1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-17 08:01:36 +00:00
Commit Graph

4536 Commits

Author SHA1 Message Date
Yuri Victorovich
1ed4aba650 dns/py-dns-lexicon: Update 2.1.24 -> 2.2.1
Also sorted RUN_DEPENDS and reordered USE_PYTHON.

PR:		227457
Submitted by:	Goran Mekić <meka@tilda.center> (maintainer)
2018-04-12 09:30:05 +00:00
Mathieu Arnold
b0f2255552 Update to latest commit.
While there, add some placeholders for things to change when a new
branch gets there.

Sponsored by:	Absolight
2018-04-09 11:46:50 +00:00
Antoine Brodin
605711cbc5 Update to 0.7.10 2018-04-08 08:43:02 +00:00
Kirill Ponomarev
615fa83fe2 Add LICENSE and pet portlint(1) 2018-04-07 17:37:24 +00:00
Sunpoet Po-Chuan Hsieh
cb7c6bdfb3 Update dns/public_suffix_list to 20180328
- Bump PORTREVISION of dependent ports

Changes:	https://github.com/publicsuffix/list/commits/master
2018-04-07 16:33:58 +00:00
Jan Beich
ae60358af5 devel/icu: update to 61.1
Changes:	http://site.icu-project.org/download/61
ABI:		https://abi-laboratory.pro/tracker/timeline/icu4c/
PR:		227042
Exp-run by:	antoine
MFH:		2018Q2 (required by Firefox 61)
2018-04-06 15:53:16 +00:00
Mark Felder
f6e0419b45 dns/nsnotifyd: Add basic rc script
Approved by:	maintainer
2018-04-05 20:37:15 +00:00
Thomas Zander
e204684ec0 Remove superfluous files erroneously introduced in r460797
Reported by:	ashish (via mail)
2018-04-05 19:35:13 +00:00
Sunpoet Po-Chuan Hsieh
568bc64988 Update to 1.07
Changes:	http://search.cpan.org/dist/Net-DNS-SEC/Changes
2018-04-05 19:12:41 +00:00
Kirill Ponomarev
3f7f59394e Bump PORTREVISION after security/botan2 update 2018-04-04 08:37:42 +00:00
Carlos J. Puga Medina
5dc7c4c7e4 - Fix and update the comment when building dnsdist on 10.x
- Mark BROKEN on FreeBSD 10.3, fails to link due to lack of thread_local

MFH:		2018Q2 (blanket)
2018-04-04 00:56:39 +00:00
Kirill Ponomarev
11304d2053 Grab for maintainership. 2018-04-03 17:10:01 +00:00
Bernard Spil
8fcc83a7f4 dns/powerdns: Fix build with LibreSSL 2.7
- LibreSSL 2.7 implements OpenSSL 1.1 API

PR:		227184
Approved by:	Ralf van der Enden <tremere cainites net> (maintainer)
2018-04-03 15:16:00 +00:00
Kirill Ponomarev
0c68e59708 Move patch to where it belongs to. 2018-04-03 14:48:27 +00:00
Bernard Spil
36ef9ab669 dns/powerdns-recursor: Fix build with LibreSSL 2.7
- LibreSSL 2.7 implements OpenSSL 1.1 API

PR:		227183
Approved by:	Ralf van der Enden <tremere cainites net> (maintainer)
2018-04-03 12:50:30 +00:00
Sunpoet Po-Chuan Hsieh
7871ffbfbe Update to 0.1.1
Changes:	https://github.com/mmriis/simpleidn/commits/master
PR:		227152
Submitted by:	Douglas Thrift <douglas@douglasthrift.net> (maintainer)
2018-04-01 21:45:03 +00:00
Carlos J. Puga Medina
e230088b6d dns/dnsdist: Fix building against openssl from base
checking for LIBSSL... no
configure: error: OpenSSL libssl requested but libraries were not found
===>  Script "configure" failed unexpectedly.
Please report the problem to cpm@FreeBSD.org [maintainer] and attach the
"/wrkdirs/usr/ports/dns/dnsdist/work/dnsdist-1.3.0/config.log" including the
output of the failure of your make command. Also, it might be a good idea to
provide an overview of all packages installed on your system (e.g. a
/usr/local/sbin/pkg-static info -g -Ea).
*** Error code 1

