the (first) selected drone.
  /*

  /* save/load color sliders /*

  + draw gravity vector when UI is off
  * draw drone trails even if drones are off visible note / pitch ranges
  ! fixed: drones bounced only once irrespective of Menu > Drone Params > Defaults > Bounces parameter !
    ! bug introduced in DIN53 :( !
  ! fixed: potential (null pointer) crash when turning UI on/off from microtonal keyboard !
  ! fixed: sudden increase in loudness (sorry!) when frozen drones are deleted but then
          thawed, frozen and deleted again and again !
  ! fixed: restore oscilloscope display state when UI is turned off and on !
  ! fixed: timing (introduced in DIN53.1 due to change of alarm.cc/h) of auto split / delete boxes in mondrian !
  ! fixed: deleted drones not de-selected !

(fox)

2022-03-16 09:07:09 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.52

(fox)

2022-03-16 09:06:33 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to v1.52

Changes since v1.51

v1.52 - 27.02.2022
- Fix possible sample loop corruption on .MOD import, f.ex. "FARLAND.MOD"
- Hardware Performance Counter code refactoring (framerate handling without
  vsync, and scopes)

(fox)

2022-02-27 11:25:40 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.20.0

(fox)

2022-02-27 11:25:11 UTC MAIN commitmail json YAML

textproc/bat: Updates to 0.20.0

Changes since 0.19.0:

v0.20.0

Features

* New style component header-filesize to show size of the displayed file in the
  header. See #1988 (@mdibaiee)
* Use underline for line highlighting on ANSI, see #1730 (@mdibaiee)

Bugfixes

* Fix bash completion on bash 3.x and bash-completion 1.x. See #2066
  (@joshpencheon)

Syntaxes

* GraphQL: Add support for interfaces implementing interfaces and consider
  ampersand an operator. See #2000
* Associate _vimrc and _gvimrc files with the VimL syntax. See #2002
* Associate poetry.lock files with the TOML syntax. See #2049
* Associate .mesh, .task, .rgen, .rint, .rahit, .rchit, .rmiss, and .rcall with
  the GLSL syntax. See #2050
* Added support for JQ syntax, see #2072
* Properly associate global git config files rooted in $XDG_CONFIG_HOME/git/ or
  $HOME/.config/git/. See #2067 (@cyqsimon)

bat as a library

* Exposed get_syntax_set and get_theme methods on HighlightingAssets. See #2030
  (@dandavison)
* Added HeaderFilename and HeaderFilesize to StyleComponent enum, and mark it
  #[non_exhaustive]. See #1988 (@mdibaiee)

(fox)

2022-02-26 06:55:33 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.2.0

(fox)

2022-02-26 06:52:46 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.2.0

Changes since v5.1.1:

wolfSSL Release 5.2.0 (Feb 21, 2022)

Release 5.2.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [High] A TLS v1.3 server who requires mutual authentication can be
    bypassed. If a malicious client does not send the certificate_verify message
    a client can connect without presenting a certificate even if the server
    requires one. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
    Télécom SudParis.
  * [High] A TLS v1.3 client attempting to authenticate a TLS v1.3 server can
    have its certificate check bypassed. If the sig_algo in the
    certificate_verify message is different than the certificate message checking
    may be bypassed. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
    Télécom SudParis.

New Feature Additions

  *  Example applications for Renesas RX72N with FreeRTOS+IoT
  *  Renesas FSP 3.5.0 support for RA6M3
  *  For TLS 1.3, improved checks on order of received messages.
  *  Support for use of SHA-3 cryptography instructions available in ARMv8.2-A
    architecture extensions. (For Apple M1)
  *  Support for use of SHA-512 cryptography instructions available in ARMv8.2-A
    architecture extensions. (For Apple M1)
  *  Fixes for clang -Os on clang >= 12.0.0
  *  Expose Sequence Numbers so that Linux TLS (kTLS) can be configured
  *  Fix bug in TLSX_ALPN_ParseAndSet when using ALPN select callback.
  *  Allow DES3 with FIPS v5-dev.
  *  Include HMAC for deterministic ECC sign build
  *  Add --enable-chrony configure option. This sets build options needed to
    build the Chrony NTP (Network Time Protocol) service.
  *  Add support for STM32U575xx boards.
  *  Fixes for NXP’s SE050 Ed25519/Curve25519.
  *  TLS: Secure renegotiation info on by default for compatibility.
  *  Inline C code version of ARM32 assembly for cryptographic algorithms
    available and compiling for improved performance on ARM platforms
  *  Configure HMAC: define NO_HMAC to disable HMAC (default: enabled)
  *  ISO-TP transport layer support added to wolfio for TLS over CAN Bus
  *  Fix initialization bug in SiLabs AES support
  *  Domain and IP check is only performed on leaf certificates

ARM PSA Support (Platform Security Architecture) API

  * Initial support added for ARM’s Platform Security Architecture (PSA) API in
    wolfCrypt which allows support of ARM PSA enabled devices by wolfSSL,
    wolfSSH, and wolfBoot and wolfCrypt FIPS.
  * Included algorithms: ECDSA, ECDH, HKDF, AES, SHA1, SHA256, SHA224, RNG

ECICE Updates

  * Support for more encryption algorithms: AES-256-CBC, AES-128-CTR,
    AES-256-CTR
  * Support for compressed public keys in messages.

Math Improvements

  * Improved performance of X448 and Ed448 through inlining Karatsuba in square
    and multiplication operations for 128-bit implementation (64-bit platforms
    with 128-bit type support).
  * SP Math C implementation: fix for corner case in curve specific
    implementations of Montgomery Reduction (P-256, P-384).
  * SP math all: assembly snippets added for ARM Thumb. Performance improvement
    on platform.
  * SP math all: ARM64/32 sp_div_word assembly snippets added to remove
    dependency on __udiv3.
  * SP C implementation: multiplication of two signed types with overflow is
    undefined in C. Now cast to unsigned type before multiplication is
    performed.
  * SP C implementation correctly builds when using CFLAG: -m32

OpenSSL Compatibility Layer

  * Added DH_get_2048_256 to compatibility layer.
  * wolfSSLeay_version now returns the version of wolfSSL
  * Added C++ exports for API’s in wolfssl/openssl/crypto.h. This allows better
    compatibility when building with a C++ compiler.
  * Fix for OpenSSL x509_NAME_hash mismatch
  * Implement FIPS_mode and FIPS_mode_set in the compat layer.
  * Fix for certreq and certgen options with openssl compatibility
  * wolfSSL_BIO_dump() and wolfSSL_OBJ_obj2txt() rework
  * Fix IV length bug in EVP AES-GCM code.
  * Add new ASN1_INTEGER compatibility functions.
  * Fix wolfSSL_PEM_X509_INFO_read with NO_FILESYSTEM

CMake Updates

  * Check for valid override values.
  * Add KEYGEN option.
  * Cleanup help messages.
  * Add options to support wolfTPM.

