Sync with portage [Thu Mar 30 12:16:02 MSK 2023].

master 2411
root 1 year ago
parent e0102e0f84
commit 3284d1b2fe

Binary file not shown.

Binary file not shown.

@ -1,2 +1 @@
DIST bsh-2.0b6.tar.gz 1720334 BLAKE2B 7ade7d35ac66dad8c79dd2cb541c8851b321601bc6239f4d82e6b37269fdefc5cfa5efd1198f58030bb9dcc4712b42c1ca07071f0b042a59ebdbc4168e472fb0 SHA512 3d4458153f5e2a3b30d9afd79f0fe28862effa8e490fd1649d435c03bf90b060c255949a49780afee95069da4e8e8d2e4e2c5d979908370a525b3ca9a396458c
DIST bsh-2.1.1.tar.gz 1922883 BLAKE2B d60ebfab96f81a17120733887468571dd991dce663d725d9bee2dc44146e320d36600be70a3b7f76516645030d40fcda17db70989d54e98ffdc69c91738bcaf1 SHA512 585fcb9fdc8c36063a7d4dfe9a909e68b61d611f023731c955b7ced3f894cb6c48b0d463735e6825cb6f0181ba97902279212d285e325267aa533490e0bbfe00

@ -1,68 +0,0 @@
# Copyright 1999-2022 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
JAVA_PKG_IUSE="doc source test"
MAVEN_ID="org.apache-extras.beanshell:bsh:2.0b6"
inherit java-pkg-2 java-ant-2
MY_PN="beanshell"
MY_BETA="b6"
MY_PV="${PV%%_*}"
MY_P="${PN}-${MY_PV}${MY_BETA}"
DESCRIPTION="A small embeddable Java source interpreter"
HOMEPAGE="https://github.com/beanshell/beanshell"
SRC_URI="https://github.com/${MY_PN}/${MY_PN}/archive/${MY_PV}${MY_BETA}.tar.gz -> ${MY_P}.tar.gz"
LICENSE="LGPL-2.1"
SLOT="0"
KEYWORDS="amd64 ~arm arm64 ppc64 x86 ~amd64-linux ~x86-linux"
IUSE=""
CDEPEND="
dev-java/bsf:2.3
java-virtuals/servlet-api:3.0
"
RDEPEND="
${CDEPEND}
>=virtual/jre-1.8"
DEPEND="
${CDEPEND}
test? ( dev-java/ant-junit:0 )
source? ( app-arch/zip )
virtual/jdk:1.8"
S="${WORKDIR}/${MY_PN}-${MY_PV}${MY_BETA}"
JAVA_ANT_REWRITE_CLASSPATH="yes"
EANT_BUILD_TARGET="jarall"
EANT_DOC_TARGET="javadoc"
EANT_GENTOO_CLASSPATH="
bsf-2.3
servlet-api-3.0
"
java_prepare() {
java-pkg_clean
}
EANT_TEST_TARGET="test"
src_test() {
java-pkg-2_src_test
}
src_install() {
java-pkg_newjar "dist/${MY_P}.jar" "${PN}.jar"
java-pkg_dolauncher "${PN}-console" --main bsh.Console
java-pkg_dolauncher "${PN}-interpreter" --main bsh.Interpreter
use doc && java-pkg_dojavadoc javadoc
use source && java-pkg_dosrc src/bsh
}

@ -40,29 +40,24 @@ DOCS=(
README.md
)
PATCHES=( "${FILESDIR}/bsh-2.1.1-skip-tests.patch" )
JAVA_LAUNCHER_FILENAME="bsh-console"
JAVA_MAIN_CLASS="bsh.Console"
JAVA_RESOURCE_DIRS="resources/src"
JAVA_SRC_DIR=( src bsf/src engine/src )
JAVA_TEST_EXCLUDES=(
bsh.TestUtil # invalid test class
bsh.TestFilter # invalid test class
bsh.Class3_Test
bsh.Class13Test
bsh.Issue_7_Test
bsh.Issue_8_Test
bsh.OldScriptsTest # ?? As the name says Old...
)
JAVA_TEST_GENTOO_CLASSPATH="junit-4"
JAVA_TEST_SRC_DIR="tests/junitTests/src"
JAVA_TEST_SRC_DIR="tests"
src_prepare() {
default
java-pkg-2_src_prepare
java-pkg_clean
java-pkg_clean ! -path "./tests/test-scripts/*"
# These classes are not in upstream jar file
rm engine/src/bsh/TestBshScriptEngine.java || die
rm src/bsh/JThis.java || die
mkdir -p tests/src/bsh/engine || die
mv {engine,tests}/src/bsh/TestBshScriptEngine.java || die
mv {,tests/}src/bsh/JThis.java || die
# java-pkg-simple.eclass wants resources in JAVA_RESOURCE_DIRS
mkdir resources || die
@ -78,26 +73,6 @@ src_prepare() {
! -name 'CodeMap.html' \
! -name 'Manifest.*' \
| xargs cp --parent -t resources || die
# Some but not all tests in these test classes fail
sed \
-e '/import org.junit.Test/a import org.junit.Ignore;' \
-e '/diamond_operator()/i @Ignore' \
-e '/try_with_resource()/i @Ignore' \
-e '/integer_literal_enhancements()/i @Ignore' \
-i tests/junitTests/src/bsh/Project_Coin_Test.java || die
sed \
-e '/import org.junit.Test/a import org.junit.Ignore;' \
-e '/parsing_very_large_hex_literal()/i @Ignore' \
-e '/integer_literal_enhancements_binary()/i @Ignore' \
-e '/parsing_large_hex_literal()/i @Ignore' \
-i tests/junitTests/src/bsh/NumberLiteralTest.java || die
sed \
-e '/import org.junit.Test/a import org.junit.Ignore;' \
-e '/define_interface_with_constants()/i @Ignore' \
-i tests/junitTests/src/bsh/ClassGeneratorTest.java || die
}
src_test() {
@ -106,11 +81,35 @@ src_test() {
# ^
# symbol: class BshScriptEngineFactory
# location: class Issue_55_Test
# cp {engine,tests}/src/bsh/engine/BshScriptEngineFactory.java || die
rm tests/junitTests/src/bsh/Issue_55_Test.java || die
# We add 3 test classes which are not covered by the default test selection of java-pkg-simple
# We skip "OldScriptsTest" and 4 failing test classes.
# Test failures are documeted in bug #903519.
pushd tests/junitTests/src > /dev/null || die
local JAVA_TEST_RUN_ONLY=$(find * \
-type f \
! -name 'OldScriptsTest.java' \
! -name 'Class3_Test.java' \
! -name 'Class13Test.java' \
! -name 'Issue_7_Test.java' \
! -name 'Issue_8_Test.java' \
\( \
-name "*Test.java" \
-o -name "AnnotationsParsing.java" \
-o -name "GoogleReports.java" \
-o -name "Namespace_chaining.java" \
\) )
JAVA_TEST_RUN_ONLY="${JAVA_TEST_RUN_ONLY//.java}"
JAVA_TEST_RUN_ONLY="${JAVA_TEST_RUN_ONLY//\//.}"
popd > /dev/null || die
java-pkg-simple_src_test
}
src_install() {
java-pkg-simple_src_install
# The eclass installs only then main launcher.
java-pkg_dolauncher "${PN}-interpreter" --main bsh.Interpreter
}

@ -0,0 +1,119 @@
Test failures are documeted in https://bugs.gentoo.org/903519
--- a/tests/junitTests/src/bsh/Project_Coin_Test.java
+++ b/tests/junitTests/src/bsh/Project_Coin_Test.java
@@ -26,6 +26,7 @@
package bsh;
import org.junit.Test;
+import org.junit.Ignore;
import org.junit.experimental.categories.Category;
import org.junit.runner.RunWith;
@@ -48,6 +49,7 @@ public class Project_Coin_Test {
@Test
@Category(ProjectCoinFeature.class)
+ @Ignore
public void integer_literal_enhancements() throws Exception {
final Interpreter interpreter = new Interpreter();
assertEquals("0x99", 153, interpreter.eval("return 0x99;"));
@@ -61,6 +63,7 @@ public class Project_Coin_Test {
@Test
@Category(ProjectCoinFeature.class)
+ @Ignore
public void diamond_operator() throws Exception {
eval("List<String> list = new ArrayList<>()");
final Object anagrams = eval(
@@ -98,6 +101,7 @@ public class Project_Coin_Test {
@Test
@Category(Project_Coin_Test.class)
+ @Ignore
public void try_with_resource() throws Exception {
final Interpreter interpreter = new Interpreter();
final AtomicBoolean closed = new AtomicBoolean(false);
--- a/tests/junitTests/src/bsh/NumberLiteralTest.java
+++ b/tests/junitTests/src/bsh/NumberLiteralTest.java
@@ -1,6 +1,7 @@
package bsh;
import org.junit.Test;
+import org.junit.Ignore;
import org.junit.runner.RunWith;
import static bsh.TestUtil.eval;
@@ -22,6 +23,7 @@ public class NumberLiteralTest {
}
@Test
+ @Ignore
public void integer_literal_enhancements_binary() throws Exception {
assertEquals("0b10011001", 153, eval("return 0b10011001;"));
}
@@ -49,11 +51,13 @@ public class NumberLiteralTest {
}
@Test
+ @Ignore
public void parsing_large_hex_literal() throws Exception {
assertEquals(0xff000000L, eval("return 0xff000000;"));
}
@Test
+ @Ignore
public void parsing_very_large_hex_literal() throws Exception {
assertEquals(new BigInteger("ff00000000000000", 16), eval("return 0xff00000000000000;"));
}
--- a/tests/junitTests/src/bsh/ClassGeneratorTest.java
+++ b/tests/junitTests/src/bsh/ClassGeneratorTest.java
@@ -27,6 +27,7 @@ package bsh;
import org.junit.Assert;
import org.junit.Test;
+import org.junit.Ignore;
import org.junit.experimental.categories.Category;
import org.junit.runner.RunWith;
@@ -86,6 +87,7 @@ public class ClassGeneratorTest {
*/
@Test
@Category(KnownIssue.class)
+ @Ignore
public void define_interface_with_constants() throws Exception {
// these three are treated equal in java
TestUtil.eval("interface Test { public static final int x = 1; }");
--- a/tests/junitTests/src/bsh/GoogleReports.java
+++ b/tests/junitTests/src/bsh/GoogleReports.java
@@ -26,6 +26,7 @@
package bsh;
import org.junit.Test;
+import org.junit.Ignore;
import org.junit.runner.RunWith;
import javax.script.ScriptEngine;
@@ -69,6 +70,7 @@ public class GoogleReports {
* <a href="http://code.google.com/p/beanshell2/issues/detail?id=6">issue#60</a>
*/
@Test
+ @Ignore
public void accessibility_issue_a() throws Exception {
final Interpreter interpreter = new Interpreter();
interpreter.set("x", this);
@@ -83,6 +85,7 @@ public class GoogleReports {
* <a href="http://code.google.com/p/beanshell2/issues/detail?id=6">issue#60</a>
*/
@Test
+ @Ignore
public void accessibility_issue_b() throws Exception {
final Interpreter interpreter = new Interpreter();
interpreter.set("x", this);
@@ -96,6 +99,7 @@ public class GoogleReports {
* <a href="http://code.google.com/p/beanshell2/issues/detail?id=10">issue#10</a>
*/
@Test(expected = ParseException.class)
+ @Ignore
public void parse_error() throws Exception {
eval("\1;");
}

Binary file not shown.

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0/$(ver_cut 1-2)"
KEYWORDS="~amd64 ~arm ~riscv x86"
KEYWORDS="amd64 ~arm ~riscv x86"
RDEPEND=">=dev-libs/skalibs-2.13.0.0:="
DEPEND="${RDEPEND}"

Binary file not shown.

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0/$(ver_cut 1-2)"
KEYWORDS="~amd64 ~arm ~arm64 ~riscv x86"
KEYWORDS="amd64 ~arm ~arm64 ~riscv x86"
HTML_DOCS=( doc/. )

Binary file not shown.

@ -3,7 +3,7 @@
EAPI=8
USE_RUBY="ruby27 ruby30 ruby31"
USE_RUBY="ruby27 ruby30 ruby31 ruby32"
RUBY_FAKEGEM_EXTRADOC="History.md README.md"

@ -6,6 +6,7 @@
<name>Gentoo Ruby Project</name>
</maintainer>
<upstream>
<remote-id type="github">geemus/netrc</remote-id>
<remote-id type="github">heroku/netrc</remote-id>
<remote-id type="rubygems">netrc</remote-id>
</upstream>
</pkgmetadata>

@ -0,0 +1,29 @@
# Copyright 1999-2023 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
USE_RUBY="ruby27 ruby30 ruby31 ruby32"
RUBY_FAKEGEM_EXTRADOC="changelog.txt Readme.md"
inherit ruby-fakegem
DESCRIPTION="This library reads and writes .netrc files"
HOMEPAGE="https://github.com/heroku/netrc"
LICENSE="MIT"
KEYWORDS="~amd64 ~arm ~arm64 ~x86"
SLOT="0"
IUSE=""
all_ruby_prepare() {
# Avoid broken test that wrongly tests ruby internal code, bug 643922
sed -e '/test_encrypted_roundtrip/,/^ end/ s:^:#:' \
-e '/test_missing_environment/,/^ end/ s:^:#:' \
-e "s:/tmp/:${T}/:" \
-i test/test_netrc.rb || die
}
each_ruby_test() {
${RUBY} -Ilib:. -e "Dir['test/test_*.rb'].each{|f| require f}" || die
}