Stop.
make: stopped in /usr/ports/dns/dnsdist

PR:		227180
Submitted by:	Ralf van der Enden <tremere@cainites.net>
MFH:		2018Q2
2018-04-01 16:33:16 +00:00
Carlos J. Puga Medina
e578d33451 dns/dnsdist: fix rc.d script, add support for LuaJIT and enable some new features
- Really fix the rc.d script to start using daemon(8) and add the --supervised commandline argument (which suppresses opening up the console)
- Enable DNS-over-TLS (upstream suggests enabling both GnuTLS and OpenSSL backends so you can switch in case of a serious security issue in .ie OpenSSL)
- Add OpenSSL support (enabled by default)
- Add GnuTLS support (enabled by default)
- Add dnstap support (disabled by default)
- Add SNMP support (disabled by default)
- Add support for LuaJIT or whatever you set as your default version in make.conf (disabled by default)
- Bump PORTREVISION

PR:		227175
Submitted by:	Ralf van der Enden <tremere@cainites.net>
MFH:		2018Q2
2018-04-01 15:14:45 +00:00
Carlos J. Puga Medina
9549546013 dns/dnsdist: Update dnsdist.in
- Remove -d arg in dnsdist.in as it now uses daemon(8)
- Bump PORTREVISION

Reported by:	krion
2018-04-01 12:55:16 +00:00
Carlos J. Puga Medina
4acb01de5d dns/dnsdist: Update to 1.3.0 (bugfix)
Changes: https://dnsdist.org/changelog.html#change-1.3.0

MFH:		2018Q2
2018-04-01 12:43:53 +00:00
Danilo G. Baio
0220f1f98d dns/dnscrypt-proxy2: Update to 2.0.8
Changes:	https://raw.githubusercontent.com/jedisct1/dnscrypt-proxy/2.0.8/ChangeLog

Approved by:	egypcio@googlemail.com (maintainer, implicit)
2018-03-31 13:18:30 +00:00
Thomas Zander
de89d04495 Update to upstream version 4.1.2 (bugfix release)
PR:		227112
Submitted by:	tremere@cainites.net (maintainer)
MFH:		2018Q1
2018-03-30 18:39:55 +00:00
Danilo G. Baio
7195d6be32 dns/dnscrypt-proxy2: Improve information/texts
Submitted by:	tj@mrsk.me (email)
Approved by:	egypcio@googlemail.com (maintainer, irc)
2018-03-29 00:49:47 +00:00
Mathieu Arnold
ecd1d8dea9 I no longer use those, give them back.
Sponsored by:	Absolight
2018-03-26 13:49:19 +00:00
Mathieu Arnold
a91316f51a Update to latest commit.
Sponsored by:	Absolight
2018-03-26 13:40:26 +00:00
Mathieu Arnold
6128fc1605 Correctly use PORTDOCS and PORTEXAMPLES.
Sponsored by:	Absolight
2018-03-26 13:40:19 +00:00
Danilo G. Baio
6b55b90b6b Add dns/dnscrypt-proxy2: Flexible DNS proxy with support for encrypted protocols
A flexible DNS proxy, with support for modern encrypted DNS protocols such as
DNSCrypt v2 and DNS-over-HTTP/2.

WWW: https://github.com/jedisct1/dnscrypt-proxy

Without a repocopy because it's a new port, rewritten from scratch.

