Commit graph

363575 commits

Author SHA1 Message Date
taca
1b458a31f4 doc: https://support.apple.com/ja-jp/HT201624 2022-09-04 13:10:51 +00:00
taca
ab312bc246 security/ruby-metasploit-concern: update to 4.0.5
4.0.5 (2022-09-02)

* Land #39, Update Ubuntu 18.04 to 20.04 in Github CI script
2022-09-04 13:10:32 +00:00
taca
3175f950cb doc: Updated net/ruby-ruby_smb to 3.2.0 2022-09-04 13:00:46 +00:00
taca
c3f04da21e net/ruby-ruby_smb: update to 3.2.0
3.2.0 (2022-08-30)

* Land #235, Use correct TREE_CONNECT access mask
* Land #236, Add Initial MS-ICPR definitions
2022-09-04 13:00:16 +00:00
gdt
7309839ed6 doc: Updated chat/matrix-synapse to 1.65.0 2022-09-04 12:24:38 +00:00
gdt
a425ab6042 chat/matrix-synapse: Update to 1.65.0
packaging changes:

summary of upstream changes:

Synapse 1.65.0 (2022-08-16)
===========================

Features
--------

- Add support for stable prefixes for [MSC2285 (private read receipts)](https://github.com/matrix-org/matrix-spec-proposals/pull/2285). ([\#13273](https://github.com/matrix-org/synapse/issues/13273))

- Add new unstable error codes `ORG.MATRIX.MSC3848.ALREADY_JOINED`,
  `ORG.MATRIX.MSC3848.NOT_JOINED`, and
  `ORG.MATRIX.MSC3848.INSUFFICIENT_POWER` described in
  [MSC3848](https://github.com/matrix-org/matrix-spec-proposals/pull/3848).
  ([\#13343](https://github.com/matrix-org/synapse/issues/13343))

- Use stable prefixes for
  [MSC3827](https://github.com/matrix-org/matrix-spec-proposals/pull/3827).
  ([\#13370](https://github.com/matrix-org/synapse/issues/13370))

- Add a new module API method to translate a room alias into a room
  ID. ([\#13428](https://github.com/matrix-org/synapse/issues/13428))

- Add a new module API method to create a
  room. ([\#13429](https://github.com/matrix-org/synapse/issues/13429))

- Add remote join capability to the module API's
  `update_room_membership` method (in a backwards compatible
  manner). ([\#13441](https://github.com/matrix-org/synapse/issues/13441))
2022-09-04 12:24:21 +00:00
tnn
a122aace11 doc: updated git-lfs, varnish, picom 2022-09-04 12:16:31 +00:00
tnn
29fe299204 picom: update to 9.1
Notable changes:
  New blur method for the experimental backends: dual-kawase
  Support for rounding the corners of windows
  Usability of picom-trans is improved
  It's now possible to match against all values of a window property
  Fix darkening of window edges when using blur
  Some long deprecated options are removed
2022-09-04 12:12:01 +00:00
tnn
837d14c6b6 varnish: update to 7.1.1
Fixes CVE-2022-38150 VSV00009

