summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Collapse)AuthorFilesLines
2017-10-17Update net/erlang-xmpp to 1.1.15fhajny4-16/+17
- Updating fast_xml to version 1.1.24. - Updating p1_utils to version 1.0.10. - Updating stringprep to version 1.0.10. - Compatibility with R19.3+ - XEP-0084 (User Avatar) support
2017-10-17Update net/erlang-esip to 1.0.16.fhajny3-17/+17
- Updating stun to version 1.0.15. - Updating fast_tls to version 1.0.16. - Updating p1_utils to version 1.0.10. - Compatibility with R20
2017-10-17Update net/erlang-stun to 1.0.15fhajny2-9/+9
- Updating fast_tls to version 1.0.16. - Updating p1_utils to version 1.0.10.
2017-10-17mikutter: update to 3.5.12.tsutsui2-7/+7
Upstream changes: - support an error response when the account is locked (thanks @sushi514) - add an environment variable MIKUTTER_CONFROOT - sweep legacy code
2017-10-17glib-networking: update to 2.54.0.wiz3-9/+10
2.54.0 ====== * New/updated translations: Basque, Belarusian, Brazilian Portuguese, Bulgarian, Catalan, Chinese (Taiwan), Danish, Danish, Dutch, French, Galician, Hungarian, Italian, Korean, Latvian, Lithuanian, Malayalam, Nepali, Polish, Serbian, Slovak, Swedish, Turkish 2.53.90 ======= * gnutls: Stop using %LATEST_RECORD_VERSION in priority string, since that gives better compatibility with current gnutls / current real world. [#782218, Michael Catanzaro] * gnutls: Provide a better error message when a TLS alert is received. [#782218, Michael Catanzaro] * New/updated translations: Croatian, Czech, Esperanto, Friulian, German, Indonesian, Italian, Kazakh, Slovenian, Spanish
2017-10-17p5-Geo-IP: update to 1.51.wiz2-11/+9
1.51 2017-10-11 - Added the following missing methods for IPv6 lookups to the pure Perl implementation: name_by_addr_v6, name_by_name_v6, org_by_addr_v6, and org_by_name_v6. Reported by Earl Killian. GitHub #28.
2017-10-16net/ruby-ruby_smb: Correct CATEGORIESminskim1-2/+2
2017-10-16net/Makefile: Add ruby-ruby_smbminskim1-1/+2
2017-10-16net/ruby-ruby_smb: Import version 0.0.18minskim4-0/+248
A native Ruby implementation of the SMB Protocol Family. It currently supports MS-SMB and MS-SMB2. This library currently include both a client level, and packet level support. A user can aprse and manipulate raw SMB packets, or simply use the simple client to perform SMB operations. See the Wiki for more information on this porject's long-term goals, style guide, and developer tips.
2017-10-16py-junos-eznc: update to 2.1.7adam2-10/+9
Release 2.1.7: Features Added: * None Bugs Fixed: * Correct PyEZ TechWiki link. * SRX Branch cluster fails SW.install()
2017-10-16Clean-up: this package should work on Python 3.xadam1-8/+3
2017-10-16wpa_supplicant: apply upstream patch for security advisorymaya13-2/+367
Patches from Juoni Malinen and Mathy Vanhoef. Fixes: - CVE-2017-13077 - CVE-2017-13078 - CVE-2017-13079 - CVE-2017-13080 - CVE-2017-13081 - CVE-2017-13082 - CVE-2017-13086 - CVE-2017-13087 - CVE-2017-13088 Tested by leot, thanks! Subject: [PATCH 1/8] hostapd: Avoid key reinstallation in FT handshake Do not reinstall TK to the driver during Reassociation Response frame processing if the first attempt of setting the TK succeeded. This avoids issues related to clearing the TX/RX PN that could result in reusing same PN values for transmitted frames (e.g., due to CCM nonce reuse and also hitting replay protection on the receiver) and accepting replayed frames on RX side. This issue was introduced by the commit 0e84c25434e6a1f283c7b4e62e483729085b78d2 ('FT: Fix PTK configuration in authenticator') which allowed wpa_ft_install_ptk() to be called multiple times with the same PTK. While the second configuration attempt is needed with some drivers, it must be done