Commit graph

338104 commits

Author SHA1 Message Date
prlw1
ae7296ab42 Fix PR pkg/56137 : lang/mozjs78: error: failed to resolve patches
c.f., https://phabricator.services.mozilla.com/D100485
2021-05-02 07:25:12 +00:00
wiz
fd81080270 doc: Updated devel/nss to 3.64nb3 2021-05-01 21:52:12 +00:00
wiz
f6395b3ed0 nss: hide symbols on NetBSD like on other platforms
Remove local workarounds again

Bump PKGREVISION.
2021-05-01 21:52:02 +00:00
pin
d2ba76b45c doc: Updated sysutils/xplr to 0.5.12 2021-05-01 19:09:33 +00:00
pin
4f6c4795a1 sysutils/xplr: update to 0.5.12
-Fixed cd into the directory when xplr is invoked with a path argument.
2021-05-01 19:09:14 +00:00
pin
f5b43c6ae4 sysutils/broot: pull from release 2021-05-01 19:08:26 +00:00
tsutsui
bb063d0475 doc: Updated net/mikutter to 4.1.5 2021-05-01 18:13:52 +00:00
wiz
4db3755c7b doc: Updated emulators/mame to 0.231 2021-05-01 18:12:42 +00:00
wiz
fab1b66a97 mame: update to 0.231.
MAME 0.231, our April release, is out now! The Yamaha FM synthesis
rewrite is progressing, with the OPL family (including YM2413,
YM3526, YM3812, YMF262 and Y8950) done this month. A number of
regressions reported against the previous release have also been
fixed. Most things should be improved, but if you notice something
wrong with a system using one of these chips, be sure to let us
know. Warp-1, a very rare Sun Electronics game from the late ’70s,
has been added this month. This is an early example of an “into
the screen” space shooter.

For as long as it has been emulated, the “3D” stages in Contra have
been too easy. This comes down to the functionality of the Konami
007452 chip, which Konami calls a VRC&DMP. Now we know that VRC
stands for Virtual ROM Controller, and controls ROM banking. However,
the DMP part has been more of a mystery, assumed to be some kind
of protection. This month, furrtek worked out that it’s apparently
some kind of Divide/Multiply Processor, for 16-bit maths operations
that would be unacceptably slow on the games’s pair of 6809-family
CPUs. The great news is the game now runs correctly, the bad news
is you’ll probably die a lot more.

David “Haze” Haywood is back this month with fixes for several
arcade games that have never been quite right. He’s fixed graphical
priority issues in SNK’s Beast Busters and Mechanized Attack,
improved timing in Seibu Kaihatsu’s Shot Rider, and corrected layer
offsets in Mitchell’s Funky Jet. He also added support for a couple
of protected Mega Drive bootleg games from Argentina. Recently,
David has been streaming MAME gaming sessions, often highlighting
under-appreciated games. You can watch the recorded streams on his
YouTube channel. Still on the topic of things that have never been
right, sasuke has been busy this month. He’s improved the Nichibutsu
1412M2 DAC playback rate and timer period calculation, most noticeable
on the Mighty Guy soundtrack, and made Taito’s unicycling game
Cycle Maabou playable.
2021-05-01 18:12:32 +00:00
tsutsui
573975cbe8 mikutter: update to 4.1.5.
Upstream changes:

mikutter 4.1.5
 https://mikutter.hatenablog.com/entry/2021/05/02/012736

* fix possible crash and code injection in conditions of extract tabs
2021-05-01 18:09:42 +00:00
pho
443566c5fb Use tools framework for Haskell source preprocessors 2021-05-01 16:14:19 +00:00
fcambus
8080758402 doc: Updated geography/libmaxminddb to 1.6.0 2021-05-01 16:08:56 +00:00
fcambus
f97b3abeb6 libmaxminddb: update to 1.6.0.
## 1.6.0 - 2021-04-29

