Commit graph

16380 commits

Author SHA1 Message Date
wiz
15d62412cc tor: update to 0.3.3.7.
Changes in version 0.3.3.7 - 2018-06-12
  Tor 0.3.3.7 backports several changes from the 0.3.4.x series, including
  fixes for bugs affecting compatibility and stability.

  o Directory authority changes:
    - Add an IPv6 address for the "dannenberg" directory authority.
      Closes ticket 26343.

  o Minor features (geoip):
    - Update geoip and geoip6 to the June 7 2018 Maxmind GeoLite2
      Country database. Closes ticket 26351.

  o Minor bugfixes (compatibility, openssl, backport from 0.3.4.2-alpha):
    - Work around a change in OpenSSL 1.1.1 where return values that
      would previously indicate "no password" now indicate an empty
      password. Without this workaround, Tor instances running with
      OpenSSL 1.1.1 would accept descriptors that other Tor instances
      would reject. Fixes bug 26116; bugfix on 0.2.5.16.

  o Minor bugfixes (compilation, backport from 0.3.4.2-alpha):
    - Silence unused-const-variable warnings in zstd.h with some GCC
      versions. Fixes bug 26272; bugfix on 0.3.1.1-alpha.

  o Minor bugfixes (controller, backport from 0.3.4.2-alpha):
    - Improve accuracy of the BUILDTIMEOUT_SET control port event's
      TIMEOUT_RATE and CLOSE_RATE fields. (We were previously
      miscounting the total number of circuits for these field values.)
      Fixes bug 26121; bugfix on 0.3.3.1-alpha.

  o Minor bugfixes (hardening, backport from 0.3.4.2-alpha):
    - Prevent a possible out-of-bounds smartlist read in
      protover_compute_vote(). Fixes bug 26196; bugfix on 0.2.9.4-alpha.

  o Minor bugfixes (path selection, backport from 0.3.4.1-alpha):
    - Only select relays when they have the descriptors we prefer to use
      for them. This change fixes a bug where we could select a relay
      because it had _some_ descriptor, but reject it later with a
      nonfatal assertion error because it didn't have the exact one we
      wanted. Fixes bugs 25691 and 25692; bugfix on 0.3.3.4-alpha.
2018-06-17 08:29:11 +00:00
wiz
887c809267 libfilezilla: update to 0.12.3.
0.12.3 (2018-06-08)

+ Event handlers can now removed themselves while inside a callback
+ Added fz::query_string::pairs()
2018-06-17 08:25:43 +00:00
wiz
c4a80a4c76 syncthing: update to 0.14.48.
Bugfixes:

    #4897: Pausing on introducer removes device on other devices
    #4901: API returns empty response if non-existing files are #included
    #4903: Syncthing recreates the directories for deleted/missing "Folders"
    #4915: .stignore is accidentaly overwritten by web UI on slow machines
    #4918: GUI unresponsive or unusable with many folders or devices
    #4941: "Watching for Changes" dialog undismissable
    #4947: Recent Changes shows empty folder label

Enhancements:

    #4807: Support variable sized blocks
    #4896: Thousand separator for numbers in GUI

Other issues:

    #4909: Custom Windows icon missing in latest release
2018-06-17 07:24:15 +00:00
bsiegert
01d19c2669 Correct CONFLICTS entry, thanks wiz@ 2018-06-16 20:33:21 +00:00
bsiegert
7c20959cae Update py-gsutil to 4.31.
Fix all dependencies. This time, there is an actual working gsutil binary.
Thus, fix PR pkg/52941.

Release 4.31 (release date: 2018-04-26)
=======================================
New features
------------------
- Added support for reauthentication within gsutil. Note that this only affects
  authentication when "gs_oauth2_refresh_token" is configured under the
  "Credentials" section of the boto config file and that token corresponds to a
  user account enrolled in 2-step verification.

Bug Fixes
------------------
- When creating a signed URL via the "signurl" command, gsutil now verifies that
  the specified expiration isn't longer than 7 days (the maximum allowed by the
  service).
- To support rewriting objects to be encrypted using a bucket's default KMS key,
  the "rewrite" command now rewrites all specified objects if no value is
  specified for "encryption_key" under the "GSUtil" section in the boto config
  file.

Other Changes
------------------
- Several documentation updates and clarifications.


Release 4.30 (release date: 2018-03-28)
=======================================
New features
------------------
- Added Cloud KMS support for Google Cloud Storage resources, allowing the use
  of customer-managed encryption keys (CMEKs). Bucket-related functionality
  includes the new "kms" command, which can be used to get or set a bucket's
  default KMS key. Concerning objects, users may now specify the CMEK to be used
  for encryption via their boto config file, in the "encryption_key" attribute.
  In this way, users may specify either a CSEK or a CMEK to encrypt new objects,
  but not both. For more information, see "gsutil help encryption".

Other Changes
------------------
- Several documentation updates and clarifications.


Release 4.29 (release date: 2018-03-14)
=======================================
New features
------------------
- Added transport compression support, available through the "-j" and "-J"
  options for the "cp", "mv", and "rsync" commands. This is useful when
  uploading files with highly-compressible content. When specificed, files being
  uploaded are compressed on-the-fly in memory, sent to GCS, and uncompressed by
  GCS before they are stored. See "gsutil help cp" for additional information.
- When "use_magicfile=True" is set in the boto config file, gsutil will now
  append the detected charset, if present, to the object's Content-Type metadata
  field. For example, a Content-Type might be populated with
  "text/html; charset=us-ascii" rather than simply "text/html".

Bug Fixes
------------------
- Improved error handling and logging for upload resumption.
- After encountering a PreconditionException, the "acl ch" command will now
  re-fetch the object generation before retrying.
- Fixed issue with parsing lifecycle conditions when using the XML API.
  Conditions whose values could be evaluated by Python as "falsy" (e.g. setting
  an "age" condition to the number 0 or "isLive" to false) would be omitted from
  the lifecycle configuration when "prefer_api=xml" was set in the boto config
  file. Note that the JSON API is preferred by default, so most users were
  unlikely to encounter this issue.
- For commands that fetch bucket ACLs or default ACLs, when the user does not
  have storage.buckets.getIamPolicy on the GCS bucket, using the XML API will
  now behave consistently with the JSON API and display ACL/default ACL fields
  as empty, rather than throwing a CommandException.

Other Changes
------------------
- Several documentation updates and clarifications.
- The "signurl" command now uses signature V4 signing format to generate URLs.
2018-06-16 14:50:25 +00:00
bsiegert
276fa9b26d Update py-gcs-oauth2-boto-plugin to 2.1.
- Python 3 support
- mox -> mock
- Cache RAPT to prevent frequent reauth challenges.

Part n of PR pkg/52941.
2018-06-16 14:45:32 +00:00
bsiegert
74c8ed2e35 The Socks and SocksiPy-branch packages conflict.
They both install a Python module named "socks" :(
2018-06-16 14:19:42 +00:00
adam
e887198c94 py-awscli: updated to 1.15.38
1.15.38
api-change:ssm: Update ssm command to latest version
api-change:servicecatalog: Update servicecatalog command to latest version
2018-06-14 08:28:06 +00:00
adam
43301bf800 py-boto3: updated to 1.7.38
1.7.38
api-change:ssm: [botocore] Update ssm client to latest version
api-change:servicecatalog: [botocore] Update servicecatalog client to latest version

1.7.37
api-change:ecs: [botocore] Update ecs client to latest version
api-change:devicefarm: [botocore] Update devicefarm client to latest version

1.7.36
api-change:storagegateway: [botocore] Update storagegateway client to latest version
api-change:rds: [botocore] Update rds client to latest version
api-change:clouddirectory: [botocore] Update clouddirectory client to latest version

1.7.35
api-change:mediatailor: [botocore] Update mediatailor client to latest version

1.7.34
api-change:medialive: [botocore] Update medialive client to latest version

1.7.33
api-change:polly: [botocore] Update polly client to latest version
api-change:ce: [botocore] Update ce client to latest version
api-change:secretsmanager: [botocore] Update secretsmanager client to latest version
api-change🛡️ [botocore] Update shield client to latest version
api-change:rds: [botocore] Update rds client to latest version