only if the first attempt failed. Subject: [PATCH 2/8] Prevent reinstallation of an already in-use group key Track the current GTK and IGTK that is in use and when receiving a (possibly retransmitted) Group Message 1 or WNM-Sleep Mode Response, do not install the given key if it is already in use. This prevents an attacker from trying to trick the client into resetting or lowering the sequence counter associated to the group key. Subject: [PATCH 3/8] Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases This extends the protection to track last configured GTK/IGTK value separately from EAPOL-Key frames and WNM-Sleep Mode frames to cover a corner case where these two different mechanisms may get used when the GTK/IGTK has changed and tracking a single value is not sufficient to detect a possible key reconfiguration. Subject: [PATCH 4/8] Prevent installation of an all-zero TK Properly track whether a PTK has already been installed to the driver and the TK part cleared from memory. This prevents an attacker from trying to trick the client into installing an all-zero TK. This fixes the earlier fix in commit ad00d64e7d8827b3cebd665a0ceb08adabf15e1e ('Fix TK configuration to the driver in EAPOL-Key 3/4 retry case') which did not take into account possibility of an extra message 1/4 showing up between retries of message 3/4. Subject: [PATCH 5/8] Fix PTK rekeying to generate a new ANonce The Authenticator state machine path for PTK rekeying ended up bypassing the AUTHENTICATION2 state where a new ANonce is generated when going directly to the PTKSTART state since there is no need to try to determine the PMK again in such a case. This is far from ideal since the new PTK would depend on a new nonce only from the supplicant. Fix this by generating a new ANonce when moving to the PTKSTART state for the purpose of starting new 4-way handshake to rekey PTK. Subject: [PATCH 6/8] TDLS: Reject TPK-TK reconfiguration Do not try to reconfigure the same TPK-TK to the driver after it has been successfully configured. This is an explicit check to avoid issues related to resetting the TX/RX packet number. There was already a check for this for TPK M2 (retries of that message are ignored completely), so that behavior does not get modified. For TPK M3, the TPK-TK could have been reconfigured, but that was followed by immediate teardown of the link due to an issue in updating the STA entry. Furthermore, for TDLS with any real security (i.e., ignoring open/WEP), the TPK message exchange is protected on the AP path and simple replay attacks are not feasible. As an additional corner case, make sure the local nonce gets updated if the peer uses a very unlikely "random nonce" of all zeros. Subject: [PATCH 7/8] WNM: Ignore WNM-Sleep Mode Response without pending request Commit 03ed0a52393710be6bdae657d1b36efa146520e5 ('WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used') started ignoring the response when no WNM-Sleep Mode Request had been used during the association. This can be made tighter by clearing the used flag when successfully processing a response. This adds an additional layer of protection against unexpected retransmissions of the response frame. Subject: [PATCH 8/8] FT: Do not allow multiple Reassociation Response frames The driver is expected to not report a second association event without the station having explicitly request a new association. As such, this case should not be reachable. However, since reconfiguring the same pairwise or group keys to the driver could result in nonce reuse issues, be extra careful here and do an additional state check to avoid this even if the local driver ends up somehow accepting an unexpected Reassociation Response frame.
