non port: security/krb5-devel/Makefile |
Number of commits found: 180 (showing only 100 on this page) |
Friday, 23 Feb 2024
|
04:02 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
e12e9ae |
Tuesday, 13 Feb 2024
|
19:04 Cy Schubert (cy)
security/krb5-devel: Don't adjust default package name
Avoid changing the default package name when default flavor is built.
65c4c67 |
18:47 Cy Schubert (cy)
security/krb5*: Flavorize with default and ldap flavors
This provides a binary package to users who require MIT KRB5 with LDAP
support. This patch does not change the current, now default, package
name.
PR: 277015
9926898 |
Wednesday, 7 Feb 2024
|
00:41 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
0945c17 |
Monday, 29 Jan 2024
|
22:52 Cy Schubert (cy)
security/krb5-*: Move man pages to share/man
c998a1f |
18:53 Cy Schubert (cy)
security/krb5*: Remve kdc wrappers script
Remove the kdc script that allowed krb5kdc to be stared using
the /etc/rc.d/kdc rc script. This is no longer needed since
src/ 91f78c32befa.
3dc757c |
Wednesday, 3 Jan 2024
|
16:41 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
364bc09 |
Wednesday, 6 Dec 2023
|
05:54 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
ff9fe38 |
Tuesday, 28 Nov 2023
|
23:49 Cy Schubert (cy)
security/krb5-devel: Consistently specify runstatedir
The other krb5-* ports specify runstatedir. Let's keep them consistent.
PORTREVISION is not bumped because this is already the default.
d2f0244 |
23:49 Cy Schubert (cy)
security/krb5*: Allow the user to specify state directory locations
localstatedir and runstatedir are set to ${PREFIX}/var and
${PREFIX}/var/run respectively. Users who wish to put their KDC
DB elsewhere can set the following in make.conf:
KRB5_LOCALSTATEDIR=/va
KRB5_RUNSTATEDIR=/var/run.
Unfortunately defaulting to /var instead of the current default would
result in MIT KDC not finding its KDC DB files. This would be disruptive
to all MIT KDC users. But new users of MIT KRB5 KDC can set the pathname
above as desired.
PR: 267560
743dbb8 |
Tuesday, 14 Nov 2023
|
20:08 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
26479a3 |
Wednesday, 11 Oct 2023
|
02:50 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
af66b9f |
Tuesday, 26 Sep 2023
|
21:45 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
25b3fac |
Tuesday, 5 Sep 2023
|
18:30 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
78df85f |
Monday, 28 Aug 2023
|
16:35 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
866bb73 |
Monday, 14 Aug 2023
|
14:45 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
907b15c |
Wednesday, 9 Aug 2023
|
23:43 Cy Schubert (cy)
security/krb5: Support libedit in base
Even though libedit is in base FreeBSD, the krb5 ports still depend
on devel/libedit when the LIBEDIT option is selected. This is because
./configure uses pkgconf to determine if libedit exists, ignoring
libedit in FreeBSD base. This patch adds a new LIBEDIT_BASE option
which enables LIBEDIT (LIBEDIT_BASE) without installing the
devel/libedit port.
The GNU READLINE option will remain the default for now but it is
planned to switch the default to LIBEDIT_BASE at some point. This is
to reduce the dependency on GNU software and to bring it more into
line with the planned MIT KRB5 import into FreeBSD base.
e89f841 |
23:24 Cy Schubert (cy)
security/krb5*: Disable NLS when option is deselected
When the NLS option is deselected, ./configure reverts to
enable_nls=check. As some prerequisites do require NLS, NLS is
always enabled even when deslected. This ensures that when NLS
is not wanted, that it is not used, regardless of its install status.
0b58b7b |
Tuesday, 8 Aug 2023
|
15:51 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
390c79927 |
Monday, 31 Jul 2023
|
16:38 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
-Wstrict-prototypes is temporarily disabled as it is expected that
our upstream will fix these errors as they discover them. This is
in fact their development branch -- they enable all warning errors
in their developtment branch but not in their release tarballs.
6716e92 |
Monday, 17 Jul 2023
|
15:04 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
849ec2c |
Saturday, 8 Jul 2023
|
04:30 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
fae4291 |
Tuesday, 6 Jun 2023
|
18:35 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
krb5-devel now tracks krb5-1.22 development.
