1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-12 03:00:28 +00:00
Commit Graph

2112 Commits

Author SHA1 Message Date
Chris Rees
c2538a4521 - Update to 1.3.1
- Pass maintainership to submitter (thank you for volunteering)
- Add LICENSE
- Unbreak -- fix dependencies

PR:		ports/158948
Submitted by:	Jason Helfman <jhelfman@experts-exchange.com>
2011-08-16 09:07:11 +00:00
Steve Wills
22b3f87c05 - Fix building when security/polarssl is already installed
PR:		ports/159741
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-08-14 02:46:28 +00:00
Koop Mast
0e682dded4 Remove USE_GNOME=gnometarget from ports. It has been a empty keyword since
mid 2008.

PR:		ports/159624
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
2011-08-11 19:20:17 +00:00
Steve Wills
63a9771093 - Fix/add usage of SQLITE3_CFLAGS and SQLITE3_LIBS as detected by pkg-config
- Fixes compilation on systems that don't have math/gmp installed

PR:		ports/159617
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-08-10 17:16:26 +00:00
Pav Lucistnik
b196076da0 - Update to 3.0
PR:		ports/159349
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2011-08-08 12:38:59 +00:00
Steve Wills
65b5b82404 - Update to 0.913
- Make use of CPAN:USER macro
- Correct LICENSE (ART10 instead of ART20)
- Pet portlint(1) by reordering LICENSE section

PR:		ports/159314
Submitted by:	Jase Thew <freebsd@beardz.net> (maintainer)
2011-08-07 04:39:14 +00:00
Steve Wills
603811e2cc - Mark broken with Ruby 1.9
With hat:	ruby@
2011-08-06 14:40:47 +00:00
Mark Linimon
646c7d94fb Assign to new volunteer.
PR:		ports/159394
Submitted by:	ports@eitanadler.com
2011-08-03 04:17:20 +00:00
Frederic Culot
cf21065204 - Update to 0.07
- Add LICENSE (Artistic 1 & GPLv1)

Changes:	http://search.cpan.org/dist/Net-DNS-Lite/Changes
2011-08-02 19:05:27 +00:00
Baptiste Daroussin
d389c2f0a8 Deprecate some ports where I can't find distfiles and upstream 2011-08-02 17:04:00 +00:00
Baptiste Daroussin
bdf39c48d5 Mark BROKEN: Does not fetch 2011-08-02 11:31:36 +00:00
Doug Barton
ceb0439ba5 Update to version 9.7.4 which contains various bug fixes and improvements:
ftp://ftp.isc.org/isc/bind9/9.7.4/RELEASE-NOTES-BIND-9.7.4.html
2011-08-02 07:03:06 +00:00
Doug Barton
5dd3657b45 Remove patch incorporated into version 9.7.4 2011-08-02 07:01:37 +00:00
Doug Barton
696877900f Update to version 9.6-ESV-R5 which contains various bug fixes
and improvements:

ftp://ftp.isc.org/isc/bind9/9.6-ESV-R5/RELEASE-NOTES-BIND-9.6-ESV.html
2011-08-02 06:55:18 +00:00
Doug Barton
585dab5af8 Remove patch incorporated into version 9.6-ESV-R5 2011-08-02 06:53:03 +00:00
Ryan Steinmetz
d7ecc7c232 Update to 1.8.1 [1]
Add LICENSE

PR:		ports/159199
Submitted by:	Rob Farmer <rfarmer@predatorlabs.net> (maintainer) [1]
Approved by:	tabthorpe (mentor)
2011-07-28 21:59:28 +00:00
Chris Rees
65f55dc660 Removed dns/dhid -- expired 25/July
2011-07-25 dns/dhid: Unmaintained, distfile has changed with no explanation
2011-07-28 07:16:00 +00:00
Mark Linimon
06e6677793 Now that the Java 1.3 and Java 1.4 ports are deprecated and will expire soon,
remove support for them from bsd.java.mk.  As Jikes is not available in Java 1.5
or higher, remove it from bsd.java.mk too (suggested by hq@) and from the ports
which used it (only occurences were USE_JIKES=no).  Support for the Blackdown VM
is also removed, as it is not available in Java 1.5 and higher.

