pkgsrcv2.git
13 years agoPullup ticket #3480 - requested by obache
sbd [Thu, 28 Jul 2011 02:30:16 +0000 (02:30 +0000)]
Pullup ticket #3480 - requested by obache
security/clamav security update

Revisions pulled up:
- security/clamav/Makefile                                      1.4
- security/clamav/distinfo                                      1.4

---
   Module Name: pkgsrc
   Committed By: adam
   Date: Mon Jul 25 22:59:12 UTC 2011

   Modified Files:
    pkgsrc/security/clamav: Makefile distinfo

   Log Message:
   Changes 0.97.2
   ClamAV 0.97.2 fixes problems with the bytecode engine, Safebrowsing detection,
   hash matcher, and other minor issues. Please see the ChangeLog file for
   details.

13 years agoPullup tickets 3478 & 3479
sbd [Wed, 27 Jul 2011 06:40:33 +0000 (06:40 +0000)]
Pullup tickets 3478 & 3479

13 years agoPullup ticket #3479 - requested by taca
sbd [Wed, 27 Jul 2011 06:38:30 +0000 (06:38 +0000)]
Pullup ticket #3479 - requested by taca
net/samba33 security update.

Revisions pulled up:
- net/samba33/Makefile                                          1.15
- net/samba33/distinfo                                          1.7
- net/samba33/patches/patch-af                                  1.2

---
   Module Name: pkgsrc
   Committed By: taca
   Date: Wed Jul 27 00:53:37 UTC 2011

   Modified Files:
    pkgsrc/net/samba33: Makefile distinfo
    pkgsrc/net/samba33/patches: patch-af

   Log Message:
   Update samba33 package to 3.3.16; security fix for swat.

                      ==============================
                      Release Notes for Samba 3.3.16
               July 26, 2011
                      ==============================

   This is a security release in order to address
   CVE-2011-2522 (Cross-Site Request Forgery in SWAT) and
   CVE-2011-2694 (Cross-Site Scripting vulnerability in SWAT).

   o  CVE-2011-2522:
      The Samba Web Administration Tool (SWAT) in Samba versions
      3.0.x to 3.5.9 are affected by a cross-site request forgery.

   o  CVE-2011-2694:
      The Samba Web Administration Tool (SWAT) in Samba versions
      3.0.x to 3.5.9 are affected by a cross-site scripting
      vulnerability.

   Please note that SWAT must be enabled in order for these
   vulnerabilities to be exploitable. By default, SWAT
   is *not* enabled on a Samba install.

   Changes since 3.3.15
   --------------------

   o   Kai Blin <kai@samba.org>
       * BUG 8289: SWAT contains a cross-site scripting vulnerability.
       * BUG 8290: CSRF vulnerability in SWAT.

13 years agoPullup ticket #3478 - requested by taca
sbd [Wed, 27 Jul 2011 06:37:42 +0000 (06:37 +0000)]
Pullup ticket #3478 - requested by taca
net/samba35 security update.

Revisions pulled up:
- net/samba35/Makefile                                          1.8
- net/samba35/distinfo                                          1.5

---
   Module Name: pkgsrc
   Committed By: taca
   Date: Wed Jul 27 00:52:20 UTC 2011

   Modified Files:
    pkgsrc/net/samba35: Makefile distinfo

   Log Message:
   Update samba35 pacakge to 3.5.10; security fix for swat.

                      ==============================
                      Release Notes for Samba 3.5.10
       July 26, 2011
                      ==============================

   This is a security release in order to address
   CVE-2011-2522 (Cross-Site Request Forgery in SWAT) and
   CVE-2011-2694 (Cross-Site Scripting vulnerability in SWAT).

   o  CVE-2011-2522:
      The Samba Web Administration Tool (SWAT) in Samba versions
      3.0.x to 3.5.9 are affected by a cross-site request forgery.

   o  CVE-2011-2694:
      The Samba Web Administration Tool (SWAT) in Samba versions
      3.0.x to 3.5.9 are affected by a cross-site scripting
      vulnerability.

   Please note that SWAT must be enabled in order for these
   vulnerabilities to be exploitable. By default, SWAT
   is *not* enabled on a Samba install.

   Changes since 3.5.9:
   --------------------

   o   Kai Blin <kai@samba.org>
       * BUG 8289: SWAT contains a cross-site scripting vulnerability.
       * BUG 8290: CSRF vulnerability in SWAT.

13 years agoRepo copy files
repo-copy [Mon, 25 Jul 2011 13:52:02 +0000 (13:52 +0000)]
Repo copy files

13 years agoPullup ticket #3477
sbd [Thu, 21 Jul 2011 04:29:04 +0000 (04:29 +0000)]
Pullup ticket #3477

13 years agoPullup ticket #3477 - requested by tez
sbd [Thu, 21 Jul 2011 04:24:07 +0000 (04:24 +0000)]
Pullup ticket #3477 - requested by tez
textproc/groff security fix

Revisions pulled up:
- textproc/groff/Makefile                                       1.58
- textproc/groff/distinfo                                       1.15
- textproc/groff/patches/patch-config.guess                     1.1
- textproc/groff/patches/patch-configure                        1.1
- textproc/groff/patches/patch-contrib_eqn2graph_eqn2graph.sh   1.1
- textproc/groff/patches/patch-contrib_gdiffmk_tests_runtests.in 1.1
- textproc/groff/patches/patch-contrib_grap2graph_grap2graph.sh 1.1
- textproc/groff/patches/patch-contrib_groffer_perl_groffer.pl  1.1
- textproc/groff/patches/patch-contrib_groffer_perl_roff2.pl    1.1
- textproc/groff/patches/patch-contrib_pdfmark_pdfroff.man      1.1
- textproc/groff/patches/patch-contrib_pdfmark_pdfroff.sh       1.1
- textproc/groff/patches/patch-contrib_pic2graph_pic2graph.sh   1.1
- textproc/groff/patches/patch-doc_fixinfo.sh                   1.1
- textproc/groff/patches/patch-doc_groff.info-2                 1.1
- textproc/groff/patches/patch-gendef.sh                        1.1
- textproc/groff/patches/patch-src_roff_groff_pipeline.c        1.1

---
   Module Name:    pkgsrc
   Committed By:   tez
   Date:           Tue Jul 19 21:09:40 UTC 2011

   Modified Files:
           pkgsrc/textproc/groff: Makefile distinfo
   Added Files:
           pkgsrc/textproc/groff/patches: patch-config.guess patch-configure
               patch-contrib_eqn2graph_eqn2graph.sh
               patch-contrib_gdiffmk_tests_runtests.in
               patch-contrib_grap2graph_grap2graph.sh
               patch-contrib_groffer_perl_groffer.pl
               patch-contrib_groffer_perl_roff2.pl
               patch-contrib_pdfmark_pdfroff.man patch-contrib_pdfmark_pdfroff.sh
               patch-contrib_pic2graph_pic2graph.sh patch-doc_fixinfo.sh
               patch-doc_groff.info-2 patch-gendef.sh
               patch-src_roff_groff_pipeline.c

   Log Message:
   Fix many temporary file handling issues, including in pdfroff
   (resolves CVE-2009-5044 / SA44999)
   Patches copied from:

   http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff?rev=1.2
   Modified for pkgsrc and excluded a documentaion change to doc/groff.texinfo
   that changes a `makeinfo' is too old warning into a fatal error.