In order to execute an attack, the attacker would have to be able to
influence the HTTP/1 responses that the Varnish Server receives from
its configured backends. A successful attack would cause the Varnish
Server to assert and automatically restart.
2022-09-04 12:04:02 +00:00
tnn
89030512ac git-lfs: update to 3.2.0
This release is a feature release which includes support for
machine-readable formats for a couple more commands, plus the ability
to automatically merge LFS-based text files from the command-line.
2022-09-04 12:00:12 +00:00
tnn
27abeeb08c doc: updated timescaledb & friends 2022-09-04 11:56:18 +00:00
tnn
f7429db9e4 postgresql-promscale_extension: update to 0.6.0
Added
  prom_api.get_default_chunk_interval()
  prom_api.get_metric_chunk_interval(TEXT)
  _ps_trace.text_matches()
  _ps_trace.tag_v_text_eq_matching_tags()
Fixed
  Don't fail metric deletion if some tables or views are missing
  Incorrect type coercion when using tag_map with = operator
  During upgrade from 0.3.x only alter relations which actually exist
Changed
  ps_trace.delete_all_traces() can only be executed when no Promscale
  connectors are running
2022-09-04 11:55:41 +00:00
tnn
921cc51bd8 timescaledb-tune: update to 0.14.1
Support different tuning profiles via the --profile argument
2022-09-04 11:48:12 +00:00
tnn
eb9faeb863 promscale: update to 0.14.0
Support for native Jaeger gRPC interface to ingest traces
Improvements to querying (PromQL and Traces)
2022-09-04 11:27:15 +00:00
tnn
9157c24649 postgresql-timescaledb: update to 2.8.0
This release includes these noteworthy features:
  time_bucket now supports bucketing by month, year and timezone
  Improve performance of bulk SELECT and COPY for distributed hypertables
  1 step CAgg policy management
  Migrate Continuous Aggregates to the new format
2022-09-04 11:25:32 +00:00
gdt
8a44ecea29 doc: Updated chat/matrix-synapse to 1.64.0 2022-09-04 10:57:29 +00:00
gdt
d8dcd2889e chat/matrix-synapse: Update to 1.64.0
packaging changes: Accept MAINTAINER handoff.

upstream changes:

Synapse 1.64.0 (2022-08-02)
===========================

Deprecation Warning
-------------------

Synapse v1.66.0 will remove the ability to delegate the tasks of
verifying email address ownership, and password reset confirmation, to
an identity server.

If you require your homeserver to verify e-mail addresses or to
support password resets via e-mail, please configure your homeserver
with SMTP access so that it can send e-mails on its own behalf.
[Consult the configuration documentation for more
information.](https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#email)


Features
--------

- Improve error messages when media thumbnails cannot be
  served. ([\#13038](https://github.com/matrix-org/synapse/issues/13038))

- Allow pagination from remote event after discovering it from
  [MSC3030](https://github.com/matrix-org/matrix-spec-proposals/pull/3030)
  `/timestamp_to_event`. ([\#13205](https://github.com/matrix-org/synapse/issues/13205))

- Add a `room_type` field in the responses for the list room and room
  details admin APIs. Contributed by
  @andrewdoh. ([\#13208](https://github.com/matrix-org/synapse/issues/13208))

- Add support for room version 10. ([\#13220](https://github.com/matrix-org/synapse/issues/13220))

- Add per-room rate limiting for room joins. For each room, Synapse
  now monitors the rate of join events in that room, and throttles
  additional joins if that rate grows too
  large. ([\#13253](https://github.com/matrix-org/synapse/issues/13253),
  [\#13254](https://github.com/matrix-org/synapse/issues/13254),
  [\#13255](https://github.com/matrix-org/synapse/issues/13255),
  [\#13276](https://github.com/matrix-org/synapse/issues/13276))

- Support Implicit TLS (TLS without using a STARTTLS upgrade,
  typically on port 465) for sending emails, enabled by the new option
  `force_tls`. Contributed by Jan
  Schär. ([\#13317](https://github.com/matrix-org/synapse/issues/13317))


Bugfixes
--------

[pruned]


Improved Documentation
----------------------

[pruned]

Deprecations and Removals
-------------------------

- Drop tables that were formerly used for
  groups/communities. ([\#12967](https://github.com/matrix-org/synapse/issues/12967))

