===
Is there a proper way to fix this without resorting to GNU?
Regards,
Patrik Lundin
On Thu, Jun 06, 2013 at 10:07:56PM +0100, Stuart Henderson wrote:
The attached port builds, but doesn't produce a shared library, which
the produced binaries rely upon, so it doesn't actually work..
Ah, cool!
It seems your configure patch fixes that specfic build problem I
described.
If
LICENSE files can be summed up as BSD, an
extra pair of eyes would be welcome though. I make sure they are
installed under doc/name in both ports.
Anyway, any feedback is much appreciated.
Regards,
Patrik Lundin
opendnssec.tgz
Description: application/tar-gz
softhsm.tgz
Description
?
I have updated the PLISTs for now.
Thanks a lot for taking a look!
Regards,
Patrik Lundin
softhsm.tgz
Description: application/tar-gz
opendnssec.tgz
Description: application/tar-gz
On Wed, May 07, 2014 at 10:57:50PM +0200, Patrik Lundin wrote:
The opendnssec port is a work in progress. The most annoying thing
while building currently is the warnings regarding comma at end of
enumerator list which seems to be the result of inconsistent use of
-std=c99 which i am
to look into how to disabled -pedantic in the build
then.
Regards,
Patrik Lundin
On Sun, May 18, 2014 at 01:24:11PM +0200, Patrik Lundin wrote:
I guess I will have to look into how to disabled -pedantic in the build
then.
Disabling -pedantic was easy to do at configure time, using
--disable-pedantic. Now I have started looking at the remaining
warnings.
I am constantly
On Sun, May 18, 2014 at 07:24:00PM +0200, Patrik Lundin wrote:
First up is this one:
===
pin.c: In function 'hsm_shm_open':
pin.c:209: warning: comparison between signed and unsigned
===
Next we have this one:
===
hsmspeed.c:38:1: warning: PTHREAD_THREADS_MAX redefined
In file
intend to ignore the strcat/strcpy stuff for now given the above
status. The other stuff has been fixed.
Thanks a lot for your input :).
Regards,
Patrik Lundin
upstream.
The ports have recieved testing on amd64 and sparc64.
If they are found to be good enough for import I want to make sure Stuart,
Jérémie and Jerry Lundström jerry () opendnssec.org are credited for
the help so far.
Regards,
Patrik Lundin
opendnssec.tgz
Description: application/tar-gz
On Tue, May 27, 2014 at 10:27:52PM +0200, Patrik Lundin wrote:
The ports are now at a state where i feel they are suitable for import.
Is no one interested in this? I think it is a nice complement to nsd in
base for automated DNSSEC.
Regards,
Patrik Lundin
On Mon, Jun 02, 2014 at 09:48:41AM +0200, Patrik Lundin wrote:
Is no one interested in this? I think it is a nice complement to nsd in
base for automated DNSSEC.
I have now been updating the ports for both opendnssec and softhsm to
the latest versions (opendnssec 1.4.6 and softhsm 1.3.7
also be welcome of course ;).
Regards,
Patrik Lundin
On Thu, Dec 11, 2014 at 09:11:27PM +0100, Patrik Lundin wrote:
To my knowledge the support should be pretty solid by now.
Ugh, I spoke too soon. I found a bug in the handling of special services
like pf just now. A PR against armanis fork is available here (this will
of course be added
On Thu, Dec 11, 2014 at 11:55:59PM +, Stuart Henderson wrote:
On Thu, Dec 11, 2014 at 09:11:27PM +0100, Patrik Lundin wrote:
Ugh, I spoke too soon. I found a bug in the handling of special services
like pf just now. A PR against armanis fork is available here (this will
of course
On Wed, Dec 31, 2014 at 03:17:23PM +0100, Patrik Lundin wrote:
Just a small update, the PR above has now been merged into armanis
branch. If anyone was waiting for this to have a nice baseline for
testing you are good to go. As mentioned earlier the upstream PR is
here:
https://github.com
On Sat, Jan 17, 2015 at 12:22:09PM +0100, Patrik Lundin wrote:
Also, pending input from armani@ the code could change drastically. So
I would not invest too much time until it is merged.
Better late than never:
The updated rcctl support has been merged upstream
(https://github.com/ansible
the key and crt on the logstash host, and then use that same
crt file as the ssl ca on the logstash-forwarder host.