   Added patch to make pdfroff.sh use -dSAFER
   See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538338 for details.

13 years agopullup #3476
spz [Wed, 20 Jul 2011 02:38:29 +0000 (02:38 +0000)]
pullup #3476

13 years agoPullup ticket #3476 - requested by tron
spz [Wed, 20 Jul 2011 02:36:13 +0000 (02:36 +0000)]
Pullup ticket #3476 - requested by tron
net/wireshark: security update

Revisions pulled up:
- net/wireshark/Makefile                                        1.66
- net/wireshark/distinfo                                        1.46

-------------------------------------------------------------------
   Module Name: pkgsrc
   Committed By: tron
   Date: Tue Jul 19 21:29:53 UTC 2011

   Modified Files:
    pkgsrc/net/wireshark: Makefile distinfo

   Log Message:
   Update "wireshark" package to version 1.4.8. Changes since 1.4.7:
   - Bug Fixes
     - The following vulnerabilities have been fixed. See the security
       advisory for details and a workaround.
        o The Lucent/Ascend file parser was susceptible to an infinite
          loop.
          Versions affected: 1.2.0 to 1.2.17, 1.4.0 to 1.4.7, and 1.6.0.
          CVE-2011-2597
        o The ANSI MAP dissector was susceptible to an infinite loop.
          (Bug 6044)
          Versions affected: 1.4.0 to 1.4.7, and 1.6.0.
          CVE-2011-????
     - The following bugs have been fixed:
        o TCP dissector doesn't decode TCP segments of length 1. (Bug
          4716)
        o Wireshark 1.4.0rc1 and python - spurious message. (Bug 4878)
        o Missing LUA function. (Bug 5006)
        o Lua API description about creating a new Tvb from a bytearray
          is not correct in wireshark's user guide. (Bug 5199)
        o sflow decode error for some extended formats. (Bug 5379)
        o White space in protocol field abbreviation causes runtime
          failure while registering Lua dissector. (Bug 5569)
        o "File not found" box uses wrong filename encoding. (Bug 5715)
        o capinfos: #ifdef HAVE_LIBGCRYPT block includes a line too
          many. (Bug 5803)
        o Wireshark crashes if Lua contains "Pref.range()" with missing
          arguments. (Bug 5895)
        o The "range" field in Lua's "Pref.range()" serves as default
          while the "default" field does nothing. (Bug 5896)
        o Wireshark crashes when calling TreeItem:set_len() on TreeItem
          without tvb. (Bug 5941)
        o TvbRange_string(lua_State* L) call a wrong function. (Bug
          5960)
        o VoIP call flow graph displays BICC APM as a BICC ANM. (Bug
          5966)
        o H323 rate multiplier wrong. (Bug 6009)
        o tshark crashes when loading Lua script that contains GUI
          function. (Bug 6018)
        o 802.11 Disassociation Packet's "Reason Code" field is
          imprecisely decoded/described. (Bug 6022)
        o Wireshark crashes when setting custom column's field name with
          conditional. (Bug 6028)
        o GTS Descriptor count limited to 3 instead of 7. (Bug 6055)
        o The SSL dissector can not resemble correctly the frames after
          TCP zero window probe packet. (Bug 6059)
        o Packet parser takes too long for this trace. (Bug 6073)
        o 802.11 Association Response Packet's "Status Code" field is
          imprecisely decoded/described. (Bug 6093)
        o Wireshark 1.6.0 and Python support: installer fails to create
          the wspy_dissectors subdirectory and . (Bug 6110)
        o Wireshark crash during RTP stream analysis. (Bug 6120)
        o Tshark custom columns: Why don't I get an error message? (Bug
          6131)
   - Updated Protocol Support
     ANSI MAP, GIOP, H.323, IEEE 802.11, MSRP, RPCAP, sFlow, TCP,
   - New and Updated Capture File Support
     Lucent/Ascend.

   To generate a diff of this commit:
   cvs rdiff -u -r1.65 -r1.66 pkgsrc/net/wireshark/Makefile
   cvs rdiff -u -r1.45 -r1.46 pkgsrc/net/wireshark/distinfo

13 years agopullup #3474
spz [Sat, 16 Jul 2011 21:13:32 +0000 (21:13 +0000)]
pullup #3474

13 years agoPullup ticket #3474 - requested by drochner
spz [Sat, 16 Jul 2011 21:11:49 +0000 (21:11 +0000)]
Pullup ticket #3474 - requested by drochner
print/foomatic4-filters: security patch

Revisions pulled up:
- print/foomatic4-filters/Makefile                              1.10
- print/foomatic4-filters/distinfo                              1.4
- print/foomatic4-filters/patches/patch-ac                      1.2

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   drochner
   Date:           Wed Jul 13 19:58:54 UTC 2011

   Modified Files:
           pkgsrc/print/foomatic4-filters: Makefile distinfo
           pkgsrc/print/foomatic4-filters/patches: patch-ac

   Log Message:
   add a patch from Suse bug #698451 (which is said there to originate
   from upstream but I couldn't locate it) to fix possible injection
   of shell commands in print requests which would be executed as
   the "lp" user
   bump PKGREV

   To generate a diff of this commit:
   cvs rdiff -u -r1.9 -r1.10 pkgsrc/print/foomatic4-filters/Makefile
   cvs rdiff -u -r1.3 -r1.4 pkgsrc/print/foomatic4-filters/distinfo
   cvs rdiff -u -r1.1.1.1 -r1.2 pkgsrc/print/foomatic4-filters/patches/patch-ac

13 years agoUpdated package numbers from spz (Thanks, Petra!)
agc [Wed, 13 Jul 2011 19:25:24 +0000 (19:25 +0000)]
Updated package numbers from spz (Thanks, Petra!)

