pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/news/flnews
Module Name: pkgsrc
Committed By: micha
Date: Mon Dec 16 12:27:53 UTC 2019
Modified Files:
pkgsrc/news/flnews: Makefile PLIST distinfo
pkgsrc/news/flnews/files: CONFIG
Removed Files:
pkgsrc/news/flnews/./patches: patch-mkconfig patch-src_bsd.c
patch-src_doc_templates_header.tex
Log Message:
news/flnews: Update to 0.17
Removed pkgsrc patches merged upstream.
Changelog
=========
0.17 Bugfix: Configuration test result for inttypes.h presence is used,
reintroduce the test removed for 0.16
Bugfix: BSD version of ntohl() for old systems was broken
Bugfix: ISO-2022-JP decoder: Mask for unassigned codepoints fixed
Bugfix: SHA2 support in OpenSSL 1.0.0 must be explicitly enabled
Display article from "news" type URI in separate window (if it's not
found in current group)
Clickable References added (articles displayed in separate window)
Search for Message-ID added to the Tools menu (Keyboard shortcut
is Ctrl-s)
Previous read article (in current group) menu entry added
Keyboard shortcut for "Quit" changed from Ctrl-x to Ctrl-q (Proposed
by Marcel Logen)
Keyboard shortcut for "View source" changed from Ctrl-v to Ctrl-e
(Proposed by Marcel Logen)
Menu entry "Article->Mark as unread" (Ctrl-u) changed to toggle
between read and unread state (Proposed by Marcel Logen)
Command line option "-4" added (force usage of IPv4 network protocol)
Flowed format: The 'flowed_insert_crlf' entry in configfile adds an
empty line separator after every paragraph that ends with an empty
line. Defaults to 0 (former behaviour)
Flowed format: The behaviour of 'flowed_insert_crlf' can be requested
by the sender of an article with "InsLine=yes" in the Content-Type
headerfield.
TLS module can now use OpenSSL 3 API (required for FFDHE group
negotiation with TLSv1.2 and TLSv1.3 protocols)
TLS module can now use LibreSSL 3 (formerly major version 2 was used
to identify LibreSSL and distinguish it from OpenSSL)
TLS modules compile time option 'CFG_USE_TLS_OWNCERTS' replaced by
the new 'tls_owncerts' entry in configfile
TLS modules experimental compile time option 'CFG_USE_TLS_CRLS'
replaced by normal option 'CFG_TLS_CRLS_DISABLE'. Default is to use
no CRLs (former behaviour) because this option increases the system
requirements (to POSIX.1-2001 or XSI extension)
TLS module now supports new 'crl_check' entry in configfile (ignored
if CFG_TLS_CRLS_DISABLE is nonzero)
TLS module now prints real LibreSSL version instead of generic 2.0.0
TLS module no longer supports options 'CFG_USE_TLS_DHPARAM_CHECK' and
'CFG_USE_TLS_SETSIGALG'. They were obsoleted by the OpenSSL 1.1 API
Unicode database updated to version 12.1.0
GUI module no longer supports experimental FLTK 1.3 option
'USE_X11_GLYPH_SUBSTITUTION'. It was obsoleted by FLTK 1.4
Modified LaTeX documentation to work with recent doxygen
To generate a diff of this commit:
cvs rdiff -u -r1.4 -r1.5 pkgsrc/news/flnews/Makefile
cvs rdiff -u -r1.2 -r1.3 pkgsrc/news/flnews/PLIST pkgsrc/news/flnews/distinfo
cvs rdiff -u -r1.1 -r0 pkgsrc/news/flnews/./patches/patch-mkconfig \
pkgsrc/news/flnews/./patches/patch-src_bsd.c \
pkgsrc/news/flnews/./patches/patch-src_doc_templates_header.tex
cvs rdiff -u -r1.2 -r1.3 pkgsrc/news/flnews/files/CONFIG
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/news/flnews/Makefile
diff -u pkgsrc/news/flnews/Makefile:1.4 pkgsrc/news/flnews/Makefile:1.5
--- pkgsrc/news/flnews/Makefile:1.4 Thu May 23 19:23:12 2019
+++ pkgsrc/news/flnews/Makefile Mon Dec 16 12:27:53 2019
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.4 2019/05/23 19:23:12 rillig Exp $
+# $NetBSD: Makefile,v 1.5 2019/12/16 12:27:53 micha Exp $
-FLNEWS_VERSION= 0.16
+FLNEWS_VERSION= 0.17
DISTNAME= flnews-${FLNEWS_VERSION}
CATEGORIES= news
@@ -9,7 +9,7 @@ MASTER_SITES+= http://www.ybtra.de/flnew
MASTER_SITES+= http://www.southcity.de/flnews/src/
EXTRACT_SUFX= .tar.bz2
-MAINTAINER= michael.baeuerle%gmx.net@localhost
+MAINTAINER= micha%NetBSD.org@localhost
HOMEPAGE= http://micha.freeshell.org/flnews/
COMMENT= Fast and lightweight USENET newsreader with GUI
LICENSE= modified-bsd AND 2-clause-bsd AND unicode