VisualStudio Updates

  * Remove deprecated VS solution
  * Fix VS unreachable code warning

New Algorithms and Protocols

  * AES-SIV (RFC 5297)
  * DTLS SRTP (RFC 5764), used with WebRTC to agree on profile for new real-time
    session keys
  * SipHash MAC/PRF for hash tables. Includes inline assembly for x86_64 and
    Aarch64.

Remove Obsolete Algorithms

  * IDEA
  * Rabbit
  * HC-128

(fox)

2022-02-26 06:47:24 UTC MAIN commitmail json YAML

doc: Updated audio/din to 53.1

(fox)

2022-02-26 06:46:32 UTC MAIN commitmail json YAML

audio/din: Update to 53.1

Changes since 53:

DIN Is Noise 53.1:
  ! fixed : runaway launch of drones when Drone Params > Defaults > Generations
            is > 1 (higher the value worse the outcome!) and Drones Per Minute = 0
            due to wrong initialisation of this drone parameter after DIN restart /
            reload

  Update ASAP to DIN53.1

(fox)

2022-02-12 06:29:16 UTC MAIN commitmail json YAML

doc: Updated audio/din to 53

(fox)

2022-02-12 06:28:53 UTC MAIN commitmail json YAML

audio/din: Update to 53

Changes since 52:

DIN Is Noise 53:

  /*  new in DIN53:

        launched drones launch drones that launch drones that launch drones....!

          use Drone Params > Defaults > Generations to set the number of times this can happen

            if Generations = 1,  A drone launcher launches drones (@ a Drones Per Minute)
            that die at the end of their lifetimes. This is default and the only behaviour until DIN 52.
            if Generations = 2, A drone launcher launches drones that launch drones.
            if Generations = 3, A drone launcher launches drones that launch drones that
            launch drones too.
            if Generations = 4, 5, 6, ... this quickly escalates into a population explosion of drones;
            lots of drones birthing lots of drones, living their life out and waiting to die can get
            very loud (especially if the Compressor isnt ON), slow down DIN and maybe even your computer
            beyond rescue. Be careful! :)

            Ways to prevent this population explosion are: keep Generatons low (Menu > Drone Params
            > Defaults), keep Drones Per Minute (DPM) and Lifetime on the original
            launcher low (Select drone launcher and adjust values from Menu > Drone Params > Motion) and
            keep the Fall time low (the fade-out time for drone after being killed, from Menu > Drone
            Params > Defaults)

            The launched drones take the DPM and Lifetime of their parent so editing carefully the
            parameters of the original launcher is important.

  /*  new default Drones Per Minute (DPM) on a drone launcher (Menu > Drone Params > Defaults). Assigns a
      DPM when making a drone launcher.  Turn on ~ to assign a DPM at random.

  * re: Auto rotation of drone velocity/acceleration vectors:
      changed Degrees Per Second to Degrees Per Tick

  /* re: Menu > Drone Params > Defaults > Bounces
      when set to 0, launched drones dont bounce off the bottom of the microtonal keyboard
        but are killed immediately (behaviour until DIN 52)
      when set to -1, drones dont bounce off the bottom of the microtonal keyboard at all:
        but they are not killed either, they just live their life(time) out

  /* gravity base and tip dont move ie stay fixed as you scroll the microtonal keyboard in DIN53.
    this is because gravity is now in 'object space' along with the drones and microtonal ranges.
    until DIN52, gravity was in 'UI space' along with UI controls.

  * repositioned drone arrow UI elements

  ! fixed : DIN not quitting when frozen drones present !
  ! fixed : change size of gravity vector when its modulating !

(fox)

2022-02-11 05:58:29 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.51

(fox)

2022-02-11 05:57:57 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to v1.51

Changes since v1.50
v1.51 - 01.02.2022
- Don't handle mouse click if window wasn't in focus

(fox)

2022-01-20 22:49:08 UTC MAIN commitmail json YAML

doc: Updated sysutils/htop to 3.1.2

(fox)

2022-01-20 22:48:41 UTC MAIN commitmail json YAML

sysutils/htop: Update to 3.1.2

Changes since 3.1.1:

What's new in version 3.1.2

* Bugfix for crash when storing modified settings at exit
* Generate xz-compressed source tarball (with configure) using github actions
* Allow -u UID with numerical value as argument
* Added documentation for obsolete/state libraries/program files highlighting
* Some obsolete/stale library highlighting refinements
* Column width issues resolved
* Dynamic UID column sizing improved
* Discard stale information from Disk and Network I/O meters
* Refined Linux kernel thread detection
* Reworked process state handling
* New CCGROUP column showing abbreviated cgroup name
* New OFFSET column in the list of open files screen

(fox)

2022-01-16 04:55:35 UTC MAIN commitmail json YAML

doc: Updated print/foliate to 2.6.4

(fox)

2022-01-16 04:52:09 UTC MAIN commitmail json YAML

print/foliate: Update to 2.6.4

Changes since 2.6.3:

2.6.4

Changes:

  * Fixed various bugs

(fox)

2022-01-13 04:24:30 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.50

(fox)

2022-01-13 04:24:01 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to v1.50

Changes since v1.49
v1.50 - 12.01.2022
- macOS/Windows: Updated SDL 2.0.16 to SDL 2.0.20. SDL 2.0.18 would have issues
  with custom mouse cursors on Windows, so I had to skip it.

(fox)

2022-01-13 03:43:41 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 0.3.0

(fox)

2022-01-13 03:43:15 UTC MAIN commitmail json YAML

www/jira-cli: Update to 0.3.0

Changes since 0.2.0:

## What's added?
- feat: Add additional info in view cmd #209 @ankitpokhrel
- feat: Show linked issues when viewing #219 @ankitpokhrel
- feat: Show latest comment when viewing #220 @ankitpokhrel
- feat: Add an option to load N comments when viewing issue #226 @ankitpokhrel

## What's fixed?
- fix: Allow config generations even when no boards #216 @sushilkg
- fix: Off by one error in wiki parser #224 @ankitpokhrel
- fix: Language support for Jira cloud #234 @ankitpokhrel
- fix(docs): Optional COMMENT_BODY #236 @realtime-neil
- fix: Respect BROWSER env #253 @ankitpokhrel

## Other notable changes
- cfg: A new field handle is added in issue.types section as part of #234
- build: Reproducible builds #244 #245 @realtime-neil
- build: Initialize version using runtime build info #249 @ankitpokhrel

Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v0.2.0...v0.3.0

To all direct/indirect contributors and backers, Thank you

(fox)

2022-01-09 23:17:21 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.19.0

(fox)

2022-01-09 23:16:43 UTC MAIN commitmail json YAML

textproc/bat: Updates to 0.19.0

Changes since 0.18.2:

v0.19.0

Performance

* Reduce startup time in loop-through mode (e.g. when redirecting output) by
  90%. See #1747 (@Enselic)
* Load themes lazily to make bat start 25% faster when disregarding syntax load
  time. See #1969 (@Enselic)
* Python syntax highlighting no longer suffers from abysmal performance in
  specific scenarios. See #1688 (@keith-hall)
* Fix for poor performance when ANSI escape sequences are piped to bat, see
  #1596 (@eth-p)
* Fix for incorrect handling of ANSI escape sequences when using --wrap=never,
  see #1596 (@eth-p)
* Load custom assets as fast as integrated assets, see #1753 (@Enselic)