1.7.32
api-change:ec2: [botocore] Update ec2 client to latest version
api-change:sagemaker: [botocore] Update sagemaker client to latest version
api-change:mgh: [botocore] Update mgh client to latest version
api-change:mediaconvert: [botocore] Update mediaconvert client to latest version
api-change:appstream: [botocore] Update appstream client to latest version
api-change:eks: [botocore] Update eks client to latest version
dd
1.7.31
api-change:ds: [botocore] Update ds client to latest version
api-change:mediatailor: [botocore] Update mediatailor client to latest version
api-change:sns: [botocore] Update sns client to latest version
api-change:redshift: [botocore] Update redshift client to latest version
api-change:iot: [botocore] Update iot client to latest version

1.7.30
api-change:neptune: [botocore] Update neptune client to latest version
api-change:elbv2: [botocore] Update elbv2 client to latest version
2018-06-14 08:25:22 +00:00
adam
f3cdf33eb3 py-botocore: updated to 1.10.38
1.10.38
api-change:ssm: Update ssm client to latest version
api-change:servicecatalog: Update servicecatalog client to latest version

1.10.37
api-change:ecs: Update ecs client to latest version
api-change:devicefarm: Update devicefarm client to latest version

1.10.36
api-change:storagegateway: Update storagegateway client to latest version
api-change:rds: Update rds client to latest version
api-change:clouddirectory: Update clouddirectory client to latest version

1.10.35
api-change:mediatailor: Update mediatailor client to latest version

1.10.34
api-change:medialive: Update medialive client to latest version

1.10.33
api-change:polly: Update polly client to latest version
api-change:ce: Update ce client to latest version
api-change:secretsmanager: Update secretsmanager client to latest version
api-change🛡️ Update shield client to latest version
api-change:rds: Update rds client to latest version

1.10.32
api-change:ec2: Update ec2 client to latest version
api-change:sagemaker: Update sagemaker client to latest version
api-change:mgh: Update mgh client to latest version
api-change:mediaconvert: Update mediaconvert client to latest version
api-change:appstream: Update appstream client to latest version
api-change:eks: Update eks client to latest version
2018-06-14 08:23:19 +00:00
bsiegert
f5ce56656d Update py-awscli to 1.15.37. From Jun Ebihara in PR pkg/53361.
While upstream provides a changelog, it is in JSON format split over a
hundred files :(
2018-06-14 07:24:07 +00:00
bsiegert
d22fe57854 Revbump all Go packages after lang/go update. 2018-06-12 17:50:20 +00:00
fhajny
a126227781 net/py-lexicon: Upddate to 2.4.0.
- Handle namespace variations of DnsEntry in transip provider
- Allow to toggle live tests using LEXICON_LIVE_TESTS env variable.
  Tests are offline by default.
- GoDaddy provider improvements
2018-06-12 08:42:50 +00:00
tsutsui
520d55ca63 mikutter: update to 3.7.2.
pkgsrc changes:

* drop json_pure dependency
  https://dev.mikutter.hachune.net/issues/1246

Upstream changes:

mikutter 3.7.2

* add a setting to disable extracting custom emoji
* handle a case that Twitter API returns non-URL strings as an entity
 * thanks cob odo
* unify options of remain_charcount with compose spell
 * thanks Shibafu Midorino
* stack overflow when strings which include URL are entered
 * thanks Shibafu Midorino
* import https://github.com/cobodo/photo_support_extra
 * thanks cob odo
* remain_charcount Spell
 * thanks Shibafu Midorino
* not enough height of a list in the extract tab's setting window
  in some case
 * thanks Yuto Tokunaga

Fixed several crash bugs.
2018-06-11 14:09:11 +00:00
he
4af43756cb Upgrade unbound to version 1.7.2.
Upstream changes:

Features
- Fix low-rtt-pct to low-rtt-permil, as it is parts in one thousand.
- Qname minimisation default changed to yes.
- Use accept4 to speed up incoming TCP (and TLS) connections,
  available on Linux, FreeBSD and OpenBSD.
- tls-win-cert option that adds the system certificate store for
  authenticating DNS-over-TLS connections.  It can be used instead
  of the tls-cert-bundle option, or with it to add certificates.
- Patch from Syzdek: Add ability to ignore RD bit and treat all
  requests as if the RD bit is set.
- Rename additional-tls-port to tls-additional-ports.
  The older name is accepted for backwards compatibility.

Bug fixes:
- Fix for crash in daemon_cleanup with dnstap during reload,
  from Saksham Manchanda.
- Also that for dnscrypt.
- Fix spelling error in man page and note defaults as no instead of
  off.
- Fix that unbound-control reload frees the rrset keys and returns
  the memory pages to the system.
- Fix fail to reject dead peers in forward-zone, with ssl-upstream.
- Fix that configure --with-libhiredis also turns on cachedb.
- Fix gcc 8 buffer warning in testcode.
- Fix function type cast warning in libunbound context callback type.
- Fix windows to not have sticky TLS events for TCP.
- Fix read of DNS over TLS length and data in one read call.
- Fix mesh state assertion failure due to callback removal.
- Fix contrib/libunbound.pc for libssl libcrypto references,
  from https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226914
- Fix that libunbound can do DNS-over-TLS, when configured.
- Fix that windows unbound service can use DNS-over-TLS.
- unbound-host initializes ssl (for potential DNS-over-TLS usage
  inside libunbound), when ssl upstream or a cert-bundle is configured.
- For TCP and TLS connections that don't establish, perform address
  update in infra cache, so future selections can exclude them.
- Fix that tcp sticky events are removed for closed fd on windows.
- Fix close events for tcp only.
- Fix windows tcp and tls spin on events.
- Add routine from getdns to add windows cert store to the SSL_CTX.
- in compat/arc4random call getentropy_urandom when getentropy fails
  with ENOSYS.
- Fix that fallback for windows port.
- Fix deadlock caused by incoming notify for auth-zone.
2018-06-11 10:06:58 +00:00
leot
bee5863669 hub: Update net/hub to 2.4.0
Changes:
2.4.0
-----
### Features
* `hub delete [<OWNER>/]<REPO>`
* Add `hub compare --copy` flag
* Add `hub release --format=<FORMAT>` option
* Add `hub pull-request --no-edit` flag
* When checking out a pull request, ensure that `git push`with no arguments
  works
* Support XDG Base Directory Specification

### Tweaks
* Enable `hub pr list -h <BRANCH>` when owner isn't specified
* Include `docs/` in list of locations to look up pull request and issue
  templates in
2018-06-10 12:14:30 +00:00
leot
92129a28c1 gallery-dl: Update net/gallery-dl to 1.4.0
Changes:
1.4.0
-----
* Added support for:
   - `simplyhentai` (#89)
* Added extractors for
   - `pixiv` search results and followed users
   - `deviantart` search results and popular listings
* Added post-processors to perform actions on downloaded files
* Added options to configure logging behavior
* Added OAuth support for `smugmug`
* Changed `pixiv` extractors to use the AppAPI,
  this breaks `favorite` archive IDs and changes some metadata fields
* Changed the default filename format for `tumblr` and renamed `offset` to
  `num`
* Fixed a possible UnicodeDecodeError during installation (#86)
* Fixed extraction of `mangadex` manga with more than 100 chapters (#84)
* Fixed miscellaneous issues for `imgur`, `reddit`, `komikcast`, `mangafox`
  and `imagebam`
2018-06-10 12:00:24 +00:00
leot
e0cd04811b hub: Avoid possible vim-isms when vi(1) is used
If the editor used matches the `\b(?:[gm]?vim|vi)(?:\.exe)?$' regular
expression hub automatically add as arguments `--cmd'. The `--cmd' passed is
probably supported only by vim so delete the `|vi' from the RE in order to not
append possible non-standard arguments to non-vim vi-s.

(This was spotted using `hub pull-request' that failed due non supported
argument passed to vi)

Bump PKGREVISION
2018-06-10 10:42:56 +00:00
ryoon
9ffb42c10b Update to 4.1.21
Changelog:
Features
    --enable-memclean cleans up memory for use with memory checkers,
      eg. valgrind.
    refuse-any nsd.conf option that refuses queries of type ANY.
    lower memory usage for tcp connections, so tcp-count can be higher.

