Age | Commit message (Collapse) | Author | Files | Lines |
|
Bump PKGREVISION.
Necessary since libfilezilla is static on at least some platforms,
like NetBSD.
|
|
In particular, this fixes ftp mode.
Investigated with upstream by richard@, thank you very much!
Bump PKGREVISION.
|
|
2016-07-11 Hajimu UMEMOTO <ume@mahoroba.org>
* Socket6.pm: Bump version number to 0.28.
* aclocal.m4 (IPv6_CHECK_INET_NTOP): inet_ntop(3) may returns
IPv4-compatible IPv6 address. [cpan #113950]
Submitted by: Andrew Galante <spock128 [...] gmail.com>
|
|
- Added following packages on BUILD_DEPENDS for make test
p5-DateTime-Format-DateParse-[0-9]*:../../time/p5-DateTime-Format-DateParse
p5-DateTime-[0-9]*:../../time/p5-DateTime
p5-CGI-[0-9]*:../../www/p5-CGI
(upstream)
- Updated net/p5-RT-Client-REST to 0.50
---------------------------------------
0.50 Fri Dec 11 2015 "Sarvesh Das" <sarveshd@opmbx.org>
- Added the 'disabled' attribute to RT::Client::REST::Group and
RT::Client::REST::Queue to match the addition in RT 4.2.2 --
commit 7557633. Thanks Tom.
- Allow a trailing forward slash in the server URI --
RT#97621. Thanks Marco Pessotto.
- Tests in 82-stringify.t are skipped with LWP::UserAgent 6.04
which has buggy read timeout -- commit da577af. Thanks Marco
Pessotto.
- Fixed warning `Unescaped left brace in regex is deprecated'
in perl 5.22 -- RT#106795. Thanks Mike Andrews.
- Fixed documentation for RT::Client:REST::search() in POD --
RT#98160.
- Removed MYMETA* files from distribution -- RT#108083
|
|
3.19.0 (2016-06-27)
+ Building FileZilla now depends on libfilezilla >= 0.5.3 (https://lib.filezilla-project.org/).
- Fixed context menu in search dialog if not connected to server
- OS X, *nix: Fix displayed text in file list status bar if selecting a single item in the file list out of multiple already selected items
3.19.0-rc1 (2016-06-20)
+ In the Site Manager a background colour for sites can now be selected
+ Open tabs can be re-arranged using drag&drop
- Fixed copying URLs of multiple selected files to clipboard
- Setting remote file timestamps did not take timezone offsets configured through the Site Manager into account
3.18.0 (2016-05-27)
- Small fixes to local file search
- Fixed a regression introduced in 3.18.0-rc1 when formatting hostnames for display
3.18.0-rc1 (2016-05-20)
+ The search functionality can now also be used to search local files
+ Reduced CPU consumption of adding files to the list of search results
+ Opening the remote context menu while holding shift allows copying URLs to clipboard that include the password
+ Added an option to the configuration file through which initiating drag&drop can be disallowed
+ Reduced memory footprint of some data structures
+ Building FileZilla now depends on libfilezilla >= 0.5.2 (https://lib.filezilla-project.org/).
- The remote file list context menu no longer shows inapplicable entries while files are being added to queue
- Fix date validation in filter and search conditions
3.17.0.1 (2016-05-09)
! MSW: Quoted the path to the uninstaller when executed from the installer to prevent an attacker from tricking the installer into running some other program instead
- SFTP: Fixed resuming SFTP transfers
- MSW: Loading the system default locale no longer fails on systems that have any English locale installed, yet do not have the US-English locale installed
- Fixed crash if update dialog is opened at the very same moment FileZilla is being closed.
|
|
2016-06-20 - libfilezilla 0.5.3 released
New features:
Add fz::replace_substrincs to search and replace substrings in std::(w)string
Bugfixes and minor changes:
Explicitly request large file support on 32bit systems
2016-05-20 - libfilezilla 0.5.2 released
New features:
Add fz::shared_optional::is_same that checks whether two instances share the same underlying pointer value, like a shallow equal.
