Re: UPDATE: security/opendnssec

2019-03-14 Thread Patrik Lundin
se the default one. I did so here for the learning experience. The responses from that service are not signed at this point, so there is no correlation with OpenDNSSEC. -- Patrik Lundin

Re: UPDATE: security/opendnssec

2019-01-12 Thread Patrik Lundin
org/pages/viewpage.action?pageId=10125376#HowdoI...?-UpgradeOpenDNSSEC1.4.9toOpenDNSSEC2.0 -- Patrik Lundin [1]: https://blog.sigterm.se/posts/to-the-cloud-dns-edition/

Re: net/kea: 1.2.0

2017-08-27 Thread Patrik Lundin
On Sun, Aug 27, 2017 at 11:19:44AM +0100, Stuart Henderson wrote: > On 2017/08/27 12:07, Patrik Lundin wrote: > > On Sat, Aug 12, 2017 at 11:39:14PM +0200, Patrik Lundin wrote: > > > > > > Since there have been no further feedback, is there a chance the latest

Re: net/kea: 1.2.0

2017-08-27 Thread Patrik Lundin
On Sat, Aug 12, 2017 at 11:39:14PM +0200, Patrik Lundin wrote: > > Since there have been no further feedback, is there a chance the latest > diff can get commited? > Ping. -- Patrik Lundin

Re: net/kea: 1.2.0

2017-08-12 Thread Patrik Lundin
On Thu, Aug 03, 2017 at 10:24:00PM +0200, Patrik Lundin wrote: > > Thanks for spotting that. New diff against fresh ports tree below (and > now portcheck is happy as well). > Since there have been no further feedback, is there a chance the latest diff can get commited? -- Patrik Lundin

Re: net/kea: 1.2.0

2017-08-03 Thread Patrik Lundin
m/isc-projects/kea/pull/53 I dont feel that warrants a port patch though as I don't think the outcome matters on OpenBSD. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/net/kea/Makefile,v retrieving revision

net/kea: 1.2.0

2017-08-03 Thread Patrik Lundin
by me, so I am unsure what the correct solution is. Here is the output of the requested port-lib-depends-check: === # make port-lib-depends-check kea-1.2.0(net/kea): Extra: stdc++.57 === Any input on this? -- Patrik Lundin Index: Makefile ==

Re: security/opendnssec: 1.4.14

2017-07-10 Thread Patrik Lundin
On Sun, Jul 02, 2017 at 12:00:08PM +0200, Patrik Lundin wrote: > Hello, > > Below is an update of security/opendnssec to 1.4.14. > From https://www.opendnssec.org/: > === > Bugs Fixed > * OPENDNSSEC-888: Fix up MySQL<->SQLite3 database conversion script. >

security/opendnssec: 1.4.14

2017-07-02 Thread Patrik Lundin
the same parameters. This would prevent KSK rollovers. * OPENDNSSEC-890: Bogus signatures on mismatching TTLs within the same RRset. === -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/security/opendnssec/Makefile,v r

Re: security/opendnssec: 1.4.13

2017-03-14 Thread Patrik Lundin
On Tue, Feb 07, 2017 at 07:12:57PM +0100, Patrik Lundin wrote: > On Sun, Jan 22, 2017 at 09:08:09PM +0100, Patrik Lundin wrote: > > Hello, > > > > Here is an update to the newly released OpenDNSSEC 1.4.13. It removes a > > patch > > that has been merged u

Re: security/opendnssec: 1.4.13

2017-02-07 Thread Patrik Lundin
On Sun, Jan 22, 2017 at 09:08:09PM +0100, Patrik Lundin wrote: > Hello, > > Here is an update to the newly released OpenDNSSEC 1.4.13. It removes a patch > that has been merged upstream. > Ping. -- Patrik Lundin

security/opendnssec: 1.4.13

2017-01-22 Thread Patrik Lundin
state file. Wrong error was sometimes being print on failing TCP connect. Add support for OpenSSL 1.1.0. OPENDNSSEC-866: Script for migration between MySQL and SQLite was outdated. === -- Patrik Lundin Index: Makefile