Bug Fixes
    Fix unused variable warnings and uninit variable in statistics printout
      from clang analyzer.
    Fix spelling error in xfr-inspect.
    Fix #3562: explain build error when flex missing.
    Fix buffer size warnings from compiler on filename lengths.
    Fix #4093: Release notes not using 2018.
2018-06-10 04:27:03 +00:00
dbj
3f45f837d5 net/glib-networking: add a hack for Darwin to install modules with .so suffix
This works around an assumption by the py-meson build system
that loadable modules should have a .dylib suffix on Darwin.
glib2 expects those modules to have a .so suffix.
2018-06-04 05:31:02 +00:00
leot
b22b54a8c0 youtube-dl: Update net/youtube-dl to 20180604
Changes:
version 2018.06.04

Extractors
+ [camtube] Add support for camtube.co
+ [twitter:card] Extract guest token (#16609)
+ [chaturbate] Use geo verification headers
+ [bbc] Add support for bbcthree (#16612)
* [youtube] Move metadata extraction after video availability check
+ [youtube] Extract track and artist
+ [safari] Add support for new URL schema (#16614)
* [adn] Fix extraction


version 2018.06.02

Core
* [utils] Improve determine_ext

Extractors
+ [facebook] Add support for tahoe player videos (#15441, #16554)
* [cbc] Improve extraction (#16583, #16593)
* [openload] Improve ext extraction (#16595)
+ [twitter:card] Add support for another endpoint (#16586)
+ [openload] Add support for oload.win and oload.download (#16592)
* [audimedia] Fix extraction (#15309)
+ [francetv] Add support for sport.francetvinfo.fr (#15645)
* [mlb] Improve extraction (#16587)
- [nhl] Remove old extractors
* [rbmaradio] Check formats availability (#16585)


version 2018.05.30

Core
* [downloader/rtmp] Generalize download messages and report time elapsed
  on finish
* [downloader/rtmp] Gracefully handle live streams interrupted by user

Extractors
* [teamcoco] Fix extraction for full episodes (#16573)
* [spiegel] Fix info extraction (#16538)
+ [apa] Add support for apa.at (#15041, #15672)
+ [bellmedia] Add support for bnnbloomberg.ca (#16560)
+ [9c9media] Extract MPD formats and subtitles
* [cammodels] Use geo verification headers
+ [ufctv] Add support for authentication (#16542)
+ [cammodels] Add support for cammodels.com (#14499)
* [utils] Fix style id extraction for namespaced id attribute in dfxp2srt
  (#16551)
* [soundcloud] Detect format extension (#16549)
* [cbc] Fix playlist title extraction (#16502)
+ [tumblr] Detect and report sensitive media (#13829)
+ [tumblr] Add support for authentication (#15133)


version 2018.05.26

Core
* [utils] Improve parse_age_limit

Extractors
* [audiomack] Stringify video id (#15310)
* [izlesene] Fix extraction (#16233, #16271, #16407)
+ [indavideo] Add support for generic embeds (#11989)
* [indavideo] Fix extraction (#11221)
* [indavideo] Sign download URLs (#16174)
+ [peertube] Add support for PeerTube based sites (#16301, #16329)
* [imgur] Fix extraction (#16537)
+ [hidive] Add support for authentication (#16534)
+ [nbc] Add support for stream.nbcsports.com (#13911)
+ [viewlift] Add support for hoichoi.tv (#16536)
* [go90] Extract age limit and detect DRM protection(#10127)
* [viewlift] fix extraction for snagfilms.com (#15766)
* [globo] Improve extraction (#4189)
    * Add support for authentication
    * Simplify URL signing
    * Extract DASH and MSS formats
* [leeco] Fix extraction (#16464)
* [teamcoco] Add fallback for format extraction (#16484)
* [teamcoco] Improve URL regular expression (#16484)
* [imdb] Improve extraction (#4085, #14557)
2018-06-03 22:27:02 +00:00
youri
52e6efba75 Disable compile time TLS check, glib-networking includes mozilla-rootcerts.
Fixes macos build.
2018-06-02 22:48:34 +00:00
roy
38dfa3ab00 Import dhcpcd-7.0.5 with the following changes:
*  dhcp: Clarified some checksumming code, style and commentary
     (thanks to Maxime Villard)
  *  dhcp6: IAID is now unique per IA type rather than global
  *  ip6: if an IA callback causes a fork, exit earlier
2018-06-02 09:57:15 +00:00
youri
5035fd4731 Downgrade to a stable release, noted by wiz. 2018-06-01 22:00:06 +00:00
leot
77ffdc4f74 hub: Properly install man page via INSTALL_MAN
(Accidentally changed in 2.3.0 update.)
2018-06-01 15:46:43 +00:00
leot
f73ebce621 hub: Update net/hub to 2.3.0
pkgsrc changes:
 - Add a files/hub.1 to avoid picking up devel/ruby-ronn as a TOOL_DEPENDS

Changes:
2.3.0
-----
This is a long-awaited release of hub with an abudance of new features.
Thank you everyone for testing out prereleases, reporting bugs, and
submitting pull requests! The work of 76 contributors went into
this release.

## New commands

  * `hub issue`: list and create issues and labels

        Usage: hub issue [-a <ASSIGNEE>] [-c <CREATOR>] [-@ <USER>]
			 [-s <STATE>] [-f <FORMAT>] [-M <MILESTONE>]
			 [-l <LABELS>] [-d <DATE>] [-o <SORT_KEY> [-^]]
			 [-L <LIMIT>]
           hub issue create [-oc] [-m <MESSAGE>|-F <FILE>] [-a <USERS>]
			    [-M <MILESTONE>] [-l <LABELS>]
           hub issue labels [--color]

  * `hub pr list`: list pull requests for the current repository
  * `hub pr checkout <NUMBER>`: checkout a pull request by its number
  * `hub release`: list, create, edit, and delete releases and attachments

        Usage: hub release [--include-drafts] [--exclude-prereleases]
			   [-L <LIMIT>]
           hub release show <TAG>
           hub release create [-dpoc] [-a <FILE>] [-m <MESSAGE>|-F <FILE>]
			      [-t <TARGET>] <TAG>
           hub release edit [<options>] <TAG>
           hub release delete <TAG>

  * `hub sync`: fetch updates from remote repository and sync all local
    branches to their upstream equivalents, purging merged ones


## Improved commands

  * `hub pull-request` now has the ability to set assignees, labels,
    reviewers, and milestones.

        Usage: hub pull-request [-focp] [-b <BASE>] [-h <HEAD>]
				[-r <REVIEWERS> ] [-a <ASSIGNEES>]
				[-M <MILESTONE>] [-l <LABELS>]
           hub pull-request -m <MESSAGE>
           hub pull-request -F <FILE> [--edit]
           hub pull-request -i <ISSUE>

  * `hub pull-request` and `hub issue create` now support pull request and
     issue templates.
  * Commands that print the resulting URL, such as `hub pull-request` or
    `hub create`, now accept `--copy` to put the URL to the system clipboard
    instead.
  * `hub pull-request` now supports `--push` and `--open` flags to push the
    head branch to the remote and open the resulting PR in a web browser,
    respectively.
  * `hub pull-request` now strips away the `Signed-off-by` line and the commit
    signature when generating the default pull request message.
  * Commands that take input via `-m` or `-F` arguments now also respect
    `--edit` to additionally edit the text in a text editor before submitting.
  * Support `core.commentchar=auto` git configuration when editing
    pull request/issue/release message in a text editor.
  * Support `/OWNER/REPO/pull/XYZ/commits/SHA` format of URLs as argument to
    `cherry-pick`, `am`, and `apply`.
  * Commands such as `cherry-pick`, `merge <PR-URL>`, and `checkout <PR-URL>`
    don't leave leftover git remotes anymore.
  * New `hub compare -b BASE` flag.
  * New `hub fork --org=ORGANIZATION` flag.
  * New `hub fork --remote-name=NAME` flag to configure the new git remote.
  * New, manpage-based help system; see `hub help hub` and
    `hub help hub-<command>`.
  * Added fish shell completion script.
  * When prompted to authenticate with username/password, pasting a
    Personal Access Token now works just as well instead of the password.
2018-06-01 15:42:22 +00:00
youri
f2e8e99813 Remove obsolete patch. 2018-05-31 14:55:10 +00:00
youri
1aec029a1c Add patch. 2018-05-31 14:45:56 +00:00
youri
03b6f8d55d Update gnome-online-accounts to 3.29.1:
Too many changes to list, see
https://github.com/GNOME/gnome-online-accounts/blob/master/NEWS.
2018-05-31 14:44:30 +00:00
he
5e45d00f01 I'm sorry, the configure patch was mangled. Here's a correction.
Riding on the previous version bump since this is a build fix.
2018-05-30 09:39:12 +00:00
wen
9a0954ba6a Update to 1.16
Upstream changes:
1.16 Thu 17 May 13:57:30 CEST 2018
   - bugfix: RT#125315, typos in pod and code.
2018-05-30 01:32:54 +00:00
wen
31faa4725a Update to 1.19
Upstream changes:
1.19 Thu 17 May 13:59:33 CEST 2018
   - bugfix: test 13 when DNS getHostIpv6Addr() returns an IPv4 mapped to an IPv6 address
   => https://rt.cpan.org/Ticket/Display.html?id=124780
2018-05-30 01:29:04 +00:00
wen
10990c6184 Update toi 1.27
Upstream changes:
1.27 May 14, 2018
    ! Problem with compression in server mode
2018-05-30 01:23:42 +00:00
he
b9507ab64a Add checking for both res_mkquery and __res_mkquery, and same for
dn_expand.  I could not find a way to express "you need to include
<resolv.h> before checking this function in this library" with the
older autoconf this uses.
Bump PKGREVISION.
2018-05-29 12:56:55 +00:00
he
45012a4d8b Respect TCL_INCLUDE_SPEC from tclConfig.sh if specified.
Bump PKGREVISION.
2018-05-28 14:14:02 +00:00
fhajny
b7099d67bd net/py-lexicon: Update to 2.3.0.
- Multiple updates for Namecheap client
- Rackspace handle duplicate record on create
- Fixes and recordings for cloudns
- TransIP: Record set support
2018-05-28 13:46:12 +00:00
wiz
19b94d03cb glib-networking: update to 2.56.1.
2.56.1 - May 21, 2018
=====================

