From owner-freebsd-ports-bugs@FreeBSD.ORG Wed Apr 26 20:11:08 2006 Return-Path: X-Original-To: freebsd-ports-bugs@FreeBSD.org Delivered-To: freebsd-ports-bugs@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 7027716A43D for ; Wed, 26 Apr 2006 20:11:08 +0000 (UTC) (envelope-from matthias.andree@gmx.de) Received: from mail.gmx.net (mail.gmx.net [213.165.64.20]) by mx1.FreeBSD.org (Postfix) with SMTP id 8245F43D49 for ; Wed, 26 Apr 2006 20:11:05 +0000 (GMT) (envelope-from matthias.andree@gmx.de) Received: (qmail invoked by alias); 26 Apr 2006 20:11:03 -0000 Received: from p50913366.dip0.t-ipconnect.de (EHLO m2a2.dyndns.org) [80.145.51.102] by mail.gmx.net (mp035) with SMTP; 26 Apr 2006 22:11:03 +0200 X-Authenticated: #428038 Received: from localhost (localhost [127.0.0.1]) by merlin.emma.line.org (Postfix) with ESMTP id ABCCA200F1E; Wed, 26 Apr 2006 22:11:02 +0200 (CEST) Received: from m2a2.dyndns.org ([127.0.0.1]) by localhost (m2a2.dyndns.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 01996-06; Wed, 26 Apr 2006 22:11:01 +0200 (CEST) Received: by merlin.emma.line.org (Postfix, from userid 500) id 82D81201E05; Wed, 26 Apr 2006 22:11:01 +0200 (CEST) Date: Wed, 26 Apr 2006 22:11:01 +0200 From: Matthias Andree To: bug-followup@FreeBSD.org, freebsd@unixfreunde.de, ports@freebsd.org, freebsd-ports-bugs@FreeBSD.org Message-ID: <20060426201101.GA1433@merlin.emma.line.org> Mail-Followup-To: bug-followup@FreeBSD.org, freebsd@unixfreunde.de, ports@freebsd.org, freebsd-ports-bugs@FreeBSD.org References: <20060426192442.6E3B654E@k7.mavetju> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20060426192442.6E3B654E@k7.mavetju> X-PGP-Key: http://home.pages.de/~mandree/keys/GPGKEY.asc User-Agent: Mutt/1.5.11 X-Virus-Scanned: amavisd-new at emma.line.org X-Y-GMX-Trusted: 0 Cc: Subject: Re: ports/96379: PLEASE DO NOT SEND OPENVPN 2.0.7 REMINDERS! X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Apr 2006 20:11:08 -0000 Please close ports/96379. I am not accepting patches to update the FreeBSD/DragonflyBSD port security/openvpn to 2.0.7. The only OpenVPN 2.0.7 change affects Windows which doesn't understand %llu placeholders in *printf, as the ChangeLog very clearly states: "2006.04.12 -- Version 2.0.7 * Code added in 2.0.6-rc1 to extend byte counters to 64 bits caused a bug in the Windows version which has now been fixed. The bug could cause intermittent crashes." I ask that all PRs asking or patching the OpenVPN port to version 2.0.7 be closed without further questions asked. Please stop wasting everybody's time with bogus requests! Thank you. On Wed, 26 Apr 2006, Edwin Groothuis wrote: > Maintainer of security/openvpn, > > Please note that PR ports/96379 has just been submitted. > > If it contains a patch for an upgrade, an enhancement or a bug fix > you agree on, reply to this email stating that you approve the patch > and a committer will take care of it. The patch is bogus. 1. USE_RC_SUBR-installed files do not belong into pkg-plist. 2. %%PORTDOCS%% belongs into pkg-plist, the sample scripts and documentation files aren't crucial for operation for OpenVPN. I'm not accepting patches to remove these %%PORTDOCS%% tags. 3. OpenVPN 2.0.7 does not contain changes relevant for FreeBSD. I'm not updating the port if no code, script or documentation changes. See above. -- Matthias Andree