- Drop support for calling `/_matrix/client/v3/account/3pid/bind`
  without an `id_access_token`, which was not permitted by the
  spec. Contributed by
  @Vetchu. ([\#13239](https://github.com/matrix-org/synapse/issues/13239))
2022-09-04 10:57:20 +00:00
he
c2bcbe212f rust-bin: reduce repetition in NetBSD section, fix aarch64eb entry.
Thanks to pkglint for the need to fix aarch64eb.
2022-09-04 09:57:13 +00:00
wiz
1b73e2655b doc/TODO: add some
+ Sigil-1.9.20, cvise-2.5.0, libdrm-2.4.113, libheif-1.13.0,
  mame-0.247, npm-8.19.1, py-mercurial-6.2.2, py-pip-audit-2.4.4,
  rust-analyzer-0.0.20220829, texlab-4.2.2, tomlplusplus-3.2.0,
  vala-0.56.3.
2022-09-04 08:45:56 +00:00
fox
5b1bceb507 doc: Updated security/wolfssl to 5.5.0 2022-09-04 08:42:22 +00:00
fox
84a45aaee7 security/wolfssl: Update to v5.5.0
Changes since v5.4.0:

wolfSSL Release 5.5.0 (Aug 30, 2022)

Note:
** If not free’ing FP_ECC caches per thread by calling wc_ecc_fp_free there is a
   possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
   to confirm they are free’ing FP_ECC caches per thread if enabled to avoid
   this issue.

Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
* [Low] Fault injection attack on RAM via Rowhammer leads to ECDSA key
  disclosure. Users doing operations with private ECC keys such as server side
  TLS connections and creating ECC signatures, who also have hardware that could
  be targeted with a sophisticated Rowhammer attack should update the version of
  wolfSSL and compile using the macro WOLFSSL_CHECK_SIG_FAULTS. Thanks to Yarkin
  Doroz, Berk Sunar, Koksal Must, Caner Tol, and Kristi Rahman all affiliated
  with the Vernam Applied Cryptography and Cybersecurity Lab at Worcester
  Polytechnic Institute for the report.
* [Low] In wolfSSL version 5.3.0 if compiled with --enable-session-ticket and
  the client has non-empty session cache, with TLS 1.2 there is the possibility
  of a man in the middle passing a large session ticket to the client and
  causing a crash due to an invalid free. There is also the potential for a
  malicious TLS 1.3 server to crash a client in a similar manner except in TLS
  1.3 it is not susceptible to a man in the middle attack. Users on the client
  side with –enable-session-ticket compiled in and using wolfSSL version 5.3.0
  should update their version of wolfSSL. Thanks to Max at Trail of Bits for the
  report and "LORIA, INRIA, France" for research on tlspuffin.
* [Low] If using wolfSSL_clear to reset a WOLFSSL object (vs the normal
  wolfSSL_free/wolfSSL_new) it can result in runtime issues. This exists with
  builds using the wolfSSL compatibility layer (--enable-opnesslextra) and only
  when the application is making use of wolfSSL_clear instead of
  SSL_free/SSL_new. In the case of a TLS 1.3 resumption, after continuing to use
  the WOLFSSH object after having called wolfSSL_clear, an application could
  crash. It is suggested that users calling wolfSSL_clear update the version of
  wolfSSL used. Thanks to Max at Trail of Bits for the report and "LORIA, INRIA,
  France" for research on tlspuffin.
* Potential DoS attack on DTLS 1.2. In the case of receiving a malicious
  plaintext handshake message at epoch 0 the connection will enter an error
  state reporting a duplicate message. This affects both server and client
  side. Users that have DTLS enabled and in use should update their version of
  wolfSSL to mitigate the potential for a DoS attack.

New Feature Additions
* QUIC support added, for using wolfSSL with QUIC implementations like ngtcp2
* SE050 port additions and fixes
* Added support for Dilithium post quantum algorithm use with TLS
* Support for RSA-PSS signed certificates
* Support for Infineon AURIX IDE
* Add Zephyr support for nRF5340 with CryptoCell-312