2017-10-15Revert buildtool.mk additions for glib-{mkenums,genmarshal} using packagesprlw12-4/+2
Add TOOL_DEPENDS+=glib2-tools to glib2/buildlink3.mk
2017-10-15Put gdbus-codgen back into operationprlw11-2/+2
- Revert "Move gdbus-codegen users to py-glib2-tools by including glib2/buildtools.mk" 1f764df - while here change to TOOL_DEPENDS - switch from py-glib2-tools to glib2-tools
2017-10-14gtk-vnc: requires py-glib2-tools to buildprlw11-1/+2
2017-10-14avahi: requires glib-marshal which is now in py-glib2-toolsprlw11-1/+2
2017-10-14py-tweepy: update to 3.5.0adam3-19/+21
3.5.0 Features / Improvements * Allow 'full_text' param when getting direct messages * Explicitly return api code when parsing error * Remove deprecated function and clean up codes Bug Fixes * update_status: first positional argument should be 'status' * Fix "TypeError: Can't convert 'bytes' object to str implicitly" * Fix duplicate raise in auth.py
2017-10-13Sync with latest.christos13-303/+91
2017-10-13net/php-yaz: Update to 1.2.2taca2-8/+7
Fix yaz_scan - 3 args gives SEGV PHPYAZ-34
2017-10-13Move gdbus-codegen users to py-glib2-tools by including glib2/buildtools.mkprlw11-2/+2
2017-10-13lftp: update to 4.8.3adam2-7/+7
Version 4.8.3: * fixed compilation with older C++ compilers. * fixed 2 other core dumps on exit (incorrect order of deallocation).
2017-10-11p5-Net-Libdnet6: fix some bugs on NetBSDwiz4-4/+117
From Edgar Fuß in PR 52610. Bump PKGREVISION.
2017-10-11syncthing: update to 0.14.39.wiz2-7/+7
This is a regularly scheduled stable release. Resolved issues: #4357: Removing paused folders no longer triggers a crash. #4360: Add further security related HTTP headers #4375: Improve info level logging in some cases #4377: Improve GUI tooltips in chromium based browsers #4382: Hide temporary files on Windows #4387: Add -device-id command line switch In addition, failure to upgrade folder markers from file to directory type is no longer fatal.
2017-10-10Upgrade unbound to version 1.6.7.he2-7/+7
Pkgsrc changes: * None. Upstream changes: Features: * Set trust-anchor-signaling default to yes * Fix #1440: [dnscrypt] client nonce cache. * Fix #1435: Please allow UDP to be disabled separately upstream and downstream. Bug fixes: * Fix that looping modules always stop the query, and don't pass control. * Fix unbound-host to report error for DNSSEC state of failed lookups. * Spelling fixes, from Josh Soref. * Fix #1400: allowing use of global cache on ECS-forwarding unless always-forward. * use a cachedb answer even if it's "expired" when serve-expired is yes (patch from Jinmei Tatuya). * trigger refetching of the answer in that case (this will bypass cachedb lookup) * allow storing a 0-TTL answer from cachedb in the in-memory message cache when serve-expired is yes * Fix DNSCACHE_STORE_ZEROTTL to be bigger than 0xffff. * Log name of looping module * Fix #1450: Generate again patch contrib/aaaa-filter-iterator.patch (by Danilo G. Baio). * Fix param unused warning for windows exportsymbol compile. * Use RCODE from A query on DNS64 synthesized answer. * Fix trust-anchor-signaling works in libunbound. * Fix spelling in unbound-control man page.
2017-10-09ytalk: update HOMEPAGE and MASTER_SITESwiz1-3/+3
2017-10-09py-spreadmodule: remove packagewiz6-51/+1
Last release from 2005 and tested with python-2.4. Nothing in pkgsrc uses it.