0565d4d |
Wednesday, 31 May 2023
|
02:41 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
d800a1b |
Monday, 17 Apr 2023
|
21:28 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
10de97f |
Saturday, 1 Apr 2023
|
00:04 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
7ba068e |
Saturday, 18 Mar 2023
|
03:23 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
1aa68f4 |
Wednesday, 15 Feb 2023
|
19:29 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
402be0e |
Wednesday, 8 Feb 2023
|
10:53 Muhammad Moinur Rahman (bofh)
Mk/**ldap.mk: Convert USE_LDAP to USES=ldap
Convert the USE_LDAP=yes to USES=ldap and adds the following features:
- Adds the argument USES=ldap:server to add openldap2{4|5|6}-server as
RUN_DEPENDS
- Adds the argument USES=ldap<version> and replaces WANT_OPENLDAP_VER
- Adds OPENLDAP versions in bsd.default-versions.mk
- Adds USE_OPENLDAP/WANT_OPENLDAP_VER in Mk/bsd.sanity.mk
- Changes consumers to use the features
Reviewed by: delphij
Approved by: portmgr
Differential Revision: https://reviews.freebsd.org/D38233
6e1233b |
Wednesday, 25 Jan 2023
|
15:48 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
d74ee6c7 |
Tuesday, 17 Jan 2023
|
21:12 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
6def853 |
Tuesday, 3 Jan 2023
|
16:56 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
8b96201 |
Monday, 19 Dec 2022
|
19:23 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
5704e46 |
Friday, 18 Nov 2022
|
02:33 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
8aec1dd |
Tuesday, 15 Nov 2022
|
16:49 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
9d99295 |
Tuesday, 11 Oct 2022
|
14:29 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
3cabb1a |
Sunday, 2 Oct 2022
|
23:32 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
5ba52ce |
Friday, 9 Sep 2022
|
15:20 Cy Schubert (cy)
security/krb5-devel: Modernize CONFLICTS
Remediate CONFLICTS bitrot.
26907c0 |
Thursday, 8 Sep 2022
|
15:43 Stefan Eßer (se)
Move more WWW entries from pkg-descr files into Makefiles
The WWW: lines in the pkg-descr files of these ports where not at the
end of those files and have been missed in prior conversion runs.
Approved by: portmgr (implicit)
986beaa |
Sunday, 28 Aug 2022
|
21:16 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
7009409 |
Monday, 15 Aug 2022
|
14:42 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
78dd6e5 |
Tuesday, 2 Aug 2022
|
22:39 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
4dde3c1 |
Wednesday, 20 Jul 2022
|
14:22 Tobias C. Berner (tcberner)
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org>
* Alexander Logvinov <ports@logvinov.com>
* Alexander Y. Grigoryev <alexander.4mail@gmail.com>
* Alexey Dokuchaev <danfe@FreeBSD.org>
* Alfred Perlstein
* Alfred Perlstein <alfred@FreeBSD.org>
* Anders Nordby <anders@FreeBSD.org>
* Anders Nordby <anders@fix.no>
* Andreas Klemm <andreas@klemm.gtn.com>
* Andrew Lewis <freeghb@gmail.com>
* Andrew Pantyukhin <infofarmer@FreeBSD.org>
* Andrew St. Jean <andrew@arda.homeunix.net>
* Anes Mukhametov <anes@anes.su>
* Antoine Brodin <antoine@FreeBSD.org>
* Anton Berezin <tobez@FreeBSD.org>
* Antonio Carlos Venancio Junior (<antonio@inf.ufsc.br>)
* Antonio Carlos Venancio Junior <antonio@inf.ufsc.br>
* Ashish SHUKLA <ashish@FreeBSD.org>
* Attila Nagy <bra@fsn.hu>
* Autrijus Tang <autrijus@autrijus.org>
* Axel Rau <axel.rau@chaos1.de>
* Babak Farrokhi <farrokhi@FreeBSD.org>
* Ben Woods <woodsb02@FreeBSD.org>
* Bernard Spil <brnrd@FreeBSD.org>
* Bernard Spil <brnrd@freebsd.org>
