Update composer to 1.3.2

2017-01-30 Thread Frank Groeneveld
Attached patch updates composer from 1.0.0 to 1.3.2.
This update fixes an issue where OpenSSL detection wouldn't work
for LibreSSL.

Thanks,

Frank
Index: Makefile
===
RCS file: /cvs/ports/www/composer/Makefile,v
retrieving revision 1.2
diff -u -p -r1.2 Makefile
--- Makefile5 Apr 2016 22:51:29 -   1.2
+++ Makefile30 Jan 2017 09:17:02 -
@@ -4,7 +4,7 @@ COMMENT=dependency manager for PHP
 
 CATEGORIES=www devel
 
-V= 1.0.0
+V= 1.3.2
 EPOCH= 0
 MASTER_SITES=  https://getcomposer.org/download/$V/
 DISTNAME=  composer-$V
Index: distinfo
===
RCS file: /cvs/ports/www/composer/distinfo,v
retrieving revision 1.2
diff -u -p -r1.2 distinfo
--- distinfo5 Apr 2016 22:51:29 -   1.2
+++ distinfo30 Jan 2017 09:17:02 -
@@ -1,2 +1,2 @@
-SHA256 (composer-1.0.0.phar) = GswADPI72dGeFZDC7etE+5FfiNhfF5iSXsmJxgHbC9Y=
-SIZE (composer-1.0.0.phar) = 1592980
+SHA256 (composer-1.3.2.phar) = ak92GqNLtp/KhrxBGl6YNsqCRvD80p84BLF0/un7BWk=
+SIZE (composer-1.3.2.phar) = 1816271


Re: UPDATE: geo/geos

2017-01-30 Thread Landry Breuil
On Fri, Jan 27, 2017 at 07:51:31AM +0100, Rafael Sadowski wrote:
> Hi ports@,
> 
> - Update to 3.6.1
> - Bump geos (C++ API changes according to the changlog)
> - Remove all doxygen depends:
> -- https://marc.info/?l=openbsd-ports&m=147433167219051&w=2

agreed ..

> - Tests fails like the old version

Thanks, i'll try to look into this... dont hesitate to harass me via
mail or icb if i forget.



update to lua 5.3.4

2017-01-30 Thread Jonathan Gray
A 5.3 bugfix release

http://marc.info/?l=lua-l&m=148576985120837&w=2
https://www.lua.org/bugs.html#5.3.3

Index: Makefile
===
RCS file: /cvs/ports/lang/lua/5.3/Makefile,v
retrieving revision 1.7
diff -u -p -r1.7 Makefile
--- Makefile29 Jun 2016 16:14:42 -  1.7
+++ Makefile30 Jan 2017 11:07:04 -
@@ -2,9 +2,8 @@
 
 PORTROACH= limit:^5\.3
 
-VERSION=   5.3.3
+VERSION=   5.3.4
 PKGSPEC=   lua->=5.3,<5.4
-REVISION = 0
 
 SHARED_LIBS=   lua5.3 ${VERSION:R}
 
Index: distinfo
===
RCS file: /cvs/ports/lang/lua/5.3/distinfo,v
retrieving revision 1.4
diff -u -p -r1.4 distinfo
--- distinfo17 Jun 2016 18:55:28 -  1.4
+++ distinfo30 Jan 2017 11:07:09 -
@@ -1,2 +1,2 @@
-SHA256 (lua-5.3.3.tar.gz) = URPAaIT33kU85XcCq6rB1hgwfzP2eJ+ocOh6WddyrKI=
-SIZE (lua-5.3.3.tar.gz) = 294290
+SHA256 (lua-5.3.4.tar.gz) = 9oGqUYIzvEB+I6zw9Yh8iE8XQ28ADUU7JJGp8RpSQAw=
+SIZE (lua-5.3.4.tar.gz) = 303586



Re: Update composer to 1.3.2

2017-01-30 Thread Stuart Henderson
On 2017/01/30 10:19, Frank Groeneveld wrote:
> Attached patch updates composer from 1.0.0 to 1.3.2.
> This update fixes an issue where OpenSSL detection wouldn't work
> for LibreSSL.