2017-10-09kismet: follow redirectswiz1-3/+3
2017-10-09p5-Net-IPv6Addr: update to 0.91.wiz2-7/+7
0.91 2017-10-06 Ben Bullock <bkb@cpan.org> * Documentation (esp. SEE ALSO, BUGS) * Better validation of IPv4 addresses in ipv6_chkip
2017-10-08quagga: Update to 1.2.2gdt5-27/+20
Upstream changes: Quagga 1.2.2 Upstream did not publsh NEWS -- basically bug fixes Quagga 1.2.1 bug fixes and minor improvements Quagga 1.2.0 This is a feature release, for testing or more adventurous users. More conservative users may wish to stay with an older release. This release contains: Next-Hop Resolution Protocol support from Timo Teräs BGP Large Community support, thanks to Job Snijders and Keyur Patel BGP session establishment reworked, for speed and reliability BGP route-advertisement timer interval default lowered, to 3s for eBGP and 1s for iBGP. BGP Connect retries made more aggressive, with lower retry timer and a slower-ramping backoff. Quagga 1.1.1 bug and security fixes There is a known regression with IPv6 BGP sessions, see Bugzilla #870. Quagga 1.1.0 This is a release with a number of new features, and many bug fixes. Notably: Greatly improved nexthop resolution for recursive routes. (Cumulus) Event driven nexthop resolution for BGP (Cumulus) Route tags support (Piotr Chytła, Packet Consulting) Transport of TE related metrics over OSPF, IS-IS (Olivier Dugeon, Orange) IPv6 Multipath for zebra and BGP (Ayan Banerjee, Cumulus) This release also changed the default of 'link-detect' state, controlling whether zebra will respond to link-state events and consider an interface to be down when link is down. To retain current the behavior save your config before updating, otherwise remove the 'link-detect' flag from your config prior to updating. There is also a new global 'default link-detect (on|off)' flag to configure the global default. Quagga 1.0.20161017 zebra IPv6 RA and BGP MRT dump security fixes
2017-10-07Import dhcpcd-7.0.0-rc3 with the following noteable changes:roy2-7/+7
* Fixed handling RA's from multiple routers * Fixed changing to a better route based on gateway * IPv6 default route is now deleted when config is not persistent * Use hmac(3) if available in libc to reduce binary size
2017-10-07py-foolscap: update to 0.12.7adam2-8/+8
Release 0.12.7: This is a minor bugfix release to help Tahoe-LAFS. It depends upon a newer version of I2P, which should handle Tahoe storage servers that listen on I2P sockets (the Tahoe executable makes an outbound connection to the local I2P daemon, however it then accepts inbound TLS connections on that same socket, which confuses the TLS negotiation because both sides appear to be "clients", and TLS requires exactly one "client" and one "server"). It also fixes a minor Tub shutdown behavior to let unit tests work more reliably.
2017-10-06net/Makefile: Add ruby-xdrminskim1-1/+2
2017-10-06net/ruby-xdr: Import version 2.0.0minskim4-0/+105
XDR is an open data format, specified in RFC 4506. This library provides a way to read and write XDR data from Ruby. It can read/write all of the primitive XDR types and also provides facilities to define readers for the compound XDR types (enums, structs and unions).
2017-10-06py-awscli: update to 1.11.166adam3-11/+44
1.11.166 api-change:redshift: Update redshift command to latest version 1.11.165 api-change:kinesisanalytics: Update kinesisanalytics command to latest version api-change:route53domains: Update route53domains command to latest version 1.11.164 api-change:ssm: Update ssm command to latest version api-change:ec2: Update ec2 command to latest version 1.11.163 api-change:cloudhsm: Update cloudhsm command to latest version 1.11.162 api-change:route53: Update route53 command to latest version api-change:organizations: Update organizations command to latest version api-change:mturk: Update mturk command to latest version api-change:codebuild: Update codebuild command to latest version api-change:appstream: Update appstream command to latest version
2017-10-06py-botocore: update to 1.7.24adam3-8/+9
1.7.24 api-change:redshift: Update redshift client to latest version 1.7.23 api-change:route53domains: Update route53domains client to latest version api-change:kinesisanalytics: Update kinesisanalytics client to latest version 1.7.22 api-change:ssm: Update ssm client to latest version api-change:ec2: Update ec2 client to latest version 1.7.21 api-change:cloudhsm: Update cloudhsm client to latest version 1.7.20 api-change:organizations: Update organizations client to latest version api-change:route53: Update route53 client to latest version api-change:codebuild: Update codebuild client to latest version api-change:mturk: Update mturk client to latest version api-change:appstream: Update appstream client to latest version
2017-10-06net-snmp: Prevent crash on NetBSD/i386gavan3-5/+14
A compiler bug causes incorrect compilation of the NetBSD-specific code in cpu_sysctl.c. This results in a crash shortly after startup if the machine has 2 or more CPUs. Disable optimisation in netsnmp_cpu_arch_load() only. This works around the problem reported in PR pkg/50939.
2017-10-05py-dnsdiag: update to 1.6.3adam3-295/+19
1.6.3: Bug fixes.