PR:		225821
Submitted by:	Vinícius Zavam <egypcio@googlemail.com>
Differential Revision:	https://reviews.freebsd.org/D14319
2018-03-25 14:46:17 +00:00
Sunpoet Po-Chuan Hsieh
dee29829bd Update to 1.06
Changes:	http://search.cpan.org/dist/Net-DNS-SEC/Changes
2018-03-24 21:11:09 +00:00
Kurt Jaeger
7eeb12f3ef dns/{p5-DSC|p5-App-DSC-DataTool}: improve PORTNAME as suggested by mat
Submitted by:	mat
2018-03-23 20:10:23 +00:00
Kurt Jaeger
a6db49a466 dns/{dsc|dsp|p5-DSC|p5-App-DSC-DataTool}: fix WWW in pkg-descr
Reported by:	Andrzej Tobola <ato@iem.pw.edu.pl>
Approved by:	Leo Vandewoestijne <freebsd@dns.company> (maintainer)
2018-03-23 20:05:03 +00:00
Mathieu Arnold
4302d4db9a Update to 2.3.8.
While there, pass maintainership to submitter.

PR:		226539
Submitted by:	Leo Vandewoestijne
Sponsored by:	Absolight
2018-03-22 14:13:11 +00:00
Mathieu Arnold
6f1e9fd48d Enable the FILTER_AAAA option by default, the feature was made non
optional in recent versions, so might as well do it in older ones.

PR:		226383
Sponsored by:	Absolight
2018-03-22 14:13:02 +00:00
Kurt Jaeger
cc3c2817fe New port: dns/dsc
DSC (originally developed by The Measurement Factory and now developed
by DNS-OARC) is a system for collecting and exploring statistics from
busy DNS servers. It uses a distributed architecture with collectors
running on or near nameservers sending their data to one or more
central presenters for display and archiving. Collectors use pcap to
sniff network traffic. They transmit aggregated data to the presenter
as XML data. dsc is configurable to allow the administrator to capture
any kind of data that he or she chooses.

WWW: https://www.dns-oarc.net/dsc/

PR:		226631
Submitted by:	Leo Vandewoestijne <freebsd@dns.company>
2018-03-21 20:14:11 +00:00
Kurt Jaeger
522c80dd1a New port: dns/dsp
DNS Statistics Presenter (DSP) is a tool used
for exploring statistics from busy DNS servers
collected by DNS Statistics Collector (DSC).

WWW: https://www.dns-oarc.net/dsc/

PR:		226630
Submitted by:	Leo Vandewoestijne <freebsd@dns.company>
2018-03-21 20:12:43 +00:00
Kurt Jaeger
68fa387fbd New port: dns/p5-App-DSC-DataTool
Tool for converting, exporting, merging and transforming DSC data.

WWW: https://www.dns-oarc.net/dsc/

PR:		226628
Submitted by:	Leo Vandewoestijne <freebsd@dns.company>
2018-03-21 20:10:42 +00:00
Kurt Jaeger
b9b5c81139 New port: dns/p5-DSC
Perl Library to extract and graph DNS Statistics Collector (DSC) data

DNS Statistics Presenter (DSP) is a tool used for exploring statistics
from busy DNS servers collected by DNS Statistics Collector (DSC).
This is the Perl library that is used to extract and graph DSC data.

WWW: https://www.dns-oarc.net/dsc/

PR:		226629
Submitted by:	Leo Vandewoestijne <freebsd@dns.company>
2018-03-21 20:08:30 +00:00
Sunpoet Po-Chuan Hsieh
13c91cb6fb Update to 2.1.24
Changes:	https://github.com/AnalogJ/lexicon/releases
PR:		226819
Submitted by:	Goran Mekic <meka@tilda.center> (maintainer)
2018-03-21 19:04:29 +00:00
Kurt Jaeger
f12a0eaf7e dns/unbound: upgrade 1.6.8 -> 1.7.0
Features
- auth-zone provides a way to configure RFC7706 from unbound.conf,
  eg. with auth-zone: name: "." for-downstream: no for-upstream: yes
  fallback-enabled: yes and masters or a zonefile with data.
- Aggressive use of NSEC implementation. Use cached NSEC records to
  generate NXDOMAIN, NODATA and positive wildcard answers.
- Accept tls-upstream in unbound.conf, the ssl-upstream keyword is
  also recognized and means the same.  Also for tls-port,
  tls-service-key, tls-service-pem, stub-tls-upstream and
  forward-tls-upstream.
- [dnscrypt] introduce dnscrypt-provider-cert-rotated option,
  from Manu Bretelle.
  This option allows handling multiple cert/key pairs while only
  distributing some of them.
  In order to reliably match a client magic with a given key without
  strong assumption as to how those were generated, we need both key and
  cert. Likewise, in order to know which ES version should be used.
  On the other hand, when rotating a cert, it can be desirable to only
  serve the new cert but still be able to handle clients that are still
  using the old certs's public key.
  The `dnscrypt-provider-cert-rotated` allow to instruct unbound to not
  publish the cert as part of the DNS's provider_name's TXT answer.
- Update B root ipv4 address.
- make ip-transparent option work on OpenBSD.
- Fix #2801: Install libunbound.pc.
- ltrace.conf file for libunbound in contrib.
- Fix #3598: Fix swig build issue on rhel6 based system.
  configure --disable-swig-version-check stops the swig version check.