--
Patrik Lundin
.
You will find the latest ports attached. Except for marking opendnssec
broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and
I have converted databases/mysql dependencies to databases/mariadb.
--
Patrik Lundin
opendnssec.tgz
Description: application/tar-gz
softhsm.tgz
happens there.
After that I am out of platforms :).
softhsm is probably easier to test so let's look at that first. I'm
fairly busy at the moment but I'll put it on my list to look at...
Sounds good to me, thanks!
--
Patrik Lundin
- no need for libsofthsm.{a,la}, ltdl is not used
I think it's ready to import.
Thanks for the feedback!
--
Patrik Lundin
it seems to be quite a funky problem to debug. The last guy from
NLnet labs that looked at it seemed to believe it had something to do
with threading, but was not able to make more sense of it than that.
--
Patrik Lundin
On Mon, Jun 22, 2015 at 05:25:52PM +0200, Patrik Lundin wrote:
I did not see the problem on amd64 or sparc64 at least. I am currently
building stuff on a fresh macppc snapshot to see what happens there.
After that I am out of platforms :).
So this is interesting. It turns out ods has
On Wed, Jun 17, 2015 at 08:57:35AM +0200, Patrik Lundin wrote:
On Thu, May 21, 2015 at 08:23:49PM +0200, Patrik Lundin wrote:
On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote:
You will find the latest ports attached. Except for marking opendnssec
broken on i386 I have
On Thu, May 21, 2015 at 08:23:49PM +0200, Patrik Lundin wrote:
On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote:
You will find the latest ports attached. Except for marking opendnssec
broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and
I have converted
thing in the port. Diff below.
--
Patrik Lundin
Index: isc_dhcpd.rc
===
RCS file: /cvs/ports/net/isc-dhcp/pkg/isc_dhcpd.rc,v
retrieving revision 1.1
diff -u -p -u -r1.1 isc_dhcpd.rc
--- isc_dhcpd.rc12 Oct 2014 20:10:16 -
On Sat, May 16, 2015 at 06:24:11PM +0200, Patrik Lundin wrote:
You will find the latest ports attached. Except for marking opendnssec
broken on i386 I have also updated the version from 1.4.6 to 1.4.7, and
I have converted databases/mysql dependencies to databases/mariadb.
Since
On Mon, Oct 12, 2015 at 11:34:46PM +0100, Stuart Henderson wrote:
> On 2015/10/05 22:22, Patrik Lundin wrote:
> > The 1.4.8.2 version of opendnssec was just released. This version
> > incorporates the above mentioned fixes. You will find the port attached.
>
> Looks good to
On Thu, Aug 27, 2015 at 05:35:54PM +0100, Stuart Henderson wrote:
On 2015/08/27 18:17, Antoine Jacoutot wrote:
On Thu, Aug 27, 2015 at 06:06:44PM +0200, Patrik Lundin wrote:
Hello,
portroach currently thinks security/softhsm is outdated. The reason for
this is that while
Hello,
portroach currently thinks security/softhsm is outdated. The reason for
this is that while the version in ports is 1.3.7, there is a development
release using a 2.0.0 version number.
The diff below should limit the version check to the 1.x.x versions.
--
Patrik Lundin
Index: Makefile
On Wed, Jun 24, 2015 at 07:10:33AM +0200, Patrik Lundin wrote:
The summary for now looks like this:
Working: amd64, sparc64
Broken: i386, macppc
Is there some relation between threading and 32/64 bit? It is the main
thing that sticks out currently, since sparc64 rules out an endian issue
Hello,
After sitting in the audience at EuroBSDcon 2015 listening to the
portroach talk by jasper@ I realized I had some homework to do :).
A PORTROACH limit should be accompanied by a PORTROACH_COMMENT. Attached
is a diff against my port.
--
Patrik Lundin
Index: Makefile
On Sat, Sep 19, 2015 at 11:24:12AM +0200, Patrik Lundin wrote:
>
> Just a quick update: both the segfault on i386 and the lockup on macppc
> has been fixed on the development branch.
>
> I'll send an updated port as soon as the fixes are available in a
> release which may be o
On Thu, Aug 27, 2015 at 06:06:44PM +0200, Patrik Lundin wrote:
> Hello,
>
> portroach currently thinks security/softhsm is outdated. The reason for
> this is that while the version in ports is 1.3.7, there is a development
> release using a 2.0.0 version number.