Add fz::int_to_hex_char as reverse to fz::hex_char_to_int
2016-05-09 - libfilezilla 0.5.1 released
New features:
Add constructore to sparse_optional taking pointers
Bugfixes and minor changes:
Fix compilation on systems where iconv's second argument is const
|
|
Summary from commit log:
* Fix: Correct case of method call name
* Fix: Correct earlier regex delimiter
Remove superfluous character from character class that was previously
needed as the at-symbol ("@") was used as pattern delimiter.
Ref: fca283a
|
|
Summary from commit log:
* Fix find_domain() result when domain wasn't found (#4959)
* Support %s variable in 'domain_filter' config option
Resolves T135
* Don't execute LDAP queries for domains if domain_base_dn is not configured
* fixing recursive deletion of domains
Summary:
recursive deletion: need to find and delete objects with objectclass
ldapsubentry as well (#5100).
This is for example needed when deleting a domain, for the role
kolab-admin which has class ldapsubentry
Reviewers: vanmeeuwen, #web_administration_panel_developers
Reviewed By: vanmeeuwen, #web_administration_panel_developers
Subscribers: machniak, vanmeeuwen
Differential Revision: https://git.kolab.org/D23
* Unify some error, warning and debug messages feb73bc6 Browse Files
* Ensure that multi-valued attributes have sequential indexes in the array
* Remove unused variable, remove @ on ldap_add(), this may print useful
warnings that are not related to ldap connection
* Fix ldap_sort() deprecation warning in PHP7 (T1107)
* Fix bug where LDAP_OPT_DEBUG_LEVEL option couldn't have been disabled (#4918)
* Add .arcconfig 099bac48 Browse Files
* Fix package names to conform with packagist's naming policies
Summary:
This change will allow the package to be submitted to packagist.org
for easy installation via Composer.
Reviewers: vanmeeuwen, machniak
Reviewed By: machniak
Subscribers: bruederli
Differential Revision: https://git.kolab.org/D121
|
|
Changelog:
* Fix bug #20969: Fatal error with PEAR 1.10.0 / constructor visiblity
* Add support for PHP 7
* Improve unit tests
|
|
Changes from 9.10.3-P4 to 9.10.4 are too many to write here, please refer
CHANGES file.
--- 9.10.4-P2 released ---
4406. [bug] getrrsetbyname with a non absolute name could
trigger an infinite recursion bug in lwresd
and named with lwres configured if when combined
with a search list entry the resulting name is
too long. (CVE-2016-2775) [RT #42694]
4405. [bug] Change 4342 introduced a regression where you could
not remove a delegation in a NSEC3 signed zone using
OPTOUT via nsupdate. [RT #42702]
4387. [bug] Change 4336 was not complete leading to SERVFAIL
being return as NS records expired. [RT #42683]
--- 9.10.4-P1 released ---
4368. [bug] Fix a crash when calling "rndc stats" on some
Windows builds because some Visual Studio compilers
generated crashing code for the "%z" printf()
format specifier. [RT #42380]
4366. [bug] Address race condition when updating rbtnode bit
fields. [RT #42379]
4363. [port] win32: Disable explicit triggering UAC when running
BINDInstall.
--- 9.10.4 released ---
|
|
--- 9.9.9-P2 released ---
4406. [bug] getrrsetbyname with a non absolute name could
trigger an infinite recursion bug in lwresd
and named with lwres configured if when combined
with a search list entry the resulting name is
too long. (CVE-2016-2775) [RT #42694]
4405. [bug] Change 4342 introduced a regression where you could
not remove a delegation in a NSEC3 signed zone using
OPTOUT via nsupdate. [RT #42702]
4387. [bug] Change 4336 was not complete leading to SERVFAIL
being return as NS records expired. [RT #42683]
--- 9.9.9-P1 released ---
4366. [bug] Address race condition when updating rbtnode bit
fields. [RT #42379]
4363. [port] win32: Disable explicit triggering UAC when running
BINDInstall.
|
|
[mtvservices] Strip description
[comedycentraltv] Add extractor
Revert "[bbc] extract more and better qulities from Unified Streaming…
[viki] Override m3u8 formats acodec
[viki] Lower m3u8 preference
[viki] Fix tests
[spike] Relax _VALID_URL and improve extraction
[README.md] Make download URLs consistent
|
|
|
|
|
|
Complete and usable DNS library. All widely used Resource Records are
supported, including the DNSSEC types. It follows a lean and mean philosophy.
