This package is causing a lot of problems in bulk builds. There's no reason
all the SVGs can't be pregenerated, but instead it needs to do a few hours
of parallel conversions with inkscape.
it's now unmaintained upstream so there's little chance of it getting
distributed in a more sensible way in the future, and as maintainer, I
no longer care about this package
Git repository has been archived for 10 years and the HOMEPAGE now
redirects to a Chinese lottery website. There's plenty of bittorrent
clients in pkgsrc that actually build and are maintained.
Nanotodon is a light-weight CUI/C99 mastodon client.
Even ancient m68k machines can get and post toots with streaming APIs.
MC68020 20MHz Sun 3/60 running nanotodon (and sayaka) was demonstrated
at Open Source Conference 2020 Osaka:
https://mail-index.netbsd.org/netbsd-advocacy/2020/01/28/msg000823.html
What's new in at-spi2-atk 2.34.1:
* socket_embed_hook: Make plug_id parameter const.
What's new in at-spi2-atk 2.34.0:
* Updated doap.
What's new in at-spi2-atk 2.33.92:
* License is now LGPL-2.1+.
* Several test fixes (thanks to Samuel THibault).
* Initialize desktop name/path early; needed since we now defer
registration.
What's new in at-spi2-atk 2.33.91:
* Defer registration until the main loop is entered. This fixes an issue
where a Python application could import gtk but not enter the main loop,
resulting in the application registering with AT-SPI but not responding
to queries.
* Make sure return values are initialized for some functions.
What's new in at-spi2-core 2.35.1:
* Fix source reproducibility (!25).
* Avoid depending on Meson 0.50 (#20).
* Add ATSPI_ROLE_MARK and ATSPI_ROLE_SUGGESTION (!27).
What's new in at-spi2-core 2.34.0:
* Fix a use after free when freeing an event.
* Clean up handling of the X11 property specifying the bus address (#18).
* Update doap.
What's new in at-spi2-core 2.33.92:
* Now requires meson 0.50.0.
* License is now LGPL-2.1+.
* Meson: only link to libdl when it is necessary.
* Update installation instructions.
* Clarify atspi_editable_text_insert_text documentation.
* Do not warn on no reply from pending get_items call.
* Eliminate some superfluous runtime warnings.
What's new in at-spi2-core 2.33.90:
* Refactor the API for the screen reader to notify listeners of its status.
* Add a sender to the AtspiEvent struct.
* Add missing atspi_application_get_type prototype.
* Support mutter remote desktop interface for synthesizing keyboard/mouse
events (likely still needs work).
Check size_t compatibility with various other types
commit 505c9544247f27cb6ebf749d0902d53c33dac308
which will hopefully fix PR pkg/54909 and not break PR pkg/54298
pkgsrc changes:
- remove a patch applied to upstream
- pull a post 3.4.2 fix for detection of sixel support
Upstream changes:
* 3.4.2 (2020/02/01)
Support monochrome terminal.
Implement --no-color option.
Add --no-image option (past --noimg is still valid)
Show an icon mark on non-sixel-capable terminal.
Autodetect if terminal supports sixel or not.
Virt Viewer provides a graphical viewer for the guest OS
display. At this time is supports guest OS using the VNC
or SPICE protocols. Further protocols may be supported in
the future as user demand dictates. The viewer can connect
directly to both local and remotely hosted guest OS, optionally
using SSL/TLS encryption.
Changelog:
Version 4.8.0 (05/02/2020)
* Improve startup time by only polling for files to close
Fixes:
- Fix for segfault if termcap doesn't have Km entry
- Make screen exit code be 0 when checking --version
- Fix potential memory corruption when using OSC 49
Version 13.8.0 (Current):
Notable Changes
This is a security release.
Vulnerabilities fixed:
CVE-2019-15606: HTTP header values do not have trailing OWS trimmed.
CVE-2019-15605: HTTP request smuggling using malformed Transfer-Encoding header.
CVE-2019-15604: Remotely trigger an assertion on a TLS server with a malformed certificate string.
Also, HTTP parsing is more strict to be more secure. Since this may cause problems in interoperability with some non-conformant HTTP implementations, it is possible to disable the strict checks with the --insecure-http-parser command line flag, or the insecureHTTPParser http option. Using the insecure HTTP parser should be avoided.