[CVS] OpenPKG: openpkg-src/pnetlib/ pnetlib.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:38:29 Branch: HEAD Handle: 2004031307382800 Modified files: openpkg-src/pnetlib pnetlib.spec Log: upgrading package: pnetlib 0.6.2 -> 0.6.4 Summary: RevisionChanges Path 1.18+3 -3 openpkg-src/pnetlib/pnetlib.spec patch -p0 <<'@@ .' Index: openpkg-src/pnetlib/pnetlib.spec $ cvs diff -u -r1.17 -r1.18 pnetlib.spec --- openpkg-src/pnetlib/pnetlib.spec 7 Feb 2004 17:58:00 - 1.17 +++ openpkg-src/pnetlib/pnetlib.spec 13 Mar 2004 07:38:28 - 1.18 @@ -33,8 +33,8 @@ Class:PLUS Group:Language License: GPL -Version: 0.6.2 -Release: 20040207 +Version: 0.6.4 +Release: 20040313 # list of sources Source0: http://www.southern-storm.com.au/download/pnetlib-%{version}.tar.gz @@ -42,7 +42,7 @@ # build information Prefix: %{l_prefix} BuildRoot:%{l_buildroot} -BuildPreReq: OpenPKG, openpkg >= 20040130, gcc, make, treecc, pnet >= 0.6.2 +BuildPreReq: OpenPKG, openpkg >= 20040130, gcc, make, treecc, pnet >= 0.6.4 PreReq: OpenPKG, openpkg >= 20040130 BuildPreReq: pnet PreReq: pnet @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/pnet/ pnet.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:35:09 Branch: HEAD Handle: 2004031307350900 Modified files: openpkg-src/pnetpnet.spec Log: upgrading package: pnet 0.6.2 -> 0.6.4 Summary: RevisionChanges Path 1.14+2 -2 openpkg-src/pnet/pnet.spec patch -p0 <<'@@ .' Index: openpkg-src/pnet/pnet.spec $ cvs diff -u -r1.13 -r1.14 pnet.spec --- openpkg-src/pnet/pnet.spec7 Feb 2004 17:58:00 - 1.13 +++ openpkg-src/pnet/pnet.spec13 Mar 2004 07:35:09 - 1.14 @@ -33,8 +33,8 @@ Class:PLUS Group:Language License: GPL -Version: 0.6.2 -Release: 20040207 +Version: 0.6.4 +Release: 20040313 # package options %option with_threads no @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/vim/ vim.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:34:22 Branch: HEAD Handle: 2004031307342200 Modified files: openpkg-src/vim vim.spec Log: upgrading package: vim 6.2.346 -> 6.2.351 Summary: RevisionChanges Path 1.297 +7 -2 openpkg-src/vim/vim.spec patch -p0 <<'@@ .' Index: openpkg-src/vim/vim.spec $ cvs diff -u -r1.296 -r1.297 vim.spec --- openpkg-src/vim/vim.spec 12 Mar 2004 07:32:59 - 1.296 +++ openpkg-src/vim/vim.spec 13 Mar 2004 07:34:22 - 1.297 @@ -26,7 +26,7 @@ # package versions %define V_vl 6.2 %define V_vs 62 -%define V_pl 346 +%define V_pl 351 # package information Name: vim @@ -39,7 +39,7 @@ Group:Editor License: Charityware Version: %{V_vl}.%{V_pl} -Release: 20040312 +Release: 20040313 # package options %option with_x11no @@ -401,6 +401,11 @@ Patch344: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.344 Patch345: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.345 Patch346: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.346 +Patch347: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.347 +Patch348: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.348 +Patch349: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.349 +Patch350: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.350 +Patch351: ftp://ftp.vim.org/pub/vim/patches/%{V_vl}.351 # build information Prefix: %{l_prefix} @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/subversion/ subversion.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:33:09 Branch: HEAD Handle: 2004031307330900 Modified files: openpkg-src/subversion subversion.spec Log: upgrading package: subversion 1.0.0 -> 1.0.1 Summary: RevisionChanges Path 1.46+3 -3 openpkg-src/subversion/subversion.spec patch -p0 <<'@@ .' Index: openpkg-src/subversion/subversion.spec $ cvs diff -u -r1.45 -r1.46 subversion.spec --- openpkg-src/subversion/subversion.spec12 Mar 2004 08:13:44 - 1.45 +++ openpkg-src/subversion/subversion.spec13 Mar 2004 07:33:09 - 1.46 @@ -24,8 +24,8 @@ ## # package version -%define V_dist 1.0.0 -%define V_opkg 1.0.0 +%define V_dist 1.0.1 +%define V_opkg 1.0.1 # package information Name: subversion @@ -38,7 +38,7 @@ Group:SCM License: Apache/BSD Version: %{V_opkg} -Release: 20040312 +Release: 20040313 # package options %option with_cvs2svn no @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/treecc/ treecc.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:30:16 Branch: HEAD Handle: 2004031307301500 Modified files: openpkg-src/treecc treecc.spec Log: upgrading package: treecc 0.2.8 -> 0.3.0 Summary: RevisionChanges Path 1.22+2 -2 openpkg-src/treecc/treecc.spec patch -p0 <<'@@ .' Index: openpkg-src/treecc/treecc.spec $ cvs diff -u -r1.21 -r1.22 treecc.spec --- openpkg-src/treecc/treecc.spec7 Feb 2004 17:59:28 - 1.21 +++ openpkg-src/treecc/treecc.spec13 Mar 2004 07:30:15 - 1.22 @@ -33,8 +33,8 @@ Class:PLUS Group:Language License: GPL -Version: 0.2.8 -Release: 20040207 +Version: 0.3.0 +Release: 20040313 # list of sources Source0: http://www.southern-storm.com.au/download/treecc-%{version}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/pgautodoc/ pgautodoc.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:29:49 Branch: HEAD Handle: 2004031307294800 Modified files: openpkg-src/pgautodoc pgautodoc.spec Log: upgrading package: pgautodoc 1.21 -> 1.22 Summary: RevisionChanges Path 1.17+2 -2 openpkg-src/pgautodoc/pgautodoc.spec patch -p0 <<'@@ .' Index: openpkg-src/pgautodoc/pgautodoc.spec $ cvs diff -u -r1.16 -r1.17 pgautodoc.spec --- openpkg-src/pgautodoc/pgautodoc.spec 7 Feb 2004 17:57:52 - 1.16 +++ openpkg-src/pgautodoc/pgautodoc.spec 13 Mar 2004 07:29:48 - 1.17 @@ -33,8 +33,8 @@ Class:PLUS Group:Misc License: BSD -Version: 1.21 -Release: 20040207 +Version: 1.22 +Release: 20040313 # list of sources Source0: http://www.rbt.ca/autodoc/binaries/postgresql_autodoc-%{version}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/perl-parse/ perl-parse.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:29:47 Branch: HEAD Handle: 2004031307294600 Modified files: openpkg-src/perl-parse perl-parse.spec Log: modifying package: perl-parse-5.8.3 20040311 -> 20040313 Summary: RevisionChanges Path 1.82+2 -2 openpkg-src/perl-parse/perl-parse.spec patch -p0 <<'@@ .' Index: openpkg-src/perl-parse/perl-parse.spec $ cvs diff -u -r1.81 -r1.82 perl-parse.spec --- openpkg-src/perl-parse/perl-parse.spec11 Mar 2004 09:31:44 - 1.81 +++ openpkg-src/perl-parse/perl-parse.spec13 Mar 2004 07:29:46 - 1.82 @@ -26,7 +26,7 @@ # versions of individual parts %define V_perl 5.8.3 %define V_config_inifiles 2.38 -%define V_config_general2.25 +%define V_config_general2.26 %define V_config_simple 4.55 %define V_parse_recdescent 1.94 %define V_parse_recdescent_faq 3.9 @@ -47,7 +47,7 @@ Group:Language License: GPL/Artistic Version: %{V_perl} -Release: 20040311 +Release: 20040313 # list of sources Source0: http://www.cpan.org/modules/by-module/Config/Config-IniFiles-%{V_config_inifiles}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/valgrind/ valgrind.