Commit graph

276473 commits

Author SHA1 Message Date
wiz
9eb08b5510 textproc/py-html5-parser: import py-html5-parser-0.4.4
A fast, standards compliant, C based, HTML 5 parser for python.
Over thirty times as fast as pure python based parsers, such as
html5lib.
2018-01-31 09:23:30 +00:00
markd
3452fb1309 qca2* updates 2018-01-31 09:20:17 +00:00
markd
ac8fb0942e security: add qca2-qt5{,-gnupg,-ossl} 2018-01-31 09:16:33 +00:00
markd
774f5d18f0 qca2{,-qt5}{,-gnupg,-ossl}: update to 2.1.0
New in 2.1.0
  - Ported to Qt5 (Qt4 also supported)
  - New building system. CMake instead of qmake
  - Added CTR symetric cipher support to qca core
  - Added no padding encryption algorithm to qca core
  - qcatool2 renamed to qcatool
  - fixed crash in qcatool when only options provided on command line without
    any commands
  - Use plugins installation path as hard-coded runtime plugins search path
  - Added new functiion pluginPaths
  - Added functions to get runtime QCA version
  - Fixed 'no watch file' warnings in FileWatch
  - Added EME_PKCS1v15_SSL Encryption Algorithm
  - New implementation of SafeTimer to prevent crashes
  - Updated certificates for unittests
  - RSA Keys are permutable, can encrypt with private and decrypt with public
  - Add unloadProvider() function for symmetry with insertProvider()
  - Overloaded "makeKey" to derive a password depending on a time factor
  - Remove pointer to deinit() routine from QCoreApplication at deinitialization
  - Fix a couple of crashes where all plugins might not be available
  - Fix operating on keys with unrelated expired subkeys
  - Fixed timers in Synchronizer class
  - Dropped randomunittest
  - Fixed many unittests
  - qca-gnupg: internal refactoring
  - qca-gnupg: try both gpg and gpg2 to find gnupg executable
  - qca-gnupg: fixed some encodings problem
  - qca-ossl: no DSA_* dl groups in FIPS specification
  - qca-ossl: added missed signatures to CRLContext
  - qca-ossl: fixed certs time zone
  - qca-nss: fixed KeyLenght for Cipher
  - qca-botan: fixed getting result size for ciphers
2018-01-31 09:14:55 +00:00
adam
0d9feeba04 Updated www/py-model_mommy, security/py-cryptodome 2018-01-31 07:57:58 +00:00
adam
bd032ccec8 py-cryptodome: updated to 3.4.8
3.4.8:

New features
* Added a native extension in pure C for modular exponentiation, optimized for SSE2 on x86.
  In the process, we drop support for the arbitrary arithmetic library MPIR
  on Windows, which is painful to compile and deploy.
  The custom  modular exponentiation is 130% (160%) slower on an Intel CPU in 32-bit (64-bit) mode,
  compared to MPIR. Still, that is much faster that CPython's own `pow()` function which
  is 900% (855%) slower than MPIR. Support for the GMP library on Unix remains.
* Added support for *manylinux* wheels.
* Support for Python 3.7.

Resolved issues
* The DSA parameter 'p' prime was created with 255 bits cleared
  (but still with the correct strength).
* Not all docs were included in the tar ball.
* ECDSA verification failed for DER encoded signatures.
* Human-friendly messages for padding errors with ECB and CBC.
2018-01-31 07:57:25 +00:00
adam
0019873349 py-model_mommy: updated to 1.5.1
1.5.1
- Support for GIS fields when `django.contrib.gis` is installed
- Do not create refrence if FK is specified with id (<name>_id)
2018-01-31 07:50:46 +00:00
jperkin
fb3288335b libwpd: Add -Wno-tautological-type-limit-compare for clang. 2018-01-30 23:37:10 +00:00
jperkin
aa22fc1514 openjade: Specify C++03, not C++11 clean (access declarations). 2018-01-30 23:24:29 +00:00
jperkin
77d2b78e86 sqlrelay: Specify C++03, not C++17 clean (deprecated-register). 2018-01-30 23:14:45 +00:00
jperkin
a58fec7ca0 libvpx: Remove bogus diff check. 2018-01-30 22:56:39 +00:00
bsiegert
1c3f7122db Added py-crcmod package 2018-01-30 19:08:40 +00:00
bsiegert
f918d62e6f New package, py-crcmod.
The software in this package is a Python module for generating objects that
compute the Cyclic Redundancy Check (CRC). There is no attempt in this package
to explain how the CRC works. There are a number of resources on the web that
give a good explanation of the algorithms.

