/cad/oregano/

it-data/cgit.png' alt='cgit logo'/> index : freebsd-ports-gnome
FreeBSD GNOME current development ports (https://github.com/freebsd/freebsd-ports-gnome)
aboutsummaryrefslogtreecommitdiffstats
path: root/dns/bind9
Commit message (Expand)AuthorAgeFilesLines
* Update CONFLICTS for bind97dougb2009-12-141-1/+1
* The new LINKS OPTION is not only useless it's harmful when combineddougb2009-09-011-2/+2
* For all:dougb2009-08-302-1/+22
* Apply the patch derived from version 9.6.1-P1 which addresses a remotedougb2009-07-292-1/+17
* - Flip from MAKE_JOBS_SAFE to MAKE_JOBS_UNSAFE, fails both on pointyhat and onpav2009-04-131-1/+1
* Fix CONFLICTS (again). The previous example didn't work at all for portsdougb2009-03-251-1/+1
* Where it matters, update regarding MAKE_JOBS_{UN}SAFE for my portsdougb2009-03-251-0/+2
* Update to the -P1 versions of the current BIND ports which containdougb2009-01-082-14/+17
* Update CONFLICTS to reflect the addition of the bind96 port,dougb2009-01-041-1/+1
* Upgrade to version 9.3.6.dougb2008-12-203-15/+22
* Adjust WWWs for new ISC websitedougb2008-12-201-1/+1
* All -P2 versions now have PGP signatures with ISC's standarddougb2008-08-091-3/+3
* Update to patchlevel 2 for all versions:dougb2008-08-022-8/+8
* Upgrade to the -P1 versions of each port, which add stronger randomizationdougb2008-07-102-8/+8
* Update CONFLICTS:dougb2008-07-041-1/+1
* Update to version 9.3.5. It contains the latest bug fixes, updatesdougb2008-06-025-22/+19
* ISC recently announced that BIND 8 has been End-of-Life'd:dougb2007-12-031-1/+1
* Update to 9.3.4-P1, which fixes the following:dougb2007-07-252-8/+8
* - Set --mandir and --infodir in CONFIGURE_ARGS if the configure scriptrafan2007-07-231-2/+1
* Add a CONFLICTS to bind 9.4.dougb2007-06-101-1/+1
* Upgrade to version 9.3.4, the latest from ISC, which addresses thedougb2007-01-252-8/+8
* Apply the markup fixes from the base to the nsupdate.8 anddougb2006-12-211-0/+8
* Upgrade to version 9.3.3, the latest from ISC. This isdougb2006-12-102-8/+8
* Update to version 9.3.2-P2, which addresses the vulnerabilitydougb2006-11-032-8/+8
* Upgrade to version 9.3.2-P1, which addresses the following securitydougb2006-09-072-8/+8