Also remove the mapping from Java 1.1-1.4 to Java 1.5+ in bsd.java.mk to detect
old, broken ports; therefore bump the minimal value of JAVA_VERSION to 1.5.
While here, replace static values of JAVA_VERSION in files/*.in by
%%JAVA_VERSION%% .

PR:		ports/158969
Submitted by:	rene
Tested on:	pointyhat-west -exp
2011-07-21 05:03:02 +00:00
Chris Rees
5b93f10851 - Use USERS and GROUPS
- Stop clobbering config files on deinstall

PR:		ports/157854
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com>
Approved by:	rene (mentor, implicit), maintainer timeout (14 days)
2011-07-19 17:44:30 +00:00
Doug Barton
2b4caa4539 Fix the location of the default pid file in named.8
Problem pointed out in the PR

PR:		conf/155006
Submitted by:	Helmut Schneider <jumper99@gmx.de>
2011-07-17 04:08:59 +00:00
Mark Linimon
57a8d7d6ed Mark as broken on sparc64: does not compile. 2011-07-16 05:23:59 +00:00
Ryan Steinmetz
72a02a04ab Update my email address on the ports I maintain.
Approved by: wxs@ (mentor)
2011-07-15 21:15:29 +00:00
Julien Laffaye
76b41420b1 Update to 1.3.0
PR:		ports/158865
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Approved by:	bapt (mentor)
2011-07-15 20:55:00 +00:00
Sergey Matveychuk
567660bb5f - Update to 1.4.12 (a bugfix release)
- Disable GOST by default
- Depend on dns/ldns
2011-07-15 12:53:51 +00:00
Julien Laffaye
edc7b95ba3 Update to 1.22
PR:		ports/158785
Submitted by:	Hung-Yi Chen <gaod@hychen.org> (maintainer)
Approved by:	bapt (mentor, implicit)
2011-07-11 12:44:42 +00:00
Chris Rees
103090375c Pass maintainership to submitter
PR:		ports/156029
Approved by:	rene (mentor, implicit), maintainer (linimon, in PR close message)
2011-07-10 15:53:36 +00:00
Mark Linimon
0a888c56fd Update to 2.3.5. Changes:
- Add SPF support
 - Added rotation of name servers - SF Patch ID: 2795929.
 - Address sourceforge patch requests 2981978, 2795932 to add revlookupall
   and raise DNSError instead of IndexError on server fail.
 - Use blocking IO with timeout for TCP replies.
 - Don't try to close socket when never opened.
 - Clarify CNRI (academic-style) license.

PR:		ports/156029
Submited by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
2011-07-09 23:51:44 +00:00
Chris Rees
c32d99baaf Use USERS
PR:		ports/157597
Submitted by:	crees (me)
Reviewed by:	rene (mentor, implicit), maintainer timeout (sem, 34 days)
2011-07-09 16:30:19 +00:00
Doug Barton
8ad17aaad7 Update to versions 9.8.0-P4, 9.7.3-P3, and 9.6-ESV-R4-P3.
ALL BIND USERS ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerabilities:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464

CVE-2011-2465
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected versions of BIND could cause the "named" process
to exit when queried, if the server has recursion enabled and was
configured with an RPZ zone containing certain types of records.
Specifically, these are any DNAME record and certain kinds of CNAME
records.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2465
https://www.isc.org/software/bind/advisories/cve-2011-2465

Additional changes in this version:

* If named is configured to be both authoritative and resursive and
  receives a recursive query for a CNAME in a zone that it is
  authoritative for, if that CNAME also points to a zone the server
  is authoritative for, the recursive part of name will not follow
  the CNAME change and the response will not be a complete CNAME
  chain. [RT #24455]