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:29:45 Branch: HEAD Handle: 2004031307294500 Modified files: openpkg-src/valgrindvalgrind.spec Log: upgrading package: valgrind 2.1.0 -> 2.1.1 Summary: RevisionChanges Path 1.18+2 -2 openpkg-src/valgrind/valgrind.spec patch -p0 <<'@@ .' Index: openpkg-src/valgrind/valgrind.spec $ cvs diff -u -r1.17 -r1.18 valgrind.spec --- openpkg-src/valgrind/valgrind.spec7 Feb 2004 17:59:41 - 1.17 +++ openpkg-src/valgrind/valgrind.spec13 Mar 2004 07:29:45 - 1.18 @@ -35,8 +35,8 @@ Class:JUNK Group:Development License: Development -Version: 2.1.0 -Release: 20040207 +Version: 2.1.1 +Release: 20040313 # list of sources Source0: http://developer.kde.org/~sewardj/valgrind-%{version}.tar.bz2 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/perl-dbi/ perl-dbi.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:29:39 Branch: HEAD Handle: 2004031307293900 Modified files: openpkg-src/perl-dbiperl-dbi.spec Log: modifying package: perl-dbi-5.8.3 20040312 -> 20040313 Summary: RevisionChanges Path 1.98+2 -2 openpkg-src/perl-dbi/perl-dbi.spec patch -p0 <<'@@ .' Index: openpkg-src/perl-dbi/perl-dbi.spec $ cvs diff -u -r1.97 -r1.98 perl-dbi.spec --- openpkg-src/perl-dbi/perl-dbi.spec12 Mar 2004 07:42:01 - 1.97 +++ openpkg-src/perl-dbi/perl-dbi.spec13 Mar 2004 07:29:39 - 1.98 @@ -25,7 +25,7 @@ # versions of individual parts %define V_perl 5.8.3 -%define V_dbi1.41 +%define V_dbi1.42 %define V_sql_statement 1.005 %define V_dbd_anydata0.06 %define V_dbd_sprite 0.50 @@ -46,7 +46,7 @@ Group:Language License: GPL/Artistic Version: %{V_perl} -Release: 20040312 +Release: 20040313 # package options %option with_dbd_mysql no @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/lwc/ lwc.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:28:36 Branch: HEAD Handle: 2004031307283600 Modified files: openpkg-src/lwc lwc.spec Log: upgrading package: lwc 1.0 -> 1.1 Summary: RevisionChanges Path 1.6 +2 -2 openpkg-src/lwc/lwc.spec patch -p0 <<'@@ .' Index: openpkg-src/lwc/lwc.spec $ cvs diff -u -r1.5 -r1.6 lwc.spec --- openpkg-src/lwc/lwc.spec 7 Feb 2004 17:56:28 - 1.5 +++ openpkg-src/lwc/lwc.spec 13 Mar 2004 07:28:36 - 1.6 @@ -33,8 +33,8 @@ Class:PLUS Group:Compiler License: Freeware -Version: 1.0 -Release: 20040207 +Version: 1.1 +Release: 20040313 # list of sources Source0: http://students.ceid.upatras.gr/~sxanth/lwc/lwc-%{version}.tar.bz2 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/coreutils/ coreutils.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:28:06 Branch: HEAD Handle: 2004031307280600 Modified files: openpkg-src/coreutils coreutils.spec Log: upgrading package: coreutils 5.2.0 -> 5.2.1 Summary: RevisionChanges Path 1.38+2 -2 openpkg-src/coreutils/coreutils.spec patch -p0 <<'@@ .' Index: openpkg-src/coreutils/coreutils.spec $ cvs diff -u -r1.37 -r1.38 coreutils.spec --- openpkg-src/coreutils/coreutils.spec 20 Feb 2004 08:01:22 - 1.37 +++ openpkg-src/coreutils/coreutils.spec 13 Mar 2004 07:28:06 - 1.38 @@ -25,7 +25,7 @@ # package version %define V_alpha 5.1.3 -%define V_release 5.2.0 +%define V_release 5.2.1 # package information Name: coreutils @@ -38,7 +38,7 @@ Group:Utility License: GPL Version: %{V_release} -Release: 20040220 +Release: 20040313 # package options %option with_legacy no @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/postfix/ postfix.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:28:02 Branch: HEAD Handle: 2004031307280200 Modified files: openpkg-src/postfix postfix.spec Log: upgrading package: postfix 2.0.18 -> 2.0.19 Summary: RevisionChanges Path 1.196 +2 -2 openpkg-src/postfix/postfix.spec patch -p0 <<'@@ .' Index: openpkg-src/postfix/postfix.spec $ cvs diff -u -r1.195 -r1.196 postfix.spec --- openpkg-src/postfix/postfix.spec 11 Mar 2004 11:13:32 - 1.195 +++ openpkg-src/postfix/postfix.spec 13 Mar 2004 07:28:02 - 1.196 @@ -24,7 +24,7 @@ ## # package versions -%define V_postfix 2.0.18 +%define V_postfix 2.0.19 %define V_tls 0.8.16-2.0.18-0.9.7c %define V_pflogsumm1.1.0 %define V_whoson 2.0.0.2 @@ -40,7 +40,7 @@ Group:Mail License: IPL Version: %{V_postfix} -Release: 20040311 +Release: 20040313 # package options %option with_fsl yes @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/gqview/ gqview.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:26:30 Branch: HEAD Handle: 2004031307263000 Modified files: openpkg-src/gqview gqview.spec Log: upgrading package: gqview 1.4.1 -> 1.5.0 Summary: RevisionChanges Path 1.13+2 -2 openpkg-src/gqview/gqview.spec patch -p0 <<'@@ .' Index: openpkg-src/gqview/gqview.spec $ cvs diff -u -r1.12 -r1.13 gqview.spec --- openpkg-src/gqview/gqview.spec2 Mar 2004 15:27:12 - 1.12 +++ openpkg-src/gqview/gqview.spec13 Mar 2004 07:26:30 - 1.13 @@ -33,8 +33,8 @@ Class:EVAL Group:Graphics License: GPL -Version: 1.4.1 -Release: 20040302 +Version: 1.5.0 +Release: 20040313 # list of sources Source0: http://osdn.dl.sourceforge.net/sourceforge/gqview/gqview-%{version}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/multitail/ multitail.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:25:20 Branch: HEAD Handle: 2004031307252000 Modified files: openpkg-src/multitail multitail.spec Log: upgrading package: multitail 3.1.2 -> 3.1.3 Summary: RevisionChanges Path 1.47+2 -2 openpkg-src/multitail/multitail.spec patch -p0 <<'@@ .' Index: openpkg-src/multitail/multitail.spec $ cvs diff -u -r1.46 -r1.47 multitail.spec --- openpkg-src/multitail/multitail.spec 9 Mar 2004 09:46:10 - 1.46 +++ openpkg-src/multitail/multitail.spec 13 Mar 2004 07:25:20 - 1.47 @@ -33,8 +33,8 @@ Class:EVAL Group:Terminal License: GPL -Version: 3.1.2 -Release: 20040309 +Version: 3.1.3 +Release: 20040313 # list of sources Source0: http://www.vanheusden.com/multitail/multitail-%{version}.tgz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/lsof/ lsof.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 13-Mar-2004 08:25:05 Branch: HEAD Handle: 2004031307250400 Modified files: openpkg-src/lsoflsof.spec Log: upgrading package: lsof 4.70 -> 4.71 Summary: RevisionChanges Path 1.42+2 -2 openpkg-src/lsof/lsof.spec patch -p0 <<'@@ .' Index: openpkg-src/lsof/lsof.spec $ cvs diff -u -r1.41 -r1.42 lsof.spec --- openpkg-src/lsof/lsof.spec7 Feb 2004 17:56:26 - 1.41 +++ openpkg-src/lsof/lsof.spec13 Mar 2004 07:25:04 - 1.42 @@ -33,8 +33,8 @@ Class:BASE Group:Filesystem License: BSD -Version: 4.70 -Release: 20040207 +Version: 4.71 +Release: 20040313 # list of sources Source0: ftp://lsof.itap.purdue.edu/pub/tools/unix/lsof/lsof_%{version}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[OpenPKG] Version Tracking Report (2004-03-13 07:40)