13 years agoPullup ticket #3472.
tron [Wed, 13 Jul 2011 19:10:45 +0000 (19:10 +0000)]
Pullup ticket #3472.

13 years agoPullup ticket #3472 - requested by taca
tron [Wed, 13 Jul 2011 19:09:16 +0000 (19:09 +0000)]
Pullup ticket #3472 - requested by taca
mail/squirrelmail: security update

Revisions pulled up:
- mail/squirrelmail/MESSAGE                                     1.6
- mail/squirrelmail/Makefile                                    1.117-1.118
- mail/squirrelmail/PLIST                                       1.38
- mail/squirrelmail/distinfo                                    1.61

---
   Module Name: pkgsrc
   Committed By: taca
   Date: Wed Jul 13 01:30:34 UTC 2011

   Modified Files:
    pkgsrc/mail/squirrelmail: Makefile

   Log Message:
   take MAINTAINER.

---
   Module Name: pkgsrc
   Committed By: taca
   Date: Wed Jul 13 12:22:44 UTC 2011

   Modified Files:
    pkgsrc/mail/squirrelmail: MESSAGE Makefile PLIST distinfo

   Log Message:
   Update squirrelmail package to 1.4.22.

   Version 1.4.22 - 12 July 2011
   -----------------------------
     - Backported default timezone fix from version 1.5.2; helps mitigate
       timezone errors in environments where a default has not been set
       by the administrator.
     - Fixed system lock-ups caused by a combination of certain rare,
       malformed message headers and buggy versions of PHP mbstring
       (#3053349).
     - Now allow multiple plugins to handle (add links for) a single
       attachment MIME type.
     - Now allow administrators to disable all plugins or enable just
       a select few plugins (overriding the active plugins in the normal
       configuration) by setting $temporary_plugins as an empty array
       (all disabled) or an array with one or more plugin directory names
       in config_local.php.
     - Backport fix for call_user_func_array not supporting NULL as empty
       array in PHP 5.3.3
     - Fixed sqauth_read_password() for plugins on the login_verified hook.
     - Added SMTP SASL PLAIN authentication option to configuration tool
       (core support for such is not new).
     - Gmail doens't support standard search commands; removed sort buttons.
     - Forced addition of a file suffix to attachments that lack a filename
       (helps forwarded messages avoid spam filters) (thanks to Petr
       Kletecka) (#3139004).
     - Fixed missing security token in listcommands plugin.
     - Added smtp_auth hook (thanks to Emmanuel Dreyfus).
     - Made speed enhancements to threaded message display (thanks to Siim
       Poder) (#3288123).
     - Allow administrators to configure subfolders of user INBOXes to be
       treated as special folders by adding $subfolders_of_inbox_are_special
       to config_local.php.
     - Fixed incorrect display of INBOX subfolders under some configurations.
       IMPORTANT: You may need to update your configuration so that
       $default_sub_of_inbox is TRUE if it was FALSE (e.g., Courier IMAP users)
       and after updating to this version, your special folders are no longer
       listed at the top of your folder list.  Also, if this change prevents
       users from logging in with an error such as "ERROR: Could not complete
       request.  Query: CREATE "Trash" Reason Given: Invalid mailbox name.",
       you will need to correct the user preference values for the problem
       folders.  You can do so with commands such as the following for file-
       based preferences (adjust the data directory location as needed):
           find /var/lib/squirrelmail/data/ -name *.pref -exec sed --in-place 's/trash_folder=Trash/trash_folder=INBOX.Trash/g' {} \;
           find /var/lib/squirrelmail/data/ -name *.pref -exec sed --in-place 's/trash_folder=Drafts/trash_folder=INBOX.Drafts/g' {} \;
           find /var/lib/squirrelmail/data/ -name *.pref -exec sed --in-place 's/trash_folder=Sent/trash_folder=INBOX.Sent/g' {} \;
       Or, for database-based preferences:
           UPDATE userprefs SET prefval = 'INBOX.Trash' WHERE prefkey = 'trash_folder' AND prefval = 'Trash';
           UPDATE userprefs SET prefval = 'INBOX.Drafts' WHERE prefkey = 'draft_folder' AND prefval = 'Drafts';
           UPDATE userprefs SET prefval = 'INBOX.Sent' WHERE prefkey = 'sent_folder' AND prefval = 'Sent';
       MAKE SURE to back up your user preferences first!
     - Optimized message highlighting rules; faster message list display
       and faster highlight rules management (thanks to C. Bensend for
       extensive effort helping diagnose)
     - New Mail plugin no longer removes normal organization title when
       putting the number of new messages in the browser title
     - Added clickjacking protection (thanks to Asbjorn Thorsen and Geir
       Hansen for bringing this to our attention). [CVE-2010-4554]
     - Fixed XSS holes in generic options inputs, XSS hole in the SquirrelSpell
       plugin, XSS hole in the Index Order page, and added anti-CSRF protection
       to the empty trash feature and the Index Order page (thanks to Nicholas
       Carlini for finding all these issues). [CVE-2010-4555]
     - Fixed XSS problem with unsanitized style tags in messages. [CVE-2011-2023]

13 years agoPullup ticket #3471.
tron [Tue, 12 Jul 2011 10:59:53 +0000 (10:59 +0000)]
Pullup ticket #3471.

13 years agoPullup ticket #3471 - requested by morr
tron [Tue, 12 Jul 2011 10:58:47 +0000 (10:58 +0000)]
Pullup ticket #3471 - requested by morr
www/wordpress: security update

Revisions pulled up:
- www/wordpress/Makefile                                        1.20
- www/wordpress/PLIST                                           1.9
- www/wordpress/distinfo                                        1.16

---
   Module Name: pkgsrc
   Committed By: morr
   Date: Mon Jul 11 22:53:50 UTC 2011

   Modified Files:
    pkgsrc/www/wordpress: Makefile PLIST distinfo

   Log Message:
   Update to newest version - 3.2.

