Commit graph

6173 commits

Author SHA1 Message Date
Muhammad Moinur Rahman
0ddbe884d6 UNBREAK some ports with php80
- Pet portclippy/portfmt

Approved by:	portmgr (blanket infrastructure)
Sponsored by:	Bounce Experts
2022-01-25 10:34:17 -06:00
Jaap Akkerhuis
6eb036d0d6
dns/unbound: Fix the aaaa-filter-iterator.patch
PR:		260553
Reported by:	tech-lists@zyxst.net
2022-01-25 21:12:42 +08:00
Ralf van der Enden
3eaa26afbd dns/powerdns: Update to 4.5.3
Changelog:	https://blog.powerdns.com/2022/01/21/powerdns-authoritative-server-4-5-3/

PR:		261423
2022-01-24 15:56:35 -05:00
Ralf van der Enden
04a3a75163 dns/dnsdist: Update to 1.7.0
Changelog:	https://blog.powerdns.com/2022/01/17/dnsdist-1-7-0-released/

PR:		261421
2022-01-24 15:56:10 -05:00
Po-Chuan Hsieh
31f1e051bd
dns/rubygem-google-apis-dns_v1: Update to 0.17.0
Changes:	https://github.com/googleapis/google-api-ruby-client/blob/main/generated/google-apis-dns_v1/CHANGELOG.md
2022-01-24 03:09:30 +08:00
Po-Chuan Hsieh
589b55c7eb
dns/py-dns-lexicon: Update to 3.9.0
Changes:	https://github.com/AnalogJ/lexicon/releases
2022-01-24 02:47:24 +08:00
Po-Chuan Hsieh
9830944546
dns/p5-Mozilla-PublicSuffix: Update to 1.0.6
Changes:	https://metacpan.org/dist/Mozilla-PublicSuffix/changes
2022-01-24 02:18:29 +08:00
Yuri Victorovich
7029bf7119 dns/coredns: Update 1.8.6 -> 1.8.7
Reported by:	portscout
2022-01-20 09:46:40 -08:00
Muhammad Moinur Rahman
4c9c8b01f4 dns/py-dnspython2: Update version 2.1.0=>2.2.0
Relnotes: https://www.dnspython.org/news/2.2.0/
2022-01-19 16:48:27 -06:00
Daniel Engberg
05da06fe8b dns/bundy: Deprecate and set expiration date to 2022-03-31
Project is in hibernation and not recommended to use in production.
It also fails on multiple platforms and on FreeBSD 14

PR:		260659
Reviewed by:	mat@ (maintainer)
2022-01-19 11:37:44 +01:00
Yasuhiro Kimura
7fc16dab84 dns/py-dnspython: Update to 2.1.0 for Python 3
While updating this port to 2.1.0 fixes runtime error "AttributeError:
module 'base64' has no attribute 'decodestring'" with python 3.9 or
later, it isn't compatible with Python 2.7. So update to 2.1.0 only
for Python 3.

ChangeLog:	https://github.com/rthalley/dnspython/blob/v2.1.0/doc/whatsnew.rst
PR:		260475
Approved by:	maintainer timeout (> 1 month)
2022-01-19 15:36:06 +09:00
Yuri Victorovich
30ce7c4f37 dns/amass: Update 3.15.2 -> 3.16.0
Reported by:	portscout
2022-01-18 10:42:43 -08:00
Mikael Urankar
c7dd5ca11a *: Linux emulation: add support for aarch64
PR:		256008
Submitted by:	Vincent Milum Jr (prior version)
Approved by:	emulation (maintainer timeout)
2022-01-17 15:47:28 +01:00
Tobias Kortkamp
835bd57330
lang/rust: Bump revisions after 1.58.0 2022-01-17 12:57:45 +01:00
Tobias C. Berner
564e629303 KDE: Update KDE Frameworks to 5.90
Saturday, 8 January 2022

KDE today announces the release of KDE Frameworks 5.90.0.

