From nobody Mon Nov 21 12:40:34 2022 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NG6S23j2vz4hwRT for ; Mon, 21 Nov 2022 12:40:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NG6S20cNNz41x0 for ; Mon, 21 Nov 2022 12:40:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1669034434; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=VETul1q12K9cykSumo1Y7gU1eUZScaln4Y35skId8pw=; b=tDeHIYgSNx4EjnjuTH7hWjVV5Pa/DR7rtppy72Mnrw9maz+lZ2VOV7rIHDsC6ZVPXglRBk bDdaqYWr/I/d+r65lyO1kTCYVqX+7jMnG608xTjFrEo2SrIa7RQm2LUpnWPvu7CmZ3L58t FWsCYpG/BBll+2D0pWpF8j5T/pGqtkxofos4I3k3snumNI3ZnsACxv/Ci2tX4f96gj/Y7g +JMu7en5jEwec+omElR5iuEAcMOwZpRjUiPr3XQjxayqaT024PeYggSYUOmg0e1Mo2GdAb 8x7/sBhiarI8+FyJ2C8KJFBTXjeTjwUMohxsdX9/5A+xSSaWIQ7qqc1q4AebSw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1669034434; a=rsa-sha256; cv=none; b=GHmkoTHeeDWWsEi4IdFp50MNQU3aPrKZZlbmJUSIHTkIvGNwS5/gHa8PnLq+Xi+w4XEavv D6Z7/8lqMrKBE0YOCDFB6aHxO39oYnuCeXRrRq4h6HZr6KIacfHEFzi7jkkLoBIGIqvu0Z 5ZN4BoJa2SS5ujROQSMwkFGsEeT0mauLDYOCO0WEyC7AqDTiT0waZ9OhZRFREkpIVGR3Iv oA3Qypq4bqFCLjqVhldSTAmgQV1coo4pfO0KkEYx8pL0MTFsx93qNc+twl42uzLOzELtAS bH4pgaWAmQnv3CFk9qw+AGV1TggexJrI3dwaJ5+i0rUfVNroh8lCznga8FxDTw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4NG6S16dR2z13pt for ; Mon, 21 Nov 2022 12:40:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 2ALCeXF6012732 for ; Mon, 21 Nov 2022 12:40:33 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 2ALCeXH0012731 for ports-bugs@FreeBSD.org; Mon, 21 Nov 2022 12:40:33 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 267891] net/routinator: Update to 12.0 Date: Mon, 21 Nov 2022 12:40:34 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform bug_file_loc op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267891 Bug ID: 267891 Summary: net/routinator: Update to 12.0 Product: Ports & Packages Version: Latest Hardware: Any URL: https://www.nlnetlabs.nl/news/2022/Nov/10/routinator-0 .12.0-released/ OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: jaap@NLnetLabs.nl Attachment #238212 maintainer-approval+ Flags: Created attachment 238212 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D238212&action= =3Dedit patch to update 0.12.0 'Brutalism and Gardening' Breaking Changes * Restructured the TAL configuration in response to the dropped requirement to opt into the ARIN TAL. Routinator will now use the bundled RIR TALs directly unless told otherwise by the new --no-rir-tals command line and config option. The additional bundled TALs can be added via the new --tal command line and config option. Additionally, the TAL directory can still be used via the --extra-tals-dir option. The tal-dir option has been removed but will still be accepted and ignored in the config file only. The init command has been removed. (#796) * Changed the default configuration option for unsafe-vrps to accept and removed all logging or mentioning of unsafe VRPs in this case. (#761) * Setting the rsync-timeout option to 0 now disables the rsync timeout. (#798) * Refactored error handling. Routinator now logs the reason why an object failed verification or was otherwise rejected. (#755) * Removed the deprecated rrdp-disable-gzip configuration option. (#769) New * The new limit-v4-len and limit-v6-len command line and config file options allow limiting the length of IPv4 and IPv6 prefixes, respectively, to be included in the VRP data set. (#810) * The new rrdp-fallback command line and config file option allows specifying the circumstances under which a failed RRDP fetch should result in using rsync instead. Supported polices are never for never falling back to using rsync, stale for the current behavior of falling back when RRDP has failed for some time, and new to only fall back for repositories where RRDP has never worked before. (#799) * In the extended jsonext output format, the information for VRPs and router keys derived from RPKI data has gained a new member "tal" that shows the name of the TAL this object was published under. (#765) * The log output to files, stderr, and the /log HTTP endpoint now includes the log level of the message to make it more clear how important the message really is. (#797) * The RTR client metrics have been extended by three new values allowing to track the time since last cache reset and the number of reset and serial queries. Like all RTR client metrics, these new values are only available if enable explicitly via the rtr-client-metrics config option. (#800) * TCP keepalive is now enabled for RRDP connections. The keepalive duration can be configured via the new command line and config file option rrdp-tcp-keepalive. (#801) Bug Fixes * Fixed an issue in error handling in the RRDP collector that causes Routinator to exit if it encountered malformed Base 64 in RRDP snapshot and delta files. (Found by Donika Mirdita and Haya Shulman. Assigned [CVE-2022-3029].) ([#784]) * Fixed an issue where RRDP snapshots and deltas with a status code other than 200 OK were accepted and processed. (#802) * Changed how Routinator deals with files in the store that cannot be parsed. These will now be ignored and the publication point stored in them considered not available. (#803) * When piping output from the vrps command into something else, a broken pipe will not lead to an error message any more. (#807) * Fixed various issues with the calculation of RTR metrics. (#811) Other Changes * The minimal required Rust version has been increased to 1.60. (#792) * The default Docker image now listens on both port 8323 and 9556 for HTTP requests. (#809) --=20 You are receiving this mail because: You are the assignee for the bug.=