If there is stuff you should know as a DNS programmer there isn't a convenience
function for it. Server side and client side programming is supported, i.e. you
can build servers and resolvers with it.
|
|
Upstream changes:
0.696 2015-06-10
- Fixed up dist.ini
- YAPC::NA release
0.695 2014-12-02
- Corrected github details
0.694 2014-08-27
- Fix for RT89267
- Added github details
- Some minor code style changes
|
|
the separate copy coming with samba4 is not installed.
Depend on the two packages and never install the separate copies.
Bump PKGREVISION.
|
|
|
|
|
|
|
|
|
|
Changelog:
0.9.6b:
Merge pull request #15 from pandax381/master
0.9.6a:
Merge pull request #12 from pandax381/release-0.9.6a
|
|
Upstream changes:
1.20 June 9, 2016
! Minor kwalitee updates (@oeuftete)
! #106688 encode utf8 content in test which fails under RHES 6.6
|
|
|
|
|
|
|
|
2016.05.09 -- Version 2.3.11
Fixed port-share bug with DoS potential
Make intent of utun device name validation clear
Fix buffer overflow by user supplied data
Correctly report TCP connection timeout on windows.
Report Windows bitness
Fix undefined signed shift overflow
Fix build with libressl
Improve LZO, PAM and OpenSSL documentation
Ensure input read using systemd-ask-password is null terminated
Support reading the challenge-response from console
openssl: improve logging
polarssl: improve logging
Update manpage: OpenSSL might also need /dev/urandom inside chroot
socks.c: fix check on get_user_pass() return value(s)
Fix OCSP_check.sh
hardening: add safe FD_SET() wrapper openvpn_fd_set()
Fix memory leak in argv_extract_cmd_name()
Replace MSG_TEST() macro for static inline msg_test()
Restrict default TLS cipher list
Various Changes.rst fixes
Clarify mssfix documentation
Clarify --block-outside-dns documentation
Update --block-outside-dns to work on Windows Vista
2016.01.04 -- Version 2.3.10
Prepare for v2.3.10 release, list PolarSSL 1.2 to 1.3 upgrade
Make certificate expiry warning patch (091edd8e299686) work on OpenSSL 1.0.1 and earlier.
Repair IPv6 netsh calls if Win XP is detected
Use bob.example.com and alice.example.com to improve clarity of documentation
Remove unused variables from ssl_verify_polarssl.c's x509_get_serial()
Upgrade OpenVPN 2.3 to PolarSSL 1.3
Warn user if their certificate has expired
Make assert_failed() print the failed condition
cleanup: get rid of httpdigest.c type warnings
Fix regression in setups without a client certificate
polarssl: fix unreachable code
2015.12.15 -- Version 2.3.9
Show extra-certs in current parameters.
Fix commit a3160fc1bd7368395745b9cee6e40fb819f5564c
Do not set the buffer size by default but rely on the operation system default.
Remove --enable-password-save option
Reflect enable-password-save change in documentation
Also remove second instance of enable-password-save in the man page
Detect config lines that are too long and give a warning/error
Log serial number of revoked certificate
Adjust server-ipv6 documentation
Avoid partial authentication state when using --disabled in CCD configs
Make "block-outside-dns" option platform agnostic
Un-break --auth-user-pass on windows
Replace unaligned 16bit access to TCP MSS value with bytewise access
Repair test_local_addr() on WIN32
Fix possible heap overflow on read accessing getaddrinfo() result.
