Note that version 0.7.0 was released three weeks ago on their GitHub
which features extensive cleanup to keep up-to-date with contemporary
GNUstep and recent compilers, among numerous other improvements.
* Django 4.0 will reach its End-of-Life in April 2023. Deprecate its
consumers and set the expiration date accordingly.
Reviewed by: sunpoet, wen (python, via e-mail)
Approved by: sunpoet, wen (python, via e-mail)
Differential Revision: https://reviews.freebsd.org/D38651
* Django 4.0 will reach its End-of-Life in April 2023. Deprecate it and
set the expiration date accordingly.
Reviewed by: wen (python, via e-mail)
Approved by: wen (python, via e-mail)
Differential Revision: https://reviews.freebsd.org/D38650
Changelog since 3.3.10:
It contains many bugfixes/enhancements and the following new features:
* New Global Search
* Virtual Device Contexts
* Saved Filters
* JSON/YAML Bulk Imports
* Update Existing Objects via Bulk Import
* Scheduled Reports & Scripts
* API for Staged Changes
https://netbox.readthedocs.io/en/stable/release-notes/version-3.4/
MFH: No (feature release)
* Django 3.2 is currently the "default" version in the ports tree due
its long term support until April 2024. Thus ports that are assigned
to that version will exist until then.
The following ports are required to make the upgrade of
net-mgmt/netbox to the 3.4 release possible because it requires
Django 4.1.
All of the ports listed below were created on the basis of their
respective original ports:
- devel/py-dj41-django-rq
- devel/py-dj41-graphene-django
- www/py-dj41-django-auth-ldap
- www/py-dj41-django-cors-headers
- www/py-dj41-django-debug-toolbar
- www/py-dj41-django-filter
- www/py-dj41-django-graphiql-debug-toolbar
- www/py-dj41-django-js-asset
- www/py-dj41-django-mptt
- www/py-dj41-django-prometheus
- www/py-dj41-django-redis
- www/py-dj41-django-tables2
- www/py-dj41-django-taggit
- www/py-dj41-django-timezone-field
- www/py-dj41-djangorestframework
- www/py-dj41-drf-yasg
Reviewed by: sunpoet (via e-mail)
Approved by: sunpoet (via e-mail)
Differential Revision: https://reviews.freebsd.org/D38649
* Add a workaround as NetBox 3.3 introduced some API changes which break
the plugin and since NetBox 3.4 two templates need some modifications
as well to work properly.
* Bump PORTREVISION due package change.
MFH: 2023Q1
Due to how upstream handles libraries ttyd picks up both static and
shared library of libwebsockets which is not intended. The least
intrusive way I found is to simply detect it using pkgconfig instead.
While at it, disable check for git to determine version.
Reported by: Jeff Schmidt <jeff.jschmidt@gmail.com>
Approved by: portmgr (blanket, build fix)
Stop installing a link from flang-new to flang. The former has a
deliberately obtuse interface intended to prevent casual use. While the
community sorts it self out, just stick with that to avoid future
confusion. See:
https://discourse.llvm.org/t/reviving-rename-flang-new-to-flang
Sponsored by: DARPA
https://github.com/zeek/zeek/releases/tag/v5.0.7
This release fixes the following potential DoS vulnerabilities:
- Receiving DNS responses from async DNS requests (via the
lookup_addr, etc BIF methods) with the TTL set to zero could
cause the DNS manager to eventually stop being able to make new
requests.
- Specially-crafted FTP packets with excessively long usernames,
passwords, or other fields could cause log writes to use large
amounts of disk space.
- The find_all and find_all_ordered BIF methods could take extremely
large amounts of time to process incoming data depending on the
size of the input.
This release fixes the following bugs:
- Various issues with signed/unsigned character discrepancies on
arm64 builds are fixed.
- A performance degredation in debug builds involving hashing large
keys for Dictionaries was fixed.
Reported by: Tim Wojtulewicz
Security: 7a425536-74f7-4ce4-9768-0079a9d44d11
https://github.com/zeek/zeek/releases/tag/v5.0.7
This release fixes the following potential DoS vulnerabilities:
- Receiving DNS responses from async DNS requests (via the
lookup_addr, etc BIF methods) with the TTL set to zero could
cause the DNS manager to eventually stop being able to make new
requests.
- Specially-crafted FTP packets with excessively long usernames,
passwords, or other fields could cause log writes to use large
amounts of disk space.
- The find_all and find_all_ordered BIF methods could take extremely
large amounts of time to process incoming data depending on the
size of the input.
Reported by: Tim Wojtulewicz
* Runtime-only dependency needed for mapping monitor hardware vendor IDs
to full names
For this, fix the patch to Findhwdata.cmake to actually find it.