>
> The di
e853dc5b34d00a09e3e114cb4914b06c01c72b1c.diff
===
I have verified that this makes the files created by softhsm --export as
well has softhsm-keyconv have 0600 permissions.
See below for diff against the port which also adds REVISION=0 to the
Makefile.
--
Patrik Lundin
Index: Makefile
On Mon, Sep 21, 2015 at 02:25:53PM +0100, Stuart Henderson wrote:
>
> Thanks, committed. I added comments to patches with the headers from
> https://github.com/opendnssec/SoftHSMv1/commit/e853dc5b34d00a09e3e114cb4914b06c01c72b1c.patch
>
Looks good to me, thanks!
--
Patrik Lundin
t; patch.
>
Just a quick update: both the segfault on i386 and the lockup on macppc
has been fixed on the development branch.
I'll send an updated port as soon as the fixes are available in a
release which may be out in the upcoming week.
--
Patrik Lundin
etBSD port:
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/security/softhsm/patches/patch-src_bin_softhsm-keyconv.cpp?annotate=1.1
I'll handle that in a separate thread once I have reproduced and fixed
the problem.
--
Patrik Lundin
On Tue, Dec 08, 2015 at 07:39:24PM +0100, Patrik Lundin wrote:
> > not a port problem, but "message" is a terrible name for sonething that
> > upstream want to place in a system directory!
>
> I have mentioned this in my upstream kea-dev thread.
>
FYI: upstream
quot; is a terrible name for sonething that
> upstream want to place in a system directory!
I have mentioned this in my upstream kea-dev thread.
Attached is the updated port, which only uses LIBTOOL_FLAGS to disable
the static libraries.
Thanks a lot for your time!
--
Patrik Lundin
kea.tgz
Description: application/tar-gz
December/000576.html
--
Patrik Lundin
kea.tgz
Description: application/tar-gz
-December/000588.html
Let's see how that goes.
--
Patrik Lundin
On Tue, Dec 08, 2015 at 11:18:53PM +0100, Patrik Lundin wrote:
>
> What is picking up botan? I looked at every @bin and @lib with ldd and I
> can't see anyone referring to that library. What am i missing?
>
>From http://kea.isc.org/docs/kea-guide.html#required-software:
===
K
t every @bin and @lib with ldd and I
can't see anyone referring to that library. What am i missing?
--
Patrik Lundin
On Tue, Dec 08, 2015 at 11:15:04PM +, Stuart Henderson wrote:
> On 2015/12/08 23:59, Patrik Lundin wrote:
> > I have posted a question to kea-dev regarding this:
> > https://lists.isc.org/pipermail/kea-dev/2015-December/000588.html
> >
> > Let's see how that goes.
On Wed, Dec 09, 2015 at 08:33:10PM +0100, Patrik Lundin wrote:
>
> Attached is a port with the explicit flag set and a shortened
> LIB_DEPENDS/WANTLIB list. I have tested that it ignores the use of Botan
> when it is installed. Let me know what you think.
>
Stuart: It would of
Hello,
I noticed I was still using some '/etc' locations in PLIST and rc
script, diff below.
--
Patrik Lundin
Index: pkg/PLIST
===
RCS file: /cvs/ports/security/opendnssec/pkg/PLIST,v
retrieving revision 1.1.1.1
diff -u -p -u
u notice it?
>
> I also added an XXX comment
> to remind us to update the license marker for 1.0 because ISC are moving
> to the Apache license :'(
>
I did have this upcoming change noted in the back of my head, but having
an explicit note in the Makefile does makes sense.
--
Patrik Lundin
s-sec anyway,
> and since I maintain the BIND port I track a few places where ISC are
> likely to announce things.
>
> http://www.openwall.com/lists/oss-security/2015/12/22/11
> https://www.isc.org/?feed=security-feed
>
Thanks for the info, I guess it is time to spin up newsbeuter again :).
--
Patrik Lundin
gt; Thanks.
>
Great, thanks!
--
Patrik Lundin
nclude/kea/asio/" stuff.
* Promotes the BUILD_DEPEND of devel/boost to a LIB_DEPEND (which i
guess is good since it appears to clean up the include stuff above).
* Adds an additional SHARED_LIB (kea-eval).