@ -1,3 +1,4 @@
DIST octokit-4.24.0.tar.gz 3151075 BLAKE2B df9a20854358722bb92e894413b4b8d50e911aba23d610da4d00e6ff8e03df2c442a83a781c836f5f780a2079992a28c77ae59ae89d49386a009af8f29d8a9d5 SHA512 e2cabc820732b6d9e71b37807007e17fba23199faa127c3480c37b5c8fca1a0ddcaffe5815ffe7a9efe3ef3b617b9099dca8b01e58b4210cbf68566897a93ce7
DIST octokit-4.25.1.tar.gz 3154185 BLAKE2B b1698de8694cd2e147542eb6e7e9784428daa035a6e123c05c135558a669c0d222ef4629cc89de815a51b7b3660a8dd2cb80e8d11b90ac43f661e3e2e078b0c0 SHA512 780393e6765e82f0fbfada3b8800ccb981df4383ebfda0b218c24bac224b39f836c3d9cb94cf2564676000862dec7ab94cd2dbdaff51c37142d1f45140121bf1
DIST octokit-5.6.1.tar.gz 3171006 BLAKE2B 33fd132f81c7b1e1b3c1a4264b7bc6a7e7dbc2f9ccd4f1d2d734ae10914c5544eb90c629200e6d81b9a33fccc23791147af6660840248235ebe6b946f2ebba13 SHA512 3ed2e3eb61190da521f9246ac0fdb530e15c45cb41e5849f04ba1a92f0da8060a82eb2d90dfcb407436efba5f7f0ea98c69a342c67aa26b62eeab74a1f906c4e
DIST octokit-6.1.0.tar.gz 3187811 BLAKE2B 70a849fe855ddf46aeaf6d512d675119188bb39e6a439c311531f20f9c52ce8da829e0e1242b29e821d5d6468b360e69b71ec645fdf7b1b217e4607032aa0d0c SHA512 7f362f7c4e021ae38083bfd498d98ddda7c2a36c439c8a924cb0390ede42911e8f0477481f1bde6b208009e27d42501d143d0549eb9731d8fb529c977a91da9d

@ -0,0 +1,42 @@
# Copyright 1999-2023 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
USE_RUBY="ruby27 ruby30 ruby31"
RUBY_FAKEGEM_RECIPE_DOC="yard"
RUBY_FAKEGEM_RECIPE_TEST="rspec3"
RUBY_FAKEGEM_EXTRADOC="README.md CONTRIBUTING.md"
RUBY_FAKEGEM_GEMSPEC="${PN}.gemspec"
inherit ruby-fakegem
DESCRIPTION="Ruby toolkit for the Github API"
HOMEPAGE="https://github.com/octokit/octokit.rb"
SRC_URI="https://github.com/octokit/octokit.rb/archive/v${PV}.tar.gz -> ${P}.tar.gz"
LICENSE="MIT"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
IUSE=""
RUBY_S=octokit.rb-${PV}
ruby_add_rdepend "
dev-ruby/faraday:1
>=dev-ruby/sawyer-0.9:0
"
ruby_add_bdepend "test? (
dev-ruby/jwt
dev-ruby/mime-types
>=dev-ruby/netrc-0.7.7
>=dev-ruby/rbnacl-7.1.1:6
dev-ruby/vcr[json]
dev-ruby/webmock:3 )"
all_ruby_prepare() {
sed -e '/if RUBY_ENGINE/,/^end/ s:^:#: ; 1igem "webmock", "~>3.0"; gem "faraday", "<2"' \
-e '/pry/ s:^:#:' \
-i spec/spec_helper.rb || die
}

@ -53,5 +53,5 @@ all_ruby_prepare() {
each_ruby_test() {
sed -i -e "s:@GENTOO_RUBY@:${RUBY}:" spec/coverage_for_eval_spec.rb || die
RSPEC_VERSION=3 ruby-ng_rspec spec/ || die
RUBYLIB="${S}/lib" RSPEC_VERSION=3 ruby-ng_rspec spec/ || die
}

Binary file not shown.