This package allows the use of any 8, 16, 24, 32, or 64 bit CRC. You can
generate a Python function for the selected polynomial or an instance of the
Crc class which provides the same interface as the md5 and sha modules from the
Python standard library. A Crc class instance can also generate C/C++ source
code that can be used in another application.

Part of PR pkg/52941.
2018-01-30 19:07:48 +00:00
jperkin
fc74ec706d go*: Disable SSP support completely.
It's not supported by the go linker, and can cause issues when building
third-party modules if the SSP libraries are handled by pkgsrc.
2018-01-30 17:05:21 +00:00
fhajny
3b226f6855 doc: Updated databases/redis to 4.0.7 2018-01-30 16:40:23 +00:00
fhajny
fef2349d44 Update databases/redis to 4.0.7.
- Many 32 bit overflows were addressed in order to allow to use Redis with
  a very significant amount of data, memory size permitting.
- MEMORY USAGE fixed for the list type.
- Allow read-only scripts in Redis Cluster.
- Fix AOF pipes setup in edge case.
- AUTH option for MIGRATE.
- HyperLogLogs are no longer converted from sparse to dense in order
  to be merged.
- Fix AOF rewrite dead loop under edge cases.
- Fix processing of large bulk strings (>= 2GB).
- Added RM_UnlinkKey in modules API.
- Fix Redis Cluster crashes when certain commands with a variable number
  of arguments are called in an improper way.
- Fix memory leak in lazyfree engine.
- Fix many potentially successful partial synchronizations that end
  doing a full SYNC, because of a bug destroying the replication
  backlog on the slave. So after a failover the slave was often not able
  to PSYNC with masters, and a full SYNC was triggered. The bug only
  happened after 1 hour of uptime so escaped the unit tests.
- Improve anti-affinity in master/slave allocation for Redis Cluster
  when the cluster is created.
- Improve output buffer handling for slaves, by not limiting the amount
  of writes a slave could receive.
2018-01-30 16:40:13 +00:00
fhajny
b7d9ea4565 doc: Updated security/vault to 0.9.3 2018-01-30 16:37:44 +00:00
fhajny
d76039b62f Update security/vault to 0.9.3.
## 0.9.3 (January 28th, 2018)

A regression from a feature merge disabled the Nomad secrets backend in 0.9.2.
This release re-enables the Nomad secrets backend; it is otherwise identical to
0.9.2.

## 0.9.2 (January 26th, 2018)

SECURITY:

* Okta Auth Backend: While the Okta auth backend was successfully verifying
  usernames and passwords, it was not checking the returned state of the
  account, so accounts that had been marked locked out could still be used to
  log in. Only accounts in SUCCESS or PASSWORD_WARN states are now allowed.
* Periodic Tokens: A regression in 0.9.1 meant that periodic tokens created by
  the AppRole, AWS, and Cert auth backends would expire when the max TTL for
  the backend/mount/system was hit instead of their stated behavior of living
  as long as they are renewed. This is now fixed; existing tokens do not have
  to be reissued as this was purely a regression in the renewal logic.
* Seal Wrapping: During certain replication states values written marked for
  seal wrapping may not be wrapped on the secondaries. This has been fixed,
  and existing values will be wrapped on next read or write. This does not
  affect the barrier keys.

