From owner-freebsd-ports-bugs@FreeBSD.ORG Sat Apr 11 02:20:04 2015 Return-Path: Delivered-To: freebsd-ports-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 12B1FEC4 for ; Sat, 11 Apr 2015 02:20:04 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id EA860937 for ; Sat, 11 Apr 2015 02:20:03 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t3B2K33L016100 for ; Sat, 11 Apr 2015 02:20:03 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 199363] [MAINTAINER] net-p2p/gtk-gnutella: Update to 1.1.3 Date: Sat, 11 Apr 2015 02:20:03 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: woodsb02@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform bug_file_loc op_sys bug_status bug_severity priority component assigned_to reporter cc attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Apr 2015 02:20:04 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199363 Bug ID: 199363 Summary: [MAINTAINER] net-p2p/gtk-gnutella: Update to 1.1.3 Product: Ports & Packages Version: Latest Hardware: Any URL: http://gtk-gnutella.sourceforge.net/en/?page=news#news _72 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: woodsb02@gmail.com CC: adamw@FreeBSD.org, jamie@dyslexicfish.net Created attachment 155443 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=155443&action=edit Patch to update net-p2p/gtk-gnutella to 1.1.3 (also removes perl dependency) Update net-p2p/gtk-gnutella to latest upstream release 1.1.3. Also remove the perl dependency, as recommended by Jamie Landeg-Jones: "There has never been a need for perl - there are/were a few perl scripts in the distribution as developer tools, but none related to building or running gtkg." Also confirmed by Raphael Manfredi "Yes, perl is used to generate source code by developers, but all the generated source code is stored in git. Therefore, to compile GTKG from sources or use it, there is no need for perl at all!" Changes in 1.1.3 release: Improvements * [GTK2] Added popup menu icon in front of "force push mode" for sources. * [GTK2] Added warning icon in status bar when kernel runs short of net buffers. * Increased default node connection timeout and size of the quick connect pool. * Updated the shell "status" command to display "!IP" on net buffer shortage. * Updated FAQ along with French and Turkish translations. * Updated GeoIP databases. Bug Fixes * Fixed invalid test for "fake" Shareaza that led to network instabilities. * Made QRP lock a mutex to allow for recursive locking through qrp_comp_done(). Under the Hood * On out-of-memory conditions, attempt to auto-restart if possible. * Windows: monitor committed memory, crashing before the kernel would kill us. * Added crash_restart() and controlling routines to request smooth restart. * On network buffer shortage (ENOBUFS), stop TCP connections for a while. * UPnP: protect upnp_mapping objects given to callbacks with reference counts. * Adjusted lock tracking when locks are disabled, fixing lock swapping. * Windows: remember socket descriptors so that we can close them on exec(). * Refactored code for listening sockets to warn when bound port is already used. * When shutdowning in "crash mode", skip most of the memory cleanup. * rwlock_destroy(): make sure to write-unlock the lock if it was owned. * waiter_ack(): don't panic if waiter was not notified, but loudly complain. * upnp_map_natpmp_publish_reply(): trace given port on NAT-PMP mapping errors. * upnp_discover(): force selection of IPv4 interface for UPnP discovery. * thread_unsuspend_others(): relaxed hard assertion into a soft one. * alloc_pages(): try harder on OOM conditions to allocate from the page cache. * socket_connect_finalize(): fixed wrong errno processing for connect(). * socket_connect_prepare(): no need for SO_REUSEADDR for connecting sockets. -- You are receiving this mail because: You are the assignee for the bug.