// Copyright 2017 The go-ethereum Authors
// This file is part of go-ethereum.
//
// go-ethereum is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// go-ethereum is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with go-ethereum. If not, see .
package main
import (
"bytes"
"fmt"
"io"
"io/ioutil"
"net/http"
"os"
"path"
"path/filepath"
"runtime"
"strings"
"testing"
"time"
"github.com/ethereum/go-ethereum/log"
swarm "github.com/ethereum/go-ethereum/swarm/api/client"
"github.com/mattn/go-colorable"
)
func init() {
log.PrintOrigins(true)
log.Root().SetHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(colorable.NewColorableStderr(), log.TerminalFormat(true))))
}
// TestCLISwarmUp tests that running 'swarm up' makes the resulting file
// available from all nodes via the HTTP API
func TestCLISwarmUp(t *testing.T) {
if runtime.GOOS == "windows" {
t.Skip()
}
testCLISwarmUp(false, t)
}
func TestCLISwarmUpRecursive(t *testing.T) {
if runtime.GOOS == "windows" {
t.Skip()
}
testCLISwarmUpRecursive(false, t)
}
// TestCLISwarmUpEncrypted tests that running 'swarm encrypted-up' makes the resulting file
// available from all nodes via the HTTP API
func TestCLISwarmUpEncrypted(t *testing.T) {
if runtime.GOOS == "windows" {
t.Skip()
}
testCLISwarmUp(true, t)
}
func TestCLISwarmUpEncryptedRecursive(t *testing.T) {
if runtime.GOOS == "windows" {
t.Skip()
}
testCLISwarmUpRecursive(true, t)
}
func testCLISwarmUp(toEncrypt bool, t *testing.T) {
log.Info("starting 3 node cluster")
cluster := newTestCluster(t, 3)
defer cluster.Shutdown()
// create a tmp file
tmp, err := ioutil.TempFile("", "swarm-test")
if err != nil {
t.Fatal(err)
}
defer tmp.Close()
defer os.Remove(tmp.Name())
// write data to file
data := "notsorandomdata"
_, err = io.WriteString(tmp, data)
if err != nil {
t.Fatal(err)
}
hashRegexp := `[a-f\d]{64}`
flags := []string{
"--bzzapi", cluster.Nodes[0].URL,
"up",
tmp.Name()}
if toEncrypt {
hashRegexp = `[a-f\d]{128}`
flags = []string{
"--bzzapi", cluster.Nodes[0].URL,
"up",
"--encrypt",
tmp.Name()}
}
// upload the file with 'swarm up' and expect a hash
log.Info(fmt.Sprintf("uploading file with 'swarm up'"))
up := runSwarm(t, flags...)
_, matches := up.ExpectRegexp(hashRegexp)
up.ExpectExit()
hash := matches[0]
log.Info("file uploaded", "hash", hash)
// get the file from the HTTP API of each node
for _, node := range cluster.Nodes {
log.Info("getting file from node", "node", node.Name)
res, err := http.Get(node.URL + "/bzz:/" + hash)
if err != nil {
t.Fatal(err)
}
defer res.Body.Close()
reply, err := ioutil.ReadAll(res.Body)
if err != nil {
t.Fatal(err)
}
if res.StatusCode != 200 {
t.Fatalf("expected HTTP status 200, got %s", res.Status)
}
if string(reply) != data {
t.Fatalf("expected HTTP body %q, got %q", data, reply)
}
log.Debug("verifying uploaded file using `swarm down`")
//try to get the content with `swarm down`
tmpDownload, err := ioutil.TempDir("", "swarm-test")
tmpDownload = path.Join(tmpDownload, "tmpfile.tmp")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(tmpDownload)
bzzLocator := "bzz:/" + hash
flags = []string{
"--bzzapi", cluster.Nodes[0].URL,
"down",
bzzLocator,
tmpDownload,
}
down := runSwarm(t, flags...)
down.ExpectExit()
fi, err := os.Stat(tmpDownload)
if err != nil {
t.Fatalf("could not stat path: %v", err)
}
switch mode := fi.Mode(); {
case mode.IsRegular():
downloadedBytes, err := ioutil.ReadFile(tmpDownload)
if err != nil {
t.Fatalf("had an error reading the downloaded file: %v", err)
}
if !bytes.Equal(downloadedBytes, bytes.NewBufferString(data).Bytes()) {
t.Fatalf("retrieved data and posted data not equal!")