Thanks Frank, committed.



Re: fix for isc-dhcp-server IPv6

2017-01-30 Thread Jeremie Courreges-Anglas
Marc Peters  writes:

[...]

> Works here (backported to 4.3.4 for -stable, though).

Committed, thanks.

-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE



Re: Fw: ECC support for sendmail

2017-01-30 Thread Jeremie Courreges-Anglas
Alexander Bluhm  writes:

> On Sun, Jan 29, 2017 at 07:51:38AM -0700, Kyle Amon wrote:
>> Ahem.  I still think it would be great if this could get applied
>> before yet another release goes by. ;)
>
> I have tested it.  The server cypher list changes from
>* SSLv23TLSv1_2   DHE-RSA-AES256-GCM-SHA384
>* TLSv1_2   TLSv1_2   DHE-RSA-AES256-GCM-SHA384
>* TLSv1_1   TLSv1_1   DHE-RSA-AES256-SHA
>* TLSv1 TLSv1 DHE-RSA-AES256-SHA
> to
>* SSLv23TLSv1_2   ECDHE-RSA-AES256-GCM-SHA384
>* TLSv1_2   TLSv1_2   ECDHE-RSA-AES256-GCM-SHA384
>* TLSv1_1   TLSv1_1   ECDHE-RSA-AES256-SHA
>* TLSv1 TLSv1 ECDHE-RSA-AES256-SHA
>
> We also need a revision bump.
>
> ok?

I just want to stress that "FFR" means "For Future Releases".
Generally I don't think we should enable experimental features just
because we can, and I can't see why EC would be different here.

No objection though, my use case doesn't involve TLS.

-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE



devel/py-certifi update to 2017.1.23

2017-01-30 Thread Sebastian Reitenbach
Hi,

wanted to update sysutils/py-elasticsearch-curator, and found it now has 
dependency to certifi
set to latest version 2017.1.23.

The other two dependencies of certifi I found in the ports tree www/py-tornado 
and
net/py-geventhttpclient don't have specific version requirements in their 
setup.py.

make update-plist removed ${MODPY_PYCACHE} and ${MODPY_PYC_MAGIC_TAG}
but these seem to be necessary for the python3 flavor. So I kept the PLIST as 
is,
as there were no other changes.

seems to work for me.

OK?

Sebastian

Index: Makefile
===
RCS file: /cvs/ports/devel/py-certifi/Makefile,v
retrieving revision 1.13
diff -u -r1.13 Makefile
--- Makefile3 Jan 2017 19:19:48 -   1.13
+++ Makefile30 Jan 2017 11:55:49 -
@@ -2,11 +2,10 @@

 COMMENT =  Python package to check certificates using the OpenBSD 
CA

-MODPY_EGG_VERSION =2016.9.26
+MODPY_EGG_VERSION =2017.1.23
 DISTNAME = certifi-${MODPY_EGG_VERSION}
 PKGNAME =  py-${DISTNAME}
 CATEGORIES =   devel security
-REVISION = 0

 HOMEPAGE = https://certifi.io/

Index: distinfo
===
RCS file: /cvs/ports/devel/py-certifi/distinfo,v
retrieving revision 1.7
diff -u -r1.7 distinfo
--- distinfo26 Sep 2016 16:22:34 -  1.7
+++ distinfo30 Jan 2017 11:55:49 -
@@ -1,2 +1,2 @@
-SHA256 (certifi-2016.9.26.tar.gz) = 
gnWu8bvq8FxTcVv8XYVpvR4Eyh6OaWCMxSvKrCYE6xk=
-SIZE (certifi-2016.9.26.tar.gz) = 374637
+SHA256 (certifi-2017.1.23.tar.gz) = 
gYd/t6wSbpIV37Fb/vcRX9ww55jgATBlFY7tBwf9mc4=
+SIZE (certifi-2017.1.23.tar.gz) = 380397




Re: ECC support for sendmail

2017-01-30 Thread Claus Assmann
On Mon, Jan 30, 2017, Jeremie Courreges-Anglas wrote:

> I just want to stress that "FFR" means "For Future Releases".
> Generally I don't think we should enable experimental features just
> because we can, and I can't see why EC would be different here.