Enhancements
* Expanded ABI support by 50 APIs to include wolfCrypt and Certificates making a
  total of 113 ABIs controlled and maintained
* DTLS 1.3 partial support for ConnectionID as described by RFC9146 and RFC9147
* Added support for X509_CRL_print function
* Remove deprecated algorithms in Renesas cs+ project
* Support more build options disable/enable with i.MX CAAM build
* wolfSSL_CTX_set_options and wolfSSL_CTX_get_options functions added to non
  compatibility layer builds
* TFM: change inline x86 asm code to compile with clang
* Improvements to error queue and fix for behavior of wolfSSL_ERR_get_error
* scripts/makedistsmall.sh script added for creating a small source/header only
  package
* TLS 1.3: restrict extension validity by message, Extensions ServerName,
  SupportedGroups and ALPN must not appear in server_hello
* Add liboqs integration to CMake build system
* Adds wolfSSL_PEM_read_RSAPrivateKey() to the OpenSSL compatible API
* Added support for P384 pre-share in bundled example server
* Replace clz assembly instruction in ARM 32 builds when not supported
* Integrate chacha20-poly1305 into the EVP interface
* Additional validation that extensions appear in correct messages
* Allow SAN to be critical with ASN template build
* Support wolfSSL_CTX_set1_curves_list being available when X25519 and/or X448
  only defined
* Adds wolfSSL_PEM_read_RSA_PUBKEY() to the OpenSSL compatible API
* Match OpenSSL self signed error return with compatibility layer build
* Added wolfSSL_dtls_create_peer and wolfSSL_dtls_free_peer to help with Python
  and Go wrappers for DTLS

Fixes
* DTLS 1.3 asynchronous use case fixes
* Fix handling of counter to support incrementing across all bytes in ARM crypto
  asm
* Fixes for ED25519/ED448 private key with public key export (RFC8410)
* Fix for build with NO_TLS macro
* Fix for write dup function to copy over TLS version
* Fix to handle path lengths of 0 when checking certificate CA path lengths
* Fix for CMake not installing sp_int.h for SP math all
* When WOLFSSL_VALIDATE_ECC_IMPORT is defined ECC import validates private key
  value is less than order
* PSA crypto fixes
* Fix for not having default pkcs7 signed attributes
* DTLS socket and timeout fixes
* SP int: exptmod ensure base is less than modulus
* Fix for AddPacketInfo with WOLFSSL_CALLBACKS to not pass encrypted TLS 1.3
  handshake messages to callbacks
* Fix for sniffer to ensure the session was polled before trying to reprocess it
2022-09-04 08:41:57 +00:00
fox
63a3dd3136 doc: Updated chat/ircd-hybrid to 8.2.42 2022-09-04 08:25:34 +00:00
fox
fc260097fd chat/ircd-hybrid: Update to 8.2.42
Changes since 8.2.41:

-- Noteworthy changes in version 8.2.42 (2022-08-28)
  * Added support for reproducible builds using the `SOURCE_DATE_EPOCH` environment
    variable. See https://reproducible-builds.org/docs/source-date-epoch/ for more
    information.
  * Extban `$Q` of type acting has been implemented. This extban prevents
    matching users from using the `KICK` command.
  * Implemented channel mode `Q`. `KICK` cannot be used on channels with that mode set.
  * Implemented user mode `Z`. Users with that mode set may only receive private
    messages from other users that are connected via TLS.
  * Fixed issue where `WHO nick` on invisible clients (user mode i`) wouldn't work
2022-09-04 08:25:09 +00:00
martin
c7d223c872 Adapt to new poppler API 2022-09-04 07:55:02 +00:00
he
0547634e91 rust-bin: add the aarch64_be NetBSD variant. 2022-09-04 06:58:57 +00:00
martin
0d67506c9e Comment out broken comparision .if ${_PYTHON_VERSION} < 38
make[7]: "/usr/pkgsrc/textproc/py-pygments/Makefile" line 22: String comparison operator must be either == or !=
2022-09-04 05:48:05 +00:00
taca
e924c7e11f doc: Updated devel/ruby-i18n to 1.10.0 2022-09-04 05:37:48 +00:00
taca
5cfed1f558 devel/ruby-i18n: update to 1.10.0
Latest version is 1.12.0, but ruby-redmine50 require before 1.11.

