- Rename the LIBDANE option DANE because that's the name of the protocol
supported by libgnutls-dane and gnutls-cli. Also clarify the option
description.
- Add an IDN option.
- libgnutls-openssl has been removed in 3.4. Some ports used this library
in their LIB_DEPENDS but no port actually required it.
- Some old API functions have been removed. Ports that used these have been
updated or patched to use the new API.
- Add a patch to print/cups to prevent overlinking of libgnutls.so.
- Bump PORTREVISION on dependent ports.
net-im/jabber: This port used the old API to give users fine grained
control over which crypto algorithms were used via a configuration file.
It's not immediately obvious how to port this to the new API so the port
always uses the defaults now.
www/hydra: Mark BROKEN. This uses more removed calls than the other ports,
is said to be alpha quality and not fully functional and has been abandoned
10 years ago.
PR: 207768
Exp-run by: antoine
Approved by: portmgr (antoine)
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.
While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.
Also, replace some EXTRACT_SUFX occurences with USES=tar:*.
Checked by: make fetch-urlall-list
With hat: portmgr
Sponsored by: Absolight
- Bump PORTREVISION on all ports that depend on security/gnutls and
adjust all ports that depend on security/gnutls3
- Update mail/anubis to version 4.2 which supports gnutls 3.x
- Update mail/libvmime to a development snapshot (recommended by upstream
developers)
PR: 191274
Exp-run by: antoine
Approved by: portmgr (antoine)
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().
In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
- Incorporated rc.d script patch [2]
- Fixed incorrect use of @ignore in pkg-plist (it ignores the next file
listed in pkg-plist, not the one on the same line as the directive)
- Remove the me.sample file from ETCDIR
- Bumped PORTREVISION
PR: ports/156755 (based on)
Submitted by: Goran Lowkrantz <goran.lowkrantz@ismobile.com> [1]
Suggested by: dougb [2]
- Various pkg-plist cleanups to ensure that chmod/chown commands are
executed in the proper order during package installation
- Added LICENSE
- Fixed REQUIRES: in rc.d script
- Bumped PORTREVISION
PR: ports/154437 (based on)
Submitted by: Uffe Jakobsen <uffe@uffe.org>
- Changed syslog facility.level from local5.info to mail.info
- Removed /etc/syslog.conf mangling from pkg-install/deinstall
- Moved user/group creation from pkg-install to USERS/GROUPS style
supported by bsd.port.mk
- Updated nullmailer.in rc script to properly daemonize nullmailer-send
since the port does not use sysutils/daemontools
- Bumped PORTREVISION
Reported by: ed
corrected after the port upgrade to 1.05 had been committed. The
ChangeLog file in the upstream package had been 0 bytes, but the
new package has the complete file.
Reported by: pointyhat (pav), erwin, John M. Crawford <crawford.6@sociology.osu.edu>
* Remove dead master site
* Add the URL with the old versions to master sites to prevent 1.04
release rendering our port unfetchable
* Remove unnecessary -lstdc++ from CXXFLAGS
* Remove our implementation of SMTP authentication, since one has been
implemented by the authors (remove files/patch-doc-nullmailer-send.8,
files/patch-lib-list.h and files/patch-smtp_authentication)
* Add a note that the SMTP authentication option has been changed
Submitted by: vd
We have not checked for this KEYWORD for a long time now, so this
is a complete noop, and thus no PORTREVISION bump. Removing it at
this point is mostly for pedantic reasons, and partly to avoid
perpetuating this anachronism by copy and paste to future scripts.
The reason is strong. A quote from submitter:
In current state choose of native or nullmailer's
sendmail/mailq depends on order of paths in $PATH
instead of sysadmins choose. (/etc/mail/mail.conf in general case)
PR: ports/45152
Submitted by: "."@babolo.ru
After this patch, the action of piping mails out won't stop,
even if all of your mails were failed to deliver. Nullmailer
itself will keep throwing mails to smart relay as long as
there're incoming mails, no matter how broken the recipients
of the previous mails.
Still leave this port in FORBIDDEN state until I address
PR ports/45152
Obtained from: http://www.debian.org/security/2002/dsa-198
Noted by: Volker Stolz <stolz@i2.informatik.rwth-aachen.de>
vulnerability.
No trojan, no privilege gain. Because nullmailer is not DSN aware,
it has nothing to do if the smart relay refuses to relay correctly.
Stopping itself in such condition is a bug, or not a proper feature.
On bugtraq, it's a vulnerability anyway.