* Blaz Zupan <blaz@si.FreeBSD.org>
* Bob Hockney <zeus@ix.netcom.com>
* Boris Kochergin <spawk@acm.poly.edu>
* Brendan Molloy <brendan+freebsd@bbqsrc.net>
* Bruce M Simpson
* Bruce M Simpson <bms@FreeBSD.org>
* Bruce M. Simpson <bms@FreeBSD.org>
* Carlo Strub
* Carlo Strub <cs@FreeBSD.org>
* Carlos J Puga Medina <cpm@FreeBSD.org>
* Carlos J Puga Medina <cpm@fbsd.es>
* Charlie Root <se@FreeBSD.org>
* Cheng-Lung Sung <clsung@FreeBSD.org>
* Cheng-Lung Sung <clsung@dragon2.net>
* Chie Taguchi <taguchi.ch@gmail.com>
* Chris Cowart <ccowart@rescomp.berkeley.edu>
* Chris D. Faulhaber <jedgar@FreeBSD.org>
* Christer Edwards <christer.edwards@gmail.com>
* Christian Lackas
* Christopher Hall <hsw@bitmark.com>
* Clement Laforet <sheepkiller@cultdeadsheep.org>
* Clive Lin <clive@CirX.ORG>
* Colin Percival
* Cory McIntire (loon@noncensored.com)
* Craig Leres <leres@FreeBSD.org>
* Cristiano Deana <cris@gufi.org>
* Cy Schubert (Cy.Schubert@uumail.gov.bc.ca)
* Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
* Cy Schubert <cy@FreeBSD.org>
* Damian Gerow <dgerow@afflictions.org>
* Damien Bobillot
* Dan Langille
* Dan Langille <dan@freebsddiary.org>
* Dan Langille <dvl@FreeBSD.org>
* Dan Langille <dvl@freebsd.org>
* Dan Langille <dvl@sourcefire.com>
* Daniel Kahn Gillmor <dkg@fifthhorseman.net>
* Daniel Roethlisberger <daniel@roe.ch>
* Danilo Egea Gondolfo <danilo@FreeBSD.org>
* Danton Dorati <urisso@bsd.com.br>
* Dave McKay <dave@mu.org>
* David E. Thiel <lx@FreeBSD.org>
* David O'Brien (obrien@NUXI.com)
* David O'Brien <obrien@FreeBSD.org>
* David Thiel <lx@redundancy.redundancy.org>
* Dean Hollister <dean@odyssey.apana.org.au>
* Denis Shaposhnikov <dsh@vlink.ru>
* Dereckson <dereckson@gmail.com>
* Dirk Froemberg <dirk@FreeBSD.org>
* Ditesh Shashikant Gathani <ditesh@gathani.org>
* Dom Mitchell <dom@happygiraffe.net>
* Dominic Marks <dominic.marks@btinternet.com>
* Don Croyle <croyle@gelemna.org>
* Douglas Thrift <douglas@douglasthrift.net>
* Edson Brandi <ebrandi@fugspbr.org>
* Edwin Groothuis <edwin@mavetju.org>
* Ekkehard 'Ekki' Gehm <gehm@physik.tu-berlin.de>
* Emanuel Haupt <ehaupt@FreeBSD.org>
* Emanuel Haupt <ehaupt@critical.ch>
* Eric Crist <ecrist@secure-computing.net>
* Erwin Lansing <erwin@FreeBSD.org>
* Eugene Grosbein <eugen@FreeBSD.org>
* Fabian Keil <fk@fabiankeil.de>
* Felix Palmen <felix@palmen-it.de>
* Florent Thoumie <flz@xbsd.org>
* Foxfair Hu <foxfair@FreeBSD.org>
* Frank Laszlo <laszlof@vonostingroup.com>
* Frank Wall <fw@moov.de>
* Franz Bettag <franz@bett.ag>
* Gabor Kovesdan
* Gabor Kovesdan <gabor@FreeBSD.org>
* Gabriel M. Dutra <0xdutra@gmail.com>
* Gary Hayers <Gary@Hayers.net>
* Gasol Wu <gasol.wu@gmail.com>
* Gea-Suan Lin <gslin@gslin.org>
* George Reid <greid@ukug.uk.freebsd.org>
* George Reid <services@nevernet.net>
* Greg Larkin <glarkin@FreeBSD.org>
* Greg V <greg@unrelenting.technology>
* Gregory Neil Shapiro <gshapiro@FreeBSD.org>
* Grzegorz Blach <gblach@FreeBSD.org>
* Guangyuan Yang <ygy@FreeBSD.org>
* Hakisho Nukama <nukama@gmail.com>
* Hammurabi Mendes <hmendes@brturbo.com>
* Henk van Oers <hvo.pm@xs4all.nl>
* Horia Racoviceanu <horia@racoviceanu.com>
* Hung-Yi Chen <gaod@hychen.org>
* Jaap Akkerhuis <jaap@NLnetLabs.nl>
* Jaap Boender <jaapb@kerguelen.org>
* Jacek Serwatynski <tutus@trynet.eu.org>
* James FitzGibbon <jfitz@FreeBSD.org>
* James Thomason <james@divide.org>
* Jan-Peter Koopmann <Jan-Peter.Koopmann@seceidos.de>
* Janky Jay <ek@purplehat.org>
* Janos Mohacsi
* Janos Mohacsi <janos.mohacsi@bsd.hu>
* Jean-Yves Lefort <jylefort@brutele.be>
