Commit graph

2467 commits

Author SHA1 Message Date
Alex Kozlov
05a9235c98 - Fix all cases of 'No newline at end of file' in ports tree
Approved by: portmgr (bapt)
2013-02-01 15:04:00 +00:00
Baptiste Daroussin
f5f6cd6d9b Chase boost update 2013-01-31 13:38:42 +00:00
Sunpoet Po-Chuan Hsieh
e3f0c346f4 - Add BUILD_DEPENDS
- Sort TEST_DEPENDS
- Remove OPTIONS_DEFAULT: bsd.options.mk turns IPV6 on by default
- Sort MAN3
- Reformat pkg-descr
- Sort PLIST
2013-01-30 18:13:33 +00:00
Sunpoet Po-Chuan Hsieh
980eaf4238 - Cleanup Makefile header
- Fix and sort PLIST: %%SITE_PERL%%/Net/DNS/RR/SIG does not exist
2013-01-30 17:31:43 +00:00
Anton Berezin
e0aa0b3718 Update to 0.28.
Changes:	http://search.cpan.org/dist/POE-Component-Server-DNS/Changes
2013-01-28 10:42:19 +00:00
Anton Berezin
c522f597b9 Update to 1.06.
Changes: http://search.cpan.org/dist/POE-Component-Client-DNS-Recursive/Changes
2013-01-25 09:25:35 +00:00
Emanuel Haupt
c4c14fd156 - Use DOC instead of NOPORTDOCS
- Pacify portlint
- Convert header
2013-01-15 13:40:28 +00:00
Anton Berezin
5f8c080a58 Update to 1.10.
Changes:	http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
2013-01-15 12:28:59 +00:00
Bryan Drewery
d176c05f58 - Update to latest snapshot
- Fix fetching
2013-01-14 21:05:18 +00:00
Raphael Kubo da Costa
922367dd73 - Update to PowerDNS 3.2-RC4.
- Add a patch to fix ECDSA keys (algorithms 13 & 14) for DNSSEC operation;
  will be part of RC5.
- Fix CONFIGURE_ARGS for DNSSEC option (was CONFIGURE_FLAGS for some
  mysterious reason) so cryptopp is actually compiled in.

Changelog: http://rtfm.powerdns.com/changelog.html#changelog-auth-3-2

PR:		ports/175185
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
2013-01-12 16:00:01 +00:00
Marcus von Appen
7ba8ac7910 - Update to 2.2
PR:		ports/174318
Submitted by:	Rafal Lesniak <fbsd@grid.einherjar.de> (maintainer)
2013-01-12 11:04:47 +00:00
Wen Heping
ece37e64c2 - Update to 1.2.5
- Reset maintainer
2013-01-12 02:39:33 +00:00
Ruslan Makhmatkhanov
3aa56c5d63 - pass maintainership up to new volunteer
PR:		175207
Submitted by:	Simon Krenz <simon.krenz@ghostbsd.de>
2013-01-11 19:52:03 +00:00
Erwin Lansing
dc0e56bb80 Reduce lenght of the option description for RPZRRL_PATCH to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:   Terry Kennedy <terry@tmk.com>
2013-01-10 10:37:18 +00:00
Thomas Abthorpe
b2d4b657d1 - Change MAINTAINER address
- Trim headers while I am here
- Clean up some trailing whitespace
2013-01-09 19:50:06 +00:00
Erwin Lansing
bad9ad12ae Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.

More information: http://ss.vix.su/~vjs/rrlrpz.html
2013-01-09 10:20:16 +00:00
Erwin Lansing
d2c1b13640 Add LICENSE. 2013-01-04 10:47:28 +00:00
Erwin Lansing
38649eeb03 Add experimental option for Response Rate Limiting patch. 2013-01-04 10:39:41 +00:00
Philippe Audeoud
57d151afd8 - Update to 1.18
- Changelog: http://cpansearch.perl.org/src/HARDAKER/Net-DNS-ZoneFile-Fast-1.18/Changes
2013-01-03 16:37:44 +00:00
Philippe Audeoud
5b9412d5fa - Update to 0.72
- Changelog: http://cpansearch.perl.org/src/NLNETLABS/Net-DNS-0.72/Changes
2013-01-03 16:18:01 +00:00
Ruslan Makhmatkhanov
ff0bf828ac - update to 1.2.0 [1,2]
- update MASTER_SITES list [1,2]
- add hidden devel/libexecinfo dependency (reported by pawel@)

while here:
- trim Makefile header
- convert to optionsng (PORTDOCS case)
- tab -> space change in pkg-descr:WWW