* This release includes several improvements to the CMake build. In
  particular:
  * C99 support is now properly enabled, fixing builds on older `gcc`
    versions. Pull request by Jan Vcelak. GitHub #257.
  * `CMAKE_SHARED_LIBRARY_PREFIX` and `CMAKE_STATIC_LIBRARY_PREFIX` are
    no longer explicitly set and now use the default values for the platform.
    Pull request by Jan Vcelak. GitHub #258.
  * `target_include_directories` now works as expected. Pull request by Jan
    Vcelak. GitHub #259.
  * DLLs are now installed on Windows when `libmaxminddb` is built as a
    shared library. Pull request by Jan Vcelak. GitHub #261.
  * When built as a dynamic library on Windows, all symbols are now exported.
    Pull request by Jan Vcelak. GitHub #262.
2021-05-01 16:08:45 +00:00
pho
5fba640853 Move lengthy awk and shell scripts out of haskell.mk 2021-05-01 15:06:26 +00:00
pin
b393f4d7fc wm/sdorfehs: reclaim maintainership 2021-05-01 14:42:46 +00:00
pin
6caf685519 doc: Added net/maguro version 0.0.1 2021-05-01 14:41:50 +00:00
pin
07b7a22fdf Add maguro 2021-05-01 14:41:22 +00:00
pin
468b9a9949 net/maguro: import package
Maguro, a fast YouTube downloader.

Using the CLI:
-Check which streams are available (in no particular order).
-Choose a stream to download, and specify the output.

Using the Library:
-maguro also exposes a library for use in other applications. It is
fully-asynchronous, and is (hopefully) intuitive and easy to use.

Disclaimer:
-This software is created with the purpose of downloading videos with express
permission from their creator(s). The creator of this software is not
responsible for whether this software is used to download copyrighted
YouTube videos.
2021-05-01 14:40:11 +00:00
pin
d51190570c doc: Updated sysutils/broot to 1.3.1 2021-05-01 14:37:39 +00:00
pin
af6805ea15 sysutils/broot: update to 1.3.1
-fix :previous_match not jumping over indirect matches - Fix #377
-fix typing a prefixed pattern then emptying it while keeping the prefix
doesn't remove filtering - Fix #379
-fix shifted matching chars highlighting with regex patterns when showing
icons - Fix #376
2021-05-01 14:37:19 +00:00
pho
385f9e98d2 Remove files/Setup.hs: mk/haskll.mk can now automatically handle that 2021-05-01 14:27:42 +00:00
pho
56b10e6f5c Fix a bug in my previous commit 2021-05-01 14:24:21 +00:00
pho
53cd3f01d4 Remove files/Setup.hs: mk/haskll.mk can now automatically handle that 2021-05-01 14:11:53 +00:00
pho
aaed0e0c91 Support Cabal packages that lack Setup.?hs
They currently have Setup.hs in ${FILESDIR} with almost always the same
content. We can do better than that.
2021-05-01 14:10:55 +00:00
fcambus
b8447236a8 doc: Updated devel/p5-List-AllUtils to 0.19 2021-05-01 11:44:18 +00:00
fcambus
24df2aadba p5-List-AllUtils: update to 0.19.
0.19    2021-04-23

- We now prefer the mesh() and zip() functions from List::SomeUtils over the
  new, incompatible implementations in List::Util 1.56. Fixes GH #12.
  reported by Greg Oschwald.
2021-05-01 11:44:07 +00:00
fcambus
c78a6d1223 doc: Updated net/dbip-country-lite to 2021.05 2021-05-01 10:54:55 +00:00
fcambus
b12599a32b dbip-country-lite: update to 2021-05.
No upstream ChangeLog.
2021-05-01 10:54:44 +00:00
fcambus
531a824c3a doc: Updated net/dbip-city-lite to 2021.05 2021-05-01 10:52:45 +00:00
fcambus
2d3ac02657 dbip-city-lite: update to 2021-05.
No upstream ChangeLog.
2021-05-01 10:52:30 +00:00
fcambus
95a66152f8 doc: Updated net/dbip-asn-lite to 2021.05 2021-05-01 10:50:33 +00:00
fcambus
dcc9602f4c dbip-asn-lite: update to 2021-05.
No upstream ChangeLog.
2021-05-01 10:50:21 +00:00
wiz
98cf6c5a60 doc: remove some updated perl packages from TODO 2021-05-01 10:29:24 +00:00
nia
2a92728b8b asciidoc: Install default themes. 2021-05-01 10:03:33 +00:00
pho
d87dd78b7b Don't use "response file" while invoking CC and LD
Our tool wrappers don't look into response files, so common mistakes
such as forgetting to declare dependencies have been overlooked by
our buildlink framework. With the change that will no longer happen.
2021-05-01 09:04:57 +00:00
nia
8680b388e5 doc: Updated chat/dino to 0.2.0nb2 2021-05-01 08:54:10 +00:00
nia
08cbb0f49d dino: Fix build with latest vala. 2021-05-01 08:53:59 +00:00
taca
ca715164bb textproc/marisa: reset MAINTAINER
Reset MAINTAINER since Takanori Ishihara (ishit@) passed away
on 8th Oct. 2019.
2021-05-01 08:19:52 +00:00
schmonz
80247b3c27 doc: Updated security/libretls to 3.3.2 2021-05-01 08:07:35 +00:00
schmonz
fb116dabc7 Update to 3.3.2. From the (OpenBSD 6.9 LibreSSL) changelog:
# New Features