KDE Frameworks are 83 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well
tested libraries with friendly licensing terms. For an introduction see
the KDE Frameworks release announcement.

This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.

Full changelog:
	https://kde.org/announcements/frameworks/5/5.90.0/

Exp-run by:	antoine
PR:		261029
2022-01-13 07:21:22 +01:00
Leo Vandewoestijne
4ee1ab77d1 dns/knot-resolver: Update to 5.4.4
Changelog:	https://www.knot-resolver.cz/2022-01-05-knot-resolver-5.4.4.html

PR:		261087
2022-01-12 06:41:47 -05:00
Po-Chuan Hsieh
7a47b91e1e
dns/py-publicsuffixlist: Update to 0.7.11
Changes:	https://github.com/ko-zu/psl/commits/master
2022-01-12 02:44:36 +08:00
Po-Chuan Hsieh
317c605005
dns/p5-Net-DNS: Update to 1.33
Changes:	https://metacpan.org/dist/Net-DNS/changes
2022-01-12 02:44:11 +08:00
Po-Chuan Hsieh
25844d1255
dns/public_suffix_list: Update to 20211231
- Bump PORTREVISION of dependent ports for package change

Changes:	https://github.com/publicsuffix/list/commits/master
2022-01-12 02:44:00 +08:00
Muhammad Moinur Rahman
66a1aa9082 Mark ports to IGNORE with new php81
Approved by:	portmgr (infrastructure blanket)
Sponsored by:	Bounce Experts
2022-01-10 12:33:12 -06:00
Muhammad Moinur Rahman
80f7a0af11 Mark ports to IGNORE with new php81
- Mark some additional ports to IGNORE with the upcoming php DEFAULT
  php80 [1]

PR: 260595 [1]
Reported by: portmgr (exp-run) [1]
Approved by: portmgr (infrastructure blanket)
Sponsored by:	Bounce Experts
2022-01-10 12:23:24 -06:00
Stefan Eßer
bcaf25a8c8 Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.

This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.

Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port
cannot conflict with itself (due to logic in bsd.port.mk that
supresses the pattern match result in that case).

A few ports that set the conflicts variables depending on complex
conditions (e.g. port options), have been left unmodified, despite
probably containing outdated package names.

These changes should only affect the installation of locally built
ports, not the package building with poudriere. They should give an
early indication of the install conflict in cases where currently
the pkg command aborts an installation when it detects that an
existing file would be overwritten,

Approved by:	portmgr (implicit)
2022-01-10 16:15:39 +01:00
Rene Ladan
fcceccb7d4 dns/bind911: restore port
It is still in extended security mode, see
https://www.isc.org/blogs/bind-update-summer2021/