@ -1,127 +0,0 @@
TENABLE NETWORK SECURITY, INC.
NESSUS
SOFTWARE LICENSE AGREEMENT
This is a legal agreement ("Agreement") between Tenable Network Security, Inc., a Delaware corporation having offices at 8830 Stanford Boulevard, Suite 312, Columbia, MD 21045 ("Tenable"), and you, the party licensing Software and obtaining the feed services ("You"). This Agreement covers your permitted use of the Software and the Services. BY CLICKING BELOW YOU INDICATE YOUR ACCEPTANCE OF THIS AGREEMENT AND YOU ACKNOWLEDGE THAT YOU HAVE READ ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, UNDERSTAND THEM, AND AGREE TO BE LEGALLY BOUND BY THEM. If You do not agree with the terms of this Agreement, You may not use the Software, as such term is defined below. The Software can only be provided to You by Tenable. The term "Agreement" includes any exhibits to the document.
1. Grant of Software License.
(a) Grant. Subject to the terms and conditions, and your acceptance, of this Agreement, Tenable grants to You a perpetual, non-exclusive, non-transferable license (the "License") in object code form only to use the Software (i) solely for Your internal operations and internal security purposes to seek and assess information technology vulnerabilities events for Your own networks; and (ii) to provide services to third parties to seek and assess information technology vulnerabilities events on the third party's network. Any rights in the Software not granted in this Agreement are expressly reserved by Tenable.
(b) Definition of Software.
(i) The term "Software" means (i) Nessus 3.x that You download from any Tenable website, including www.nessus.org, or obtain via CD or any other method; (ii) the associated user manuals and user documentation, if any, as well as any patches, updates, improvements, additions, enhancements and other modifications or revised versions of Nessus 3.x that may be provided to You by Tenable from time to time that were developed by Tenable; and (iii) any Nessus daemons, command line interfaces, and/or any graphical user interfaces You obtain from Tenable that were developed by Tenable.
(ii) Any Software that is not marked as copyrighted by Tenable are not Software as defined under this Agreement and are subject to other license terms.
(iii) Tenable has the right to, or the right to license, the Software, including any libraries licensed under LGPL. Contact Tenable for more details.
(c) Maintenance and Support. Tenable will not provide any maintenance or support services as part of this Agreement unless You obtain a "Direct Feed Subscription", as such term is defined in Exhibit A, from Tenable.
2. Subscriptions.
You may obtain a subscription to receive Plugins (as such term is defined in Exhibit A) and updates to the Plugins as further described in Exhibit A, which is incorporated herein by reference.
3. Term.
This Agreement commences on the date on which You execute this Agreement or download, install or use the Software (whichever occurs first) (the "Effective Date") and continues until it is terminated according to the terms of this Agreement.
4. Intellectual Property.
This Agreement does not transfer to You any title to or any ownership right or interest in the Software. You acknowledge that Tenable owns and retains all right, title and interest in and to the Software. All enhancements, modifications and derivative works that Tenable makes to the Software or accompanying documentation, and all intellectual property rights therein, will be the property of Tenable. Your rights with respect to the Software are limited to the right to use the Software pursuant to the terms and conditions in this Agreement.
5. No Reverse Engineering, Other Restrictions.
You may not directly or indirectly: (i) sell, lease, redistribute or transfer any of the Software on a stand-alone basis; (ii) decompile, disassemble, reverse engineer, or otherwise attempt to derive, obtain or modify the source code of the Software; (iii) reproduce, modify, translate or create derivative works of all or part any of the Software; (iv) rent, lease or loan the Software in any form to any third party or otherwise allow a third party to use the Software; or (v) remove, alter or obscure any proprietary notice, labels, or marks on the Software. You may not sublicense any of the rights granted to You in this Agreement. You may not distribute or otherwise provide Software to third parties. You are responsible for all use of the Software and for compliance with this Agreement; any breach by You or any user using the Software on Your behalf shall be deemed to have been made by You.
6. Restrictions on Third Party Use and Access.
You agree not to deliver or otherwise make available the Software, in whole or in part, to any party other than Tenable, except for purposes specifically related to Your use of the Software without Tenable's prior written consent. You agree to use Your best efforts and to take all reasonable steps to ensure that no unauthorized parties have access to the Software and that no unauthorized copy, publication, disclosure or distribution of the Software, in whole or in part, in any form is made by You or any third party. You agree to notify Tenable of any unauthorized access to, or use, copying, publication, disclosure or distribution of, the Software. You acknowledge that the Software contains valuable confidential information and trade secrets of Tenable or its affiliates and their licensors or suppliers, and that unauthorized access to, or use, copying, publication, disclosure or distribution of, the Software is harmful to Tenable or its affiliates and their licensors or suppliers.
7. Confidentiality.
As used in this Agreement, "Confidential Information" means any and all information and material that: (i) gives of Tenable some competitive business advantage or the opportunity of obtaining such advantage or is otherwise confidential or a trade secret; (ii) is marked "Confidential," "Restricted," or "Confidential Information" or other similar marking; (iii) is known by You to be confidential or proprietary; or (iv) from all the relevant circumstances, should reasonably be assumed by You to be confidential or proprietary. Confidential Information includes the Software. Confidential Information does not include any information that You can prove: (a) was already known to You without restrictions at the time of its disclosure by Tenable; (b) after its disclosure by Tenable, is made known to You without restrictions by a third party having the right to do so; (c) is or becomes publicly known without violation of this Agreement; or (d) is independently developed by You without reference to the Confidential Information. Confidential Information will remain the property of Tenable, and You will not be deemed by virtue of this Agreement or any access to the Confidential Information to have acquired any right, title or interest in or to the Confidential Information. You may not copy any Confidential Information without Tenable's prior written permission. You may not remove any copyright, trademark, proprietary rights or other notices included in or affixed to any Confidential Information. You may not use the Confidential Information for Your or a third party's benefit, competitive development or any other purpose. You agree: (I) to hold the Confidential Information in strict confidence; (II) to limit disclosure of the Confidential Information to Your own employees having a need to know the Confidential Information for the purposes of this Agreement; (III) not to disclose any Confidential Information to any third party; (IV) to use the Confidential Information solely and exclusively in accordance with the terms of this Agreement in order to carry out Your obligations and exercise Your rights under this Agreement; (V) to afford the Confidential Information at least the same level of protection against unauthorized disclosure or use as You normally uses to protect Your own information of a similar character, but in no event less than reasonable care; and (VI) to notify Tenable promptly of any unauthorized use or disclosure of the Confidential Information and to cooperate with and assist Tenable in every reasonable way to stop or minimize such unauthorized use or disclosure. You agree that if a court of competent jurisdiction determines that You have breached, or attempted or threatened to breach, Your confidentiality obligations to Tenable or Tenable's proprietary rights, money damages, Tenable will suffer irreparable harm and that monetary damages will be inadequate to compensate Tenable for such breach. Accordingly, Tenable, in addition to and not in lieu of any other rights, remedies or damages available to it at law or in equity, shall be entitled to seek appropriate injunctive relief and other measures restraining further attempted or threatened breaches of such obligations without requirement to post any bond.
8. Warranty and Disclaimer.
(a) Software. Tenable warrants that, for a period of thirty (30) days from the Effective Date (the "Warranty Period"), the unmodified Software will, under normal use, substantially perform the functions described in its technical documentation. If there has been a breach of this warranty, then Tenable's sole obligation, and Your exclusive remedy, will be for Tenable, at its option, to correct the performance of the Software at no charge so that it substantially performs the functions described in its technical documentation or to replace the Software. You acknowledge that, because the license for the Software is at no charge, the remedies described in the preceding sentence are sufficient and can not fail of their essential purpose.
(b) Disclaimer. EXCEPT AS SPECIFICALLY SET FORTH IN SECTION 8(a), TENABLE DOES NOT MAKE ANY WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING ANY WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, INTEGRATION, PERFORMANCE AND ACCURACY, AND ANY IMPLIED WARRANTIES ARISING FROM STATUTE, COURSE OF DEALING, COURSE OF PERFORMANCE OR USAGE OF TRADE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION, OR MODIFICATION UNDER APPLICABLE LAW. TENABLE MAKES NO WARRANTY THAT THE SOFTWARE WILL OPERATE ERROR-FREE, FREE OF ANY SECURITY DEFECTS OR IN AN UNINTERRUPTED MANNER.
9. Exclusion Damages.
UNDER NO CIRCUMSTANCES WILL TENABLE BE LIABLE TO YOU OR ANY OTHER PERSON OR ENTITY FOR DIRECT (INCLUDING FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF CONTRACT, MISREPRESENTATION AND OTHER CONTRACT OR TORT CLAIMS), INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, EXEMPLARY OR PUNITIVE DAMAGES (INCLUDING NEGLIGENCE, STRICT LIABILITY, BREACH OF CONTRACT, MISREPRESENTATION AND OTHER CONTRACT OR TORT CLAIMS; LOST PROFITS; OR ANY DAMAGES RESULTING FROM LOSS OF DATA, SECURITY BREACH, PROPERTY DAMAGE, LOSS OF REVENUE, LOSS OF BUSINESS OR LOST SAVINGS), ARISING OUT OF OR IN CONNECTION WITH THIS AGREEMENT, THE PERFORMANCE OF THE SOFTWARE OR OF ANY OTHER OBLIGATIONS RELATING TO THIS AGREEMENT, WHETHER OR NOT TENABLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU ARE SOLELY RESPONSIBLE AND LIABLE FOR VERIFYING THE SECURITY, ACCURACY AND ADEQUACY OF ANY OUTPUT FROM THE SOFTWARE, AND FOR ANY RELIANCE THEREON.
10. Additional Provisions Regarding Liability.
The parties agree that the foregoing limitations will not be read so as to limit any liability to an extent that would not be permitted under applicable law and specifically will not limit any liability for gross negligence, intentional tortious or unlawful conduct or damages for strict liability that may not be limited by law.
11. Indemnification.
Each of the parties acknowledges and agrees that by entering into and performing its obligations under this Agreement, Tenable will not assume and should not be exposed to the business and operational risks associated with Your business. You acknowledge that Your use of the Software is only a portion of Your overall security solution and that Tenable is not responsible for Your overall security solution. As between You and Tenable, You are (and Tenable is not) responsible for the success or failure of such security solution. Accordingly, You agree that you will, at your expense, indemnify, defend and hold Tenable harmless in all claims and actions that seek compensation of any kind for injury or death to persons and/or for damage to property, and that arise out of or relate to Your security solutions or Your use of the Software or the solutions You provide to a third party through Your use of the Software. You also agree to pay all settlements, costs, damages, legal fees and expenses finally awarded in all such claims and actions.
12. Legal Compliance; Restricted Rights.
The Software are provided solely for lawful purposes and use. You are solely responsible for, and agree to perform your obligations in a manner that complies with all applicable national, regional and local laws, statutes, ordinances, regulations, codes and other types of government authority (including those governing export control, unfair competition, anti-discrimination, false advertising, privacy and data protection, and publicity and those identifying and procuring required permits, licenses, approvals, and other consents) ("Laws"). If a charge is made that You are not complying with any such Laws, You will promptly notify Tenable of such charges in writing. Without limiting the foregoing, You agree to comply with all U.S. export Laws and applicable export Laws of Your locality (if You are not in the United States), to ensure that no information or technical data provided pursuant to this Agreement is exported or re-exported directly or indirectly in violation of Law or without first obtaining all required authorizations or licenses. You will, at Your sole cost and expense, obtain and maintain in effect all permits, licenses, approvals and other consents related to Your obligations under this Agreement. You agree, at Your expense, to comply with all foreign exchange and other Laws applicable to You. The Software is licensed subject to Tenable's standard commercial agreement; Software licensed for use by the United States government is provided with "Restricted Rights" only as defined in 48 C.F.R. _52.227-14 and 48 C.F.R. _252.227-7014 if the commercial terms are deemed not to apply.
13. Termination.
(a) You may terminate this Agreement at any time by destroying or returning to Tenable the Software, together with all copies, modifications and merged portions of the Software in any form.
(b) This Agreement and Your License to use the Software shall terminate automatically if You fail to comply with any term or condition of this Agreement. Immediately after termination of this Agreement, You shall destroy or return to Tenable the Software, together with all copies, modifications and merged portions of the Software in any form, and shall certify to Tenable in writing that through Your best efforts and to the best of your knowledge all such materials have been destroyed or returned to Tenable and removed from host computers on which Software resided.
14. Governing Law.
This Agreement shall be governed in all respects by the laws of the State of Maryland, USA, without regard to choice-of-law rules or principles. You expressly agree with Tenable that this Agreement shall not be governed by the U.N. Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.
15. Dispute Resolution.
You and Tenable submit to the exclusive jurisdiction of the courts of Howard County, Maryland and the United States District Court for Maryland, Baltimore Division, for any question or dispute arising out of or relating to this Agreement. Due to the high costs and time involved in commercial litigation before a jury, the parties waive all right to a jury trial with respect to any and all issues in any action or proceeding arising out of or related to this Agreement.
16. Notices.
Any notices or other communication required or permitted to be made or given by either Party pursuant to this Agreement will be in writing, in English, and will be deemed to have been duly given when delivered if delivered personally or sent by recognized overnight express courier, to the address specified herein or such other address as Tenable may specify in writing. All notices to Tenable shall be sent to the attention of the Legal Department (unless otherwise specified by Tenable).
All notices shall be sent to:
Tenable Network Security
8830 Stanford Boulevard, Suite 312
Columbia, MD 21045
Attn: Legal Department
17. Transfer and Assignment.
You may not rent, lease, lend, sublicense or otherwise provide the Software to any third party. You may not assign or otherwise transfer this Agreement without Tenable's prior written consent. You may use the Software to provide services to third parties as expressly provided in this Agreement.
18. Publicity.
You will not use Tenable's company name or any trademarks, logos, service marks or other intellectual property, or refer to Tenable or any of its employees, in any form of advertising, publicity or release without the prior written approval of Tenable, which Tenable may withhold in its sole discretion.
19. Language.
The language of this Agreement is English and all notices given under this Agreement must be in English to be effective. No translation, if any, of this Agreement or any notice will be of any effect in the interpretation of this Agreement or in determining the intent of the parties. The parties have expressly agreed that all invoices and related documents be drafted in English.
20. Third Parties.
This Agreement is not intended nor will it be interpreted to confer any benefit, right or privilege in any person or entity not a party to this Agreement. Any party who is not a party to this Agreement has no right under any Law to enforce any term of this Agreement.
21. Trademarks.
Nessus is a trademark of Tenable. Tenable does not grant to You, either expressly or by implication, any license or permission under this Agreement to use any of the Tenable marks (including trademarks, service marks, trade names, trade dress, symbols, logos, designs, domain names, slogans and other source identifiers) (collectively, the "Marks").
22. General.
This Agreement constitutes the entire agreement between the parties, and supersedes all other prior or contemporaneous communications between the parties (whether written or oral) relating to the subject matter of this Agreement. No supplement, modification or amendment of this Agreement shall be binding, unless executed in writing by a duly authorized representative of each party to this Agreement. The provisions of this Agreement will be deemed severable, and the unenforceability of any one or more provisions will not affect the enforceability of any other provisions. In addition, if any provision of this Agreement, for any reason, is declared to be unenforceable, the parties will substitute an enforceable provision that, to the maximum extent possible under applicable law, preserves the original intentions and economic positions of the parties. No failure or delay by a party in exercising any right, power or remedy will operate as a waiver of that right, power or remedy, and no waiver will be effective unless it is in writing and signed by the waiving party. If a party waives any right, power or remedy, the waiver will not waive any successive or other right, power or remedy the party may have under this Agreement. Any provision of this Agreement that imposes or contemplates continuing obligations on a party will survive the expiration or termination of this Agreement. "Including" and its derivatives (such as "include" and "includes") mean including without limitation; this term is as defined, whether or not capitalized in this Agreement.
EXHIBIT A
TENABLE NETWORK SECURITY, INC.
SUBSCRIPTION AGREEMENT
This is a legal agreement ("Subscription Agreement") between Tenable Network Security, Inc., a Delaware corporation having offices at 8830 Stanford Boulevard, Suite 312, Columbia, MD 21045 ("Tenable"), and you, the party downloading the Plugins as defined below ("You"), through Tenable's Subscription service as defined below. This Subscription Agreement covers your permitted use of the Plugins. BY CLICKING BELOW YOU INDICATE YOUR ACCEPTANCE OF THIS SUBSCRIPTION AGREEMENT AND YOU ACKNOWLEDGE THAT YOU HAVE READ ALL OF THE TERMS AND CONDITIONS OF THIS SUBSCRIPTION AGREEMENT, UNDERSTAND THEM, AND AGREE TO BE LEGALLY BOUND BY THEM. If You do not agree with the terms of this Subscription Agreement, You may not use the Plugins as defined below. The Plugins can only be provided to You by Tenable.
1) Grant of Plugins License.
i) Grant. Subject to the terms and conditions, and your acceptance, of this Subscription Agreement, Tenable grants to You a perpetual, non-exclusive, non-transferable license (the "License") in object code form only to use the Plugins (a) solely for Your internal operations and internal security purposes to seek and assess information technology vulnerabilities events for Your own networks; and (b) to provide services to third parties to seek and assess information technology vulnerabilities events on the third party's network. Any rights in the Plugins not granted in this Subscription Agreement are expressly reserved by Tenable.
ii) Definition of Plugins. The term "Plugins" means (i) any plugins (and related updates) that are marked as copyrighted by Tenable. Any plugins or components that are not marked as copyrighted by Tenable are not Plugins as defined under this Subscription Agreement and are subject to other license terms.