DEPRECATIONS/CHANGES:

* `sys/health` DR Secondary Reporting: The `replication_dr_secondary` bool
  returned by `sys/health` could be misleading since it would be `false` both
  when a cluster was not a DR secondary but also when the node is a standby in
  the cluster and has not yet fully received state from the active node. This
  could cause health checks on LBs to decide that the node was acceptable for
  traffic even though DR secondaries cannot handle normal Vault traffic. (In
  other words, the bool could only convey "yes" or "no" but not "not sure
  yet".) This has been replaced by `replication_dr_mode` and
  `replication_perf_mode` which are string values that convey the current
  state of the node; a value of `disabled` indicates that replication is
  disabled or the state is still being discovered. As a result, an LB check
  can positively verify that the node is both not `disabled` and is not a DR
  secondary, and avoid sending traffic to it if either is true.
* PKI Secret Backend Roles parameter types: For `ou` and `organization`
  in role definitions in the PKI secret backend, input can now be a
  comma-separated string or an array of strings. Reading a role will
  now return arrays for these parameters.
* Plugin API Changes: The plugin API has been updated to utilize golang's
  context.Context package. Many function signatures now accept a context
  object as the first parameter. Existing plugins will need to pull in the
  latest Vault code and update their function signatures to begin using
  context and the new gRPC transport.

FEATURES:

* **gRPC Backend Plugins**: Backend plugins now use gRPC for transport,
  allowing them to be written in other languages.
* **Brand New CLI**: Vault has a brand new CLI interface that is significantly
  streamlined, supports autocomplete, and is almost entirely backwards
  compatible.
* **UI: PKI Secret Backend (Enterprise)**: Configure PKI secret backends,
  create and browse roles and certificates, and issue and sign certificates via
  the listed roles.

IMPROVEMENTS:

* auth/aws: Handle IAM headers produced by clients that formulate numbers as
  ints rather than strings [GH-3763]
* auth/okta: Support JSON lists when specifying groups and policies [GH-3801]
* autoseal/hsm: Attempt reconnecting to the HSM on certain kinds of issues,
  including HA scenarios for some Gemalto HSMs.
  (Enterprise)
* cli: Output password prompts to stderr to make it easier to pipe an output
  token to another command [GH-3782]
* core: Report replication status in `sys/health` [GH-3810]
* physical/s3: Allow using paths with S3 for non-AWS deployments [GH-3730]
* physical/s3: Add ability to disable SSL for non-AWS deployments [GH-3730]
* plugins: Args for plugins can now be specified separately from the command,
  allowing the same output format and input format for plugin information
  [GH-3778]
* secret/pki: `ou` and `organization` can now be specified as a
  comma-separated string or an array of strings [GH-3804]
* plugins: Plugins will fall back to using netrpc as the communication protocol
  on older versions of Vault [GH-3833]

BUG FIXES:

* auth/(approle,aws,cert): Fix behavior where periodic tokens generated by
  these backends could not have their TTL renewed beyond the system/mount max
  TTL value [GH-3803]
* auth/aws: Fix error returned if `bound_iam_principal_arn` was given to an
  existing role update [GH-3843]
* core/sealwrap: Speed improvements and bug fixes (Enterprise)
* identity: Delete group alias when an external group is deleted [GH-3773]
* legacymfa/duo: Fix intermittent panic when Duo could not be reached
  [GH-2030]
2018-01-30 16:37:35 +00:00
fhajny
4f4e900579 doc: Updated lang/elixir to 1.6.1 2018-01-30 16:27:20 +00:00
fhajny
d943c140a0 Update lang/elixir to 1.6.1.
1. Enhancements

Elixir
- [DynamicSupervisor] Implement child_spec/1 for DynamicSupervisor
- [Kernel] Raise better error messages on invalid map syntax