* Jim Geovedi <jim@corebsd.or.id>
* Jim Ohlstein <jim@ohlste.in>
* Joe Clarke <marcus@marcuscom.com>
* Joe Marcus Clarke <marcus@FreeBSD.org>
* Johann Visagie <johann@egenetics.com>
* Johann Visagie <wjv@FreeBSD.org>
* John Ferrell <jdferrell3@yahoo.com>
* John Hixson <jhixson@gmail.com>
* John Polstra <jdp@polstra.com>
* John W. O'Brien <john@saltant.com>
* John-Mark Gurney <jmg@FreeBSD.org>
* Jose Alonso Cardenas Marquez <acardenas@bsd.org.pe>
* Joseph Benden <joe@thrallingpenguin.com>
* Joshua D. Abraham <jabra@ccs.neu.edu>
* Jov <amutu@amutu.com>
* Jui-Nan Lin <jnlin@freebsd.cs.nctu.edu.tw>
* Ka Ho Ng <khng300@gmail.com>
* Kay Lehmann <kay_lehmann@web.de>
* Keith J. Jones <kjones@antihackertoolkit.com>
* Kevin Zheng <kevinz5000@gmail.com>
* Kimura Fuyuki <fuyuki@hadaly.org>
* Kimura Fuyuki <fuyuki@mj.0038.net>
* Klayton Monroe <klm@uidzero.org>
* Konstantin Menshikov <kostjnspb@yandex.ru>
* Koop Mast <kwm@FreeBSD.org>
* Kris Kennaway <kris@FreeBSD.org>
* Kubilay Kocak <koobs@FreeBSD.org>
* Kurt Jaeger <fbsd-ports@opsec.eu>
* LEVAI Daniel <leva@ecentrum.hu>
* Lars Engels <lme@FreeBSD.org>
* Lars Thegler <lth@FreeBSD.org>
* Laurent LEVIER <llevier@argosnet.com>
* Luiz Eduardo R. Cordeiro
* Lukas Slebodnik <lukas.slebodnik@intrak.sk>
* Lukasz Komsta
* Mageirias Anastasios <anastmag@gmail.com>
* Marcel Prisi <marcel.prisi@virtua.ch>
* Marcello Coutinho
* Mario Sergio Fujikawa Ferreira <lioux@FreeBSD.org>
* Mark Felder <feld@FreeBSD.org>
* Mark Hannon <markhannon@optusnet.com.au>
* Mark Murray <markm@FreeBSD.org>
* Mark Pulford <mark@kyne.com.au>
* Marko Njezic <sf@maxempire.com>
* Martin Matuska <martin@tradex.sk>
* Martin Matuska <mm@FreeBSD.org>
* Martin Mersberger
* Martin Wilke <miwi@FreeBSD.org>
* Martti Kuparinen <martti.kuparinen@ericsson.com>
* Mateusz Piotrowski <0mp@FreeBSD.org>
* Matt <matt@xtaz.net>
* Matt Behrens <matt@zigg.com>
* Matthias Andree <mandree@FreeBSD.org>
* Matthias Fechner <mfechner@FreeBSD.org>
* Matthieu BOUTHORS <matthieu@labs.fr>
* Maxim Sobolev <sobomax@FreeBSD.org>
* Meno Abels <meno.abels@adviser.com>
* Michael Haro <mharo@FreeBSD.org>
* Michael Johnson <ahze@FreeBSD.org>
* Michael Nottebrock <lofi@FreeBSD.org>
* Michael Reifenberger <mr@FreeBSD.org>
* Michael Schout <mschout@gkg.net>
* Michal Bielicki <m.bielicki@llizardfs.com>
* Michiel van Baak <michiel@vanbaak.eu
* Mij <mij@bitchx.it>
* Mike Heffner <mheffner@vt.edu>
* Mikhail T. <m.tsatsenko@gmail.com>
* Mikhail Teterin <mi@aldan.algebra.com>
* Milan Obuch
* Mosconi <mosconi.rmg@gmail.com>
* Muhammad Moinur Rahman <5u623l20@gmail.com>
* Mustafa Arif <ma499@doc.ic.ac.uk>
* Neil Booth
* Neil Booth <kyuupichan@gmail.com>
* Nick Barkas <snb@threerings.net>
* Nicola Vitale <nivit@FreeBSD.org>
* Niels Heinen
* Nikola Kolev <koue@chaosophia.net>
* Nobutaka Mantani <nobutaka@FreeBSD.org>
* Oliver Lehmann
* Oliver Lehmann <oliver@FreeBSD.org>
* Olivier Duchateau
* Olivier Duchateau <duchateau.olivier@gmail.com>
* Olli Hauer
* Patrick Li <pat@databits.net>
* Paul Chvostek <paul@it.ca>
* Paul Schmehl <pauls@utdallas.edu>
* Pavel I Volkov <pavelivolkov@googlemail.com>
* Pete Fritchman <petef@databits.net>
* Peter Ankerstal <peter@pean.org>
* Peter Haight <peterh@sapros.com>
* Peter Johnson <johnson.peter@gmail.com>
* Peter Pentchev <roam@FreeBSD.org>
* Petr Rehor <rx@rx.cz>
* Philippe Audeoud <jadawin@tuxaco.net>
* Philippe Rocques <phil@teaser.fr>
* Piotr Kubaj <pkubaj@FreeBSD.org>
* Piotr Kubaj <pkubaj@anongoth.pl>
* Po-Chuan Hsieh <sunpoet@FreeBSD.org>
* RaRa Rasputin <rasputin@submonkey.net>
