| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
June 06, 2020. KDE today announces the release of KDE Frameworks 5.71.0.
KDE Frameworks are over 70 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well tested
libraries with friendly licensing terms. For an introduction see the KDE
Frameworks web page.
This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.
Announcement:
https://kde.org/announcements/kde-frameworks-5.71.0
Exp-run by: antoine
PR: 247240
Notes:
svn path=/head/; revision=539415
|
|
|
|
|
|
|
|
| |
PR: 246541
Submitted by: Bruce Richardson <bruce.richardson@intel.com> (maintainer)
Notes:
svn path=/head/; revision=539393
|
|
|
|
| |
Notes:
svn path=/head/; revision=539390
|
|
|
|
|
|
|
|
| |
PR: 240547
Submitted by: Radim Kolar <hsn@sendmail.cz> (maintainer)
Notes:
svn path=/head/; revision=539387
|
|
|
|
| |
Notes:
svn path=/head/; revision=539384
|
|
|
|
|
|
|
|
| |
PR: 243110
Submitted by: Tomoyuki Sakurai <trombik1973@gmail.com>
Notes:
svn path=/head/; revision=539383
|
|
|
|
| |
Notes:
svn path=/head/; revision=539371
|
|
|
|
|
|
|
|
|
|
|
|
| |
FreeBSD has the function udev_device_new_from_subsystem_sysname if the
module libudev-devd is installed, but it is not implemented.
PR: 247144
Reported by: Greg V <greg@unrelenting.technology>
Reviewed by: Roy Marples <roy@marples.name>
Notes:
svn path=/head/; revision=539349
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Also disable udev support in CONFIGURE_ARGS, given that FreeBSD has
the function udev_device_new_from_subsystem_sysname if the module
libudev-devd is installed, but it is not implemented.
PR: 247144
Reported by: Greg V <greg@unrelenting.technology>
Reviewed by: Roy Marples <roy@marples.name>
Notes:
svn path=/head/; revision=539348
|
|
|
|
| |
Notes:
svn path=/head/; revision=539346
|
|
|
|
|
|
|
| |
httpstat is py3-compatible, see https://github.com/reorx/httpstat
Notes:
svn path=/head/; revision=539322
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is the CLI part of LibreSpeed which is a very lightweight speedtest.
With the CLI it's possible to run a speedtest from the command line interface.
The server part can be found in www/librespeed.
WWW: https://github.com/librespeed/speedtest-cli
PR: 246609
Submitted by: Dries Michiels <driesm.michiels@gmail.com>
Notes:
svn path=/head/; revision=539318
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
LibreSpeed-go is a very lightweight speed test.
Is is implemented in JavaScript, using XMLHttpRequest and Web Workers.
This port uses GO as backend for hosting. And this in comparison to
www/librespeed where PHP and a web server are required.
WWW: https://github.com/librespeed/speedtest-go
PR: 247202
Submitted by: Dries Michiels <driesm.michiels@gmail.com>
Notes:
svn path=/head/; revision=539316
|
|
|
|
| |
Notes:
svn path=/head/; revision=539294
|
|
|
|
|
|
|
|
| |
PR: 247269
Submitted by: maintainer
Notes:
svn path=/head/; revision=539288
|
|
|
|
| |
Notes:
svn path=/head/; revision=539282
|
|
|
|
| |
Notes:
svn path=/head/; revision=539273
|
|
|
|
| |
Notes:
svn path=/head/; revision=539269
|
|
|
|
|
|
|
|
| |
Changes: https://github.com/googleapis/google-cloud-ruby/releases
https://github.com/googleapis/google-cloud-ruby/blob/master/google-cloud-logging/CHANGELOG.md
Notes:
svn path=/head/; revision=539264
|
|
|
|
|
|
|
| |
Changes: https://github.com/AssetSync/asset_sync/blob/master/CHANGELOG.md
Notes:
svn path=/head/; revision=539263
|
|
|
|
|
|
|
| |
- Bump PORTREVISION for package change
Notes:
svn path=/head/; revision=538939
|
|
|
|
|
|
|
|
|
|
| |
This includes a fix for high CPU usage
PR: 246929
Submitted by: Michael Muenz <m.muenz@gmail.com>
Notes:
svn path=/head/; revision=538924
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- a progress of almost 2.5 years of opensips development
PR: 244594
Submitted by: Talal Al Dik <tad@vif.com>
Approved by: euan@potensol.com (maintainer timeout)
Relnotes: https://opensips.org/pub/opensips/3.0.1/ChangeLog
https://www.opensips.org/About/Version-3-0-0
https://www.opensips.org/About/Version-2-4-x
https://www.opensips.org/About/Version-2-3-x
https://opensips.org/pub/opensips/2.2.7/ChangeLog
Notes:
svn path=/head/; revision=538829
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The Open Observatory of Network Interference (OONI) is a free software
project and a Global community measuring Internet censorship since 2012.