}
default:
t.Fatalf("expected to download regular file, got %s", fi.Mode())
}
}
timeout := time.Duration(2 * time.Second)
httpClient := http.Client{
Timeout: timeout,
}
// try to squeeze a timeout by getting an non-existent hash from each node
for _, node := range cluster.Nodes {
_, err := httpClient.Get(node.URL + "/bzz:/1023e8bae0f70be7d7b5f74343088ba408a218254391490c85ae16278e230340")
// we're speeding up the timeout here since netstore has a 60 seconds timeout on a request
if err != nil && !strings.Contains(err.Error(), "Client.Timeout exceeded while awaiting headers") {
t.Fatal(err)
}
// this is disabled since it takes 60s due to netstore timeout
// if res.StatusCode != 404 {
// t.Fatalf("expected HTTP status 404, got %s", res.Status)
// }
}
}
func testCLISwarmUpRecursive(toEncrypt bool, t *testing.T) {
fmt.Println("starting 3 node cluster")
cluster := newTestCluster(t, 3)
defer cluster.Shutdown()
tmpUploadDir, err := ioutil.TempDir("", "swarm-test")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(tmpUploadDir)
// create tmp files
data := "notsorandomdata"
for _, path := range []string{"tmp1", "tmp2"} {
if err := ioutil.WriteFile(filepath.Join(tmpUploadDir, path), bytes.NewBufferString(data).Bytes(), 0644); err != nil {
t.Fatal(err)
}
}
hashRegexp := `[a-f\d]{64}`
flags := []string{
"--bzzapi", cluster.Nodes[0].URL,
"--recursive",
"up",
tmpUploadDir}
if toEncrypt {
hashRegexp = `[a-f\d]{128}`
flags = []string{
"--bzzapi", cluster.Nodes[0].URL,
"--recursive",
"up",
"--encrypt",
tmpUploadDir}
}
// upload the file with 'swarm up' and expect a hash
log.Info(fmt.Sprintf("uploading file with 'swarm up'"))
up := runSwarm(t, flags...)
_, matches := up.ExpectRegexp(hashRegexp)
up.ExpectExit()
hash := matches[0]
log.Info("dir uploaded", "hash", hash)
// get the file from the HTTP API of each node
for _, node := range cluster.Nodes {
log.Info("getting file from node", "node", node.Name)
//try to get the content with `swarm down`
tmpDownload, err := ioutil.TempDir("", "swarm-test")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(tmpDownload)
bzzLocator := "bzz:/" + hash
flagss := []string{}
flagss = []string{
"--bzzapi", cluster.Nodes[0].URL,
"down",
"--recursive",
bzzLocator,
tmpDownload,
}
fmt.Println("downloading from swarm with recursive")
down := runSwarm(t, flagss...)
down.ExpectExit()
files, err := ioutil.ReadDir(tmpDownload)
for _, v := range files {
fi, err := os.Stat(path.Join(tmpDownload, v.Name()))
if err != nil {
t.Fatalf("got an error: %v", err)
}
switch mode := fi.Mode(); {
case mode.IsRegular():
if file, err := swarm.Open(path.Join(tmpDownload, v.Name())); err != nil {
t.Fatalf("encountered an error opening the file returned from the CLI: %v", err)
} else {
ff := make([]byte, len(data))
io.ReadFull(file, ff)
buf := bytes.NewBufferString(data)
if !bytes.Equal(ff, buf.Bytes()) {
t.Fatalf("retrieved data and posted data not equal!")