PR:		173190 [1]
PR: 174514 [2]
Submitted by:	csosstudy <csosstudy@gmail.com> [1], Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer) [2]
2013-01-02 20:51:44 +00:00
Martin Matuska
9b3f7519c3 Update some of my ports to new options framework
Submitted by:	Baptiste Daroussin <bapt@FreeBSD.org>
2012-12-31 10:49:52 +00:00
Thomas Abthorpe
a2a49934f8 - Reassign to the heap at maintainer's request
Approved by:	portmgr
2012-12-29 04:36:59 +00:00
Alex Kozlov
b5668a2d41 - Update to 1.1.3
PR:	ports/174619
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer)
2012-12-24 13:01:09 +00:00
Pawel Pekala
41199a588c - Update to version 6.94 [1]
- Use CXXFLAGS, PTHREAD_LIBS during build
- Fix typo in pkg-descr
- Give maintainership to submitter

PR:		ports/174005 [1]
Submitted by:	Rodrigo (ros) OSORIO <rodrigo@bebik.net>
2012-12-20 22:56:10 +00:00
Pawel Pekala
597d7f3b37 - Update to version 2.2 [1]
- Convert tab -> space WWW: line

PR:		ports/174317 [1]
Submitted by:	Rafal Lesniak <fbsd@grid.einherjar.de> (maintainer)
2012-12-20 16:47:20 +00:00
Philippe Audeoud
b33c24bb9b - Update to 1.09
- Changelog: http://cpansearch.perl.org/src/DESPAIR/Net-Domain-ExpireDate-1.09/Changes
2012-12-19 12:17:43 +00:00
Jason E. Hale
33bd5eb62c - Fix build with clang. Patch was not updated in r309135
and no longer seems neccessary.
- Remove superfluous PORTVERSION and space
- Remove COPYING from PORTDOCS since LICENSE is defined
- Drop ABI version from LIB_DEPENDS
- Tab -> space in pkg-descr WWW line
- Remove FreeBSD keyword from pkg-plist
2012-12-18 12:36:46 +00:00
Philippe Audeoud
8fe9e6b59c - Update to 0.71
- Changelog: http://cpansearch.perl.org/src/NLNETLABS/Net-DNS-0.71/Changes
2012-12-18 09:20:26 +00:00
Beech Rintoul
6539cb3b2c - Update to 1.1.3RC2.
- Several fixes: http://www.knot-dns.cz/

PR:		ports/174515
Submitted by:	Leo Vandewoestijne <freebsd@dns-lab.com> (maintainer)
2012-12-18 00:13:03 +00:00
Andrej Zverev
ca9da06ad1 Cleanup supporting perl version 5.8 and 5.10,
lang/perl5.8 and lang/5.10 will be removed from ports tree soon.
2012-12-17 05:44:43 +00:00
Matthias Andree
18f6bd438d Update to new upstream release 2.65.
Upstream changes:

    Fix regression which broke forwarding of queries sent via
    TCP which are not for A and AAAA and which were directed to
    non-default servers. Thanks to Niax for the bug report.

    Fix failure to build with DHCP support excluded. Thanks to
    Gustavo Zacarias for the patch.

    Fix nasty regression in 2.64 which completely broke cacheing.
2012-12-15 16:34:11 +00:00
Matthias Andree
637692fcb9 Update to new upstream release 2.65.
Upstream changes:

    TCP which are not for A and AAAA and which were directed to
    non-default servers. Thanks to Niax for the bug report.

    Fix failure to build with DHCP support excluded. Thanks to
    Gustavo Zacarias for the patch.

    Fix nasty regression in 2.64 which completely broke cacheing.
2012-12-15 16:33:08 +00:00
Sergey Matveychuk
e7357dedfa - Update to 1.1.19 2012-12-14 13:56:16 +00:00
Erwin Lansing
b0e7b6c04c - Use new OPTIONS_GROUP for DLZ options.[1]
- This also allows more than one DLZ option
  to be set.[2]

Submitted by:	bapt [1] (as RADIO)
Suggested by:	az [2] (thus GROUP instead)
2012-12-14 10:43:35 +00:00
Steven Kreuzer
84b1effaa7 Update to 20121017
PR:		ports/174396
Approved by:	Mark Foster <mark@foster.cc>
2012-12-12 21:12:33 +00:00
Bryan Drewery
3046198d16 - Trim header
- Convert to new options framework
2012-12-12 19:20:45 +00:00
Wesley Shields
f184505469 Remove the header for ports I created.
For dns/openresolv give proper attribution. This was a copy/paste
mistake the submitter made, which incorrectly gave me attribution
for that file. I did not create it.
2012-12-12 18:48:33 +00:00
Philippe Audeoud
d1ad0468bb - Update to 0.70
- Changelog: http://cpansearch.perl.org/src/NLNETLABS/Net-DNS-0.70/Changes
2012-12-12 11:06:36 +00:00
Baptiste Daroussin
7c354b1913 Decommissioning java 1.5 (EOLed since October 2009):
suppress any reference to JAVA_VERSION=	1.5+ (part2)
2012-12-10 13:18:28 +00:00
Ryan Steinmetz
cf9bd998c7 - Reset MAINTAINER on ports with addresses that have unrecoverable bounces.
Reported by:	portscout
Feature safe:	yes
2012-12-06 16:39:07 +00:00
Erwin Lansing
f7345394fe Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
2012-12-05 07:46:03 +00:00
Matthias Andree
7ba3466186 Update to new upstream release 2.64.
Feature safe:	yes

Changelog for version 2.64:

Handle DHCP FQDN options with all flag bits zero and --dhcp-client-update set.
Thanks to Bernd Krumbroeck for spotting the problem.