- Fix build with PKCS#11 backend disabled (#794292, Tom Schoonjans)
- Various meson build system fixes (#794358 and #794372)
- Tests are now compatible with GnuTLS 3.6 (#794286)
2018-05-27 12:28:12 +00:00
wiz
23f4f43ed6 wireshark: update to 2.6.1.
Wireshark 2.6.1 Release Notes

  Bug Fixes

   The following vulnerabilities have been fixed:

     • ws-sa2018-25

     • The LDSS dissector could crash. (ws-bug14615)

     • ws-sa2018-26

     • The IEEE 1905.1a dissector could crash. (ws-bug14647)

     • ws-sa2018-27

     • The RTCP dissector could crash. (ws-bug14673)

     • ws-sa2018-28

     • Multiple dissectors could consume excessive memory. (ws-bug14678)

     • ws-sa2018-29

     • The DNS dissector could crash. (ws-bug14681)

     • ws-sa2018-30

     • The GSM A DTAP dissector could crash. (ws-bug14688)

     • ws-sa2018-31

     • The Q.931 dissector could crash. (ws-bug14689)

     • ws-sa2018-32

     • The IEEE 802.11 dissector could crash. (ws-bug14686)

     • ws-sa2018-33

     • Multiple dissectors could crash. (ws-bug14703)

   The following bugs have been fixed:

     • Qt GUI does not snap to exactly half of screen in Windows. (Bug
       13516[1])

     • Segmentation fault when switching profiles. (Bug 14316[2])

     • QUIC dissector produces incorrect packet numbers (wrong-endian).
       (Bug 14462[3])

     • Wrong default file format chosen in when saving a capture with
       comments added if the original format doesn’t support comments.
       (Bug 14601[4])

     • Lua: Error during loading [AppData directory]:1: bad argument #1
       to dofile (dofile: file does not exist). (Bug 14619[5])

     • Crash when selecting text. (Bug 14620[6])

     • ui/macosx directory missing from source release tarball. (Bug
       14627[7])

     • Wireshark 2.9.0 snapshot crashes/segfaults on Windows when
       launched with -k or -i. (Bug 14632[8])

     • "Copy as printable text" isn’t copying non-alphanumeric
       characters. (Bug 14633[9])

     • File missing from release tarball. (Bug 14634[10])

     • NEWS is out of date and does not display properly in Notepad.
       (Bug 14636[11])

     • l16mono.so is installed in the wrong place. (Bug 14638[12])

     • Remove: HACK to support UHD’s weird header offset on data
       packets. (Bug 14641[13])

     • WinSparkle 0.5.6 is out of date and is buggy. (Bug 14642[14])

     • Unable to create or open VOIP captures. (Bug 14648[15])

     • RTMPT: incorrect dissection of multiple RTMP packets within a
       single TCP packet. (Bug 14650[16])

     • Endpoints dialog displays invalid GeoIP information due to
       incorrect byte order. (Bug 14656[17])

     • Qt: Crash in ShowPacketBytesDialog(). (Bug 14658[18])

     • Statistics → Resolved addresses show IP addresses without domain.
       (Bug 14667[19])

     • Erroneous MAC-LTE Dissection for Sidelink Shared Channel Packets.
       (Bug 14669[20])

     • Files missing from docbook CMake file. (Bug 14676[21])

     • Wireshark hangs when opening certain files if it’s been
       configured to use the new GeoIP databases. (Bug 14701[22])

   The “Open”, “Save”, and other file dialogs should now be shown at the
   correct size on HiDPI Windows systems.

  Updated Protocol Support

   BATADV, BT LE LL, CoAP, DNS, DTLS, GSM A DTAP, GSM A GM, GTP, GTPv2,
   IEEE 1905.1a, IEEE 802.11, LDSS, LwM2M-TLV, MAC LTE, NAS EPS, Q.931,
   RTCP, RTMPT, SDP, TCP, and VITA 49

  New and Updated Capture File Support

   3GPP TS 32.423 Trace and Android Logcat
2018-05-27 12:20:52 +00:00
tsutsui
71ddbfdba5 mikutter: update to 3.7.1.
pkgsrc changes:

* add MESSAGE file that describes how to use Twitter via mikutter
  even after mikutter's Twitter API keys have been suspended
* explicitly require updated ruby-gnome2-glib 3.2.5nb1

Upstream changes:

mikutter 3.7.1

* crashed on showing system messages in some case

mikutter 3.7.0

* Score
 * custom emoji
* change a cursor shape on clickable elements on timeline
 * thanks Yuto Tokunaga
* stop auto scroll when mouse-over icon buttons are shown
 * @cobodo
* improve an open file dialog
 * @cobodo
* Photo Variant
* provide a simpler method to replace Twitter's consumer key
2018-05-27 05:17:40 +00:00
wiz
414aa21e67 filezilla: update to 3.33.0.
3.33.0 (2018-05-07)

- MSW: Microsoft broke the ICopyHook interface in Windows 1803. Until Microsoft fixes the bug in Windows, drag & drop from FileZilla into Explorer will not work on Windows 1803.

3.33.0-rc1 (2018-04-27)

+ The contents of the transfer queue can now be sorted
+ SFTP: Support key files encrypted with aes256-ctr, e.g. as created by OpenSSH 7.6 and later
- SFTP: Fix preserve timestamps menu option
2018-05-26 21:59:41 +00:00
wiz
d4fe9309ad libfilezilla: update to 0.12.2.
0.12.2 (2018-05-05)

+ Added parameters to base64_encode to control alphabet and padding
+ Improved performance of less_insensitive_ascii
+ *nix: Faster conversion between UTF-8 and wchar_t strings.
2018-05-26 21:50:33 +00:00
wiz
4e221fe27e libsoup: update to 2.62.2.
Changes in libsoup from 2.62.1 to 2.62.2:

	* Fixes to instrospection annotation [#795135,
	Claudio Saavedra]

	* Fixes to the test suite with PHP version >= 7.2
	[#795111, Jan Alexander Steffens]

	* Critical warning fixes to SoupSocket [Carlos Garcia Campos]

	* Updated Romanian translation.
2018-05-26 21:48:31 +00:00
fhajny
a3cf0bab6f net/powerdns-recursor: Update to 4.1.3.
Improvements
- Add a subtree option to the API cache flush endpoint.
- Use a separate, non-blocking pipe to distribute queries.
- Move carbon/webserver/control/stats handling to a separate thread.
- Add _raw versions for QName / ComboAddresses to the FFI API.
- Update copyright years to 2018
- Fix a warning on botan >= 2.5.0.

Bug Fixes
- Count a lookup into an internal auth zone as a cache miss.
- Don’t increase the DNSSEC validations counters when running with
  process-no-validate.
- Respect the AXFR timeout while connecting to the RPZ server.
- Increase MTasker stacksize to avoid crash in exception unwinding
- Use the SyncRes time in our unit tests when checking cache validity
- Add -rdynamic to C{,XX}FLAGS when we build with LuaJIT.
- Delay the loading of RPZ zones until the parsing is done, fixing a
  race condition.
- Reorder includes to avoid boost L conflict.
2018-05-23 10:34:58 +00:00
wiz
e69969d3e3 tor: update to 0.3.3.6.
Changes in version 0.3.3.6 - 2018-05-22
  Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
  backports several important fixes from the 0.3.4.1-alpha.