Bug Fixes
- Fix #1749: With harden-referral-path: performance drops, due to
  circular dependency in NS and DS lookups.
- [dnscrypt] prevent dnscrypt-secret-key, dnscrypt-provider-cert
  duplicates
- Better documentation for cache-max-negative-ttl.
- Fixed libunbound manual typo.
- Fix #1949: [dnscrypt] make provider name mismatch more obvious.
- Fix #2031: Double included headers
- Document that errno is left informative on libunbound config read
  fail.
- iana port update.
- Fix #1913: ub_ctx_config is under circumstances thread-safe.
- Fix #2362: TLS1.3/openssl-1.1.1 not working.
- Fix #2034 - Autoconf and -flto.
- Fix #2141 - for libsodium detect lack of entropy in chroot, print
  a message and exit.
- Fix #2492: Documentation libunbound.
- Fix #2882: Unbound behaviour changes (wrong) when domain-insecure is
  set for stub zone.  It no longer searches for DNSSEC information.
- Fix #3299 - forward CNAME daisy chain is not working
- Fix link failure on OmniOS.
- Check whether --with-libunbound-only is set when using --with-nettle
  or --with-nss.
- Fix qname-minimisation documentation (A QTYPE, not NS)
- Fix that DS queries with referral replies are answered straight
  away, without a repeat query picking the DS from cache.
  The correct reply should have been an answer, the reply is fixed
  by the scrubber to have the answer in the answer section.
- Fix that expiration date checks don't fail with clang -O2.
- Fix queries being leaked above stub when refetching glue.
- Copy query and correctly set flags on REFUSED answers when cache
  snooping is not allowed.
- make depend: code dependencies updated in Makefile.
- Fix #3397: Fix that cachedb could return a partial CNAME chain.
- Fix #3397: Fix that when the cache contains an unsigned DNAME in
  the middle of a cname chain, a result without the DNAME could
  be returned.
- Fix that unbound-checkconf -f flag works with auto-trust-anchor-file
  for startup scripts to get the full pathname(s) of anchor file(s).
- Print fatal errors about remote control setup before log init,
  so that it is printed to console.
- Use NSEC with longest ce to prove wildcard absence.
- Only use *.ce to prove wildcard absence, no longer names.
- Fix unfreed locks in log and arc4random at exit of unbound.
- Fix lock race condition in dns cache dname synthesis.
- Fix #3451: dnstap not building when you have a separate build dir.
  And removed protoc warning, set dnstap.proto syntax to proto2.
- Added tests with wildcard expanded NSEC records (CVE-2017-15105 test)
- Unit test for auth zone https url download.
- tls-cert-bundle option in unbound.conf enables TLS authentication.
- Fixes for clang static analyzer, the missing ; in
  edns-subnet/addrtree.c after the assert made clang analyzer
  produce a failure to analyze it.
- Fix #3505: Documentation for default local zones references
  wrong RFC.
- Fix #3494: local-zone noview can be used to break out of the view
  to the global local zone contents, for queries for that zone.
- Fix for more maintainable code in localzone.
- more robust cachedump rrset routine.
- Save wildcard RRset from answer with original owner for use in
  aggressive NSEC.
- Fixup contrib/fastrpz.patch so that it applies.
- Fix compile without threads, and remove unused variable.
- Fix compile with staticexe and python module.
- Fix nettle compile.
- Fix to check define of DSA for when openssl is without deprecated.
- iana port update.
- Fix #3582: Squelch address already in use log when reuseaddr option
  causes same port to be used twice for tcp connections.
- Reverted fix for #3512, this may not be the best way forward;
  although it could be changed at a later time, to stay similar to
  other implementations.
- Fix for windows compile.
- Fixed contrib/fastrpz.patch, even though this already applied
  cleanly for me, now also for others.
- patch to log creates keytag queries, from A. Schulze.
- patch suggested by Debian lintian: allow to -> allow one to, from
  A. Schulze.
- Attempt to remove warning about trailing whitespace.
- Added documentation for aggressive-nsec: yes.