Fix FreeBSD-specific mishandling of gc arena pointer in create_arbitrary_remote()
remove unused gc_arena in FreeBSD close_tun()
Fix isatty() check for good.
put virtual IPv6 addresses into env
Use adapter index instead of name for windows IPv6 interface config
Client-side part for server restart notification
Use adapter index for add/delete_route_ipv6
Pass adapter index to up/down scripts
Fix VS2013 compilation
Fix privilege drop if first connection attempt fails
Support for username-only auth file.
Add CONTRIBUTING.rst
Updates to Changes.rst
Fix termination when windows suspends/sleeps
Do not hard-code windows systemroot in env_block
Handle ctrl-C and ctrl-break events on Windows
Unbreak read username password from management
Replace strdup() calls for string_alloc() calls
Check return value of ms_error_text()
Increase control channel packet size for faster handshakes
hardening: add insurance to exit on a failed ASSERT()
Fix memory leak in auth-pam plugin
Fix (potential) memory leak in init_route_list()
Fix unintialized variable in plugin_vlog()
Add macro to ensure we exit on fatal errors
Fix memory leak in add_option() by simplifying get_ipv6_addr
openssl: properly check return value of RAND_bytes()
Fix rand_bytes return value checking
Add Windows DNS Leak fix using WFP ('block-outside-dns')
Fix "White space before end tags can break the config parser"
2015.08.03 -- Version 2.3.8
Report missing endtags of inline files as warnings
Fix commit e473b7c if an inline file happens to have a line break exactly at buffer limit
Produce a meaningful error message if --daemon gets in the way of asking for passwords.
Document --daemon changes and consequences (--askpass, --auth-nocache).
Del ipv6 addr on close of linux tun interface
Fix --askpass not allowing for password input via stdin
write pid file immediately after daemonizing
Make __func__ work with Visual Studio too
fix regression: query password before becoming daemon
Fix using management interface to get passwords.
Fix overflow check in openvpn_decrypt()
2015.06.02 -- Version 2.3.7
Default gateway can't be determined on illumos/Solaris platforms
Warn that tls-auth with free form files is going to be removed from OpenVPN 2.4
autotools: Fix wrong ./configure help screen default values
down-root plugin: Replaced system() calls with execve()
down-root: Improve error messages
plugin, down-root: Fix compiler warnings
sockets: Remove the limitation of --tcp-nodelay to be server-only
plugins, down-root: Code style clean-up
pkcs11: Load p11-kit-proxy.so module by default
Make 'provider' option to --show-pkcs11-ids optional where p11-kit is present
Use OPENVPN_ETH_P_* so that <netinet/if_ether.h> is unecessary
New approach to handle peer-id related changes to link-mtu (2.3 version)
Fix incorrect use of get_ipv6_addr() for iroute options.
Print helpful error message on --mktun/--rmtun if not available.
explain effect of --topology subnet on --ifconfig
Add note about file permissions and --crl-verify to manpage.
repair --dev null breakage caused by db950be85d37
assume res_init() is always there.
Correct note about DNS randomization in openvpn.8
Disallow usage of --server-poll-timeout in --secret key mode.
slightly enhance documentation about --cipher
Enforce "serial-tests" behaviour for tests/Makefile
Revert "Enforce "serial-tests" behaviour for tests/Makefile"
On signal reception, return EAI_SYSTEM from openvpn_getaddrinfo().
Use configure.ac hack to apply serial_test AM option only if supported.
Use EAI_AGAIN instead of EAI_SYSTEM for openvpn_getaddrinfo().
Move res_init() call to inner openvpn_getaddrinfo() loop
Fix FreeBSD ifconfig for topology subnet tunnels.
Fix --redirect-private in --dev tap mode.
include ifconfig_ environment variables in --up-restart env set
Fix null pointer dereference in options.c
Fix mssfix default value in connection_list context
Manual page update for Re-enabled TLS version negotiation.