}
}
default:
t.Fatalf("this shouldnt happen")
}
}
if err != nil {
t.Fatalf("could not list files at: %v", files)
}
}
}
// TestCLISwarmUpDefaultPath tests swarm recursive upload with relative and absolute
// default paths and with encryption.
func TestCLISwarmUpDefaultPath(t *testing.T) {
if runtime.GOOS == "windows" {
t.Skip()
}
testCLISwarmUpDefaultPath(false, false, t)
testCLISwarmUpDefaultPath(false, true, t)
testCLISwarmUpDefaultPath(true, false, t)
testCLISwarmUpDefaultPath(true, true, t)
}
func testCLISwarmUpDefaultPath(toEncrypt bool, absDefaultPath bool, t *testing.T) {
cluster := newTestCluster(t, 1)
defer cluster.Shutdown()
tmp, err := ioutil.TempDir("", "swarm-defaultpath-test")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(tmp)
err = ioutil.WriteFile(filepath.Join(tmp, "index.html"), []byte("
Test
"), 0666)
if err != nil {
t.Fatal(err)
}
err = ioutil.WriteFile(filepath.Join(tmp, "robots.txt"), []byte("Disallow: /"), 0666)
if err != nil {
t.Fatal(err)
}
defaultPath := "index.html"
if absDefaultPath {
defaultPath = filepath.Join(tmp, defaultPath)
}
args := []string{
"--bzzapi",
cluster.Nodes[0].URL,
"--recursive",
"--defaultpath",
defaultPath,
"up",
tmp,
}
if toEncrypt {
args = append(args, "--encrypt")
}
up := runSwarm(t, args...)
hashRegexp := `[a-f\d]{64,128}`
_, matches := up.ExpectRegexp(hashRegexp)
up.ExpectExit()
hash := matches[0]
client := swarm.NewClient(cluster.Nodes[0].URL)
m, isEncrypted, err := client.DownloadManifest(hash)
if err != nil {
t.Fatal(err)
}
if toEncrypt != isEncrypted {
t.Error("downloaded manifest is not encrypted")
}
var found bool
var entriesCount int
for _, e := range m.Entries {
entriesCount++
if e.Path == "" {
found = true
}
}
if !found {
t.Error("manifest default entry was not found")
}
if entriesCount != 3 {
t.Errorf("manifest contains %v entries, expected %v", entriesCount, 3)
}
}
n>
|
|
|
|
|
PR: ports/90151
Submitted by: Konstantin Saurbier <saurbier@math.uni-bielefeld.de>
Approved by: maintainer timeout (nectar; 3 weeks)
|
|
|
|
|
|
|
|
| |
http://www.ethereal.com/docs/release-notes/ethereal-0.10.14.html for a list
of all the changes.
Security: See http://www.ethereal.com/appnotes/enpa-sa-00022.html for
security advisories fixed in this version.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
IPA_IP6FW -- IPA accounting module for FreeBSD IPv6 Firewall
Main features:
- The module is designed for traffic accounting from FreeBSD IPv6
Firewall rules byte counters;
- The module understands IPv6 Firewall rules byte counters overflow;
- It is possible to summarize and subtract statistics from IPv6
Firewall rules byte counters;
- It is possible to distinguish IPv6 Firewall rules with the same
numbers;
- IPv6 Firewall rules can be dynamically added to and removed from
the system, the module correctly works in such situations.
WWW: http://ipa-system.sourceforge.net/modules/ipa_ip6fw/
PR: ports/91005
Submitted by: Andrey Simonenko <simon@comsys.ntu-kpi.kiev.ua>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
XIPA_IPFW -- IPA accounting module for FreeBSD IP Firewall
Main features:
- The module is designed for traffic accounting from FreeBSD IP
Firewall (including IPFW2) rules byte counters;
- The module understands IP Firewall rules byte counters overflow;
- It is possible to summarize and subtract statistics from IP Firewall
rules byte counters;
- It is possible to distinguish IP Firewall rules with the same
numbers;
- IP Firewall rules can be dynamically added to and removed from
the system, the module correctly works in such situations.
WWW: http://ipa-system.sourceforge.net/modules/ipa_ipfw/
PR: ports/91004
Submitted by: Andrey Simonenko <simon@comsys.ntu-kpi.kiev.ua>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
XIPA_IPFW -- IPA accounting module for FreeBSD IP Firewall
Main features:
- The module is designed for traffic accounting from FreeBSD IP
Firewall (including IPFW2) rules byte counters;
- The module understands IP Firewall rules byte counters overflow;
- It is possible to summarize and subtract statistics from IP Firewall
rules byte counters;
- It is possible to distinguish IP Firewall rules with the same
numbers;
- IP Firewall rules can be dynamically added to and removed from
the system, the module correctly works in such situations.