   Highlights:

   * Refreshed Administrative UI - Admin redesign
   * New Default Theme "Twenty Eleven" - Uses the latest Theme Features
   * Full Screen Editor - Distraction free writing experience
   * Extended Admin Bar - More useful links to control the site

   * Enhanced Browser Compatibility -
     - Drop Internet Explorer 6 support
     - Start End-of-life (EOL) cycle for Internet Explorer 7
     - Browse Happy notify users of out-of-date browser

   * WordPress is Faster and Lighter -
     - Faster page loads -- We've gone through the most commonly loaded
     pages in WP and done improvements to their load time
     - Faster Upgrades -- The update system now support incremental
     upgrades so after 3.2 you'll find upgrading faster than ever
     - Optimizations to WP_Filesystem -- Updates over FTP are now much
     quicker and less error prone
     - Stream downloads to the filesystem -- Improves update times and
     lowers the memory footprint
     - Performance improvements for wptexturize()
     - Remove PHP4 compatibility including timezone support
     - More efficient term intersection queries
     - Some optimizations in the HTML sanitizer (kses)
     - Speed optimizations for is_serialized_string()
     - Cache the Dashboard RSS Widgets HTML output to reduce unnecessary
     Ajax requests as well as the memory footprint
     - And many other improvements and tweaks

   Contains also security fixes from wordpress 3.1.4.

13 years agoPullup ticket #3469.
tron [Mon, 11 Jul 2011 07:47:28 +0000 (07:47 +0000)]
Pullup ticket #3469.

13 years agoPullup ticket #3469 - requested by bsiegert
tron [Mon, 11 Jul 2011 07:47:02 +0000 (07:47 +0000)]
Pullup ticket #3469 - requested by bsiegert
devel/gmake: portability fix

Revisions pulled up:
- devel/gmake/Makefile                                          1.78

---
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Sat Jul  9 16:25:35 UTC 2011

   Modified Files:
          pkgsrc/devel/gmake: Makefile

   Log Message:
   Do not use strndup on MirBSD, it used to be broken. Fixes lots of
   "mysterious" build failures on MirBSD.

   Reviewed by agc and joerg.

13 years agopullup #3468
spz [Sun, 10 Jul 2011 13:07:02 +0000 (13:07 +0000)]
pullup #3468

13 years agoPullup ticket #3468 - requested by mspo
spz [Sat, 9 Jul 2011 21:34:19 +0000 (21:34 +0000)]
Pullup ticket #3468 - requested by mspo
chat/bitlbee build fix

Revisions pulled up:
- chat/bitlbee/Makefile                                         1.52-1.53
- chat/bitlbee/distinfo                                         1.27

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   mspo
   Date:           Sat Jul  9 11:13:21 UTC 2011

   Modified Files:
           pkgsrc/chat/bitlbee: Makefile distinfo

   Log Message:
   Version 3.0.3:
   - Fixed Twitter compatibility. (The API call used to get the following list
     was deprecated.)
   - Twitter: Enable the show_ids setting to assign a two-digit short ID to
     recent tweets to use for retweets and replies (so you can RT/reply to more
     than just a person's last message).
   - Some other Twitter fixes/improvements.
   - "otr reconnect" command and some other fixes.
   - GnuTLS 2.12 compatibility fix.
   - Include "FLOOD=0/9999" in the 005/ISUPPORT line at login to hint the IRC
     client that rate limiting is not required. (Next step: Get IRC clients to
     parse it.)
   - Other stuff too small to mention.

   Finished 2 Jun 2011

   Version 3.0.2:
   - Fixed MSN login issues with @msn.com accounts.
   - /CTCP support: You can CTCP VERSION Jabber contacts, and CTCP NUDGE MSN
     contacts. More may come later, ideas are welcome.
   - By default, leave Twitter turned on for libpurple builds.
   - Allow using /OPER to identify/register as well. (Password security hack.)
   - Fixed proxy support with libpurple.
   - Some minor changes/fixes.

   To generate a diff of this commit:
   cvs rdiff -u -r1.51 -r1.52 pkgsrc/chat/bitlbee/Makefile
   cvs rdiff -u -r1.26 -r1.27 pkgsrc/chat/bitlbee/distinfo

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   drochner
   Date:           Sat Jul  9 13:37:51 UTC 2011

   Modified Files:
           pkgsrc/chat/bitlbee: Makefile

   Log Message:
   depend on libgcrypt explicitely
   (gnutls used to pull it in for us, but this will be cleaned up)

   To generate a diff of this commit:
   cvs rdiff -u -r1.52 -r1.53 pkgsrc/chat/bitlbee/Makefile

13 years agoAdd a file to record changes on the pkgsrc-2011Q2 branch
agc [Fri, 8 Jul 2011 08:21:50 +0000 (08:21 +0000)]
Add a file to record changes on the pkgsrc-2011Q2 branch

13 years agoRemoving files not present on branch pkgsrc-2011Q2:
branch-fixup [Fri, 8 Jul 2011 07:29:07 +0000 (07:29 +0000)]
Removing files not present on branch pkgsrc-2011Q2:
print/ted/files/README.ind
print/ted/files/md5
print/ted/patches/patch-aa
print/ted/pkg/COMMENT
print/ted/pkg/DESCR
print/ted/pkg/MESSAGE
print/ted/pkg/PLIST

13 years agoUpdated www/ikiwiki to 3.20110707
schmonz [Fri, 8 Jul 2011 03:16:23 +0000 (03:16 +0000)]
Updated www/ikiwiki to 3.20110707

13 years agoUpdate to 3.20110707. From the changelog:
schmonz [Fri, 8 Jul 2011 03:16:12 +0000 (03:16 +0000)]
Update to 3.20110707. From the changelog:

* userlist: New plugin, lets admins see a list of users and their info.
* aggregate: Improve checking for too long aggregated filenames.
* Updated to jQuery 1.6.1.
* attachment: Speed up multiple file uploads by storing uploaded files
  in a staging area until the page is saved/previewed, rather than
  refreshing the site after each upload.
  (Sponsored by The TOVA Company.)
* attachment: Files can be dragged into the edit page to upload them.
  Multiple file batch upload support. Upload progress bars.
  AJAX special effects. Impemented using the jQuery-File-Upload widget.
  (If you don't have javascript don't worry, I kept that working too.)
  (Sponsored by The TOVA Company.)
* Add libtext-multimarkdown-perl to Suggests. Closes: #630705
* headinganchors: Plugin by Paul Wise that adds ids to <hn> headings.
* html5 is not experimental anymore. But not the default either, quite yet.
* Support svg as a inlinable image type; svg images can be included on a
  page by simply linking to them, or by using the img directive.
  Note that sanitizing svg files is still not addressed.
* img: Generate png format thumbnails for svg images.
* Preserve mixed case in page creation links, and when creating a page
  whose title is mixed case, allow selecting between the mixed case and
  all lower-case names.
* Fix ikiwiki-update-wikilist -r to actually work.
* comments: collect metadata in a scan-phase preprocess hook, which
  fixes sorting comments by date. (smcv)
* Run scan hooks for internal pages (preprocess hooks already run in scan
  mode) (smcv)
* inline: Handle obfuscated urls, such as the mailto urls generated by
  markdown when forcing urls absolute.
* Bugfix for wikilink containing an email address not showing up in
  brokenlinks list.
* Bugfix for trying to attach files to a subpage of the index page.