Include systemd units in the source tarball (make dist)
Updated manpage for --rport and --lport
Properly escape dashes on the man-page
Improve documentation in --script-security section of the man-page
Really fix '--cipher none' regression
Update doxygen (a bit)
Set tls-version-max to 1.1 if cryptoapicert is used
Account for peer-id in frame size calculation
Disable SSL compression
Fix frame size calculation for non-CBC modes.
Allow for CN/username of 64 characters (fixes off-by-one)
Remove unneeded parameter 'first_time' from possibly_become_daemon()
Re-enable TLS version negotiation by default
Remove size limit for files inlined in config
Improve --tls-cipher and --show-tls man page description
Re-read auth-user-pass file on (re)connect if required
Clarify --capath option in manpage
Call daemon() before initializing crypto library
|
|
CVE-2016-2119.
Changes from 4.3.9 to 4.3.10 are too many to write here, please refer
WHATSNEW.txt file.
==============================
Release Notes for Samba 4.3.11
July 07, 2016
==============================
This is a security release in order to address the following defect:
o CVE-2016-2119 (Client side SMB2/3 required signing can be downgraded)
=======
Details
=======
o CVE-2016-2119:
It's possible for an attacker to downgrade the required signing for
an SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST
or SMB2_SESSION_FLAG_IS_NULL flags.
This means that the attacker can impersonate a server being connected to by
Samba, and return malicious results.
The primary concern is with winbindd, as it uses DCERPC over SMB2 when talking
to domain controllers as a member server, and trusted domains as a domain
controller. These DCE/RPC connections were intended to protected by the
combination of "client ipc signing" and
"client ipc max protocol" in their effective default settings
("mandatory" and "SMB3_11").
Additionally, management tools like net, samba-tool and rpcclient use DCERPC
over SMB2/3 connections.
By default, other tools in Samba are unprotected, but rarely they are
configured to use smb signing, via the "client signing" parameter (the default
is "if_required"). Even more rarely the "client max protocol" is set to SMB2,
rather than the NT1 default.
If both these conditions are met, then this issue would also apply to these
other tools, including command line tools like smbcacls, smbcquota, smbclient,
smbget and applications using libsmbclient.
Changes since 4.3.10:
--------------------
o Stefan Metzmacher <metze@samba.org>
* BUG 11860: CVE-2016-2119: Fix client side SMB2 signing downgrade.
* BUG 11948: Total dcerpc response payload more than 0x400000.
#######################################
Reporting bugs & Development Discussion
#######################################
Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.
If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).
|
|
|
|
v0.13.10
This is a regular bugfix release recommended for all users.
#3128: Generated folder IDs are now lower case.
#3338: Syncthing now uses shorter temporary file names, alleviating issues on encfs.
#3335: Event IDs seen in /rest/system/events are now sequential again.
#3362: Tests now pass on when building on arm64.
#2471: Folders are now marked "stopped" when missing a path, and duplicate folder IDs are not accepted.
#3375: A stalling TLS handshake no longer blocks the connection service.
#3346: The global discovery server now correctly handle IPv6 announces over IPv4 and vice versa.
v0.13.9
This release fixes a crash on 32 bit platforms introduced in 0.13.8.
v0.13.8
Resolved issues:
#3306: The layout of the out of sync items dialog has been improved.
#3310: Folders are now sorted by label, falling back to ID when required.
#3330: Windows zip files now make sense when unpacked on non-Windows.
#3321: Folder name completion now works for empty names on non-Windows.
#2782: Folders can now be symbolic links also when using ~-relative paths.
New features and enhancements:
#3340: The discovered device addresses are now shown for disconnected devices.