2. Bug fixes

Elixir
- [Code.Formatter] Only rearrange not in operator if explicitly
  opted-in
- [Code.Formatter] Ensure do blocks do not exceed line length on calls
  with a single argument
- [Collectable] Support bitstrings in Collectable and
  for-comprehensions (regression in v1.6.0)
- [GenServer] Do not override user own @opts attribute
- [Enum] Reintroduce zipping of any enumerable of enumerables in
  Enum.zip/1 (regression in v1.6.0)
- [Macro] Reorder kw blocks in Macro.to_string/1 to avoid warnings
- [Protocol] Fix protocol consolidation when some chunks may be
  missing
- [Stream] Reintroduce zipping of any enumerable of enumerables in
  Stream.zip/1 (regression in v1.6.0)
- [Supervisor] Do not override user own @opts attribute
- [Supervisor] Add @spec to second clause of start_link/2

ExUnit
- [ExUnit.Case] Reintroduce :case in ExUnit setup/setup_all/test
  context
2018-01-30 16:27:10 +00:00
fhajny
38f227a2ca www/passenger: Fix build on at least NetBSD. 2018-01-30 15:42:02 +00:00
mef
31f2981540 doc: Updated security/easy-rsa to 3.0.5 2018-01-30 14:34:14 +00:00
mef
2c03bffcc1 Updated security/easy-rsa to 3.0.5
3.0.5
   * Fix #17 & #58: use AES256 for CA key
        * Also, don't use read -s, use stty -echo

3.0.4
    * Remove use of egrep (#154)
    * Integrate with Travis-CI (#165)
    * Remove "local" from variable assignment (#165)
        * Other changes related to Travis-CI fixes
        * Assign values to variables defined previously w/local
    * Finally(?) fix the subjectAltName issues I presented earlier (really
    fixes #168
2018-01-30 14:34:06 +00:00
adam
7fb54b702d Updated audio/py-beets, time/py-tzdata 2018-01-30 14:13:18 +00:00
adam
7302392e89 py-tzdata: updated to 2018.3
2018.3:
Unknown changes.
2018-01-30 14:12:59 +00:00
adam
3452c450fc py-beets: updated to 1.4.6
1.4.6:
The highlight of this release is "album merging," an oft-requested option in
the importer to add new tracks to an existing album you already have in your
library. This way, you no longer need to resort to removing the partial album
from your library, combining the files manually, and importing again.

Here are the larger new features in this release:

* When the importer finds duplicate albums, you can now merge all the
  tracks---old and new---together and try importing them as a single, combined
  album.
* :doc:/plugins/lyrics: The plugin can now produce reStructuredText files
  for beautiful, readable books of lyrics.
* A new :ref:from_scratch configuration option makes the importer remove old
  metadata before applying new metadata. This new feature complements the
  :doc:zero </plugins/zero> and :doc:scrub </plugins/scrub> plugins but is
  slightly different: beets clears out all the old tags it knows about and
  only keeps the new data it gets from the remote metadata source.
2018-01-30 14:10:11 +00:00
mef
665642b601 doc: Updated security/xmlsec1 to 1.2.25 2018-01-30 13:25:29 +00:00
mef
93b44c5830 security/xmlsec1 updated 1.2.19 to 1.2.25
on 12 Sep 2017 xmlsec-1_2_25 XMLSec release 1.2.25
on 20 Apr 2017 xmlsec-1_2_24 XMLSec release 1.2.24

2016-10-15 Aleksey Sanin  <aleksey@aleksey.com>
	* 1.2.23 release

2016-10-14 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed gcrypto RSA/DSA keys params ordering

2016-10-12 Aleksey Sanin  <aleksey@aleksey.com>
	* Better X509Data templates

2016-10-07 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed memory leak caused by xmlGetProp (patch from Dafan Zhai)
	* Fixed KW transforms (overlapping buffer error) for OpenSSL 1.1.0
	* Fixed pkg-config detection

2016-09-27 Aleksey Sanin  <aleksey@aleksey.com>
	* Added initial support OpenSSL 1.1.0 (patch from Andrzej Siewior)

2016-09-19 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed signing with RSA SHA2 via mscrypto (patch from PepaRokos)

