Subject: CVS commit: pkgsrc/security/ruby-metasploit-payloads
From: Takahiro Kambe
Date: 2021-12-11 14:46:20
Message id: 20211211134620.C1AE6FAEC@cvs.NetBSD.org

Log Message:
security/ruby-metasploit-payloads: update to 2.0.66

2.0.61 (2021-11-29)

* Land #510, honour the pty flag

2.0.62 (2021-12-07)

* resolve_host should return NULL on failure

* Land #513, fix php stdapi loading on php 5.3.29

2.0.63 (2021-12-08)

* Land #514, fix python exception when closing channels

2.0.64 (2021-12-08)

* Fix #512, fix python cmd_exec argument list during
  PROCESS_EXECUTE_FLAG_SUBSHELL

* Land #515, Fix #512, fix python cmd_exec argv

2.0.65 (2021-12-08)

* Return an empty stat buf when stat fails

* Land #511, fix stderr output in python channels

2.0.66 (2021-12-09)

* Land #516, fix python stat on inaccessible directory

* Land #517, fix php stat on inaccessible directory

Files:
RevisionActionfile
1.22modifypkgsrc/security/ruby-metasploit-payloads/Makefile
1.20modifypkgsrc/security/ruby-metasploit-payloads/distinfo