Features

* Support for x:-delta (minus) syntax in line ranges (e.g. 20:-10). See #1901
  (@bojan88)
* Support for --ignored-suffix argument. See #1892 (@bojan88)
* $BAT_CONFIG_DIR is now a recognized environment variable. It has precedence
  over $XDG_CONFIG_HOME, see #1727 (@billrisher)
* Support for x:+delta syntax in line ranges (e.g. 20:+10). See #1810
  (@bojan88)
* Add new --acknowledgements option that gives credit to theme and syntax
  definition authors. See #1971 (@Enselic)
* Include git hash in bat -V and bat --version output if present. See #1921
  (@Enselic)

Bugfixes

* First line not shown in diff context. See #1891 (@divagant-martian)
* Do not ignore syntaxes that handle file names with a *.conf extension. See
  #1703 (@cbolgiano)

Other

* Add PowerShell completion, see #1826 (@rashil2000)
* Minimum supported Rust version (MSRV) bumped to 1.51, see #1994 (@mdibaiee)

Syntaxes

* Groff, see #1685 (@scop)
* HTTP Requests and Responses, see #1748 (@keith-hall)
* LLVM, see #1777 (@ioncodes)
* Highlight for vimrc and gvimrc files, see #1763 (@SuperSandro2000)
* Syslog highlighting improvements, see #1793 (@scop)
* Added support for slim syntax, see #1693 (@mfinelli)
* Racket, see #1884 (@jubnzv)
* LiveScript, see #1915 (@Enselic)
* MediaWiki, see #1925 (@sorairolake)
* The requirements.txt syntax has been removed due to incompatible license
  requirements.
* Dart, new highlighter, see #1959 (@Ersikan)
* SCSS and Sass syntaxes updated, see #1766 (@Enselic)
* PowerShell syntax updated, see #1935 (@Enselic)
* TypeScript syntax updated, see #1834 (@Enselic)

bat as a library

* Deprecate HighlightingAssets::syntaxes() and
  HighlightingAssets::syntax_for_file_name(). Use
  HighlightingAssets::get_syntaxes() and
  HighlightingAssets::get_syntax_for_path() instead. They return a Result which
  is needed for upcoming lazy-loading work to improve startup performance. They
  also return which SyntaxSet the returned SyntaxReference belongs to. See
  #1747, #1755, #1776, #1862 (@Enselic)
* Remove HighlightingAssets::from_files and
  HighlightingAssets::save_to_cache. Instead of calling the former and then the
  latter you now make a single call to bat::assets::build. See #1802, #1971
  (@Enselic)
* Replace the error::Error(error::ErrorKind, _) struct and enum with an
  error::Error enum. Error(ErrorKind::UnknownSyntax, _) becomes
  Error::UnknownSyntax, etc. Also remove the error::ResultExt trait. These
  changes stem from replacing error-chain with thiserror. See #1820 (@Enselic)
* Add new MappingTarget enum variant MapExtensionToUnknown. Refer to its
  documentation for more information. Also mark MappingTarget as
  #[non_exhaustive] since more enum variants might be added in the future. See
  #1703 (@cbolgiano), #2012 (@Enselic)

v0.18.3

Bugfixes

* Bump git2 dependency to fix build with Rust 1.54, see #1761

(fox)

2022-01-08 09:49:30 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.1.1

(fox)

2022-01-08 09:48:16 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.1.1

Changes since v5.1.0:

wolfSSL Release 5.1.1 (Jan 3rd, 2022)

Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities

  * [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
    being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
    TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
    version of wolfSSL used.

(fox)

2021-12-30 01:19:49 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.1.0

(fox)

2021-12-30 01:19:03 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.1.0

Changes since v5.0.0:

wolfSSL Release 5.1.0 (Dec 27, 2021)

Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] Potential for DoS attack on a wolfSSL client due to processing hello
    packets of the incorrect side. This affects only connections using TLS v1.2
    or less that have also been compromised by a man in the middle
    attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
    L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
    Leuven, ENS Rennes for the report.
  * [Low] Client side session resumption issue once the session resumption cache
    has been filled up. The hijacking of a session resumption has been
    demonstrated so far with only non verified peer connections. That is where
    the client is not verifying the server窶冱 CA that it is connecting to. There
    is the potential though for other cases involving proxies that are verifying
    the server to be at risk, if using wolfSSL in a case involving proxies use
    wolfSSL_get1_session and then wolfSSL_SESSION_free when done where
    possible. If not adding in the session get/free function calls we recommend
    that users of wolfSSL that are resuming sessions update to the latest
    version (wolfSSL version 5.1.0 or later). Thanks to the UK's National Cyber
    Security Centre (NCSC) for the report.

New Feature Additions
Ports

  * Curve25519 support with NXP SE050 added
  * Renesas RA6M4 support with SCE Protected Mode and FSP 3.5.0
  * Renesas TSIP 1.14 support for RX65N/RX72N

Post Quantum

  * Post quantum resistant algorithms used with Apache port
  * NIST round 3 FALCON Signature Scheme support added to TLS 1.3 connections
  * FALCON added to the benchmarking application
  * Testing of cURL with wolfSSL post quantum resistant build

Compatibility Layer Additions

  * Updated NGINX port to NGINX version 1.21.4
  * Updated Apache port to Apache version 2.4.51
  * Add support for SSL_OP_NO_TLSv1_2 flag with wolfSSL_CTX_set_options function
  * Support added for the functions
      - SSL_CTX_get_max_early_data
      - SSL_CTX_set_max_early_data
      - SSL_set_max_early_data
      - SSL_get_max_early_data
      - SSL_CTX_clear_mode
      - SSL_CONF_cmd_value_type
      - SSL_read_early_data
      - SSL_write_early_data

Misc.

  * Crypto callback support for AES-CCM added. A callback function can be
    registered and used instead of the default AES-CCM implementation in
    wolfSSL.
  * Added AES-OFB to the FIPS boundary for future FIPS validations.
  * Add support for custom OIDs used with CSR (certificate signing request)
    generation using the macro WOLFSSL_CUSTOM_OID
  * Added HKDF extract callback function for use with TLS 1.3
  * Add variant from RFC6979 of deterministic ECC signing that can be enabled
    using the macro WOLFSSL_ECDSA_DETERMINISTIC_K_VARIANT
  * Added the function wc_GetPubKeyDerFromCert to get the public key from a
    DecodedCert structure
  * Added the functions wc_InitDecodedCert, wc_ParseCert and wc_FreeDecodedCert
    for access to decoding a certificate into a DecodedCert structure
  * Added the macro WOLFSSL_ECC_NO_SMALL_STACK for hybrid builds where the
    numerous malloc/free with ECC is undesired but small stack use is desired
    throughout the rest of the library
  * Added the function wc_d2i_PKCS12_fp for reading a PKCS12 file and parsing it

Fixes
PORT Fixes

  * Building with Android wpa_supplicant and KeyStore
  * Setting initial value of CA certificate with TSIP enabled
  * Cryptocell ECC build fix and fix with RSA disabled
  * IoT-SAFE improvement for Key/File slot ID size, fix for C++ compile, and
    fixes for retrieving the public key after key generation

Math Library Fixes

  * Check return values on TFM library montgomery function in case the system
    runs out of memory. This resolves an edge case of invalid ECC signatures
    being created.
  * SP math library sanity check on size of values passed to sp_gcd.
  * SP math library sanity check on exponentiation by 0 with mod_exp
  * Update base ECC mp_sqrtmod_prime function to handle an edge case of zero
  * TFM math library with Intel MULX multiply fix for carry in assembly code

Misc.