1.9.0 (2022-01-26)

Minor version bump: The number of changes in this release are more than I
would feel comfortable including in a point release.  Therefore, I have
bumped the minor version number here. -- @radar What's Changed

* No longer rely on refinements for Hash utility methods. by @casperisfine
  in #573
* Fix typo: function is missing closing parenthesis by @patrickgramatowski
  in #585
* CI: ruby/setup-ruby with cache by @olleolleolle in #582
* Test on Ruby 3.1 & Rails 7.0x by @radar in #597
* Fix lookups of 0 keys by @movermeyer in #594
* Only deep_symbolize_keys when needed by @paarthmadan in #588
* Symbolize names and freeze values when loading from JSON by @paarthmadan
  in #587
* Clean up unneeded test aliases by @paarthmadan in #589
* Resolve Symbols using the original fallback locale by @movermeyer in #591
* Conditionally assert load_json returns symbolized data by @paarthmadan in
  #601
* Symbolize keys and freeze values when loading from YAML by @paarthmadan in
  #583
* fix ReDoS by @ooooooo-q in #600
* Exclude MissingTranslation options that are not used by the instance by
  @sundling in #581
* Remove references to default_locale in fallbacks comment by @movermeyer in
  #576
* API for marking a key as reserved by @ghiculescu in #579
* Fix missing requires of i18n/core_ext/hash by @razum2um in #574
* Fix ArgumentError when Fallbacks#map used as in Hash by @bagilevi in #570

New Contributors

* @patrickgramatowski made their first contribution in #585
* @olleolleolle made their first contribution in #582
* @movermeyer made their first contribution in #594
* @paarthmadan made their first contribution in #588
* @ooooooo-q made their first contribution in #600
* @sundling made their first contribution in #581
* @razum2um made their first contribution in #574


1.9.1 (2022-01-28)

What's Changed

* Revert "Fix missing requires of i18n/core_ext/hash" by @radar in #602
* CI: Lint the GitHub Actions YAML by @olleolleolle in #604

1.10.0 (2022-02-14)

What's Changed

New Features

* LazyLoadable Backend by @paarthmadan in #612
* Add a version badge to README by @mishina2228 in #621

Bug fixes

* Remove warning: assigned but unused variable by @mishina2228 in #611
* Minor I18n.normalize_keys improvement by @codealchemy in #616
* Allow overriding of entry resolving entry resolving separate from defaults
  by @movermeyer in #622

Other changes

* Remove pry from Gemfile as it is not used by @dvzrv in #608

New Contributors

* @dvzrv made their first contribution in #608
* @mishina2228 made their first contribution in #611
2022-09-04 05:37:23 +00:00
taca
bc409a566d mail/ruby-roadie-rails: fix typo in RUBY_RAILS_ACCEPTED 2022-09-04 05:29:12 +00:00
taca
a1c45804d2 net/ruby-net-smtp: fix dependency lines 2022-09-04 05:23:23 +00:00
taca
74879c357a net/ruby-net-pop: fix dependency lines 2022-09-04 05:22:41 +00:00
taca
9e298b473d net/ruby-net-imap: fix dependency 2022-09-04 05:21:52 +00:00
gdt
c58c82d870 doc: Updated databases/postgresql-postgis2 to 3.3.0 2022-09-04 00:31:12 +00:00
gdt
1ba5bb7abc databases/postgresql-postgis2: Update to 3.3.0
packaging changes:
  - require pgsql >= 11, per upstream
  - enable address standardizer module

PostGIS 3.3.0
2022/08/26

This version requires PostgreSQL 11 or higher, GEOS 3.6 or higher, and Proj 5.2+.
Additional features are enabled if you are running GEOS 3.9+
ST_MakeValid enhancements with 3.10+, ST_ConcaveHull and several other enhancements with GEOS 3.11+.
Requires SFCGAL 1.4.1+ for ST_AlphaShape and ST_OptimalAlphaShape.

The new --enable-lto flag improves math computations.  This new feature is disabled by default
because on some platforms, causes compilation errors (BSD and MingW64 issues have been raised)

Use below to enable it.