WWW: http://ipa-system.sourceforge.net/modules/ipa_ipfw/
PR: ports/91004
Submitted by: Andrey Simonenko <simon@comsys.ntu-kpi.kiev.ua>
Reviewed by:
Approved by:
Obtained from:
MFC after:
Security:
|
|
|
|
|
| |
PR: ports/90931
Submitted by: KATO Tsuguru <tkato432@yahoo.com>
|
|
|
|
|
| |
PR: ports/90933
Submitted by: KATO Tsuguru <tkato432@yahoo.com>
|
| |
|
|
|
|
|
|
|
|
|
| |
x11/gnome2-fifth-toe from being installable. As a result, I'm
preventing liferea from trying to build the mozilla plugin
if WITH_MOZILLA=firefox. Hopefully Liferea will release a
patch or something soon.
Apologies to the maintainer, as this is an unapproved commit.
|
|
|
|
|
| |
- Forgot update distinfo
Sorry
|
|
|
|
|
|
|
|
|
| |
software bugs)
- Mark it as broken on 4.x (missing sys/statvfs.h)
- Port now requires KDEBASE instead KDELIBS
PR: ports/90420
Submitted by: Rashid N. Achilov <shelton@ns.granch.ru>
|
| |
|
| |
|
|
|
|
|
|
| |
PR: ports/90221
Submitted by: Konstantin Saurbier <saurbier@math.uni-bielefeld.de>
Approved by: maintainer timeout (vsevolod; 16 days)
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
FreeBSD 7.0. Furthermore nbd.h has been updated to a version from a newer
Linux kernel.
Requested by: remko
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
network path.
It only needs single end control, and has relatively small probing overhead
(33.6KB for one probing in the default setting).
WWW: http://gs274.sp.cs.cmu.edu/www/pathneck/
PR: ports/90801
Submitted by: Babak Farrokhi <babak@farrokhi.net>
|
|
|
|
|
|
|
|
|
|
|
| |
Changes:
o Correctly initialize supplementary group list for systems w/o login
classes.
o Author finished support cnupm, now cnupm supported by support@openbsd.ru
PR: ports/90787
Submitted by: maintainer
|
|
|
|
|
|
|
| |
- Assign maintainership to submitter
PR: 90767
Submitted by: Frank Laszlo <laszlof@vonostingroup.com>
|
|
|
|
|
|
|
|
|
|
|
|
| |
statistics in a TCP/IP network using ICMP echo.
Mping is based on original ping(8) with following new features:
- Ability to ping multiple hosts simultaneously
- Prints 10/50/90-percentile as well as min/avg/max.
PR: 90653
Submitted by: Babak Farrokhi <babak@farrokhi.net>
|
|
|
|
| |
Reported by: Lars Engels <lars.engels@0x20.net>
|
|
|
|
|
|
|
| |
on provider site.
PR: ports/90528
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>
|
|
|
|
|
|
|
|
|
|
|
| |
o Update devel/obby to 0.3.0 [1]
o Update editors/gobby to 0.3.0 [2]
o Update net/sobby to 0.3.0 [3]
PR: ports/90520
Submitted by: Wesley Shields <wxs@csh.rit.edu> [1] [2],
Andreas Kohn <andreas@syndrom23.de> [3]
Approved by: Andreas Kohn <andreas@syndrom23.de> (maintainer) [1]
|
|
|
|
|
| |
PR: ports/90726
Submitted by: David Bremner <bremner-dated-1136341985.d77847@pivot.cs.unb.ca>
|
|
|
|
|
|
|
|
|
|
|
| |
SNPP server. SNPP stands for Simple Network Paging Protocol. It is used by a
wide range of paging providers for sending pages. A list of some of the
providers that support the SNPP service is on the WWW site below. SendSNPP
requires no special modules, and has been tested on Linux and Windows systems.
It has a very straight forward interface making it very easy to use.
PR: ports/90529
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
There is a NetBIOS/tcp lookup tool nmblookup(1) included
in samba suite. It's quite useful, but installing whole
samba suite is not always necessary.
I wrote a port to install nmblookup(1) only.
Dutchman through the corner alert... What can I do against the
wrongly added directories?