Updating this leaf package during the freeze for bugfix purposes.

13 years agoRepo copy files
repo-copy [Fri, 8 Jul 2011 01:45:20 +0000 (01:45 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Fri, 8 Jul 2011 01:45:19 +0000 (18:45 -0700)]
Fixup fromcvs/togit conversion

13 years agoRepo copy files
repo-copy [Thu, 7 Jul 2011 21:13:11 +0000 (21:13 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Thu, 7 Jul 2011 21:13:10 +0000 (14:13 -0700)]
Fixup fromcvs/togit conversion

13 years agoadd an "upcoming retirals" section and add obache's list of
drochner [Thu, 7 Jul 2011 19:38:13 +0000 (19:38 +0000)]
add an "upcoming retirals" section and add obache's list of
useless pkgs

13 years agoMake sure that PYDISTUTILS_CREATES_EGGFILES is defined in all branches.
joerg [Thu, 7 Jul 2011 18:46:32 +0000 (18:46 +0000)]
Make sure that PYDISTUTILS_CREATES_EGGFILES is defined in all branches.

13 years agoavoid sign extension on right shift
drochner [Thu, 7 Jul 2011 17:02:12 +0000 (17:02 +0000)]
avoid sign extension on right shift
(there are more occurences, but they are followed by checks for result<0)
bump PKGREV

13 years agoRepo copy files
repo-copy [Thu, 7 Jul 2011 14:09:43 +0000 (14:09 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Thu, 7 Jul 2011 14:09:42 +0000 (07:09 -0700)]
Fixup fromcvs/togit conversion

13 years agoUse MACHINE_ARCH instead of MACHENE_GNU_ARCH, it may i?38 for i386.
obache [Thu, 7 Jul 2011 12:26:45 +0000 (12:26 +0000)]
Use MACHINE_ARCH instead of MACHENE_GNU_ARCH, it may i?38 for i386.

13 years agofixes build with curl>=7.21.7.
obache [Thu, 7 Jul 2011 11:46:31 +0000 (11:46 +0000)]
fixes build with curl>=7.21.7.

13 years agoAdd a hacks file to drop user-supplied -march values on GCC<4.4 i386.
tnn [Thu, 7 Jul 2011 11:04:35 +0000 (11:04 +0000)]
Add a hacks file to drop user-supplied -march values on GCC<4.4 i386.
Workaround for PR pkg/44912: gcc generates unaliged SSE2 references.

13 years agoUpdated net/sendfile to 2.1bnb1
mspo [Thu, 7 Jul 2011 03:07:08 +0000 (03:07 +0000)]
Updated net/sendfile to 2.1bnb1

13 years agoadding DIST_SUBDIR and PKGREVISION since the package has changed but distinfo and...
mspo [Thu, 7 Jul 2011 03:06:24 +0000 (03:06 +0000)]
adding DIST_SUBDIR and PKGREVISION since the package has changed but distinfo and version have not

13 years agoRepo copy files
repo-copy [Thu, 7 Jul 2011 01:45:08 +0000 (01:45 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Thu, 7 Jul 2011 01:45:07 +0000 (18:45 -0700)]
Fixup fromcvs/togit conversion

13 years agopropagate dependency on libXext (was introduced in the last update)
drochner [Wed, 6 Jul 2011 20:21:03 +0000 (20:21 +0000)]
propagate dependency on libXext (was introduced in the last update)

13 years agoRepo copy files
repo-copy [Wed, 6 Jul 2011 19:46:50 +0000 (19:46 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Wed, 6 Jul 2011 19:46:49 +0000 (12:46 -0700)]
Fixup fromcvs/togit conversion

13 years agoRepo copy files
repo-copy [Wed, 6 Jul 2011 15:16:04 +0000 (15:16 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Wed, 6 Jul 2011 15:16:03 +0000 (08:16 -0700)]
Fixup fromcvs/togit conversion

13 years agoUpdated devel/papaya to 0.1.7nb7
obache [Wed, 6 Jul 2011 13:18:01 +0000 (13:18 +0000)]
Updated devel/papaya to 0.1.7nb7

13 years ago* remove a redundant link in texinfo file.
obache [Wed, 6 Jul 2011 13:17:46 +0000 (13:17 +0000)]
* remove a redundant link in texinfo file.
* fixes build with texi2html-5.

Bump PKGREVISION, number of generated html files changed.

13 years agoUpdates confirmed from upstream:
mspo [Wed, 6 Jul 2011 11:31:58 +0000 (11:31 +0000)]
Updates confirmed from upstream:
frmstag@fex:~/sendfile/sendfile-2.1b/doc: head ChangeLog
2011-06-04  better POSIX compatibility and NETBSD support

13 years agoUpdated mail/cyrus-imapd24 to 2.4.10
obache [Wed, 6 Jul 2011 09:46:05 +0000 (09:46 +0000)]
Updated mail/cyrus-imapd24 to 2.4.10

13 years agoUpdate cyrus-imapd24 to 2.4.10.
obache [Wed, 6 Jul 2011 09:45:45 +0000 (09:45 +0000)]
Update cyrus-imapd24 to 2.4.10.

While here,
* Exactly enable/disable PCRE support with package option, enabled by default.
* Add workaround patches for PR#44275, sizeof(time_t) > sizeof(unsigned long).