  The Tor 0.3.3 series includes controller support and other
  improvements for v3 onion services, official support for embedding Tor
  within other applications, and our first non-trivial module written in
  the Rust programming language. (Rust is still not enabled by default
  when building Tor.) And as usual, there are numerous other smaller
  bugfixes, features, and improvements.

  Below are the changes since 0.3.2.10. For a list of only the changes
  since 0.3.3.5-rc, see the ChangeLog file.

  o New system requirements:
    - When built with Rust, Tor now depends on version 0.2.39 of the
      libc crate. Closes tickets 25310 and 25664.

  o Major features (embedding):
    - There is now a documented stable API for programs that need to
      embed Tor. See tor_api.h for full documentation and known bugs.
      Closes ticket 23684.
    - Tor now has support for restarting in the same process.
      Controllers that run Tor using the "tor_api.h" interface can now
      restart Tor after Tor has exited. This support is incomplete,
      however: we fixed crash bugs that prevented it from working at
      all, but many bugs probably remain, including a possibility of
      security issues. Implements ticket 24581.

  o Major features (IPv6, directory documents):
    - Add consensus method 27, which adds IPv6 ORPorts to the microdesc
      consensus. This information makes it easier for IPv6 clients to
      bootstrap and choose reachable entry guards. Implements
      ticket 23826.
    - Add consensus method 28, which removes IPv6 ORPorts from
      microdescriptors. Now that the consensus contains IPv6 ORPorts,
      they are redundant in microdescs. This change will be used by Tor
      clients on 0.2.8.x and later. (That is to say, with all Tor
      clients that have IPv6 bootstrap and guard support.) Implements
      ticket 23828.
    - Expand the documentation for AuthDirHasIPv6Connectivity when it is
      set by different numbers of authorities. Fixes 23870
      on 0.2.4.1-alpha.

  o Major features (onion service v3, control port):
    - The control port now supports commands and events for v3 onion
      services. It is now possible to create ephemeral v3 services using
      ADD_ONION. Additionally, several events (HS_DESC, HS_DESC_CONTENT,
      CIRC and CIRC_MINOR) and commands (GETINFO, HSPOST, ADD_ONION and
      DEL_ONION) have been extended to support v3 onion services. Closes
      ticket 20699; implements proposal 284.

  o Major features (onion services):
    - Provide torrc options to pin the second and third hops of onion
      service circuits to a list of nodes. The option HSLayer2Guards
      pins the second hop, and the option HSLayer3Guards pins the third
      hop. These options are for use in conjunction with experiments
      with "vanguards" for preventing guard enumeration attacks. Closes
      ticket 13837.
    - When v3 onion service clients send introduce cells, they now
      include the IPv6 address of the rendezvous point, if it has one.
      Current v3 onion services running 0.3.2 ignore IPv6 addresses, but
      in future Tor versions, IPv6-only v3 single onion services will be
      able to use IPv6 addresses to connect directly to the rendezvous
      point. Closes ticket 23577. Patch by Neel Chauhan.

  o Major features (relay):
    - Implement an option, ReducedExitPolicy, to allow an Tor exit relay
      operator to use a more reasonable ("reduced") exit policy, rather
      than the default one. If you want to run an exit node without
      thinking too hard about which ports to allow, this one is for you.
      Closes ticket 13605. Patch from Neel Chauhan.

  o Major features (rust, portability, experimental):
    - Tor now ships with an optional implementation of one of its
      smaller modules (protover.c) in the Rust programming language. To
      try it out, install a Rust build environment, and configure Tor
      with "--enable-rust --enable-cargo-online-mode". This should not
      cause any user-visible changes, but should help us gain more
      experience with Rust, and plan future Rust integration work.
      Implementation by Chelsea Komlo. Closes ticket 22840.

  o Major bugfixes (directory authorities, security, backport from 0.3.4.1-alpha):
    - When directory authorities read a zero-byte bandwidth file, they
      would previously log a warning with the contents of an
      uninitialised buffer. They now log a warning about the empty file
      instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha.

  o Major bugfixes (security, directory authority, denial-of-service):
    - Fix a bug that could have allowed an attacker to force a directory
      authority to use up all its RAM by passing it a maliciously
      crafted protocol versions string. Fixes bug 25517; bugfix on
      0.2.9.4-alpha. This issue is also tracked as TROVE-2018-005.

  o Major bugfixes (crash, backport from 0.3.4.1-alpha):
    - Avoid a rare assertion failure in the circuit build timeout code
      if we fail to allow any circuits to actually complete. Fixes bug
      25733; bugfix on 0.2.2.2-alpha.

  o Major bugfixes (netflow padding):
    - Stop adding unneeded channel padding right after we finish
      flushing to a connection that has been trying to flush for many
      seconds. Instead, treat all partial or complete flushes as
      activity on the channel, which will defer the time until we need
      to add padding. This fix should resolve confusing and scary log
      messages like "Channel padding timeout scheduled 221453ms in the
      past." Fixes bug 22212; bugfix on 0.3.1.1-alpha.

  o Major bugfixes (networking):
    - Tor will no longer reject IPv6 address strings from Tor Browser
      when they are passed as hostnames in SOCKS5 requests. Fixes bug
      25036, bugfix on Tor 0.3.1.2.

  o Major bugfixes (onion service, backport from 0.3.4.1-alpha):
    - Correctly detect when onion services get disabled after HUP. Fixes
      bug 25761; bugfix on 0.3.2.1.

  o Major bugfixes (performance, load balancing):
    - Directory authorities no longer vote in favor of the Guard flag
      for relays without directory support. Starting in Tor
      0.3.0.1-alpha, clients have been avoiding using such relays in the
      Guard position, leading to increasingly broken load balancing for
      the 5%-or-so of Guards that don't advertise directory support.
      Fixes bug 22310; bugfix on 0.3.0.6.

  o Major bugfixes (relay):
    - If we have failed to connect to a relay and received a connection
      refused, timeout, or similar error (at the TCP level), do not try
      that same address/port again for 60 seconds after the failure has
      occurred. Fixes bug 24767; bugfix on 0.0.6.

  o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
    - Impose a limit on circuit cell queue size. The limit can be
      controlled by a consensus parameter. Fixes bug 25226; bugfix
      on 0.2.4.14-alpha.

  o Minor features (cleanup):
    - Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
      when it stops. Closes ticket 23271.

  o Minor features (compatibility, backport from 0.3.4.1-alpha):
    - Avoid some compilation warnings with recent versions of LibreSSL.
      Closes ticket 26006.

  o Minor features (config options):
    - Change the way the default value for MaxMemInQueues is calculated.
      We now use 40% of the hardware RAM if the system has 8 GB RAM or
      more. Otherwise we use the former value of 75%. Closes
      ticket 24782.

  o Minor features (continuous integration):
    - Update the Travis CI configuration to use the stable Rust channel,
      now that we have decided to require that. Closes ticket 25714.

  o Minor features (continuous integration, backport from 0.3.4.1-alpha):
    - Our .travis.yml configuration now includes support for testing the
      results of "make distcheck". (It's not uncommon for "make check"
      to pass but "make distcheck" to fail.) Closes ticket 25814.
    - Our Travis CI configuration now integrates with the Coveralls
      coverage analysis tool. Closes ticket 25818.

  o Minor features (defensive programming):
    - Most of the functions in Tor that free objects have been replaced
      with macros that free the objects and set the corresponding
      pointers to NULL. This change should help prevent a large class of
      dangling pointer bugs. Closes ticket 24337.
    - Where possible, the tor_free() macro now only evaluates its input
      once. Part of ticket 24337.
    - Check that microdesc ed25519 ids are non-zero in
      node_get_ed25519_id() before returning them. Implements ticket
      24001, patch by "aruna1234".

  o Minor features (directory authority):
    - When directory authorities are unable to add signatures to a
      pending consensus, log the reason why. Closes ticket 24849.