PR:		226822
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2018-03-21 17:00:23 +00:00
Sunpoet Po-Chuan Hsieh
f24b1102b2 Update to 1.05
Changes:	http://search.cpan.org/dist/Net-DNS-SEC/Changes
2018-03-20 22:35:32 +00:00
Matthias Andree
e95ed222b3 Mark IGNORE since the stable version dns/dnsmasq is newer. 2018-03-20 16:53:15 +00:00
Koichiro Iwao
853c80c70a Update MAINTAINER to my new FreBSD.org account
also update my email address in "Created by:" field.

Approved by:	hrs (mentor)
2018-03-20 06:16:18 +00:00
Kubilay Kocak
cb418a6221 dns/py-idna: Update to 2.6
Changelog:

  https://github.com/kjd/idna/blob/v2.6/HISTORY.rst

PR:		226776
Submitted by:	sunpoet
2018-03-20 02:32:39 +00:00
Matthias Andree
1533140b17 dns/dnsmasq update to release v2.79
Note there are a few incompatible changes. For details, please see the...
Changelog: <http://thekelleys.org.uk/dnsmasq/CHANGELOG>
2018-03-19 21:10:34 +00:00
Mathieu Arnold
b0dcf1a560 Update BIND9 ports to 9.9.12, 9.10.7, 9.11.3 and 9.12.1.
Sponsored by:	Absolight
2018-03-19 11:21:38 +00:00
Mathieu Arnold
9d96fdf5d7 Update to latest commit.
Sponsored by:	Absolight
2018-03-19 11:21:33 +00:00
Yuri Victorovich
4e40009853 dns/libasr-devel: Unbreak
Port changes:
* Remove the manpage option - not needed, always on.
* Reorder USExx section

Approved by:	portmgr (port compliance, infrastructure)
2018-03-18 03:24:22 +00:00
Yuri Victorovich
48e6123de8 dns/libasr: Unbreak
Port changes:
* Remove the manpage option - not needed, always on.
* Reorder USExx section

Approved by:	portmgr (port compliance, infrastructure)
2018-03-18 03:19:13 +00:00
Sunpoet Po-Chuan Hsieh
06cb642db4 Add py-idna_ssl 1.0.1
idna-ssl patches ssl.match_hostname for Unicode(idna) domains support.

WWW: https://pypi.python.org/pypi/idna_ssl
WWW: https://github.com/aio-libs/idna-ssl
2018-03-17 10:44:12 +00:00
Don Lewis
d576258263 Upgrade dnsdbq to version 1.0.0:
* add positivity check for -l

 * avoid EPIPE from sort

 * catch the case where /bailiwick is specified for -

 * display usage errors without help text; instead, tell the user about
   the -h option

 * notice with -c is used without -A or -B

 * replace last remaining fgets with getline

 * correct and improve option-incompatibility testing

 * add -a for alternative server api prefixes, and -u for alternative
   server api syntax

 * remove some debugging code

 * remove layering violation in the 404 handling

 * allow error-body to span several tcp segments (writer_func calls)

Sponsored by:	Farsight Security, Inc.
2018-03-17 01:27:47 +00:00
Bryan Drewery
f4063b7850 Fix plist 2018-03-15 18:13:10 +00:00