iii) Use. You agree to use the Plugins only in conjunction with Nessus or NeWT vulnerability scanner programs obtained directly from www.nessus.org or www.tenablesecurity.com and registered with Tenable ("Registered Scanners") and for which You have paid the applicable fee, if any. Your use of the Plugins will be in accordance with one of the Subscriptions described in Section 2 below.
2) Subscriptions.
i) General. The Registered Feed Subscription and Direct Feed Subscription include vulnerability detection programs not developed by Tenable or its licensors, which are licensed to You under separate agreements. The terms and conditions of this Subscription Agreement do not apply to such vulnerability detection programs.
ii) Registered Feed Subscription. The Registered Feed Subscription permits You to use the Plugins in conjunction with Registered Scanners to detect vulnerabilities only on your system or network or on the system or network of a third party for which you perform scanning services, auditing services, incident response services, vulnerability assessment services or other security consulting services.
iii) Direct Feed Subscription. The Direct Feed Subscription permits You to use the Plugins in conjunction with Registered Scanners to detect vulnerabilities only on your system or network or on the system or network of a third party for which you perform scanning services, auditing services, incident response services, vulnerability assessment services or other security consulting services; provided that You have paid the applicable annual subscription fee for each Registered Scanner in conjunction with which You will use the Plugins. You will receive the Direct Feed Subscription and email support if you use this Direct Feed Subscription with the Supported commercial version of Nessus (for clarification, a commercial version of Nessus means Nessus version 3 or better which was developed, copyrighted and distributed by Tenable and not released as open source or licensed under the GPL). The term "Supported" means the list of Operating System distribution(s) included in the Plugin FAQ or Nessus FAQ found on any Tenable website, including www.nessus.org. For the Direct Feed Subscription, You agree to pay a subscription fee to Tenable for each system on which you have installed a Registered Scanner.
3) Term.
This Subscription Agreement commences on the date on which You execute this Subscription Agreement or download, install or use the Plugins (whichever occurs first) (the "Effective Date") and continues until it is terminated according to the terms of this Subscription Agreement.
4) Intellectual Property.
This Subscription Agreement does not transfer to You any title to or any ownership right or interest in the Plugins. You acknowledge that Tenable owns and retains all right, title and interest in and to the Plugins. All enhancements, modifications and derivative works that Tenable makes to the Plugins or accompanying documentation, and all intellectual property rights therein, will be the property of Tenable. Your rights with respect to the Plugins are limited to the right to use the Plugins pursuant to the terms and conditions in this Subscription Agreement.
5) No Reverse Engineering, Other Restrictions.
You may not directly or indirectly: (i) sell, lease, redistribute or transfer any of the Plugins on a stand-alone basis; (ii) decompile, disassemble, reverse engineer, or otherwise attempt to derive, obtain or modify the source code of the Plugins; (iii) reproduce, modify, translate or create derivative works of all or part any of the Plugins; (iv) rent, lease or loan the Plugins in any form to any third party or otherwise allow a third party to use the Plugins; or (v) remove, alter or obscure any proprietary notice, labels, or marks on the Plugins. You may not sublicense any of the rights granted to You in this Subscription Agreement. You may not distribute or otherwise provide Plugins to third parties. You are responsible for all use of the Plugins and for compliance with this Subscription Agreement; any breach by You or any user using the Plugins on Your behalf shall be deemed to have been made by You.
6) Restrictions on Third Party Use and Access.
You agree not to deliver or otherwise make available the Plugins, in whole or in part, to any party other than Tenable, except for purposes specifically related to Your use of the Plugins without Tenable's prior written consent. You agree to use Your best efforts and to take all reasonable steps to ensure that no unauthorized parties have access to the Plugins and that no unauthorized copy, publication, disclosure or distribution of the Plugins, in whole or in part, in any form is made by You or any third party. You agree to notify Tenable of any unauthorized access to, or use, copying, publication, disclosure or distribution of the Plugins. You acknowledge that the Plugins contains valuable confidential information and trade secrets of Tenable or its affiliates and their licensors or suppliers, and that unauthorized access to, or use, copying, publication, disclosure or distribution of the Plugins is harmful to Tenable or its affiliates and their licensors or suppliers.
7) Confidentiality.
As used in this Subscription Agreement, "Confidential Information" means any and all information and material that: (i) gives of Tenable some competitive business advantage or the opportunity of obtaining such advantage or is otherwise confidential or a trade secret; (ii) is marked "Confidential," "Restricted," or "Confidential Information" or other similar marking; (iii) is known by You to be confidential or proprietary; or (iv) from all the relevant circumstances, should reasonably be assumed by You to be confidential or proprietary. Confidential Information includes the Plugins and Subscriptions. Confidential Information does not include any information that You can prove: (a) was already known to You without restrictions at the time of its disclosure by Tenable; (b) after its disclosure by Tenable, is made known to You without restrictions by a third party having the right to do so; (c) is or becomes publicly known without violation of this Subscription Agreement; or (d) is independently developed by You without reference to the Confidential Information. Confidential Information will remain the property of Tenable, and You will not be deemed by virtue of this Subscription Agreement or any access to the Confidential Information to have acquired any right, title or interest in or to the Confidential Information. You may not copy any Confidential Information without Tenable's prior written permission. You may not remove any copyright, trademark, proprietary rights or other notices included in or affixed to any Confidential Information. You may not use the Confidential Information for Your or a third party's benefit, competitive development or any other purpose. You agree: (I) to hold the Confidential Information in strict confidence; (II) to limit disclosure of the Confidential Information to Your own employees having a need to know the Confidential Information for the purposes of this Subscription Agreement; (III) not to disclose any Confidential Information to any third party; (IV) to use the Confidential Information solely and exclusively in accordance with the terms of this Subscription Agreement in order to carry out Your obligations and exercise Your rights under this Subscription Agreement; (V) to afford the Confidential Information at least the same level of protection against unauthorized disclosure or use as You normally uses to protect Your own information of a similar character, but in no event less than reasonable care; and (VI) to notify Tenable promptly of any unauthorized use or disclosure of the Confidential Information and to cooperate with and assist Tenable in every reasonable way to stop or minimize such unauthorized use or disclosure. You agree that if a court of competent jurisdiction determines that You have breached, or attempted or threatened to breach, Your confidentiality obligations to Tenable or Tenable's proprietary rights, money damages, Tenable will suffer irreparable harm and that monetary damages will be inadequate to compensate Tenable for such breach. Accordingly, Tenable, in addition to and not in lieu of any other rights, remedies or damages available to it at law or in equity, shall be entitled to seek appropriate injunctive relief and other measures restraining further attempted or threatened breaches of such obligations without requirement to post any bond.
8) Disclaimer of Warranties.
YOU EXPRESSLY AGREE THAT USE OF THE PLUGINS AND THE SUBSCRIPTIONS ARE AT YOUR SOLE RISK. THE SUBSCRIPTONS ARE AVAILABLE STRICTLY ON AN "AS IS" AND "AS AVAILABLE" BASIS. TENABLE DOES NOT MAKE ANY WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING ANY WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, INTEGRATION, PERFORMANCE AND ACCURACY, AND ANY IMPLIED WARRANTIES ARISING FROM STATUTE, COURSE OF DEALING, COURSE OF PERFORMANCE OR USAGE OF TRADE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION, OR MODIFICATION UNDER APPLICABLE LAW. TENABLE MAKES NO WARRANTY THAT THE PLUGINS OR SUBSCRIPTIONS WILL OPERATE ERROR-FREE, FREE OF ANY SECURITY DEFECTS OR IN AN UNINTERRUPTED MANNER.
9) Limitation of Liability.
IF YOU SHOULD BECOME ENTITLED TO CLAIM DAMAGES FROM TENABLE (INCLUDING FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF CONTRACT, MISREPRESENTATION AND OTHER CONTRACT OR TORT CLAIMS) TENABLE WILL BE LIABLE ONLY FOR THE AMOUNT OF YOUR ACTUAL DIRECT DAMAGES, NOT TO EXCEED (IN THE AGGREGATE FOR ALL CLAIMS) THE FEES, IF ANY, YOU PAID TO TENABLE
10) Exclusion of Other Damages.
UNDER NO CIRCUMSTANCES WILL TENABLE BE LIABLE TO YOU OR ANY OTHER PERSON OR ENTITY FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, EXEMPLARY OR PUNITIVE DAMAGES (INCLUDING NEGLIGENCE, STRICT LIABILITY, BREACH OF CONTRACT, MISREPRESENTATION AND OTHER CONTRACT OR TORT CLAIMS; LOST PROFITS; OR ANY DAMAGES RESULTING FROM LOSS OF DATA, SECURITY BREACH, PROPERTY DAMAGE, LOSS OF REVENUE, LOSS OF BUSINESS OR LOST SAVINGS), ARISING OUT OF OR IN CONNECTION WITH THIS SUBSCRIPTION AGREEMENT, THE PERFORMANCE OF THE PLUGINS OR SUBSCRIPTIONS OR OF ANY OTHER OBLIGATIONS RELATING TO THIS SUBSCRIPTION AGREEMENT, WHETHER OR NOT TENABLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU ARE SOLELY RESPONSIBLE AND LIABLE FOR VERIFYING THE SECURITY, ACCURACY AND ADEQUACY OF ANY OUTPUT FROM THE PLUGINS AND SUBSCRIPTIONS, AND FOR ANY RELIANCE THEREON.
11) Additional Provisions Regarding Liability.
The parties agree that the foregoing limitations will not be read so as to limit any liability to an extent that would not be permitted under applicable law and specifically will not limit any liability for gross negligence, intentional tortious or unlawful conduct or damages for strict liability that may not be limited by law.
12) Indemnification.
Each of the parties acknowledges and agrees that by entering into and performing its obligations under this Subscription Agreement, Tenable will not assume and should not be exposed to the business and operational risks associated with Your business. You acknowledge that Your use of the Plugins and Subscriptions is only a portion of Your overall security solution and that Tenable is not responsible for Your overall security solution. As between You and Tenable, You are (and Tenable is not) responsible for the success or failure of such security solution. Accordingly, You agree that you will, at your expense, indemnify, defend and hold Tenable harmless in all claims and actions that seek compensation of any kind for injury or death to persons and/or for damage to property, and that arise out of or relate to Your security solutions or Your use of the Plugins and Subscriptions, or the solutions You provide to a third party through Your use of the Plugins and Subscriptions. You also agree to pay all settlements, costs, damages, legal fees and expenses finally awarded in all such claims and actions.
13) Your Payment Obligations.
If You obtain a Direct Feed Subscription, You agree to pay any and all amounts due or incurred by You as specified in the invoice provided by Tenable in consideration for Your obtaining such Direct Feed Subscription (the "Fees"). Payment is due within thirty (30) days of the date of invoice. You agree to pay directly or reimburse Tenable for any taxes (including, sales or excise taxes, value added taxes, landing fees, import duties and the like), however designated and whether foreign or domestic, arising out of this Agreement, imposed on the Plugins or the use thereof, or Tenable's performance under this Agreement. You agree to pay Tenable's invoices without deducting any present or future taxes, withholdings or other charges except those deductions it is legally required to make. If You are legally required to make any deductions, You agree to pay Tenable such amounts as are necessary to make the net amounts remaining after such deductions equal to the stated amount due under this Agreement. The payments or reimbursements will be in such amounts as are sufficient to relieve Tenable from owing any further taxes, either directly or on the basis of the payments made under this Agreement. Notwithstanding the foregoing, Tenable will be solely responsible for its income tax obligations and all employer reporting and payment obligations with respect to its personnel. You agree to pay any interest and penalties imposed by any taxing authorities to the extent such interest and penalties are applicable to taxes not paid at Your request or as a result of reliance by Tenable on Your representations. If a certificate of exemption or similar document or proceeding is necessary in order to exempt any transaction from a tax, You will obtain such certificate or document.
14) Legal Compliance; Restricted Rights.
The Plugins and Subscriptions are provided solely for lawful purposes and use. You are solely responsible for, and agree to perform your obligations in a manner that complies with all applicable national, regional and local laws, statutes, ordinances, regulations, codes and other types of government authority (including those governing export control, unfair competition, anti-discrimination, false advertising, privacy and data protection, and publicity and those identifying and procuring required permits, licenses, approvals, and other consents) ("Laws"). If a charge is made that You are not complying with any such Laws, You will promptly notify Tenable of such charges in writing. Without limiting the foregoing, You agree to comply with all U.S. export Laws and applicable export Laws of Your locality (if You are not in the United States), to ensure that no information or technical data provided pursuant to this Subscription Agreement is exported or re-exported directly or indirectly in violation of Law or without first obtaining all required authorizations or licenses. You will, at Your sole cost and expense, obtain and maintain in effect all permits, licenses, approvals and other consents related to Your obligations under this Subscription Agreement. You agree, at Your expense, to comply with all foreign exchange and other Laws applicable to You. The Plugins is licensed subject to Tenable's standard commercial agreement; Plugins licensed for use by the United States government is provided with "Restricted Rights" only as defined in 48 C.F.R. _52.227-14 and 48 C.F.R. _252.227-7014 if the commercial terms are deemed not to apply.
15) Termination.
i) You may terminate this Subscription Agreement at any time by destroying or returning to Tenable the Plugins, together with all copies, modifications and merged portions of the Plugins in any form.
ii) This Subscription Agreement and Your License to use the Plugins and Subscriptions shall terminate automatically if You fail to comply with any term or condition of this Subscription Agreement or if the Nessus Software License Agreement between You and Tenable terminates. Immediately after termination of this Subscription Agreement, You shall destroy or return to Tenable the Plugins, together with all copies, modifications and merged portions of the Plugins in any form, and shall certify to Tenable in writing that through Your best efforts and to the best of your knowledge all such materials have been destroyed or returned to Tenable and removed from host computers on which Plugins resided.
16) Governing Law.
This Subscription Agreement shall be governed in all respects by the laws of the State of Maryland, USA, without regard to choice-of-law rules or principles. You expressly agree with Tenable that this Subscription Agreement shall not be governed by the U.N. Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.
17) Dispute Resolution.
You and Tenable submit to the exclusive jurisdiction of the courts of Howard County, Maryland and the United States District Court for Maryland, Baltimore Division, for any question or dispute arising out of or relating to this Subscription Agreement. Due to the high costs and time involved in commercial litigation before a jury, the parties waive all right to a jury trial with respect to any and all issues in any action or proceeding arising out of or related to this Subscription Agreement.
18) Notices.
Any notices or other communication required or permitted to be made or given by either Party pursuant to this Subscription Agreement will be in writing, in English, and will be deemed to have been duly given when delivered if delivered personally or sent by recognized overnight express courier, to the address specified herein or such other address as Tenable may specify in writing. All notices to Tenable shall be sent to the attention of the Legal Department (unless otherwise specified by Tenable).
All notices shall be sent to:
Tenable Network Security
8830 Stanford Boulevard, Suite 312
Columbia, MD 21045
Attn: Legal Department
19) Transfer and Assignment.
You may not rent, lease, lend, sublicense or otherwise provide the Plugins to any third party. You may not assign or otherwise transfer this Subscription Agreement without Tenable's prior written consent. You may use the Plugins and Subscriptions to provide services to third parties as expressly provided in this Subscription Agreement.
20) Publicity.
You will not use Tenable's company name or any trademarks, logos, service marks or other intellectual property, or refer to Tenable or any of its employees, in any form of advertising, publicity or release without the prior written approval of Tenable, which Tenable may withhold in its sole discretion.
21) Language.
The language of this Subscription Agreement is English and all notices given under this Subscription Agreement must be in English to be effective. No translation, if any, of this Subscription Agreement or any notice will be of any effect in the interpretation of this Subscription Agreement or in determining the intent of the parties. The parties have expressly agreed that all invoices and related documents be drafted in English.
22) Third Parties.
This Subscription Agreement is not intended nor will it be interpreted to confer any benefit, right or privilege in any person or entity not a party to this Subscription Agreement. Any party who is not a party to this Subscription Agreement has no right under any Law to enforce any term of this Subscription Agreement.
23) Trademarks.
Nessus is a trademark of Tenable. Tenable does not grant to You, either expressly or by implication, any license or permission under this Subscription Agreement to use any of the Tenable marks (including trademarks, service marks, trade names, trade dress, symbols, logos, designs, domain names, slogans and other source identifiers) (collectively, the "Marks").
24) General.
This Subscription Agreement constitutes the entire agreement between the parties, and supersedes all other prior or contemporaneous communications between the parties (whether written or oral) relating to the subject matter of this Subscription Agreement. No supplement, modification or amendment of this Subscription Agreement shall be binding, unless executed in writing by a duly authorized representative of each party to this Subscription Agreement. The provisions of this Subscription Agreement will be deemed severable, and the unenforceability of any one or more provisions will not affect the enforceability of any other provisions. In addition, if any provision of this Subscription Agreement, for any reason, is declared to be unenforceable, the parties will substitute an enforceable provision that, to the maximum extent possible under applicable law, preserves the original intentions and economic positions of the parties. No failure or delay by a party in exercising any right, power or remedy will operate as a waiver of that right, power or remedy, and no waiver will be effective unless it is in writing and signed by the waiving party. If a party waives any right, power or remedy, the waiver will not waive any successive or other right, power or remedy the party may have under this Subscription Agreement. Any provision of this Subscription Agreement that imposes or contemplates continuing obligations on a party will survive the expiration or termination of this Subscription Agreement. "Including" and its derivatives (such as "include" and "includes") mean including without limitation; this term is as defined, whether or not capitalized in this Subscription Agreement.