The diff to CVS below, let me know what you th
On Mon, May 16, 2016 at 06:09:54PM +0200, Patrik Lundin wrote:
> Hello,
>
> Attached is a patch for OpenDNSSEC 1.4.10:
> https://www.opendnssec.org/2016/05/opendnssec-1-4-10/
>
Ping.
--
Patrik Lundin
On Mon, Jun 27, 2016 at 07:51:33PM +, Christian Weisgerber wrote:
> On 2016-06-27, Patrik Lundin <pat...@sigterm.se> wrote:
>
> > CXX_DUMP_VERSION=`$CXX -dumpversion | cut -f1-2 -d.`
> > if test "$CXX_DUMP_VERSION" \< "4.5"; then
> >
On Mon, Jun 27, 2016 at 07:44:07PM +0200, Jeremie Courreges-Anglas wrote:
> Patrik Lundin <pat...@sigterm.se> writes:
>
> >
> > This means that the failing "test" can actually be thought of as a
> > feature. It is of course brittle, and will modify the
g for pointers from other porters, anyone have
an idea how I should deal with this? Should I bother at all?
--
Patrik Lundin
wrap my head around the autoconf magic involved.
--
Patrik Lundin
Index: Makefile
===
RCS file: /cvs/ports/net/kea/Makefile,v
retrieving revision 1.5
diff -u -p -u -r1.5 Makefile
--- Makefile14 Mar 2016 06:46:24 - 1.5
ombination.
===
Diff below.
--
Patrik Lundin
Index: Makefile
===
RCS file: /cvs/ports/security/opendnssec/Makefile,v
retrieving revision 1.2
diff -u -p -u -r1.2 Makefile
--- Makefile22 Dec 2015 07:02:24 - 1.2
+++ Makefile
)
>
Thanks for the information, it seems jca@ has come to the rescue already
:).
--
Patrik Lundin
On Fri, Mar 11, 2016 at 09:25:46PM +0100, Jeremie Courreges-Anglas wrote:
> Patrik Lundin <pat...@sigterm.se> writes:
>
> If this is what you had in mind, I can commit it. No REVISION bump
> needed.
>
> Index: net/kea/Makefile
>
[...]
>
> In
ly a call for people with commit bits?
--
Patrik Lundin
On Mon, Mar 14, 2016 at 09:25:48AM +, Stuart Henderson wrote:
> On 2016/03/14 07:49, Jeremie Courreges-Anglas wrote:
> > Patrik Lundin <pat...@sigterm.se> writes:
> >
> > [...]
> >
> > > The only thing I felt a bit unsure about is net/kea which disab
Hello,
Attached is a patch for OpenDNSSEC 1.4.10:
https://www.opendnssec.org/2016/05/opendnssec-1-4-10/
The additional patch files were added to silence some minor build
warnings that I noticed. They have been accepted upstream:
https://github.com/opendnssec/opendnssec/pull/418
--
Patrik
https://pthree.org/2013/05/27/strengthen-your-private-encrypted-ssh-keys/
generated a private key file which i manged to import with softhsm.
Does this fix your problem?
--
Patrik Lundin
On Sun, Jan 22, 2017 at 09:08:09PM +0100, Patrik Lundin wrote:
> Hello,
>
> Here is an update to the newly released OpenDNSSEC 1.4.13. It removes a patch
> that has been merged upstream.
>
Ping.
--
Patrik Lundin
in state file.
Wrong error was sometimes being print on failing TCP connect.
Add support for OpenSSL 1.1.0.
OPENDNSSEC-866: Script for migration between MySQL and SQLite was outdated.
===
--
Patrik Lundin
Index: Makefile
On Mon, Oct 10, 2016 at 12:28:58AM +0200, Patrik Lundin wrote:
> Hello,
>
> See below for an update to net/kea from 1.0.0 to 1.1.0.
>
Ping.
--
Patrik Lundin
ng file: 404 Not Found
> $pkg_info -Iq ansible-2.1.1.0p2
> ansible-2.1.1.0p2
>
> The only 'advantage' of -e here is that it finds it if you pass the full
> version without the patchlevel.
>
Right, the reason for the switch was the requirement to find the real
package on disk when a user supplies a name using the branch syntax.
--
Patrik Lundin
true for "-Iq inst:".
This could mean that the module will always think that the package
needs to be installed because it can't tell there is a package with the
supplied name (plus patchlevel) already installed.