2017-10-05py-cymruwhois: update to 1.6adam4-17/+14
Changes 1.6: Add in a check for the windows version of EWOULDBLOCK Apparently in newer versions of python this just works, but in older versions the error codes were not consistent across platforms.
2017-10-04proftpd: Skip SSP checks on archive libraries.jperkin1-2/+3
2017-10-04Added missing optional findlib directory to net/ocamlnetjaapb3-5/+6
2017-10-03*: Recursive PKGREVISION bump for vala 0.38 update.wiz3-5/+6
2017-10-03libsoup: update to 2.60.0.wiz3-9/+9
Changes in libsoup from 2.59.90.1 to 2.60.0: * New/updated translations: Catalan, Danish, Dutch, Nepali Changes in libsoup from 2.59.90 to 2.59.90.1: * CVE-2017-2885: Fixed a chunked decoding buffer overrun that could be exploited against either clients or servers. [#785774] Changes in libsoup from 2.58.0 to 2.59.90: * Several SoupAuthNegotiate compatibility fixes [#783780, #783781, Tomas Popela] * Include a payload in SoupWebsocketConnection's "ping" messages (to avoid problems with certain buggy server implementations), and emit a signal when receiving a "pong" (to allow apps to notice when the remote peer has disconnected them). [#785660, David Woodhouse] * Fix the interpretation of wss:// URIs, which previously mostly didn't work. [#784766, Nirbheek Chauhan]. * Fixed SoupContentSniffer behavior on XML files with no Content-Type [https://bugs.webkit.org/show_bug.cgi?id=173923] * Fixed a bug with cancelling async requests [#773257, Carlos Garcia Campos] * Reverted the (undocumented) change in 2.58.0 to call soup_session_abort() after changing SoupSession:proxy-resolver; while this made its behavior more consistent with :proxy-uri, it ended up breaking things. [#781590] * Allow HTTP responses that have no trailing CRLF after the response headers (and no body) [#780352, Carlos Garcia Campos] * Fixed an out-of-bounds read in SoupURI parsing [#785042] * Fixed a spurious (debug-level) error message in SoupWebsocketConnection [#784935, Ignacio Casal Quinteiro] * Fixed introspection annotations on soup_message_headers_get_content_range() [Philip Withnall] * Fixed a flake in tests/header-parsing [#777258] * Update tests/test-cert.pem to use stronger algorithms to avoid problems with newer gnutls. [#784949, Jan Alexander Steffens] * Fixed examples/get to not accidentally break https certificate validation [#784259, Sebatian Dröge] * Misc updates to apache/php stuff in unit tests: * Dropped support for Apache 2.2 * Deal with mod_unixd being compiled-in [#776478] * Switched PHP support from PHP 5 to PHP 7 * Updated translations: Esperanto, Turkish
2017-10-02openvpn: update to 2.4.4wiz5-19/+19
Version 2.4.4 ============= This is primarily a maintenance release, with further improved OpenSSL 1.1 integration, several minor bug fixes and other minor improvements. Bug fixes --------- - Fix issues when a pushed cipher via the Negotiable Crypto Parameters (NCP) is rejected by the remote side - Ignore ``--keysize`` when NCP have resulted in a changed cipher. - Configurations using ``--auth-nocache`` and the management interface to provide user credentials (like NetworkManager on Linux) on client side with servers implementing authentication tokens (for example, using ``--auth-gen-token``) will now behave correctly and not query the user for an, to them, unknown authentication token on renegotiations of the tunnel. - Fix bug causing invalid or corrupt SOCKS port number when changing the proxy via the management interface. - The man page should now have proper escaping of hyphens/minus characters and have seen some minor corrections. User-visible Changes -------------------- - Linux servers with systemd which uses the ``openvpn-server@.service`` unit file for server configurations will now utilize the automatic restart feature in systemd. If the OpenVPN server process dies unexpectedly, systemd will ensure the OpenVPN configuration will be restarted without any user interaction. Deprecated features ------------------- - ``--no-replay`` is deprecated and will be removed in OpenVPN 2.5. - ``--keysize`` is deprecated in OpenVPN 2.4 and will be removed in v2.6 Security -------- - CVE-2017-12166: Fix bounds check for configurations using ``--key-method 1``. Before this fix, it could allow an attacker to send a malformed packet to trigger a stack overflow. This is considered to be a low risk issue, as ``--key-method 2`` has been the default since OpenVPN 2.0 (released on 2005-04-17). This option is already deprecated in v2.4 and will be completely removed in v2.5.
