Commit graph

349483 commits

Author SHA1 Message Date
rhialto
993f3ccfdb mail//milter-greylist and spamass-milter: undo previous change.
It seems I cried wolf too soon.
2021-12-26 16:13:45 +00:00
nia
5526bd41d0 perl5: Add bits from UnixWare, from Boyd Lynn Gerber 2021-12-26 15:50:16 +00:00
triaxx
6132d48f41 doc: Updated mail/fetchmailconf to 6.4.25 2021-12-26 15:30:54 +00:00
triaxx
3b88ff031a fetchmailconf: Update to 6.4.25 2021-12-26 15:30:09 +00:00
triaxx
17f25fab11 doc: Updated mail/fetchmail to 6.4.25 2021-12-26 15:29:00 +00:00
triaxx
6018c823de fetchmail: Update to 6.1.25
upstream changes:
-----------------
fetchmail-6.4.25 (released 2021-12-10, 31653 LoC):

# BREAKING CHANGES:
* Since distributions continue patching for LibreSSL use, which cannot be
  linked legally, block out LibreSSL in configure.ac and socket.c, and
  refer to COPYING, unless on OpenBSD (which ships it in the base system).
  OpenSSL and wolfSSL 5 can be used.  SSL-related documentation was updated, do
  re-read COPYING, INSTALL, README, README.packaging, README.SSL.
* Bump OpenSSL version requirement to 1.0.2f in order to safely remove
  the obsolete OpenSSL flag SSL_OP_SINGLE_DH_USE. This blocks out 1.0.2e and
  older 1.0.2 versions. 1.0.2f was a security fix release, and 1.0.2u is
  publicly available from https://www.openssl.org/source/old/1.0.2/
* Some of the configure.ac fiddling MIGHT have broken cross-compilation
  again. The maintainer does not test cross-compiling fetchmail; if you
  have difficulties, try setting PKG_CONFIG_LIBDIR to the pkg-config path
  containing your target/host libraries, or see if --with-ssl-prefix or
  --with-wolfssl-prefix, or overriding LDFLAGS/LIBS/CPPFLAGS, can help.
  Feedback solicited on compliant systems that are before end-of-life.

# BUG FIXES:
* 6.4.24's workaround for OpenSSL 1.0.2's X509_V_FLAG_TRUSTED_FIRST flag
  contained a typo and would not kick in properly.
* Library and/or rpath setting from configure.ac was fixed.

# ADDITIONS:
* Added an example systemd unit file and instructions to contrib/systemd/
  which runs fetchmail as a daemon with 5-minute poll intervals.
  Courteously contributed by Barak A. Pearlmutter, Debian Bug#981464.
* fetchmail can now be used with wolfSSL 5's OpenSSL compatibility layer,
  see INSTALL and README.SSL. This is considered experimental.
  Feedback solicited.

# CHANGES:
* The getstats.py dist-tool now counts lines of .ac and .am files.
* ./configure --with-ssl now supports pkg-config module names, too. See INSTALL.

# TRANSLATIONS: language translations were updated by these fine people:
(in reverse alphabetical order of language codes so as not to prefer people):
* sv:    Göran Uddeborg [Swedish]
* sq:    Besnik Bleta [Albanian]
* pl:    Jakub Bogusz [Polish]
* ja:    Takeshi Hamasaki [Japanese]
* fr:    Frédéric Marchal [French]
* eo:    Keith Bowes [Esperanto]
* cs:    Petr Pisar [Czech]

# CREDITS:
* Thanks to Corey Halpin for testing release candidates.

--------------------------------------------------------------------------------
fetchmail-6.4.24 (released 2021-11-20, 30218 LoC):

# OPENSSL AND LICENSING NOTE:
> see fetchmail-6.4.22 below, and the file COPYING.

  Note that distribution of packages linked with LibreSSL is not feasible
  due to a missing GPLv2 clause 2(b) exception.