  * Fix for potential heap buffer overflow with compatibility layer PEM parsing
  * Fix for edge memory leak case with an error encountered during TLS
    resumption
  * Fix for length on inner sequence created with wc_DhKeyToDer when handling
    small DH keys
  * Fix for sanity check on input argument to DSA sign and verify
  * Fix for setting of the return value with ASN1 integer get on an i386 device
  * Fix for BER to DER size checks with PKCS7 decryption
  * Fix for memory leak with PrintPubKeyEC function in compatibility layer
  * Edge case with deterministic ECC key generation when the private key has
    leading 0窶冱
  * Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
  * Use page aligned memory with ECDSA signing and KCAPI
  * Skip expired sessions for TLS 1.3 rather than turning off the resume
    behavior
  * Fix for DTLS handling dropped or retransmitted messages

Improvements/Optimizations
Build Options and Warnings

  * Bugfix: could not build with liboqs and without DH enabled
  * Build with macro NO_ECC_KEY_EXPORT fixed
  * Fix for building with the macro HAVE_ENCRYPT_THEN_MAC when session export is
    enabled
  * Building with wolfSentry and HAVE_EX_DATA macro set

Math Libraries

  * Improvement for performance with SP C implementation of montgomery reduction
    for ECC (P256 and P384) and SP ARM64 implementation for ECC (P384)
  * With SP math handle case of dividing by length of dividend
  * SP math improvement for lo/hi register names to be used with older GCC
    compilers

Misc.

  * ASN name constraints checking code refactor for better efficiency and
    readability
  * Refactor of compatibility layer stack free窶冓ng calls to simplify and reduce
    code
  * Scrubbed code for trailing spaces, hard tabs, and any control characters
  * Explicit check that leaf certificate's public key type match cipher suite
    signature algorithm
  * Additional NULL sanity checks on WOLFSSL struct internally and improve
    switch statement fallthrough
  * Retain OCSP error value when CRL is enabled with certificate parsing
  * Update to NATIVE LwIP support for TCP use
  * Sanity check on PEM size when parsing a PEM with OpenSSL compatibility layer
    API.
  * SWIG wrapper was removed from the codebase in favor of dedicated Java and
    Python wrappers.
  * Updates to bundled example client for when to load the CA, handling print
    out of IP alt names, and printing out the peers certificate in PEM format
  * Handling BER encoded inner content type with PKCS7 verify
  * Checking for SOCKET_EPIPE errors from low level socket
  * Improvements to cleanup in the case that wolfSSL_Init fails
  * Update test and example certificates expiration dates

(fox)

2021-12-16 08:31:17 UTC MAIN commitmail json YAML

doc: Updated audio/fasttracker2 to 1.49

(fox)

2021-12-16 08:30:43 UTC MAIN commitmail json YAML

audio/fasttracker2: Update to v1.49

Changes since v1.48

v1.49 - 13.12.2021
- Fixed a bug when using Cut (or CTRL+X) on 16-bit samples in the sample
  editor. It would read data from the wrong offset.
- Kludge: Allow marking the very last sample points in the sample editor if the
  image is stretching out the whole screen in fullscreen mode.
- Mac:
  1) Fixed possible mouse coordinate scaling bug when leaving fullscreen
  2) Left Command key won't trigger song play anymore.
    Use the right Alt key for this. If you have an old Mac without a right Alt
    key, I suggest getting a newer computer (my first priority is modern
    computers).
  3) Left Command key can now be used instead of Alt for:
      - Select all (A - sample/text editing)
      - Cut (X - sample/text editing)
      - Copy (C - sample/text editing)
      - Paste (V - sample/text editing)
- Updated the help text

(fox)

2021-12-12 23:26:38 UTC MAIN commitmail json YAML

doc: Updated audio/din to 52

(fox)

2021-12-12 23:26:01 UTC MAIN commitmail json YAML

audio/din: Updates to 52

Changes since 51.1:

DIN Is Noise 52:

  \ walked back some changes introduced in DIN 51
    \ the drone tracked by gravity does not change when the selection changes
  \ renamed drone arrow parameter called Head to Neck

  /* new gravity size modulation for DIN 52

      change the size (aka strength/magnitude) of gravity vector over bpm:
        on the gravity widget, turn on Modulate
          bpm = speed of gravity size modulation
          depth = how far to 0 gravity drops
            depth = 1, goes all the way to 0 and back in 1 beat
            depth = 0.5, goes from starting size to half size and back in 1 beat
            depth = 0, no size modulation ie size does not change at all
            default depth = 1

          set an initial size using gravity presets or click on Change Size
          and move the mouse up or down. keep Modulate off when doing this.

