summaryrefslogtreecommitdiff
path: root/devel/cvsd
AgeCommit message (Collapse)AuthorFilesLines
2016-07-09Bump PKGREVISION for perl-5.24.0 for everything mentioning perl.wiz1-2/+2
2015-11-03Add SHA512 digests for distfiles for devel categoryagc1-1/+2
Issues found with existing distfiles: distfiles/eclipse-sourceBuild-srcIncluded-3.0.1.zip distfiles/fortran-utils-1.1.tar.gz distfiles/ivykis-0.39.tar.gz distfiles/enum-1.11.tar.gz distfiles/pvs-3.2-libraries.tgz distfiles/pvs-3.2-linux.tgz distfiles/pvs-3.2-solaris.tgz distfiles/pvs-3.2-system.tgz No changes made to these distinfo files. Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2015-06-12Recursive PKGREVISION bump for all packages mentioning 'perl',wiz1-2/+2
having a PKGNAME of p5-*, or depending such a package, for perl-5.22.0.
2014-05-29Bump for perl-5.20.0.wiz1-2/+2
Do it for all packages that * mention perl, or * have a directory name starting with p5-*, or * depend on a package starting with p5- like last time, for 5.18, where this didn't lead to complaints. Let me know if you have any this time.
2014-03-17Depend on ../../devel/scmcvs on systems where cvs is not in the "base".schnoebe1-2/+6
2014-03-11Remove example rc.d scripts from PLISTs.jperkin1-2/+1
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or ignored otherwise.
2013-07-12Bump PKGREVISION of all packages which create users, to pick up change ofjperkin1-2/+2
sysutils/user_* packages.
2013-05-31Bump all packages for perl-5.18, thatwiz1-2/+2
a) refer 'perl' in their Makefile, or b) have a directory name of p5-*, or c) have any dependency on any p5-* package Like last time, where this caused no complaints.
2012-10-31Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2012-10-03Bump all packages that use perl, or depend on a p5-* package, orwiz1-1/+2
are called p5-*. I hope that's all of them.
2012-05-18Update to 1.0.23:schnoebe4-60/+6
changes from 1.0.22 to 1.0.23 ----------------------------- * have cvsd-buildroot look in all multiarch subdirectories of /lib for NSS libraries * portability improvement by Eric Schnoebelen * Debian packaging updates
2011-10-03Bring cvsd up to date as 1.0.22.schnoebe7-24/+56
Changelog: 2011-06-13 release 1.0.22 of cvsd changes since 1.0.21: + don't log EINTR on select() any more, not even in debug mode + fix for cvsd-buildroot to also work on multiarch setups + log address and port with bind() failures + Debian packaging updates 2010-09-08 release 1.0.21 of cvsd changes since 1.0.20: + handle failure to bind() as a fatal error now 2010-09-05 release 1.0.20 of cvsd changes since 1.0.19: + correctly listen on IPv4 and IPv6 addresses with recent Glibc versions by not depending on the order of address records returned by getaddrinfo() and work regardless of net.ipv6.bindv6only sysctl 2010-08-17 release 1.0.19 of cvsd changes since 1.0.18: + cvsd-buildroot: ignore commented out lines in CVSROOT/passwd files + cvsd-buildroot: set an umask for generated files + some documentation updates + change init script dependency on $remote_fs (for /usr) from Should to Required (thanks lintian) + Debian packaging improvements 2010-01-14 release 1.0.18 of cvsd changes since 1.0.17: + use simpler shell semantics in cvsd-buildroot to fix a problem with bash 4 + fix call to uname in the cvsd-buginfo script 2009-12-30 release 1.0.17 of cvsd changes since 1.0.16: + update to automake 1.11 + some small spelling fixes in documentation + changed references to home page and contact email addresses to use arthurdejong.org + Debian packaging improvements
2009-11-19Update to 1.0.16, correct MASTER_SITE and HOMEPAGE,schnoebe3-18/+26
add LICENSE, and PKG_DESTDIR_SUPPORT.
2009-06-14Remove @dirrm entries from PLISTsjoerg1-3/+1
2007-07-04Make it easier to build and install packages "unprivileged", wherejlam1-1/+3
the owner of all installed files is a non-root user. This change affects most packages that require special users or groups by making them use the specified unprivileged user and group instead. (1) Add two new variables PKG_GROUPS_VARS and PKG_USERS_VARS to unprivileged.mk. These two variables are lists of other bmake variables that define package-specific users and groups. Packages that have user-settable variables for users and groups, e.g. apache and APACHE_{USER,GROUP}, courier-mta and COURIER_{USER,GROUP}, etc., should list these variables in PKG_USERS_VARS and PKG_GROUPS_VARS so that unprivileged.mk can know to set them to ${UNPRIVILEGED_USER} and ${UNPRIVILEGED_GROUP}. (2) Modify packages to use PKG_GROUPS_VARS and PKG_USERS_VARS.
2007-02-17Add "scm" to CATEGORIES to make it easy to find source control managementwiz1-2/+2
related packages.
2006-09-06Update to 1.0.13, provided by Martin Wilke in PR 34475:wiz2-6/+6
* cvsd-buildroot: further portability improvements on 64 bit platforms * added Portuguese debconf translation by Ricardo Silva * added warnings and errors on failing to close a socket
2006-06-11Update to 1.0.12:wiz2-6/+6
changes from 1.0.11 to 1.0.12 ----------------------------- * fixes in cvsd-buildroot to not abort on failure of some commands
2006-05-30Update to 1.0.11:wiz6-30/+49
changes from 1.0.10 to 1.0.11 ----------------------------- * cvsd-buildroot should now install libraries in the same directory structure as on the normal filesystem, resulting in better support for 64 bit systems * other small improvements to cvsd-buildroot, including better error handling and not overwriting devices * small code improvements
2006-05-20Initial import of cvsd, a cvs pserver wrapper that chroots the pserver.wiz10-0/+191
Based on the work by Eric Schnoebelen and virtus@ in pkgsrc-wip. DESCR: cvsd is a wrapper program for cvs in pserver mode. It will run 'cvs pserver' under a special uid/gid in a chroot jail. cvsd is run as a daemon and is controlled through a configuration file. It is relatively easy to configure and tools are provided for easily setting up a rootjail. This server can be useful if you want to run a public cvs pserver. You should however be aware of the security limitations of running a cvs pserver. If you want any kind of authentication you should really consider using secure shell as a secure authentication mechanism and transport. Passwords used in cvs pserver are transmitted in plaintext and this wrapper won't change that. This server adds a layer of security to cvs. cvs is a very powerful tool and is capable of running scripts and other things. By running cvs in a rootjail it is possible to limit the amount of "damage" cvs can do if it is exploited. It is generally a good idea to run cvsd without any write permissions to any directory on the system.