Changes to the Cyrus IMAP Server since 2.4.9

      * fixed handling of unparsable emails during append (which would
        cause invalid cyrus.index records otherwise)
      * quota: fix a pile of bugs. #1801, virtdomain support; #2728, slow
        user delete; #3178, "file name too long" with big mailbox names;
        #3179, quota -f doubles usage.
      * Bug #3043 - parse multiple groups in headers correctly
      * Bug #3158 - lmtp backend connection timeout
      * Bug #3223 - limit MIME parsing depth to avoid stack overflows
      * Bug #3273 - add SORT=DISPLAY support (but note: still questions
        about correctness of unicode sorting)
      * Bug #3504 - convert all sieve scripts to \r\n line endings on
        upload
      * Bug #3402 - options to munge 8bit characters in headers during lmtp
        delivery to avoid backscatter
      * sync_client: fix broken keepalive TCP options (I doubt anyone ever
        tried to use it)
      * Bug #3482 - add "-o" option to ipurge to only purge messages with
        \Deleted flag set

13 years agoDon't compile those functions when using slang - they're not needed
is [Wed, 6 Jul 2011 06:24:38 +0000 (06:24 +0000)]
Don't compile those functions when using slang - they're not needed
and using an in this case undefined helper function.

13 years agoRepo copy files
repo-copy [Wed, 6 Jul 2011 01:45:54 +0000 (01:45 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Wed, 6 Jul 2011 01:45:53 +0000 (18:45 -0700)]
Fixup fromcvs/togit conversion

13 years agoRepo copy files
repo-copy [Tue, 5 Jul 2011 20:04:23 +0000 (20:04 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Tue, 5 Jul 2011 20:04:22 +0000 (13:04 -0700)]
Fixup fromcvs/togit conversion

13 years agoUpdated net/rabbitmq to 2.5.1
mspo [Tue, 5 Jul 2011 17:10:09 +0000 (17:10 +0000)]
Updated net/rabbitmq to 2.5.1

13 years agoupdate some numbers, add some markup about them
agc [Tue, 5 Jul 2011 16:48:18 +0000 (16:48 +0000)]
update some numbers, add some markup about them

13 years agostuff from yesterday
dholland [Tue, 5 Jul 2011 16:31:54 +0000 (16:31 +0000)]
stuff from yesterday

13 years agoAdd initial information for the pkgsrc-2011Q2 branch.
agc [Tue, 5 Jul 2011 16:06:47 +0000 (16:06 +0000)]
Add initial information for the pkgsrc-2011Q2 branch.

13 years agoAdd a patch to remove a non-standard option to cp;
schnoebe [Tue, 5 Jul 2011 15:06:28 +0000 (15:06 +0000)]
Add a patch to remove a non-standard option to cp;
Added a LICENSE clause to the Makefile.

13 years agoNote update of net/bind96 package to 9.6.3.1.ESV.4pl3.
taca [Tue, 5 Jul 2011 14:29:16 +0000 (14:29 +0000)]
Note update of net/bind96 package to 9.6.3.1.ESV.4pl3.

13 years agoUpdate bind96 package to 9.6.3.1.ESV.4pl3 (9.6-ESV-R4-P3), security release.
taca [Tue, 5 Jul 2011 14:28:06 +0000 (14:28 +0000)]
Update bind96 package to 9.6.3.1.ESV.4pl3 (9.6-ESV-R4-P3), security release.

The package name was selected as:

- Make sure to greater version from bind-9.6.3.
- Include "ESV" (Extended Support Version) string.

Since changes from BIND 9.6.3 are too may, please refer changes in detail:

ftp://ftp.isc.org/isc/bind/9.6-ESV-R4/CHANGES
ftp://ftp.isc.org/isc/bind/9.6-ESV-R4-P1/RELEASE-NOTES-BIND-9.6-ESV-R4-P1.html
ftp://ftp.isc.org/isc/bind/9.6-ESV-R4-P3/RELEASE-NOTES-BIND-9.6-ESV-R4-P3.html

13 years agoNote update of net/bind97 package to 9.7.3pl3.
taca [Tue, 5 Jul 2011 13:57:19 +0000 (13:57 +0000)]
Note update of net/bind97 package to 9.7.3pl3.

13 years agoUpdate bind97 package to bind-9.7.3pl3 (9.7.3-P3), security release.
taca [Tue, 5 Jul 2011 13:56:35 +0000 (13:56 +0000)]
Update bind97 package to bind-9.7.3pl3 (9.7.3-P3), security release.

--- 9.7.3-P3 released ---

3124. [bug] Use an rdataset attribute flag to indicate
negative-cache records rather than using rrtype 0;
this will prevent problems when that rrtype is
used in actual DNS packets.  [RT #24777]

--- 9.7.3-P2 released (withdrawn) ---

3123. [security] Change #2912 exposed a latent flaw in
dns_rdataset_totext() that could cause named to
crash with an assertion failure. [RT #24777]

13 years ago+ net-snmp-5.7, squid-3.1.13.
taca [Tue, 5 Jul 2011 13:36:57 +0000 (13:36 +0000)]
+ net-snmp-5.7, squid-3.1.13.

13 years agoNote update of net/bind98 package to 9.8.0pl4.
taca [Tue, 5 Jul 2011 13:36:21 +0000 (13:36 +0000)]
Note update of net/bind98 package to 9.8.0pl4.

13 years agoUpdate bind98 package to 9.8.0pl4 (9.8.0-P4), security release.
taca [Tue, 5 Jul 2011 13:35:29 +0000 (13:35 +0000)]
Update bind98 package to 9.8.0pl4 (9.8.0-P4), security release.

Introduction

   BIND 9.8.0-P4 is security patch for BIND 9.8.0.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.

--- 9.8.0-P4 released ---

3124. [bug] Use an rdataset attribute flag to indicate
negative-cache records rather than using rrtype 0;
this will prevent problems when that rrtype is
used in actual DNS packets.  [RT #24777]

--- 9.8.0-P3 released (withdrawn) ---

3126. [security] Using DNAME record to generate replacements caused
RPZ to exit with a assertion failure. [RT #23766]

3125. [security] Using wildcard CNAME records as a replacement with
RPZ caused named to exit with a assertion failure.
[RT #24715]

3123. [security] Change #2912 exposed a latent flaw in
dns_rdataset_totext() that could cause named to
crash with an assertion failure. [RT #24777]

3115. [bug] Named could fail to return requested data when
following a CNAME that points into the same zone.
[RT #2445]

13 years agoUpgrade from 2.1.0 -> latest (2.5.1). Also fixes build.
mspo [Tue, 5 Jul 2011 13:09:05 +0000 (13:09 +0000)]
Upgrade from 2.1.0 -> latest (2.5.1).  Also fixes build.

---
Release messages:
The RabbitMQ team is pleased to announce the release of RabbitMQ 2.1.1.
This release fixes a number of bugs and introduces some enhancements,
including exchange to exchange bindings and some performance improvements,
in the server and clients.