2016-07-08 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed mscrypto undeclared XMLSEC_DEFAULT_CRYPTO (patch from vmiklos)

2016-05-31 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed mismatched conditional for XMLSEC_NO_ECDSA (patch from Eric Sproul)

2016-05-20 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed openssl cert depth verification param usage (patch from R-Tur)

2016-04-22 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed stdin/stdout in xmlsec1 app

2016-04-20 Aleksey Sanin  <aleksey@aleksey.com>
	* Restored SOAP support for Lasso
	* 1.2.22 release

2016-04-12 Aleksey Sanin  <aleksey@aleksey.com>
        * 1.2.21 release

2016-02-17 Aleksey Sanin  <aleksey@aleksey.com>
        * Added OOXML Relationships Transform Algorithm (patch from Miklos Vajna)

2016-02-06 Aleksey Sanin  <aleksey@aleksey.com>
        * Deprecated XMLSEC_CRYPTO define in favor of xmlSecGetDefaultCrypto() function

2016-02-05 Aleksey Sanin  <aleksey@aleksey.com>
        * Revamped manpages/documentation build to completely pass 'make distcheck' tests

2016-01-28 Aleksey Sanin  <aleksey@aleksey.com>
        * Added OpenSSL 1.1.0 API support (major refactoring for block ciphers and DSA/ECDSA signatures)

2016-01-28 Aleksey Sanin  <aleksey@aleksey.com>
        * Migrated to GitHub (https://github.com/lsh123/xmlsec)

2015-03-10 Aleksey Sanin  <aleksey@aleksey.com>
        * Removed support for legacy OpenSSL 0.9.6 (last release: March, 2004) and 0.9.7 (last release: February, 2007)

2014-10-2014 Aleksey Sanin  <aleksey@aleksey.com>
        * Added experimental GOST2012 support (patch from Nikolay Shaplov)

2014-06-04 Aleksey Sanin  <aleksey@aleksey.com>
        * Fixed several compaints from Clang and Coverity (based on patches from Simo Sorce)

2014-02-25 Aleksey Sanin  <aleksey@aleksey.com>
        * Removed XKMS support -- it was never completed and not worth keeping

2013-05-23 Aleksey Sanin  <aleksey@aleksey.com>
        * 1.2.20 release

2014-05-23  Aleksey Sanin  <aleksey@aleksey.com>
        * fix build on MacOSX (bug #680307)
        * update certs for examples (bug #674572)
        * update test certs to be valid till 2114
        * don't create files on xmlsec-mscrypto when loading the key (bug #633924)
        * clarify min OpenSSL requirements

2014-05-23  Aleksey Sanin  <aleksey@aleksey.com>
        * better detect private keys on ext RSA engines (bug #728213)
        * fixed CRL check

2014-02-17  Aleksey Sanin  <aleksey@aleksey.com>
        * fixes for RH 6x

2013-07-19  Aleksey Sanin  <aleksey@aleksey.com>
        * fixed switch - added missed break keywords (bug #704574)

2013-06-03  Aleksey Sanin  <aleksey@aleksey.com>
        * fix memory leak in converting cert subject

2013-05-09  Aleksey Sanin  <aleksey@aleksey.com>
        * disable network access during internal xml transform parser

2013-04-12  Aleksey Sanin  <aleksey@aleksey.com>
        * fix typo (fixed bug 695605)

2013-03-28  Aleksey Sanin  <aleksey@aleksey.com>
        * disable ECDSA if needed (Daniel)

2013-03-24  Aleksey Sanin  <aleksey@aleksey.com>
        * docs rebuild
2018-01-30 13:25:19 +00:00
fhajny
0aa69fb50c doc: Added www/passenger version 5.2.0 2018-01-30 12:07:45 +00:00
fhajny
21bee1178a Import Passenger 5.2.0 as www/passenger and www/ap2-passenger.
(Based on wip/*passenger.)