2017-10-02dnsmasq: update to 2.78.wiz2-7/+7
version 2.78 Fix logic of appending ".<layer>" to PXE basename. Thanks to Chris Novakovic for the patch. Revert ping-check of address in DHCPDISCOVER if there already exists a lease for the address. Under some circumstances, and netbooted windows installation can reply to pings before if has a DHCP lease and block allocation of the address it already used during netboot. Thanks to Jan Psota for spotting this. Fix DHCP relaying, broken in 2.76 and 2.77 by commit ff325644c7afae2588583f935f4ea9b9694eb52e. Thanks to John Fitzgibbon for the diagnosis and patch. Try other servers if first returns REFUSED when --strict-order active. Thanks to Hans Dedecker for the patch Fix regression in 2.77, ironically added as a security improvement, which resulted in a crash when a DNS query exceeded 512 bytes (or the EDNS0 packet size, if different.) Thanks to Christian Kujau, Arne Woerner Juan Manuel Fernandez and Kevin Darbyshire-Bryant for chasing this one down. CVE-2017-13704 applies. Fix heap overflow in DNS code. This is a potentially serious security hole. It allows an attacker who can make DNS requests to dnsmasq, and who controls the contents of a domain, which is thereby queried, to overflow (by 2 bytes) a heap buffer and either crash, or even take control of, dnsmasq. CVE-2017-14491 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana Kevin Hamacher and Ron Bowes of the Google Security Team for finding this. Fix heap overflow in IPv6 router advertisement code. This is a potentially serious security hole, as a crafted RA request can overflow a buffer and crash or control dnsmasq. Attacker must be on the local network. CVE-2017-14492 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher of the Google Security Team for finding this. Fix stack overflow in DHCPv6 code. An attacker who can send a DHCPv6 request to dnsmasq can overflow the stack frame and crash or control dnsmasq. CVE-2017-14493 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana Kevin Hamacher and Ron Bowes of the Google Security Team for finding this. Fix information leak in DHCPv6. A crafted DHCPv6 packet can cause dnsmasq to forward memory from outside the packet buffer to a DHCPv6 server when acting as a relay. CVE-2017-14494 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana Kevin Hamacher and Ron Bowes of the Google Security Team for finding this. Fix DoS in DNS. Invalid boundary checks in the add_pseudoheader function allows a memcpy call with negative size An attacker which can send malicious DNS queries to dnsmasq can trigger a DoS remotely. dnsmasq is vulnerable only if one of the following option is specified: --add-mac, --add-cpe-id or --add-subnet. CVE-2017-14496 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana Kevin Hamacher and Ron Bowes of the Google Security Team for finding this. Fix out-of-memory Dos vulnerability. An attacker which can send malicious DNS queries to dnsmasq can trigger memory allocations in the add_pseudoheader function The allocated memory is never freed which leads to a DoS through memory exhaustion. dnsmasq is vulnerable only if one of the following option is specified: --add-mac, --add-cpe-id or --add-subnet. CVE-2017-14495 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana Kevin Hamacher and Ron Bowes of the Google Security Team for finding this.