PR: ports/90375
Submitted by: Hirohisa Yamaguchi <umq@ueo.co.jp>
|
| |
|
|
|
|
|
|
|
| |
email agent.
PR: ports/90522
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>
|
| |
|
|
|
|
| |
Reported by: kris
|
|
|
|
|
|
|
| |
- Fix path for ${DRIVERNAME}control [2].
PR: ports/90535 [2]
Reported by: pointyhat via kris [1], sinese <sinese@olympe.hn.org>
|
| |
|
|
|
|
| |
Reported by: mistral__at__imasy.or.jp (Yoshihiko Sarumaru)
|
|
|
|
|
|
|
|
| |
There are two modes available with the UltraVNC repeater:
- mode I is used for UltraVNC Server and Viewer both in normal mode,
- mode II works with the server in listening mode.
WWW: http://ultravnc.sourceforge.net/addons/repeater.html
|
| |
|
| |
|
|
|
|
| |
dtcp has dtcpauth for replacement of qpopauth.
|
|
|
|
|
|
| |
PR: ports/77857
Submitted by: Sergei Kolobov <sergei@FreeBSD.org>
Approved by: kwm (maintainer, timeout 9 months)
|
|
|
|
|
|
|
|
| |
is set to a non-default value.
PR: ports/72973
Submitted by: Vivek Khera <vivek@khera.org>
Approved by: sobomax (maintainer, timeout 13 months)
|
|
|
|
|
|
|
|
| |
but prints a warning message about switching to WITH_STATIC.
PR: ports/67832
Submitted by: Cyrille Lefevre <cyrille.lefevre@laposte.net>
Approved by: jdp (maintainer)
|
|
|
|
|
|
|
| |
python.
PR: ports/90393
Submitted by: vanhu <vanhu@netasq.com>
|
|
|
|
|
| |
PR: ports/90423
Submitted by: maintainer
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
- PORTREVISION bump
PR: ports/89974
Reported by: Martin MATO
Submitted by: Joerg Pulz (maintainer)
|
|
|
|
|
|
|
|
|
| |
- Pathes was included in original distfiles.
- Bump PortRevision
- Pass maintainership to submitter.
PR: ports/90365
Submitted by: Ion-Mihai "IOnut" Tetcu
|
|
|
|
| |
Reported by: Vasil Dimov <vd@datamax.bg>
|
|
|
|
|
|
| |
- two source:
- http://www.fourmilab.ch/cgi-bin/uncgi/Hotbits?nbytes=1024&fmt=hex
- http://random.org/cgi-bin/randbyte?nbytes=1024&format=hex
|
| |
|
|
|
|
|
| |
PR: ports/90327
Submitted by: maintainer
|
|
|
|
| |
Noticed by: pointyhat via kris
|
|
|
|
|
|
|
|
|
| |
listening on the loopback interface.
Bump PORTREVISION.
PR: ports/89672
Submitted by: Oles Hnatkevych <don_oles@able.com.ua>
Approved by: jose@we.lc.ehu.es (maintainer, timeout 14 days)
|
|
|
|
| |
Add new MASTER_SITE mirror icrew.org.
|
|
|
|
|
|
|
|
| |
- removed interactivity
PR: 87716
Submitted by: Christian Lackas
Approved by: tobez
|
| |
|
|
|
|
| |
the time, hardware, or resources to maintain.
|
| |
|
| |
|
|
|
|
|
|
| |
While I'm here, add SHA256 checksums.
Reminded by: linimon's and fenner's scripts, like, repeatedly
|
| |
|
|
|
|
|
| |
PR: ports/90216
Submitted by: Gabor Kovesdan
|
|
|
|
|
|
|
|
|
|
| |
- Prompt for ntop admin password and set IS_INTERACTIVE only if necessary.
- Quote BROKEN message.
- Adds pkg-deinstall with cleanup instructions.
- Submitter takes maintainership.
