Unmaintained FreeBSD ports which are out of date

2023-04-07 Thread portscout
Dear port maintainers,

The portscout new distfile checker has detected that one or more
unmaintained ports appears to be out of date. Please take the opportunity
to check each of the ports listed below, and if possible and appropriate,
submit/commit an update. Please consider also adopting this port.
If any ports have already been updated, you can safely ignore the entry.

An e-mail will not be sent again for any of the port/version combinations
below.

Full details can be found at the following URL:
http://portscout.freebsd.org/po...@freebsd.org.html


Port| Current version | New version
+-+
cad/ifcopenshell| 0.6.0   | 
blenderbim-230407
+-+
sysutils/google-compute-engine-oslogin  | 20191018.00 | 20230406.02
+-+


If any of the above results are invalid, please check the following page
for details on how to improve portscout's detection and selection of
distfiles on a per-port basis:

http://portscout.freebsd.org/info/portscout-portconfig.txt

Reported by:portscout!



Fetching distfile from OSDN?

2023-04-07 Thread Christian Weisgerber
I just upgrade shells/yash, whose distfile is hosted on OSDN.
I had to put the full URL into MASTER_SITES, because I can't figure
out how to use the OSDN shortcut to fetch this:

https://osdn.net/projects/yash/downloads/78345/yash-2.54.tar.xz

Any ideas?

Releases are linked from here:
https://osdn.net/projects/yash/releases/

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de



Re: security/portsentry removal

2023-04-07 Thread Mel Pilgrim

On 2023-04-01 10:14, Andrea Venturoli wrote:

Hello.

I switched from Q1 to Q2 port tree today and was surprised to see this
port gone.
I try to avoid complaining, but it was marked deprecated on Feb 26 and
removed on Mar 30: I agree that a software that was abandoned in 2003 or
so should go away, but I believe this time window was too short, as
those of us using quarterly ports didn't even see the deprecation notice.
I don't think postponing the deprecation for two days would have had any
big drawback...
In any case, enough of that.

Can anyone suggest something equivalent in the port tree?


Have a look at fail2ban.  It's design intent is monitoring running 
services, but really it's just a set of log file regex filters. 
Anything that logs network activity can feed it.