  o Minor features (embedding):
    - Tor can now start with a preauthenticated control connection
      created by the process that launched it. This feature is meant for
      use by programs that want to launch and manage a Tor process
      without allowing other programs to manage it as well. For more
      information, see the __OwningControllerFD option documented in
      control-spec.txt. Closes ticket 23900.
    - On most errors that would cause Tor to exit, it now tries to
      return from the tor_main() function, rather than calling the
      system exit() function. Most users won't notice a difference here,
      but it should be significant for programs that run Tor inside a
      separate thread: they should now be able to survive Tor's exit
      conditions rather than having Tor shut down the entire process.
      Closes ticket 23848.
    - Applications that want to embed Tor can now tell Tor not to
      register any of its own POSIX signal handlers, using the
      __DisableSignalHandlers option. Closes ticket 24588.

  o Minor features (fallback directory list):
    - Avoid selecting fallbacks that change their IP addresses too
      often. Select more fallbacks by ignoring the Guard flag, and
      allowing lower cutoffs for the Running and V2Dir flags. Also allow
      a lower bandwidth, and a higher number of fallbacks per operator
      (5% of the list). Implements ticket 24785.
    - Update the fallback whitelist and blacklist based on opt-ins and
      relay changes. Closes tickets 22321, 24678, 22527, 24135,
      and 24695.

  o Minor features (fallback directory mirror configuration):
    - Add a nickname to each fallback in a C comment. This makes it
      easier for operators to find their relays, and allows stem to use
      nicknames to identify fallbacks. Implements ticket 24600.
    - Add a type and version header to the fallback directory mirror
      file. Also add a delimiter to the end of each fallback entry. This
      helps external parsers like stem and Relay Search. Implements
      ticket 24725.
    - Add an extrainfo cache flag for each fallback in a C comment. This
      allows stem to use fallbacks to fetch extra-info documents, rather
      than using authorities. Implements ticket 22759.
    - Add the generateFallbackDirLine.py script for automatically
      generating fallback directory mirror lines from relay fingerprints.
      No more typos! Add the lookupFallbackDirContact.py script for
      automatically looking up operator contact info from relay
      fingerprints. Implements ticket 24706, patch by teor and atagar.
    - Reject any fallback directory mirror that serves an expired
      consensus. Implements ticket 20942, patch by "minik".
    - Remove commas and equals signs from external string inputs to the
      fallback list. This avoids format confusion attacks. Implements
      ticket 24726.
    - Remove the "weight=10" line from fallback directory mirror
      entries. Ticket 24681 will maintain the current fallback weights
      by changing Tor's default fallback weight to 10. Implements
      ticket 24679.
    - Stop logging excessive information about fallback netblocks.
      Implements ticket 24791.

  o Minor features (forward-compatibility):
    - If a relay supports some link authentication protocol that we do
      not recognize, then include that relay's ed25519 key when telling
      other relays to extend to it. Previously, we treated future
      versions as if they were too old to support ed25519 link
      authentication. Closes ticket 20895.

  o Minor features (geoip):
    - Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2 Country
      database. Closes ticket 26104.

  o Minor features (heartbeat):
    - Add onion service information to our heartbeat logs, displaying
      stats about the activity of configured onion services. Closes
      ticket 24896.

  o Minor features (instrumentation, development):
    - Add the MainloopStats option to allow developers to get
      instrumentation information from the main event loop via the
      heartbeat messages. We hope to use this to improve Tor's behavior
      when it's trying to sleep. Closes ticket 24605.

  o Minor features (IPv6):
    - Make IPv6-only clients wait for microdescs for relays, even if we
      were previously using descriptors (or were using them as a bridge)
      and have a cached descriptor for them. Implements ticket 23827.
    - When a consensus has IPv6 ORPorts, make IPv6-only clients use
      them, rather than waiting to download microdescriptors. Implements
      ticket 23827.

  o Minor features (log messages):
    - Improve log message in the out-of-memory handler to include
      information about memory usage from the different compression
      backends. Closes ticket 25372.
    - Improve a warning message that happens when we fail to re-parse an
      old router because of an expired certificate. Closes ticket 20020.
    - Make the log more quantitative when we hit MaxMemInQueues
      threshold exposing some values. Closes ticket 24501.

  o Minor features (logging):
    - Clarify the log messages produced when getrandom() or a related
      entropy-generation mechanism gives an error. Closes ticket 25120.
    - Added support for the Android logging subsystem. Closes
      ticket 24362.

  o Minor features (performance):
    - Support predictive circuit building for onion service circuits
      with multiple layers of guards. Closes ticket 23101.
    - Use stdatomic.h where available, rather than mutexes, to implement
      atomic_counter_t. Closes ticket 23953.

  o Minor features (performance, 32-bit):
    - Improve performance on 32-bit systems by avoiding 64-bit division
      when calculating the timestamp in milliseconds for channel padding
      computations. Implements ticket 24613.
    - Improve performance on 32-bit systems by avoiding 64-bit division
      when timestamping cells and buffer chunks for OOM calculations.
      Implements ticket 24374.

  o Minor features (performance, OSX, iOS):
    - Use the mach_approximate_time() function (when available) to
      implement coarse monotonic time. Having a coarse time function
      should avoid a large number of system calls, and improve
      performance slightly, especially under load. Closes ticket 24427.

  o Minor features (performance, windows):
    - Improve performance on Windows Vista and Windows 7 by adjusting
      TCP send window size according to the recommendation from
      SIO_IDEAL_SEND_BACKLOG_QUERY. Closes ticket 22798. Patch
      from Vort.

  o Minor features (sandbox):
    - Explicitly permit the poll() system call when the Linux
      seccomp2-based sandbox is enabled: apparently, some versions of
      libc use poll() when calling getpwnam(). Closes ticket 25313.

  o Minor features (storage, configuration):
    - Users can store cached directory documents somewhere other than
      the DataDirectory by using the CacheDirectory option. Similarly,
      the storage location for relay's keys can be overridden with the
      KeyDirectory option. Closes ticket 22703.

  o Minor features (testing):
    - Add a "make test-rust" target to run the rust tests only. Closes
      ticket 25071.

  o Minor features (testing, debugging, embedding):
    - For development purposes, Tor now has a mode in which it runs for
      a few seconds, then stops, and starts again without exiting the
      process. This mode is meant to help us debug various issues with
      ticket 23847. To use this feature, compile with
      --enable-restart-debugging, and set the TOR_DEBUG_RESTART
      environment variable. This is expected to crash a lot, and is
      really meant for developers only. It will likely be removed in a
      future release. Implements ticket 24583.

  o Minor bugfixes (build, rust):
    - Fix output of autoconf checks to display success messages for Rust
      dependencies and a suitable rustc compiler version. Fixes bug
      24612; bugfix on 0.3.1.3-alpha.
    - Don't pass the --quiet option to cargo: it seems to suppress some
      errors, which is not what we want to do when building. Fixes bug
      24518; bugfix on 0.3.1.7.
    - Build correctly when building from outside Tor's source tree with
      the TOR_RUST_DEPENDENCIES option set. Fixes bug 22768; bugfix
      on 0.3.1.7.

  o Minor bugfixes (C correctness):
    - Fix a very unlikely (impossible, we believe) null pointer
      dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by
      Coverity; this is CID 1430932.

  o Minor bugfixes (channel, client):
    - Better identify client connection when reporting to the geoip
      client cache. Fixes bug 24904; bugfix on 0.3.1.7.

  o Minor bugfixes (circuit, cannibalization):
    - Don't cannibalize preemptively-built circuits if we no longer
      recognize their first hop. This situation can happen if our Guard
      relay went off the consensus after the circuit was created. Fixes
      bug 24469; bugfix on 0.0.6.

  o Minor bugfixes (client, backport from 0.3.4.1-alpha):
    - Don't consider Tor running as a client if the ControlPort is open,
      but no actual client ports are open. Fixes bug 26062; bugfix
      on 0.2.9.4-alpha.

  o Minor bugfixes (compilation):
    - Fix a C99 compliance issue in our configuration script that caused
      compilation issues when compiling Tor with certain versions of
      xtools. Fixes bug 25474; bugfix on 0.3.2.5-alpha.

  o Minor bugfixes (controller):
    - Restore the correct operation of the RESOLVE command, which had
      been broken since we added the ability to enable/disable DNS on
      specific listener ports. Fixes bug 25617; bugfix on 0.2.9.3-alpha.
    - Avoid a (nonfatal) assertion failure when extending a one-hop
      circuit from the controller to become a multihop circuit. Fixes
      bug 24903; bugfix on 0.2.5.2-alpha.