Reported by:	yasu
2022-01-01 14:49:17 +01:00
Rene Ladan
75b955057c cleanup: Remove expired ports:
2021-10-31 devel/sdl_sge: Upstream no longer maintained
2021-12-31 net/appkonference: Outdated, depends on unsupported version of net/asterisk
2021-12-31 dns/bind911: End of life, please migrate to a newer version of BIND9
2021-12-31 net/zebra: Abandoned upstream, last release in 2005. Consider migrating to net/frr7 or net/bird2
2021-12-31 audio/osalp: Abandoned upstream, listed as beta and no new release since 2008
2021-12-31 games/stransball2: Depends on expired devel/sdl_sge
2021-12-31 devel/rubygem-ruby-sdl-ffi: Depends on expired devel/sdl_sge
2021-12-31 devel/rubygem-rubygame: Depends on expired devel/sdl_sge
2021-12-31 devel/ruby-sdl: Depends on expired devel/sdl_sge
2021-12-31 games/magicmaze: Depends on expired devel/sdl_sge
2021-12-31 games/trophy: Depends on expired devel/clanlib1
2021-12-31 devel/clanlib1: Older than expired and removed devel/clanlib
2021-12-31 www/py-django31: Upgrade to Django 3.2+. Mainstream support ended (April 6, 2021). Extended support ends December 2021. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-prometheus: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 databases/postgis24: Deprecated in favour of databases/postgis3x
2021-12-31 net-im/ekiga: Last release in 2013, not actively maintained
2021-12-31 sysutils/sample: abandoned upstream, incompatible with newer kernels
2021-12-31 www/mediawiki131: Upstream EOL
2021-12-31 www/py-dj31-django-mptt: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 net/py-flask-xml-rpc: No longer maintained upstream
2021-12-31 audio/libaacplus: Abandoned upstream, no new release since 2011
2021-12-31 security/obfsclient: https://github.com/Yawning/obfsclient/issues/37
2021-12-31 devel/eric6: Uses EOL Python 2.7 via www/py-qt5-webengine
2021-12-31 www/grafana: No longer maintained upstream, use www/grafana8
2021-12-31 www/py-dj31-django-auth-ldap: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-filter: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-drf-yasg: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-js-asset: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-timezone-field: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-tables2: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-taggit: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 graphics/librasterlite: Deprecated in favour of graphics/librasterlite2
2021-12-31 www/py-dj31-django-cacheops: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 net-mgmt/p0f2: newer version available in net-mgmt/p0f
2021-12-31 devel/libhash: Abandoned upstream
2021-12-31 www/py-dj31-django-debug-toolbar: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 www/py-dj31-django-cors-headers: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 audio/flake: Abandoned upstream, no new release since 2007
2021-12-31 audio/ifp-line: Abandoned upstream, no new release since 2005
2021-12-31 audio/libnjb: Abandoned upstream, no new release since 2011
2021-12-31 audio/lpac: Abandoned upstream in 2003
2021-12-31 multimedia/mmsclient: Abandoned upstream, Microsoft deprecated MMS in 2003
2021-12-31 www/plugger: Uses incompatible plugin interface NPAPI
2021-12-31 audio/mpiosh: Abandoned upstream, no new release since 2004
2021-12-31 audio/rplay: Abandoned upstream, no new releases since 1999
2021-12-31 audio/celt: Deprecated and considered obsolete by upstream in 2016 in favour of (lib)opus
2021-12-31 security/nacl: Unmaintained by upstream, use libsodium instead
2021-12-31 net-mgmt/unifi-poller: Now called unpoller by upstream
2021-12-31 lang/nml: Abandoned upstream, last release 2004-04-19
2021-12-31 audio/mp32ogg: Abandoned upstream and unfetchable from upstream
2021-12-31 net/libstorj: Deprecated in favour of net/storj due to v3 rearchitecture
2021-12-31 devel/yasm-devel: No need to keep the -devel version due to upstream inactivity
2021-12-31 www/py-dj31-django-redis: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 devel/py-dj31-django-rq: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 graphics/libreatlas: Abandoned upstream, no new release since 2012
2021-12-31 www/py-dj31-djangorestframework: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
2021-12-31 14:40:03 +01:00
Leo Vandewoestijne
772adafbe8 dns/knot3: Update to 3.1.5
Changelog:	https://www.knot-dns.cz/2021-12-20-version-315.html

PR:		260799
2021-12-29 17:08:57 -05:00
Leo Vandewoestijne
9e77598933 dns/yadifa: Update to 2.5.3
Changelog:	https://www.yadifa.eu/sites/default/files/README_2.5.3.txt

PR:		260798
2021-12-29 17:08:42 -05:00
Leo Vandewoestijne
9fae4c08c9 dns/knot-resolver: Update to 5.4.3
Changelog:	https://www.knot-resolver.cz/2021-12-01-knot-resolver-5.4.3.html

PR:		260800
2021-12-29 17:08:11 -05:00
Yuri Victorovich
d315149ca6 dns/knock: Update 5.1.0 -> 5.2.0
Reported by:	portscout
2021-12-23 17:54:57 -08:00
Yuri Victorovich
2387d8a9b5 dns/doggo: Update 0.4.1 -> 0.5.0
Reported by:	portscout
2021-12-23 17:54:57 -08:00
Po-Chuan Hsieh
ec3b5bc43b
dns/public_suffix_list: Update to 20211126
- Bump PORTREVISION of dependent ports for package change