* Radim Kolar
* Ralf Meister
* Remington Lang <MrL0Lz@gmail.com>
* Renaud Chaput <renchap@cocoa-x.com>
* Roderick van Domburg <r.s.a.vandomburg@student.utwente.nl>
* Roland van Laar <roland@micite.net>
* Romain Tartiere <romain@blogreen.org>
* Roman Bogorodskiy
* Roman Bogorodskiy <novel@FreeBSD.org>
* Roman Shterenzon <roman@xpert.com>
* Rong-En Fan <rafan@FreeBSD.org>
* Ryan Steinmetz <zi@FreeBSD.org>
* Sahil Tandon <sahil@tandon.net>
* Sascha Holzleiter <sascha@root-login.org>
* SeaD
* Seamus Venasse <svenasse@polaris.ca>
* Sean Greven <sean.greven@gmail.com>
* Sebastian Schuetz <sschuetz@fhm.edu>
* Sergei Kolobov <sergei@FreeBSD.org>
* Sergei Kolobov <sergei@kolobov.com>
* Sergei Vyshenski
* Sergei Vyshenski <svysh.fbsd@gmail.com>
* Sergey Skvortsov <skv@protey.ru>
* Seth Kingsley <sethk@meowfishies.com>
* Shaun Amott <shaun@inerd.com>
* Simeon Simeonov <sgs@pichove.org>
* Simon Dick <simond@irrelevant.org>
* Sofian Brabez <sbrabez@gmail.com>
* Stanislav Sedov <ssedov@mbsd.msk.ru>
* Stefan Esser <se@FreeBSD.org>
* Stefan Grundmann
* Stefan Walter <sw@gegenunendlich.de>
* Stephon Chen <stephon@gmail.com>
* Steve Wills <steve@mouf.net>
* Steve Wills <swills@FreeBSD.org>
* Steven Kreuzer
* Steven Kreuzer <skreuzer@exit2shell.com>
* Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
* TAKAHASHI Kaoru <kaoru@kaisei.org>
* TAKATSU Tomonari <tota@FreeBSD.org>
* Tatsuki Makino <tatsuki_makino@hotmail.com>
* Thibault Payet <monwarez@mailoo.org>
* Thierry Thomas (<thierry@pompo.net>)
* Thierry Thomas <thierry@pompo.net>
* Thomas Hurst <tom@hur.st>
* Thomas Quinot <thomas@cuivre.fr.eu.org>
* Thomas Zander <riggs@FreeBSD.org>
* Thomas von Dein <freebsd@daemon.de>
* Tilman Linneweh <arved@FreeBSD.org>
* Tim Bishop <tim@bishnet.net>
* Tom Judge <tom@tomjudge.com>
* Tomoyuki Sakurai <cherry@trombik.org>
* Toni Viemerö <toni.viemero@iki.fi>
* Tony Maher
* Torsten Zuhlsdorff <ports@toco-domains.de>
* Travis Campbell <hcoyote@ghostar.org>
* Tsung-Han Yeh <snowfly@yuntech.edu.tw>
* Ulf Lilleengen
* Vaida Bogdan <vaida.bogdan@gmail.com>
* Valentin Zahariev <curly@e-card.bg>
* Valerio Daelli <valerio.daelli@gmail.com>
* Veniamin Gvozdikov <vg@FreeBSD.org>
* Victor Popov
* Victor Popov <v.a.popov@gmail.com>
* Vsevolod Stakhov
* Vsevolod Stakhov <vsevolod@FreeBSD.org>
* Wen Heping <wen@FreeBSD.org>
* Wen Heping <wenheping@gmail.com>
* Yarodin <yarodin@gmail.com>
* Yen-Ming Lee <leeym@FreeBSD.org>
* Yen-Ming Lee <leeym@cae.ce.ntu.edu.tw>
* Yen-Ming Lee <leeym@leeym.com>
* Ying-Chieh Liao <ijliao@FreeBSD.org>
* Yonatan <Yonatan@Xpert.com>
* Yonatan <onatan@gmail.com>
* Yoshisato YANAGISAWA
* Yuri Victorovich
* Yuri Victorovich <yuri@rawbw.com>
* Zach Thompson <hideo@lastamericanempire.com>
* Zane C. Bowers <vvelox@vvelox.net>
* Zeus Panchenko <zeus@gnu.org.ua>
* ache
* adamw
* ajk@iu.edu
* alex@FreeBSD.org
* allan@saddi.com
* alm
* andrej@ebert.su
* andrew@scoop.co.nz
* andy@fud.org.nz
* antoine@FreeBSD.org
* arved
* barner
* brix@FreeBSD.org
* buganini@gmail.com
* chinsan
* chris@still.whet.org
* clement
* clsung
* crow
* cy@FreeBSD.org
* dominik karczmarski <dominik@karczmarski.com>
* dwcjr@inethouston.net
* eivind
* erich@rrnet.com
* erwin@FreeBSD.org
* girgen@FreeBSD.org
* glen.j.barber@gmail.com
* hbo@egbok.com
* ijliao
* jesper
* jfitz
* johans
* joris
* kftseng@iyard.org
* kris@FreeBSD.org
* lx
* markm
* mharo@FreeBSD.org
* michaelnottebrock@gmx.net
* mnag@FreeBSD.org
* mp39590@gmail.com
* nbm
* nectar@FreeBSD.org
* nork@FreeBSD.org
* nork@cityfujisawa.ne.jp