          click Edit to edit the size modulation curve for interesting fx.
  /*

  + press q to toggle drone wanding when Menu > Drone Tools > Wand is selected
    ! was always in Add drone mode until DIN 51.x
  + optional tracking of drones when connecting them with Menu > Drone Tools > Connect
    + enable / disable @ Menu > Drone Tools > Track
    + if enabled on connection: drone 1 points to drone 2 points to drone 3 and so on
    + if disabled on disconnection: selected drones stop tracking any other drone
  + select drone on creation
    + Menu > Drone Params > Defaults > Select on Creation
    + drone is not selected by default
    + useful for looking at pitch/volume info of launched drones as they fly past
  + white = noise interpolator curve
    @ Menu > Editors > Noise Interpolator
  + white = drone that makes noise
    \ was grayscale in DIN 51.x
  + color of velocity vector of drone = color of drone
    \ was green in DIN51.x
  + constrain magnitude of drone velocity +/ acceleration to be > 0
    + click on 0 checkbutton on the Menu > Drone Params > Motion > Velocity or Acceleration to toggle
      + if enabled, magnitude of velocity +/ acceleration will always be > 0
      + if disabled, magnitude of velocity +/ acceleration can go < 0 ie will reverse movement or
        orbiting
  + browsed drone marker color is color of the browsed drone
    \ was green in DIN51.x
  * improved drone arrow drawing
  * improved note/frequency labeling on microtonal ranges
  * improved 'with left/center/right fixed' menu item on Menu > Ranges
  * new default volume distribution curve to have value increase (linearly)
    after 100% instead of staying at 100%. upto 200% now.
  * improved drone > < noise progress display
  <> moved (and renamed) Menu > Drone Params > Move under Gravity to Menu > Drone Tools > Balloon
      still does the same thing:
        releases (like gas balloons :) anchored drones
          these are now launched drones and die at the end of their lifetimes.
  <> moved Snap drones to notes / Position affects velocity from Menu > Drone Params > Motion to
    Menu > Drone Tools
  <> moved Bounces, rebound Speed% and drone bounce behaviour from Menu > Drone Params > Motion to
    Menu > Drone Params > Defaults as they apply equally to all launched drones
  * replaced drone Rise Time Min and Max spinners with a Rise time spinner
    + turn on ~ to generate a random rise time (default is 50% to 100% of Rise time) on drone creation
      + change range of randomness by editing %~ field
  * replaced drone Fall Time Min and Max spinners with a Fall time spinner
    + turn on ~ to generate a random fall time (default is 50% to 100% of Fall time) on drone removal
      + change range of randomness by editing %~ field
  + drones can bounce ahead, back or ahead/back
  + can select drones while voice phrasor plays
  + reinstated (from din-5.2.1 release!) a form of indian notation for notes
    + from Settings screen, choose notation = indian
  + a launched drone lifetime = lifetime of launcher or if ~ is active on Menu > Drone Params > Defaults > Lifetime
    a randomisation based on ~% of the lifetime of the launcher

  ! fixed bug when setting snap left/right values
  ! fixed mouse wheel scrolling of UI when hovering over label widget
  ! gravity continues tracking drone as its moved around or when scrolling microtonal keyboard

(fox)

2021-12-05 11:47:27 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.2.4.2

(fox)

2021-12-05 11:46:40 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.2.4.2

Changes since 3.2.3.1:

===============
Version 3.2.4.1
===============

Bugs corrected:

    * Missing packaging dependency when using pip install #1955

===============
Version 3.2.4
===============

Bugs corrected:

    * Failure to start on Apple M1 Max #1939
    * Influxdb2 via SSL #1934
    * Update WebUI (security patch). Thanks to @notFloran.
    * Swith from black <> white theme with the '9' hotkey - Related to issue #976
    * Fix: Docker plugin - Invalid IO stats with Arch Linux #1945
    * Bug Fix: Docker plugin - Network stats not being displayed #1944
    * Fix Grafana CPU temperature panel #1954
    * is_disabled name fix #1949
    * Fix tipo in documentation #1932
    * distutils is deprecated in Python 3.10 #1923
    * Separate battery percentages #1920
    * Update docs and correct make docs-server target in Makefile

Enhancement requests:

    * Improve --issue by displaying the second update iteration and not the first one. More relevant
    * Improve --issue option with Python version and paths
    * Correct an issue on idle display
    * Refactor Mem + MemSwap Curse
    * Refactor CPU Curses code

Contributors for this version:
    * Nicolargo
    * RazCrimson
    * Floran Brutel
    * H4ckerxx44
    * Mohamad Mansour
    * N辿fix Estrada
    * Zameer Manji

(fox)

2021-11-20 10:39:16 UTC MAIN commitmail json YAML

doc: Updated www/jira-cli to 0.2.0

(fox)

2021-11-20 10:38:05 UTC MAIN commitmail json YAML

www/jira-cli: Update to 0.2.0

Changes since 0.1.1:

> This version has some breaking changes in the config file and, you will
need to regenerate the config for all features to work.

## Notable changes
- The tool is now compatible with next-gen/team-managed project.
- New filters when listing issues, viz:
  - Filter by parent: This will allow you to list all sub-tasks of a task.
  - Order by filter: This will allow you to display a list sorted by their
    rank for example.
- You can now assign epic to the issue on creation.
- You can add issues to the sprint with `jira sprint add`

## What's added?
- feat: Allow to assign epic on create #194
- feat: Cmd to add issues to sprint #205
- feat: Allow to filter by parent #197
- feat: Add order-by filter #206
- feat: Add type on project listing #190

## What's fixed?
- fix: Make epic add work in next-gen project #195
- fix: Epic creation for next-gen project #192
- fix: Make epic remove work in next-gen project #196
- fix: Make epic list work for next-gen project #201
- fix: Segmentation fault on view #202
- fix(tui): Link/key copy is broken for altered key col #204

## Config changes
- cfg!: Expand config to include project type #191
- cfg!: Rename field to name and add link field to epic #193

## Dependency updates
- dep: Upgrade rivo/tview #176
- dep: Upgrade outdated deps to latest #177
- dep: Use Go 1.17 #178

**Full Changelog**: https://github.com/ankitpokhrel/jira-cli/compare/v0.1.1...v0.2.0

(fox)

2021-11-08 09:41:31 UTC MAIN commitmail json YAML

doc: Added www/jira-cli version 0.1.1

(fox)

2021-11-08 09:40:45 UTC MAIN commitmail json YAML

Added jira-cli to Makefile SUBDIRs.

(fox)

2021-11-08 09:39:31 UTC MAIN commitmail json YAML

Import of jira-cli v0.1.1 as www/jira-cli

JiraCLI is a command line tool for Jira created with an idea to avoid
the Jira UI as much as possible. It includes features like navigation,
issue creation, cloning, linking, ticket transition, and so on.

(fox)

2021-11-08 05:23:57 UTC MAIN commitmail json YAML

textproc/bat: Refactor the crates into it's own file.

(fox)

2021-11-08 05:11:27 UTC MAIN commitmail json YAML

sysutils/exa: Refactor the crates into it's own file.

(fox)

2021-11-06 04:37:53 UTC MAIN commitmail json YAML

doc: Updated security/wolfssl to 5.0.0

(fox)

2021-11-06 04:37:25 UTC MAIN commitmail json YAML

security/wolfssl: Update to v5.0.0

Changes since v4.8.1:

wolfSSL Release 5.0.0 (Nov 01, 2021)

Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [\Low] Hang with DSA signature creation when a specific q value is used in a
    maliciously crafted key. If a DSA key with an invalid q value of either 1 or
    0 was decoded and used for creating a signature, it would result in a hang
    in wolfSSL. Users that are creating signatures with DSA and are using keys
    supplied from an outside source are affected.
  * [\Low] Issue with incorrectly validating a certificate that has multiple
    subject alternative names when given a name constraint. In the case where
    more than one subject alternative name is used in the certificate, previous
    versions of wolfSSL could incorrectly validate the certificate. Users
    verifying certificates with multiple alternative names and name constraints,
    are recommended to either use the certificate verify callback to check for
    this case or update the version of wolfSSL used. Thanks to Luiz Angelo Daros
    de Luca for the report.

New Feature Additions
New Product

  * FIPS 140-3 -- currently undergoing laboratory testing, code review and
    ultimately CMVP validation. Targeting the latest FIPS standard.