It is a "non-FFR" compile time option in the 8.16.x snapshots
and the other FFR has been enabled:

8.16.1/8.16.1   201X/XX/XX
New compile time option TLS_EC to enable the use of elliptic
curve cryptography in STARTTLS (previously available as
_FFR_TLS_EC).
CONFIG: New FEATURE(`tls_session_features') to enable standard
rules for tls_srv_features and tls_clt_features; for
details see cf/README.

-- 
Please don't Cc: me, use only the list for replies.



Re: ECC support for sendmail

2017-01-30 Thread Jeremie Courreges-Anglas
Claus Assmann  writes:

> On Mon, Jan 30, 2017, Jeremie Courreges-Anglas wrote:
>
>> I just want to stress that "FFR" means "For Future Releases".
>> Generally I don't think we should enable experimental features just
>> because we can, and I can't see why EC would be different here.
>
> It is a "non-FFR" compile time option in the 8.16.x snapshots
> and the other FFR has been enabled:

Then I guess enabling this is reasonable.

Thanks,
-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE



Re: Fw: ECC support for sendmail

2017-01-30 Thread Alexander Bluhm
On Mon, Jan 30, 2017 at 12:45:43PM +0100, Jeremie Courreges-Anglas wrote:
> I just want to stress that "FFR" means "For Future Releases".
> Generally I don't think we should enable experimental features just
> because we can, and I can't see why EC would be different here.

Unfortunately sendmail releases do not happen often these days.

I have compared the 8.15.2 FFR code with their snapshot 8.16.0.19
from July 2016.  The _FFR prefix is gone, some logging changed, and
they can parse an additional "flags" argument now.  So it looks
that this code is not experimental anymore.

I think it is better to enable modern cryptography now than to wait
for a new release.

bluhm



[UPDATE] Tor Browser 6.5

2017-01-30 Thread attila
Hi ports@,

The attached patch brings us up to Tor Browser 6.5.  It requires the
net/tor patch to run since we have to r-dep on net/tor>=0.2.9.9 to
remain true to upstream:
https://marc.info/?l=openbsd-ports&m=148562136724885&w=2

Tested on amd64.

Pax, -A
--
https://haqistan.net/~attila | attila@{stalphonsos.com,haqistan.net}
pgp: 0x62A729CF | C2CE 2487 03AC 4C2F 101D  09C1 4068 D5D5 62A7 29CF
Index: www/tor-browser/Makefile.inc
===
RCS file: /cvs/ports/www/tor-browser/Makefile.inc,v
retrieving revision 1.3
diff -u -p -r1.3 Makefile.inc
--- www/tor-browser/Makefile.inc	24 Dec 2016 20:15:05 -	1.3
+++ www/tor-browser/Makefile.inc	26 Jan 2017 22:40:05 -
@@ -6,7 +6,7 @@ GH_ACCOUNT ?=		torbsd
 PERMIT_PACKAGE_CDROM ?= Yes
 CATEGORIES =		www
 BROWSER_NAME =		tor-browser
-TB_VERSION =		6.0.8
+TB_VERSION =		6.5
 TB_PREFIX =		tb
 
 SUBST_VARS +=		BROWSER_NAME TB_VERSION
Index: www/tor-browser/browser/Makefile
===
RCS file: /cvs/ports/www/tor-browser/browser/Makefile,v
retrieving revision 1.4
diff -u -p -r1.4 Makefile
--- www/tor-browser/browser/Makefile	24 Jan 2017 21:27:28 -	1.4
+++ www/tor-browser/browser/Makefile	26 Jan 2017 22:40:05 -
@@ -15,11 +15,10 @@ DIST_SUBDIR = 		${BROWSER_NAME}
 WRKDIST = 		${WRKDIR}/${GH_PROJECT}-${GH_TAGNAME:C/^v//}
 
 GH_PROJECT =		torb
-GH_TAGNAME =		v${TB_VERSION}-esr45.6.0
+GH_TAGNAME =		v${TB_VERSION}-esr45.7.0
 