- Support for DTLSv1.2.
- Continued rewrite of the record layer for the legacy stack.
- Numerous bugs and interoperability issues were fixed in the new
  verifier. A few bugs and incompatibilities remain, so this release
  uses the old verifier by default.
- The OpenSSL 1.1 TLSv1.3 API is not yet available.


# Portable Improvements

- Added '--enable-libtls-only' build option, which builds and
  installs a statically-linked libtls, skipping libcrypto and libssl.
  This is useful for systems that ship with OpenSSL but wish to also
  package libtls.
- Update getentropy on Windows to use Cryptography Next Generation
  (CNG). wincrypt is deprecated and no longer works with newer Windows
  environments, such as in Windows Store apps.


# API and Documentation Enhancements

- Add a number of RPKI OIDs from RFC 6482, 6484, 6493, 8182, 8360,
  draft-ietf-sidrops-rpki-rta, and draft-ietf-opsawg-finding-geofeeds.
- Add support for
  [SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3)
  with TLSv1.3.
- Add DTLSv1.2 methods.
- Implement SSL_is_dtls(3) and use it internally in place of the
  SSL_IS_DTLS macro.
- Provide
  [EVP_PKEY_new_CMAC_KEY(3)](https://man.openbsd.org/EVP_PKEY_new_CMAC_KEY.3).
- Add missing prototype for
  [d2i_DSAPrivateKey_fp(3)](https://man.openbsd.org/d2i_DSAPrivateKey_fp.3) to x509.h.
- Add DTLSv1.2 to [openssl(1)](https://man.openbsd.org/openssl.1)
  s_server and s_client protocol message logging.
- Provide
  [SSL_use_certificate_chain_file(3)](https://man.openbsd.org/SSL_use_certificate_chain_file.3).
- Provide
  [SSL_set_hostflags(3)](https://man.openbsd.org/SSL_set_hostflags.3)
  and
  [SSL_get0_peername(3)](https://man.openbsd.org/SSL_get0_peername.3).
- Provide various DTLSv1.2 specific functions and defines.
- Document meaning of '*' in the genrsa output.
- Updated documentation for
  SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3).
- Add documentation for
  [SSL_get_finished(3)](https://man.openbsd.org/SSL_get_finished.3).
- Document
  [EVP_PKEY_new_CMAC_key(3)](https://man.openbsd.org/EVP_PKEY_new_CMAC_key.3).
- Document
  [SSL_use_certificate_chain_file(3)](https://man.openbsd.org/SSL_use_certificate_chain_file.3).
- Document
  [SSL_set_hostflags(3)](https://man.openbsd.org/SSL_set_hostflags.3)
  and
  [SSL_get0_peername(3)](https://man.openbsd.org/SSL_get0_peername.3).
- Update [SSL_get_version(3)](https://man.openbsd.org/SSL_get_version.3)
  manual for DTLSv.1.2 support.
- Make supported protocols and options for DHE params more prominent in
  [tls_config_set_protocols(3)](https://man.openbsd.org/tls_config_set_protocols.3).
- Various documentation improvements around TLS methods.