Ports

  * IoT-Safe with TLS demo
  * SE050 port with support for RNG, SHA, AES, ECC (sign/verify/shared secret)
    and ED25519
  * Support for Renesas TSIP v1.13 on RX72N

Post Quantum

  * Support for OQS's (liboqs version 0.7.0) implementation of NIST Round 3 KEMs
    as TLS 1.3 groups --with-liboqs
  * Hybridizing NIST ECC groups with the OQS groups
  * Remove legacy NTRU and QSH
  * Make quantum-safe groups available to the compatibility layer

Linux Kernel Module

  * Full support for FIPS 140-3, with in-kernel power on self test (POST) and
    conditional algorithm self test(s) (CAST)
  * --enable-linuxkm-pie -- position-independent in-kernel wolfCrypt container,
      for FIPS
  * Vectorized x86 acceleration in PK algs (RSA, ECC, DH, DSA) and AES/AES-GCM
  * Vectorized x86 acceleration in interrupt handlers
  * Support for Linux-native module signatures
  * Complete SSL/TLS and Crypto API callable from other kernel module(s)
  * Support for LTS kernel lines: 3.16, 4.4, 4.9, 5.4, 5.10

Compatibility Layer Additions

  * Ports
      * Add support for libssh2
      * Add support for pyOpenSSL
      * Add support for libimobiledevice
      * Add support for rsyslog
      * Add support for OpenSSH 8.5p1
      * Add support for Python 3.8.5
  * API/Structs Added
      * ERR_lib_error_string
      * EVP_blake2
      * wolfSSL_set_client_CA_list
      * wolfSSL_EVP_sha512_224
      * wolfSSL_EVP_sha512_256
      * wc_Sha512_224/2256Hash
      * wc_Sha512_224/256Hash
      * wc_InitSha512_224/256
      * wc_InitSha512_224/256_ex
      * wc_Sha512_224/256Update
      * wc_Sha512_224/256FinalRaw
      * wc_Sha512_224/256Final
      * wc_Sha512_224/256Free
      * wc_Sha512_224/256GetHash
      * wc_Sha512_224/256Copy
      * wc_Sha512_224/256SetFlags
      * wc_Sha512_224/256GetFlags
      * wc_Sha512_224/256Transform
      * EVP_MD_do_all and OBJ_NAME_do_all
      * EVP_shake128
      * EVP_shake256
      * SSL_CTX_set_num_tickets
      * SSL_CTX_get_num_tickets
      * SSL_CIPHER_get_auth_nid
      * SSL_CIPHER_get_cipher_nid
      * SSL_CIPHER_get_digest_nid
      * SSL_CIPHER_get_kx_nid
      * SSL_CIPHER_is_aead
      * SSL_CTX_set_msg_callback
      * a2i_IPADDRESS
      * GENERAL_NAME_print
      * X509_VERIFY_PARAM_set1_ip
      * EVP_CIPHER_CTX_set_iv_length
      * PEM_read_bio_RSA_PUBKEY
      * i2t_ASN1_OBJECT
      * DH_set_length
      * Set_tlsext_max_fragment_length
      * AUTHORITY_iNFO_ACCESS_free
      * EVP_PBE_scrypt
      * ASN1_R_HEADER_TOO_LONG
      * ERR_LIB
      * X509_get_default_cert_file/file_env/dir/dir_env() stubs
      * SSL_get_read_ahead/SSL_set_read_ahead()
      * SSL_SESSION_has_ticket()
      * SSL_SESSION_get_ticket_lifetime_hint()
      * DIST_POINT_new
      * DIST_POINT_free
      * DIST_POINTS_free
      * CRL_DIST_POINTS_free
      * sk_DIST_POINT_push
      * sk_DIST_POINT_value
      * sk_DIST_POINT_num
      * sk_DIST_POINT_pop_free
      * sk_DIST_POINT_free
      * X509_get_extension_flags
      * X509_get_key_usage
      * X509_get_extended_key_usage
      * ASN1_TIME_to_tm
      * ASN1_TIME_diff
      * PEM_read_X509_REQ
      * ERR_load_ERR_strings
      * BIO_ssl_shutdown
      * BIO_get_ssl
      * BIO_new_ssl_connect
      * BIO_set_conn_hostname
      * NID_pkcs9_contentType

Misc.

  * KCAPI: add support for using libkcapi for crypto (Linux Kernel)
  * Configure option for --with-max-rsa-bits= and --with-max-ecc-bits=
  * SP ARM Thumb support for Keil and performance improvements
  * Add support for WOLFSSL_VERIFY_POST_HANDSHAKE verify mode
  * PKCS #11: support static linking with PKCS #11 library
    --enable-pkcs11=static LIBS=-l
  * Add build option --enable-wolfclu for use with wolfCLU product
  * Add support for X9.42 header i.e 窶廝EGIN X9.42 DH PARAMETERS窶�
  * Add --enable-altcertchains for configuring wolfSSL with alternate
    certificate chains feature enabled
  * Add public API wc_RsaKeyToPublicDer_ex to allow getting RSA public key
    without ASN.1 header (can return only seq + n + e)
  * Add SNI and TLSx options to CMake build

Fixes
PORT Fixes

  * Add return value checking for FREESCALE_RNGA
  * Fix MMCAU_SHA256 type warnings
  * Fixes for building with Microchip XC32 and ATECC

Math Library Fixes

  * TFM check that the modulus length is valid for fixed data array size
  * TFM fp_submod_ct fix check for greater
  * Check return value of mp_grow in mp_mod_2d
  * Fix for ECC point multiply to error out on large multipliers
  * SP ECC error on multiplier larger than curve order

TLS 1.3

  * TLS1.3 sanity check for cases where a private key is larger than the configured maximum
  * Fix early data max size handling in TLS v1.3
  * Fixes for PK callbacks with TLS v1.3
  * Check min downgrade when no extensions are sent with the ServerHello

Misc.