 PKGNAME =		${TB_PREFIX}-browser-${TB_VERSION}
 DISTNAME =		${GH_TAGNAME}
-REVISION =		0
 
 SO_VERSION =		1.0
 MOZILLA_LIBS =		browsercomps xul lgpllibs
@@ -81,7 +80,7 @@ WANTLIB += 		icudata icui18n icuuc
 
 CONFIGURE_ARGS +=	--disable-gstreamer
 
-RUN_DEPENDS +=		net/tor>=0.2.8.7
+RUN_DEPENDS +=		net/tor>=0.2.9.9
 
 # bug 857628
 CONFIGURE_ARGS +=	--enable-pie
Index: www/tor-browser/browser/distinfo
===
RCS file: /cvs/ports/www/tor-browser/browser/distinfo,v
retrieving revision 1.3
diff -u -p -r1.3 distinfo
--- www/tor-browser/browser/distinfo	24 Dec 2016 20:15:06 -	1.3
+++ www/tor-browser/browser/distinfo	26 Jan 2017 22:40:05 -
@@ -1,2 +1,2 @@
-SHA256 (tor-browser/v6.0.8-esr45.6.0.tar.gz) = btCnk5yi1YoQ1YA+o5VwFRHjpM9yF/mmE8YvuSAVwzY=
-SIZE (tor-browser/v6.0.8-esr45.6.0.tar.gz) = 256614669
+SHA256 (tor-browser/v6.5-esr45.7.0.tar.gz) = RIKh9Ura08i7pYMfz1mjNZn50kAetrnpmOBppzGvXcM=
+SIZE (tor-browser/v6.5-esr45.7.0.tar.gz) = 256763405
Index: www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp
===
RCS file: www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp
diff -N www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp
--- www/tor-browser/browser/patches/patch-js_src_jit_ExecutableAllocator_cpp	13 Nov 2016 21:15:43 -	1.1.1.1
+++ /dev/null	1 Jan 1970 00:00:00 -
@@ -1,14 +0,0 @@
-$OpenBSD: patch-js_src_jit_ExecutableAllocator_cpp,v 1.1.1.1 2016/11/13 21:15:43 landry Exp $
-
-Brought over from www/firefox-esr 45.1.1
 js/src/jit/ExecutableAllocator.cpp.orig	Tue May 31 07:26:30 2016
-+++ js/src/jit/ExecutableAllocator.cpp	Wed Jun  1 18:34:00 2016
-@@ -88,7 +88,7 @@ ExecutableAllocator::addSizeOfCode(JS::CodeSizes* size
- }
- }
- 
--#if TARGET_OS_IPHONE
-+#if defined(__OpenBSD__) || TARGET_OS_IPHONE
- bool ExecutableAllocator::nonWritableJitCode = true;
- #else
- bool ExecutableAllocator::nonWritableJitCode = false;
Index: www/tor-browser/https-everywhere/Makefile
===
RCS file: /cvs/ports/www/tor-browser/https-everywhere/Makefile,v
retrieving revision 1.3
diff -u -p -r1.3 Makefile
--- www/tor-browser/https-everywhere/Makefile	24 Dec 2016 20:15:06 -	1.3
+++ www/tor-browser/https-everywhere/Makefile	26 Jan 2017 22:40:05 -
@@ -1,7 +1,7 @@
 # $OpenBSD: Makefile,v 1.3 2016/12/24 20:15:06 landry Exp $
 