@ -0,0 +1,641 @@
TENABLE MASTER AGREEMENT
This Master Agreement (this “Agreement”) is made by and between Tenable (as defined below) and the customer licensing Products
and/or receiving services (“Customer”) with an effective date as of the date Customer clicks to accept this Agreement (the “Effective
Date”). Hereinafter, each of Tenable and Customer may be referred to collectively as the “Parties” or individually as a “Party”.
1. Definitions.
(a) “Affiliate” means any entity that controls, is controlled by, or is under common control with a Party. “Control” shall mean:
(1) ownership (either directly or indirectly) of greater than fifty percent (50%) of the voting equity or other controlling equity of another
entity; or (2) power of one entity to direct the management or policies of another entity, by contract or otherwise.
(b) “Documentation” means the then-current official user manuals and/or documentation for the Products available at
docs.tenable.com (or a successor location).
(c) “Hosted Services” are a type of service offered through Tenables cloud-based software as a service (SaaS) platform and
include Scans and access to and use of the hosted environment (the “Hosted Environment”).
(d) “Product(s)” means any of the products that Tenable offers, including Software, Hosted Services, Hardware (if any),
Support Services and Professional Services.
(e) “Professional Services” means services purchased, including consulting services which are relevant to the implementation
and configurations of Tenable Products as well as on-site or virtual training courses. Generally, Professional Services are defined either
in a separate SOW or a Services Brief. Professional Services do not include the Hosted Services or Support Services.
(f) “Scan(s)” are a function performed by the Software and/or the Hosted Services on Scan Targets, which are conducted in
order to provide data to Customer regarding its network security. “PCI Scans” are a specific type of Scan designed to assess compliance
with the Payment Card Industry Data Security Standard. “Scan Data” is the resulting information created by the Scan. “Scan Target(s)”
are the targets or subjects of a Scan.
(g) “Services Brief” means the document which outlines Tenables basic, pre-packaged installation or training Professional
Services offered under a Tenable SKU and which do not require a separate SOW. Current versions of Services Briefs may be found at
http://static.tenable.com/prod_docs/tenable_slas.html (or a successor location). For the avoidance of doubt, Customer may purchase
commercial off the shelf SKU-based Professional Services without executing a separate Statement of Work. A “SOW” or “Statement
of Work” shall further describe Professional Services, the terms of which may be customized and which shall require execution by the
Customer.
(h) “Software” means each software product made available by Tenable under this Agreement for download. Software
includes patches, updates, improvements, additions, enhancements and other modifications or revised versions of the same that may be
provided to Customer by Tenable from time to time.
(i) “Technical Data” means data Customer uploads or runs through or on the Products, or is otherwise generated thereby,
including information regarding licensing metrics and product behavioral data.
(j) “Tenable” means: (i) Tenable, Inc., if Customer is a commercial entity or individual located in North or South America
(Tenable, Inc. is a Delaware corporation having offices at 6100 Merriweather Drive, 12th Floor, Columbia, MD 21044); (ii) Tenable
Public Sector LLC, if Customer is an agency or instrumentality of the United States Government, a commercial entity operating
predominantly as a federal systems integrator for eventual sale or resale or for the benefit of the United States Government, or an agency
or instrumentality of a State or local government within the United States (Tenable Public Sector LLC is a Delaware limited liability
company having offices at 6100 Merriweather Drive, 12 th Floor, Columbia, MD 21044); or (iii) Tenable Network Security Ireland
Limited, if Customer is located outside of North or South America (Tenable Network Security Ireland Limited is a private limited
company having offices at 81b Campshires, Sir John Rogersons Quay, Dublin 2, Ireland).
2. Orders and Transactions.
(a) Reseller Transactions. If Customer purchases Tenable Products through an authorized Tenable reseller (a “Reseller”), all
terms related to pricing, billing, invoicing and payment (“Payment Terms”) set forth in this Agreement (if any) shall not apply. For the
avoidance of doubt, all such Payment Terms shall be as agreed to between Customer and Reseller. To place an order, Customer shall
provide the Reseller with a purchase order (or other similar document acceptable to Reseller) in response to a valid quote from such
Reseller. Following Resellers receipt of such purchase order, Tenable shall issue a sales order confirmation or other similar order
acceptance document (the “Ordering Document”). No order shall be deemed accepted by Tenable until Tenable issues the Ordering
Document. The Ordering Document shall set forth all Products (and corresponding licensing metrics) purchased by Customer.
(b) Direct Transactions. If the Parties have agreed to transact directly, the following Payment Terms shall apply. Customer
agrees to pay all amounts due as specified in a Tenable invoice. Fees for Hosted Services are charged for access to the Host Environment
(as defined herein), not actual usage. Payment is due within thirty (30) days from the date of Tenables invoice to Customer. Customer
will pay directly or reimburse Tenable for any taxes (including, sales or excise taxes, value added taxes, gross receipt taxes, landing
fees, import duties and the like), however designated and whether foreign or domestic, imposed on or arising out of this Agreement.
Notwithstanding the foregoing, Tenable will be solely responsible for its income tax obligations and all employer reporting and payment
obligations with respect to its personnel. Customer agrees to pay Tenable without deducting any present or future taxes, withholdings
or other charges except those deductions it is legally required to make. If Customer is legally required to make any deductions or
withholding, Customer agrees to provide evidence of such withholding upon request. If a certificate of exemption or similar document
or proceeding is necessary in order to exempt any transaction from a tax, Customer shall provide such certificate or document to Tenable.
(c) Delivery and Installation. Delivery of Tenable Products (“Delivery”) shall be deemed to occur on the date of availability
for electronic download or electronic access. Tenable has no duty to provide installation services for Tenable Products unless installation
services are purchased separately.
3. Term and Termination.
(a) Agreement Term. This Agreement shall commence upon the Effective Date and continue until terminated in accordance
with the terms set forth herein.
(b) License Term and Renewals. The “License Term” is the term of the license or subscription for Products as set forth in the
Ordering Document. If this Agreement has been signed by both Parties, then unless otherwise agreed to in writing, any License Term,
including renewals, shall be governed by the terms set forth herein. If this Agreement has been accepted via shrinkwrap or clickthrough,
upon any renewal of the License Term, the terms then available at http://static.tenable.com/prod_docs/tenable_slas.html (or a
successor location) will govern such renewal. Customer agrees that use of the Products at the time of such renewal will be deemed full
and adequate acceptance of the updated terms.
(c) Termination for Cause. Either Party may terminate this Agreement for cause if the other Party materially breaches this
Agreement provided that such breaching Party has received written notice of such breach and failed to cure such breach within thirty
(30) days. If this Agreement is terminated for cause by either Party, Customer shall remove all copies of the Products from any Customer
systems and cease to use any Software or Hosted Services purchased hereunder. Further, Customer shall certify to Tenable that it has
returned or destroyed all copies of the Software. If this Agreement is terminated for cause by Tenable, Customer shall remain responsible
for any outstanding payment obligations throughout the rest of the License Term.
(d) Termination for Convenience. Customer may terminate this Agreement for any lawful reason upon ninety (90) days prior
written notice to Tenable. If Customer terminates for convenience, Customer shall not receive a refund and shall remain obligated to
pay for Products for which it has previously entered into a transaction as well as any additional payment obligations agreed upon prior
to the termination date.
4. Products.
(a) Product-Specific Terms. Pursuant to this Agreement, Customer may receive the right to use various Products as further
described in the attached schedules (each, a “Schedule”). Terms related to Customers use of Software are described in Schedule A
(Software). Terms related to Customers use of Hosted Services are described in Schedule B (Hosted Services). Terms related to the
provision of Professional Services are described in Schedule C (Professional Services). For each Product, Customer will have the right
to use the corresponding Documentation.
(b) Licensing Model. Product licenses shall be in accordance with the terms of the applicable licensing model as set forth in
the Documentation and/or the Ordering Document, which may include limitations on Scan Targets, compute, storage, resource
utilization, License Term, the number of users, seats, licenses and/or types of modules licensed. Product licenses shall commence upon
Delivery and shall be either perpetual or subscription in nature. Tenable shall use commercially reasonable efforts to meter resource
utilization and assess likeness or uniqueness of Scan Targets within each Product/module licensed. If Customer exceeds the license
restrictions, Customer must purchase an upgraded license to allow for all actual or additional usage, and Tenable or its Reseller may
promptly invoice Customer for any such overages at a price not to exceed Tenables then-current rates. Discrepancies in Scan Target
or utilization count is the sole responsibility of the Customer to resolve.
(c) Restrictions on Use. Customer shall not directly or indirectly: (i) decompile, disassemble, reverse engineer, or otherwise
attempt to derive, obtain or modify the source code of the Products; (ii) reproduce, modify, translate or create derivative works of all or
any part of the Products; (iii) remove, alter or obscure any proprietary notice, labels, or marks on the Products; (iv) without Tenables
prior written consent, use the Products in a service bureau, application service provider or similar capacity; (v) without signing Tenables
Managed Security Services Provider Addendum, use the Products to provide any managed service to a third party; (vi) use the Products
in order to create competitive analysis or a competitive product or service; (vii) copy any ideas, features, functions or graphics in the
Product; or (viii) without Tenables prior written consent, interfere with or disrupt performance of Hosted Services (e.g., perform
penetration testing on Tenable systems). Customer may only use the Products to manage or gather information from Scan Targets
owned or hosted by Customer or its Affiliates, or third parties for which Customer has received express authorization to Scan.
(d) Intellectual Property in Products. This Agreement does not transfer to Customer any title to or any ownership right or
interest in the Products. Any rights in the Products not expressly granted in this Agreement are reserved by Tenable. If Customer
provides Tenable with any comments, suggestions, or other feedback regarding the Product, Customer hereby assigns to Tenable all
right, title and interest in and to such feedback. For clarity, such feedback shall not contain Customer Confidential Information and shall
not reference or identify Customer or its users.
(e) Customer Requirements. In order to use the Products, Customer must meet or exceed the specifications found in the
Documentation.
(f) Product Features. Customer agrees that purchase of any Product is not contingent on the delivery of any future
functionality or features, or dependent on any oral or written public comments made by Tenable regarding future functionality or
features. Tenable reserves the right to withdraw features from future versions of the Products provided that: (i) the core functionality of
the affected Product remains the same; or (ii) Customer is offered access to a product or service providing materially similar functionality
as the functionality removed from the affected Product. The preceding remedies under this Section 4(f) are the sole remedies available
if Tenable withdraws features from the Products.
(g) Rights Granted to Tenable. Provided that Tenable shall not publicly disclose any Customer Confidential Information,
Tenable may: (i) use Technical Data for reasonable business purposes, including Support Services, license validation, research and
development, feature creation, and Product testing; (ii) include aggregated and anonymized Technical Data in public materials; and (iii)
retain Technical Data which is anonymized after the termination of this Agreement.
(h) Hardware. Any Hardware purchased under this Agreement (if any) will be subject to the terms and conditions of Schedule
D located at http://static.tenable.com/prod_docs/tenable_slas.html (or a successor location).
(i) Temporary Limitation. If Tenable reasonably believes: (i) Customers use of the Products places an unreasonable or
disproportionate burden on the Products; (ii) Customers use of the Products poses a risk or threat to the Products (including any systems
supporting the Products), Tenable, or a third party; or (iii) Customers usage exceeds the limitations of the license, then Tenable may
temporarily limit Customers access to or use of the Products or any specific feature therein. Tenable may also suspend or limit access
to the Products if Customer fails to make any payments related to this Agreement. Tenable will, to the extent practical under the
circumstances, use commercially reasonable efforts to provide Customer with prior written notice of any such limitation (email or in
product messaging shall be sufficient). When commercially reasonable, Tenable shall promptly restore access once the Customer has
remediated the issue. For the avoidance of doubt, Customer is responsible for all normal fees during any period for which usage or
access is limited pursuant to this section.
(j) Additional Details on Use Restrictions for Tenable Security Network Ireland Limited. The following shall only apply for
transactions with Tenable Security Network Ireland Limited. Notwithstanding anything in Section 4(c), decompiling the Product is
permitted to the extent the laws of Customers jurisdiction give Customer the right to do so to obtain information necessary to render
the Products interoperable with other software; provided, however, that Customer must first request such information from Tenable and
Tenable may, in its discretion, either provide such information to Customer or impose reasonable conditions, including a reasonable fee,
on such use of the Products to ensure that its proprietary rights in the Product are protected.
5. Support.
(a) Support Services. Tenable shall provide Customer with support services (the “Support Services”) in accordance with
Tenables then-current Technical Support Plans (available at http://static.tenable.com/prod_docs/tenable_slas.html or a successor
location) and consistent with Tenables End of Life and End of Sale definitions contained therein. The Support Services include bug
fixes, updates (including new vulnerability plug-ins), or enhancements that Tenable makes generally available to users of the Products.
The Support Services also include the provision of new minor (Example: 1.1.x to 1.2.x, etc.) and major version releases of the Products
(Example: 1.x to 2.x, etc.).
(b) Support Fees. Standard Support Services for Products licensed for a finite License Term will be provided at no additional
charge beyond the license fee for the duration of the License Term. Support Services for Products licensed on a perpetual basis must
be purchased separately in advance. In all cases, premium support may be purchased at an additional charge. If during the course of a
perpetual license Customer terminates or fails to renew the Support Services, Customer may, at any time during the term of this
Agreement, request that Tenable reinstate the Support Services provided that Customer pays for the lapsed Support Services in an
amount equal to the total fees Customer would have paid for the Support Services between the time Customers Support Services lapsed
and the then-current date.
6. Confidentiality.
(a) Definition. “Confidential Information” means information learned or disclosed by a Party under this Agreement that
should reasonably be assumed to be confidential or proprietary, including the Products and the terms of this Agreement. Confidential
Information will remain the property of the disclosing Party, and the receiving Party will not be deemed by virtue of this Agreement or
any access to the Confidential Information to have acquired any right, title or interest in or to the Confidential Information.
(b) Obligations. Each Party agrees to only use the Confidential Information in connection with this Agreement or a purchase
hereunder. The receiving Party agrees to hold the disclosing Partys Confidential Information confidential using at least the same level
of protection against unauthorized disclosure or use as the receiving Party normally uses to protect its own information of a similar
character, but in no event less than a reasonable degree of care. Each Party may share Confidential Information with its Affiliates or
authorized contractors in the performance of its duties under this Agreement; provided, however, that each Party shall be responsible to
ensure that such Affiliate or authorized contractors are bound by obligations of confidentiality at least as stringent as those set forth in
this Agreement.
(c) Exclusions. Confidential Information shall not include information that: (i) is already known to the receiving Party free of
any confidentiality obligation; (ii) is or becomes publicly known through no wrongful act of the receiving Party; (iii) is rightfully
received by the receiving Party from a third party without any restriction or confidentiality; or (iv) is independently developed by the
receiving Party without reference to the Confidential Information. Confidential Information does not include Scan Data that has been
aggregated or anonymized so that it is not attributable to the disclosing Party. If Customer requests or performs scans on third party
Scan Targets, and such third party inquires with Tenable about the scan, Tenable shall inform Customer and allow Customer to resolve
any disputes with the third party. If Customer fails to contact the third party, Customer agrees that Tenable may provide Customers
business contact information to the owner of the Scan Targets as well as to relevant authorities, and such disclosure shall not be
considered a breach of confidentiality.
(d) Sensitive Information. The Parties agree that Customers disclosure of sensitive, personal information (e.g., social security
numbers, national identity card numbers, personal credit card information, racial or ethnic origin, political opinions, religious or