Re: security/softhsm: 1.3.8

2016-11-19 Thread Patrik Lundin
On Sat, Nov 19, 2016 at 02:02:06PM +, Stuart Henderson wrote: > > It seems the first hunk of the configure script patch is unnecessary, > probably since changes to pthread so that pulled in as a normal dependency. > Can you confirm that please? > Good catch, new diff bel

security/softhsm: 1.3.8

2016-11-19 Thread Patrik Lundin
: Inconsistencies between v1 and v2. Issue #17: Use the MutexFactory wrapper functions correctly. === Note that SOFTHSM-101 was already backported to the version currently in ports. This update removes those local patches. It also regens the patch to the configure script. -- Patrik Lundin Index

security/opendnssec: 1.4.12

2016-11-19 Thread Patrik Lundin
. === It removes two already applied patches, and adds a new one which has also been accepted upstream: https://github.com/opendnssec/opendnssec/pull/603 Finally it updates LIB_DEPENDS so that databases/sqlite3 is only part of the sqlite3 flavor to make portcheck happy. -- Patrik Lundin Index: Makefile

Re: net/kea: 1.1.0

2016-11-09 Thread Patrik Lundin
On Mon, Oct 10, 2016 at 12:28:58AM +0200, Patrik Lundin wrote: > Hello, > > See below for an update to net/kea from 1.0.0 to 1.1.0. > Ping. -- Patrik Lundin

Re: ansible: openbsd_pkg fails to run when just specifying the package name

2016-10-18 Thread Patrik Lundin
r retrieving file: 404 Not Found > $pkg_info -Iq ansible-2.1.1.0p2 > ansible-2.1.1.0p2 > > The only 'advantage' of -e here is that it finds it if you pass the full > version without the patchlevel. > Right, the reason for the switch was the requirement to find the real package on disk when a user supplies a name using the branch syntax. -- Patrik Lundin

Re: ansible: openbsd_pkg fails to run when just specifying the package name

2016-10-17 Thread Patrik Lundin
to be true for "-Iq inst:". This could mean that the module will always think that the package needs to be installed because it can't tell there is a package with the supplied name (plus patchlevel) already installed. === -- Patrik Lundin

Re: ansible: openbsd_pkg fails to run when just specifying the package name

2016-10-17 Thread Patrik Lundin
ball is missing a lot of branch related changes from upstream. This particular problem is a result of adding the last iteration of branch-syntax fixes without the previous plumbing. Doing a diff -u between a "make extract" version of openbsd_pkg.py and an upstream version from git shows quite a bit of changes that are missing. -- Patrik Lundin

net/kea: 1.1.0

2016-10-09 Thread Patrik Lundin
l Other then that the library versions of the port have been bumped based on shared_libs.log in WRKSRC. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/net/kea/Makefile,v retrieving revision 1.5 diff -u -p -u -r1.5 Mak

Re: security/softhsm2

2016-07-18 Thread Patrik Lundin
tps://pthree.org/2013/05/27/strengthen-your-private-encrypted-ssh-keys/ generated a private key file which i manged to import with softhsm. Does this fix your problem? -- Patrik Lundin

Re: net/kea: Helpfully failing test in ./configure

2016-06-27 Thread Patrik Lundin
On Mon, Jun 27, 2016 at 07:44:07PM +0200, Jeremie Courreges-Anglas wrote: > Patrik Lundin writes: > > > > > This means that the failing "test" can actually be thought of as a > > feature. It is of course brittle, and will modify the build parameters > &