 ADDON_NAME =		https-everywhere
-V =			5.2.8
+V =			5.2.9
 COMMENT =		Tor Browser add-on: force https where possible
 HOMEPAGE =		https://www.eff.org/https-everywhere
 MASTER_SITES =		https://www.eff.org/files/
Index: www/tor-browser/https-everywhere/distinfo
===
RCS file: /cvs/ports/www/tor-browser/https-everywhere/distinfo,v
retrieving revision 1.3
diff -u -p -r1.3 distinfo
--- www/tor-browser/https-everywhere/distinfo	24 Dec 2016 20:15:06 -	1.3
+++ www/tor-browser/https-everywhere/distinfo	26 Jan 2017 22:40:05 -
@@ -1,2 +1,2 @@
-SHA256 (https-everywhere-5.2.8-eff.xpi) = rfmyjpeI2lsmQnAmmzZJrfRDfD1wgxGsMpx7pqoMnzo=
-SIZE (https-everywhere-5.2.8-eff.xpi) = 2795089
+SHA256 (https-everywhere-5.2.9-eff.xpi) = xygcUliVA0oSXDTRF6S8h5xPuq9lpjrfVCrRBWjaPJQ=
+SIZE (https-everywhere-5.2.9-eff.xpi) = 2798649
Index: www/tor-browser/https-everywhere/pkg/PLIST
=

Re: Fw: ECC support for sendmail

2017-01-30 Thread Alexander Bluhm
On Sun, Jan 29, 2017 at 07:51:38AM -0700, Kyle Amon wrote:
> Ahem.  I still think it would be great if this could get applied
> before yet another release goes by. ;)

Commited, Thanks!

bluhm

> 
> --Kyle
> 
> Begin forwarded message:
> 
> Date: Mon, 28 Mar 2016 07:34:21 -0700
> From: Kyle Amon 
> To: ports@openbsd.org
> Subject: ECC support for sendmail
> 
> 
> Hi,
> 
> Please consider adding the following to the OpenBSD sendmail port in
> order to add ECC support to STARTTLS (-D_FFR_TLS_EC), and hopefully to
> add a little more granular control of TLS (-D_FFR_TLS_SE_OPTS) as well
> (but at least the former seems a quite reasonable default in CE 2016).
> 
> --- sendmail/files/site.OS.m4.dist  Mon Mar 28 06:39:40 2016
> +++ sendmail/files/site.OS.m4   Mon Mar 28 06:50:33 2016
> @@ -32,6 +32,8 @@
>  APPENDDEF(`conf_sendmail_ENVDEF', `-DMILTER')
>  dnl (START)TLS
>  APPENDDEF(`confENVDEF', `-DSTARTTLS')dnl
> +APPENDDEF(`confENVDEF', `-D_FFR_TLS_EC')dnl
> +APPENDDEF(`confENVDEF', `-D_FFR_TLS_SE_OPTS')dnl
>  APPENDDEF(`confLIBS', `-lssl -lcrypto')dnl
>  dnl Flavors
>  dnl ===
> 
> Thanks and Best Regards,
> 
> --Kyle
> 
> P.S.  Also, please note that I'm not on the ports mailing list.
> 
> -- 
> 
>   CA +1-778-819-UNIX  BackWatcher, Inc.
>   US +1-425-584-UNIX  Information Security
> SIPS am...@backwatcher.comwww.backwatcher.ca
> 
>  INUM +883-5100-0990-1657  |  ISN UNIX*1917  |  C*NET 1-731-UNIX
> 
> GPG ed25519/29F16B93AB0EA2FC [ed25519/AB0EA2FC]
> D90D F23C AB7A E0B4 4A04  14EA 29F1 6B93 AB0E A2FC
> 
> OTR E1A46361 9FD0D801 0132D21A FE2E96BE 39E3F069 : xmpp am...@backwatcher.com
> 5AB3E0B8 31F6ADB4 9A7D2FC2 A8235281 5776701E : silc silcnet
> 




Re: sqlite 3.16.2

2017-01-30 Thread Landry Breuil
On Wed, Jan 25, 2017 at 08:27:28PM +0100, Landry Breuil wrote:
> Hi,
> 
> firefox 52 requires sqlite 3.15.1 at least; so let's jump to 3.16.2
> directly. Bumped the major to be on the safe side, but nm showed no
> differences between libs, but there are always defines lurking around in
> headers...
> will put it in a bulk once the ssl rampage is cleaned up..

