From owner-svn-ports-all@FreeBSD.ORG Tue Apr 29 08:45:31 2014 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4579B20C; Tue, 29 Apr 2014 08:45:31 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3221066A; Tue, 29 Apr 2014 08:45:31 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s3T8jVuT031812; Tue, 29 Apr 2014 08:45:31 GMT (envelope-from nemysis@svn.freebsd.org) Received: (from nemysis@localhost) by svn.freebsd.org (8.14.8/8.14.8/Submit) id s3T8jUe3031810; Tue, 29 Apr 2014 08:45:30 GMT (envelope-from nemysis@svn.freebsd.org) Message-Id: <201404290845.s3T8jUe3031810@svn.freebsd.org> From: Rusmir Dusko Date: Tue, 29 Apr 2014 08:45:30 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r352587 - head/security/zenmap X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Apr 2014 08:45:31 -0000 Author: nemysis Date: Tue Apr 29 08:45:30 2014 New Revision: 352587 URL: http://svnweb.freebsd.org/changeset/ports/352587 QAT: https://qat.redports.org/buildarchive/r352587/ Log: - Update to 6.46, Announce message: Fixed a bug which caused this crash message: IOError: [Errno socket error] [Errno 10060] A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond The bug was caused by us adding a DOCTYPE definition to Nmap's XML output which caused Python's XML parser to try and fetch the DTD every time it parses an XML file. We now override that DTD-fetching behavior. [Daniel Miller] Modified: head/security/zenmap/Makefile head/security/zenmap/distinfo Modified: head/security/zenmap/Makefile ============================================================================== --- head/security/zenmap/Makefile Tue Apr 29 08:31:17 2014 (r352586) +++ head/security/zenmap/Makefile Tue Apr 29 08:45:30 2014 (r352587) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= zenmap -PORTVERSION= 6.45 +PORTVERSION= 6.46 CATEGORIES= security ipv6 MASTER_SITES= http://nmap.org/dist/ \ SF/nemysisfreebsdp/security/:icons Modified: head/security/zenmap/distinfo ============================================================================== --- head/security/zenmap/distinfo Tue Apr 29 08:31:17 2014 (r352586) +++ head/security/zenmap/distinfo Tue Apr 29 08:45:30 2014 (r352587) @@ -1,4 +1,4 @@ -SHA256 (nmap-6.45.tar.bz2) = 13e595cbceb97f5281c43aa7ad56059a27d9a8b01ba97f199c4b9c826fcb5764 -SIZE (nmap-6.45.tar.bz2) = 7911456 +SHA256 (nmap-6.46.tar.bz2) = 3f89d9053c69507fe9533c40188a6561d49607a37b1db6380aed9039d4883137 +SIZE (nmap-6.46.tar.bz2) = 7911353 SHA256 (zenmap.png) = 55c232603d0cf02ee2e7cc0c0ba02101d18a33555644a6348fb533329c4cfce1 SIZE (zenmap.png) = 2832