OpenPKG Version Tracking Report === Reporting Time:2004-03-13 07:40 Tracking Duration: 0:30:24 (H:M:S) Tracking Input:1023 sources (701 packages) Tracking Result: 967 up-to-date, 25 out-dated, 31 error The following 25 sources were determined to be out-dated because newer vendor versions were found. Upgrade the corresponding OpenPKG packages. - - - Package Old Version New Version - - - coreutils:release 5.2.0 5.2.1 gqview1.4.1 1.5.0 kde-arts 1.1.4 1.2.1 kde-base 3.1.4 3.2.1 kde-libs 3.1.4 3.2.1 lsof 4.70 4.71 lwc 1.0 1.1 mozilla-mplayer 1.2 2.45 multitail 3.1.2 3.1.3 perl-dbi:DBI 1.41 1.42 perl-parse:Config-General 2.25 2.26 perl-util:Devel-StackTrace 1.05 1.10 [1] pgautodoc 1.21 1.22 pnet 0.6.2 0.6.4 pnetlib 0.6.2 0.6.4 postfix 2.0.182.0.19 rt3-0-8 3-0-9 rt:locale-maketext-lexicon 0.34 0.35 subversion1.0.0 1.0.1 synaptic 0.47 0.48.1[2] tar 1.13.92 1.13.93 [3] treecc0.2.8 0.3.0 valgrind 2.1.0 2.1.1 vim:patchlevel6.2.346 6.2.351 wine 20040213 20040309 - - - [1] perl-util:Devel-StackTrace: rse: 1.07 already required Module::Build! [2] synaptic: rse. savannah.nongnu.org partly down [3] tar: rse: 1.13.93: build failures related to iconv The following 31 sources could not be successfully checked because an error occurred while processing. Keep at least an eye on them. - - - Package Old Version Error - - - a2ps 4.13b connection failed or ti.. cocor 17connection failed or ti.. db4.2.52connection failed or ti.. db:patch 4.2.52.2 1st connection failed o.. firefox 0.8 2nd connection failed o.. flex:release 2.5.4aconnection failed or ti.. glimpse 4.17.4latest version online [1] kde-qt3.2.3 connection failed or ti.. less 382 latest version online l.. libart2.3.162nd connection failed o.. lyx:xforms1.0 2nd regex didn't matc [2] lzop 1.01 regex didn't match (pro.. m41.4o connection failed or ti.. max 7.4.2 regex didn't match (p [3] mirror2.9 connection failed or ti.. newsyslog 1.1 connection failed or ti.. newt 0.51.6-2.1.1 connection failed or ti.. nspr 4.4.1 1st connection failed o.. ocaml 3.07pl2 regex didn't match (pro.. patch:alpha 2.5.9 connection failed or ti.. pgpdump 0.22 connection failed or ti.. pound 1.6 connection failed or ti.. rc1.7.1 connection failed or ti.. rdist 7.0.0-alpha10 connection failed or ti.. smtpfeed 1.18 connection failed or [4] top 3.5beta12.10 connection failed or ti.. unarj 2.65 latest version online l.. unarj:patch 2.65-1latest vers
[CONTRIB] ACCEPT: zope-2.7.0-20040311.src.rpm
The following OpenPKG Contribution Area operation occurred. uploaded RPM file "zope-2.7.0-20040311.src.rpm" accepted -- moved to contrib area. No action is required on your part. Information about zope-2.7.0-20040311.src.rpm follows: | Name: zope Source RPM: (none) | Version: 2.7.0 Signature: md5:26043c909d2072d835f19ab4961ed224 | Release: 20040311 Build Host: menudo.zope.com | Group:Web Build System: ix86-rhl9 | Class:PLUS Build Time: Sat Mar 13 03:30:10 2004 | Distrib: OpenPKG Install Time: (not installed) | License: Zope Public License Install Size: 2743750 bytes | Packager: The OpenPKG Project Relocations: (not relocateable) | Vendor: Zope Corporation | Summary: Content Management System and Application Server | URL: http://www.zope.org/ | Description: | Zope is the leading Open Source web application server. Zope enables | teams to collaborate in the creation and management of dynamic | web-based business applications such as intranets and portals. | Zope makes it easy to build features such as site search, news, | personalization, and e-commerce into your web applications. | Files: | -rw-r--r-- 1 cwcw 2733236 Feb 11 23:34 Zope-2.7.0.tgz | -rw-r--r-- 1 cwcw1735 Mar 13 03:22 rc.zope | -rwxr-xr-x 1 cwcw 326 Mar 13 00:16 runzope | -rw-r--r-- 1 cwcw2328 Mar 13 02:55 zope.conf | -rw-r--r-- 1 cwcw5801 Mar 13 02:57 zope.spec | -rwxr-xr-x 1 cwcw 324 Mar 13 00:16 zopectl __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]
rc scripting question
I have finally figured out why the default OpenPKG install of Zope 2.6.4 is flaky. Zope's driver script takes a command-line argument, "-d ", which it will use to do reverse lookups of request IPs during access logging. The default for the value is 'localhost'; you can suppress the lookup altogether by passing an empty string as the argument, e.g.; $ python z2.py d '' I can't figure out how to get that through the layers of indirection in the rc script's quoting, however; the quote marks seem to be stripped out of the argument value I am storing them. The rc.zope script does this: %config # snipped zope_dns_host="''" %common # snipped zope_opts="-d $zope_dns_host" # snipped zope_args="$zope_servers $zope_opts $zope_env" %start -p 400 -u cw-r rcService zope enable yes || exit 0 rcService zope active yes && exit 0 export SOFTWARE_HOME=$zope_software_home export INSTANCE_HOME=$zope_instance_home export PYTHONPATH=$SOFTWARE_HOME /opt/cw/bin/python /opt/cw/libexec/zope/z2.py $zope_args Does anyone have a clue how I can get the quotes preserved? I have tried doubling them, and quoting them with backslash, to no avail. The only workarounds at the moment are to hammer "-d ''" into the last line of the start stanza manually, or else to define a non-blank $zope_dns_host. Tres. -- === Tres Seaver[EMAIL PROTECTED] Zope Corporation "Zope Dealers" http://www.zope.com __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]
[OpenPKG] Version Tracking Report (2004-03-12 19:42)
OpenPKG Version Tracking Report === Reporting Time:2004-03-12 19:42 Tracking Duration: 0:31:14 (H:M:S) Tracking Input:1023 sources (701 packages) Tracking Result: 974 up-to-date, 16 out-dated, 33 error The following 16 sources were determined to be out-dated because newer vendor versions were found. Upgrade the corresponding OpenPKG packages. - - - Package Old Version New Version - - - gqview1.4.1 1.5.0 kde-arts 1.1.4 1.2.1 kde-base 3.1.4 3.2.1 kde-libs 3.1.4 3.2.1 lsof 4.70 4.71 lwc 1.0 1.1 mozilla-mplayer 1.2 2.45 multitail 3.1.2 3.1.3 perl-dbi:DBI 1.41 1.42 perl-util:Devel-StackTrace 1.05 1.10 [1] rt3-0-8 3-0-9 rt:locale-maketext-lexicon 0.34 0.35 synaptic 0.47 0.48.1[2] tar 1.13.92 1.13.93 [3] wine 20040213 20040309 zoem 04-06604-072 - - - [1] perl-util:Devel-StackTrace: rse: 1.07 already required Module::Build! [2] synaptic: rse. savannah.nongnu.org partly down [3] tar: rse: 1.13.93: build failures related to iconv The following 33 sources could not be successfully checked because an error occurred while processing. Keep at least an eye on them. - - - Package Old Version Error - - - a2ps 4.13b connection failed or ti.. cocor 17connection failed or ti.. firefox 0.8 2nd connection failed o.. flex:release 2.5.4aconnection failed or ti.. glimpse 4.17.4latest version online [1] gnupg 1.2.4 connection failed or ti.. kde-qt3.2.3 connection failed or ti.. less 382 latest version online l.. libart2.3.162nd connection failed o.. lyx:xforms1.0 2nd regex didn't matc [2] lzop 1.01 regex didn't match (pro.. max 7.4.2 regex didn't match (p [3] mirror2.9 connection failed or ti.. mutt151.5.6iconnection failed or ti.. newsyslog 1.1 connection failed or ti.. nspr 4.4.1 1st connection failed o.. ocaml 3.07pl2 regex didn't match (pro.. patch:alpha 2.5.9 connection failed or ti.. pgp 6.5.8 connection failed or ti.. pgpdump 0.22 connection failed or ti.. rdist 7.0.0-alpha10 connection failed or ti.. smtpfeed 1.18 connection failed or [4] top 3.5beta12.10 connection failed or ti.. unarj 2.65 latest version online l.. unarj:patch 2.65-1latest version online l.. vcheck1.2.1 regex didn't match (p [5] vim:patchlevel6.2.346 connection failed or ti.. vim:rt1 6.2 connection failed or ti.. vim:rt2 6.2 connection failed or ti.. vim:src1 6.2 connection failed or ti.. vim:src2 6.2 connection failed or ti.. xalan 2_5_1 regex didn't match (pro.. yodl 1.31.18 connection failed or ti.. - - - [1] glimpse: rse: website still does not
