Issues found with existing distfiles:
distfiles/eclipse-sourceBuild-srcIncluded-3.0.1.zip
distfiles/fortran-utils-1.1.tar.gz
distfiles/ivykis-0.39.tar.gz
distfiles/enum-1.11.tar.gz
distfiles/pvs-3.2-libraries.tgz
distfiles/pvs-3.2-linux.tgz
distfiles/pvs-3.2-solaris.tgz
distfiles/pvs-3.2-system.tgz
No changes made to these distinfo files.
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package
Like last time, where this caused no complaints.
changes from 1.0.22 to 1.0.23
-----------------------------
* have cvsd-buildroot look in all multiarch subdirectories of /lib for
NSS libraries
* portability improvement by Eric Schnoebelen
* Debian packaging updates
Changelog:
2011-06-13 release 1.0.22 of cvsd
changes since 1.0.21:
+ don't log EINTR on select() any more, not even in debug mode
+ fix for cvsd-buildroot to also work on multiarch setups
+ log address and port with bind() failures
+ Debian packaging updates
2010-09-08 release 1.0.21 of cvsd
changes since 1.0.20:
+ handle failure to bind() as a fatal error now
2010-09-05 release 1.0.20 of cvsd
changes since 1.0.19:
+ correctly listen on IPv4 and IPv6 addresses with recent Glibc
versions by not depending on the order of address records returned by
getaddrinfo() and work regardless of net.ipv6.bindv6only sysctl
2010-08-17 release 1.0.19 of cvsd
changes since 1.0.18:
+ cvsd-buildroot: ignore commented out lines in CVSROOT/passwd files
+ cvsd-buildroot: set an umask for generated files
+ some documentation updates
+ change init script dependency on $remote_fs (for /usr) from Should
to Required (thanks lintian)
+ Debian packaging improvements
2010-01-14 release 1.0.18 of cvsd
changes since 1.0.17:
+ use simpler shell semantics in cvsd-buildroot to fix a problem
with bash 4
+ fix call to uname in the cvsd-buginfo script
2009-12-30 release 1.0.17 of cvsd
changes since 1.0.16:
+ update to automake 1.11
+ some small spelling fixes in documentation
+ changed references to home page and contact email addresses to use
arthurdejong.org
+ Debian packaging improvements
the owner of all installed files is a non-root user. This change
affects most packages that require special users or groups by making
them use the specified unprivileged user and group instead.
(1) Add two new variables PKG_GROUPS_VARS and PKG_USERS_VARS to
unprivileged.mk. These two variables are lists of other bmake
variables that define package-specific users and groups. Packages
that have user-settable variables for users and groups, e.g. apache
and APACHE_{USER,GROUP}, courier-mta and COURIER_{USER,GROUP},
etc., should list these variables in PKG_USERS_VARS and PKG_GROUPS_VARS
so that unprivileged.mk can know to set them to ${UNPRIVILEGED_USER}
and ${UNPRIVILEGED_GROUP}.
(2) Modify packages to use PKG_GROUPS_VARS and PKG_USERS_VARS.
* cvsd-buildroot: further portability improvements on 64 bit platforms
* added Portuguese debconf translation by Ricardo Silva
* added warnings and errors on failing to close a socket
changes from 1.0.10 to 1.0.11
-----------------------------
* cvsd-buildroot should now install libraries in the same directory structure
as on the normal filesystem, resulting in better support for 64 bit systems
* other small improvements to cvsd-buildroot, including better error handling
and not overwriting devices
* small code improvements
Based on the work by Eric Schnoebelen and virtus@ in pkgsrc-wip.
DESCR:
cvsd is a wrapper program for cvs in pserver mode. It will run 'cvs
pserver' under a special uid/gid in a chroot jail.
cvsd is run as a daemon and is controlled through a configuration
file. It is relatively easy to configure and tools are provided
for easily setting up a rootjail.
This server can be useful if you want to run a public cvs pserver.
You should however be aware of the security limitations of running
a cvs pserver. If you want any kind of authentication you should
really consider using secure shell as a secure authentication
mechanism and transport. Passwords used in cvs pserver are transmitted
in plaintext and this wrapper won't change that.
This server adds a layer of security to cvs. cvs is a very powerful
tool and is capable of running scripts and other things. By running
cvs in a rootjail it is possible to limit the amount of "damage"
cvs can do if it is exploited. It is generally a good idea to run
cvsd without any write permissions to any directory on the system.