Phusion Passenger is a web server and application server,
designed to be fast, robust and lightweight. It supports Ruby,
Python, Node.js and Meteor.
2018-01-30 12:06:48 +00:00
hauke
ab4389d2bc The xemacs* package Makefiles are minimal, with all common information
factored out to Makefile.common. This includes both upstream and
pkgsrc specific.version information.
2018-01-30 11:52:18 +00:00
hauke
0a9617494f On some target platforms, Xm headers #define *_XFT_ symbols; if we do
not use xft (the default), explicitly disable it.
2018-01-30 11:47:39 +00:00
jperkin
ae2c65d246 doc: Updated devel/pkgconf to 1.4.1nb1 2018-01-30 10:43:29 +00:00
jperkin
520f9516dd pkgconf: Force correct largefile defines on SunOS.
The configure script only sets _FILE_OFFSET_BITS=64, resulting in a
mismatched off_t and various strange failure modes.  Bump PKGREVISION.
2018-01-30 10:43:20 +00:00
jaapb
73e1c30da2 Added missing dependency 2018-01-30 10:32:44 +00:00
adam
36bcddf505 Updated devel/py-typing, graphics/py-matplotlib 2018-01-30 10:29:28 +00:00
adam
ab414b371c py-matplotlib: updated to 2.1.2
2.1.2:
This release fixes a number of critical bugs:
- fix a typo in mlab.cohere which yielded incorrect results
- allow nonposx / nonposy to pass through loglog
- fix color comparisons when finding handles with legend
- fixes a recursive draw bug and a major performance regression in
  Qt5Agg backend
- fix a re-draw bug in WxAgg
- fix image scaling with high-bit depth integers
- revert the busy-cursor
2018-01-30 10:28:51 +00:00
adam
db43e4a626 Now DEPENDS on py-matplotlib rather than buildlinking 2018-01-30 10:20:11 +00:00
adam
e6d0839ffa Now DEPENDS on py-matplotlib rather than buildlinking 2018-01-30 10:04:00 +00:00
markd
46b9aa94fc khtml: SUBST rather than patch 2018-01-30 09:24:25 +00:00
adam
9ab326b709 Now DEPENDS on py-matplotlib rather than buildlinking 2018-01-30 09:21:44 +00:00
markd
9583384e39 kdelibs4support: SUBST rather than patches 2018-01-30 09:10:59 +00:00
adam
dbd12413c1 Now DEPENDS on py-matplotlib rather than buildlinking 2018-01-30 09:09:06 +00:00
markd
793248e59e kservice: SUBST rather than patch 2018-01-30 08:58:47 +00:00
markd
6bfa7fde55 kio: SUBST rather than patches 2018-01-30 08:47:11 +00:00
adam
a78e13324a py-typing: updated to 3.6.4
Sync with Python 3.6.4.
2018-01-30 08:44:31 +00:00
sborrill
4c5624b4f5 Updated security/lynis to 2.6.1 2018-01-30 08:43:36 +00:00
sborrill
08169e7809 lynis: update to 2.6.1
Changes:
--------
* Tests can have more than 1 required OS (e.g. Linux OR NetBSD)
* Added 'system-groups' option to profile (Enterprise users)
* Overhaul of default profile and migrate to new style (setting=value)
* Show warning if old profile options are used
* Improved detection of binaries
* New group 'usb' for tests related to USB devices

Tests:
------
* [FILE-6363] - New test for /var/tmp (sticky bit)
* [MAIL-8802] - Added exim4 process name to improve detection of Exim
* [NETW-3030] - Changed name of dhcp client name process and added udhcpc
* [SSH-7408] - Restored UsePrivilegeSeparation
* [TIME-3170] - Added chrony configuration file for NetBSD
2018-01-30 08:43:02 +00:00
markd
239c8c0017 kxmlgui: SUBST rather than patch 2018-01-30 08:17:10 +00:00
markd
b147a3e116 sonnet: SUBST rather than patch 2018-01-30 08:04:59 +00:00