 ./configure --enable-lto flag

 * New features *
  - #5116, Topology export/import scripts (Sandro Santilli)
  - ST_Letters creates geometries that look like letters (Paul Ramsey)
  - #5037, postgis_sfcgal: ST_3DConvexHull (Loïc Bartoletti)
  - postgis_sfcgal: sfcgal_full_version - reports BOOST and CGAL version
    (Loïc Bartoletti)
  - GH659, MARC21/XML, ST_GeomFromMARC21, ST_AsMARC21 (Jim Jones)
  - #5132, GH683, sfcgal: ST_3DUnion aggregate function (Sergei Shoulbakov)
  - #5143, SFCGAL ST_AlphaShape and ST_OptimalAlphaShape
           Requires SFCGAL 1.4.1+ (Loïc Bartoletti)
  - #5162, ST_TriangulatePolygon with GEOS 3.11+ (Paul Ramsey, Martin Davis)
  - #5162, ST_SimplifyPolygonHull with GEOS 3.11+ (Paul Ramsey, Martin Davis)
  - #5183, topology.RemoveUnusedPrimitives (Sandro Santilli)

 * Breaking changes *
  - Drop support for PostgreSQL 9.6 and 10 (Regina Obe)
  - Change output for WKT MULTIPOINT. All points now
    wrapped in parens. (Even Roualt)
  - GH674, geometry validation and fixing is disabled
    for ST_DumpAsPolygons and ST_Polygon so it works faster
    but might produce invalid polygons. (Aliaksandr Kalenik)

 * Enhancements *
  - #2861, Add index on topology.node(containing_face) speeding up
    splitting and merging of faces (Sandro Santilli)
  - #2083, Speed up ST_RemEdge topology functions adding index on
    relation(element_id) and edge_data(abs_next*) (Sandro Santilli)
  - #5118, Allow dropping topologies with missing topogeometry sequences
    (Sandro Santilli)
  - #5111, faster topology face MBR computation (Sandro Santilli)
  - postgis_extensions_upgrade() support for upgrades from any PostGIS
    version, including yet to be released ones (Sandro Santilli)
  - #5040, add postgis_sfcgal_full_version (Loïc Bartoletti)
  - GH655, GiST: balance the tree splits better in recursive calls (Darafei Praliaskouski)
  - GH657, GiST: do not call no-op decompress function (Aliaksandr Kalenik)
  - #4939, #5161, ST_LineMerge now has option to keep the directions of input linestrings,
    useful when processing road graphs. Requires GEOS 3.11. (Sergei Shoulbakov)
  - ST_ConcaveHull GEOS 3.11+ native implementation (Paul Ramsey, Martin Davis)
  - ST_ConcaveHull GEOS 3.11+ polygon-respecting native implementation (Paul Ramsey, Martin Davis)
  - #4574, GH678, #5121 Enable Link-Time Optimizations using --enable-lto (Sergei Shoulbakov)
  - GH676, faster ST_Clip (Aliaksandr Kalenik)
  - #5135, Fast GiST index build is enabled by default for PostgreSQL 15+ (Sergei Shoulbakov)
  - #4939, #5161, ST_LineMerge now has option to keep the directions of input linestrings,
    useful when processing road graphs. Requires GEOS 3.11. (Sergei Shoulbakov)
  - #5158, pgtopo_import / pgtopo_export manpages (Sandro Santilli)
  - #5170, add a optional max_rows_per_copy to -Y option to raster2pgsql to
    control number of rows per copy statement.
    Default to 50 when not specified (Regina Obe)
  - GH698, support parallel aggregate for ST_Union (Sergei Shoulbakov)
  - #5024, Update spatial_ref_sys as part of ALTER EXTENSION update postgis (Paul Ramsey)

 * Bug Fixe *
2022-09-04 00:31:01 +00:00
pin
f444587258 doc: Updated devel/difftastic to 0.35.0 2022-09-03 20:22:32 +00:00
pin
afa3f96e47 devel/difftastic: update to 0.35.0
0.35 (released 2nd September 2022)

Diffing
 - Difftastic now fixes sliders in more cases, producing better diff results.