  o Minor bugfixes (correctness):
    - Remove a nonworking, unnecessary check to see whether a circuit
      hop's identity digest was set when the circuit failed. Fixes bug
      24927; bugfix on 0.2.4.4-alpha.

  o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha):
    - Upon receiving a malformed connected cell, stop processing the
      cell immediately. Previously we would mark the connection for
      close, but continue processing the cell as if the connection were
      open. Fixes bug 26072; bugfix on 0.2.4.7-alpha.

  o Minor bugfixes (directory authorities, IPv6):
    - When creating a routerstatus (vote) from a routerinfo (descriptor),
      set the IPv6 address to the unspecified IPv6 address, and
      explicitly initialize the port to zero. Fixes bug 24488; bugfix
      on 0.2.4.1-alpha.

  o Minor bugfixes (documentation):
    - Document that the PerConnBW{Rate,Burst} options will fall back to
      their corresponding consensus parameters only if those parameters
      are set. Previously we had claimed that these values would always
      be set in the consensus. Fixes bug 25296; bugfix on 0.2.2.7-alpha.

  o Minor bugfixes (documentation, backport from 0.3.4.1-alpha):
    - Stop saying in the manual that clients cache ipv4 dns answers from
      exit relays. We haven't used them since 0.2.6.3-alpha, and in
      ticket 24050 we stopped even caching them as of 0.3.2.6-alpha, but
      we forgot to say so in the man page. Fixes bug 26052; bugfix
      on 0.3.2.6-alpha.

  o Minor bugfixes (exit relay DNS retries):
    - Re-attempt timed-out DNS queries 3 times before failure, since our
      timeout is 5 seconds for them, but clients wait 10-15. Also allow
      slightly more timeouts per resolver when an exit has multiple
      resolvers configured. Fixes bug 21394; bugfix on 0.3.1.9.

  o Minor bugfixes (fallback directory mirrors):
    - Make updateFallbackDirs.py search harder for python. (Some OSs
      don't put it in /usr/bin.) Fixes bug 24708; bugfix
      on 0.2.8.1-alpha.

  o Minor bugfixes (hibernation, bandwidth accounting, shutdown):
    - When hibernating, close connections normally and allow them to
      flush. Fixes bug 23571; bugfix on 0.2.4.7-alpha. Also fixes
      bug 7267.
    - Do not attempt to launch self-reachability tests when entering
      hibernation. Fixes a case of bug 12062; bugfix on 0.0.9pre5.
    - Resolve several bugs related to descriptor fetching on bridge
      clients with bandwidth accounting enabled. (This combination is
      not recommended!) Fixes a case of bug 12062; bugfix
      on 0.2.0.3-alpha.
    - When hibernating, do not attempt to launch DNS checks. Fixes a
      case of bug 12062; bugfix on 0.1.2.2-alpha.
    - When hibernating, do not try to upload or download descriptors.
      Fixes a case of bug 12062; bugfix on 0.0.9pre5.

  o Minor bugfixes (IPv6, bridges):
    - Tor now always sets IPv6 preferences for bridges. Fixes bug 24573;
      bugfix on 0.2.8.2-alpha.
    - Tor now sets IPv6 address in the routerstatus as well as in the
      router descriptors when updating addresses for a bridge. Closes
      ticket 24572; bugfix on 0.2.4.5-alpha. Patch by "ffmancera".

  o Minor bugfixes (Linux seccomp2 sandbox):
    - When running with the sandbox enabled, reload configuration files
      correctly even when %include was used. Previously we would crash.
      Fixes bug 22605; bugfix on 0.3.1. Patch from Daniel Pinto.

  o Minor bugfixes (Linux seccomp2 sandbox, backport from 0.3.4.1-alpha):
    - Allow the nanosleep() system call, which glibc uses to implement
      sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.

  o Minor bugfixes (logging):
    - Fix a (mostly harmless) race condition when invoking
      LOG_PROTOCOL_WARN message from a subthread while the torrc options
      are changing. Fixes bug 23954; bugfix on 0.1.1.9-alpha.

  o Minor bugfixes (man page, SocksPort):
    - Remove dead code from the old "SocksSocket" option, and rename
      SocksSocketsGroupWritable to UnixSocksGroupWritable. The old
      option still works, but is deprecated. Fixes bug 24343; bugfix
      on 0.2.6.3.

  o Minor bugfixes (memory leaks):
    - Avoid possible at-exit memory leaks related to use of Libevent's
      event_base_once() function. (This function tends to leak memory if
      the event_base is closed before the event fires.) Fixes bug 24584;
      bugfix on 0.2.8.1-alpha.
    - Fix a harmless memory leak in tor-resolve. Fixes bug 24582; bugfix
      on 0.2.1.1-alpha.

  o Minor bugfixes (network IPv6 test):
    - Tor's test scripts now check if "ping -6 ::1" works when the user
      runs "make test-network-all". Fixes bug 24677; bugfix on
      0.2.9.3-alpha. Patch by "ffmancera".

  o Minor bugfixes (networking):
    - string_is_valid_hostname() will not consider IP strings to be
      valid hostnames. Fixes bug 25055; bugfix on Tor 0.2.5.5.

  o Minor bugfixes (onion service v3):
    - Avoid an assertion failure when the next onion service descriptor
      rotation type is out of sync with the consensus's valid-after
      time. Instead, log a warning message with extra information, so we
      can better hunt down the cause of this assertion. Fixes bug 25306;
      bugfix on 0.3.2.1-alpha.

  o Minor bugfixes (onion service, backport from 0.3.4.1-alpha):
    - Fix a memory leak when a v3 onion service is configured and gets a
      SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha.
    - When parsing the descriptor signature, look for the token plus an
      extra white-space at the end. This is more correct but also will
      allow us to support new fields that might start with "signature".
      Fixes bug 26069; bugfix on 0.3.0.1-alpha.

  o Minor bugfixes (onion services):
    - If we are configured to offer a single onion service, don't log
      long-term established one hop rendezvous points in the heartbeat.
      Fixes bug 25116; bugfix on 0.2.9.6-rc.

  o Minor bugfixes (performance):
    - Reduce the number of circuits that will be opened at once during
      the circuit build timeout phase. This is done by increasing the
      idle timeout to 3 minutes, and lowering the maximum number of
      concurrent learning circuits to 10. Fixes bug 24769; bugfix
      on 0.3.1.1-alpha.
    - Avoid calling protocol_list_supports_protocol() from inside tight
      loops when running with cached routerinfo_t objects. Instead,
      summarize the relevant protocols as flags in the routerinfo_t, as
      we do for routerstatus_t objects. This change simplifies our code
      a little, and saves a large amount of short-term memory allocation
      operations. Fixes bug 25008; bugfix on 0.2.9.4-alpha.

  o Minor bugfixes (performance, timeouts):
    - Consider circuits for timeout as soon as they complete a hop. This
      is more accurate than applying the timeout in
      circuit_expire_building() because that function is only called
      once per second, which is now too slow for typical timeouts on the
      current network. Fixes bug 23114; bugfix on 0.2.2.2-alpha.
    - Use onion service circuits (and other circuits longer than 3 hops)
      to calculate a circuit build timeout. Previously, Tor only
      calculated its build timeout based on circuits that planned to be
      exactly 3 hops long. With this change, we include measurements
      from all circuits at the point where they complete their third
      hop. Fixes bug 23100; bugfix on 0.2.2.2-alpha.

  o Minor bugfixes (relay, crash, backport from 0.3.4.1-alpha):
    - Avoid a crash when running with DirPort set but ORPort tuned off.
      Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha.

  o Minor bugfixes (Rust FFI):
    - Fix a minor memory leak which would happen whenever the C code
      would call the Rust implementation of
      protover_get_supported_protocols(). This was due to the C version
      returning a static string, whereas the Rust version newly allocated
      a CString to pass accross the FFI boundary. Consequently, the C
      code was not expecting to need to free() what it was given. Fixes
      bug 25127; bugfix on 0.3.2.1-alpha.

  o Minor bugfixes (spelling):
    - Use the "misspell" tool to detect and fix typos throughout the
      source code. Fixes bug 23650; bugfix on various versions of Tor.
      Patch from Deepesh Pathak.

  o Minor bugfixes (testing):
    - Avoid intermittent test failures due to a test that had relied on
      onion service introduction point creation finishing within 5
      seconds of real clock time. Fixes bug 25450; bugfix
      on 0.3.1.3-alpha.
    - Give out Exit flags in bootstrapping networks. Fixes bug 24137;
      bugfix on 0.2.3.1-alpha.

