Update composer to 1.3.2
Attached patch updates composer from 1.0.0 to 1.3.2. This update fixes an issue where OpenSSL detection wouldn't work for LibreSSL. Thanks, Frank Index: Makefile === RCS file: /cvs/ports/www/composer/Makefile,v retrieving revision 1.2 diff -u -p -r1.2 Makefile --- Makefile5 Apr 2016 22:51:29 - 1.2 +++ Makefile30 Jan 2017 09:17:02 - @@ -4,7 +4,7 @@ COMMENT=dependency manager for PHP CATEGORIES=www devel -V= 1.0.0 +V= 1.3.2 EPOCH= 0 MASTER_SITES= https://getcomposer.org/download/$V/ DISTNAME= composer-$V Index: distinfo === RCS file: /cvs/ports/www/composer/distinfo,v retrieving revision 1.2 diff -u -p -r1.2 distinfo --- distinfo5 Apr 2016 22:51:29 - 1.2 +++ distinfo30 Jan 2017 09:17:02 - @@ -1,2 +1,2 @@ -SHA256 (composer-1.0.0.phar) = GswADPI72dGeFZDC7etE+5FfiNhfF5iSXsmJxgHbC9Y= -SIZE (composer-1.0.0.phar) = 1592980 +SHA256 (composer-1.3.2.phar) = ak92GqNLtp/KhrxBGl6YNsqCRvD80p84BLF0/un7BWk= +SIZE (composer-1.3.2.phar) = 1816271
Re: UPDATE: geo/geos
On Fri, Jan 27, 2017 at 07:51:31AM +0100, Rafael Sadowski wrote: > Hi ports@, > > - Update to 3.6.1 > - Bump geos (C++ API changes according to the changlog) > - Remove all doxygen depends: > -- https://marc.info/?l=openbsd-ports&m=147433167219051&w=2 agreed .. > - Tests fails like the old version Thanks, i'll try to look into this... dont hesitate to harass me via mail or icb if i forget.
update to lua 5.3.4
A 5.3 bugfix release http://marc.info/?l=lua-l&m=148576985120837&w=2 https://www.lua.org/bugs.html#5.3.3 Index: Makefile === RCS file: /cvs/ports/lang/lua/5.3/Makefile,v retrieving revision 1.7 diff -u -p -r1.7 Makefile --- Makefile29 Jun 2016 16:14:42 - 1.7 +++ Makefile30 Jan 2017 11:07:04 - @@ -2,9 +2,8 @@ PORTROACH= limit:^5\.3 -VERSION= 5.3.3 +VERSION= 5.3.4 PKGSPEC= lua->=5.3,<5.4 -REVISION = 0 SHARED_LIBS= lua5.3 ${VERSION:R} Index: distinfo === RCS file: /cvs/ports/lang/lua/5.3/distinfo,v retrieving revision 1.4 diff -u -p -r1.4 distinfo --- distinfo17 Jun 2016 18:55:28 - 1.4 +++ distinfo30 Jan 2017 11:07:09 - @@ -1,2 +1,2 @@ -SHA256 (lua-5.3.3.tar.gz) = URPAaIT33kU85XcCq6rB1hgwfzP2eJ+ocOh6WddyrKI= -SIZE (lua-5.3.3.tar.gz) = 294290 +SHA256 (lua-5.3.4.tar.gz) = 9oGqUYIzvEB+I6zw9Yh8iE8XQ28ADUU7JJGp8RpSQAw= +SIZE (lua-5.3.4.tar.gz) = 303586
Re: Update composer to 1.3.2
On 2017/01/30 10:19, Frank Groeneveld wrote: > Attached patch updates composer from 1.0.0 to 1.3.2. > This update fixes an issue where OpenSSL detection wouldn't work > for LibreSSL. Thanks Frank, committed.