# Compatibility Changes

- Make [openssl(1)](https://man.openbsd.org/openssl.3) s_server ignore
  -4 and -6 for compatibility with OpenSSL.
- Set SO_REUSEADDR on the server socket in the
  [openssl(1)](https://man.openbsd.org/openssl.1) ocsp command.
- Send a host header with OCSP queries to make
  [openssl(1)](https://man.openbsd.org/openssl.1) ocsp work with some
  widely used OCSP responders.
- Add ability to [ocspcheck(8)](https://man.openbsd.org/ocspcheck.8) to
  parse a port in the specified OCSP URL.
- Implement auto chain for the TLSv1.3 server since some software
  relies on this.
- Implement key exporter for TLSv1.3.
- Align
  [SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3)
  with OpenSSL. This takes into account that it never returned server
  ciphers, so now it will fail when called from the client side.
- Sync cert.pem with Mozilla NSS root CAs except "GeoTrust Global CA".
- Make
  [SSL{_CTX,}_get_{min,max}_proto_version(3)](https://man.openbsd.org/SSL_CTX_get_min_proto_version.3)
  return a version of zero if the minimum or maximum has been set to
  zero to match OpenSSL's behavior.
- Add DTLSv1.2 support to
  [openssl(1)](https://man.openbsd.org/openssl.1) s_client/s_server.


# Testing and Proactive Security

- Malformed ASN.1 in a certificate revocation list or a timestamp
  response token can lead to a NULL pointer dereference.
- Pull in fix for
  [EVP_CipherUpdate(3)](https://man.openbsd.org/EVP_CipherUpdate.3)
  overflow from OpenSSL.
- Use EXFLAG_INVALID to handle out of memory and parse errors in
  x509v3_cache_extensions().
- Refactor and clean up
  [ocspcheck(8)](https://man.openbsd.org/ocspcheck.8) and add
  regression tests.