Fwiw, a full bulk build didnt show failures related to this diff; so i'm
going to commit it soon unless someone has a valid objection against it
:)

Landry



UPDATE: audio/wavpack 5.1.0

2017-01-30 Thread Tim van der Molen
This update fixes 4 vulnerabilities. For details, see:
http://www.openwall.com/lists/oss-security/2017/01/23/4

Also there are a few API additions, but "the legacy APIs are all
retained and existing applications that worked with the previous version
of the library will continue to work unmodified". See:
http://www.wavpack.com/WavPack5PortingGuide.pdf

Changelog: http://www.wavpack.com/changelog.txt

OK?

Index: Makefile
===
RCS file: /cvs/ports/audio/wavpack/Makefile,v
retrieving revision 1.21
diff -p -u -r1.21 Makefile
--- Makefile28 May 2016 21:19:16 -  1.21
+++ Makefile30 Jan 2017 19:22:11 -
@@ -2,14 +2,14 @@
 
 COMMENT =  audio codec for lossless, lossy and hybrid compression
 
-DISTNAME = wavpack-4.80.0
+DISTNAME = wavpack-5.1.0
 CATEGORIES =   audio
 
 HOMEPAGE = http://www.wavpack.com/
 
 MAINTAINER =   Tim van der Molen 
 
-SHARED_LIBS += wavpack 0.1 # 2.8
+SHARED_LIBS += wavpack 1.0 # 3.0
 
 # BSD
 PERMIT_PACKAGE_CDROM = Yes
@@ -27,7 +27,11 @@ CONFIGURE_ARGS = --enable-tests
 CONFIGURE_ENV =CPPFLAGS="-I${LOCALBASE}/include" \
LDFLAGS="-L${LOCALBASE}/lib"
 
+DOCDIR=${PREFIX}/share/doc/wavpack
+
 post-install:
+   ${INSTALL_DATA_DIR} ${DOCDIR}
+   ${INSTALL_DATA} ${WRKSRC}/ChangeLog ${WRKSRC}/doc/* ${DOCDIR}
rm ${PREFIX}/bin/wvtest
 
 do-test:
Index: distinfo
===
RCS file: /cvs/ports/audio/wavpack/distinfo,v
retrieving revision 1.5
diff -p -u -r1.5 distinfo
--- distinfo27 May 2016 21:57:52 -  1.5
+++ distinfo30 Jan 2017 19:22:11 -
@@ -1,2 +1,2 @@
-SHA256 (wavpack-4.80.0.tar.bz2) = eRgup1970cqTHtIwBitDX95KTC4NvK0EgAe9HvHma+k=
-SIZE (wavpack-4.80.0.tar.bz2) = 450257
+SHA256 (wavpack-5.1.0.tar.bz2) = GTlifVNY0dpivGFY1j9+0SkFVS86eZx5nukClqdhKUQ=
+SIZE (wavpack-5.1.0.tar.bz2) = 824331
Index: pkg/PLIST
===
RCS file: /cvs/ports/audio/wavpack/pkg/PLIST,v
retrieving revision 1.5
diff -p -u -r1.5 PLIST
--- pkg/PLIST   22 May 2015 11:31:11 -  1.5
+++ pkg/PLIST   30 Jan 2017 19:22:11 -
@@ -1,6 +1,7 @@
 @comment $OpenBSD: PLIST,v 1.5 2015/05/22 11:31:11 ajacoutot Exp $
 @bin bin/wavpack
 @bin bin/wvgain
+@bin bin/wvtag
 @bin bin/wvunpack
 include/wavpack/
 include/wavpack/wavpack.h
@@ -10,4 +11,12 @@ lib/libwavpack.la
 lib/pkgconfig/wavpack.pc
 @man man/man1/wavpack.1
 @man man/man1/wvgain.1
+@man man/man1/wvtag.1
 @man man/man1/wvunpack.1
+share/doc/wavpack/
+share/doc/wavpack/ChangeLog
+share/doc/wavpack/WavPack5FileFormat.pdf
+share/doc/wavpack/WavPack5LibraryDoc.pdf
+share/doc/wavpack/WavPack5PortingGuide.pdf
+share/doc/wavpack/style.css
+share/doc/wavpack/wavpack_doc.html



Re: UPDATE: vim

2017-01-30 Thread frantisek holop
update to a more recent patchlevel
please test and commit.