# COMPATIBILITY:
* Bison 3.8 dropped yytoknum altogether, breaking compilation due to a
  warning workaround. Remove the cast of yytoknum to void.  This may cause
  a compiler warning to reappear with older Bison versions.
* OpenSSL 1.0.2: Workaround for systems that keep the expired DST Root CA X3
  certificate in its trust store because OpenSSL by default prefers the
  untrusted certificate and fails.  Fetchmail now sets the
  X509_V_FLAG_TRUSTED_FIRST flag (on OpenSSL 1.0.2 only).
  This is workaround #2 from the OpenSSL Blog.  For details, see both:
  https://www.openssl.org/blog/blog/2021/09/13/LetsEncryptRootCertExpire/
  https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/

  NOTE: OpenSSL 1.0.2 is end of life, it is assumed that the OpenSSL library
  is kept up to date by a distributor or via OpenSSL support contract.
  Where this is not the case, please upgrade to a supported OpenSSL version.

# DOCUMENTATION:
* The manual page was revised after re-checking with mandoc -Tlint, aspell,
  igor. Some more revisions were made for clarity.

# TRANSLATIONS: language translations were updated by these fine people:
* sv:    Göran Uddeborg [Swedish]
* pl:    Jakub Bogusz [Polish]
* fr:    Frédéric Marchal [French]
* cs:    Petr Pisar [Czech]
* eo:    Keith Bowes [Esperanto]
* ja:    Takeshi Hamasaki [Japanese]

--------------------------------------------------------------------------------
fetchmail-6.4.23 (released 2021-10-31, 30206 LoC):

# USABILITY:
* For common ssh-based IMAP PREAUTH setups (i. e. those that use a plugin
  - no matter its contents - and that set auth ssh), change the STARTTLS
  error message to suggest sslproto '' instead.
  This is a commonly reported issue after the CVE-2021-39272 fix in 6.4.22.
  Fixes Redhat Bugzilla 2008160. Fixes GitLab #39.

# TRANSLATIONS: language translations were updated by these fine people:
* ja:    Takeshi Hamasaki [Japanese]
* sr:	 Мирослав Николић (Miroslav Nikolić) [Serbian]

--------------------------------------------------------------------------------
fetchmail-6.4.22 (released 2021-09-13, 30201 LoC):

# OPENSSL AND LICENSING NOTE:
* fetchmail 6.4.22 is compatible with OpenSSL 1.1.1 and 3.0.0.
  OpenSSL's licensing changed between these releases from dual OpenSSL/SSLeay
  license to Apache License v2.0, which is considered incompatible with GPL v2
  by the FSF.  For implications and details, see the file COPYING.

# SECURITY FIXES:
* CVE-2021-39272: fetchmail-SA-2021-02: On IMAP connections, without --ssl and
  with nonempty --sslproto, meaning that fetchmail is to enforce TLS, and when
  the server or an attacker sends a PREAUTH greeting, fetchmail used to continue
  an unencrypted connection.  Now, log the error and abort the connection.
  --Recommendation for servers that support SSL/TLS-wrapped or "implicit" mode on
  a dedicated port (default 993): use --ssl, or the ssl user option in an rcfile.
  --Reported by: Andrew C. Aitchison, based on the USENIX Security 21 paper "Why
  TLS is better without STARTTLS - A Security Analysis of STARTTLS in the Email
  Context" by Damian Poddebniak, Fabian Ising, Hanno Böck, and Sebastian
  Schinzel.  The paper did not mention fetchmail.

* On IMAP and POP3 connections, --auth ssh no longer prevents STARTTLS
  negotiation.
* On IMAP connections, fetchmail does not permit overriding a server-side
  LOGINDISABLED with --auth password any more.
* On POP3 connections, the possibility for RPA authentication (by probing with
  an AUTH command without arguments) no longer prevents STARTTLS negotiation.
* For POP3 connections, only attempt RPA if the authentication type is "any".