The RabbitMQ team is pleased to announce the release of RabbitMQ 2.2.0.
This release fixes a number of bugs and introduces some enhancements,
including automatic upgrades of non-clustered brokers, per-queue message
TTLs and significantly reduced memory usage for pending acknowledgements.

Perfectly timed one day before the start of the year of the Rabbit,
the RabbitMQ team is pleased to announce the release of RabbitMQ 2.3.0.
This release fixes a number of bugs and introduces some enhancements,
including streaming publish confirmations, new plugin mechanisms for
authentication and authorisation, and a great deal more.

The RabbitMQ team is pleased to announce the release of RabbitMQ 2.3.1.
This release fixes a small number of bugs, in particular one serious bug
in 2.3.0 which could lead to queue processes crashing.

The RabbitMQ team is delighted to announce the release of RabbitMQ 2.4.0.
This release fixes a number of bugs and introduces some enhancements,
including fast routing for topic exchanges, sender-selected distribution
and server-side consumer cancellation notifications.

The RabbitMQ team is delighted to announce the release of RabbitMQ 2.4.1.
This release fixes a number of bugs, in particular one bug in 2.4.0 that
would break upgrades if durable queues were present. A notable enhancement
included in this release are cluster upgrades.

The RabbitMQ team is delighted to announce the release of RabbitMQ 2.5.0.
This release fixes a number of bugs. In particular:
recovery has been simplified, improving startup times when many exchanges
or bindings exist
bindings are recovered between durable queues and non-durable exchanges
on restart of individual cluster nodes
better performance under high load and memory pressure
source compatibility with the new Erlang R14B03 release
New features include:
tracing facility for debugging incoming and outgoing messages, (see firehose)
improved inbound network performance
improved routing performance
new rabbitmqctl commands ('report', 'environment', and 'cluster_status')

The RabbitMQ team is pleased to announce the release of RabbitMQ 2.5.1.
This release correctly upgrades from RabbitMQ 2.1.1 and 2.2.0.
There are no other changes compared with 2.5.0.

13 years agoUpdate to Asterisk 1.8.4.4 (fixes AST-2011-011):
jnemeth [Tue, 5 Jul 2011 08:42:56 +0000 (08:42 +0000)]
Update to Asterisk 1.8.4.4 (fixes AST-2011-011):

               Asterisk Project Security Advisory - AST-2011-011

   +------------------------------------------------------------------------+
   |      Product       | Asterisk                                          |
   |--------------------+---------------------------------------------------|
   |      Summary       | Possible enumeration of SIP users due to          |
   |                    | differing authentication responses                |
   |--------------------+---------------------------------------------------|
   | Nature of Advisory | Unauthorized data disclosure                      |
   |--------------------+---------------------------------------------------|
   |   Susceptibility   | Remote unauthenticated sessions                   |
   |--------------------+---------------------------------------------------|
   |      Severity      | Moderate                                          |
   |--------------------+---------------------------------------------------|
   |   Exploits Known   | No                                                |
   |--------------------+---------------------------------------------------|
   |      CVE Name      | CVE-2011-2536                                     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | Asterisk may respond differently to SIP requests from an |
   |             | invalid SIP user than it does to a user configured on    |
   |             | the system, even when the alwaysauthreject option is set |
   |             | in the configuration. This can leak information about    |
   |             | what SIP users are valid on the Asterisk system.         |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Respond to SIP requests from invalid and valid SIP users  |
   |            | in the same way. Asterisk 1.4 and 1.6.2 do not respond    |
   |            | identically by default due to backward-compatibility      |
   |            | reasons, and must have alwaysauthreject=yes set in        |
   |            | sip.conf. Asterisk 1.8 defaults to alwaysauthreject=yes.  |
   |            |                                                           |
   |            | IT IS ABSOLUTELY IMPERATIVE that users of Asterisk 1.4    |
   |            | and 1.6.2 set alwaysauthreject=yes in the general section |
   |            | of sip.conf.                                              |
   +------------------------------------------------------------------------+

13 years agoUpdate to 1.6.2.19 (fixes several security issues):
jnemeth [Tue, 5 Jul 2011 08:34:47 +0000 (08:34 +0000)]
Update to 1.6.2.19 (fixes several security issues):

Please note that Asterisk 1.6.2.19 is the final maintenance release
from the 1.6.2 branch. Support for security related issues will
continue until April 21, 2012. For more information about support
of the various Asterisk branches, see
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

The release of Asterisk 1.6.2.19 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

The following is a sample of the issues resolved in this release:

* Don't broadcast FullyBooted to every AMI connection
   The FullyBooted event should not be sent to every AMI connection
   every time someone connects via AMI. It should only be sent to
   the user who just connected.
   (Closes issue #18168. Reported, patched by FeyFre)
* Fix thread blocking issue in the sip TCP/TLS implementation.
   (Closes issue #18497. Reported by vois. Tested by vois, rossbeer, kowalma,
   Freddi_Fonet. Patched by dvossel)
* Don't delay DTMF in core bridge while listening for DTMF features.
   (Closes issue #15642, #16625. Reported by jasonshugart, sharvanek. Tested by
   globalnetinc, jde. Patched by oej, twilson)
* Fix chan_local crashs in local_fixup()
   Thanks OEJ for tracking down the issue and submitting the patch.
   (Closes issue #19053. Reported, patched by oej)
* Don't offer video to directmedia callee unless caller offered it as well
   (Closes issue #19195. Reported, patched by one47)

Additionally security announcements AST-2011-008, AST-2011-010, and
AST-2011-011 have been resolved in this release.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.19

13 years agoFix broken build. Needs explicit -lgcrypt. Add comment to patch-aa.
dholland [Tue, 5 Jul 2011 05:02:10 +0000 (05:02 +0000)]
Fix broken build. Needs explicit -lgcrypt. Add comment to patch-aa.

13 years agoFix build with current png and gtk2. Fix patch-aa to not (inadvertently?)
dholland [Tue, 5 Jul 2011 04:28:34 +0000 (04:28 +0000)]
Fix build with current png and gtk2. Fix patch-aa to not (inadvertently?)
disable optimization. No version bump since package wasn't buildable.

13 years agoUpdate distinfo after patches/patch-cmake_modules_FindTagLib.cmake has
schnoebe [Tue, 5 Jul 2011 04:09:05 +0000 (04:09 +0000)]
Update distinfo after patches/patch-cmake_modules_FindTagLib.cmake has
had $ NetBSD $ expanded.