Re: net/kea: Helpfully failing test in ./configure

2016-06-27 Thread Patrik Lundin
On Mon, Jun 27, 2016 at 07:51:33PM +, Christian Weisgerber wrote: > On 2016-06-27, Patrik Lundin wrote: > > > CXX_DUMP_VERSION=`$CXX -dumpversion | cut -f1-2 -d.` > > if test "$CXX_DUMP_VERSION" \< "4.5"; then > >WARNING_GCC_44_STRI

net/kea: Helpfully failing test in ./configure

2016-06-27 Thread Patrik Lundin
ters from other porters, anyone have an idea how I should deal with this? Should I bother at all? -- Patrik Lundin

net/kea: Ensure base awk is used

2016-06-27 Thread Patrik Lundin
wrap my head around the autoconf magic involved. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/net/kea/Makefile,v retrieving revision 1.5 diff -u -p -u -r1.5 Makefile --- Makefile14 Mar 2016 06:46:24 - 1.5

Re: security/opendnssec: 1.4.10

2016-06-14 Thread Patrik Lundin
On Mon, May 16, 2016 at 06:09:54PM +0200, Patrik Lundin wrote: > Hello, > > Attached is a patch for OpenDNSSEC 1.4.10: > https://www.opendnssec.org/2016/05/opendnssec-1-4-10/ > Ping. -- Patrik Lundin

security/opendnssec: 1.4.10

2016-05-16 Thread Patrik Lundin
Hello, Attached is a patch for OpenDNSSEC 1.4.10: https://www.opendnssec.org/2016/05/opendnssec-1-4-10/ The additional patch files were added to silence some minor build warnings that I noticed. They have been accepted upstream: https://github.com/opendnssec/opendnssec/pull/418 -- Patrik

Re: NO_SHARED cleanup status

2016-03-14 Thread Patrik Lundin
On Mon, Mar 14, 2016 at 09:25:48AM +, Stuart Henderson wrote: > On 2016/03/14 07:49, Jeremie Courreges-Anglas wrote: > > Patrik Lundin writes: > > > > [...] > > > > > The only thing I felt a bit unsure about is net/kea which disables the > > > b

Re: NO_SHARED cleanup status

2016-03-11 Thread Patrik Lundin
too. :-) > Thanks for the information, it seems jca@ has come to the rescue already :). -- Patrik Lundin

Re: NO_SHARED cleanup status

2016-03-11 Thread Patrik Lundin
On Fri, Mar 11, 2016 at 09:25:46PM +0100, Jeremie Courreges-Anglas wrote: > Patrik Lundin writes: > > If this is what you had in mind, I can commit it. No REVISION bump > needed. > > Index: net/kea/Makefile > [...] > > Index: security/opendnssec/Makefile &g

Re: NO_SHARED cleanup status

2016-03-11 Thread Patrik Lundin
call for people with commit bits? -- Patrik Lundin

security/opendnssec: 1.4.9

2016-01-24 Thread Patrik Lundin
s specific combination. === Diff below. -- Patrik Lundin Index: Makefile === RCS file: /cvs/ports/security/opendnssec/Makefile,v retrieving revision 1.2 diff -u -p -u -r1.2 Makefile --- Makefile22 Dec 2015 07:02:24 - 1

net/kea: 1.0.0

2015-12-29 Thread Patrik Lundin
gging led me to this ticket http://kea.isc.org/ticket/4009 which in turn led me to the configure flags for defining what boost library to use. After adding the additional configure flags the build succeeded. Highlights: * Renames "message" binar

Re: net/kea

2015-12-26 Thread Patrik Lundin
sec anyway, > and since I maintain the BIND port I track a few places where ISC are > likely to announce things. > > http://www.openwall.com/lists/oss-security/2015/12/22/11 > https://www.isc.org/?feed=security-feed > Thanks for the info, I guess it is time to spin up newsbeuter again :). -- Patrik Lundin

Re: net/kea

2015-12-23 Thread Patrik Lundin
u notice it? > > I also added an XXX comment > to remind us to update the license marker for 1.0 because ISC are moving > to the Apache license :'( > I did have this upcoming change noted in the back of my head, but having an explicit note in the Makefile does makes sense. -- Patrik Lundin