philosophical beliefs, trade union membership, genetic data, biometric data, and health care data) (“Sensitive Information”) is not
required for Tenable to perform its duties under this Agreement or sell any Products hereunder. If Customer inadvertently or
unintentionally discloses any Sensitive Information to Tenable, Customer shall identify to Tenable that it has disclosed Sensitive
Information and Tenable shall promptly return and/or destroy such Sensitive Information.
(e) Legal Disclosures; Remedies. The receiving Party may disclose Confidential Information if required to do so by law
provided the receiving Party shall promptly notify the disclosing Party so that the disclosing Party may seek any appropriate protective
order and/or take any other action to prevent or limit such disclosure. If required hereunder, the receiving Party shall furnish only that
portion of the Confidential Information disclosure of which is legally required. The receiving Party acknowledges and agrees that the
breach of any term, covenant or provision of this Agreement may cause irreparable harm to the disclosing Party and, accordingly, upon
the threatened or actual breach by the receiving Party of any term, covenant or provision of this Agreement, the disclosing Party shall
be entitled to seek injunctive relief, together with any other remedy available at law or in equity. The receiving Party will notify the
disclosing Party promptly of any unauthorized use or disclosure of the disclosing Partys Confidential Information.
7. Representations and Warranties; Disclaimer.
(a) Warranty of Authority. The Parties hereby represent and warrant that they have the full power and authority to enter into
this Agreement.
(b) Products. Product warranties and associated warranty periods are set forth in the relevant Schedules.
(c) Antivirus Warranty. Tenable represents it has taken commercially reasonable efforts to ensure that the Products, at the
time of Delivery, are free from any known and undisclosed virus, worm, trap door, back door, timer, clock, counter or other limiting
routine, instruction or design that would erase data or programming or otherwise cause the Products to become inoperable or incapable
of being used in the manner for which it was designed or in accordance with the Documentation.
(d) Warranty Disclaimer. EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT AND TO THE GREATEST
EXTENT PERMITTED BY LAW, TENABLE OFFERS ITS PRODUCTS “AS-IS” AND MAKES NO OTHER WARRANTY OF
ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING ANY WARRANTIES OF TITLE,
NONINFRINGEMENT, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, SECURITY, INTEGRATION,
PERFORMANCE AND ACCURACY, AND ANY IMPLIED WARRANTIES ARISING FROM STATUTE, COURSE OF
DEALING, COURSE OF PERFORMANCE OR USAGE OF TRADE. THE WARRANTIES SET FORTH IN THIS AGREEMENT
ARE MADE TO CUSTOMER FOR CUSTOMERS BENEFIT ONLY. CUSTOMERS USE OF THE PRODUCTS IS AT
CUSTOMERS OWN RISK. CUSTOMER UNDERSTANDS THAT ASSESSING NETWORK SECURITY IS A COMPLEX
PROCEDURE, AND TENABLE DOES NOT GUARANTEE THAT THE RESULTS OF THE PRODUCTS WILL BE ERROR-FREE
OR PROVIDE A COMPLETE AND ACCURATE PICTURE OF CUSTOMERS SECURITY FLAWS, AND CUSTOMER AGREES
NOT TO RELY SOLELY ON SUCH PRODUCTS IN DEVELOPING ITS SECURITY STRATEGY. CUSTOMER
ACKNOWLEDGES THAT THE PRODUCTS MAY RESULT IN LOSS OF SERVICE OR HAVE OTHER IMPACTS TO
NETWORKS, ASSETS OR COMPUTERS (INCLUDING MODIFICATION OF SCAN TARGETS), AND CUSTOMER IS SOLELY
RESPONSIBLE FOR ANY DAMAGES RELATING TO SUCH LOSS OR IMPACT.
8. Limitation of Liability.
(a) Direct Damages. The cumulative liability of one Party to the other for all claims arising from or relating to the Products
or this Agreement (including without limitation, any cause of action sounding in contract, tort or strict liability) shall be limited to proven
direct damages in an amount not to exceed, in the aggregate, the fees paid by Customer for the Products over the twelve (12) months
immediately prior to the event giving rise to the claim.
(b) Indirect Damages. Neither Party shall be liable to the other for any indirect, incidental, special, punitive, consequential or
exemplary damages regardless of the nature of the claim. This prohibition on indirect damages shall include, but not be limited to, claims
based on lost profits, cost of delay, any failure of Delivery, business interruption, cost of lost or damaged data, or liabilities to any third
parties even if such Party is advised of the possibility thereof.
(c) Carve Outs. The liability caps set forth in Sections 8(a) and 8(b) shall not apply to damages resulting from:
(i) personal injury or death;
(ii) fraud or willful misconduct;
(iii) indemnification obligations set forth in Section 9 (Indemnification); or
(iv) Customers breach of Section 4(c) (Restrictions on Use).
(d) Limitations; Time Period. Each of the limitations set forth in this Section 8 shall be enforced to the fullest extent of the
law. Any laws preventing such limitations shall only apply to the extent required by law and the remaining unaffected terms shall apply
in full. Unless expressly prohibited by law, each Party shall have a period of no greater than twelve (12) months from the date the cause
of action accrues to bring a claim against the other Party for such cause of action.
9. Indemnification.
(a) Indemnification Obligations.
(i) By Tenable. Tenable shall (at its sole cost and expense): (i) defend and/or settle on behalf of Customer (including
Customers officers, directors, employees, representatives and agents); and (ii) indemnify Customer for, any third party claims brought
against Customer based upon a claim that Customers use of the Products in accordance with this Agreement infringes or misappropriates
such third partys intellectual property rights in a jurisdiction which is signatory to the Berne Convention.
(ii) By Customer. Customer shall (at its sole cost and expense): (i) defend and/or settle on behalf of Tenable (including
Tenables officers, directors, employees, representatives and agents) and (ii) indemnify Tenable for, any third party claims brought
against Tenable arising out of or relating to Customers use of the Products to perform Scans on third party Scan Targets, except to the
extent that any such claim or action is caused by a failure of the Products to materially comply with the Documentation.
(b) In Case of Infringement. If Customers use of the Products is, or in Tenables opinion is likely to be, the subject of an
infringement claim, Tenable may, in its sole discretion and expense: (i) modify or replace the infringing Products as necessary to avoid
infringement, provided that the replacement Products are substantially similar in functionality; (ii) procure the right for Customer to
continue using the infringing Products; or (iii) terminate this Agreement and, upon Customers return or certified destruction of the
infringing Product, provide Customer a pro-rata refund calculated as follows: (x) for infringing Products licensed on a subscription
basis, the refund shall consist of any prepaid but unused fees for the remainder of the applicable License Term; or (y) for infringing
Software licensed on a perpetual basis or infringing Hardware, the refund shall consist of a straight line depreciation of the license fee
based on a three (3) year useful life as well as any prepaid but unused fees for separately charged Support Services. This Section 9 sets
forth Tenables sole and exclusive liability and Customers sole and exclusive remedy with respect to any claim of intellectual property
infringement.
(c) Exclusions. Tenable shall have no liability with respect to a third party intellectual property infringement claim arising out
of: (i) modifications of the Product made by Customer or a party under its control to conform with Customers specifications; (ii)
modifications of the Product made by anyone other than Tenable or a Tenable authorized third party; (iii) Customers use of the Product
in combination with other products or services not provided by Tenable; (iv) Customers failure to use any updated versions of the
Product made available by Tenable; or (v) Customers use of the Product in a manner not permitted by this Agreement or otherwise not
in accordance with the Documentation.
(d) Requirements. The indemnitor shall only be responsible for the indemnification obligations set forth in this Section 9 if
the indemnitee: (i) provides the indemnitor prompt written notice of such action or claim; (ii) gives the indemnitor the right to control
and direct the investigation, defense, and/or settlement of such action or claim; (iii) reasonably cooperates with the indemnitor in the
defense of such a claim (at the indemnitors expense); and (iv) is not in breach of this Agreement. Nothing herein shall prevent the
indemnitee from engaging in defense of any such claim with its own legal representation, provided that this does not materially prejudice
the indemnitors defense. The indemnitor may not settle any claim on behalf of the indemnitee without obtaining the indemnitees prior
written consent; provided, however, the indemnitor shall not be required to obtain consent to settle a claim which settlement consists
solely of: (x) discontinued use of infringing Products and/or (y) the payment of money for which the indemnitor has a duty to indemnify.
10. Legal Compliance.
(a) Generally. The Products are intended solely for lawful purposes and use. Both Parties, and their agents and Affiliates,
agree to perform their respective obligations in an ethical manner that complies with all applicable national, federal, state and local laws,
statutes, ordinances, regulations and codes (“Applicable Laws”) including, without limitation, the Computer Fraud and Abuse Act
(CFAA), 18 USC Sec. 1030, the U.S. Foreign Corrupt Practices Act of 1977, as amended, and the UK Bribery Act of 2010. If Customer
violates this Section 10, Tenable may terminate this Agreement immediately.
(b) Trade Controls. Applicable Laws include U.S. export laws (including the International Traffic in Arms Regulation (ITAR),
22 CFR 120-130, and the Export Administration Regulation (EAR), 15 CFR Parts 730 et seq.) and the anti-boycott rules implemented
by the Departments of Commerce and Treasury. Information regarding export classifications of Tenables Products may be found on
its website (www.tenable.com/export-controls or a successor location). Customer agrees that it will be the exporter of record any time
it causes the Products to be accessed outside the United States or by a national of any country other than the United States. The Parties
further agree to comply with trade and economic sanctions, rules, and regulations of the United States, European Union, EU member
states, United Kingdom and other applicable government authorities and shall not engage in prohibited trade to persons or entities who
are the subject of an active sanction, embargo, or executive order. Customer hereby acknowledges and confirms that Customer
(including Customers officers, directors, employees, representatives and agents): (i) is not included on, owned or controlled by an
individual or entity included on, or acting on behalf of an individual or entity included on any of the restricted party lists maintained by
the U.S. Government (e.g., Specially Designated Nationals List, Foreign Sanctions Evader List, Sectoral Sanctions Identification List,
Denied Persons List, Unverified List, Entity List or List of Statutorily Debarred Parties) (collectively, “Restricted Parties”); (ii) will not
export, re-export, transfer, re-transfer or otherwise ship, directly or indirectly, the Products or related technology to or for use by or for
Restricted Parties; (iii) will not export, re-export, transfer, re-transfer or otherwise ship, directly or indirectly, the Products or related
technology to or for use in, by or for countries or territories subject to U.S. economic sanctions (e.g., Crimea, Cuba, Iran, North Korea,
or Syria); or (iv) will not use or sell the Products for nuclear end-uses, rocket systems, unmanned air vehicles, chemical or biological
weapons, maritime nuclear propulsion, weapons of mass destruction or other restricted end-uses except to the extent consistent with
Trade Control Laws.
(c) Data Processing Addendum. To the extent applicable, if Tenable is processing personal information on behalf of Customer
under any applicable data protection law (e.g., the European Unions General Data Protection Regulation 2016/679), then such
processing shall be in accordance with Tenables Data Processing Addendum located at
http://static.tenable.com/prod_docs/tenable_slas.html (or a successor location).
11. Governing Law; Venue.
(a) For transactions with Tenable, Inc. and Tenable Public Sector LLC, this Agreement shall be governed in all respects by
the laws of the State of Delaware, USA, without regard to choice-of-law rules or principles. The Parties agree that: (i) no aspect or
provision of the Uniform Computer Information Transactions Act shall apply to this Agreement; and (ii) this Agreement shall not be
governed by the U.N. Convention on Contracts for the International Sale of Goods. The Parties hereby submit to the exclusive
jurisdiction of the courts of Howard County, Maryland, and the United States District Court for Maryland, Baltimore Division, for any
question or dispute arising out of or relating to this Agreement. Due to the high costs and time involved in commercial litigation before
a jury, the Parties waive all right to a jury trial with respect to any issues in any action or proceeding arising out of or related to this
Agreement.
(b) For transactions with Tenable Network Security Ireland Limited, this Agreement and any issues, disputes or claims arising
out of or in connection with it (whether contractual or non-contractual in nature such as claims in tort, from breach of statute or regulation
or otherwise) (“Disputes”) shall be governed by, and construed in accordance with, the laws of Ireland. Customer expressly agrees with
Tenable that this Agreement shall not be governed by the U.N. Convention on Contracts for the International Sale of Goods, the
application of which is expressly excluded. All Disputes arising out of or relating to this Agreement shall be subject to arbitration within
the meaning of the Arbitration Act 2010 or any legislation amending or repealing that act and shall be an arbitration conducted in Dublin,
Ireland in the English language and shall be governed by the Arbitration Act 2010. Notwithstanding the foregoing, nothing in this
Agreement shall limit the right of either Party to seek any injunctive, equitable or other interlocutory relief as it may be entitled to in the
Courts of Ireland.
12. Other Legal Clauses.
(a) Third Parties. Customer may permit a third party (“Customers Agent”) to use the Products to perform security services
for and on behalf of Customer but solely for Customers benefit and solely for Customers internal business purposes. Customer shall
be fully responsible for Customers Agents use of the Products, including liability for any breach of this Agreement or use beyond the
licensed quantities set forth in the Ordering Document. If Customer elects to utilize a Customers Agent to perform Scans on its behalf,
then only Customers Agent (and not Customer) will be permitted to contact Tenable Support Services. Tenable shall have the right to
withdraw its consent to the use of any Customers Agent in its reasonable discretion.
(b) Notices. Any legal notices or other communication pursuant to this Agreement must be in writing, in English, and will be
deemed to have been duly given when delivered if delivered personally or sent by recognized overnight express courier. All notices to
Tenable must be sent to the address described in this Agreement to the attention of the Legal Department (unless otherwise specified by
Tenable). All notices Tenable sends to Customer shall be at the physical address referenced in this Agreement (or otherwise provided
to Tenable). Tenable may provide notices with regard to Products via the email address Customer provided during Product registration
and Customer hereby consents to receive such communications from Tenable in an electronic form.
(c) Assignment. Neither Party may assign or otherwise transfer this Agreement without the other Partys prior written consent,
which will not be unreasonably withheld; provided, however, either Party may transfer this Agreement to an Affiliate or in connection
with a merger or sale of all (or substantially all) of the stock or other ownership units of such Party. Customer must complete Tenables
License Assignment Request Form (to be provided upon request) in order to complete assignment of this Agreement.
(d) Force Majeure. With the exception of payment, neither Party shall be liable for any loss or delay (including failure to meet
the service level commitment) resulting from any force majeure event, including, but not limited to, acts of God, fire, natural disaster,
terrorism, labor stoppage, Internet service provider failures or delays, civil unrest, war or military hostilities, or criminal acts of third
parties, and any Delivery date shall be extended to the extent of any resulting delay.
(e) Language. The language of this Agreement is English and all invoices and other documents given under this Agreement
must be in English to be effective. No translation, if any, of this Agreement or any notice will be of any effect in the interpretation of
this Agreement or in determining the intent of the parties. The Parties have expressly agreed that all invoices and related documents be
drafted in English. The following shall apply solely for Agreements which are under French Canadian jurisdiction: Cest la volonté
expresse des parties que la presente convention ainsi que les documents qui sy rattacent soient rediges en anglais.
13. Evaluations and NFR Licenses.
(a) Evaluations. If Customer wants to conduct an evaluation, proof of value or other similar trial of Tenable Products
(“Evaluation Products”), Tenable may (in its sole discretion) provide evaluation licenses for such Evaluation Products in accordance
with the following: (i) Customer shall have no obligation to make payment for such Evaluation Product for such evaluation usage; (ii)
the license term will expire at the end of the agreed-upon evaluation period, at which time Customer must either return or destroy the
Software and cease access to the Hosted Services; and (iii) Tenable shall have no obligation to provide Support Services.
Notwithstanding the foregoing, to facilitate a transition from an evaluation to a paid subscription, in certain cases Tenable may allow
Customer to continue to use containers (or otherwise migrate data) generated during an evaluation period. Customers may not use the
Evaluation Products to scan third party Scan Targets or provide a service to Customers clients.
(b) Container Access. Customer acknowledges that a Tenable employee may request access to the Evaluation Products in
the Customer environment (which may occur in a production container) in order to maximize the effectiveness of the Evaluation
Products and to set up certain configurations, and this may be done without the Customer being present but will be subject to prior
written consent from Customer.
(c) Early Access. Tenable may make some versions of Products available to Customer on an alpha, beta, or early access
basis (each, an “Early Access Product”). Customers access to the Early Access Product may be discontinued at any time. Early
Access Products remain subject to all applicable license restrictions. Tenable may not offer Support Services for Early Access
Products. No warranty or service level commitment made under this Agreement will apply to Early Access Products.