Re: fix for isc-dhcp-server IPv6
Marc Peters writes: [...] > Works here (backported to 4.3.4 for -stable, though). Committed, thanks. -- jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
Re: Fw: ECC support for sendmail
Alexander Bluhm writes: > On Sun, Jan 29, 2017 at 07:51:38AM -0700, Kyle Amon wrote: >> Ahem. I still think it would be great if this could get applied >> before yet another release goes by. ;) > > I have tested it. The server cypher list changes from >* SSLv23TLSv1_2 DHE-RSA-AES256-GCM-SHA384 >* TLSv1_2 TLSv1_2 DHE-RSA-AES256-GCM-SHA384 >* TLSv1_1 TLSv1_1 DHE-RSA-AES256-SHA >* TLSv1 TLSv1 DHE-RSA-AES256-SHA > to >* SSLv23TLSv1_2 ECDHE-RSA-AES256-GCM-SHA384 >* TLSv1_2 TLSv1_2 ECDHE-RSA-AES256-GCM-SHA384 >* TLSv1_1 TLSv1_1 ECDHE-RSA-AES256-SHA >* TLSv1 TLSv1 ECDHE-RSA-AES256-SHA > > We also need a revision bump. > > ok? I just want to stress that "FFR" means "For Future Releases". Generally I don't think we should enable experimental features just because we can, and I can't see why EC would be different here. No objection though, my use case doesn't involve TLS. -- jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
devel/py-certifi update to 2017.1.23
Hi, wanted to update sysutils/py-elasticsearch-curator, and found it now has dependency to certifi set to latest version 2017.1.23. The other two dependencies of certifi I found in the ports tree www/py-tornado and net/py-geventhttpclient don't have specific version requirements in their setup.py. make update-plist removed ${MODPY_PYCACHE} and ${MODPY_PYC_MAGIC_TAG} but these seem to be necessary for the python3 flavor. So I kept the PLIST as is, as there were no other changes. seems to work for me. OK? Sebastian Index: Makefile === RCS file: /cvs/ports/devel/py-certifi/Makefile,v retrieving revision 1.13 diff -u -r1.13 Makefile --- Makefile3 Jan 2017 19:19:48 - 1.13 +++ Makefile30 Jan 2017 11:55:49 - @@ -2,11 +2,10 @@ COMMENT = Python package to check certificates using the OpenBSD CA -MODPY_EGG_VERSION =2016.9.26 +MODPY_EGG_VERSION =2017.1.23 DISTNAME = certifi-${MODPY_EGG_VERSION} PKGNAME = py-${DISTNAME} CATEGORIES = devel security -REVISION = 0 HOMEPAGE = https://certifi.io/ Index: distinfo === RCS file: /cvs/ports/devel/py-certifi/distinfo,v retrieving revision 1.7 diff -u -r1.7 distinfo --- distinfo26 Sep 2016 16:22:34 - 1.7 +++ distinfo30 Jan 2017 11:55:49 - @@ -1,2 +1,2 @@ -SHA256 (certifi-2016.9.26.tar.gz) = gnWu8bvq8FxTcVv8XYVpvR4Eyh6OaWCMxSvKrCYE6xk= -SIZE (certifi-2016.9.26.tar.gz) = 374637 +SHA256 (certifi-2017.1.23.tar.gz) = gYd/t6wSbpIV37Fb/vcRX9ww55jgATBlFY7tBwf9mc4= +SIZE (certifi-2017.1.23.tar.gz) = 380397
Re: ECC support for sendmail
On Mon, Jan 30, 2017, Jeremie Courreges-Anglas wrote: > I just want to stress that "FFR" means "For Future Releases". > Generally I don't think we should enable experimental features just > because we can, and I can't see why EC would be different here. It is a "non-FFR" compile time option in the 8.16.x snapshots and the other FFR has been enabled: 8.16.1/8.16.1 201X/XX/XX New compile time option TLS_EC to enable the use of elliptic curve cryptography in STARTTLS (previously available as _FFR_TLS_EC). CONFIG: New FEATURE(`tls_session_features') to enable standard rules for tls_srv_features and tls_clt_features; for details see cf/README. -- Please don't Cc: me, use only the list for replies.