OONI's miniooni is a small command line client useful to test the
functionality without integrating with full features of OONI Probe CLI.
miniooni can use tunnels provided by Tor, if you like to. The use of regular
HTTP proxies is also possible.
WWW: https://ooni.org/about/
Sponsored by: The Tor Project
Sponsored by: TorBSD Diversity Project (TDP)
Notes:
svn path=/head/; revision=538823
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The Open Observatory of Network Interference (OONI) is a free software
project and a Global community measuring Internet censorship since 2012.
This port provides the next generation OONI Probe, a tool used for the
measurement of Internet censorship around the world.
WWW: https://ooni.org/about/
Notes:
svn path=/head/; revision=538821
|
|
|
|
|
|
|
|
|
|
|
| |
- Build more EFI images [1]
Changes: https://github.com/ipxe/ipxe/compare/bdf0e029ae8c9a0e173d5988ee64ff910538af53...9ee70fb95bc266885ff88be228b044a2bb226eeb
Submitted by: skozlov (based on) [1]
Differential Revision: https://reviews.freebsd.org/D25213
Notes:
svn path=/head/; revision=538683
|
|
|
|
| |
Notes:
svn path=/head/; revision=538668
|
|
|
|
| |
Notes:
svn path=/head/; revision=538649
|
|
|
|
|
|
|
| |
consumers have switched to a newer MPI provider.
Notes:
svn path=/head/; revision=538630
|
|
|
|
| |
Notes:
svn path=/head/; revision=538629
|
|
|
|
| |
Notes:
svn path=/head/; revision=538615
|
|
|
|
|
|
|
|
| |
ignoring 2.99 release, as it should get its proper dedicated port soon;
corosync3 will make it to 3.x just like that.
Notes:
svn path=/head/; revision=538604
|
|
|
|
| |
Notes:
svn path=/head/; revision=538599
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Instead of not installing the missing man page - use the one from the previous
version.
Changes include:
- Revert all the MANPAGEEXISTS-related changes from net/intel-{ixl,ix}-kmod
- Allow slave ports of net/intel-ixl-kmod to set their own MASTER_SITES
- Add previous version of intel-ix-kmod to it's DISTFILES
- Add pre-install target to intel-ixl-kmod to place the man page where
do-install expects to find it
Notes:
svn path=/head/; revision=538566
|
|
|
|
|
|
|
|
|
| |
- Enable OPUS option by default [1]
Suggested by: mr44er <mr44er@gmail.com>
Notes:
svn path=/head/; revision=538551
|
|
|
|
|
|
|
|
|
| |
- Enable OPUS option by default [1]
Suggested by: mr44er <mr44er@gmail.com>
Notes:
svn path=/head/; revision=538550
|
|
|
|
|
|
|
|
|
|
| |
upstream PR has languished long enough
Submitted by: Weitian Li <liweitianux@live.com>
Sponsored by: SkunkWerks, GmbH
Notes:
svn path=/head/; revision=538540
|
|
|
|
|
|
|
| |
Approved by: portmgr (tier-2 blanket)
Notes:
svn path=/head/; revision=538426
|
|
|
|
|
|
|
| |
Approved by: portmgr (tier-2 blanket)
Notes:
svn path=/head/; revision=538420
|
|
|
|
|
|
|
|
|
|
| |
- New version doesn't have a man page
- Builds fine with netmap on all the currently supported FreeBSD versions
Sponsored by: Intel
Notes:
svn path=/head/; revision=538399
|
|
|
|
|
|
|
|
|
|
|
| |
- Unbreak on 12.1 (no netmap headers, netmap should be off)
- Remove obsolete mentions of pre-11 FreeBSD versions
- Allow for a slave port to not have a man page
Sponsored by: Intel
Notes:
svn path=/head/; revision=538398
|
|
|
|
| |
Notes:
svn path=/head/; revision=538388
|
|
|
|
|
|
|
|
| |
Changes this release:
https://roy.marples.name/archives/dhcpcd-discuss/0003035.html
Notes:
svn path=/head/; revision=538387
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Apparently this hadn't been caught in my test matrix -- it seems that later
versions of FreeBSD have a getmntent() definition that masked this error.