# BUG FIXES:
* On IMAP connections, when AUTHENTICATE EXTERNAL fails and we have received the
  tagged (= final) response, do not send "*".
* On IMAP connections, AUTHENTICATE EXTERNAL without username will properly send
  a "=" for protocol compliance.
* On IMAP connections, AUTHENTICATE EXTERNAL will now check if the server
  advertised SASL-IR (RFC-4959) support and otherwise refuse (fetchmail <= 6.4
  has not supported and does not support the separate challenge/response with
  command continuation)
* On IMAP connections, when --auth external is requested but not advertised by
  the server, log a proper error message.
* Fetchmail no longer crashes when attempting a connection with --plugin "" or
  --plugout "".
* Fetchmail no longer leaks memory when processing the arguments of --plugin or
  --plugout on connections.
* On POP3 connections, the CAPAbilities parser is now caseblind.
* Fix segfault on configurations with "defaults ... no envelope". Reported by
  Bjørn Mork. Fixes Debian Bug#992400.  This is a regression in fetchmail 6.4.3
  and happened when plugging memory leaks, which did not account for that the
  envelope parameter is special when set as "no envelope". The segfault happens
  in a constant strlen(-1), triggered by trusted local input => no vulnerability.
* Fix program abort (SIGABRT) with "internal error" when invalid sslproto is
  given with OpenSSL 1.1.0 API compatible SSL implementations.

# CHANGES:
* IMAP: When fetchmail is in not-authenticated state and the server volunteers
  CAPABILITY information, use it and do not re-probe. (After STARTTLS, fetchmail
  must and will re-probe explicitly.)
* For typical POP3/IMAP ports 110, 143, 993, 995, if port and --ssl option
  do not match, emit a warning and continue. Closes Gitlab #31.
  (cherry-picked from 6.5 beta branch "legacy_6x")
* fetchmail.man and README.SSL were updated in line with RFC-8314/8996/8997
  recommendations to prefer Implicit TLS (--ssl/ssl) and TLS v1.2 or newer,
  placing --sslproto tls1.2+ more prominently.
  The defaults shall not change between 6.4.X releases for compatibility.

# TRANSLATIONS: language translations were updated by these fine people:
* sq:    Besnik Bleta [Albanian]
* cs:    Petr Pisar [Czech]
* eo:    Keith Bowes [Esperanto]
* fr:    Frédéric Marchal [French]
* pl:    Jakub Bogusz [Polish]
* sv:    Göran Uddeborg [Swedish]

# CREDITS:
* Thanks for testing the release candidates and bug reports to:
  Corey Halpin, Stefan Eßer.CVS: ----------------------------------------------------------------------
2021-12-26 15:28:10 +00:00
rhialto
a1d247e04a mail/milter-graylist and spamass-milter: add MKPIE_SUPPORTED=no
These packages can currently not be built with PIE because the
libmilter.a library they used is not built that way.
2021-12-26 14:28:00 +00:00
plunky
8a59f6fa28 maildir.patch was changed upstream, so tweak DIST_SUBDIR to get the new
one and PKGREVISION to rebuild.
2021-12-26 10:28:24 +00:00
nia
e4a029c046 libfetch: Only enable IPv6 on supported systems. Needed on UnixWare.
Adapted from Boyd Lynn Gerber.
2021-12-26 10:24:22 +00:00
nia
0a44b991b9 Remove references to X11R6 where it isn't relevant. 2021-12-26 10:19:13 +00:00
wiz
f6c571205e doc/TODO: add some
+ ImageMagick-7.1.0.19, asciidoc-10.1.1, chromaprint-1.5.1,
  double-conversion-3.1.7, libmicrohttpd-0.9.74, py-async-timeout-4.0.2,
  rust-analyzer-0.0.2021.12.20, vala-0.54.5.
2021-12-26 09:03:45 +00:00
nia
dbb48a76a7 X11R6 -> X11R7 2021-12-26 08:55:07 +00:00
dholland
03c5ebd34a graphics/camlimages: make it build again
Hasn't in a long time, so no PKGREVISION bump (it's at 96!)

It is fairly likely that these changes and/or OCaml internal changes
regarding immutable strings have changed the behavior if you abuse
internal interfaces or try to share graphics memory with the library
and scribble on it. Don't do that.

There are probably more data copies as well (meaning "slow") but I've
tried to avoid that as much as possible.
2021-12-26 05:28:23 +00:00
mef
b05b0290ee (finance/bitcoin) Fix build by +patch-configre.ac, == issue 2021-12-26 05:27:37 +00:00
dholland
eaefdf227a Fix undefined PLT symbol "caml_process_pending_signals" in ocaml-graphics.
Patch from upstream.