  o Minor bugfixes (unit test, monotonic time):
    - Increase a constant (1msec to 10msec) in the monotonic time test
      that makes sure the nsec/usec/msec times read are synchronized.
      This change was needed to accommodate slow systems like armel or
      when the clock_gettime() is not a VDSO on the running kernel.
      Fixes bug 25113; bugfix on 0.2.9.1.

  o Code simplification and refactoring:
    - Move the list of default directory authorities to its own file.
      Closes ticket 24854. Patch by "beastr0".
    - Remove the old (deterministic) directory retry logic entirely:
      We've used exponential backoff exclusively for some time. Closes
      ticket 23814.
    - Remove the unused nodelist_recompute_all_hsdir_indices(). Closes
      ticket 25108.
    - Remove a series of counters used to track circuit extend attempts
      and connection status but that in reality we aren't using for
      anything other than stats logged by a SIGUSR1 signal. Closes
      ticket 25163.
    - Remove /usr/athena from search path in configure.ac. Closes
      ticket 24363.
    - Remove duplicate code in node_has_curve25519_onion_key() and
      node_get_curve25519_onion_key(), and add a check for a zero
      microdesc curve25519 onion key. Closes ticket 23966, patch by
      "aruna1234" and teor.
    - Rewrite channel_rsa_id_group_set_badness to reduce temporary
      memory allocations with large numbers of OR connections (e.g.
      relays). Closes ticket 24119.
    - Separate the function that deletes ephemeral files when Tor
      stops gracefully.
    - Small changes to Tor's buf_t API to make it suitable for use as a
      general-purpose safe string constructor. Closes ticket 22342.
    - Switch -Wnormalized=id to -Wnormalized=nfkc in configure.ac to
      avoid source code identifier confusion. Closes ticket 24467.
    - The tor_git_revision[] constant no longer needs to be redeclared
      by everything that links against the rest of Tor. Done as part of
      ticket 23845, to simplify our external API.
    - We make extend_info_from_node() use node_get_curve25519_onion_key()
      introduced in ticket 23577 to access the curve25519 public keys
      rather than accessing it directly. Closes ticket 23760. Patch by
      Neel Chauhan.
    - Add a function to log channels' scheduler state changes to aid
      debugging efforts. Closes ticket 24531.

  o Documentation:
    - Improved the documentation of AccountingStart parameter. Closes
      ticket 23635.
    - Update the documentation for "Log" to include the current list of
      logging domains. Closes ticket 25378.
    - Add documentation on how to build tor with Rust dependencies
      without having to be online. Closes ticket 22907; bugfix
      on 0.3.0.3-alpha.
    - Clarify the behavior of RelayBandwidth{Rate,Burst} with client
      traffic. Closes ticket 24318.
    - Document that OutboundBindAddress doesn't apply to DNS requests.
      Closes ticket 22145. Patch from Aruna Maurya.

  o Code simplification and refactoring (channels):
    - Remove the incoming and outgoing channel queues. These were never
      used, but still took up a step in our fast path.
    - The majority of the channel unit tests have been rewritten and the
      code coverage has now been raised to 83.6% for channel.c. Closes
      ticket 23709.
    - Remove other dead code from the channel subsystem: All together,
      this cleanup has removed more than 1500 lines of code overall and
      adding very little except for unit test.

  o Code simplification and refactoring (circuit rendezvous):
    - Split the client-side rendezvous circuit lookup into two
      functions: one that returns only established circuits and another
      that returns all kinds of circuits. Closes ticket 23459.

  o Code simplification and refactoring (controller):
    - Make most of the variables in networkstatus_getinfo_by_purpose()
      const. Implements ticket 24489.

  o Documentation (backport from 0.3.4.1-alpha):
    - Correct an IPv6 error in the documentation for ExitPolicy. Closes
      ticket 25857. Patch from "CTassisF".

  o Documentation (man page):
    - The HiddenServiceVersion torrc option accepts only one number:
      either version 2 or 3. Closes ticket 25026; bugfix
      on 0.3.2.2-alpha.

  o Documentation (manpage, denial of service):
    - Provide more detail about the denial-of-service options, by
      listing each mitigation and explaining how they relate. Closes
      ticket 25248.
2018-05-23 06:19:52 +00:00
maya
cb0c654abd youtube-dl: update to latest version (2018.05.18)
Commit shortlog:
[itv] Improve extraction (closes #16253)
[tunein] Use live title for live streams (closes #16347)
Improve geo bypass mechanism * Introduce geo bypass context * Add ability to bypass based on IP blocks in CIDR notation * Introduce --geo-bypass-ip-block
[itv:btcc] Add extractor (closes #16139)
[watchbox] Fix extraction (closes #16356)
[cloudflarestream] Add support for cloudflare streams (closes #16375)
[businessinsider] Add extractor (closes #16387, closes #16388, closes #16389)
[udemy] Extract stream URLs (closes #16372)
[udemy] Extract asset captions
[YoutubeDL] Ensure ext exists for automatic captions
[ChangeLog] Actualize [ci skip]
release 2018.05.09
[nickbr] Relax _VALID_URL (#13230)
[mixcloud] Bypass throttling for HTTP formats (#12579, #16424)
[twitch:clips] Fix extraction (closes #16429)
[twitch:clips] Sort formats
[youtube] Make uploader extraction non fatal (#16444)
[youtube] Improve format filesize extraction (#16453)
[options] Fix typo (closes #16450)
[vimeo:likes] Relax _VALID_URL and fix single page likes extraction (closes #16475)
[ChangeLog] Actualize [ci skip]
release 2018.05.18
2018-05-20 06:16:20 +00:00
fhajny
4ff5f0d55d net/erlang-esip: Update to 1.0.23.
- Updating stun to version 1.0.22.
- Updating fast_tls to version a166f0e.
2018-05-17 13:34:27 +00:00
fhajny
be6613044f net/erlang-stun: Update to 1.0.22.
- Updating fast_tls to version a166f0e.
2018-05-17 13:33:11 +00:00
fhajny
770fe899cb net/erlang-xmpp: Update to 1.1.21.
- Updating fast_xml to version 1.1.30.
- Support urn:xmpp:push:summary
- Add parent attribute in <thread/>
- Update supported XEP-0359 version to v0.3.0
2018-05-17 13:32:06 +00:00
leot
9243e1179f mitmproxy: Update net/mitmproxy to 4.0.1
pkgsrc changes:
 - Take MAINTAINERship
 - Sync DEPENDS with setup.py
 - Add Python 3.5 to PYTHON_VERSIONS_INCOMPATIBLE (mitmproxy now requires Python
   3.6)

Changes:
mitmproxy 4.0.1
---------------
The previous release had a packaging issue, so we bumped it to
v4.0.1 and re-released it. This contains no actual bugfixes or
new features.

mitmproxy 4.0
-------------
Features
--------
 * mitmproxy now requires Python 3.6!
 * Moved the core to asyncio - which gives us a very significant performance
   boost!
 * Reduce memory consumption by using `SO_KEEPALIVE` (#3076)
 * Export request as httpie command (#3031)
 * Configure mitmproxy console keybindings with the keys.yaml file. See docs
   for more.

Breaking Changes
----------------
 * The --conf command-line flag is now --confdir, and specifies the mitmproxy
   configuration directory, instead of the options yaml file (which is at
   `config.yaml` under the configuration directory).
 * `allow_remote` got replaced by `block_global` and `block_private` (#3100)
 * No more custom events (#3093)
 * The `cadir` option has been renamed to `confdir`
 * We no longer magically capture print statements in addons and translate
   them to logs. Please use `ctx.log.info` explicitly.

Bugfixes
--------
 * Correctly block connections from remote clients with IPv4-mapped IPv6
   client addresses (#3099)
 * Expand `~` in paths during the `cut` command (#3078)
 * Remove socket listen backlog constraint
 * Improve handling of user script exceptions (#3050, #2837)
 * Ignore signal errors on windows
 * Fix traceback for commands with un-terminated escape characters (#2810)
 * Fix request replay when proxy is bound to local interface (#2647)
 * Fix traceback when running scripts on a flow twice (#2838)
 * Fix traceback when killing intercepted flow (#2879)
 * And lots of typos, docs improvements, revamped examples, and general fixes!
2018-05-17 13:06:13 +00:00
hauke
b7c07a6e63 Add missing dependencies. 2018-05-17 09:53:22 +00:00