[CVS] OpenPKG: openpkg-re/ todo.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-re Date: 12-Mar-2004 19:38:46 Branch: HEAD Handle: 2004031218384500 Modified files: openpkg-re todo.txt Log: papyrus looks interesting Summary: RevisionChanges Path 1.197 +1 -0 openpkg-re/todo.txt patch -p0 <<'@@ .' Index: openpkg-re/todo.txt $ cvs diff -u -r1.196 -r1.197 todo.txt --- openpkg-re/todo.txt 25 Feb 2004 16:19:08 - 1.196 +++ openpkg-re/todo.txt 12 Mar 2004 18:38:45 - 1.197 @@ -328,6 +328,7 @@ 3. PERHAPS: + - [rse] papyrus - http://papyrus.treshna.com/ - [rse] dcc - http://www.rhyolite.com/anti-spam/dcc/ - [mhe] awstats - http://awstats.sourceforge.net/ - [rse] openpksd- http://openpksd.org/ @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/zoem/ zoem.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 19:32:30 Branch: HEAD Handle: 2004031218323000 Modified files: openpkg-src/zoemzoem.spec Log: upgrading package: zoem 04.066 -> 04.072 Summary: RevisionChanges Path 1.13+2 -2 openpkg-src/zoem/zoem.spec patch -p0 <<'@@ .' Index: openpkg-src/zoem/zoem.spec $ cvs diff -u -r1.12 -r1.13 zoem.spec --- openpkg-src/zoem/zoem.spec7 Mar 2004 08:03:27 - 1.12 +++ openpkg-src/zoem/zoem.spec12 Mar 2004 18:32:30 - 1.13 @@ -25,7 +25,7 @@ # package version %define V_major 04 -%define V_minor 066 +%define V_minor 072 # package information Name: zoem @@ -38,7 +38,7 @@ Group:Text License: GPL Version: %{V_major}.%{V_minor} -Release: 20040307 +Release: 20040312 # list of sources Source0: http://micans.org/zoem/src/zoem-%{V_major}-%{V_minor}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/perl-term/ perl-term.patch perl-term.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 18:06:41 Branch: HEAD Handle: 2004031217064100 Added files: openpkg-src/perl-term perl-term.patch Modified files: openpkg-src/perl-term perl-term.spec Log: add improvement to shadow redrawing to solve my issues on the bastion host login prompt Summary: RevisionChanges Path 1.1 +38 -0 openpkg-src/perl-term/perl-term.patch 1.41+3 -1 openpkg-src/perl-term/perl-term.spec patch -p0 <<'@@ .' Index: openpkg-src/perl-term/perl-term.patch $ cvs diff -u -r0 -r1.1 perl-term.patch --- /dev/null 2004-03-12 18:06:41.0 +0100 +++ perl-term.patch 2004-03-12 18:06:41.0 +0100 @@ -0,0 +1,38 @@ +I don't know why, but under some circumstances (usually in an SSH +session within an xterm), Term::ReadLine::Gnu things that a TERM=xterm +does not provide the "le" sequence. OTOH the "cr" and "ce" sequences are +fully enough for the task of providing a password/shadow style prompt. +So, for positioning the cursor in the middle of the prompt, instead of +using left-spacing we just redraw (over the full line) the part of the +line left to the cursor. + +Index: Term-ReadLine-Gnu-1.14/Gnu/XS.pm +--- Term-ReadLine-Gnu-1.14/Gnu/XS.pm.orig2002-07-28 05:41:36.0 +0200 Term-ReadLine-Gnu-1.14/Gnu/XS.pm 2004-03-12 17:55:16.0 +0100 +@@ -429,21 +429,20 @@ + print $OUT ($_tstrs[0], # carriage return + $_tstrs[1], # clear to EOL + $prompt, '*' x length($Attribs{line_buffer})); +-print $OUT ($_tstrs[2] # cursor left +-x (length($Attribs{line_buffer}) - $Attribs{point})); ++print $OUT ($_tstrs[0], # carriage return ++$prompt, '*' x $Attribs{point}); + $oldfh = select($OUT); $| = 0; select($oldfh); + } + + sub _tgetstrs { + my @s = (tgetstr('cr'), # carriage return +- tgetstr('ce'), # clear to EOL +- tgetstr('le'));# cursor left +-warn <<"EOM" unless (defined($s[0]) && defined($s[1]) && defined($s[2])); ++ tgetstr('ce'));# clear to EOL ++warn <<"EOM" unless (defined($s[0]) && defined($s[1])); + Your terminal 'TERM=$ENV{TERM}' does not support enough function. + Check if your environment variable 'TERM' is set correctly. + EOM + # suppress warning "Use of uninitialized value in print at ..." +-$s[0] = $s[0] || ''; $s[1] = $s[1] || ''; $s[2] = $s[2] || ''; ++$s[0] = $s[0] || ''; $s[1] = $s[1] || ''; + $_tstrs_init = 1; + return @s; + } @@ . patch -p0 <<'@@ .' Index: openpkg-src/perl-term/perl-term.spec $ cvs diff -u -r1.40 -r1.41 perl-term.spec --- openpkg-src/perl-term/perl-term.spec 20 Feb 2004 19:12:02 - 1.40 +++ openpkg-src/perl-term/perl-term.spec 12 Mar 2004 17:06:41 - 1.41 @@ -47,7 +47,7 @@ Group:Language License: GPL/Artistic Version: %{V_perl} -Release: 20040220 +Release: 20040312 # list of sources Source0: http://www.cpan.org/modules/by-module/Term/TermReadKey-%{V_term_readkey}.tar.gz @@ -60,6 +60,7 @@ Source7: http://www.cpan.org/modules/by-module/IO/IO-Stty-%{V_io_stty}.tar.gz Source8: http://www.cpan.org/modules/by-module/Term/Term-ReadLine-Perl-%{V_term_readline_perl}.tar.gz Source9: http://www.cpan.org/modules/by-module/Term/Term-ReadLine-Gnu-%{V_term_readline_gnu}.tar.gz +Patch0: perl-term.patch # build information Prefix: %{l_prefix} @@ -148,6 +149,7 @@ %setup -q -T -D -a 7 %setup -q -T -D -a 8 %setup -q -T -D -a 9 +%patch -p0 %build @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/perl-text/ perl-text.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 16:38:42 Branch: HEAD Handle: 2004031215384200 Modified files: openpkg-src/perl-text perl-text.spec Log: add Text::Shellwords because it is needed by me and is generally useful Summary: RevisionChanges Path 1.31+13 -2 openpkg-src/perl-text/perl-text.spec patch -p0 <<'@@ .' Index: openpkg-src/perl-text/perl-text.spec $ cvs diff -u -r1.30 -r1.31 perl-text.spec --- openpkg-src/perl-text/perl-text.spec 18 Feb 2004 11:01:03 - 1.30 +++ openpkg-src/perl-text/perl-text.spec 12 Mar 2004 15:38:42 - 1.31 @@ -30,6 +30,8 @@ %define V_text_reform 1.11 %define V_text_autoformat 1.12 %define V_text_quoted 1.5 +%define V_text_quoted 1.5 +%define V_text_shellwords 1.03 %define V_locale_maketext 1.08 # package information @@ -43,7 +45,7 @@ Group:Language License: GPL/Artistic Version: %{V_perl} -Release: 20040218 +Release: 20040312 # list of sources Source0: http://www.cpan.org/modules/by-module/Text/Text-Template-%{V_text_template}.tar.gz @@ -51,7 +53,8 @@ Source2: http://www.cpan.org/modules/by-module/Text/Text-Reform-%{V_text_reform}.tar.gz Source3: http://www.cpan.org/modules/by-module/Text/Text-Autoformat-%{V_text_autoformat}.tar.gz Source4: http://www.cpan.org/modules/by-module/Text/Text-Quoted-%{V_text_quoted}.tar.gz -Source5: http://www.cpan.org/modules/by-module/Locale/Locale-Maketext-%{V_locale_maketext}.tar.gz +Source5: http://www.cpan.org/modules/by-module/Text/Text-Shellwords-%{V_text_shellwords}.tar.gz +Source6: http://www.cpan.org/modules/by-module/Locale/Locale-Maketext-%{V_locale_maketext}.tar.gz # build information Prefix: %{l_prefix} @@ -68,6 +71,7 @@ - Text::Reform (%{V_text_reform}) - Text::Autoformat (%{V_text_autoformat}) - Text::Quoted (%{V_text_quoted}) +- Text::Shellwords (%{V_text_shellwords}) - Locale::Maketext (%{V_locale_maketext}) %track @@ -101,6 +105,11 @@ url = http://www.cpan.org/modules/by-module/Text/ regex = Text-Wrapper-(__VER__)\.tar\.gz } +prog perl-text:Text-Shellwords = { +version = %{V_text_shellwords} +url = http://www.cpan.org/modules/by-module/Text/ +regex = Text-Shellwords-(__VER__)\.tar\.gz +} %prep %setup -q -c @@ -109,6 +118,7 @@ %setup -q -T -D -a 3 %setup -q -T -D -a 4 %setup -q -T -D -a 5 +%setup -q -T -D -a 6 %build @@ -120,6 +130,7 @@ %{l_prefix}/bin/perl-openpkg -d %{SOURCE3} configure build install %{l_prefix}/bin/perl-openpkg -d %{SOURCE4} configure build install %{l_prefix}/bin/perl-openpkg -d %{SOURCE5} configure build install +%{l_prefix}/bin/perl-openpkg -d %{SOURCE6} configure build install %{l_prefix}/bin/perl-openpkg -F perl-openpkg-files fixate cleanup %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std} `cat perl-openpkg-files` @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2004.006-uudeview.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 12-Mar-2004 16:16:16 Branch: HEAD Handle: 2004031215161600 Modified files: openpkg-web/securityOpenPKG-SA-2004.006-uudeview.txt Log: release OpenPKG Security Advisory 2004.006 (uudeview) Summary: RevisionChanges Path 1.2 +17 -9 openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2004.006-uudeview.txt --- openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt 12 Mar 2004 14:45:10 - 1.1 +++ openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt 12 Mar 2004 15:16:16 - 1.2 @@ -1,3 +1,6 @@ +-BEGIN PGP SIGNED MESSAGE- +Hash: SHA1 + OpenPKG Security AdvisoryThe OpenPKG Project @@ -18,13 +21,14 @@ Dependent Packages: none Description: - Alerted by a posting on Bugtraq [1] the uudeview [2] package was - reviewed. It was found that 0.5.19 and later contain a bug which + Alerted by a posting on Bugtraq [1] the UUDeview [2] package was + reviewed. It was found that 0.5.19 and later contains a bug which leads to failure retrieving the filename during decode. All versions - suffered from insecure temp file handling. Version 0.5.20 contains bug - fixes for the parsing of header lines, exact handling of maximum line - length and fixes for two buffer overflows which needed backporting. - The corected packages listed above remedy all of these problems. + suffered from insecure temporary file handling. Version 0.5.20 + contains bug fixes for the parsing of header lines, exact handling of + maximum line length and fixes for two buffer overflows which needed + backporting. The corected packages listed above remedy all of these + problems. Please check whether you are affected by running "/bin/rpm -q uudeview". If you have the "uudeview" package installed and its @@ -49,9 +53,6 @@ $ /bin/openpkg rpm --rebuild uudeview-0.5.19-2.0.1.src.rpm $ su - # /bin/openpkg rpm -Fvh /RPM/PKG/uudeview-0.5.19-2.0.1.*.rpm - - Additionally, we recommend that you rebuild and reinstall - all dependent packages (see above), if any, too. [3][4] References: @@ -73,3 +74,10 @@ for details on how to verify the integrity of this advisory. +-BEGIN PGP SIGNATURE- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQFAUdQsgHWT4GPEy58RAlYkAKCeapN+4xx6Q2acF29Sr2ZxqCxPZgCeMsb/ +Mc2nhcVu62xu1RQp65aa/Xk= +=mu4H +-END PGP SIGNATURE- @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-0000.000-template.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 12-Mar-2004 15:48:01 Branch: HEAD Handle: 2004031214480100 Modified files: openpkg-web/securityOpenPKG-SA-.000-template.txt Log: add fake signing headers to template for easier line-by-line comparison with existing SAs; avoid word "current" when talking about a release by replacing it with term "most recent" Summary: RevisionChanges Path 1.18+7 -4 openpkg-web/security/OpenPKG-SA-.000-template.txt patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-.000-template.txt $ cvs diff -u -r1.17 -r1.18 OpenPKG-SA-.000-template.txt --- openpkg-web/security/OpenPKG-SA-.000-template.txt 8 Mar 2004 14:10:09 - 1.17 +++ openpkg-web/security/OpenPKG-SA-.000-template.txt 12 Mar 2004 14:48:01 - 1.18 @@ -1,3 +1,6 @@ +-BEGIN PGP SIGNED MESSAGE-#FIXME, this is a template +Hash: SHA1#FIXME, this is a template + #FIXME, this is a template OpenPKG Security AdvisoryThe OpenPKG Project @@ -37,10 +40,10 @@ Select the updated source RPM appropriate for your OpenPKG release [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror location, verify its integrity [9], build a corresponding binary RPM - from it [3] and update your OpenPKG installation by applying the binary - RPM [4]. For the current release OpenPKG 2.0, perform the following - operations to permanently fix the security problem (for other releases - adjust accordingly). + from it [3] and update your OpenPKG installation by applying the + binary RPM [4]. For the most recent release OpenPKG 2.0, perform the + following operations to permanently fix the security problem (for + other releases adjust accordingly). $ ftp ftp.openpkg.org ftp> bin @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 12-Mar-2004 15:45:11 Branch: HEAD Handle: 2004031214451000 Added files: openpkg-web/securityOpenPKG-SA-2004.006-uudeview.txt Modified files: openpkg-web security.txt security.wml Log: SA-2004.006-uudeview Summary: RevisionChanges Path 1.65+2 -1 openpkg-web/security.txt 1.84+1 -0 openpkg-web/security.wml 1.1 +75 -0 openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt patch -p0 <<'@@ .' Index: openpkg-web/security.txt $ cvs diff -u -r1.64 -r1.65 security.txt --- openpkg-web/security.txt 9 Mar 2004 14:43:35 - 1.64 +++ openpkg-web/security.txt 12 Mar 2004 14:45:10 - 1.65 @@ -1,4 +1,5 @@ -09-Mar-2004: Security Advisory: S +12-Mar-2004: Security Advisory: S +09-Mar-2004: Security Advisory: S 08-Mar-2004: Security Advisory: S 05-Mar-2004: Security Advisory: S 16-Jan-2004: Security Advisory: S @@ . patch -p0 <<'@@ .' Index: openpkg-web/security.wml $ cvs diff -u -r1.83 -r1.84 security.wml --- openpkg-web/security.wml 9 Mar 2004 14:43:35 - 1.83 +++ openpkg-web/security.wml 12 Mar 2004 14:45:10 - 1.84 @@ -76,6 +76,7 @@ + @@ . patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2004.006-uudeview.txt $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.006-uudeview.txt --- /dev/null 2004-03-12 15:45:11.0 +0100 +++ OpenPKG-SA-2004.006-uudeview.txt 2004-03-12 15:45:11.0 +0100 @@ -0,0 +1,75 @@ + + +OpenPKG Security AdvisoryThe OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2004.006 12-Mar-2004 + + +Package: uudeview +Vulnerability: insecure temp file handling, buffer