(d) Technology Partners. Tenable in its sole discretion may allow Customers who are technology partners (a “Technology
Partner”) to obtain an Evaluation license and use such evaluation license to create an interoperability (“Interoperability”) between
Tenable Products and their own products. At the conclusion of the Evaluation Term, Customer may apply for an NFR license at which
time Tenable may convert the Evaluation license to an NFR license. Tenables conversion to an NFR license shall be at Tenables sole
discretion and may require Interoperability validation by Tenable.
(e) NFR. If Customer is a sales partner or Technology Partner to whom a “Not For Resale” or “NFR” license has been granted,
Customers license to the Product will commence upon Delivery and continue for a period of one year (unless the Ordering Document
sets forth a different term) and shall automatically renew for consecutive one (1) year terms unless either Party provides the other Party
with written notice of its non-renewal of the NFR license at least thirty (30) days before the expiration of the then-current term.
Notwithstanding the foregoing, Tenable may terminate Customers NFR license for its convenience upon thirty (30) days notice, or
immediately should Customer breach any obligations under this Agreement.
(f) NFR Customer Prohibitions. Customer shall not purport to take on any obligation or responsibility, or make any
representations, warranties, guarantees or endorsements to anyone on behalf of Tenable, including without limitation, relating to Tenable
products, software, or services. Except as specifically permitted in this Agreement, Customer shall not state or imply that any of
Customers products have been endorsed, reviewed, certified or otherwise approved by Tenable. Customer may not use Products
provided under an NFR license: (i) in a production environment, (ii) to protect its own networks, (iii) as part of a service provided to its
customers, or (iv) to perform customer evaluations.
(g) NFR Customer Representations. Customer hereby represent and warrant to Tenable that: (i) Customer will not intentionally
harm the reputation or goodwill of Tenable through any act or omission, and (ii) Customer have used commercially reasonable efforts
to ensure that any software, code, algorithm, API, etc., transferred to Tenable is free from any time bomb, virus, drop dead device,
worm, Trojan horse, or trap door that is designed to delete, disable, deactivate, interfere with, or otherwise harm hardware, data, or other
programs or that is intended to provide access or produce modifications not authorized by Tenable.
(h) NFR Customer Responsibilities. Customer shall, at its sole cost and expense, defend (or at its option, settle) and indemnify
Tenable and Tenables subsidiaries and affiliates, and their officers, directors, employees, representatives and agents, from and against
any and all third party claims brought against Tenable based upon a claim that use of Customers software or Customers product in
accordance with this Agreement infringes such third partys patent, copyright or trademark or misappropriates any trade secret, and shall
pay all settlements entered into and damages awarded to the extent based on such claim or action.
14. General.
This Agreement constitutes the entire agreement between the Parties, and supersedes all other prior or contemporaneous
communications between the Parties (whether written or oral) relating to the subject matter of this Agreement. No Customer document,
purchase order, request for proposal, or other specifications requirement shall modify, supersede, or become part of this Agreement, or
otherwise contractually bind Tenable unless signed by Tenable. The provisions of this Agreement will be deemed severable, and the
unenforceability of any one or more provisions will not affect the enforceability of any other provisions. If any provision of this
Agreement, for any reason, is declared to be unenforceable, the Parties will substitute an enforceable provision that, to the maximum
extent possible under applicable law, preserves the original intentions and economic positions of the Parties. Section headings are for
convenience only and shall not be considered in the interpretation of this Agreement. Customer agrees that Tenable may use Customers
name or logo in a customer list. Customer may not use Tenables name or logo without prior written consent and in accordance with
Tenables guidelines. No failure or delay by a Party in exercising any right, power or remedy will operate as a waiver of that right,
power or remedy, and no waiver will be effective unless it is in writing and signed by the waiving Party. If a Party waives any right,
power or remedy, the waiver will not waive any successive or other right, power or remedy the Party may have under this Agreement.
The Parties are independent contractors and this Agreement will not establish any relationship of partnership, joint venture, employment,
franchise or agency between the Parties. Nothing in this Agreement shall prevent Tenable from subcontracting any of its obligations
hereunder; provided, however, that Tenables use of a subcontractor shall not release Tenable from any duty or liability to fulfill its
obligations under this Agreement and Tenable shall be liable for any act or omission of a subcontractor to the same extent as if the act
or omission had been made by Tenable. This Agreement is not intended nor will it be interpreted to confer any benefit, right or privilege
in any person or entity not a party to this Agreement. Any party who is not a party to this Agreement has no right under any law to
enforce any term of this Agreement. Any provision of this Agreement that imposes or contemplates continuing obligations on a Party
and any section which by its nature is intended to survive will survive the expiration or termination of this Agreement, including Sections
3, 4, 6, 8, 9 and 11.
15. Government Entities. This Section 15 shall only apply to Government Customers, as defined below.
If Customer is an agency or instrumentality of a sovereign government (a “Government Customer”), all Government Customer
end users acquire the rights to use and/or access the Products and or Services with only those rights set forth herein (consistent with 48
C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4). The terms and conditions of this Agreement govern Government
Customers use and disclosure of the Products and supersede any conflicting terms and conditions that may be applicable through the
Government Customers procurement regulations. If this Agreement fails to meet the Government Customers needs or is inconsistent
in any way with federal law, the government must return the Product, unused, to Tenable. If Customer is prohibited by law, regulation,
or relevant attorney general opinion from agreeing to any clause of this Agreement (collectively, “Restrictions”), the Agreement shall
be modified to the extent required under such Restrictions. Each of the components that constitute the Product is a “commercial item”
as that term is defined at 48 C.F.R. 2.101, consisting of “commercial computer software” and/or “commercial computer software
documentation” as such terms are used in 48 C.F.R. 12.212.
SCHEDULE A: SOFTWARE
This Schedule for Tenable Software is subject to and made part of the Agreement.
1. General. This Schedule governs Customers license of Software.
2. License; Right to Use. Subject to the terms of the Agreement and payment of the applicable license fees, Tenable grants
Customer for the duration of the License Term a non-exclusive, non-transferable, non-sublicensable license to use the Software
(in object code form only) solely for Customers or Customers Affiliates own internal business purposes. Customers right to
install such Software is limited to use with the computers or machines for which the Software is registered for use. Customer
is permitted to make one copy of the Software for backup or archival purposes.
3. Warranty. Tenable warrants that the Software shall materially conform to the Documentation for a period of thirty (30) days
after Delivery. Customers sole and exclusive remedy for breach of this warranty shall be for Tenable to, at its sole option: (i)
use commercially reasonable efforts to modify or correct the Software such that in all material respects it conforms to the
functionality described in the Documentation; or (ii) if Tenable is unable to restore such functionality within sixty (60) days,
Customer shall be entitled to a refund for the non-conforming Software.
4. Open Source and Third Party Software. Any code or other intellectual property included as part of the Software that was
licensed to Tenable by third parties that is not marked as copyrighted by Tenable is subject to other license terms that are
specified in the Documentation available on Tenables website at https://docs.tenable.com/licensedeclarations/ (or a successor
location). Customer agrees to be bound by such other license terms.
5. Compliance Rights. Tenable may, by itself or through an independent third party, review Customers usage of the Software to
confirm compliance with this Agreement or the applicable Ordering Document. Tenable shall: (i) provide Customer with
reasonable advance notice of the review; (ii) not request such review more than once per year; and (iii) not unreasonably
interfere with Customers business activities when conducting the review.
SCHEDULE B: HOSTED SERVICES
This Schedule for Tenable Hosted Services is subject to and made part of the Agreement.
1. General. This Schedule governs Customers use of the Hosted Services.
2. License; Right to Use. Subject to the terms of the Agreement and payment of the applicable license fees, Tenable grants
Customer for the duration of the License Term a non-exclusive, non-transferable, non-sublicensable right to access the Hosted
Environment and use those modules of the Hosted Services set forth on a valid Ordering Document solely for Customers or
Customers Affiliates own internal business purposes.
3. Warranty. Tenable warrants that the Hosted Services will materially comply with the functionality described in the
Documentation. Customers sole and exclusive remedy for breach of this warranty shall be for Tenable to use commercially
reasonable efforts to modify the Hosted Services to provide in all material respects the functionality described in the
Documentation. If Tenable is unable to restore such functionality within sixty (60) days, Customer shall be entitled to terminate
the Agreement and receive a pro-rata refund of any prepaid but unused fees for the nonconforming Hosted Services. Tenable
shall have no obligation with respect to a warranty claim hereunder unless Customer notifies Tenable of such claim within
thirty (30) days of the date the underlying condition first arose. This warranty shall only apply if the applicable Hosted Service
has been utilized in accordance with the Agreement and the Documentation.
4. Acknowledgements. By initiating a Scan, Customer authorizes Tenable to access the Scan Targets in the context of the Scans.
Customer understands and acknowledges that the Scans may originate or appear to originate from a Tenable URL which could
cause Customer (or the owner of the Scan Targets) to believe they are under attack. Customer agrees not to pursue any claims
against Tenable as a result of any access to Scan Targets when such access was made in connection with an authorized Scan
unless such a claim is based on the gross negligence or willful misconduct of Tenable.
5. Usage Requirements. Customer must provide current and accurate information in all submissions made in connection with the
Hosted Services, including registration information and the location of the Scan Targets to be Scanned. Tenable may, in its
reasonable discretion, prohibit or suspend access of certain users of the Hosted Services. In the event Tenable suspects or
anticipates such suspension, Tenable will, to the extent practical under the circumstances, use commercially reasonable efforts
to provide Customer with prior written notice of the suspension and an opportunity to cure the issue prior to (and in avoidance
of) suspension. Customer acknowledges that under certain circumstances such prior notice and/or cure period may not be
possible or practical. Customer agrees to safeguard and maintain the confidentiality of all user names and passwords. Customer
further agrees to use best efforts to ensure that no unauthorized parties have access to the Hosted Services through Customers
account and/or log-in credentials. Customer will promptly notify Tenable of any unauthorized access of which Customer is
aware or reasonably suspects. Customer is responsible for compliance with this Agreement and all use of the Hosted Services
through Customers account.
6. PCI Scans. Tenable makes no guarantee that a successful completion of a PCI Scan will make Customer compliant with the
Payment Card Industry Data Security Standard.
7. Data Retention Policy. Customer has the option to select the duration of the data retention period of Scan Data in the Hosted
Environment in accordance with the limitations described in the Documentation. Customer acknowledges that Tenable is in
no way responsible for any of Customers data retention compliance requirements. Tenables data retention policy with respect
to PCI Scans will match then-current requirements set forth by the PCI Security Standards Council.
8. Service Level Agreement. Tenable commits to make access to the Hosted Environment available in accordance with Tenables
then-current service level agreement, available at http://static.tenable.com/prod_docs/Service_Level_Agreement.pdf (or a
successor location).
SCHEDULE C: PROFESSIONAL SERVICES
This Schedule for Tenable Professional Services is subject to and made part of the Agreement.
1. General. The Parties may agree, from time to time, on the purchase and sale of Tenable Professional Services, which may be
further described in a separate SOW or Services Brief. Except as otherwise agreed to by the Parties in writing, all Services
Briefs or SOWs will be governed by this Agreement. In the event of inconsistency between the Agreement and a signed SOW,
the signed SOW shall govern.
2. Type of Services. Tenable offers a range of Professional Services; provided, however, unless otherwise agreed upon in writing,
Tenable does not offer creation of custom intellectual property. Tenable is not obligated to provide any Professional Services
except as mutually agreed in a Services Brief or SOW.
3. Deliverables. “Deliverable(s)” means the reports, analysis, codes, scripts, slides, documents, examples and other written
materials or work results provided as part of the Professional Services.
4. Intellectual Property Rights.
(a) Grant of License in Deliverables. Tenable grants Customer a non-exclusive, non-transferable, irrevocable (except in case of
breach of the Agreement or SOW) perpetual right to use, copy and create derivative works from the Deliverables (without the
right to sublicense) for Customers or Customers Affiliates internal business operations, as contemplated by the applicable
SOW or Services Brief.
(b) Reservation of Rights. Except for the rights expressly granted herein to Customer, Tenable expressly reserve all other rights
in and to the Professional Services and Deliverables. Notwithstanding anything to the contrary in this Schedule, nothing shall
prevent Tenable from providing similar Professional Services to other customers and nothing in this Schedule shall be construed
to provide any intellectual property rights whatsoever in the Products (or any modifications or enhancements thereto) that
Tenable develops or makes generally available for sale to its customers.
(c) Pre-Existing Materials. Any pre-existing materials, proprietary item or intellectual property rights of either Party which is
disclosed or used in performing the Professional Services shall remain fully vested in such Party. Nothing in this Schedule
shall transfer any rights whatsoever in Tenables Products. Customer hereby grants to Tenable the intellectual property rights
(if any) required for Tenable to perform the Professional Services.
5. Warranty. Tenable warrants that all Professional Services shall be performed in a professional manner and in accordance with
industry standards. Tenable further warrants for a period of ten (10) days from the service completion date that the Professional
Services shall materially conform to the applicable SOW or Services Brief. If Customer provides written notice of a nonconformity
during this warranty period, Tenable shall promptly confirm the non-conformity and upon confirmation, Tenables
entire liability and Customers exclusive remedy shall be for Tenable to use commercially reasonable efforts to re-perform the
Professional Services within a reasonable amount of time. If Tenable is unable to re-perform the Professional Services, then
Tenable may elect to refund amounts paid by Customer for the non-conforming Professional Services.
6. Scheduling; Cancellation. Professional Services must be scheduled within nine (9) months of the date of the Ordering
Document under which such Professional Services were purchased and completed within twelve (12) months of the Ordering
Document. If Customer does not schedule the Professional Services within this time frame, Tenable shall have no obligation
to perform the Professional Services or provide a refund. Tenable shall have no obligation to perform the Professional Services
or provide a refund if Customer or Customers designated attendees do not attend a scheduled training session or cancel a
Professional Services engagement without providing proper notice. Customer must provide Tenable at least five (5) business
days notice to reschedule any Professional Services. Tenable reserves the right, directly or through a Reseller, to invoice
Customer monthly for travel expenses incurred in the prior month.
7. Customer Responsibilities. For Professional Services occurring on Customers site, Tenable agrees to comply with applicable
and reasonable security procedures provided Customer provides Tenable with such written procedures in advance. Some of
the Professional Services may require Customer to have specialized knowledge or meet particular software or hardware
requirements (for example, appropriate computers or appliances, stable Internet connection or up-to-date web browsers or
operating system, etc.). If technical issues arise during the Professional Services, Tenable will use commercially reasonable
efforts to resolve such issues, but will have no liability based on Customers failure to meet technical requirements. Tenable
will not provide any refund based on Customers failure to meet these prerequisites.
8. Changes. Either Party may request that a change be made to the Professional Services. Tenable reserves the right to charge a
fee for any material changes to the Professional Services. No changes shall be binding unless executed by both Parties.
9. Non-Solicitation. During the term that Professional Services are being provided and for a period of one (1) year after their
completion, Customer will not, either directly or indirectly, solicit for employment any person employed by Tenable or any of
its Affiliates that have provided Customer Professional Services under this Agreement. For the avoidance of doubt, this
restriction shall not prevent Customer from hiring based on a response to Customers advertising in good faith to the general
public a position or vacancy to which an employee or worker of Tenable responds, provided that no such advertisement shall
be intended to specifically target Tenable personnel.
Tenable Confidential and Proprietary Tenable Master Agreement v.6 2.2023