-f
-- 
Index: Makefile
===
RCS file: /cvs/ports/editors/vim/Makefile,v
retrieving revision 1.157
diff -u -p -r1.157 Makefile
--- Makefile3 Jan 2017 19:22:09 -   1.157
+++ Makefile30 Jan 2017 21:35:06 -
@@ -4,7 +4,7 @@ COMMENT-main=   vi clone, many additional 
 COMMENT-lang=  vi clone, NLS subpackage
 
 # if updating major version, sync editors/vim-spell
-V= 8.0.0095
+V= 8.0.0257
 GH_ACCOUNT=vim
 GH_PROJECT=vim
 GH_TAGNAME=v$V
@@ -13,7 +13,6 @@ PKGNAME-main= vim-$V
 PKGNAME-lang=  vim-lang-$V
 P= vim${V:R:S/.//}
 CATEGORIES=editors
-REVISION-main= 0
 
 HOMEPAGE=  http://www.vim.org/
 
Index: distinfo
===
RCS file: /cvs/ports/editors/vim/distinfo,v
retrieving revision 1.51
diff -u -p -r1.51 distinfo
--- distinfo23 Nov 2016 16:40:33 -  1.51
+++ distinfo30 Jan 2017 21:35:06 -
@@ -1,2 +1,2 @@
-SHA256 (vim-8.0.0095.tar.gz) = 51arfHqzHhII/xH0fVX00WjVhuy4+pMvdO82/L9YEfI=
-SIZE (vim-8.0.0095.tar.gz) = 12944792
+SHA256 (vim-8.0.0257.tar.gz) = UkbE99UNBzvlbS0gLxzuqiTUQIMxbce9hZWew2Mqfxc=
+SIZE (vim-8.0.0257.tar.gz) = 12973236
Index: pkg/PLIST-main
===
RCS file: /cvs/ports/editors/vim/pkg/PLIST-main,v
retrieving revision 1.17
diff -u -p -r1.17 PLIST-main
--- pkg/PLIST-main  23 Nov 2016 16:40:33 -  1.17
+++ pkg/PLIST-main  30 Jan 2017 21:35:06 -
@@ -109,6 +109,7 @@ share/vim/${P}/compiler/fpc.vim
 share/vim/${P}/compiler/g95.vim
 share/vim/${P}/compiler/gcc.vim
 share/vim/${P}/compiler/gfortran.vim
+share/vim/${P}/compiler/ghc.vim
 share/vim/${P}/compiler/gnat.vim
 share/vim/${P}/compiler/go.vim
 share/vim/${P}/compiler/haml.vim


Re: [patch] zsh 5.3

2017-01-30 Thread Rafael Sadowski
On Thu Dec 15, 2016 at 09:47:21AM +0100, Pierre-Emmanuel André wrote:
> On Wed, Dec 14, 2016 at 09:28:56PM +0100, Juan Francisco Cantero Hurtado 
> wrote:
> > On Mon, Dec 12, 2016 at 08:52:43PM -0600, Matthew Martin wrote:
> > > Update to zsh 5.3, mostly removing upstreamed patches. A regex test in
> > > D07 fails, but upstream believes[1] this is due to OpenBSD's locale
> > > support (or lack thereof). Been running for about a day.
> > > 
> > > 1: http://zsh.org/mla/workers/2016/msg02607.html
> > > 
> > > - Matthew Martin
> > 
> > Works for me. OK juanfra@.
> 
> Works fine for me too.
> ok pea@ (will commit it later)
>

*ping*, OK from juanfra@ and pea@.



samba4 and ACL's

2017-01-30 Thread alexmcwhirter
I have a few machines stuck on 5.9 with samba 4.1 running as a domain 
controller. It seems i can't really upgrade these machines to 6.0 and 
most likely 6.1 as samba 4.4 forces the use of s3fs which requires posix 
ACL's. I was wondering if anyone else has the same issue or has heard of 
anything lately that might resolve this in the future? Maybe as a stop 
gap it would make sense to have two versions of samba in the tree? one 
new one, and one being the last supported version that can still use 
ntvfs?