Bump PKGREVISION (to 2) as it built but didn't run.

XXX: this package needs to be updated after the freeze
2021-12-26 05:09:45 +00:00
taca
73c2c9345c doc: Updated devel/transifex-client to 0.14.4 2021-12-26 05:09:38 +00:00
taca
e47be030bf devel/transifex-client: update to 0.14.4
This is a leaf package.  Fix runtime breakage by update of py-gitpython to
5.0.2.


0.13.12 (2020-09-29)

* Use authored date as git timestamp

0.14.0 (2020-10-21)

* Add support for Python 3.9

0.14.1 (2020-10-22)

No change except version?

0.14.2 (2020-11-17)

* Fix for CLI option of custom CA certificate bundle file

0.14.3 (2021-06-28)

* Change download path when supplied language is source language

0.14.4 (2021-12-24)

* Patch issue 317 Latest from ktomk/patch-issue-317
2021-12-26 05:04:42 +00:00
dholland
aca7a610c6 Add experimental aarch64 config for emacs20.
Untested for the time being; let me know if it works. Can't be worse than
not building :-)
2021-12-25 22:11:50 +00:00
dholland
6cdc86ebfa graphics/glad needs py-expat to build. (seen in a bulk build a while back) 2021-12-25 21:50:20 +00:00
dholland
f2b567ffc5 Fix broken build of lang/cparser; escaping hashes in gmake broke 2021-12-25 21:45:42 +00:00
dholland
55892ea6eb Mark lang/gpc NOT_FOR aarch64. It's gcc 2.95, there's not a chance. 2021-12-25 21:34:12 +00:00
dholland
d302d8f665 Tell this it can build on arm. Don't see any reason it shouldn't go. 2021-12-25 21:29:17 +00:00
taca
48764b61c6 doc/TODO: SOGo 5.4.0
+ SOGo-5.4.0, SOPE-5.4.0.
2021-12-25 03:36:57 +00:00
taca
6967788bca doc: Updated net/samba4 to 4.13.15 2021-12-25 03:36:24 +00:00
taca
73307627fa net/samba4: update to 4.13.15
This release contain security fixes.


                   ===============================
                   Release Notes for Samba 4.13.15
                          December 15, 2021
                   ===============================


This is the latest stable release of the Samba 4.13 release series.

Important Notes
===============

There have been a few regressions in the security release 4.13.14:

o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  PLEASE [RE-]READ!
                  The instructions have been updated and some workarounds
                  initially adviced for 4.13.14 are no longer required and
                  should be reverted in most cases.

o BUG-14902: User with multiple spaces (eg Fred<space><space>Nurk) become
             un-deletable. While this release should fix this bug, it is
             adviced to have a look at the bug report for more detailed
             information, see https://bugzilla.samba.org/show_bug.cgi?id=14902.

Changes since 4.13.14
---------------------

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14656: Spaces incorrectly collapsed in ldb attributes.
   * BUG 14901: The CVE-2020-25717 username map [script] advice has undesired
     side effects for the local nt token.
   * BUG 14902: User with multiple spaces (eg Fred<space><space>Nurk) become un-
     deletable.

o  Ralph Boehme <slow@samba.org>
   * BUG 14922: Kerberos authentication on standalone server in MIT realm
     broken.

o  Alexander Bokovoy <ab@samba.org>
   * BUG 14903: Support for ROLE_IPA_DC is incomplete.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14899: winbindd doesn't start when "allow trusted domains" is off.
   * BUG 14901: The CVE-2020-25717 username map [script] advice has undesired
     side effects for the local nt token.

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 14901: The CVE-2020-25717 username map [script] advice has undesired
     side effects for the local nt token.
2021-12-25 03:36:01 +00:00
wiz
417c5dbd51 doc: Updated devel/py-boost to 1.77.0nb2 2021-12-24 22:28:38 +00:00
wiz
5c87be2444 py-boost: revert previous
Re-enable py-numpy dependency, since it's used when it's installed.