Parsing
 - Difftastic will now autodetect files in UTF-16-BE and UTF-16-LE.
   Previously it required files to be UTF-8.
 - Added support for Makefiles.
 - Fixed an issue with HCL language detection on .workflow files. Fixed an
   issue with Makefile language detection.

Command Line Interface
 - Fixed terminal width detection when only stderr is a TTY (e.g. when using
   difftastic with git). This was broken in 0.34.
 - Added an option --list-languages which reports all the languages supported,
   along with the extensions associated with them.
2022-09-03 20:22:10 +00:00
jperkin
910a2b25a3 samba4: Remove gensec/krb5 patch.
It doesn't appear to solve the problem, I must have had a stale install
directory around when testing.  Still none the wiser as to why the krb5 module
isn't being built correctly, but apparently it seems to work for some folks, so
it will have to be left broken on SunOS for a bit.
2022-09-03 18:49:21 +00:00
wiz
ddad135476 doc: Updated print/xpdf4 to 4.04 2022-09-03 17:06:10 +00:00
wiz
8086bd8b98 xpdf: update to 4.04.
4.04 (2022-apr-18)
------------------
When closing a file, save the current page number in ~/.xpdf.pages,
  and restore it next time the file is opened.  This can be disabled
  with "savePageNumbers no" in your xpdfrc file.
Allow the tab list to be reordered, using drag-and-drop.
Added a document information dialog, with metadata and fonts, to xpdf.
Pdftohtml now generates HTML links for URI links anchored on text.
Added the useTrueTypeUnicodeMapping xpdfrc setting.
Added the 'enableXFA' xpdfrc setting back: if set to 'no', xpdf will
  not read an XFA form, meaning all form info comes from the AcroForm.
Add support for long paths on Windows 10.
Added the "-formfields" option to pdftohtml.
Added the "-embedbackground" and "-embedfonts" options to pdftohtml.
Added the "-vstretch" option to pdftohtml.
Added the "-verbose" flag to pdfimages, pdftohtml, pdftopng, pdftoppm,
  pdftops, and pdftotext.
Added the showAttachmentsPane, showLayersPane, and showOutlinePane
  commands.
Added the 'openFile2' command to xpdf.
Added the showMenuBar, hideMenuBar, and toggleMenuBar commands to
  xpdf.
Rearrange file names in the tab list to "foo.pdf [/full/path/]", to
  improve the usability of the (narrow) tab list.
Added the 'imageMaskAntialias' xpdfrc setting.
Added the '-table' switch to pdftohtml.
Fixed a couple of progression order bugs in the JPEG 2000 decoder.
  [Thanks to shellway for the bug reports.]
Fixed a problem with subsampled pixel index computations in the JPEG
  2000 decoder.  [Thanks to shellway for the bug report.]
Fixed a couple of memory leaks triggered by fuzzed PDF files.  [Thanks
  to shellway for the bug report.]
Changed pdftohtml to generate spans with 'class=' instead of 'id=', so
  there aren't duplicate ids.  Also removed the unused id in the
  background img element.
Optimized SplashOutputDev::drawTilingPattern for the case where the
  tile is much larger than the area being drawn (i.e., the clipping
  bbox).  In this case, we can render just the needed portion of the
  tile.
Added a missing zero check for precinct size in the JPEG 2000 decoder.
  [Thanks to shellway for the bug report.]
Added a missing null check in the XFA form scanner.  [Thanks to Taolaw
  for the bug report.]
Deal with xref streams that include a free entry with gen=0xffffffff.
Fixed a problematic corner case in looking up XObject resources.
  [Thanks to shellway for the bug report.]
The unicodeRemapping config command wasn't correctly handling unsorted
  remapping files.
Improved handling of RTL text in the text extractor.
Extended the saveTabState/loadTabState commands to save/restore
  display mode, zoom, rotation, and scroll position for each tab.
Added support for Qt6.
Added a missing bounds check on stream DecodeParms arrays.  [Thanks to
  minipython for the bug report.]
Fixed an integer overflow check in XRef::readXRefTable.  [Thanks to
  yangshufan for the bug report.]
The builtin Latin1 encoding was mapping 'endash' instead of
  'softhyphen' to 0xad.  [Thanks to Jach Fong for the bug report.]
Fixed a bug in PSOutputDev::checkPageSlice() when built without
  SPLASH_CMYK.  [Thanks to irfanariq for the bug report.]
Added missing array length and type checks in Gfx::doForm().  [Thanks
  to shaohua for the bug report.]
Fixed an integer overflow security hole in the JBIG2 decoder.
Substitute Helvetica for undefined fonts and bad font objects.
Added an integer overflow check in JPXStream.  (JPXStream issue)
  [Thanks to Shin Ando @ Ricera Security for the bug report.]
The DCT (JPEG) decoder was allowing the 'interleaved' flag to be
  changed after the first scan of the image.  (CVE-2022-24106) [Thanks
  to Shin Ando @ Ricera Security for the bug report.]
2022-09-03 17:06:00 +00:00
wiz
79a3c0b3bf doc: Updated print/poppler to 22.09.0 2022-09-03 17:01:41 +00:00
wiz
dca5d393a1 Release 22.09.0:
core:
         * Splash: Do not truncate line dash patterns with more than 20 entries. Issue #1281
         * Various signature related improvements
         * Fix FormField::getFullyQualifiedName in some scenarios
         * Splash: Small optimization on dash pattern handling
         * JBIG2Stream::readHalftoneRegionSeg: Fix potential memory leak
         * Fix crashes on malformed files. Including CVE-2022-38784
         * Fix string formatting in error reporting