13 years agoAdd a patch for cmake/modules/FindTagLib.cmake to handle version
schnoebe [Tue, 5 Jul 2011 04:04:30 +0000 (04:04 +0000)]
Add a patch for cmake/modules/FindTagLib.cmake to handle version
comparison correctly.

13 years agoAdd libXxf86dga and libXxf86vm and their *proto, because it wants them
dholland [Tue, 5 Jul 2011 03:44:06 +0000 (03:44 +0000)]
Add libXxf86dga and libXxf86vm and their *proto, because it wants them
and with native X finds part of them and then dies. Also apply
REPLACE_PYTHON to a python script and add python dep.

13 years agoBump PKGREVISION (to 18) for previous.
dholland [Tue, 5 Jul 2011 03:27:49 +0000 (03:27 +0000)]
Bump PKGREVISION (to 18) for previous.

13 years agoPatch LP64 problems, add patch comments, fix some pkglint.
dholland [Tue, 5 Jul 2011 03:27:22 +0000 (03:27 +0000)]
Patch LP64 problems, add patch comments, fix some pkglint.
This may or may not fully run on LP64 platforms but it's much more
likely to now than previously.

13 years agoFix up xf86dga handling so it will hopefully work with -5 native X.
dholland [Tue, 5 Jul 2011 02:14:12 +0000 (02:14 +0000)]
Fix up xf86dga handling so it will hopefully work with -5 native X.

13 years agoAdd xf86dgaproto to hopefully fix -5 native X failure.
dholland [Tue, 5 Jul 2011 01:59:46 +0000 (01:59 +0000)]
Add xf86dgaproto to hopefully fix -5 native X failure.

13 years agoAdd xf86dgaproto and xextproto to hopefully fix -5 native X failure.
dholland [Tue, 5 Jul 2011 01:53:48 +0000 (01:53 +0000)]
Add xf86dgaproto and xextproto to hopefully fix -5 native X failure.

13 years agoAdd xf86dgaproto to hopefully fix -5 native X failure.
dholland [Tue, 5 Jul 2011 01:40:17 +0000 (01:40 +0000)]
Add xf86dgaproto to hopefully fix -5 native X failure.

13 years agoAdd xf86dgaproto to hopefully fix -5 native X failure.
dholland [Tue, 5 Jul 2011 01:34:59 +0000 (01:34 +0000)]
Add xf86dgaproto to hopefully fix -5 native X failure.

13 years agoIf it's going to install tcl scripts, and use REPLACE_INTERPRETER on them,
dholland [Tue, 5 Jul 2011 01:30:52 +0000 (01:30 +0000)]
If it's going to install tcl scripts, and use REPLACE_INTERPRETER on them,
it needs to depend on tcl. PKGREVISION -> 4

13 years agoAnother one that installs perl scripts and uses REPLACE_PERL without
dholland [Tue, 5 Jul 2011 01:14:20 +0000 (01:14 +0000)]
Another one that installs perl scripts and uses REPLACE_PERL without
actually depending on perl.

13 years agoThe "aot-compile" script uses python, so depend on python and deploy
dholland [Tue, 5 Jul 2011 00:28:33 +0000 (00:28 +0000)]
The "aot-compile" script uses python, so depend on python and deploy
REPLACE_PYTHON accordingly. PKGREVISION -> 3

13 years agocheck-interpreter fix. Add patch-aa for dblatex interpreter fix, see
jym [Mon, 4 Jul 2011 23:08:22 +0000 (23:08 +0000)]
check-interpreter fix. Add patch-aa for dblatex interpreter fix, see
comment in file.

13 years agocheck-interpreter fix.
jym [Mon, 4 Jul 2011 22:23:12 +0000 (22:23 +0000)]
check-interpreter fix.

13 years agocheck-interpreter fix.
jym [Mon, 4 Jul 2011 22:08:01 +0000 (22:08 +0000)]
check-interpreter fix.

13 years agoReuse the PYTHON_PATCH_SCRIPTS for interpreter fix. This is obviously
jym [Mon, 4 Jul 2011 21:58:37 +0000 (21:58 +0000)]
Reuse the PYTHON_PATCH_SCRIPTS for interpreter fix. This is obviously
the same as my previous patch, no functional change.

13 years agoNeeds USE_TOOLS+=perl:run, not just REPLACE_PERL.
dholland [Mon, 4 Jul 2011 21:37:34 +0000 (21:37 +0000)]
Needs USE_TOOLS+=perl:run, not just REPLACE_PERL.

13 years agocheck-interpreter fix.
jym [Mon, 4 Jul 2011 21:33:52 +0000 (21:33 +0000)]
check-interpreter fix.

XXX package has a dependency on kdepimlibs4 on my host. Side effect maybe.
Not sure why TeXmacs would require KDE PIM libs.

13 years agocheck-interpreter fix.
jym [Mon, 4 Jul 2011 21:22:46 +0000 (21:22 +0000)]
check-interpreter fix.

13 years agoRepo copy files
repo-copy [Mon, 4 Jul 2011 19:50:08 +0000 (19:50 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Mon, 4 Jul 2011 19:50:07 +0000 (12:50 -0700)]
Fixup fromcvs/togit conversion

13 years agoopenssl security fix
tez [Mon, 4 Jul 2011 14:49:45 +0000 (14:49 +0000)]
openssl security fix

13 years agoCorrect the fix for http://secunia.com/advisories/44572/
tez [Mon, 4 Jul 2011 14:42:57 +0000 (14:42 +0000)]
Correct the fix for secunia.com/advisories/44572/
See the thread here:
  http://www.mail-archive.com/openssl-dev@openssl.org/msg29283.html

13 years agoRepo copy files
repo-copy [Mon, 4 Jul 2011 13:52:49 +0000 (13:52 +0000)]
Repo copy files

13 years agoFixup fromcvs/togit conversion
pkgsrc fixup [Mon, 4 Jul 2011 13:52:48 +0000 (06:52 -0700)]
Fixup fromcvs/togit conversion

13 years agoa few bulk builds get compile failures in src/rpsl I can't reproduce;
spz [Mon, 4 Jul 2011 12:08:51 +0000 (12:08 +0000)]
a few bulk builds get compile failures in src/rpsl I can't reproduce;
try MAKE_JOBS_SAFE=NO to see if that fixes it for them

13 years agoneed qmake to build, add buildlink to qt4-tools.
obache [Mon, 4 Jul 2011 11:34:21 +0000 (11:34 +0000)]
need qmake to build, add buildlink to qt4-tools.