* nsayer@FreeBSD.org
* nsayer@quack.kfu.com
* ntarmos@cs.uoi.gr
* oly
* onatan@gmail.com
* pandzilla
* patrick@mindstep.com
* pauls
* perl@FreeBSD.org
* petef@FreeBSD.org
* peter.thoenen@yahoo.com
* ports@c0decafe.net
* ports@rbt.ca
* roam@FreeBSD.org
* rokaz
* sada@FreeBSD.org
* scrappy
* se
* shane@freebsdhackers.net aka modsix@gmail.com
* snb@threerings.net
* sumikawa
* sviat
* teramoto@comm.eng.osaka-u.ac.jp
* thierry@pompo.net
* tobez@FreeBSD.org
* torstenb@FreeBSD.org
* trasz <trasz@pin.if.uz.zgora.pl>
* trevor
* truckman
* vanhu
* vanilla@
* wen@FreeBSD.org
* will
With hat: portmgr
857c05f |
Monday, 18 Jul 2022
|
15:00 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
9b33c75 |
Tuesday, 5 Jul 2022
|
14:29 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
5c6e041 |
Friday, 27 May 2022
|
13:45 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
5bd02be |
Saturday, 21 May 2022
|
13:38 Cy Schubert (cy)
security/krb5-devel: krb5-devel is in fact trackng 1.20 development
krb5-devel is in fact trackng 1.20 development, not 1.19.
ce8559c |
Thursday, 19 May 2022
|
22:30 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
6758495 |
Monday, 9 May 2022
|
18:00 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
858fdad |
Monday, 25 Apr 2022
|
15:50 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
9e7280a |
Monday, 21 Mar 2022
|
18:13 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
3e2a392 |
Monday, 14 Mar 2022
|
16:59 Cy Schubert (cy)
ecurity/krb5-devel: update to the latest MIT/KRB5 github commit
63689a8 |
Monday, 7 Mar 2022
|
15:43 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
258c864 |
Sunday, 27 Feb 2022
|
22:27 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
282f47b |
Wednesday, 2 Feb 2022
|
16:26 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
2c07962 |
Friday, 14 Jan 2022
|
15:57 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
b0baa18 |
Monday, 10 Jan 2022
|
15:15 Stefan Eßer (se)
Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.
This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.
Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port
cannot conflict with itself (due to logic in bsd.port.mk that
supresses the pattern match result in that case).
A few ports that set the conflicts variables depending on complex
conditions (e.g. port options), have been left unmodified, despite
probably containing outdated package names.
These changes should only affect the installation of locally built
ports, not the package building with poudriere. They should give an
early indication of the install conflict in cases where currently
the pkg command aborts an installation when it detects that an
existing file would be overwritten,
Approved by: portmgr (implicit)
bcaf25a |
Tuesday, 4 Jan 2022
|
01:16 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
d08481e |
Monday, 13 Dec 2021
|
14:37 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
b963e2d |
Monday, 29 Nov 2021
|
20:55 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
e264aad |
Monday, 8 Nov 2021
|
18:57 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
aa6d4c5 |
Monday, 1 Nov 2021
|
16:46 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
f1789504 |
Friday, 29 Oct 2021
|
09:50 Stefan Eßer (se)
*/*: Remove redundant '-[0-9]*' from CONFLICTS
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Many CONFLICTS definitions used patterns like "bash-[0-9]*" to filter
for the bash package in any version. But that pattern is functionally
identical with just "bash".