# Internal Improvements

- Further cleanup of the DTLS record handling.
- Continue the replacement of the TLSv1.2 record layer by reimplementing
  the read side of the TLSv1.2 record handling.
- Replace DTLSv1_enc_data() with TLSv1_1_enc_data().
- Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.c.
- Add const to ssl_ciphers and tls1[23]_sigalgs* to push them into
  .data.rel.ro and .rodata, respectively.
- Add a const qualifier to srtp_known_profiles.
- Simplify TLS method by removing the client and server specific methods
  internally.
- Avoid casting away const in ssl_ctx_make_profiles().
- Avoid explicitly conditioning an assert on DTLS1_VERSION to make the
  assert work for newer DTLS versions.
- Merge SSL_ENC_METHOD into SSL_METHOD_INTERNAL.
- Add a flag to mark DTLS methods as DTLS to have an easy way to
  recognize DTLS methods that avoids inspecting the version number.
- Mark a few more internal static tables const.
- Switch finish{,_peer}_md_len from an int to a size_t.
- Use EVP_MD_MAX_MD_SIZE instead of 2 * EVP_MD_MAX_MD_SIZE as size for
  cert_verify_md[], finish_md[] and peer_finish_md[]. The factor 2 was a
  historical artefact.
- Free struct members in tls13_record_layer_free() in their natural
  order for reviewability.
- Use consistent names in tls13_{client,server}_finished_{recv,send}().
- Add tls13_secret_{init,cleanup}() and use them throughout the TLSv1.3
  code base.
- Move the read MAC key into the TLSv1.2 record layer.
- Make tls12_record_layer_free() NULL safe.
- Split the record protection from the TLSv1.2 record layer.
- Clean up sequence number handling in the new TLSv1.2 record layer.
- Clean up sequence number handling in DTLS.
- Clean up dtls1_reset_seq_numbers().
- Factor out code for explicit IV length, block size and MAC length from
  tls12_record_layer_open_record_protected_cipher().
- Provide record layer overhead for DTLS.
- Provide functions to determine if TLSv1.2 record protection is
  engaged.
- Add code to handle change of cipher state in the new TLSv1.2
  record layer.
- Mop up now unused dtls1_build_sequence_numbers() function.
- Allow setting a keypair on a tls context without specifying the
  private key, and fake it internally in libtls. This removes the need
  for privsep engines like relayd to use bogus keys.
- Skip the private key check for fake private keys.
- Move the private key setup from tls_configure_ssl_keypair() to a
  helper function with proper error checking.
- Change the internal tls_configure_ssl_keypair() function to return -1
  instead of 1 on failure.
- Move sequence numbers into the new TLSv1.2 record layer.
- Move AEAD handling into the new TLSv1.2 record layer.
- Factor out legacy stack version checks.
- Correct handshake MAC/PRF for various TLSv1.2 cipher suites which were
  originally added with the default handshake MAC and PRF rather than
  the SHA256 handshake MAC and PRF.
- Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().
- Use dtls1_record_retrieve_buffered_record() to load buffered
  application data.
- Enforce read ahead with DTLS.
- Remove bogus DTLS checks that disabled ECC and OCSP.
- Clean up and simplify dtls1_get_cipher().
- Group HelloVerifyRequest decoding and add missing check for
  trailing data.
- Revise HelloVerifyRequest handling for DTLSv1.2.
- Handle DTLS1_2_VERSION in various places.
- Rename the "truncated" label into "decode_err" and the "f_err" label
  into "fatal_err".
- Factor out and change some of the legacy client version code.
- Simplify version checks in the TLSv1.3 client. Ensure that the server
  announced TLSv1.3 and nothing higher and check that the legacy_version
  is set to TLSv1.2 as required by RFC 8446.
- Only use TLS versions internally rather than both TLS and DTLS
  versions since the latter are the one's complement of the human
  readable version numbers, which means that newer versions
  decrease in value.
- Identify DTLS based on the version major value.
- Move handling of cipher/hash based cipher suites into the new
  record layer.
- Add tls12_record_protection_unused() and call it from CCS functions.
- Move key/IV length checks closer to usage sites. Also add explicit
  checks against
  [EVP_CIPHER_{iv,key}_length()](https://man.openbsd.org/EVP_CIPHER_iv_length.3).
- Replace two handrolled tls12_record_protection_engaged().
- Improve internal version handling: add handshake fields for our
  minimum version, our maximum version and the TLS version negotiated
  during the handshake. Convert most of the internal code to use these
  version fields.
- Guard against future internal use of
  TLS1_get_{client,}_version() macros.
- Remove the internal ssl_downgrade_max_version() function which is no
  longer needed.
- Add support for DTLSv1.2 version handling.
- Remove no longer needed read ahead workarounds in the s_client
  and s_server.
- Split TLSv1.3 record protection from record layer.
- Move the TLSv1.3 handshake struct inside the shared handshake struct.
- Fully initialize rrec in tls12_record_layer_open_record_protected() to
  avoid confusing some static analyzers.
- Use tls_set_errorx() on OCSP_basic_verify() failure since the latter
  does not set errno.
- Convert openssl(1) x509 to new option handling and do the usual clean
  up that goes along with it.
- Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.
- Rename new_cipher to cipher to align naming with keyblock or other
  parts of the handshake data.
- Move the TLSv1.2 record number increment into the new record layer.
- Move finished and peer finished into the handshake struct.
- Remove pointless assignment in SSL_get0_alpn_selected().
- Add some error checking to openssl(1) x509.