|
|
breaks any later builds of pkgsrc gcc. Bump PKGREVISION
|
|
Changes:
- BUG/MAJOR: fix listening IP address storage for frontends
- BUG/MINOR: fix listening IP address storage for frontends (cont)
- DOC: Fix typo so fetch is properly parsed by Cyril's converter
- BUG/MAJOR: http: fix breakage of "reqdeny" causing random crashes
- BUG/MEDIUM: stick-tables: fix breakage in table converters
- BUG/MEDIUM: dns: unbreak DNS resolver after header fix
- BUILD: fix build on Solaris 11
- CLEANUP: connection: fix double negation on memcmp()
- BUG/MEDIUM: stats: show servers state may show an servers from another backend
- BUG/MEDIUM: fix risk of segfault with "show tls-keys"
- BUG/MEDIUM: sticktables: segfault in some configuration error cases
- BUG/MEDIUM: lua: converters doesn't work
- BUG/MINOR: http: add-header: header name copied twice
- BUG/MEDIUM: http: add-header: buffer overwritten
- BUG/MINOR: ssl: fix potential memory leak in ssl_sock_load_dh_params()
- BUG/MINOR: http: url32+src should use the big endian version of url32
- BUG/MINOR: http: url32+src should check cli_conn before using it
- DOC: http: add documentation for url32 and url32+src
- BUG/MINOR: fix http-response set-log-level parsing error
- MINOR: systemd: Use variable for config and pidfile paths
- MINOR: systemd: Perform sanity check on config before reload (cherry picked from commit 68535bddf305fdd22f1449a039939b57245212e7)
- BUG/MINOR: init: always ensure that global.rlimit_nofile matches actual limits
- BUG/MINOR: init: ensure that FD limit is raised to the max allowed
- BUG/MEDIUM: external-checks: close all FDs right after the fork()
- BUG/MAJOR: external-checks: use asynchronous signal delivery
- BUG/MINOR: external-checks: do not unblock undesired signals
- BUILD/MEDIUM: rebuild everything when an include file is changed
- BUILD/MEDIUM: force a full rebuild if some build options change
- BUG/MINOR: srv-state: fix incorrect output of state file
- BUG/MINOR: ssl: close ssl key file on error
- BUG/MINOR: http: fix misleading error message for response captures
- BUG/BUILD: don't automatically run "make" on "make install"
- DOC: add missing doc for http-request deny [deny_status <status>]
Drop one patch included upstream.
|
|
This program no longer works and upstream is long dead.
Reported by Frederic Cambus.
|
|
|
|
QUIC is an experimental protocol aimed at reducing web latency over
that of TCP. On the surface, QUIC is very similar to TCP+TLS+SPDY
implemented on UDP. Because TCP is implement in operating system
kernels, and middlebox firmware, making significant changes to TCP is
next to impossible. However, since QUIC is built on top of UDP, it
suffers from no such limitations.
Key features of QUIC over existing TCP+TLS+SPDY include
+ Dramatically reduced connection establishment time
+ Improved congestion control
+ Multiplexing without head of line blocking
+ Forward error correction
+ Connection migration
|
|
|
|
* Memory-management, stability and speed have been fundamentally improved
* We have kept an eye on security and hardened the code to prevent privileges escalation and XSS
* Alerts have been extended to include support for
. Re-arming to avoid raising trains of identical alerts in short periods of time
. Alert propagation to the infrastructure monitoring software Nagios
. CIDR-based triggers to monitor the behavior of whole networks
. The detection of suspicious probing attempts
* Netfilter support has been added together with optional packet dropping features
* Routing visibility is now possible through RIPE RIS
* Availability of fine-grained historical data drill-down features, including top talkers, top applications, and interactions between hosts (more details here)
* Integrations with other software
. LDAP authentication support
. alerts forwarding/withdrawal to Nagios
. nBox integration to request full packet pcaps of monitored flows
. Data export to Apache Kafka
* We have extended and improved traffic monitoring
. Visibility of TCP sessions throughput estimations and state breakdown (e.g., connections established, connections reset, etc.)
. Goodput monitoring
. Trends detection
. Highlight of low-goodput flows and hosts
. Visibility of hosts top-visited sites
* Built-in support is now included for
. GRE detunnelling
. per-VLAN historical statistics
. ICMP and ICMPv6 dissection
* We have extended the set of supported OSes to include: Ubuntu 16, Debian 7, EdgeOS
* There is also an optional support for hosts categorization via service flashstart.it
|
|
|
|
Ever been wondering if your ISP is hijacking your DNS traffic? Ever
observed any misbehavior with your DNS responses? Ever been redirected
to wrong address and suspected something is wrong with your DNS?