However py-numpy for python 2.x seems broken and the numpy extension
is not built for that version, so mark the extension as "for python 3.x"
in the PLIST.

Tested with python27 and python39.

Bump PKGREVISION.
2021-12-24 22:28:28 +00:00
wiz
d246c51d06 py-pywebdav: remove
Only supports python 2.7, and was only used by trytond packages.
Last release from 2012, dead upstream.
2021-12-24 16:12:34 +00:00
wiz
22c2d4b748 py-trytond-webdav: remove
This module does not exist for the latest trytond release.
2021-12-24 16:10:39 +00:00
wiz
36629dd3aa py-trytond-calendar: remove
This module does not exist for the latest trytond release.
2021-12-24 16:08:52 +00:00
wiz
f52afb07bc py-trytond-calendar-classification: remove
This module does not exist for the latest trytond release.
2021-12-24 16:07:12 +00:00
wiz
3364306bcc py-trytond-calendar-scheduling: remove
This module does not exist for the latest trytond release.
2021-12-24 15:57:23 +00:00
wiz
001a828c0f py-trytond-calendar-todo: remove
This module does not exist for the latest trytond.
2021-12-24 15:55:03 +00:00
wiz
b4a2877c58 py-trytond-party-vcarddav: remove
This module does not exist for the latest trytond release.
2021-12-24 15:50:45 +00:00
wiz
bd46892070 py-tryton-platform: mark as not for python 2.x 2021-12-24 15:03:12 +00:00
wiz
7c77ce0664 doc/TODO: + krita-5.0, libarchive-3.5.2, ogre-2.3, supertux-0.6.3. 2021-12-24 14:37:50 +00:00
wiz
6fa8c91339 py-pywebdav: revert incorrect change 2021-12-24 13:30:15 +00:00
tnn
65558f6747 firefox: remove clang wrapper hacks, provide explicit path to clang
There's no apparent benefit to run "clang for cbindgen" nor the wasm
cross compiler through pkgsrc wrappers. It does however cause issues when
the base compiler is clang.
TODO: apply same change to firefox LTS
2021-12-24 12:09:47 +00:00
nia
22dd74af0b pkg_install: only enable IPv6 on operating systems that support it
needed for UnixWare, reported by Boyd Lynn Gerber
2021-12-24 11:37:38 +00:00
mef
3bc9227588 (www/py-pywebdav) remove PYTHON_VERSIONS_ACCEPTED=27, is it correct ? 2021-12-24 05:45:45 +00:00
mef
fc3985426a (misc/py-trytond-*) more regen for PLIST 2021-12-24 04:33:18 +00:00
wiz
13555cf199 py-trytond-webdav: disable py-webdav dependency
The dependency only exists for python 2.7.

Hopefully unbreaks pbulk
2021-12-23 23:26:31 +00:00
wiz
268375865d fail2ban: fix build with latest setuptools.
Fixes PR 56572 by nia@

Fix pkglint while here.
2021-12-23 22:27:35 +00:00
mef
55893444ae ({finance,misc}/py-trytond-*) more regen for PLIST, distinfo 2021-12-23 22:07:26 +00:00
mef
9230d660f4 (*/py-trytond-*) more regen for PLIST, distinfo 2021-12-23 21:52:28 +00:00
nia
4392a9afc9 gst-plugins1-bad: Ensure transcode plugin is fully (instead of partially...)
built for pitivi.
2021-12-23 20:50:31 +00:00
nia
0816bf820b gst-plugins1-base: assumes compiler defaults to c99 mode 2021-12-23 20:34:37 +00:00
nia
792c0d69c1 fluidsynth: add missing optional dependencies to bl3.mk 2021-12-23 20:33:18 +00:00
nia
13453cc05f Revert addition of patch for older macOS, breaks joyent bulk builds 2021-12-23 20:29:09 +00:00
nia
8545734a50 pitivi: Hack around a conflict between gst-plugins1-transcoder and
gst-plugins1-bad. Ideally transcoder would not be built as a core
part of bad when it was previously serparate, but such is life.

We can probably clean this up after freeze...
2021-12-23 20:22:42 +00:00