From owner-freebsd-ports-bugs@freebsd.org Thu Dec 12 13:30:10 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8B8111D165B for ; Thu, 12 Dec 2019 13:30:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47YZRQ3Dvdz4XVJ for ; Thu, 12 Dec 2019 13:30:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 6F08A1D165A; Thu, 12 Dec 2019 13:30:10 +0000 (UTC) Delivered-To: ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6EC9E1D1659 for ; Thu, 12 Dec 2019 13:30:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47YZRQ2MhYz4XVH for ; Thu, 12 Dec 2019 13:30:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 32D0B24619 for ; Thu, 12 Dec 2019 13:30:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id xBCDUAR6039647 for ; Thu, 12 Dec 2019 13:30:10 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id xBCDUARw039646 for ports-bugs@FreeBSD.org; Thu, 12 Dec 2019 13:30:10 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 242600] [MAINTAINER] net/routinator upgrade to version 0.6.4 Date: Thu, 12 Dec 2019 13:30:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 12 Dec 2019 13:30:10 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242600 Bug ID: 242600 Summary: [MAINTAINER] net/routinator upgrade to version 0.6.4 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: jaap@NLnetLabs.nl Attachment #209893 maintainer-approval+ Flags: Created attachment 209893 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D209893&action= =3Dedit patch to upgrade This update to 6.4 incorporates the update to 6.3 as well, see the notes below. Notes to version 6.3 This release primarly fixes an issue where all RRDP requests would time out in detached server mode, i.e., if server mode is invoked with the -d option. Because Routinator only falls back to rsync if an RRDP fetch for a given repository has never succeeded and otherwise uses the data previous= ly fetched (assuming that the RRDP failure was only of a temporary nature), th= is caused the eventual loss of the RIPE and APNIC regions ROAs if Routinator was ever run in a different way before. But it is not all bleak news, there is a new feature, too. Veit Heller kind= ly contributed code to make Routinator reload the TALs and restart validation = in server mode when signal USR1 is sent to it. This can be used both to notify Routinator of a change in the set of TALs without having to tear down all R= TR sessions as well as kicking off a new validation run before the refresh time has passed. ____________________________________________________________________ New * Reload TALs and restart validation via SIGUSR1 on Unix systems. (#241, thanks to Veit Heller!) Bug Fixes * RRDP requests failed with a timeout if Routinator was started in detached server mode (server -d). (#250, discovered by Will McLendon) * Fix spelling of routinator_rrdp_duration metrics definition. (#248) Notes to version 6.4 This is a bug fix release that fixes an issue introduced in the last version which caused Routinator to hang indefinitely on occasion. _____________________________________________________________________ Bug Fixes * Fixes an issue where Routinator occasionally gets completely stuck. (#255) --=20 You are receiving this mail because: You are the assignee for the bug.=