# Bug Fixes

- Move point-on-curve check to set_affine_coordinates to avoid verifying
  ECDSA signatures with unchecked public keys.
- Fix [SSL_is_server(3)](https://man.openbsd.org/SSL_is_server.3) to
  behave as documented by re-introducing the client-specific methods.
- Avoid undefined behavior due to memcpy(NULL, NULL, 0).
- Make SSL_get{,_peer}_finished() work when used with TLSv1.3.
- Correct the return value type from ERR_peek_error() to a long.
- Avoid use of uninitialized in ASN1_time_parse() which could happen on
  parsing UTCTime if the caller did not initialize the passed struct tm.
- Destroy the mutex in a tls_config object on tls_config_free().
- Free alert_data and phh_data in tls13_record_layer_free(). These could
  leak if [SSL_shutdown(3)](https://man.openbsd.org/SSL_shutdown.3) or
  [tls_close(3)](https://man.openbsd.org/tls_close.3) were called after
  closing the underlying socket().
- Gracefully handle root certificates being both trusted and untrusted.
- Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in the new verifier.
- Use the legacy verifier when building auto chains for TLS.
- Search the intermediates only after searching the root certs in the
  new verifier to avoid problems with the legacy callback.
- Bail out early after finding a single chain in the new verifier, if we
  have been called via the legacy verifier API.
- Set (invalid and likely incomplete) chain on the xsc on chain build
  failure prior to calling the callback. This is required by various
  callers, including auto chain.
- Remove direct assignment of aead_ctx to avoid a leak.
- Fail early in legacy exporter if the master secret is not available to
  avoid a segfault if it is called when the handshake is not completed.
- Only print the certificate file once on verification failure.
- Fix an off-by-one in x509_verify_set_xsc_chain() to make sure that the
  new validator checks for EXFLAG_CRITICAL in
  x509_vfy_check_chain_extension() for all untrusted certs in the chain.
  Take into account that the root is not necessarily trusted.
- Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.
- Fix two bugs in the legacy verifier that resulted from refactoring
  of [X509_verify_cert(3)](https://man.openbsd.org/X509_verify_cert.3)
  for the new verifier: a return value was incorrectly treated as
  boolean, making it insufficient to decide whether validation should
  carry on or not.
- Fix checks for memory caps of constraints names. There are internal
  caps on the number of name constraints and other names, that the new
  name constraints code allocates per cert chain. These limits were
  checked too late, making them only partially effective.
- Fix a copy-paste error - skid was confused with an akid when checking
  for EXFLAG_INVALID. This broke OCSP validation with certain mirrors.
- Avoid a use-after-scope in tls13_cert_add().
- Avoid mangled output in BIO_debug_callback().
- Fix client initiated renegotiation by replacing use of
  s->internal-type with s->server.
- Avoid transcript initialization when sending a TLS HelloRequest,
  fixing server initiated renegotiation.
- Avoid leaking param->name in x509_verify_param_zero().
- Avoid a leak in an error path in openssl(1) x509.
- When sending an alert in TLSv1.3, only set its error code when no
  other error was set previously. Certain clients rely on specific
  SSL_R_ error codes to identify that they are dealing with a self
  signed cert.
- When switching from the TLSv1.3 stack to the legacy stack include a
  TLS record header. This is necessary if there is more than one
  handshake message in the TLS plaintext record.
- Fix resource handling on error in OCSP_request_add0_id().
- Make sure there is enough room for stashing the handshake message when
  switching to the legacy TLS stack.
- Fix a memory leak in the openssl(1) s_client.
- Unbreak DTLS retransmissions for flights that include a CCS.
- If x509_verify() fails, ensure that the error is set on both the
  x509_verify_ctx() and its store context to make some failures visible
  from SSL_get_verify_result().
- Use the X509_STORE_CTX get_issuer() callback from the new X.509
  verifier to fix hashed certificate directories.
- Only check
  [BIO_should_read(3)](https://man.openbsd.org/BIO_should_read.3) on
  read and
  [BIO_should_write(3)](https://man.openbsd.org/BIO_should_write.3) on
  write. Previously,
  [BIO_should_write(3)](https://man.openbsd.org/BIO_should_write.3) was
  also checked after read and
  [BIO_should_read(3)](https://man.openbsd.org/BIO_should_read.3) after
  write which could cause stalls in software that uses the same BIO for
  read and write.
- In [openssl(1)](https://man.openbsd.org/openssl.1) verify, also check
  for error on the store context since the return value of
  [X509_verify_cert(3)](https://man.openbsd.org/X509_verify_cert.3) is
  unreliable in presence of a callback that returns 1 too often.
- Handle additional certificate error cases in the new X.509 verifier.
  Keep track of the errors encountered if a verify callback tells the
  verifier to continue and report them back via the error on the store
  context. This mimics the behavior of the old verifier that would
  persist the first error encountered while building the chain.
- Report specific failures for "self signed certificates" in a way
  compatible with the old verifier since software relies on the
  error code.
- Plug a large memory leak in the new verifier caused by calling
  X509_policy_check(3) repeatedly.
- Avoid leaking memory in x509_verify_chain_dup().
2021-05-01 08:07:24 +00:00
schmonz
4f9b01655d doc: Updated shells/oksh to 6.9 2021-05-01 07:40:10 +00:00
schmonz
aff3dabdd1 Update to 6.9. From the changelog:
- This is oksh-6.9, matching ksh(1) from OpenBSD 6.9 with portability
  additions.