@@ -38,7 +38,7 @@ SUBST_SED.edit-config+= -e 's,@IP6@,${F
SUBST_SED.edit-config+= -e 's,@NLS@,${FLNEWS_OPT_DISABLE_NLS},g'
SUBST_SED.edit-config+= -e 's,@XDBE@,${FLNEWS_OPT_DISABLE_XDBE},g'
SUBST_SED.edit-config+= -e 's,@MAN_PATH@,${PREFIX}/${PKGMANDIR},g'
-# NetBSD reports X/Open XSI extension as not available using the POSIX
+# NetBSD 7 reports X/Open XSI extension as not available using the POSIX
# sysconf(_SC_XOPEN_VERSION) call, but has a sufficient implementation
# => Force using it
.if ${OPSYS} == "NetBSD"
@@ -46,7 +46,7 @@ SUBST_SED.edit-config+= -e 's,@FORCE_XS
.else
SUBST_SED.edit-config+= -e 's,@FORCE_XSI@,0,g'
.endif
-# NetBSD reports IPv6 as not available using the POSIX sysconf(_SC_IPV6)
+# NetBSD 7 reports IPv6 as not available using the POSIX sysconf(_SC_IPV6)
# call, but has a sufficient implementation
# => Force using it if inet6 option of pkgsrc package is selected
.if ${OPSYS} == "NetBSD" && ${FLNEWS_OPT_DISABLE_IP6} == 0
@@ -76,6 +76,7 @@ BUILDLINK_API_DEPENDS.zlib+= zlib>=1.2.3
# OpenSSL 1.1 API is required for signature algorithm negotiation
# OpenSSL 1.1 API is required for TLSv1.2 FFDHE group check
# At least OpenSSL 1.1.1 is required for TLSv1.3
+# OpenSSL 3 API is required for FFDHE group negotiation
BUILDLINK_API_DEPENDS.openssl+= openssl>=1.0.0
.include "../../security/openssl/buildlink3.mk"
# FLTK must be compiled with multithreading support
Index: pkgsrc/news/flnews/PLIST
diff -u pkgsrc/news/flnews/PLIST:1.2 pkgsrc/news/flnews/PLIST:1.3
--- pkgsrc/news/flnews/PLIST:1.2 Mon Jan 21 12:03:41 2019
+++ pkgsrc/news/flnews/PLIST Mon Dec 16 12:27:53 2019
@@ -1,5 +1,5 @@
-@comment $NetBSD: PLIST,v 1.2 2019/01/21 12:03:41 wiz Exp $
+@comment $NetBSD: PLIST,v 1.3 2019/12/16 12:27:53 micha Exp $
bin/flnews
+${PLIST.nls}lib/flnews/nls/de_DE.cat
man/man1/flnews.1
share/flnews/license.txt
-${PLIST.nls}lib/flnews/nls/de_DE.cat
Index: pkgsrc/news/flnews/distinfo
diff -u pkgsrc/news/flnews/distinfo:1.2 pkgsrc/news/flnews/distinfo:1.3
--- pkgsrc/news/flnews/distinfo:1.2 Mon Jan 21 12:03:41 2019
+++ pkgsrc/news/flnews/distinfo Mon Dec 16 12:27:53 2019
@@ -1,9 +1,6 @@
-$NetBSD: distinfo,v 1.2 2019/01/21 12:03:41 wiz Exp $
+$NetBSD: distinfo,v 1.3 2019/12/16 12:27:53 micha Exp $
-SHA1 (flnews-0.16.tar.bz2) = efa5ab06d18fe4993551c623aca3a6e61b8ec20e
-RMD160 (flnews-0.16.tar.bz2) = 25ace0387584fa253c065aeeeb946ffc4773c9b7
-SHA512 (flnews-0.16.tar.bz2) = d68615b38d4e4770ea3e404082943ac8efbc8aa6b0075ae437a5806e330e7f2ae987c00c321857b926bfe0007f59e329f1bd38b69e017b1495cd8fedbf316e5c
-Size (flnews-0.16.tar.bz2) = 1068677 bytes
-SHA1 (patch-mkconfig) = 3121cec3b8f01e71989de3f7d2092f71b6f737ba
-SHA1 (patch-src_bsd.c) = 0298c6e17d2e5f7498b6f15546a089f5a44ea70c
-SHA1 (patch-src_doc_templates_header.tex) = f9de1452f48c5e120ca6e9b96ee51f3dbfe99f86
+SHA1 (flnews-0.17.tar.bz2) = b2b678d23f10c44c2e6c36fa5f194df757c6d744
+RMD160 (flnews-0.17.tar.bz2) = d50455fdaeae37978b54485d4c4b3acacf7747f4
+SHA512 (flnews-0.17.tar.bz2) = 007a8a38ebac81e467e5709fdcede9e45462f0dd05416b867a5a24a05acd186d8a682f53ee202925dbaffa99838b6461af3016c8d8ab001fe122087b7f63cc22
+Size (flnews-0.17.tar.bz2) = 1073850 bytes
Index: pkgsrc/news/flnews/files/CONFIG
diff -u pkgsrc/news/flnews/files/CONFIG:1.2 pkgsrc/news/flnews/files/CONFIG:1.3
--- pkgsrc/news/flnews/files/CONFIG:1.2 Mon Jan 21 12:03:41 2019
+++ pkgsrc/news/flnews/files/CONFIG Mon Dec 16 12:27:53 2019
@@ -40,6 +40,14 @@ CFG_NLS_DISABLE=@NLS@
# that underlaying libraries contain known security vulnerabilities
# Set this to 1 if you don't want to get such warnings
CFG_TLS_WARNING_DISABLE=1
+
+# The TLS module can use CRLs to check for revoked X.509 certificates
+# Usage and update interval can be configured via configfile (see manual page)
+# CRLs are downloaded automatically and must be available via HTTP protocol
+# (CRL distribution point entries in certificates)
+# Note: Not all CAs provide CRL distribution points in their certificates
+# Set this to 0 to check the whole chain for revoked certificates
+CFG_TLS_CRLS_DISABLE=0
# ==============================================================================
Home |
Main Index |
Thread Index |
Old Index