overflow +OpenPKG Specific:no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= uudeview-0.5.20-20040302 >= uudeview-0.5.20-20040312 +OpenPKG 2.0 <= uudeview-0.5.19-2.0.0>= uudeview-0.5.19-2.0.1 +OpenPKG 1.3 <= uudeview-0.5.18-1.3.0>= uudeview-0.5.18-1.3.1 + +Dependent Packages: none + +Description: + Alerted by a posting on Bugtraq [1] the uudeview [2] package was + reviewed. It was found that 0.5.19 and later contain a bug which + leads to failure retrieving the filename during decode. All versions + suffered from insecure temp file handling. Version 0.5.20 contains bug + fixes for the parsing of header lines, exact handling of maximum line + length and fixes for two buffer overflows which needed backporting. + The corected packages listed above remedy all of these problems. + + Please check whether you are affected by running "/bin/rpm + -q uudeview". If you have the "uudeview" package installed and its + version is affected (see above), we recommend that you immediately + upgrade it (see Solution). [3][4] + +Solution: + Select the updated source RPM appropriate for your OpenPKG release + [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror + location, verify its integrity [9], build a corresponding binary RPM + from it [3] and update your OpenPKG installation by applying the + binary RPM [4]. For the most recent release OpenPKG 2.0, perform the + following operations to permanently fix the security problem (for + other releases adjust accordingly). + + $ ftp ftp.openpkg.org + ftp> bin + ftp> cd release/2.0/UPD + ftp> get uudeview-0.5.19-2.0.1.src.rpm + ftp> bye + $ /bin/openpkg rpm -v --checksig uudeview-0.5.19-2.0.1.src.rpm + $ /bin/openpkg rpm --rebuild uudeview-0.5.19-2.0.1.src.rpm + $ su - + # /bin/openpkg rpm -Fvh /RPM/PKG/uudeview-0.5.19-2.0.1.*.rpm + + Additionally, we recommend that you rebuild and reinstall + all dependent packages (see above), if any, too. [3][4] +___
[CVS] OpenPKG: OPENPKG_1_3_SOLID: openpkg-src/uudeview/ uudeview.patch...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 15:05:32 Branch: OPENPKG_1_3_SOLIDHandle: 2004031214053200 Added files: (Branch: OPENPKG_1_3_SOLID) openpkg-src/uudeviewuudeview.patch Modified files: (Branch: OPENPKG_1_3_SOLID) openpkg-src/uudeviewuudeview.spec Log: MFC: mkstemp security enhancement; OpenPKG-SA-2004.006 backport of bugfixes from diff 0.5.18/ 0.5.20/ including two fixes for buffer overflows Summary: RevisionChanges Path 1.2.4.1 +230 -0 openpkg-src/uudeview/uudeview.patch 1.22.2.2.2.2+3 -1 openpkg-src/uudeview/uudeview.spec patch -p0 <<'@@ .' Index: openpkg-src/uudeview/uudeview.patch $ cvs diff -u -r0 -r1.2.4.1 uudeview.patch --- /dev/null 2004-03-12 15:05:32.0 +0100 +++ uudeview.patch2004-03-12 15:05:32.0 +0100 @@ -0,0 +1,230 @@ +mkstemp security enhancement. Similar to +FreeBSD http://www.freebsd.org/cgi/query-pr.cgi?pr=41508 +SuSE uudeview-0.5.18-244.src.rpm + +--- unix/uudeview.c unix/uudeview.c +@@ -434,7 +434,7 @@ + return 0; + } + +- if ((stdfile = tempnam (NULL, "uu")) == NULL) { ++ if ((stdfile = _FP_tempnam (NULL, "uu")) == NULL) { + fprintf (stderr, "proc_stdin: cannot get temporary file\n"); + return 0; + } + +--- uulib/fptools.c uulib/fptools.c +@@ -507,5 +507,15 @@ + char * TOOLEXPORT + _FP_tempnam (char *dir, char *pfx) + { +- return _FP_strdup (tmpnam (NULL)); ++ int fd; ++ char fileName[100]; ++ ++ strncpy(fileName, pfx, 90); ++ strcat(fileName, "XX"); ++ fd = mkstemp(fileName); ++ if (fd == -1) ++return NULL; ++ close(fd); ++ unlink(fileName); ++ return _FP_strdup (fileName); + } + +--- uulib/uunconc.c uulib/uunconc.c +@@ -1264,7 +1264,7 @@ + else + mode = "wb";/* otherwise in binary */ + +- if ((data->binfile = tempnam (NULL, "uu")) == NULL) { ++ if ((data->binfile = _FP_tempnam (NULL, "uu")) == NULL) { + UUMessage (uunconc_id, __LINE__, UUMSG_ERROR, +uustring (S_NO_TEMP_NAME)); + return UURET_NOMEM; +@@ -1426,7 +1426,7 @@ +*/ + + if (data->uudet == BH_ENCODED && data->binfile) { +-if ((ntmp = tempnam (NULL, "uu")) == NULL) { ++if ((ntmp = _FP_tempnam (NULL, "uu")) == NULL) { + UUMessage (uunconc_id, __LINE__, UUMSG_ERROR, + uustring (S_NO_TEMP_NAME)); + progress.action = 0; + +--- uulib/fptools.c 2001-06-06 20:21:47.0 +0200 uulib/fptools.c 2003-04-13 17:41:55.0 +0200 +@@ -392,7 +392,7 @@ + { + char *ptr; + +- if (string == NULL) ++ if (string == NULL || !*string) + return NULL; + + ptr = string + strlen (string) - 1; + +--- uulib/uunconc.c 2002-04-02 12:04:52.0 +0200 uulib/uunconc.c 2003-09-30 01:17:35.0 +0200 +@@ -541,6 +541,8 @@ + + while (vflag == 0 && nflag && safety--) { + if (nflag == 1) { /* need next line to repair */ ++ if (strlen (line) > 250) ++break; + ptr = line + strlen (line); + while (ptr>line && (*(ptr-1)=='\015' || *(ptr-1)=='\012')) + ptr--; +@@ -1336,7 +1401,7 @@ + + iter = data->thisfile; + while (iter) { +-if (part != -1 && iter->partno != part+1) ++if (part != -1 && iter->partno != part+1 && !uu_desperate) + break; + else + part = iter->partno; + +--- uulib/uuscan.c 2002-04-02 12:04:52.0 +0200 uulib/uuscan.c 2003-07-06 20:29:35.0 +0200 +@@ -855,7 +937,7 @@ + + if (strncmp (line, "=ybegin ", 8) == 0 && + _FP_strstr (line, " name=") != NULL) { +- if ((result->begin || result->end) && !uu_more_mime) { ++ if ((result->begin || result->end || result->uudet) && !uu_more_mime) { + fseek (datei, oldposition, SEEK_SET); + break; + } +@@ -928,8 +928,7 @@ + if (yepartends == 0 || yepartends >= yefilesize) { + result->end = 1; + } +- if (!uu_more_mime) +-break; ++ continue; + } + + /* +@@ -1402,9 +1504,9 @@ + if (UUBUSYPOLL(ftell(datei),progress.fsize)) SPCANCEL(); + if (_FP_fgets (line, 255, datei) == NULL) + break; ++ line[255] = '\0'; + if (!IsLineEmpty (line)) { + fseek (datei, preheaders, SEEK_SET); +-line[255] = '\0'; + break; + } +
[CVS] OpenPKG: OPENPKG_2_0_SOLID: openpkg-src/uudeview/ uudeview.patch...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 15:00:18 Branch: OPENPKG_2_0_SOLIDHandle: 2004031214001700 Added files: (Branch: OPENPKG_2_0_SOLID) openpkg-src/uudeviewuudeview.patch Modified files: (Branch: OPENPKG_2_0_SOLID) openpkg-src/uudeviewuudeview.spec Log: MFC: fix broken uudeview 0.5.19 and later; MFC: mkstemp security enhancement; OpenPKG-SA-2004.006 backport of bugfixes from diff 0.5.18/ 0.5.20/ including two fixes for buffer overflows Summary: RevisionChanges Path 1.2.2.1 +210 -0 openpkg-src/uudeview/uudeview.patch 1.28.2.2+3 -1 openpkg-src/uudeview/uudeview.spec patch -p0 <<'@@ .' Index: openpkg-src/uudeview/uudeview.patch $ cvs diff -u -r0 -r1.2.2.1 uudeview.patch --- /dev/null 2004-03-12 15:00:18.0 +0100 +++ uudeview.patch2004-03-12 15:00:18.0 +0100 @@ -0,0 +1,210 @@ +Patch to defeat uudeview "UNKNOWN" filenames. +Problem introduced with 0.5.19 +Problem remains in 0.5.20 + +Index: uuscan.c +--- uulib/uuscan.c.orig 2004-03-12 11:47:13.0 +0100 uulib/uuscan.c 2004-03-12 13:37:54.0 +0100 +@@ -1604,20 +1604,23 @@ + } + + /* skip empty lines */ +-prevpos = ftell (datei); ++{ ++long localprevpos; ++localprevpos = ftell (datei); + if (IsLineEmpty (line)) { + while (!feof (datei)) { + if (_FP_fgets (line, 255, datei) == NULL) + break; + if (UUBUSYPOLL(ftell(datei),progress.fsize)) SPCANCEL(); + if (!IsLineEmpty (line)) { +- fseek (datei, prevpos, SEEK_SET); ++ fseek (datei, localprevpos, SEEK_SET); + line[255] = '\0'; + break; + } +-prevpos = ftell (datei); ++localprevpos = ftell (datei); + } + } ++} + + /* + * If we don't have all valid MIME headers yet, but the following + +mkstemp security enhancement. Similar to +FreeBSD http://www.freebsd.org/cgi/query-pr.cgi?pr=41508 +SuSE uudeview-0.5.18-244.src.rpm + +--- unix/uudeview.c unix/uudeview.c +@@ -434,7 +434,7 @@ + return 0; + } + +- if ((stdfile = tempnam (NULL, "uu")) == NULL) { ++ if ((stdfile = _FP_tempnam (NULL, "uu")) == NULL) { + fprintf (stderr, "proc_stdin: cannot get temporary file\n"); + return 0; + } + +--- uulib/fptools.c uulib/fptools.c +@@ -507,5 +507,15 @@ + char * TOOLEXPORT + _FP_tempnam (char *dir, char *pfx) + { +- return _FP_strdup (tmpnam (NULL)); ++ int fd; ++ char fileName[100]; ++ ++ strncpy(fileName, pfx, 90); ++ strcat(fileName, "XX"); ++ fd = mkstemp(fileName); ++ if (fd == -1) ++return NULL; ++ close(fd); ++ unlink(fileName); ++ return _FP_strdup (fileName); + } + +--- uulib/uunconc.c uulib/uunconc.c +@@ -1264,7 +1264,7 @@ + else + mode = "wb";/* otherwise in binary */ + +- if ((data->binfile = tempnam (NULL, "uu")) == NULL) { ++ if ((data->binfile = _FP_tempnam (NULL, "uu")) == NULL) { + UUMessage (uunconc_id, __LINE__, UUMSG_ERROR, +uustring (S_NO_TEMP_NAME)); + return UURET_NOMEM; +@@ -1426,7 +1426,7 @@ +*/ + + if (data->uudet == BH_ENCODED && data->binfile) { +-if ((ntmp = tempnam (NULL, "uu")) == NULL) { ++if ((ntmp = _FP_tempnam (NULL, "uu")) == NULL) { + UUMessage (uunconc_id, __LINE__, UUMSG_ERROR, + uustring (S_NO_TEMP_NAME)); + progress.action = 0; + +http://www.fpx.de/fp/Software/UUDeview/HISTORY.txt +0.5.20 (01.03.2004) + +- fix bug in parsing of header lines [uuscan.c@@155] +- fix fgets to accept lines that are exactly of the maximum length [uunconc.c, uuscan.c] +- fix two buffer overflows [uuscan.c@@391, fptools.c] + +diff --unified=3 uudeview-0.5.19/uulib/fptools.c uudeview-0.5.20/uulib/fptools.c +--- uulib/fptools.c 1.7 2003-04-13 17:41:55.0 +0200 uulib/fptools.c 1.8 2004-02-24 01:05:32.0 +0100 +@@ -444,7 +444,7 @@ + if (feof (stream)) + return NULL; + +- while (--n) { ++ while (--n && !feof (stream)) { + if ((c = fgetc (stream)) == EOF) { + if (ferror (stream)) + return NULL; +@@ -478,11 +478,28 @@ + */ + *buf++ = c; + } ++ + /* +* n-1 characters already transferred +*/ ++ + *buf = '\0'; + ++ /* ++ * If a line bre
[CVS] OpenPKG: openpkg-src/uudeview/ uudeview.patch
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 14:36:32 Branch: HEAD Handle: 2004031213363100 Modified files: openpkg-src/uudeviewuudeview.patch Log: mkstemp security enhancement Summary: RevisionChanges Path 1.2 +57 -0 openpkg-src/uudeview/uudeview.patch patch -p0 <<'@@ .' Index: openpkg-src/uudeview/uudeview.patch $ cvs diff -u -r1.1 -r1.2 uudeview.patch --- openpkg-src/uudeview/uudeview.patch 12 Mar 2004 12:56:33 - 1.1 +++ openpkg-src/uudeview/uudeview.patch 12 Mar 2004 13:36:31 - 1.2 @@ -33,3 +33,60 @@ /* * If we don't have all valid MIME headers yet, but the following +mkstemp security enhancement. Similar to +FreeBSD http://www.freebsd.org/cgi/query-pr.cgi?pr=41508 +SuSE uudeview-0.5.18-244.src.rpm + +--- unix/uudeview.c unix/uudeview.c +@@ -434,7 +434,7 @@ + return 0; + } + +- if ((stdfile = tempnam (NULL, "uu")) == NULL) { ++ if ((stdfile = _FP_tempnam (NULL, "uu")) == NULL) { + fprintf (stderr, "proc_stdin: cannot get temporary file\n"); + return 0; + } + +--- uulib/fptools.c uulib/fptools.c +@@ -507,5 +507,15 @@ + char * TOOLEXPORT + _FP_tempnam (char *dir, char *pfx) + { +- return _FP_strdup (tmpnam (NULL)); ++ int fd; ++ char fileName[100]; ++ ++ strncpy(fileName, pfx, 90); ++ strcat(fileName, "XX"); ++ fd = mkstemp(fileName); ++ if (fd == -1) ++return NULL; ++ close(fd); ++ unlink(fileName); ++ return _FP_strdup (fileName); + } + +--- uulib/uunconc.c uulib/uunconc.c +@@ -1264,7 +1264,7 @@ + else + mode = "wb";/* otherwise in binary */ + +- if ((data->binfile = tempnam (NULL, "uu")) == NULL) { ++ if ((data->binfile = _FP_tempnam (NULL, "uu")) == NULL) { + UUMessage (uunconc_id, __LINE__, UUMSG_ERROR, +uustring (S_NO_TEMP_NAME)); + return UURET_NOMEM; +@@ -1426,7 +1426,7 @@ +*/ + + if (data->uudet == BH_ENCODED && data->binfile) { +-if ((ntmp = tempnam (NULL, "uu")) == NULL) { ++if ((ntmp = _FP_tempnam (NULL, "uu")) == NULL) { + UUMessage (uunconc_id, __LINE__, UUMSG_ERROR, + uustring (S_NO_TEMP_NAME)); + progress.action = 0; + @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/uudeview/ uudeview.patch uudeview.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 13:56:34 Branch: HEAD Handle: 2004031212563300 Added files: openpkg-src/uudeviewuudeview.patch Modified files: openpkg-src/uudeviewuudeview.spec Log: fix broken uudeview 0.5.19 and later Summary: RevisionChanges Path 1.1 +35 -0 openpkg-src/uudeview/uudeview.patch 1.30+3 -1 openpkg-src/uudeview/uudeview.spec patch -p0 <<'@@ .' Index: openpkg-src/uudeview/uudeview.patch $ cvs diff -u -r0 -r1.1 uudeview.patch --- /dev/null 2004-03-12 13:56:34.0 +0100 +++ uudeview.patch2004-03-12 13:56:34.0 +0100 @@ -0,0 +1,35 @@ +Patch to defeat uudeview "UNKNOWN" filenames. +Problem introduced with 0.5.19 +Problem remains in 0.5.20 + +Index: uuscan.c +--- uulib/uuscan.c.orig 2004-03-12 11:47:13.0 +0100 uulib/uuscan.c 2004-03-12 13:37:54.0 +0100 +@@ -1604,20 +1604,23 @@ + } + + /* skip empty lines */ +-prevpos = ftell (datei); ++{ ++long localprevpos; ++localprevpos = ftell (datei); + if (IsLineEmpty (line)) { + while (!feof (datei)) { + if (_FP_fgets (line, 255, datei) == NULL) + break; + if (UUBUSYPOLL(ftell(datei),progress.fsize)) SPCANCEL(); + if (!IsLineEmpty (line)) { +- fseek (datei, prevpos, SEEK_SET); ++ fseek (datei, localprevpos, SEEK_SET); + line[255] = '\0'; + break; + } +-prevpos = ftell (datei); ++localprevpos = ftell (datei); + } + } ++} + + /* + * If we don't have all valid MIME headers yet, but the following + @@ . patch -p0 <<'@@ .' Index: openpkg-src/uudeview/uudeview.spec $ cvs diff -u -r1.29 -r1.30 uudeview.spec --- openpkg-src/uudeview/uudeview.spec2 Mar 2004 15:43:42 - 1.29 +++ openpkg-src/uudeview/uudeview.spec12 Mar 2004 12:56:33 - 1.30 @@ -34,10 +34,11 @@ Group:Converter License: GPL Version: 0.5.20 -Release: 20040302 +Release: 20040312 # list of sources Source0: http://www.fpx.de/fp/Software/UUDeview/download/uudeview-%{version}.tar.gz +Patch0: uudeview.patch # build information Prefix: %{l_prefix} @@ -66,6 +67,7 @@ %prep %setup -q +%patch -p0 %build CC="%{l_cc}" \ @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openssh/ openssh.patch openssh.patch.alias ...