Approved by: portmgr (blanket)
819f25b |
Monday, 18 Oct 2021
|
17:14 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
d4cc1ef |
Thursday, 30 Sep 2021
|
21:23 Rene Ladan (rene)
cleanup: drop support for EOL FreeBSD 11.X
Search criteria used:
- 11.4
- OSREL*
- OSVER*
- *_FreeBSD_11
Input from:
- adridg: devel/qca-legacy
- jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds
- sunpoet: security/p5-*OpenSSL*
Reviewed by: doceng, kde, multimedia, perl, python, ruby, rust
Differential Revision: https://reviews.freebsd.org/D32008
Test Plan: make index
620968a |
Tuesday, 28 Sep 2021
|
14:33 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
897f9e4 |
Monday, 13 Sep 2021
|
16:09 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
a00085a |
Monday, 30 Aug 2021
|
17:06 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
a107ca9 |
Saturday, 21 Aug 2021
|
14:49 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
6d931e8 |
Monday, 9 Aug 2021
|
20:15 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
09955ac |
Wednesday, 21 Jul 2021
|
21:17 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
788aafd |
Monday, 12 Jul 2021
|
22:26 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
8e65299 |
Monday, 5 Jul 2021
|
15:23 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
046fed1 |
Monday, 21 Jun 2021
|
14:17 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
9452147 |
Tuesday, 15 Jun 2021
|
16:29 Cy Schubert (cy)
security/krb5-devel: Broken on FreeBSD-11, OpenSSL 1.0.2 not supported
security/krb5-devel fails to build on FreeBSD-11 due to:
main.c:1593:5: error: implicit declaration of function 'OPENSSL_clear_free'
is invalid in C99 [-Werror,-Wimplicit-function-declaration]
OPENSSL_clear_free(buffer, buffer_len);
5ccbdb8 |
Monday, 14 Jun 2021
|
16:04 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
d69a288 |
Thursday, 3 Jun 2021
|
15:01 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit
a989dee |
Monday, 17 May 2021
|
16:54 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit.
45ffb6d |
Saturday, 15 May 2021
|
07:14 Tobias Kortkamp (tobik) Author: Yasuhiro Kimura
*: Remove unnecessary 'port' argument from USES=readline
PR: 248459
Exp-run by: antoine
9671981 |
Monday, 12 Apr 2021
|
18:23 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit.
ca8ddb9 |
Wednesday, 7 Apr 2021
|
06:50 Cy Schubert (cy)
security/krb5-devel: update to the latest MIT/KRB5 github commit.
8c8b1db |
Tuesday, 6 Apr 2021
|
14:31 Mathieu Arnold (mat)
Remove # $FreeBSD$ from Makefiles.
305f148 |
Monday, 29 Mar 2021
|
18:14 cy
security/krb5-devel: update to the latest MIT/KRB5 github commit.
|
Monday, 22 Mar 2021
|
18:40 cy
security/krb5-devel: update to the latest MIT/KRB5 github commit.
|
Monday, 15 Mar 2021
|
19:37 cy
security/krb5-devel: update to the latest MIT/KRB5 github commit.
|
Friday, 5 Mar 2021
|
15:47 cy
security/krb5-devel: update to the latest MIT/KRB5 github commit.
|
Monday, 1 Mar 2021
|
19:08 cy
security/krb5-devel: update to the latest MIT/KRB5 github commit.
|
Friday, 19 Feb 2021
|
15:31 cy
security/krb5-devel: update to the latest MIT/KRB5 github commit.
|
Tuesday, 16 Feb 2021
|
17:40 cy
Update to the latest MIT/KRB5 commit on github.
|
Tuesday, 2 Feb 2021
|
05:01 cy
Update to the latest MIT KRB5 commit on github.
|
Sunday, 24 Jan 2021
|
03:36 cy
Update to the latest MIT KRB5 commit on github.
This commit captures KRB5-1.19-beta2. The beta2 announcement on
krbdev is as follows:
MIT krb5-1.19-beta2 is now available for download from
https://web.mit.edu/kerberos/dist/testing.html
The main MIT Kerberos web page is
https://web.mit.edu/kerberos/
Please send comments to the krbdev list. We plan for the final
release to occur in about one month. The README file contains a more
extensive list of changes.
