head 1.2; access; symbols pkgsrc-2026Q1:1.2.0.20 pkgsrc-2026Q1-base:1.2 pkgsrc-2025Q4:1.2.0.18 pkgsrc-2025Q4-base:1.2 pkgsrc-2025Q3:1.2.0.16 pkgsrc-2025Q3-base:1.2 pkgsrc-2025Q2:1.2.0.14 pkgsrc-2025Q2-base:1.2 pkgsrc-2025Q1:1.2.0.12 pkgsrc-2025Q1-base:1.2 pkgsrc-2024Q4:1.2.0.10 pkgsrc-2024Q4-base:1.2 pkgsrc-2024Q3:1.2.0.8 pkgsrc-2024Q3-base:1.2 pkgsrc-2024Q2:1.2.0.6 pkgsrc-2024Q2-base:1.2 pkgsrc-2024Q1:1.2.0.4 pkgsrc-2024Q1-base:1.2 pkgsrc-2023Q4:1.2.0.2 pkgsrc-2023Q4-base:1.2 pkgsrc-2023Q3:1.1.0.4 pkgsrc-2023Q3-base:1.1 pkgsrc-2023Q2:1.1.0.2 pkgsrc-2023Q2-base:1.1; locks; strict; comment @# @; 1.2 date 2023.11.14.13.22.29; author jperkin; state Exp; branches; next 1.1; commitid tUO5bTaqCdyO0AME; 1.1 date 2023.05.12.09.25.24; author jperkin; state Exp; branches; next ; commitid bz4F6tzyAm9jGEoE; desc @@ 1.2 log @duo-unix: Update to 2.0.2. duo_unix-2.0.2: - `make check` now works correctly on Solaris - Added support for Fedora 37 and Fedora 38 - Added support for Debian 12 - Removed support for Ubuntu 18.04 - Removed support for Debian 9 duo_unix-2.0.1: - The support script collects a few additional files for troubleshooting - Duo API calls now use SHA512 instead of SHA1 as the HMAC algorithm duo_unix-2.0.0: - Changed the behavior of `su` when the target user is not root. The target user will need to complete 2FA rather than the original user. - login_duo resets the SIGPIPE handler when it closes its connection. - Added logging when Duo is invoked, to assist troubleshooting. - Updated package signing to SHA512 duo_unix-1.12.1: - Updated Unity to 2.5.2 - Added support for Fedora 34 - Removed support for Centos 8 - Added support for Centos Stream 8 - Added support for Centos Stream 9 - Added support for Ubuntu 22.04 duo_unix-1.12.0: - Switched from BSON to JSON as a data interchange format - Switched from Cram to python `unittest` for testing duo_unix-1.11.5: - Added support for Debian 11 - Removed support for Debian 8 - Removed support for CentOS 6 - Fixed MOTD display for non-interactive sessions - The support tool now also collects the sudo PAM configuration file - Updated pinned certificates @ text @$NetBSD: patch-configure,v 1.1 2023/05/12 09:25:24 jperkin Exp $ Ensure openssl rpath flags are used. --- configure.orig 2023-07-28 15:10:35.000000000 +0000 +++ configure @@@@ -13023,7 +13023,7 @@@@ fi if test x"$PKG_CONFIG" != x""; then - OPENSSL_LDFLAGS=`$PKG_CONFIG openssl --libs-only-L 2>/dev/null` + : if test $? = 0; then OPENSSL_LIBS=`$PKG_CONFIG openssl --libs-only-l 2>/dev/null` OPENSSL_INCLUDES=`$PKG_CONFIG openssl --cflags-only-I 2>/dev/null` @ 1.1 log @duo-unix: Ensure openssl rpath flags are used. @ text @d1 1 a1 1 $NetBSD$ d5 1 a5 1 --- configure.orig 2020-05-18 16:08:51.000000000 +0000 d7 1 a7 1 @@@@ -13013,7 +13013,7 @@@@ fi d12 1 a12 1 + OPENSSL_LDFLAGS=`$PKG_CONFIG openssl --libs-only-L --libs-only-other 2>/dev/null` @