From the OpenBSD 6.9 changelog:

- Fixed ksh(1) redrawing of a multiline PS1 prompt in vi mode and added
  support for ^R (redraw) in insert mode.
2021-05-01 07:40:00 +00:00
pho
9473036630 Port the $ORIGIN removal patch from ghc88 2021-05-01 04:43:57 +00:00
js
baca523197 doc: Updated chat/element-web to 1.7.26 2021-05-01 03:54:14 +00:00
js
039be17fb7 Update chat/element-web to 1.7.26
Changes in [1.7.26](https://github.com/vector-im/element-web/releases/tag/v1.7.26) (2021-04-26)
===============================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.26-rc.1...v1.7.26)

 * Upgrade to React SDK 3.19.0 and JS SDK 10.0.0

Changes in [1.7.26-rc.1](https://github.com/vector-im/element-web/releases/tag/v1.7.26-rc.1) (2021-04-21)
=========================================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.25...v1.7.26-rc.1)

 * Upgrade to React SDK 3.19.0-rc.1 and JS SDK 10.0.0-rc.1
 * Translations update from Weblate
   [\#17031](https://github.com/vector-im/element-web/pull/17031)
 * Bump ssri from 6.0.1 to 6.0.2
   [\#17010](https://github.com/vector-im/element-web/pull/17010)
 * Fix `NODE_ENV` value for CI environments
   [\#17003](https://github.com/vector-im/element-web/pull/17003)
 * Use React production mode in CI builds
   [\#16969](https://github.com/vector-im/element-web/pull/16969)
 * Labs documentation for DND mode
   [\#16962](https://github.com/vector-im/element-web/pull/16962)
 * Rename blackboxing to new option ignore list
   [\#16965](https://github.com/vector-im/element-web/pull/16965)
 * Remove velocity-animate from lockfile
   [\#16963](https://github.com/vector-im/element-web/pull/16963)
 * Add mobile download link configuration
   [\#16890](https://github.com/vector-im/element-web/pull/16890)
 * Switch develop to not-staging Scalar by default
   [\#16883](https://github.com/vector-im/element-web/pull/16883)
 * Support a config option to skip login/welcome and go to SSO
   [\#16880](https://github.com/vector-im/element-web/pull/16880)

Changes in [1.7.25](https://github.com/vector-im/element-web/releases/tag/v1.7.25) (2021-04-12)
===============================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.25-rc.1...v1.7.25)

 * Upgrade to React SDK 3.18.0 and JS SDK 9.11.0

Changes in [1.7.25-rc.1](https://github.com/vector-im/element-web/releases/tag/v1.7.25-rc.1) (2021-04-07)
=========================================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.24...v1.7.25-rc.1)

 * Upgrade to React SDK 3.18.0-rc.1 and JS SDK 9.11.0-rc.1
 * Translations update from Weblate
   [\#16882](https://github.com/vector-im/element-web/pull/16882)
 * Revert "Docker image: serve pre-compressed assets using gzip_static"
   [\#16838](https://github.com/vector-im/element-web/pull/16838)
 * Move native node modules documentation to element-desktop
   [\#16814](https://github.com/vector-im/element-web/pull/16814)
 * Add user settings for warn before exit
   [\#16781](https://github.com/vector-im/element-web/pull/16781)
 * Change ISSUE_TEMPLATE bold lines to proper headers
   [\#16768](https://github.com/vector-im/element-web/pull/16768)
 * Add example for deployment into Kubernetes
   [\#16447](https://github.com/vector-im/element-web/pull/16447)
 * Create bare-bones `PULL_REQUEST_TEMPLATE.md`
   [\#16770](https://github.com/vector-im/element-web/pull/16770)
 * Add webpack config and labs flag docs for voice messages
   [\#16705](https://github.com/vector-im/element-web/pull/16705)

