From owner-svn-ports-head@FreeBSD.ORG Tue Jan 6 16:09:54 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C111579C; Tue, 6 Jan 2015 16:09:54 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 989812B02; Tue, 6 Jan 2015 16:09:54 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t06G9ssW087102; Tue, 6 Jan 2015 16:09:54 GMT (envelope-from riggs@FreeBSD.org) Received: (from riggs@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t06G9r1V087096; Tue, 6 Jan 2015 16:09:53 GMT (envelope-from riggs@FreeBSD.org) Message-Id: <201501061609.t06G9r1V087096@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: riggs set sender to riggs@FreeBSD.org using -f From: Thomas Zander Date: Tue, 6 Jan 2015 16:09:53 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r376430 - in head/mail/mpop: . files X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Jan 2015 16:09:54 -0000 Author: riggs Date: Tue Jan 6 16:09:52 2015 New Revision: 376430 URL: https://svnweb.freebsd.org/changeset/ports/376430 QAT: https://qat.redports.org/buildarchive/r376430/ Log: - Update to upstream version 1.2.0 - Remove GNOMEKEYRING OPTION, add LIBSECRET PR: 195876 Submitted by: jbeich@vfemail.net Modified: head/mail/mpop/Makefile head/mail/mpop/distinfo head/mail/mpop/files/patch-doc-mpop.1 Modified: head/mail/mpop/Makefile ============================================================================== --- head/mail/mpop/Makefile Tue Jan 6 15:04:11 2015 (r376429) +++ head/mail/mpop/Makefile Tue Jan 6 16:09:52 2015 (r376430) @@ -2,30 +2,27 @@ # $FreeBSD$ PORTNAME= mpop -PORTVERSION= 1.0.29 -PORTREVISION= 2 +DISTVERSION= 1.2.0 CATEGORIES= mail -MASTER_SITES= SF +MASTER_SITES= SF/${PORTNAME}/${PORTNAME}/${DISTVERSION} MAINTAINER= ports@FreeBSD.org COMMENT= Small and fast POP3 client LICENSE= GPLv3 # (or later) -USES= pkgconfig tar:bzip2 +USES= gmake pkgconfig tar:xz GNU_CONFIGURE= yes CONFIGURE_ARGS= --disable-silent-rules INFO= mpop -OPTIONS_DEFINE= GNOMEKEYRING GSASL IDN NLS +OPTIONS_DEFINE= GSASL IDN LIBSECRET NLS OPTIONS_RADIO= SSL OPTIONS_RADIO_SSL= GNUTLS OPENSSL OPTIONS_DEFAULT= IDN OPENSSL OPTIONS_SUB= yes -GNOMEKEYRING_LIB_DEPENDS= libgnome-keyring.so:${PORTSDIR}/security/libgnome-keyring -GNOMEKEYRING_CONFIGURE_WITH= gnome-keyring GNUTLS_LIB_DEPENDS= libgnutls.so:${PORTSDIR}/security/gnutls GNUTLS_CONFIGURE_ON= --with-ssl=gnutls GSASL_DESC= SASL authentication support via GNU SASL @@ -33,6 +30,9 @@ GSASL_LIB_DEPENDS= libgsasl.so:${PORTSDI GSASL_CONFIGURE_OFF= --without-libgsasl IDN_LIB_DEPENDS= libidn.so:${PORTSDIR}/dns/libidn IDN_CONFIGURE_WITH= libidn +LIBSECRET_DESC= GNOME password management +LIBSECRET_LIB_DEPENDS= libsecret-1.so:${PORTSDIR}/security/libsecret +LIBSECRET_CONFIGURE_WITH= libsecret NLS_USES= gettext NLS_CONFIGURE_ENABLE= nls OPENSSL_USE= openssl=yes Modified: head/mail/mpop/distinfo ============================================================================== --- head/mail/mpop/distinfo Tue Jan 6 15:04:11 2015 (r376429) +++ head/mail/mpop/distinfo Tue Jan 6 16:09:52 2015 (r376430) @@ -1,2 +1,2 @@ -SHA256 (mpop-1.0.29.tar.bz2) = bd7409741629669969b176ed664e0adec449bf434b9f333e74fed534b28690b8 -SIZE (mpop-1.0.29.tar.bz2) = 292369 +SHA256 (mpop-1.2.0.tar.xz) = 9d28817a6950f64aadf10bf5841400701917102181ebf96c136fbd4707c17ba7 +SIZE (mpop-1.2.0.tar.xz) = 264560 Modified: head/mail/mpop/files/patch-doc-mpop.1 ============================================================================== --- head/mail/mpop/files/patch-doc-mpop.1 Tue Jan 6 15:04:11 2015 (r376429) +++ head/mail/mpop/files/patch-doc-mpop.1 Tue Jan 6 16:09:52 2015 (r376430) @@ -1,23 +1,33 @@ --- doc/mpop.1.orig 2009-10-05 16:47:15.000000000 -0300 +++ doc/mpop.1 2009-10-24 12:18:19.000000000 -0200 -@@ -333,6 +333,11 @@ +@@ -305,8 +305,8 @@ intermediate CAs.) .br - On Debian based systems, you can install the \fBca\-certificates\fP package and - use the file \fB/etc/ssl/certs/ca\-certificates.crt\fP. -++.br -+On FreeBSD based systems, you can install the \fBsecurity/ca_root_nss\fP port and -++use the file \fB/usr/local/share/certs/ca-root-nss.crt\fP. Please note that if -++you are installing mpop from ports with OpenSSL or gnutls support, -++the \fBsecurity/ca_root_nss\fP port will be installed automaticly. - .br - An empty argument disables this feature. + The list of trusted CAs is specified using the \fBtls_trust_file\fP command. + Usually there is some system-wide default file available, e.g. +-/etc/ssl/certs/ca\-certificates.crt on Debian-based systems, but you can +-also choose to select the trusted CAs yourself. ++/usr/local/share/certs/ca\-root\-nss.crt on FreeBSD and DragonFly systems, ++but you can also choose to select the trusted CAs yourself. + .br + One practical problem with this approach is that the client program should also + check if the server certificate has been revoked for some reason, using a +@@ -350,8 +350,8 @@ or tunnel the session through TLS (\fIof + .IP "tls_trust_file \fIfile\fP" + Activate server certificate verification using a list of truted Certification + Authorities (CAs). The file must be in PEM format. Some systems provide a +-system-wide default file, e.g. /etc/ssl/certs/ca\-certificates.crt on +-Debian-based systems with the ca\-certificates package. ++system-wide default file, e.g. /usr/local/share/certs/ca\-root\-nss.crt on ++FreeBSD and DragonFly with ca_root_nss package or security/ca_root_nss port. + An empty argument disables this. You should also use \fBtls_crl_file\fP. .IP "tls_crl_file [\fIfile\fP]" -@@ -457,7 +462,7 @@ + Set a certificate revocation list (CRL) file for TLS, to check for revoked +@@ -542,7 +542,7 @@ tls on .br - # Enable full TLS certificate checks. + # as in this example, or download the root certificate of your CA and use that. .br -tls_trust_file /etc/ssl/certs/ca\-certificates.crt -+tls_trust_file /usr/local/share/certs/ca-root-nss.crt ++tls_trust_file /usr/local/share/certs/ca\-root\-nss.crt .br - # Use the POP3-over-TLS variant instead of the STARTTLS variant. + .br