Changes:	https://github.com/publicsuffix/list/commits/master
2021-12-22 02:46:24 +08:00
Bernhard Froehlich
2230392ed1
dns/dnscontrol: Update to 3.13.1 2021-12-21 15:39:25 +00:00
Ralf van der Enden
ceee7b4130 dns/powerdns-recursor: Update to 4.6.0
PR:		260587
2021-12-21 16:31:59 +08:00
Jaap Akkerhuis
da0e34f5fd dns/py-ldns: Fix pkg-plist after dns/ldns updating
PR:		260545
2021-12-19 23:53:51 +08:00
Jaap Akkerhuis
f140323487 dns/ldns: Update to 1.8.1
https://www.nlnetlabs.nl/news/2021/Dec/03/ldns-1.8.1-released/

PR:		260345
2021-12-19 01:28:26 +08:00
Tobias C. Berner
473996fc57 KDE: Update KDE Frameworks to 5.89.0
Saturday, 11 December 2021

KDE today announces the release of KDE Frameworks 5.89.0.

KDE Frameworks are 83 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well
tested libraries with friendly licensing terms. For an introduction see
the KDE Frameworks release announcement.

This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.

Announcment:
	https://kde.org/announcements/frameworks/5/5.89.0/

PR:		260361
Exp-run by:	antoine
2021-12-16 18:27:16 +01:00
Mathieu Arnold
925b730fbf
dns/bind916: fix runnaway memory leak
Obtained from:	https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/5626
2021-12-15 17:00:32 +01:00
Mathieu Arnold
0090b81b1f
dns/bind916: update to 9.16.24 2021-12-15 16:30:01 +01:00
Jaap Akkerhuis
44b94ee62b dns/nsd: Update to 4.3.9
Changes: https://www.nlnetlabs.nl/news/2021/Dec/09/nsd-4.3.9-released/

PR:	260362
2021-12-14 19:45:51 -08:00
Jaap Akkerhuis
0d90eb7850 dns/unbound: Update to 1.14.0
Changelog:

This release contains bug fixes and a full set of RPZ triggers and
actions that are supported. This works with RPZ zones, configured with
`rpz:`.

It is possible to selectively enable use of TCP for stub zones and
forward zones, without having enable it server wide, by enabling it
with the `stub-tcp-upstream: yes` and `forward-tcp-upstream: yes` options.

The added contrib/Dockerfile.tests from ziollek can be used to setup
a Docker environment to run tests in. The documentation is in the
doc/README.tests file.

If openssl it installed with different versions, you can set the
location as `--with-ssl=/usr/include/openssl11` and it then detects the
use of the lib dir split off in /usr/lib64/openssl11 with regex. This is
useful if to pass to configure if openssl is installed in such a manner.

The option `outbound-msg-retry` can be used to select the number of
retries when a non-positive response is received. It is best left at
default, but when the upstream is known to not need retries, it can be
lowered, because in that case the upstream is performing the retry for
non-positive responses.

The domain `home.arpa.` is set by default as blocked, as per RFC8375. If
you want to use it, unblock it with a local-zone nodefault statement, or
use another type of local-zone to override it with your choice.

In the config it is possible to enter IPv6 scope-id values with
interface names, instead of a number, for link-local addresses.

Features
- Merge #401: RPZ triggers. This add additional RPZ triggers,
  unbound supports a full set of rpz triggers, and this now
  includes nsdname, nsip and clientip triggers. Also actions
  are fully supported, and this now includes the tcp-only action.
- Merge #519: Support for selective enabling tcp-upstream for
  stub/forward zones.
- Merge PR #514, from ziollek: Docker environment for run tests.
- Support using system-wide crypto policies.
- Fix that --with-ssl can use "/usr/include/openssl11" to pass the
  location of a different openssl version.
- Merged #41 from Moritz Schneider: made outbound-msg-retry
  configurable.
- Implement RFC8375: Special-Use Domain 'home.arpa.'.
- Merge PR #555 from fobser: Allow interface names as scope-id in IPv6
  link-local addresses.