Re: security/opendnssec: replace /etc with ${SYSCONFDIR}

2015-12-22 Thread Patrik Lundin
gt; Thanks. > Great, thanks! -- Patrik Lundin

security/opendnssec: replace /etc with ${SYSCONFDIR}

2015-12-21 Thread Patrik Lundin
Hello, I noticed I was still using some '/etc' locations in PLIST and rc script, diff below. -- Patrik Lundin Index: pkg/PLIST === RCS file: /cvs/ports/security/opendnssec/pkg/PLIST,v retrieving revision 1.1.1.1 dif

Re: net/kea

2015-12-09 Thread Patrik Lundin
On Wed, Dec 09, 2015 at 08:33:10PM +0100, Patrik Lundin wrote: > > Attached is a port with the explicit flag set and a shortened > LIB_DEPENDS/WANTLIB list. I have tested that it ignores the use of Botan > when it is installed. Let me know what you think. > Stuart: It would of co

Re: net/kea

2015-12-09 Thread Patrik Lundin
On Tue, Dec 08, 2015 at 11:15:04PM +, Stuart Henderson wrote: > On 2015/12/08 23:59, Patrik Lundin wrote: > > I have posted a question to kea-dev regarding this: > > https://lists.isc.org/pipermail/kea-dev/2015-December/000588.html > > > > Let's see how that

Re: net/kea

2015-12-08 Thread Patrik Lundin
/2015-December/000588.html Let's see how that goes. -- Patrik Lundin

Re: net/kea

2015-12-08 Thread Patrik Lundin
On Tue, Dec 08, 2015 at 11:18:53PM +0100, Patrik Lundin wrote: > > What is picking up botan? I looked at every @bin and @lib with ldd and I > can't see anyone referring to that library. What am i missing? > >From http://kea.isc.org/docs/kea-guide.html#required-software:

Re: net/kea

2015-12-08 Thread Patrik Lundin
oked at every @bin and @lib with ldd and I can't see anyone referring to that library. What am i missing? -- Patrik Lundin

Re: net/kea

2015-12-08 Thread Patrik Lundin
On Tue, Dec 08, 2015 at 07:39:24PM +0100, Patrik Lundin wrote: > > not a port problem, but "message" is a terrible name for sonething that > > upstream want to place in a system directory! > > I have mentioned this in my upstream kea-dev thread. > FYI: upstream

Re: net/kea

2015-12-08 Thread Patrik Lundin
"message" is a terrible name for sonething that > upstream want to place in a system directory! I have mentioned this in my upstream kea-dev thread. Attached is the updated port, which only uses LIBTOOL_FLAGS to disable the static libraries. Thanks a lot for your time! -- Patrik Lundin kea.tgz Description: application/tar-gz

net/kea

2015-12-06 Thread Patrik Lundin
December/000576.html -- Patrik Lundin kea.tgz Description: application/tar-gz

Re: opendnssec and softhsm revisited

2015-10-13 Thread Patrik Lundin
On Mon, Oct 12, 2015 at 11:34:46PM +0100, Stuart Henderson wrote: > On 2015/10/05 22:22, Patrik Lundin wrote: > > The 1.4.8.2 version of opendnssec was just released. This version > > incorporates the above mentioned fixes. You will find the port attached. > > Looks good to

Re: opendnssec and softhsm revisited

2015-10-05 Thread Patrik Lundin
On Sat, Sep 19, 2015 at 11:24:12AM +0200, Patrik Lundin wrote: > > Just a quick update: both the segfault on i386 and the lockup on macppc > has been fixed on the development branch. > > I'll send an updated port as soon as the fixes are available in a > release which may

softhsm: Add PORTROACH_COMMENT

2015-10-04 Thread Patrik Lundin
Hello, After sitting in the audience at EuroBSDcon 2015 listening to the portroach talk by jasper@ I realized I had some homework to do :). A PORTROACH limit should be accompanied by a PORTROACH_COMMENT. Attached is a diff against my port. -- Patrik Lundin Index: Makefile