PR: ports/90264
Submitted by: Wesley Shields <wxs@csh.rit.edu>
|
| |
|
| |
|
|
|
|
|
| |
PR: ports/90222
Submitted by: Michael Lednev <liettneff@bk.ru> (maintainer)
|
|
|
|
|
|
|
| |
Update to 0.9.7.2
PR: ports/90251
Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer)
|
|
|
|
|
| |
PR: ports/90251
Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer)
|
|
|
|
| |
Submitted by: Lars Engels <lars.engels@0x20.net>
|
|
|
|
|
| |
Inspired by: rodrigc's fix for editors/manedit
Reported by: pointyhat via kris
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Rename LICENSE to LICENSE.${DRIVERNAME}.
- Don't install ${DRIVERNAME}control(8) on fresh -CURRENT (> 700006).
- Use USE_RCORDER and change REQUIRE/BEFORE lines in startup scripts accordingly.
- Move everything to /usr prefix so that people can mount /usr/local via NFS.
- Add a message saying that kernel module is based on a very old snapshot.
- Reword IGNORE lines.
PR: ports/90022 [1]
Requested by: sem, Thomas Hurst <tom@hur.st> [1]
|
|
|
|
|
| |
- remove patch, since <sys/types.h> is included.
- take maintainership
|
|
|
|
| |
o Bump PORTREVISION
|
|
|
|
|
|
|
|
|
|
|
| |
updated to branch 3.09
2) Fix build with patches from ocaml CVS as of
Sat Dec 10 23:54:24 UTC 2005
- http://www.nongnu.org/mldonkey/
Obtained from: MLDonkey CVS [2]
Pointy hat to: garga [1],
Marwan Burelle <marwan.burelle@lri.fr> [1]
|
|
|
|
| |
- Add SHA256 checksum
|
|
|
|
|
| |
PR: ports/78014
Submitted by: Michael Lednev <liettneff@bk.ru>
|
|
|
|
|
| |
Committed at: Kanto *BSD Users Group Party
Committed with: gnn
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
dependencies of all the other pear ports.
Discussed with: thierry, antonio@php.net
|
|
|
|
|
| |
PR: 90131
Submitted by: Robert C. Noland III <rnoland@2hip.net>
|
|
|
|
|
|
| |
PR: ports/89316
Submitted by: Petr Rehor <prehor@gmail.com>
Approved by: maintainer timeout (jpd; 19 days)
|
| |
|
|
|
|
|
|
|
|
| |
- Fix bug in IPv6
PR: ports/89312
Submitted by: Mark Knight <markk@knigma.org>
Approved by: maintainer timeout (billf; 19 days)
|
|
|
|
|
|
|
|
|
|
|
|
| |
(way bad regression from previous code)
* Add support for packets w/ data padding between the 802.11 header and
the payload (as indicated in the radiotap flags)
* Add support for handling FCS indication in the radiotap flags
* Fix display of TSF (previous code was not byte swapping)
* Update ieee80211_mhz2ieee in radiotap.c to handle more channels
* Nuke some #if 0 code leftover in radiotap.c
Submitted by: sam
|
| |
|
| |
|
| |
|
|
|
|
| |
- Cleanup USE_RC_SUBR-handling
|
|
|
|
| |
Changes: http://search.cpan.org/src/ASCOPE/Net-Google-1.0/Changes
|
| |
|
|
|
|
|
|
|
| |
- Bump PORTREVISION
PR: ports/90020
Submitted by: maintainer
|
|
|
|
|
|
|
|
| |
- Add SHA256 hash
PR: ports/87625
Submitted by: Jean Milanez Melo <jmelo@freebsdbrasil.com.br>
Approved by: maintainer timeout (48 days)
|
| |
|
| |
|
| |
|
|
|
|
| |
Submitted by: sajd on #freebsd-gnome
|
| |
|
| |
|
|
|
|
|
|
|
| |
Add SHA256
PR: 89936
Submitted by: maintainer
|
|
|
|
| |
Submitted by: private email
|
|
|
|
| |
Tested by: anders
|
|
|
|
|
|
|
|
| |
consistency
- add entries in UPDATING (for apache22 too)
PR: ports/78119
Repocopied by: marcus
|
|
|
|
|
|
|
| |
-While I am here, add SHA256.
PR: ports/89904 [1]
Submitted by: Loren M. Lang <lorenl@alzatex.com> (maintainer) [1]
|
|
|
|
|
|
| |
in mantaining this port anymore.