Major changes in 1.19
---------------------
Administrator experience:
* When a client keytab is present, the GSSAPI krb5 mech will refresh
credentials even if the current credentials were acquired manually.
* It is now harder to accidentally delete the K/M entry from a KDB.
Developer experience:
* gss_acquire_cred_from() now supports the "password" and "verify"
options, allowing credentials to be acquired via password and
verified using a keytab key.
* When an application accepts a GSS security context, the new
GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
both provided matching channel bindings.
* Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self
requests to identify the desired client principal by certificate.
* PKINIT certauth modules can now cause the hw-authent flag to be set
in issued tickets.
* The krb5_init_creds_step() API will now issue the same password
expiration warnings as krb5_get_init_creds_password().
Protocol evolution:
* Added client and KDC support for Microsoft's Resource-Based
Constrained Delegation, which allows cross-realm S4U2Proxy requests.
A third-party database module is required for KDC support.
* kadmin/admin is now the preferred server principal name for kadmin
connections, and the host-based form is no longer created by
default. The client will still try the host-based form as a
fallback.
* Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
extension, which causes channel bindings to be required for the
initiator if the acceptor provided them. The client will send this
option if the client_aware_gss_bindings profile option is set.
User experience:
* kinit will now issue a warning if the des3-cbc-sha1 encryption type
is used in the reply. This encryption type will be deprecated and
removed in future releases.
* Added kvno flags --out-cache, --no-store, and --cached-only
(inspired by Heimdal's kgetcred).
|
Monday, 4 Jan 2021
|
19:40 cy
Update to the latest MIT KRB5 commit on github.
|
Tuesday, 1 Dec 2020
|
04:26 cy
Update to the latest MIT KRB5 commit on github.
This commit captures KRB5-1.19-beta. The beta announcement on
krbdev is as follows:
MIT krb5-1.19-beta1 is now available for download from
https://web.mit.edu/kerberos/dist/testing.html
The main MIT Kerberos web page is
https://web.mit.edu/kerberos/
Please send comments to the krbdev list. We plan for the final
release to occur in about one month. The README file contains a more
extensive list of changes.
Major changes in 1.19
---------------------
Administrator experience:
* When a client keytab is present, the GSSAPI krb5 mech will refresh
credentials even if the current credentials were acquired manually.
* It is now harder to accidentally delete the K/M entry from a KDB.
Developer experience:
* gss_acquire_cred_from() now supports the "password" and "verify"
options, allowing credentials to be acquired via password and
verified using a keytab key.
* When an application accepts a GSS security context, the new
GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
both provided matching channel bindings.
* Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self
requests to identify the desired client principal by certificate.
* PKINIT certauth modules can now cause the hw-authent flag to be set
in issued tickets.
* The krb5_init_creds_step() API will now issue the same password
expiration warnings as krb5_get_init_creds_password().
Protocol evolution:
* Added client and KDC support for Microsoft's Resource-Based
Constrained Delegation, which allows cross-realm S4U2Proxy requests.
A third-party database module is required for KDC support.
* kadmin/admin is now the preferred server principal name for kadmin
connections, and the host-based form is no longer created by
default. The client will still try the host-based form as a
fallback.
* Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
extension, which causes channel bindings to be required for the
initiator if the acceptor provided them. The client will send this
option if the client_aware_gss_bindings profile option is set.
User experience:
* The default setting of dns_canonicalize_realm is now "fallback".
Hostnames provided from applications will be tried in principal
names as given (possibly with shortname qualification), falling back
to the canonicalized name.
* kinit will now issue a warning if the des3-cbc-sha1 encryption type
is used in the reply. This encryption type will be deprecated and
removed in future releases.
* Added kvno flags --out-cache, --no-store, and --cached-only
(inspired by Heimdal's kgetcred).
|
Tuesday, 24 Nov 2020
|
04:47 cy
Update to the latest MIT KRB5 commit on github.
|
Saturday, 14 Nov 2020
|
05:59 cy
Update to the latest MIT KRB5 commit on github.
|
Wednesday, 4 Nov 2020
|
04:46 cy
Update to the latest MIT KRB5 commit on github.
|
Monday, 26 Oct 2020
|
16:15 cy
Update to the latest MIT KRB5 commit on github.
|
Monday, 19 Oct 2020
|
21:08 cy
Update to the latest MIT KRB5 commit on github.
|
Thursday, 1 Oct 2020
|
05:27 cy
Update to the latest MIT KRB5 commit on github.
|
Thursday, 24 Sep 2020
|
00:55 cy
Update to the latest MIT KRB5 commit on github.
|
Number of commits found: 180 (showing only 100 on this page) |