Here we have a set of tools to perform basic audits on your DNS
requests and responses to make sure your DNS is working as you
expect.
You can measure the response time of any given DNS server for
arbitrary requests using dnsping. Just like traditional ping utility,
it gives you similar functionality for DNS requests.
You can also trace the path your DNS request takes to destination
to make sure it is not being redirected or hijacked. This can be
done by comparing different DNS queries being sent to the same DNS
server using dnstraceroute and observe if there is any difference
between the path.
dnseval evaluates multiple DNS resolvers and helps you choose the
best DNS server for your network. While it is highly recommended
to use your own DNS resolver and never trust any third-party DNS
server, but in case you need to choose the best DNS forwarder for
your network, dnseval lets you compare different DNS servers from
performance (latency) and reliability (loss) point of view.
|
|
|
|
Client for the whois.cymru.com service
Perform lookups by ip address and return ASN, Country Code, and
Netblock Owner.
|
|
|
|
2016-05-27 Bob Halley <halley@dnspython.org>
* (Version 1.14.0 released)
* Add CSYNC RR support
* Fix bug in LOC which destroyed N/S and E/W distinctions within
a degree of the equator or prime merdian respectively.
* Misc. fixes to deal with fallout from the Python 2 & 3 merge.
[issue #156], [issue #157], [issue #158], [issue #159],
[issue #160].
* Running with python optimization on caused issues when
stripped docstrings were referenced. [issue #154]
* dns.zone.from_text() erroneously required the zone to be provided.
[issue #153]
2016-05-13 Bob Halley <halley@dnspython.org>
* dns/message.py (make_query): Setting any value which implies
EDNS will turn on EDNS if 'use_edns' has not been specified.
2016-05-12 Bob Halley <halley@dnspython.org>
* TSIG signature algorithm setting was broken by the Python 2
and Python 3 code line merge. Fixed.
2016-05-10 Bob Halley <halley@dnspython.org>
* (Version 1.13.0 released)
2016-05-10 Bob Halley <halley@dnspython.org>
* Dropped support for Python 2.4 and 2.5.
* Zone origin can be specified as a string.
* Support string representation for all DNSExceptions.
* Use setuptools not distutils
* A number of Unicode name bug fixes.
* Added support for CAA, CDS, CDNSKEY, EUI48, EUI64, and URI RR
types.
* Names now support the pickle protocol.
* NameDicts now keep the max-depth value correct, and update
properly.
* resolv.conf processing rejects lines with too few tokens.
* Ports can be specified per-nameserver in the stub resolver.
2016-05-03 Arthur Gautier
* Single source support for python 2.6+ and 3.3+
2014-09-04 Bob Halley <halley@dnspython.org>
* Comparing two rdata is now always done by comparing the binary
data of the DNSSEC digestable forms. This corrects a number of
errors where dnspython's rdata comparison order was not the
DNSSEC order.
* Add CAA implementation. Thanks to Brian Wellington for the
patch.
|
|
Fixes build on NetBSD-current.
|
|
Changes:
2016.06.25:
[*] misc bug fixes and improvements
2016.06.23*:
[*] misc bug fixes and improvements
2016.06.22:
[gametrailers] Remove extractor
[*] misc bug fixes and improvements
2016.06.20:
[*] misc bug fixes and improvements
2016.06.19*:
[aftonbladet] Fix extraction
[closertotruth] Add extractor
[r7] Fix extraction
[*] misc bug fixes and improvements
|
|
It's still needed (but with a fixed path)
Bump PKGREVISION.
Pointed out by <wiz>.
|
|
prototrout on freenode.
|
|
Add a patch to avoid scribbling on random memory if the server
certificate has more than one alternate name.
Bump PKGREVISION.
|
|
this package where other packages are installed which depend on cups.
Discussed with wiz@
Bump PKGREVISION.
|
|
|