PR: 89041
|
| |
|
|
|
|
| |
work in the past.
|
| |
|
|
|
|
| |
Submitted by: Joe Touch <touch@isi.edu> (maintainer)
|
|
|
|
|
|
|
|
| |
- Fix fetch [2]
PR: ports/89798 [2]
Submitted by: many, Dmitry Simakov <basilio@j-vista.ru> [1],
Andrew Pantyukhin [2]
|
| |
|
|
|
|
|
|
| |
- Add SHA256 checksum.
Approved by: clement (mentor)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
recreated with a different version of tar, but there is absolutely no
difference in contents. I compared the mirrored version from ftp.freebsd.org
(that as the right checksum) with the new on from thc.org.
This was requested, but not fully done in [1].
- Fix WWW
- Use DATADIR [1]
PR: ports/89794 [1]
Submitted by: Johan van Selst <johans@stack.nl> [1]
|
|
|
|
| |
Project by: BSD# <http://www.mono-project.com/Mono:FreeBSD>
|
| |
|
|
|
|
|
|
|
|
| |
it has been part of base system since 4.4
PR: 88993
Submitted by: edwin
Approved by: maintainer timeout (16 days)
|
| |
|
|
|
|
|
| |
PR: ports/89735
Submitted by: Aleksandr S. Goncharov <mraleks@bk.ru> (maintainer)
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
addresses to which you have to subscribe before you can post, making
it impossible for anybody to contact the maintainer.
If the maintainer listens, contact me and we'll add a proper working
email address to it.
|
|
|
|
|
|
|
|
|
| |
The CA cert of net/xbone was being overwritten by net/xbone-gui.
The previous fix was incomplete.
PR: ports/89686
Submitted by: Venkata Pingali <pingali@isi.edu>
Approved by: maintainer email is a mailinglist which doesn't accept submissio
|
|
|
|
|
|
|
|
|
| |
The CA cert of net/xbone was being overwritten by net/xbone-gui.
The previous fix was incomplete.
PR: ports/89686
Submitted by: Venkata Pingali <pingali@isi.edu>
Approved by: maintainer email is a mailinglist which doesn't accept submissions
|
|
|
|
|
|
|
|
| |
Add SHA256
PR: 89733
Submitted by: maintainer
Prompted by: edwin's version check
|
|
|
|
| |
Approved by: lawrance
|
|
|
|
|
| |
PR: ports/89630
Submitted by: Jonas Sonntag <jonas@schiebtsich.net> (maintainer)
|
| |
|
|
|
|
|
|
|
| |
Add SHA256
PR: 89656
Submitted by: Dennis S.Davidoff <null@1system.ru> (maintainer)
|
| |
|
|
|
|
|
|
| |
PR: ports/88260
Submitted by: Serge Maslov <serge@maslov.biz>
Approved by: Oleg M. Golovanov <olmi@rentech.ru> (maintainer, timeout 26 days)
|
| |
|
| |
|
|
|
|
| |
Approved by: maintainer timeout
|
| |
|
| |
|
|
|
|
|
| |
Submitted by: maintainer
Reported by: pointyhat via kris
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
Add SHA256
Take MAINTAINER
PR: 89605
Submitted by: Soeren Straarup <xride@x12.dk>
|
|
|
|
| |
o Bump PORTREVISION
|
|
|
|
| |
maintainer-timeouts.
|
|
|
|
| |
Approved by: maintainer
|
|
|
|
| |
- Drop checksum for overlib file, I don't see where it's used in this port
|
| |
|
|
|
|
|
| |
Approved by: maintainer timeout (sanpei; 1 month)
Repocopy by: marcus
|
| |
|
| |
|
|
|
|
|
| |
PR: ports/89458
Submitted by: Jonas Sonntag <jonas@schiebtsich.net> (maintainer)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
- Add SHA256 checksum
|
| |
|
| |
|
|
|
|
|
|
| |
o Bump PORTREVISION
Submitted by: pointyhat (kris)
|
| |
|
|
|
|
|
|
|
|
| |
(needed for a to-be-released soon port)
Since I'm there, add SHA256.
Approved by: Jonatan B <onatan (at) gmail.com> (maintainer)
|
|
|
|
| |
Approbved by: maintainer
|
| |
|
| |
|
| |
|
|
|
|
|
| |