Re: softhsm: Apply SOFTHSM-101 security fixes

2015-09-21 Thread Patrik Lundin
On Mon, Sep 21, 2015 at 02:25:53PM +0100, Stuart Henderson wrote: > > Thanks, committed. I added comments to patches with the headers from > https://github.com/opendnssec/SoftHSMv1/commit/e853dc5b34d00a09e3e114cb4914b06c01c72b1c.patch > Looks good to me, thanks! -- Patrik Lundin

softhsm: Apply SOFTHSM-101 security fixes

2015-09-21 Thread Patrik Lundin
e853dc5b34d00a09e3e114cb4914b06c01c72b1c.diff === I have verified that this makes the files created by softhsm --export as well has softhsm-keyconv have 0600 permissions. See below for diff against the port which also adds REVISION=0 to the Makefile. -- Patrik Lundin Index: Makefile

Re: softhsm: add portroach limit

2015-09-21 Thread Patrik Lundin
a security issue that is fixed in the NetBSD port: http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/security/softhsm/patches/patch-src_bin_softhsm-keyconv.cpp?annotate=1.1 I'll handle that in a separate thread once I have reproduced and fixed the problem. -- Patrik Lundin

Re: softhsm: add portroach limit

2015-09-21 Thread Patrik Lundin
On Thu, Aug 27, 2015 at 06:06:44PM +0200, Patrik Lundin wrote: > Hello, > > portroach currently thinks security/softhsm is outdated. The reason for > this is that while the version in ports is 1.3.7, there is a development > release using a 2.0.0 version number. > > The di

Re: opendnssec and softhsm revisited

2015-09-19 Thread Patrik Lundin
ry > patch. > Just a quick update: both the segfault on i386 and the lockup on macppc has been fixed on the development branch. I'll send an updated port as soon as the fixes are available in a release which may be out in the upcoming week. -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-08-30 Thread Patrik Lundin
On Wed, Jun 24, 2015 at 07:10:33AM +0200, Patrik Lundin wrote: > > The summary for now looks like this: > Working: amd64, sparc64 > Broken: i386, macppc > > Is there some relation between threading and 32/64 bit? It is the main > thing that sticks out currently, since sparc6

Re: softhsm: add portroach limit

2015-08-27 Thread Patrik Lundin
On Thu, Aug 27, 2015 at 05:35:54PM +0100, Stuart Henderson wrote: > On 2015/08/27 18:17, Antoine Jacoutot wrote: > > On Thu, Aug 27, 2015 at 06:06:44PM +0200, Patrik Lundin wrote: > > > Hello, > > > > > > portroach currently thinks security/softhsm is outdate

softhsm: add portroach limit

2015-08-27 Thread Patrik Lundin
Hello, portroach currently thinks security/softhsm is outdated. The reason for this is that while the version in ports is 1.3.7, there is a development release using a 2.0.0 version number. The diff below should limit the version check to the 1.x.x versions. -- Patrik Lundin Index: Makefile

Re: opendnssec and softhsm revisited

2015-06-23 Thread Patrik Lundin
On Mon, Jun 22, 2015 at 05:25:52PM +0200, Patrik Lundin wrote: > > I did not see the problem on amd64 or sparc64 at least. I am currently > building stuff on a fresh macppc snapshot to see what happens there. > After that I am out of platforms :). > So this is interesting. It tu

Re: opendnssec and softhsm revisited

2015-06-22 Thread Patrik Lundin
pins endlessly. Sucks... > Yeah it seems to be quite a funky problem to debug. The last guy from NLnet labs that looked at it seemed to believe it had something to do with threading, but was not able to make more sense of it than that. -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-06-22 Thread Patrik Lundin
ew tarball attached. > - don't hardcode the botan libs but use botan-config > - no need for libsofthsm.{a,la}, ltdl is not used > > I think it's ready to import. > Thanks for the feedback! -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-06-22 Thread Patrik Lundin
pshot to see what happens there. After that I am out of platforms :). > > softhsm is probably easier to test so let's look at that first. I'm > fairly busy at the moment but I'll put it on my list to look at... > Sounds good to me, thanks! -- Patrik Lundin