2017-10-02gupnp-igd: update to 0.2.4.wiz3-9/+11
******************* * GUPnP IGD 0.2.4 * ******************* - Add API to delete mapping by internal IP/port instead of the external one
2017-10-02gupnp: update to 1.0.2.wiz3-10/+24
1.0.2 ===== - Fix a potential crash of GUPnPProxy when trying to access a dangling GUPnPServiceProxy pointer of a server handler. Bugs fixed in this release: - https://bugzilla.gnome.org/show_bug.cgi?id=777491 All contributors to this release: - Sven Neumann <neumann@teufel.de> 1.0.1 ===== - Connman CM: Various fixes - Linux CM: Fix compiler warning about negative shift - Documentation: Fix FSF address - Documentation: Fix references - Build: Update ax_append_link_flags Bugs fixed in this release: - https://bugzilla.gnome.org/show_bug.cgi?id=770318 All contributors to this release: - Sven Neumann <neumann@teufel.de> - Jens Georg <mail@jensge.org> - Oliver Tappe <zooey@hirschkaefer.de>
2017-10-02gssdp: update to 1.0.2.wiz2-8/+7
1.0.2 ===== - Small documentation fixes - Fix deprecation warning with GTK+-3.22 All contributors to this release: - Jens Georg <mail@jensge.org> 1.0.1 ===== - Fix some compiler/c89 issues with recent mingw - Use proper ssize_t modifier in printf - Make documentation point to itself by declaring it stable - Use correct FSF address in documentation text All contributors to this release: - Jens Georg <mail@jensge.org>
2017-10-02filezilla: update to 3.28.0.wiz2-9/+8
3.28.0 (2017-09-29) + *nix: Official Linux binaries are now built for Debian 9 (Stretch) - Do not disable password saving settings if fzdefaults.xml contains a kiosk mode setting of 0. 3.28.0-rc1 (2017-09-22) + Add "Close once" as queue completion action - Fixed crash if FileZilla is forced to close, e.g. when the system is shutting down, while there are open dialogs - If the transfer queue asks for a password and the password dialog is canceled the queue processing is now stopped - OS X, *nix: Improve detection of invalid character encodings in local filenames - Fix potential crash expanding directory tree items while changing selections
2017-10-02libfilezilla: update to 0.11.0.wiz3-8/+9
0.11.0 (2017-09-29) + Add fz::buffer class - *nix: fz::process::spawn no longer calls async-signal-unsafe functions between forking and calling execv in the child.
2017-10-02youtube-dl: Update net/youtube-dl to 20171001leot3-8/+17
Changes: 2017.10.01 ---------- Core * [YoutubeDL] Document youtube_include_dash_manifest Extractors + [tvp] Add support for new URL schema (#14368) + [generic] Add support for single format Video.js embeds (#14371) * [yahoo] Bypass geo restriction for brightcove (#14210) * [yahoo] Use extracted brightcove account id (#14210) * [rtve:alacarta] Fix extraction (#14290) + [yahoo] Add support for custom brigthcove embeds (#14210) + [generic] Add support for Video.js embeds + [gfycat] Add support for /gifs/detail URLs (#14322) * [generic] Fix infinite recursion for twitter:player URLs (#14339) * [xhamsterembed] Fix extraction (#14308) 2017.09.24 ---------- Core + [options] Accept lrc as a subtitle conversion target format (#14292) * [utils] Fix handling raw TTML subtitles (#14191) Extractors * [24video] Fix timestamp extraction and make non fatal (#14295) + [24video] Add support for 24video.adult (#14295) + [kakao] Add support for tv.kakao.com (#12298, #14007) + [twitter] Add support for URLs without user id (#14270) + [americastestkitchen] Add support for americastestkitchen.com (#10764, #13996) * [generic] Fix support for multiple HTML5 videos on one page (#14080) * [mixcloud] Fix extraction (#14088, #14132) + [lynda] Add support for educourse.ga (#14286) * [beeg] Fix extraction (#14275) * [nbcsports:vplayer] Correct theplatform URL (#13873) * [twitter] Fix duration extraction (#14141) * [tvplay] Bypass geo restriction + [heise] Add support for YouTube embeds (#14109) + [popcorntv] Add support for popcorntv.it (#5914, #14211) * [viki] Update app data (#14181) * [morningstar] Relax URL regular expression (#14222) * [openload] Fix extraction (#14225, #14257) * [noovo] Fix extraction (#14214) * [dailymotion:playlist] Relax URL regular expression (#14219) + [twitch] Add support for go.twitch.tv URLs (#14215) * [vgtv] Relax URL regular expression (#14223)