Changes in [1.7.24](https://github.com/vector-im/element-web/releases/tag/v1.7.24) (2021-03-29)
===============================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.24-rc.1...v1.7.24)

 * Upgrade to React SDK 3.17.0 and JS SDK 9.10.0

Changes in [1.7.24-rc.1](https://github.com/vector-im/element-web/releases/tag/v1.7.24-rc.1) (2021-03-25)
=========================================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.23...v1.7.24-rc.1)

 * Upgrade to React SDK 3.17.0-rc.2 and JS SDK 9.10.0-rc.1
 * Translations update from Weblate
   [\#16766](https://github.com/vector-im/element-web/pull/16766)
 * Docker image: serve pre-compressed assets using gzip_static
   [\#16698](https://github.com/vector-im/element-web/pull/16698)
 * Fix style lint issues
   [\#16732](https://github.com/vector-im/element-web/pull/16732)
 * Updated expected webpack output in setup guide
   [\#16740](https://github.com/vector-im/element-web/pull/16740)
 * Docs for `loginForWelcome`
   [\#16468](https://github.com/vector-im/element-web/pull/16468)
 * Disable rageshake persistence if no logs would be submitted
   [\#16697](https://github.com/vector-im/element-web/pull/16697)

Changes in [1.7.23](https://github.com/vector-im/element-web/releases/tag/v1.7.23) (2021-03-15)
===============================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.23-rc.1...v1.7.23)

 * Upgrade to React SDK 3.16.0 and JS SDK 9.9.0

Changes in [1.7.23-rc.1](https://github.com/vector-im/element-web/releases/tag/v1.7.23-rc.1) (2021-03-10)
=========================================================================================================
[Full Changelog](https://github.com/vector-im/element-web/compare/v1.7.22...v1.7.23-rc.1)

 * Upgrade to React SDK 3.16.0-rc.2 and JS SDK 9.9.0-rc.1
 * Translations update from Weblate
   [\#16655](https://github.com/vector-im/element-web/pull/16655)
 * Improve docs for customisations
   [\#16652](https://github.com/vector-im/element-web/pull/16652)
 * Update triage guide to match the new label scheme
   [\#16612](https://github.com/vector-im/element-web/pull/16612)
 * Remove a couple useless 'use strict' calls
   [\#16650](https://github.com/vector-im/element-web/pull/16650)
 * Remove old conferencing doc
   [\#16648](https://github.com/vector-im/element-web/pull/16648)
 * Bump elliptic from 6.5.3 to 6.5.4
   [\#16644](https://github.com/vector-im/element-web/pull/16644)
 * Add option for audio live streaming
   [\#16604](https://github.com/vector-im/element-web/pull/16604)
 * Update velocity-animate dependency
   [\#16605](https://github.com/vector-im/element-web/pull/16605)
 * Add Edge to the supported tier
   [\#16611](https://github.com/vector-im/element-web/pull/16611)
 * Add multi language spell check
   [\#15851](https://github.com/vector-im/element-web/pull/15851)
 * Document feature_spaces
   [\#16538](https://github.com/vector-im/element-web/pull/16538)
2021-05-01 03:54:04 +00:00
pho
7231c6fa37 Fix a bug in the previous commit which would produce a non-installable bootkit 2021-05-01 03:00:06 +00:00
pho
80ec90f764 Backport the $ORIGIN removal patch from ghc88 2021-05-01 02:57:31 +00:00
pho
20f9d38dd7 Backport the $ORIGIN removal patch from ghc88 2021-05-01 01:24:50 +00:00
wen
cf57b31aa4 Updated devel/p5-Set-Object to 1.41 2021-05-01 00:01:29 +00:00
wen
bdb732523f Update to 1.41
Upstream changes:
1.41, 2021-01-17

    Use meta-spec 2, Moose -> dev.requires not runtime.recommends (GH #6, RT #134034) by mohawk
2021-05-01 00:00:36 +00:00