Re: opendnssec and softhsm revisited

2015-06-20 Thread Patrik Lundin
On Wed, Jun 17, 2015 at 08:57:35AM +0200, Patrik Lundin wrote: > On Thu, May 21, 2015 at 08:23:49PM +0200, Patrik Lundin wrote: > > On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote: > > > > > > You will find the latest ports attached. Except for marking

Re: opendnssec and softhsm revisited

2015-06-16 Thread Patrik Lundin
On Thu, May 21, 2015 at 08:23:49PM +0200, Patrik Lundin wrote: > On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote: > > > > You will find the latest ports attached. Except for marking opendnssec > > broken on i386 I have also updated the version from 1.4.6 to

isc-dhcp-server: Make sure /var/db/dhcpd.leases exists

2015-05-28 Thread Patrik Lundin
o the same thing in the port. Diff below. -- Patrik Lundin Index: isc_dhcpd.rc === RCS file: /cvs/ports/net/isc-dhcp/pkg/isc_dhcpd.rc,v retrieving revision 1.1 diff -u -p -u -r1.1 isc_dhcpd.rc --- isc_dhcpd.rc12 Oct 2014 20:1

Re: opendnssec and softhsm revisited

2015-05-21 Thread Patrik Lundin
On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote: > > You will find the latest ports attached. Except for marking opendnssec > broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and > I have converted databases/mysql dependencies to databases/mariadb. >

Re: opendnssec and softhsm revisited

2015-05-16 Thread Patrik Lundin
n these problems on amd64 or sparc64. You will find the latest ports attached. Except for marking opendnssec broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and I have converted databases/mysql dependencies to databases/mariadb. -- Patrik Lundin opendnssec.tgz Des

logstash-forwarder: certificate handling

2015-05-03 Thread Patrik Lundin
? It seems to me the simplest way of solving the certificate stuff is to generate the key and crt on the logstash host, and then use that same crt file as the "ssl ca" on the logstash-forwarder host. -- Patrik Lundin

Re: rcctl ansible service support

2015-01-31 Thread Patrik Lundin
On Sat, Jan 17, 2015 at 12:22:09PM +0100, Patrik Lundin wrote: > > Also, pending input from armani@ the code could change drastically. So > I would not invest too much time until it is merged. > Better late than never: The updated rcctl support has been merged upstream (https:

Re: rcctl ansible service support

2015-01-17 Thread Patrik Lundin
On Wed, Dec 31, 2014 at 03:17:23PM +0100, Patrik Lundin wrote: > > Just a small update, the PR above has now been merged into armanis > branch. If anyone was waiting for this to have a nice baseline for > testing you are good to go. As mentioned earlier the upstream PR is >

Re: rcctl ansible service support

2014-12-31 Thread Patrik Lundin
On Thu, Dec 11, 2014 at 11:55:59PM +, Stuart Henderson wrote: > > On Thu, Dec 11, 2014 at 09:11:27PM +0100, Patrik Lundin wrote: > > > > Ugh, I spoke too soon. I found a bug in the handling of special services > > like pf just now. A PR against armanis fork is availabl

Re: rcctl ansible service support

2014-12-11 Thread Patrik Lundin
On Thu, Dec 11, 2014 at 09:11:27PM +0100, Patrik Lundin wrote: > > To my knowledge the support should be pretty solid by now. > Ugh, I spoke too soon. I found a bug in the handling of special services like pf just now. A PR against armanis fork is available here (this will of course be

Re: rcctl ansible service support

2014-12-11 Thread Patrik Lundin
ny negative feedback would also be welcome of course ;). Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-08-21 Thread Patrik Lundin
On Mon, Jun 02, 2014 at 09:48:41AM +0200, Patrik Lundin wrote: > > Is no one interested in this? I think it is a nice complement to nsd in > base for automated DNSSEC. > I have now been updating the ports for both opendnssec and softhsm to the latest versions (opendnssec 1.4.6 and s