Finesse the check for /etc/hosts names which conflict with DHCP names.
Previously a name/address pair in /etc/hosts which didn't match the
name/address of a DHCP lease would generate a warning. Now that only
happesn if there is not also a match. This allows multiple addresses for
a name in /etc/hosts with one of them assigned via DHCP.

Fix broken vendor-option processing for BOOTP. Thanks to Hans-Joachim
Baader for the bug report.

Don't report spurious netlink errors, regression in 2.63. Thanks to
Vladislav Grishenko for the patch.

Flag DHCP or DHCPv6 in starup logging. Thanks to Vladislav Grishenko for
the patch.

Add SetServersEx method in DBus interface. Thanks to Dan Williams for
the patch.

Add SetDomainServers method in DBus interface. Thanks to Roy Marples for
the patch.

Fix build with later Lua libraries. Thansk to Cristian Rodriguez for the
patch.

Add --max-cache-ttl option. Thanks to Dennis Kaarsemaker for the patch.

Fix breakage of --host-record parsing, resulting in infinte loop at
startup. Regression in 2.63. Thanks to Haim Gelfenbeyn for spotting
this.

Set SO_REUSEADDRESS and SO_V6ONLY options on the DHCPv6 socket, this
allows multiple instances of dnsmasq on a single machine, in the same
way as for DHCPv4. Thanks to Gene Czarcinski and Vladislav Grishenko for
work on this.

Fix DHCPv6 to do access control correctly when it's configured with
--listen-address. Thanks to Gene Czarcinski for sorting this out.

Add a "wildcard" dhcp-range which works for any IPv6 subnet,
--dhcp-range=::,static Useful for Stateless DHCPv6. Thanks to Vladislav
Grishenko for the patch.

Don't include lease-time in DHCPACK replies to DHCPINFORM queries, since
RFC-2131 says we shouldn't. Thanks to Wouter Ibens for pointing this
out.

Makefile tweak to do dependency checking on header files.  Thanks to
Johan Peeters for the patch.

Check interface for outgoing unsolicited router advertisements, rather
than relying on interface address configuration. Thanks to Gene
Czarinski for the patch.

Handle better attempts to transmit on interfaces which are still doing
DAD, and specifically do not just transmit without setting source
address and interface, since this can cause very puzzling effects when a
router advertisement goes astray. Thanks again to Gene Czarinski.

Get RA timers right when there is more than one dhcp-range on a subnet.
2012-12-04 22:29:10 +00:00
Wesley Shields
b297fe0670 Update to 3.2.r1
Add a patch to build with clang.

PR:		ports/173861
Submitted by:	Ralf van der Enden <tremere@cainites.net> (maintainer)
Feature safe:	yes
2012-12-04 20:19:22 +00:00
Sunpoet Po-Chuan Hsieh
5eacd0cdbe - Update to 0.1.10
- Cleanup Makefile header

Changes:	http://search.cpan.org/dist/Mozilla-PublicSuffix/Changes
Feature safe:	yes
2012-12-04 08:48:56 +00:00
Ruslan Makhmatkhanov
a09a00ced1 - update to 1.3.12
while here:
- trim Makefile header
- remove trailin dots from options descriptions

PR:		174094
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2012-12-04 08:37:13 +00:00
Matthias Andree
2f90573870 Update to new upstream release candidate #3 to 2.64.
Feature safe: yes
2012-12-03 21:20:37 +00:00
Ruslan Makhmatkhanov
4cfc195422 - update WWW
- remove Author field, while here

PR:		172886
Submitted by:	Aldis Berjoza <graudeejs@gmail.com>
Approved by:	maintainer timeout (1 month+)
Feature safe:	yes
2012-12-03 12:23:42 +00:00
Erwin Lansing
534bdf4937 Improve the SSL option description
Submitted by:	Kazunori Fujiwara <fujiwara@jprs.co.jp>
Feature safe:	yes
2012-12-03 10:52:11 +00:00
Erwin Lansing
680f311898 Remove gpg signature checking that in itself does not
provide any additional security.

Feature safe:	yes
2012-12-03 10:48:18 +00:00