new_root += 2; ++if (geteuid() == 0) { ++/* chroot to subdir and adjust HOME for remaining path */ ++if (chroot(user_dir) == -1) ++fatal("Couldn't chroot to user directory \"%s\": %s", user_dir, strerror(errno)); ++if (setuid(getuid()) == -1) ++fatal("Couldn't drop privileges: %s", strerror(errno)); ++setenv("HOME", new_root, 1); ++} ++else { ++/* ignore chroot request and adjust HOME for preceeding path */ ++setenv("HOME", user_dir, 1); ++} ++break; ++} ++new_root += 2; ++} ++} ++#endif /* USE_CHROOT */ ++ + in = dup(STDIN_FILENO); + out = dup(STDOUT_FILENO); + @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.spec $ cvs diff -u -r1.125 -r1.126 openssh.spec --- openpkg-src/openssh/openssh.spec 25 Feb 2004 19:11:18 - 1.125 +++ openpkg-src/openssh/openssh.spec 12 Mar 2004 11:39:56 - 1.126 @@ -42,7 +42,7 @@ Group:Security License: BSD Version: %{V_base}%{V_portable} -Release: 20040225 +Release: 20040312 # package options %option with_fsl yes @@ -50,6 +50,7 @@ %option with_skey no %option with_x11 no %option with_chroot no +%option with_aliasno %option with_watchdog no %option with_ldap no %option with_wrap no @@ -65,8 +66,10 @@ Source7: ssh-keyman.1 Source8: ssh-keyman.pod Patch0: openssh.patch -Patch1: http://www.sc.isc.tohoku.ac.jp/~hgot/sources/openssh-%{V_watchdog}-watchdog.patch.tgz -Patch2: http://ldappubkey.gcu-squad.org/%{V_ldap_vers1}/ldappubkey-ossh%{V_ldap_base}-%{V_ldap_vers2}.patch +Patch1: openssh.patch.chroot +Patch2: openssh.patch.alias +Patch3: http://www.sc.isc.tohoku.ac.jp/~hgot/sources/openssh-%{V_watchdog}-watchdog.patch.tgz +Patch4: http://ldappubkey.gcu-squad.org/%{V_ldap_vers1}/ldappubkey-ossh%{V_ldap_base}-%{V_ldap_vers2}.patch # build information Prefix: %{l_prefix} @@ -128,10 +131,16 @@ %prep # unpack and patch distribution %setup -q -%patch -p0 +%patch -p0 -P 0 %{l_shtool} subst \ -e 's;@l_openpkg_release@;%{l_openpkg_release -F "OpenPKG-%s"};' \ version.h +%if "%{with_chroot}" == "yes" +%patch -p0 -P 1 +%endif +%if "%{with_alias}" == "yes" +%patch -p0 -P 2 +%endif %if "%{with_watchdog}" == "yes" %{l_gzip} -d -c %{SOURCE openssh-%{V_watchdog}-watchdog.patch.tgz} | %{l_tar} xf - %{l_patch} -p0
[CVS] OpenPKG: openpkg-src/imapd/ imapd.conf imapd.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael Schloh Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 12:02:03 Branch: HEAD Handle: 2004031211020200 Modified files: openpkg-src/imapd imapd.conf imapd.spec Log: behaviour of 2.1.16 was 'with_vhost no', so make this version not support virtual host names by default too Summary: RevisionChanges Path 1.11+1 -3 openpkg-src/imapd/imapd.conf 1.114 +1 -1 openpkg-src/imapd/imapd.spec patch -p0 <<'@@ .' Index: openpkg-src/imapd/imapd.conf $ cvs diff -u -r1.10 -r1.11 imapd.conf --- openpkg-src/imapd/imapd.conf 29 Jan 2004 15:09:57 - 1.10 +++ openpkg-src/imapd/imapd.conf 12 Mar 2004 11:02:02 - 1.11 @@ -22,7 +22,5 @@ quotawarn: 90 timeout:30 defaultdomain: @l_domainname@ -virtdomains:on -#virtdomains:off -#virtdomains:userid +virtdomains:off @@ . patch -p0 <<'@@ .' Index: openpkg-src/imapd/imapd.spec $ cvs diff -u -r1.113 -r1.114 imapd.spec --- openpkg-src/imapd/imapd.spec 10 Mar 2004 21:26:17 - 1.113 +++ openpkg-src/imapd/imapd.spec 12 Mar 2004 11:02:02 - 1.114 @@ -34,7 +34,7 @@ Group:Mail License: BSD Version: 2.2.3 -Release: 20040310 +Release: 20040312 # package options %option with_fslyes @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/subversion/ subversion.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 12-Mar-2004 09:13:44 Branch: HEAD Handle: 2004031208134400 Modified files: openpkg-src/subversion subversion.spec Log: add svn2cvs tool and fix run-time deps Summary: RevisionChanges Path 1.45+16 -3 openpkg-src/subversion/subversion.spec patch -p0 <<'@@ .' Index: openpkg-src/subversion/subversion.spec $ cvs diff -u -r1.44 -r1.45 subversion.spec --- openpkg-src/subversion/subversion.spec23 Feb 2004 19:58:57 - 1.44 +++ openpkg-src/subversion/subversion.spec12 Mar 2004 08:13:44 - 1.45 @@ -38,15 +38,17 @@ Group:SCM License: Apache/BSD Version: %{V_opkg} -Release: 20040223 +Release: 20040312 # package options %option with_cvs2svn no +%option with_svn2cvs no # list of sources Source0: http://subversion.tigris.org/tarballs/subversion-%{V_dist}.tar.gz Source1: http://svnbook.red-bean.com/book.pdf -Source2: rc.subversion +Source2: http://svn2cvs.tigris.org/nonav/source/browse/*checkout*/svn2cvs/src/svn2cvs.pl +Source3: rc.subversion # build information Prefix: %{l_prefix} @@ -56,7 +58,10 @@ BuildPreReq: libxml, db, openssl, zlib PreReq: libxml, db, openssl, zlib %if "%{with_cvs2svn}" == "yes" -PreReq: python +PreReq: cvs, python +%endif +%if "%{with_svn2cvs}" == "yes" +PreReq: cvs, perl, perl-xml %endif AutoReq: no AutoReqProv: no @@ -141,6 +146,14 @@ %{l_shtool} install -c -m 644 \ tools/cvs2svn/cvs2svn.1 \ $RPM_BUILD_ROOT%{l_prefix}/man/man1/ +%endif + +%if "%{with_svn2cvs}" == "yes" +# install svn2cvs(1) tool +%{l_shtool} install -c -m 755 \ +-e 's;#!/usr/bin/perl;#!%{l_prefix}/bin/perl;' \ +%{SOURCE svn2cvs.pl} \ +$RPM_BUILD_ROOT%{l_prefix}/bin/svn2cvs %endif # install run-command script @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]