===
--
Patrik Lundin
.
===
It removes two already applied patches, and adds a new one which has also been
accepted upstream:
https://github.com/opendnssec/opendnssec/pull/603
Finally it updates LIB_DEPENDS so that databases/sqlite3 is only part of
the sqlite3 flavor to make portcheck happy.
--
Patrik Lundin
Index: Makefile
: Inconsistencies between v1 and v2.
Issue #17: Use the MutexFactory wrapper functions correctly.
===
Note that SOFTHSM-101 was already backported to the version currently in
ports. This update removes those local patches. It also regens the
patch to the configure script.
--
Patrik Lundin
Index
On Sat, Nov 19, 2016 at 02:02:06PM +, Stuart Henderson wrote:
>
> It seems the first hunk of the configure script patch is unnecessary,
> probably since changes to pthread so that pulled in as a normal dependency.
> Can you confirm that please?
>
Good catch, new diff bel
0.html
Other then that the library versions of the port have been bumped based on
shared_libs.log in WRKSRC.
--
Patrik Lundin
Index: Makefile
===
RCS file: /cvs/ports/net/kea/Makefile,v
retrieving revision 1.5
diff -u -p -u -r1.5 Makefile
h related changes from
upstream.
This particular problem is a result of adding the last iteration of
branch-syntax fixes without the previous plumbing.
Doing a diff -u between a "make extract" version of openbsd_pkg.py and
an upstream version from git shows quite a bit of changes that are
missing.
--
Patrik Lundin
On Tue, Feb 07, 2017 at 07:12:57PM +0100, Patrik Lundin wrote:
> On Sun, Jan 22, 2017 at 09:08:09PM +0100, Patrik Lundin wrote:
> > Hello,
> >
> > Here is an update to the newly released OpenDNSSEC 1.4.13. It removes a
> > patch
> > that has been merged u
unsure what the correct
solution is. Here is the output of the requested port-lib-depends-check:
===
# make port-lib-depends-check
kea-1.2.0(net/kea):
Extra: stdc++.57
===
Any input on this?
--
Patrik Lundin
Index: Makefile
===
RCS f
kea/pull/53
I dont feel that warrants a port patch though as I don't think the
outcome matters on OpenBSD.
--
Patrik Lundin
Index: Makefile
===
RCS file: /cvs/ports/net/kea/Makefile,v
retrieving revision 1.9
diff -u -p -u -r
On Thu, Aug 03, 2017 at 10:24:00PM +0200, Patrik Lundin wrote:
>
> Thanks for spotting that. New diff against fresh ports tree below (and
> now portcheck is happy as well).
>
Since there have been no further feedback, is there a chance the latest
diff can get commited?
--
Patrik Lundin
On Sun, Jul 02, 2017 at 12:00:08PM +0200, Patrik Lundin wrote:
> Hello,
>
> Below is an update of security/opendnssec to 1.4.14.
> From https://www.opendnssec.org/:
> ===
> Bugs Fixed
> * OPENDNSSEC-888: Fix up MySQL<->SQLite3 database conversion script.
>
the same parameters. This would prevent KSK rollovers.
* OPENDNSSEC-890: Bogus signatures on mismatching TTLs within the same
RRset.
===
--
Patrik Lundin
Index: Makefile
===
RCS file: /cvs/ports/security/opendnssec/Makefile,v
r
On Sat, Aug 12, 2017 at 11:39:14PM +0200, Patrik Lundin wrote:
>
> Since there have been no further feedback, is there a chance the latest
> diff can get commited?
>
Ping.
--
Patrik Lundin
On Sun, Aug 27, 2017 at 11:19:44AM +0100, Stuart Henderson wrote:
> On 2017/08/27 12:07, Patrik Lundin wrote:
> > On Sat, Aug 12, 2017 at 11:39:14PM +0200, Patrik Lundin wrote:
> > >
> > > Since there have been no further feedback, is there a chance the latest
org/pages/viewpage.action?pageId=10125376#HowdoI...?-UpgradeOpenDNSSEC1.4.9toOpenDNSSEC2.0
--
Patrik Lundin
[1]: https://blog.sigterm.se/posts/to-the-cloud-dns-edition/
lt one. I did so here for the
learning experience.
The responses from that service are not signed at this point, so there
is no correlation with OpenDNSSEC.
--
Patrik Lundin
83 matches
Mail list logo