mntent_compat.c has been adopted from devel/fam, though a better solution
should be sought out going into the future.
Approved by: koobs (mentor, implicit, just-fix-it)
MFH: 2020Q2 (blanket: build fix)
Notes:
svn path=/head/; revision=538329
|
|
|
|
| |
Notes:
svn path=/head/; revision=538308
|
|
|
|
|
|
|
| |
Reported by: portscout
Notes:
svn path=/head/; revision=538284
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
As published by our hostapd upstream
Vulnerability
General security vulnerability in the way the callback URLs in the UPnP
SUBSCRIBE command are used were reported (VU#339275, CVE-2020-12695).
Some of the described issues may be applicable to the use of UPnP in WPS
AP mode functionality for supporting external registrars.
Such issues could allow a device connected to the local network (i.e., a
device that has been authorized to transmit packets in the network in
which the AP is located) could trigger the AP to initiate a HTTP
(TCP/IP) connection to an arbitrary URL, including connections to
servers in external networks. This could have a security implication if
traffic from the local network to external destinations have different
rules (e.g., firewall and packet inspection) for different local hosts
and the AP having access to external hosts while the attacker controlled
local device not having such access. Such deployment cases may not be
common for networks where WPS would be enabled, but it is not possible
to completely rule out the applicability to cases where hostapd is used
to control a WPS enabled AP.
In addition to the more generic issues with the UPnP protocol, couple of
implementation specific issues in hostapd were discovered while
reviewing this area of the WPS implementation. These issues could allow
local devices (i.e., devices that have been authorized to transmit
packets in the network in which the AP is located) to trigger
misbehavior in hostapd and cause the process to either get terminated or
to start using more CPU resources by using a specially constructed
SUBSCRIBE command.
All these issues require the attacker to be able to discover the UPnP
service provided by hostapd and to open a TCP connection toward the IP
address of the AP. The former requires access to the local network to be
able to receive broadcast packets and the latter requires access to
initiate TCP/IP connection to the IP address used by the AP. In most
common AP deployment cases, both of these operations are available only
from the local network.
Vulnerable versions/configurations
All hostapd versions with WPS AP support with UPnP enabled in the build
parameters (CONFIG_WPS_UPNP=y) and in the runtime configuration
(upnp_iface).
Possible mitigation steps
- Disable WPS UPnP support in the hostapd runtime configuration by
removing the upnp_iface parameter.
- Merge the following commits to hostapd and rebuild:
For CVE-2020-12695:
WPS UPnP: Do not allow event subscriptions with URLs to other networks
For the other issues:
WPS UPnP: Fix event message generation using a long URL path
WPS UPnP: Handle HTTP initiation failures for events more properly
These patches are available from https://w1.fi/security/2020-1/
- Update to hostapd v2.10 or newer, once available
Obtained from: https://w1.fi/security/2020-1/
MFH: 2020Q2
Security: VU#339275 and CVE-2020-12695
Notes:
svn path=/head/; revision=538281
|
|
|
|
|
|
|
|
| |
PR: 247076
Submitted by: hiroo.ono+freebsd@gmail.com (maintainer)
Notes:
svn path=/head/; revision=538280
|
|
|
|
| |
Notes:
svn path=/head/; revision=538252
|
|
|
|
| |
Notes:
svn path=/head/; revision=538251
|