  * Previously wolfSSL enum values were used as NID窶冱. Now only the
    compatibility layer NID enums are the NID values:
      * CTC_SHAwDSA -> NID_dsaWithSHA1
      * CTC_SHA256wDSA -> NID_dsa_with_SHA256
      * CTC_MD2wRSA -> NID_md2WithRSAEncryption
      * CTC_MD5wRSA -> NID_md5WithRSAEncryption
      * CTC_SHAwRSA -> NID_sha1WithRSAEncryption
      * CTC_SHA224wRSA -> NID_sha224WithRSAEncryption
      * CTC_SHA256wRSA -> NID_sha256WithRSAEncryption
      * CTC_SHA384wRSA -> NID_sha384WithRSAEncryption
      * CTC_SHA512wRSA -> NID_sha512WithRSAEncryption
      * CTC_SHA3_224wRSA -> NID_RSA_SHA3_224
      * CTC_SHA3_256wRSA -> NID_RSA_SHA3_256
      * CTC_SHA3_384wRSA -> NID_RSA_SHA3_384
      * CTC_SHA3_512wRSA -> NID_RSA_SHA3_512
      * CTC_SHAwECDSA -> NID_ecdsa_with_SHA1
      * CTC_SHA224wECDSA -> NID_ecdsa_with_SHA224
      * CTC_SHA256wECDSA -> NID_ecdsa_with_SHA256
      * CTC_SHA384wECDSA -> NID_ecdsa_with_SHA384
      * CTC_SHA512wECDSA -> NID_ecdsa_with_SHA512
      * CTC_SHA3_224wECDSA -> NID_ecdsa_with_SHA3_224
      * CTC_SHA3_256wECDSA -> NID_ecdsa_with_SHA3_256
      * CTC_SHA3_384wECDSA -> NID_ecdsa_with_SHA3_384
      * CTC_SHA3_512wECDSA -> NID_ecdsa_with_SHA3_512
      * DSAk -> NID_dsa
      * RSAk -> NID_rsaEncryption
      * ECDSAk -> NID_X9_62_id_ecPublicKey
      * BASIC_CA_OID -> NID_basic_constraints
      * ALT_NAMES_OID -> NID_subject_alt_name
      * CRL_DIST_OID -> NID_crl_distribution_points
      * AUTH_INFO_OID -> NID_info_access
      * AUTH_KEY_OID -> NID_authority_key_identifier
      * SUBJ_KEY_OID -> NID_subject_key_identifier
      * INHIBIT_ANY_OID -> NID_inhibit_any_policy
  * Fix for DES IV size used with FIPSv2
  * Fix signed comparison issue with serialSz
  * Fix missing CBIOSend and properly guard hmac in DupSSL()
  * Fix calculation of length of encoding in ssl.c
  * Fix encoding to check proper length in asn.c
  * Fix for wc_ecc_ctx_free and heap hint
  * Fix for debug messages with AF_ALG build
  * Fix for static memory with bucket size matching.
  * Fixes for SRP with heap hint.
  * Fixes for CAAM build macros and spelling for Keil build
  * Sniffer fix for possible math issue around 64-bit pointer and 32-bit unsigned int
  * Fix for sniffer TCP sequence rollover
  * wolfSSL_PEM_write_bio_PUBKEY to write only the public part
  * Fix for sending only supported groups in TLS extension
  * Fix for sniffer to better handle spurious retransmission edge case
  * SSL_set_alpn_protos and SSL_CTX_set_alpn_protos now returns 0 on
    successFixes issue with SSL_CTX_set1_curves_list and SSL_set1_curves_list
    not checking the last character of the names variable provided, non-0 on
    failure to better match expected return values
  * Fixes and improvements for crypto callbacks with TLS (mutual auth)
  * Fix for bad memory_mutex lock on static memory cleanup
  * Zero terminate name constraints strings when parsing certificates
  * Fix for verifying a certificate when multiple permitted name constraints are used
  * Fix typo in ifdef for HAVE_ED448
  * Fix typos in comments in SHA512
  * Add sanity check on buffer size with ED25519 key decode
  * Sanity check on PKCS7 stream amount read
  * PKCS7 fix for double free on error case and sanity check on set serial number
  * Sanity check on PKCS7 input size wc_PKCS7_ParseSignerInfo
  * Forgive a DTLS session trying to send too much at once

Improvements/Optimizations
Build Options and Warnings

  * Rework of RC4 disable by default and depreciation
  * wolfSSL as a Zephyr module (without setup.sh)
  * Add include config.h to bio.c
  * Support for PKCS7 without AES CBC.
  * Fixes for building without AES CBC
  * Added WOLFSSL_DH_EXTRA to --enable-all and --enable-sniffer
  * Add a CMake option to build wolfcrypt test and bench code as libraries
  * GCC makefile: allow overriding and provide more flexibility

Math Libraries

  * Improve performance of fp_submod_ct() and fp_addmod_ct()
  * Improve performance of sp_submod_ct() and sp_addmod_ct()
  * SP int, handle even modulus with exponentiation

Misc.

  * Cleanups for Arduino examples and memory documentation
  * Refactor hex char to byte conversions
  * Added GCC-ARM TLS server example
  * Improvements to session locking to allow per-row
  * Improved sniffer statistics and documentation
  * EVP key support for heap hint and crypto callbacks
  * Reduced stack size for dh_generation_test and Curve ASN functions
  * Espressif README Syntax / keyword highlighting / clarifications
  * AARCH64 SHA512: implementation using crypto instructions added
  * wc_RsaPSS_CheckPadding_ex2 added for use with HEAP hint
  * wc_AesKeyWrap_ex and wc_AesKeyUnWrap_ex bound checks on input and output sizes
  * Add additional error handling to wolfSSL_BIO_get_len
  * Add code to use popen and the command 'host', useful with qemu
  * Adjustment to subject alt names order with compatibility layer to better match expected order
  * Reduce BIO compatibility layer verbosity
  * Set a default upper bound on error queue size with compatibility layer
  * WOLFSSL_CRL_ALLOW_MISSING_CDP macro for Skip CRL verification in case no CDP in peer cert
  * Fixes for scan-build LLVM-13 and expanded coverage
  * Increase the default DTLS_MTU_ADDITIONAL_READ_BUFFER and make it adjustable

(fox)

2021-09-28 17:58:20 UTC MAIN commitmail json YAML

doc: Updated sysutils/htop to 3.1.0

(fox)

2021-09-28 17:57:39 UTC MAIN commitmail json YAML

sysutils/htop: Updates to 3.1.0

- Removes the linux patches, since htop has native NetBSD support.

Changes since 3.0.5:

What's new in version 3.1.0

* Updated COPYING file to remove the PLPA exemption (appendix 2)
  With this change the license is now GPLv2 without any additional wording.
* Improved default sort ordering
  Note for users: This may lead to an inverted sort order on startup of
  htop 3.1.0 compared to previous versions.
  This is due to what is stored in your htoprc file. Solution: Press I
  (to invert sort order).
  This changed setting will be saved by htop on exit as long as it can
  write to your htoprc file.
* The compile-time option to cater specifically for running htop as
  setuid has been removed
* Add read-only option
  This allows htop to be run in an non-intrusive fashion where it acts only
  as a process viewer disabling all functions to manipulate system state.
  Note: This is not a security feature!
* Move the code for handling the command line formatting related tasks
  to be shared across all platforms
  This means important features like stale binary/library highlighting
  can now be available on all supported platforms.
* Make the EXE and COMM columns available on all platforms
  All supported platforms have the name of the executable (EXE) and a
  self-chosen thread/command name (COMM) available one way or the other.
  Moving this column to be handled as a platform-independently available
  information simplifies the markup of the command line.
* Introduce configuration file versioning and config_reader_min_version
  Starting with this version the configuration file contains a version
  identifying the minimum version of the configuration parser needed to
  fully understand the configuration file format.
  Old configuration file formats are automatically upgraded when
  saving the config file (htoprc).
* Make the configuration parser friendlier to users (thanks to Bart Bakker)
  With this change only settings that cannot be parsed properly are
  reset to their defaults.
* Improve default display for systems with many CPUs
* Add the process ELAPSED time column
* Improve the process STATE column sorting
* Reworked handling resize and redrawing of the UI
* Fixed an issue where the LED meter mode could overflow allotted space
* Allow text mode Meters to span empty neighbors to the right
* Rescale graph meters when value of total changes
  (thanks to Michael Schönitzer)
* Update generic process field display
  Usually "uninteresting" values in columns like 1 thread, nice value
  of 0, CPU and memory of 0%, idle/sleeping state, etc. are shown with
  reduced intensity (dark grey)
* Option and key ("*") to collapse / expand all branches under PID 1
  (and PID 2 if kernel threads are shown) (thanks to Krishna Chaitanya)
* Keep following a process when inverting the sort order, displaying
  the help screen or hiding/unhiding userland threads.
  If a thread is currently selected the selection is updated to point
  to the thread's parent process. (thanks to Gonzalo, et.al.)
* Reorder process scanning to be performed before updating the display
  of the meters in the header
* Always check the user for a process for any changes.
  This affects multiple platforms that previously didn't correctly handle
  the user field for a process to change at runtime (e.g. due to seteuid
  or similar syscalls).
* Disable mouse option when support is unavailable
* Support curses libraries without ncurses mouse support
  (thanks to Santhosh Raju)
* Support offline and hot-swapping of CPUs on all platforms
* Fix the CPU Meter for machines with more than 256 CPUs
* Supplemented the "show updated/deleted executables" feature (red basename)
  to indicate when linked libraries were updated (yellow basename)
* Apply the stale binary highlighting for the EXE column in addition to
  the command line field
* Add new combined Memory and Swap meter
* Implement bar and graph mode for NetworkIO Meter
  (thanks to Michael F. Schönitzer)
* Rework TTY column to be more consistent across platforms
* Make the CWD column generally available on all platforms
  (thanks to Santhosh Raju et. al.)
* Add Performance Co-Pilot (PCP) platform support
  This is added via a separate pcp-htop(1) binary which provides remote host
  analysis, new Meters for any PCP metric and new Columns for any PCP process
  metric - see the pcp-htop(5) man page for further details.
  (thanks to Sohaib Mohamed)
* Add Linux columns and key bindings for process autogroup identifier
  and nice value
* Change available and used memory reporting on Linux to be based on
  MemAvailable (Kernel 3.14+) (thanks to Chris Cheney and Tomas Wido)
* Add a new SysArchMeter showing kernel and platform information
  (thanks to ahgamut)
* Linux memory usage explicitly treats tmpfs memory usage as shared memory
  This is to make memory used by tmpfs visible as this cannot be freed
  unlike normal filesystem cache data.
* Exclude zram devices when calculating DiskIO on Linux
* Use PATH lookup for systemctl in systemd meter (thanks to Scott Olson)
* Add native platform support for NetBSD
  This allows htop to run on NetBSD without the need for active Linux
  emulation of the procfs filesystem.
  (thanks to Santhosh Raju and Nia Alarie)
* Add NetworkIO, DiskIO, CPU frequency, and battery meter support on NetBSD
  (thanks to Nia Alarie)
* Fix NetBSD display of in-use and cached memory (thanks to Nia Alarie)
* Rework NetBSD CPU and memory accounting (thanks to Santhosh Raju)
* Fix NetBSD accounting of user and kernel threads (thanks to Santhosh Raju)
* Initial work to allow building with default libcurses on NetBSD
  (thanks to Santhosh Raju)
* FreeBSD updates - implement process majflt and processor column values
* Add FreeBSD support for CPU frequency and temperature
* Fixes and cleanups for ZFS Meters and metrics
* Correctly color the ZFS ARC ratio (thanks to Ross Williams)
* Bugfixes related to CPU time display/calculations for darwin on M1 systems
  (thanks to Alexander Momchilov)
* Harmonize the handling of multiple batteries across different platforms.
  The system is now considered to run on AC if at least one power supply
  marked as AC is found in the system.
  Battery capacity is summed up over all batteries found.
  This also changes the old behavior that batteries reported by the
  system after the first AC adapter where sometimes ignored.
* Correctly handle multiple batteries on Darwin.
  Resolves a possible memory leak on systems with multiple batteries.
* Handle Linux Shmem being part of Cached in the MemoryMeter
* Add SwapCached to the Linux swap meter (thanks to David Zarzycki)
* Convert process time to days if applicable (thanks to David Zarzycki)
* Always show the number of threads in the TaskMeter, even when threads
  are not shown in the process list
* Fix Linux --drop-capabilities option handling
* Correctly detect failure to initialize Linux boottime
* Overhaul the Linux memory fields to partition them like free(1) now does
* Improve the Linux process I/O column values
* Rework the libsensors parsing on Linux
* Update the MemoryMeter to display shared memory
* Update OpenBSD platform - implement additional columns, scan LWP,
  proper markup for STATE, show CPU frequency
* Fix the tree view on OpenBSD when hiding kernel threads
* Remove old InfoScreen lines before re-scanning (thanks to Øystein Hiåsen)
* Document historic naming of Light-Weight Processes column aka threads
* Improve user interaction when the last process entry is selected
* Draw the panel header on the TraceScreen (thanks to Youngjae Lee)
* Add mouse wheel scroll and fix mouse selection on the InfoScreen
  (thanks to Youngjae Lee)
* Add a HugepageMeter and subtract hugepages from normal memory
* Display wide characters in LED meters and restore non-wide ncurses support
* Add command line option to drop Linux capabilities
* Support scheduler affinity on platforms beyond Linux
* Report on any failure to write the configuration file
* Cache stderr to be able to print assert messages.
  These messages are shown in case htop terminates unexpectedly.
* Print current settings on crash
* Reset signal handlers on program exit
* Add configure script option to create a static htop binary
* Resolved longer-standing compilation issues on Solaris/Illumos
* Check for availability of set_escdelay in configure
  (thanks to Stefan Polluks)
* Build system updates for autotools 2.70

(fox)

2021-08-24 05:14:57 UTC MAIN commitmail json YAML

doc: Updated textproc/bat to 0.18.3

(fox)

2021-08-24 05:14:14 UTC MAIN commitmail json YAML

textproc/bat: Updates to 0.18.3

Changes since 0.18.2:

v0.18.3

Bugfixes

  * Bump git2 dependency to fix build with Rust 1.54, see #1761

(fox)

2021-08-21 21:46:30 UTC MAIN commitmail json YAML

doc: Updated sysutils/py-Glances to 3.2.3.1

(fox)

2021-08-21 21:45:52 UTC MAIN commitmail json YAML

sysutils/py-Glances: Update to 3.2.3.1

Changes since 3.2.3:

===============
Version 3.2.3.1
===============

Patch to correct issue (regression) #1922:

    * Incorrect processes disk IO stats #1922
    * DSM 6 docker error crash /sys/class/power_supply #1921

(fox)

2021-08-21 21:38:29 UTC MAIN commitmail json YAML

doc: Updated audio/din to 51.1.1

(fox)