Bug Fixes
- Add test tool readzone to .gitignore.
- Merge #521: Update mini_event.c.
- Merge #523: fix: free() call more than once with the same pointer.
- For #519: note stub-tcp-upstream and forward-tcp-upstream in
  the example configuration file.
- For #519: yacc and lex. And fix python bindings, and test program
  unbound-dnstap-socket.
- For #519: fix comments for doxygen.
- Fix to print error from unbound-anchor for writing to the key
  file, also when not verbose.
- For #514: generate configure.
- Fix for #431: Squelch permission denied errors for udp connect,
  and udp send, they are visible at higher verbosity settings.
- Fix zonemd verification of key that is not in DNS but in the zone
  and needs a chain of trust.
- zonemd, fix order of bogus printout string manipulation.
- Fix to support harden-algo-downgrade for ZONEMD dnssec checks.
- Merge PR #528 from fobser: Make sldns_str2wire_svcparam_buf()
  static.
- Fix #527: not sending quad9 cert to syslog (and may be more).
- Fix sed script in ssldir split handling.
- Fix #529: Fix: log_assert does nothing if UNBOUND_DEBUG is
  undefined.
- Fix #531: Fix: passed to proc after free.
- Fix #536: error: RPZ: name of record (drop.spamhaus.org.rpz.local.)
  to insert into RPZ.
- Fix the stream wait stream_wait_count_lock and http2 buffer locks
  setup and desetup from race condition.
- Fix RPZ locks. Do not unlock zones lock if requested and rpz find
  zone does not find the zone. Readlock the clientip that is found
  for ipbased triggers. Unlock the nsdname zone lock when done.
  Unlock zone and ip in rpz nsip and nsdname callback. Unlock
  authzone and localzone if clientip found in rpz worker call.
- Fix compile warning in libunbound for listen desetup routine.
- Fix asynclook unit test for setup of lockchecks before log.
- Fix #533: Negative responses get cached even when setting
  cache-max-negative-ttl: 1
- Fix tcp fastopen failure when disabled, try normal connect instead.
- Fix #538: Fix subnetcache statistics.
- Small fixes for #41: changelog, conflicts resolved,
  processQueryResponse takes an iterator env argument like other
  functions in the iterator, no colon in string for set_option,
  and some whitespace style, to make it similar to the rest.
- Fix for #41: change outbound retry to int to fix signed comparison
  warnings.
- Fix root_anchor test to check with new icannbundle date.
- Fix initialisation errors reported by gcc sanitizer.
- Fix lock debug code for gcc sanitizer reports.
- Fix more initialisation errors reported by gcc sanitizer.
- Fix crosscompile on windows to work with openssl 3.0.0 the
  link with ws2_32 needs -l:libssp.a for __strcpy_chk.
  Also copy results from lib64 directory if needed.
- For crosscompile on windows, detect 64bit stackprotector library.
- Fix crosscompile shell syntax.
- Fix crosscompile windows to use libssp when it exists.
- For the windows compile script disable gost.
- Fix that on windows, use BIO_set_callback_ex instead of deprecated
  BIO_set_callback.
- Fix crosscompile script for the shared build flags.
- Fix to add example.conf note for outbound-msg-retry.
- Fix chaos replies to have truncation for short message lengths,
  or long reply strings.
- Fix to protect custom regional create against small values.
- Fix #552: Unbound assumes index.html exists on RPZ host.
- Fix that forward-zone name is documented as the full name of the
  zone. It is not relative but a fully qualified domain name.
- Fix analyzer review failure in rpz action override code to not
  crash on unlocking the local zone lock.
- Fix to remove unused code from rpz resolve client and action
  function.
- Merge #565: unbound.service.in: Disable ProtectKernelTunables again.
- Fix for #558: fix loop in comm_point->tcp_free when a comm_point is
  reclaimed more than once during callbacks.
- Fix for #558: clear the UB_EV_TIMEOUT bit before adding an event.
- Improve EDNS option handling, now also works for synthesised
  responses such as local-data and server.id CH TXT responses.
- Merge PR #570 from rex4539: Fix typos.
- Fix for #570: regen aclocal.m4, fix configure.ac for spelling.
- Fix to make python module opt_list use opt_list_in.
- Fix #574: unbound-checkconf reports fatal error if interface names
  are used as value for interfaces:
- Fix #574: Review fixes for it.
- Fix #576: [FR] UB_* error codes in unbound.h
- Fix #574: Review fix for spelling.
- Fix to remove git tracking and ci information from release tarballs.
- iana portlist update.
- Merge PR #511 from yan12125: Reduce unnecessary linking.
- Merge PR #493 from Jaap: Fix generation of libunbound.pc.
- Merge PR #562 from Willem: Reset keepalive per new tcp session.
- Merge PR #522 from sibeream: memory management violations fixed.
- Merge PR #530 from Shchelk: Fix: dereferencing a null pointer.
- Fix #454: listen_dnsport.c:825: error: ‘IPV6_TCLASS’ undeclared.
- Fix #574: Review fixes for size allocation.
- Fix doc/unbound.doxygen to remove obsolete tag warning.