Re: ECC support for sendmail
Claus Assmann writes: > On Mon, Jan 30, 2017, Jeremie Courreges-Anglas wrote: > >> I just want to stress that "FFR" means "For Future Releases". >> Generally I don't think we should enable experimental features just >> because we can, and I can't see why EC would be different here. > > It is a "non-FFR" compile time option in the 8.16.x snapshots > and the other FFR has been enabled: Then I guess enabling this is reasonable. Thanks, -- jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
Re: Fw: ECC support for sendmail
On Mon, Jan 30, 2017 at 12:45:43PM +0100, Jeremie Courreges-Anglas wrote: > I just want to stress that "FFR" means "For Future Releases". > Generally I don't think we should enable experimental features just > because we can, and I can't see why EC would be different here. Unfortunately sendmail releases do not happen often these days. I have compared the 8.15.2 FFR code with their snapshot 8.16.0.19 from July 2016. The _FFR prefix is gone, some logging changed, and they can parse an additional "flags" argument now. So it looks that this code is not experimental anymore. I think it is better to enable modern cryptography now than to wait for a new release. bluhm
[UPDATE] Tor Browser 6.5
Hi ports@, The attached patch brings us up to Tor Browser 6.5. It requires the net/tor patch to run since we have to r-dep on net/tor>=0.2.9.9 to remain true to upstream: https://marc.info/?l=openbsd-ports&m=148562136724885&w=2 Tested on amd64. Pax, -A -- https://haqistan.net/~attila | attila@{stalphonsos.com,haqistan.net} pgp: 0x62A729CF | C2CE 2487 03AC 4C2F 101D 09C1 4068 D5D5 62A7 29CF Index: www/tor-browser/Makefile.inc === RCS file: /cvs/ports/www/tor-browser/Makefile.inc,v retrieving revision 1.3 diff -u -p -r1.3 Makefile.inc --- www/tor-browser/Makefile.inc 24 Dec 2016 20:15:05 - 1.3 +++ www/tor-browser/Makefile.inc 26 Jan 2017 22:40:05 - @@ -6,7 +6,7 @@ GH_ACCOUNT ?= torbsd PERMIT_PACKAGE_CDROM ?= Yes CATEGORIES = www BROWSER_NAME = tor-browser -TB_VERSION = 6.0.8 +TB_VERSION = 6.5 TB_PREFIX = tb SUBST_VARS += BROWSER_NAME TB_VERSION Index: www/tor-browser/browser/Makefile === RCS file: /cvs/ports/www/tor-browser/browser/Makefile,v retrieving revision 1.4 diff -u -p -r1.4 Makefile --- www/tor-browser/browser/Makefile 24 Jan 2017 21:27:28 - 1.4 +++ www/tor-browser/browser/Makefile 26 Jan 2017 22:40:05 - @@ -15,11 +15,10 @@ DIST_SUBDIR = ${BROWSER_NAME} WRKDIST = ${WRKDIR}/${GH_PROJECT}-${GH_TAGNAME:C/^v//} GH_PROJECT = torb -GH_TAGNAME = v${TB_VERSION}-esr45.6.0 +GH_TAGNAME = v${TB_VERSION}-esr45.7.0 PKGNAME = ${TB_PREFIX}-browser-${TB_VERSION} DISTNAME = ${GH_TAGNAME} -REVISION = 0 SO_VERSION = 1.0 MOZILLA_LIBS = browsercomps xul lgpllibs @@ -81,7 +80,7 @@ WANTLIB += icudata icui18n icuuc CONFIGURE_ARGS += --disable-gstreamer -RUN_DEPENDS += net/tor>=0.2.8.7 +RUN_DEPENDS += net/tor>=0.2.9.9 # bug 857628 CONFIGURE_ARGS += --enable-pie Index: www/tor-browser/browser/distinfo === RCS file: /cvs/ports/www/tor-browser/browser/distinfo,v retrieving revision 1.3 diff -u -p -r1.3 distinfo --- www/tor-browser/browser/distinfo 24 Dec 2016 20:15:06 - 1.3 +++ www/tor-browser/browser/distinfo 26 Jan 2017 22:40:05 - @@ -1,2 +1,2 @@ -SHA256 (tor-browser/v6.0.8-esr45.6.0.tar.gz) = btCnk5yi1YoQ1YA+o5VwFRHjpM9yF/mmE8YvuSAVwzY= -SIZE (tor-browser/v6.0.8-esr45.6.0.tar.gz) = 256614669 +SHA256 (tor-browser/v6.5-esr45.7.0.tar.gz) = RIKh9Ura08i7pYMfz1mjNZn50kAetrnpmOBppzGvXcM= +SIZE (tor-browser/v6.5-esr45.7.0.tar.gz) = 256763405 Index: www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp === RCS file: www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp diff -N www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp --- www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp 13 Nov 2016 21:15:43 - 1.1.1.1 +++ /dev/null 1 Jan 1970 00:00:00 - @@ -1,14 +0,0 @@ -$OpenBSD: patch-js_src_jit_ExecutableAllocator_cpp,v 1.1.1.1 2016/11/13 21:15:43 landry Exp $ - -Brought over from www/firefox-esr 45.1.1 js/src/jit/ExecutableAllocator.cpp.orig Tue May 31 07:26:30 2016 -+++ js/src/jit/ExecutableAllocator.cpp Wed Jun 1 18:34:00 2016 -@@ -88,7 +88,7 @@ ExecutableAllocator::addSizeOfCode(JS::CodeSizes* size - } - } - --#if TARGET_OS_IPHONE -+#if defined(__OpenBSD__) || TARGET_OS_IPHONE - bool ExecutableAllocator::nonWritableJitCode = true; - #else - bool ExecutableAllocator::nonWritableJitCode = false; Index: www/tor-browser/https-everywhere/Makefile === RCS file: /cvs/ports/www/tor-browser/https-everywhere/Makefile,v retrieving revision 1.3 diff -u -p -r1.3 Makefile --- www/tor-browser/https-everywhere/Makefile 24 Dec 2016 20:15:06 - 1.3 +++ www/tor-browser/https-everywhere/Makefile 26 Jan 2017 22:40:05 - @@ -1,7 +1,7 @@ # $OpenBSD: Makefile,v 1.3 2016/12/24 20:15:06 landry Exp $ ADDON_NAME = https-everywhere -V = 5.2.8 +V = 5.2.9 COMMENT = Tor Browser add-on: force https where possible HOMEPAGE = https://www.eff.org/https-everywhere MASTER_SITES = https://www.eff.org/files/ Index: www/tor-browser/https-everywhere/distinfo === RCS file: /cvs/ports/www/tor-browser/https-everywhere/distinfo,v retrieving revision 1.3 diff -u -p -r1.3 distinfo --- www/tor-browser/https-everywhere/distinfo 24 Dec 2016 20:15:06 - 1.3 +++ www/tor-browser/https-everywhere/distinfo 26 Jan 2017 22:40:05 - @@ -1,2 +1,2 @@ -SHA256 (https-everywhere-5.2.8-eff.xpi) = rfmyjpeI2lsmQnAmmzZJrfRDfD1wgxGsMpx7pqoMnzo= -SIZE (https-everywhere-5.2.8-eff.xpi) = 2795089 +SHA256 (https-everywhere-5.2.9-eff.xpi) = xygcUliVA0oSXDTRF6S8h5xPuq9lpjrfVCrRBWjaPJQ= +SIZE (https-everywhere-5.2.9-eff.xpi) = 2798649 Index: www/tor-browser/https-everywhere/pkg/PLIST =
Re: Fw: ECC support for sendmail
On Sun, Jan 29, 2017 at 07:51:38AM -0700, Kyle Amon wrote: > Ahem. I still think it would be great if this could get applied > before yet another release goes by. ;) Commited, Thanks! bluhm > > --Kyle > > Begin forwarded message: > > Date: Mon, 28 Mar 2016 07:34:21 -0700 > From: Kyle Amon > To: ports@openbsd.org > Subject: ECC support for sendmail > > > Hi, > > Please consider adding the following to the OpenBSD sendmail port in > order to add ECC support to STARTTLS (-D_FFR_TLS_EC), and hopefully to > add a little more granular control of TLS (-D_FFR_TLS_SE_OPTS) as well > (but at least the former seems a quite reasonable default in CE 2016). > > --- sendmail/files/site.OS.m4.dist Mon Mar 28 06:39:40 2016 > +++ sendmail/files/site.OS.m4 Mon Mar 28 06:50:33 2016 > @@ -32,6 +32,8 @@ > APPENDDEF(`conf_sendmail_ENVDEF', `-DMILTER') > dnl (START)TLS > APPENDDEF(`confENVDEF', `-DSTARTTLS')dnl > +APPENDDEF(`confENVDEF', `-D_FFR_TLS_EC')dnl > +APPENDDEF(`confENVDEF', `-D_FFR_TLS_SE_OPTS')dnl > APPENDDEF(`confLIBS', `-lssl -lcrypto')dnl > dnl Flavors > dnl === > > Thanks and Best Regards, > > --Kyle > > P.S. Also, please note that I'm not on the ports mailing list. > > -- > > CA +1-778-819-UNIX BackWatcher, Inc. > US +1-425-584-UNIX Information Security > SIPS am...