From owner-freebsd-ports-bugs@freebsd.org Fri Sep 13 12:44:57 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 81E47F0B2F for ; Fri, 13 Sep 2019 12:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 46VFhn2w7Fz4bBY for ; Fri, 13 Sep 2019 12:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 62402F0B2E; Fri, 13 Sep 2019 12:44:57 +0000 (UTC) Delivered-To: ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6208CF0B2D for ; Fri, 13 Sep 2019 12:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46VFhn1w5Fz4bBX for ; Fri, 13 Sep 2019 12:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 25077754A for ; Fri, 13 Sep 2019 12:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x8DCiveS033869 for ; Fri, 13 Sep 2019 12:44:57 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x8DCivfV033868 for ports-bugs@FreeBSD.org; Fri, 13 Sep 2019 12:44:57 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 240560] [MAINTAINER] net/routinator: Update to version 0.6.1 Date: Fri, 13 Sep 2019 12:44:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Sep 2019 12:44:57 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D240560 Bug ID: 240560 Summary: [MAINTAINER] net/routinator: Update to version 0.6.1 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: jaap@NLnetLabs.nl Attachment #207460 maintainer-approval+ Flags: Created attachment 207460 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D207460&action= =3Dedit Patch to update Changes in the Port: This update is actually combined with a bug fix. I also aidded the feature request as discussed in PR #239899 Release notes: 0.6.1 `Philosophy Is Tricky' This is a bug fix release that primarily fixes an issue in 0.6.0 whereby the serial number for RTR was not updated when new data became available resulting in RTR clients getting stuck with old data. __________________________________________________________________ New * RRDP access statistics are now also shown in the /status HTTP endpoint. They were already part of the Prometheus metrics. (#218) Bug Fixes * The RTR serial number was not increased when new data became available. (#215) Other changes * The RRDP client will not complain if it can read a non-existing state file anymore as this is a completely normal situation. (#217) 0.6.0 `Pink Sombrero' This release adds support for the RPKI Repository Delta Protocol (RRDP), an alternative method of fetching RPKI data that uses HTTPS instead of rsync. RRDP will speed up synchronisation for frequently updated repositories, for instance when Routinator is running in server mode. For the RRDP implementation, most of the internal logic of Routinator has been rewired. We used this opportunity for extensive refactoring and cleanup of the code base. One user visible consequence is that the listeners for RTR and HTTP are now started immediately instead of waiting until after the first validation run. They still will report an error message until then, but at least you won have to wonder whether something went wrong anymore. __________________________________________________________________ Breaking Changes * Removed the rsync-count command line and configuration file option. This option is now unused as modules are now rsynced only when they are actually accessed. (#187) * The default value for refresh has been lowered to 600 seconds. (#191) * The refresh time placed in the RTR End-of-data PDU is now calculated from the time until the next validation run is expected to finish. (#193) * The listeners for RTR and HTTP in server mode are now started right away and report an error until the first validation has finished. (#203) New * Routinator now supports RRDP for synchronizing repository content. (#187) * Restructured repository directory. The rsync data now lives in a sub-directory called rsync. The main repository directory will now be kept clean and all unexpected files removed. (#187) * In server mode, the repository will be refreshed and re-validated when the first object expires. (#191) * Protection against loops in the CA structure: Routinator checks that any subject key identifier only appears once in the chain from a trust anchor to a CA certificate. (#192) * Routinator now explicitly skips .cer files that aren CA certificates before even trying to validate them. This already happened before because these files failed validation. (#194) * New options user and group for setting the user and group names a detached server process should be run as. (#213) Bug Fixes * Fixed crash if the TAL directory is empty. Routinator will complain but run since there could be local exceptions. (#212) --=20 You are receiving this mail because: You are the assignee for the bug.=