PR:		260360, 260417
Reported by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>
2021-12-14 13:06:00 -08:00
Matthias Andree
f727ae28aa dns/dnsmasq: pull in three more upstream fixes
Cherry-pick these Git commits from the upstream:

--local should behave as --server, not as --address [...]
Fix confusion in DNS retries and --strict-order.
Fix confusion with log-IDs and DNS retries.

loosely prompted by Olivier's
PR:		260331
2021-12-11 10:51:28 +01:00
Olivier Cochard
1f05895ca0 dns/dnsmasq: fix error "config error is REFUSED (EDE: not ready)"
Fix --address=/#/...... which was lost in 2.86

ML message:
https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg15508.html

Git commit:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=26bbf5a314d833beaf0f147d24409969f05f3dba

PR:		260331
Obtained from:	Simon Kelley (upstream maintainer)
2021-12-11 10:51:28 +01:00
Yuri Victorovich
7f621368ad dns/amass: Update 3.15.0 -> 3.15.2
Reported by:	portscout
2021-12-08 01:21:20 -08:00
Tobias Kortkamp
5a7f23c69d
lang/rust: Rebuild consumers for Rust 1.57.0 2021-12-05 13:35:42 +01:00
Bernhard Froehlich
9b59940def
dns/dnscontrol: Update to 3.13.0 2021-12-04 12:43:02 +00:00
Oleksii Samorukov
90f36518ee dns/inadyn: upgrade to 2.9.0
Changelog:	https://github.com/troglobit/inadyn/blob/master/ChangeLog.md
2021-11-29 06:46:50 +00:00
Stefan Eßer
04b9da4140 */*: Remove redundant '-*' from CONFLICTS definitions
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Approved by: portmgr (blanket)
2021-11-25 22:40:11 +01:00
Leo Vandewoestijne
e04c4f2bb7 dns/dnsjit: Update to 1.2.2
Changelog:	https://github.com/DNS-OARC/dnsjit/releases/tag/v1.2.2

PR:		259984
2021-11-25 02:03:49 -05:00
Stefan Eßer
5933ac0b09 */*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Approved by: portmgr (blanket)
2021-11-23 23:11:40 +01:00
Po-Chuan Hsieh
96771b502b
dns/rubygem-google-apis-dns_v1: Update to 0.16.0
Changes:	https://github.com/googleapis/google-api-ruby-client/blob/main/generated/google-apis-dns_v1/CHANGELOG.md
2021-11-22 02:22:28 +08:00
Po-Chuan Hsieh
cc77035437
dns/py-dns-lexicon: Update to 3.8.3
Changes:	https://github.com/AnalogJ/lexicon/releases
2021-11-22 02:20:27 +08:00