@backwatcher.comwww.backwatcher.ca > > INUM +883-5100-0990-1657 | ISN UNIX*1917 | C*NET 1-731-UNIX > > GPG ed25519/29F16B93AB0EA2FC [ed25519/AB0EA2FC] > D90D F23C AB7A E0B4 4A04 14EA 29F1 6B93 AB0E A2FC > > OTR E1A46361 9FD0D801 0132D21A FE2E96BE 39E3F069 : xmpp am...@backwatcher.com > 5AB3E0B8 31F6ADB4 9A7D2FC2 A8235281 5776701E : silc silcnet >
Re: sqlite 3.16.2
On Wed, Jan 25, 2017 at 08:27:28PM +0100, Landry Breuil wrote: > Hi, > > firefox 52 requires sqlite 3.15.1 at least; so let's jump to 3.16.2 > directly. Bumped the major to be on the safe side, but nm showed no > differences between libs, but there are always defines lurking around in > headers... > will put it in a bulk once the ssl rampage is cleaned up.. Fwiw, a full bulk build didnt show failures related to this diff; so i'm going to commit it soon unless someone has a valid objection against it :) Landry
UPDATE: audio/wavpack 5.1.0
This update fixes 4 vulnerabilities. For details, see: http://www.openwall.com/lists/oss-security/2017/01/23/4 Also there are a few API additions, but "the legacy APIs are all retained and existing applications that worked with the previous version of the library will continue to work unmodified". See: http://www.wavpack.com/WavPack5PortingGuide.pdf Changelog: http://www.wavpack.com/changelog.txt OK? Index: Makefile === RCS file: /cvs/ports/audio/wavpack/Makefile,v retrieving revision 1.21 diff -p -u -r1.21 Makefile --- Makefile28 May 2016 21:19:16 - 1.21 +++ Makefile30 Jan 2017 19:22:11 - @@ -2,14 +2,14 @@ COMMENT = audio codec for lossless, lossy and hybrid compression -DISTNAME = wavpack-4.80.0 +DISTNAME = wavpack-5.1.0 CATEGORIES = audio HOMEPAGE = http://www.wavpack.com/ MAINTAINER = Tim van der Molen -SHARED_LIBS += wavpack 0.1 # 2.8 +SHARED_LIBS += wavpack 1.0 # 3.0 # BSD PERMIT_PACKAGE_CDROM = Yes @@ -27,7 +27,11 @@ CONFIGURE_ARGS = --enable-tests CONFIGURE_ENV =CPPFLAGS="-I${LOCALBASE}/include" \ LDFLAGS="-L${LOCALBASE}/lib" +DOCDIR=${PREFIX}/share/doc/wavpack + post-install: + ${INSTALL_DATA_DIR} ${DOCDIR} + ${INSTALL_DATA} ${WRKSRC}/ChangeLog ${WRKSRC}/doc/* ${DOCDIR} rm ${PREFIX}/bin/wvtest do-test: Index: distinfo === RCS file: /cvs/ports/audio/wavpack/distinfo,v retrieving revision 1.5 diff -p -u -r1.5 distinfo --- distinfo27 May 2016 21:57:52 - 1.5 +++ distinfo30 Jan 2017 19:22:11 - @@ -1,2 +1,2 @@ -SHA256 (wavpack-4.80.0.tar.bz2) = eRgup1970cqTHtIwBitDX95KTC4NvK0EgAe9HvHma+k= -SIZE (wavpack-4.80.0.tar.bz2) = 450257 +SHA256 (wavpack-5.1.0.tar.bz2) = GTlifVNY0dpivGFY1j9+0SkFVS86eZx5nukClqdhKUQ= +SIZE (wavpack-5.1.0.tar.bz2) = 824331 Index: pkg/PLIST === RCS file: /cvs/ports/audio/wavpack/pkg/PLIST,v retrieving revision 1.5 diff -p -u -r1.5 PLIST --- pkg/PLIST 22 May 2015 11:31:11 - 1.5 +++ pkg/PLIST 30 Jan 2017 19:22:11 - @@ -1,6 +1,7 @@ @comment $OpenBSD: PLIST,v 1.5 2015/05/22 11:31:11 ajacoutot Exp $ @bin bin/wavpack @bin bin/wvgain +@bin bin/wvtag @bin bin/wvunpack include/wavpack/ include/wavpack/wavpack.h @@ -10,4 +11,12 @@ lib/libwavpack.la lib/pkgconfig/wavpack.pc @man man/man1/wavpack.1 @man man/man1/wvgain.1 +@man man/man1/wvtag.1 @man man/man1/wvunpack.1 +share/doc/wavpack/ +share/doc/wavpack/ChangeLog +share/doc/wavpack/WavPack5FileFormat.pdf +share/doc/wavpack/WavPack5LibraryDoc.pdf +share/doc/wavpack/WavPack5PortingGuide.pdf +share/doc/wavpack/style.css +share/doc/wavpack/wavpack_doc.html
Re: UPDATE: vim
update to a more recent patchlevel please test and commit. -f -- Index: Makefile === RCS file: /cvs/ports/editors/vim/Makefile,v retrieving revision 1.157 diff -u -p -r1.157 Makefile --- Makefile3 Jan 2017 19:22:09 - 1.157 +++ Makefile30 Jan 2017 21:35:06 - @@ -4,7 +4,7 @@ COMMENT-main= vi clone, many additional COMMENT-lang= vi clone, NLS subpackage # if updating major version, sync editors/vim-spell -V= 8.0.0095 +V= 8.0.0257 GH_ACCOUNT=vim GH_PROJECT=vim GH_TAGNAME=v$V @@ -13,7 +13,6 @@ PKGNAME-main= vim-$V PKGNAME-lang= vim-lang-$V P= vim${V:R:S/.//} CATEGORIES=editors -REVISION-main= 0 HOMEPAGE= http://www.vim.org/ Index: distinfo === RCS file: /cvs/ports/editors/vim/distinfo,v retrieving revision 1.51 diff -u -p -r1.51 distinfo --- distinfo23 Nov 2016 16:40:33 - 1.51 +++ distinfo30 Jan 2017 21:35:06 - @@ -1,2 +1,2 @@ -SHA256 (vim-8.0.0095.tar.gz) = 51arfHqzHhII/xH0fVX00WjVhuy4+pMvdO82/L9YEfI= -SIZE (vim-8.0.0095.tar.gz) = 12944792 +SHA256 (vim-8.0.0257.tar.gz) = UkbE99UNBzvlbS0gLxzuqiTUQIMxbce9hZWew2Mqfxc= +SIZE (vim-8.0.0257.tar.gz) = 12973236 Index: pkg/PLIST-main === RCS file: /cvs/ports/editors/vim/pkg/PLIST-main,v retrieving revision 1.17 diff -u -p -r1.17 PLIST-main --- pkg/PLIST-main 23 Nov 2016 16:40:33 - 1.17 +++ pkg/PLIST-main 30 Jan 2017 21:35:06 - @@ -109,6 +109,7 @@ share/vim/${P}/compiler/fpc.vim share/vim/${P}/compiler/g95.vim share/vim/${P}/compiler/gcc.vim share/vim/${P}/compiler/gfortran.vim +share/vim/${P}/compiler/ghc.vim share/vim/${P}/compiler/gnat.vim share/vim/${P}/compiler/go.vim share/vim/${P}/compiler/haml.vim
Re: [patch] zsh 5.3
On Thu Dec 15, 2016 at 09:47:21AM +0100, Pierre-Emmanuel André wrote: > On Wed, Dec 14, 2016 at 09:28:56PM +0100, Juan Francisco Cantero Hurtado > wrote: > > On Mon, Dec 12, 2016 at 08:52:43PM -0600, Matthew Martin wrote: > > > Update to zsh 5.3, mostly removing upstreamed patches. A regex test in > > > D07 fails, but upstream believes[1] this is due to OpenBSD's locale > > > support (or lack thereof). Been running for about a day. > > > > > > 1: http://zsh.org/mla/workers/2016/msg02607.html > > > > > > - Matthew Martin > > > > Works for me. OK juanfra@. > > Works fine for me too. > ok pea@ (will commit it later) > *ping*, OK from juanfra@ and pea@.
samba4 and ACL's
I have a few machines stuck on 5.9 with samba 4.1 running as a domain controller. It seems i can't really upgrade these machines to 6.0 and most likely 6.1 as samba 4.4 forces the use of s3fs which requires posix ACL's. I was wondering if anyone else has the same issue or has heard of anything lately that might resolve this in the future? Maybe as a stop gap it would make sense to have two versions of samba in the tree? one new one, and one being the last supported version that can still use ntvfs?