        glib:
         * Fix two potential memory leaks in poppler_document_create_dests_tree

        utils:
         * pdfsig: List signature field names when listing signature information
         * pdfsig: Add support for specifying signature by field name
         * pdfunite: Fix crashes on malformed files
         * pdfunite: Fix potential memory leak of docs
2022-09-03 17:01:30 +00:00
pho
3ac5859985 Fix a grammatical error in a comment 2022-09-03 16:27:56 +00:00
taca
70a8e2897d devel/ruby-redmine: update documentation in comment
Document for redmine50.
2022-09-03 16:07:34 +00:00
taca
57dcc0545a lang/ruby: better handling for dependency
Instead of "expr" command, make commands to make's variable and
later evaluate with :sh modifier.

Thank Jonathan Perkin provides problem and solution.
2022-09-03 15:33:16 +00:00
tsutsui
7d2046322c doc: Updated graphics/ruby-cairo to 1.17.8 2022-09-03 15:06:54 +00:00
taca
f8e8bbc4e9 devel/ruby-rugged: add a patch file
Add a patch file missed from previous commit.
2022-09-03 15:06:52 +00:00
tsutsui
564d8acc6d ruby-cairo: update to 1.17.8.
Upstream changes (from NEWS):

Release 1.17.8 (2022-09-01) Sutou Kouhei <kou@cozmixng.org>
===========================================================

Improvements
------------

  * Added support for Pathname for Cairo::Surface#write_to_png.
    [GitHub#37][Reported by scivola]

Thanks
------

  * scivola
2022-09-03 15:06:07 +00:00
taca
03a479af1c devel/ruby-rugged: update to 1.5.0.1
Catch up tolibgit2 1.5.0.  Changes from 1.2.0 are too many to write here
please refer: <https://github.com/libgit2/rugged/compare/v1.2.0...v1.5.0.1>.
2022-09-03 15:05:42 +00:00
taca
22fee85b51 doc: Updated devel/libgit2 to 1.5.0 2022-09-03 14:53:56 +00:00
taca
97ac6b8b90 devel/libgit2: update to 1.5.0
Update from 1.2.0 to 1.5.0 are too many write here, please refer:
<https://github.com/libgit2/libgit2/releases>.
2022-09-03 14:53:35 +00:00