Re: opendnssec and softhsm revisited

2014-06-02 Thread Patrik Lundin
On Tue, May 27, 2014 at 10:27:52PM +0200, Patrik Lundin wrote: > > The ports are now at a state where i feel they are suitable for import. > Is no one interested in this? I think it is a nice complement to nsd in base for automated DNSSEC. Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-05-27 Thread Patrik Lundin
acility, user/group used etc.) the other changes have been merged upstream. The ports have recieved testing on amd64 and sparc64. If they are found to be good enough for import I want to make sure Stuart, Jérémie and Jerry Lundström are credited for the help so far. Regards, Patrik Lundin op

Re: opendnssec and softhsm revisited

2014-05-20 Thread Patrik Lundin
has been fixed on the branch. > We try to avoid having too much patches in the ports tree. The best way > is probably to work with upstream and get your patches integrated, after > proper reviewing. Some mistakes have been done while wrongly replacing > eg. strcpy by strlcpy. > I intend to ignore the strcat/strcpy stuff for now given the above status. The other stuff has been fixed. Thanks a lot for your input :). Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-05-19 Thread Patrik Lundin
On Sun, May 18, 2014 at 07:24:00PM +0200, Patrik Lundin wrote: > > First up is this one: > === > pin.c: In function 'hsm_shm_open': > pin.c:209: warning: comparison between signed and unsigned > === > > Next we have this one: > === > hsmspeed.c:38:1: warni

Re: opendnssec and softhsm revisited

2014-05-18 Thread Patrik Lundin
On Sun, May 18, 2014 at 01:24:11PM +0200, Patrik Lundin wrote: > > I guess I will have to look into how to disabled -pedantic in the build > then. > Disabling -pedantic was easy to do at configure time, using --disable-pedantic. Now I have started looking at the remaining war

Re: opendnssec and softhsm revisited

2014-05-18 Thread Patrik Lundin
how_bug.cgi?id=579 I guess I will have to look into how to disabled -pedantic in the build then. Regards, Patrik Lundin

Re: opendnssec and softhsm revisited

2014-05-18 Thread Patrik Lundin
On Wed, May 07, 2014 at 10:57:50PM +0200, Patrik Lundin wrote: > > The opendnssec port is a work in progress. The most annoying thing > while building currently is the warnings regarding "comma at end of > enumerator list" which seems to be the result of inconsistent use o

Re: opendnssec and softhsm revisited

2014-05-08 Thread Patrik Lundin
ALSTATEDIR} > Using ${LOCALSTATEDIR} in the PLISTs also cause "Bogus element outside of every prefix" warnings, maby this is OK? I have updated the PLISTs for now. Thanks a lot for taking a look! Regards, Patrik Lundin softhsm.tgz Description: application/tar-gz opendnssec.tgz Description: application/tar-gz

opendnssec and softhsm revisited

2014-05-07 Thread Patrik Lundin
d it to be there. Finally I am pretty sure both LICENSE files can be summed up as BSD, an extra pair of eyes would be welcome though. I make sure they are installed under doc/ in both ports. Anyway, any feedback is much appreciated. Regards, Patrik Lundin opendnssec.tgz Description: applic

Re: SoftHSM: base libtool problem

2013-06-08 Thread Patrik Lundin
On Thu, Jun 06, 2013 at 10:07:56PM +0100, Stuart Henderson wrote: > > The attached port builds, but doesn't produce a shared library, which > the produced binaries rely upon, so it doesn't actually work.. > Ah, cool! It seems your configure patch fixes that specfic build problem I described. >

SoftHSM: base libtool problem

2013-06-06 Thread Patrik Lundin
-rpath,/usr/local/lib/softhsm === Is there a proper way to fix this without resorting to GNU? Regards, Patrik Lundin