  Thus the patch for this bug has been removed from the port

* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
  with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
  query type independant. [RT #24715] [CVE-2011-1907]
2011-07-05 21:19:20 +00:00
Doug Barton
f62fd077b1 Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3.
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerability:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
2011-07-05 21:18:24 +00:00
Chris Rees
35d361ad63 - Use USERS and GROUPS
PR:		ports/157601
Approved by:	rene (mentor, implicit)
2011-07-04 19:05:05 +00:00
Chris Rees
501ee714ab - Use USERS and GROUPS
PR:		ports/157587
Submitted by:	Chris Rees <utisoft@gmail.com>
Approved by:	rene (mentor)
2011-07-03 15:12:31 +00:00
Sergey Matveychuk
7855dfcc04 - Update to 1.4.11 2011-07-01 14:46:19 +00:00
Matthias Andree
983a91c89d Fix clang build, using REINPLACE_CMD to change gcc to ${CC}.
Add missing #include <string.h> in dns.c (adds files/patch-dns.c)
Fix obvious format string error in html.c (adds files/patch-html.c)
2011-07-01 01:33:11 +00:00
Chris Rees
29fb0f538c - Use USERS and GROUPS
PR:		ports/157578
Submitted by:	Chris Rees (utisoft@gmail.com)
Approved by:	tabthorpe (co-mentor)
2011-06-27 17:54:21 +00:00
Sunpoet Po-Chuan Hsieh
6be06238e9 - Update to 0.111300
Changes:	http://search.cpan.org/dist/Net-Amazon-Route53/Changes
PR:		ports/158288
Submitted by:	Jin-Sih Lin <linpct@gmail.com>
Approved by:	Jui-Nan Lin <jnlin@csie.nctu.edu.tw> (maintainer)
2011-06-26 15:18:01 +00:00
Chris Rees
6bd66d92b3 - Deprecate; Unmaintained, distfile has changed with no explanation, uses pw directly
Expires in one month

PR:		ports/157603
Approved by:	rene (mentor)
2011-06-25 20:26:47 +00:00
Philip M. Gollucci
8d254b7c31 - Cannoicalize the WWW: [again],
- Save redirects s/http/https/ for github
2011-06-23 17:51:43 +00:00
Juergen Lock
f7ef738b39 Fix build with clang.
PR:		ports/158180
Submitted by:	Niclas Zeising <niclas.zeising@gmail.com>
2011-06-22 23:25:31 +00:00
Wesley Shields
c05bcd80f5 - Update to 20110502.
- Add LICENSE.

PR:		ports/157675
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
Approved by:	maintainer timeout
2011-06-22 00:23:38 +00:00
Andrej Zverev
302b9a7c36 - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.
See http://wiki.freebsd.org/Perl for details.
- Change maintainership from ports@ to perl@ for ports in this changeset.
- Remove MD5 checksum
- Utilize CPAN macro
2011-06-21 06:58:49 +00:00
Andrej Zverev
dec946ad51 - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.
See http://wiki.freebsd.org/Perl for details.
- Change maintainership from ports@ to perl@ for ports in this changeset.
- Remove MD5 checksum
2011-06-20 08:37:15 +00:00
Steve Wills
63b9b4b7d9 Net::DNS is a pure Ruby DNS library, with a clean
OO interface and an extensible API

WWW: http://rubygems.org/gems/net-dns

PR:		ports/158012
Submitted by:	rpsfa at rit.edu
2011-06-19 16:29:21 +00:00
Emanuel Haupt
3bebff90a1 Update to 1.2.1 2011-06-17 18:54:56 +00:00
Baptiste Daroussin
85fcbc81d7 ftp master site no more available 2011-06-16 06:17:32 +00:00
Julien Laffaye
e93d85f4d6 Update my e-mail to my FreeBSD one.
While I am here, use GOOGLE_CODE instead of ${MASTER_SITE_GOOGLE_CODE}

Approved by:	bapt (mentor)
2011-06-08 16:52:32 +00:00
Steve Wills
9b6734d93d - Update to 1.01
- Add build depend to silence build warning

Changes:	http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
2011-06-05 01:37:41 +00:00
Frederic Culot
1abd16b102 Net::DNS::Check is a collection of OOP Perl modules allowing easy
implementation of applications for domain name checking.

WWW: http://search.cpan.org/dist/Net-DNS-Check/

PR:		ports/157445
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
2011-06-01 08:53:22 +00:00
Wen Heping
88d610f023 - Update to 1.6.10
PR:		ports/157478
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2011-06-01 01:18:24 +00:00
Doug Barton
d88f9b8236 BIND 9.4.x is now EOL 2011-06-01 00:22:22 +00:00