Binary file not shown.

@ -64,3 +64,68 @@ DIST thunderbird-102.9.0-vi.xpi 745663 BLAKE2B dae24dc639d4b566750dd3db205a5fb6a
DIST thunderbird-102.9.0-zh-CN.xpi 739887 BLAKE2B 885a7acf5ea5bfcab826755bb1f604850a79ed3f185578413c0a0081be0be29790f14687328994756411efd0f3ae104d4f2d495cdb58550670e59d4520f08ba4 SHA512 997880258871dceb5018c8fecc8a61b20a051d322ca1791ed014ca1e573bcc653e7eced939968db01fa00befa82ff3bc50fe8e81f871331290d63043aba91a57
DIST thunderbird-102.9.0-zh-TW.xpi 748346 BLAKE2B 1f9850366f292ca4ccc613efd071146d772661a26d2ce571dcfb99e7dbad66f39b1d0d2d4833fb8eb40fd4f4efaa633d2b0d8c0e177aa7750b3d2c867cf8a167 SHA512 dd902d37b4e695fb1eb8e1e39c95bd9cee94cf66814c418cafbb48965b6d0d9e9600d0afce309ed36f3bfde32c5a225dba480613ca66468d2370303de68c4ca4
DIST thunderbird-102.9.0.source.tar.xz 503081436 BLAKE2B 538ec2705bd73f0673864a72e4e8c854d3450c79e40577e00ea8091c7c03f20a33b25ae475b270543963773c544d3819cd889e6bafc816ab0e78bd0b4fb6fd55 SHA512 0de88cef22e7b239804e27705b577dd34a86487512bb2af29804b358d056628c14034a34cbbdded75612bda984fac2c04d116cca8040b9212a7fb0206c07c440
DIST thunderbird-102.9.1-af.xpi 556847 BLAKE2B 1730b20ceab478e74c7778ebdf874d5696a2be0245a44c66a7797f1cfff7fc1ce2c85d0b8397841c399906f095a00cc68f934d6f13bfc94db357d824f98f69c3 SHA512 7b304ac6ebaf660623a80b2a26961d757750f4bfd0496791dfed847a759c0f4567cb9d07211cdd6a749c64203cfb4978ff39d773322fa5480db79d2cb7c9b30c
DIST thunderbird-102.9.1-ar.xpi 666810 BLAKE2B d70d79469959c1aafe09a17afb14baee6bb009fed70c570b176243c7d0f97adede9d54cffcf532c58a8c7d0ddbfa53019ee6eb62b2bda31730727861c9995214 SHA512 f715452c476f80d72fadaa553d45abfd49e30f80728353a1a668144d907a1b2ce2dbebc857d7ead9258371e9b524ca1c7c060b3450b600fa9d078c47bcbf6a38
DIST thunderbird-102.9.1-ast.xpi 572265 BLAKE2B 5e4d4c7a76323f2f60ed67d41069ea36ed196c8d52b085c5e20d8150d7f62cb291f464eb45dbdcd4bb8e4ae2ab5b49ac4b5feea095ce96b0a44e7a584a1cc60c SHA512 20753d8414fe613d522b13cdf0d0d84c5582cd16374eb3b4918873aa5e16c385c77d2ba2c35145422cfa51dbdf9e449a5d700bd1c43de2b6da6f491400491da3
DIST thunderbird-102.9.1-be.xpi 701890 BLAKE2B 10fc831cb7e69463f06bd699f7c8dd8449b56f277d547887bfc265841eff693669a8245d592c4bba77d3d213f3b502e4430f97cf5d530d141522161d659eb498 SHA512 a8f92dc4a02264cce9debbf40b0af69b84179f53f9c92249d2f7049f25a2a8274481a981f581e40dc78b3a2dfdebebc866815eeba676b6e00699b9137e21ca53
DIST thunderbird-102.9.1-bg.xpi 693376 BLAKE2B 3be40b1548188917eaaf194d6ae0794d1c058cf02f6570f2115a2a2526fb3d47fafff537e909f9036ab39c4ed1b8f3dd8c0c25cc22c19e6c745834bdb902bb70 SHA512 fffc163dde41f9b13191f95399dc8c9dd84b3095a6062b5c0201a34e9c571bfa2971db3173fd0a023bd24987391585416a4a0a7db653442ee859f857ccfb7dd6
DIST thunderbird-102.9.1-br.xpi 626470 BLAKE2B e333f93f694b60f9764b71d6433d69033b203e0108144c7a55a06d946965fc5a3b04e0e967a3affb44415670b385c812e533c145dd9e6a8d8d8e6de194333b6e SHA512 882fe372a911468e57306c91e2679ae2f8c3be80eb48558469e22cb21f1cf64d78f54386c66019bb879cabb475cd7323445a92688ec7dc3f0b92e21314a0cd07
DIST thunderbird-102.9.1-ca.xpi 651366 BLAKE2B 885999d13e138e9ad51440af460356e90baf0efeb43c707cc61eb66de4cddf4c783e6c6277dd52e24bce64676d594230a850e219d3e1b5695cda051fde6c3ebc SHA512 5e45266077619625bc4d58269b42caa586d83cdfada6b93d745083e1deaf84a0125779e065f384d36c8ce59805bc03aa925a0fbc036213ef491c1225f4c11533
DIST thunderbird-102.9.1-cak.xpi 651756 BLAKE2B 31c04eb23e9c8a1e0859b5f7cd99fa3ed755b78a4f82067d4aff8cc1ec85220b2e26773cb3039500339d03b5a40af4bf1b634f228289662d359369cabdc23e52 SHA512 ea72c1faa56e59a28f6dc79693cb06fd4b87fa07c1d86f2593a38265d02d308cf159a267da672e94a0208d2a93d88542fbcb02d7daaf14c6ac28c387186805db
DIST thunderbird-102.9.1-cs.xpi 728623 BLAKE2B 5abeee702410b303369295ac85b477171826ea2544a13e82050468b02040745ec83f07bc77fe557c1d381c2323305e7b7fd398113f6881058770af173541b935 SHA512 b72ae65319275465628f26c0f16b2f435ba06e42df34fc9c456102b584a6699f3553208bab81051288379b3913923607d59ef74fbad9a3ca13b3005b6e54fbb9
DIST thunderbird-102.9.1-cy.xpi 705576 BLAKE2B 8714b51ff51ac13ccedece3c11c6365f1c18522f53975ff86e50c3e3514ff62a794774457be83c32872c5febb0849344ba66d64b2217871593d06cfcba7b81d1 SHA512 f5cdd1a2cb1ac580204f1563807a43134489183c37dc16505b20a9d64d36ee5b2567c95c9699346d466eac28b9ba398717cc4e61ad366f6c9976aaf206849f89
DIST thunderbird-102.9.1-da.xpi 685254 BLAKE2B 3f612a1f7d31373f7b797daa04a7b800babdfcc4a3799b2da0e825392159416eae567a1f299b6ff177ab3d51876e26407737c12a0193b508342f048bbcf27589 SHA512 556b97134efa62e94be58364a7a402708604726598b1463169410daceb2cd8b019d155eec922e31554edd53ba0562c14cc4cb50e726a29865ed7d33537f8601e
DIST thunderbird-102.9.1-de.xpi 717943 BLAKE2B 5ee96680f09f610e96d4781b10c393e610752382a62d84df15cf457a29a0c3b6ae3c599219827ce0658d7f1140caaf3a78d79d7b05b73bbad3dcdde456e495c3 SHA512 3de342550d52231245a2efe7c52acedb10679a1e79612432964808e050f6c5c72403ba24a71bbcad10a5868be244fb1e00888ae7f2647715fbcc224e2565e5d1
DIST thunderbird-102.9.1-dsb.xpi 737086 BLAKE2B e7f76060c4f6bcc9546d14029c9fc5cd61a5651edfeac59d0d1ef611e5ad1d2f80f59c74595f160a4fb2471a445173be315491dd744c74103efcac8b9f227d25 SHA512 103e0a73be5918b79acf3e4bff5ce4aaa96260e343fca70e94337bb9e54f1311b29d21045030f32f9165f6b86a62d84117ceab0e8ea26ff893cd67a357733b95
DIST thunderbird-102.9.1-el.xpi 840812 BLAKE2B b21ee334b505fd27ed0c09d021c772f32f03029d945573026686f8d6b8e079d3cab9b6dcfadce1c107e9888421637e4a0c70f89da94b6c1fa8d2e81f2cc20772 SHA512 882f7a254653a51345233b9005966f52b3d0daa95bb9a092bce753ac416cd2888be92d33a57d5ddaba2df8582c1588461c604b0850076916b6117fe0a3221014
DIST thunderbird-102.9.1-en-CA.xpi 659092 BLAKE2B 5e760944b83290c828bae538ba7fd79687b7871a1984c4b78c48b5ef03597d94acedf6eb6b2750c2210c2f4a807056f0e8ef20893b2ed1315b68c04eaa112c47 SHA512 abd408e2c1c31dff311804b5511c6102eb690332f38a13d55215083019876a318cca148344ebadcf1e75d9b7da46346030a0442ed22aa59112f5c227bf6a9d32
DIST thunderbird-102.9.1-en-GB.xpi 665006 BLAKE2B f9947a2ec90b86ddfc2b67b1578df774a353d7907bf0bee81227620ad80d55e0d5f30c38c771af2fd587c6533a085ca62c3e491ffc2b5636ec7a21c654a5c89b SHA512 d4b10e6cac395d60471866ec9f355bbf058e95b8d0498f53733e9ff51630ceef21e2c6e8902a1564ae838bc743a32e06bff1ac187febb8e9e932b06c9d5adcfd
DIST thunderbird-102.9.1-es-AR.xpi 717274 BLAKE2B 96f1d182357763593b04f37f27a7ebd2e241add65737a2a231d9acf2ee3e563c6963779cf4633c68dff4dca861344ff9b8aa249710b2fa8b30cee65f63447db9 SHA512 eefa1153d723d8c80380339d9a6feb3cd0b171ae5a185b9df369d176eacf66486f53601b5aecf185c39e281999bf70c7ca62916bfb92d395a892a2a12ded9fb9
DIST thunderbird-102.9.1-es-ES.xpi 677481 BLAKE2B 37bf82ec4fdaaa082381d4454aa673cd33d3962d842d23434f70fc2ea2429238b11de8cec90be654671663ee1c50c8833ca869fa6b79de1549fdd6705c90bfdb SHA512 8b0a2481eac2ac49904425dfa7a9b07466e5f856303d0a2c25d65f8036d3504d1d0cc54e4534dee64acd0f25ca5b04af2e3372770c5570591067c6beaa6a518d
DIST thunderbird-102.9.1-es-MX.xpi 719709 BLAKE2B 84f19d0406289ceabdb84328e3396b5b39f4f5e2f08e1c00888c936a35fcf7727718ad0a126d25625625491c79f3bd462a0afdb784d58afbee8212eb2582d19d SHA512 c9e5dbe3b29fe3ffcfe2df8148c71d2119a902369ca858dd20598fec8935d4a5e2b58a917e74a09ecc98417bd2735676898dc811e3a68e0232d6dec101281413
DIST thunderbird-102.9.1-et.xpi 676676 BLAKE2B eb01052eb3150c6157fb5e38bee2d656b4250d6afdf81bd6e6c54ae32c31a6bccafe02bc481389d1ef346d451b3600455b42a7bebd07b31962e8e3daad0639a0 SHA512 0229d7ebd5d27fd7fbddf670ce23d9410b5729553393366df478039d40168b3f3b9074dcc3c03ef3103cdebba0e6777f0933a241596567d8dbd689308e9f64ea
DIST thunderbird-102.9.1-eu.xpi 701827 BLAKE2B 8b65b38547bbc214bbd9cc9cea2d31aad7d3dbbb705da27fdedf4da40d965da18ec1beeeb50b89e33a05f13cd56546dc3b74179301ded71c0fd8b8d3c79e5e4d SHA512 500c1fa133bedb70bf16694d820c1565422cc9e2acebe94af084a4312fd1dc81acc1bbd671266d5d0246f4cbaa694eba51c34afb73ac45d446567585822a5fea
DIST thunderbird-102.9.1-fi.xpi 693484 BLAKE2B 6e644b48abe953a1260f51b88dac3d499f7ac3ef7835f2a2ce79d239c0c307d0be45d2316736d85c69fc783cae4567675fd3d1abf50497a877d2189eb5299d78 SHA512 0276688b9a85dc3aa72131c1938533605a2745479502d330c84561fcc91873a16a9646b5f618c0c59f932357aa1a894d52480cc2958e4fc7ee9a96e25afd5842
DIST thunderbird-102.9.1-fr.xpi 730315 BLAKE2B cc527805089236b085fb24f58e9f456891bc15b5205b0c00e544b141c35c119419d561f3f85b412f181f5fb7b017a34dd793f28435d2e0db80e4c2714c10b299 SHA512 878319e9fef5f8df3f8163ee528cb348647c6dc96f05f59297d4d7ca0b1fb022a8950519caa141cdec0f0147176701b702813941e3f5144ee517e1af2447edb8
DIST thunderbird-102.9.1-fy-NL.xpi 711990 BLAKE2B 65a2fe546664f5c51a475a7f90615b69a959147b9771ea671d34fbfd8b6a07dbf5ccb8e7bdfea647f83f48b8faf835e072ab67ee9b1225667ccf07b8878286d2 SHA512 78539ca78321e84eade07a03f33b0c186ea054b4f75982a8d3b9a65deb9b36cecd6a9530712bf55380f6e7aa9de2bf44e47937db614488512f92d1eadb6bd639
DIST thunderbird-102.9.1-ga-IE.xpi 614536 BLAKE2B 18300552edfd2fa5f514a5eb67413968dbda3b0a59d090c99b9d27cdaaea64ba208cb8066f37442a180bdb26fce23b71d678b8ab1306e88e378b1e0f11bdc596 SHA512 784a0870ed5f3c1b13264ce6fda33a3ba976fef39a0b4be782b9dba15f25593f9b456c549ec474ff786209b785649bc68e8fa3ad41f19a41e84455cd57ab2c9f
DIST thunderbird-102.9.1-gd.xpi 643574 BLAKE2B 6400bd705077d60834abecd3da3416e0c5d05e2c9b100bed0fb93cd7b5b926d7a53b3c9bf56a6e843cfef086d33378837c2c53f419cfcd4322d7586f7fa8fa09 SHA512 28149f313451c4ef65f82d37bbde336f3fbc6dc550127de661b2834781fce794c672f04aef72df6082ec185af7022300bd897929c5bc97e9e10c0e9cfe05e55a
DIST thunderbird-102.9.1-gl.xpi 673000 BLAKE2B 1c5a2b537c83b7cbbd28b42966de390f7292860a8d8a99174ac5672e2f27c387a88384a9803f4a9cd2e8a182bc8668e595ed7fe8c4487e64a0a036e46e67fe8d SHA512 3c8f8c4d4c99356d599f3c70531713edc09ceda73e6839742db2a8a7623f319c984ee356b656a0fe2db014c37e108803fe3565937b679404fa4b3d412ac8e054
DIST thunderbird-102.9.1-he.xpi 676370 BLAKE2B b01752cb73f0302c057c43e523549d0b9e5c61dea8a2bde6cbeb3cc623188e9016edc3b14706497216a8edf55a7dd4a33beb66e6b952323ff6627ade36d5ce73 SHA512 954f8c28037851aa21640b537ad2548ef9f5f9b573ec9ba00c6195bd116fd43fd7cdeffb95fff6d3041fe189fc24347dbfb1480eab41fb1cbdf8b8917d2ed9fe
DIST thunderbird-102.9.1-hr.xpi 677719 BLAKE2B aa5cdece17125f3bdbeb3e526cf5be09a6c7dcfb7dfbb7d2248fc1023d1a937f16ccd7488ffcb2ca330e720eb4b929bf02af42ff44c0d4c08118d0cf602f0588 SHA512 875930527c2118bb088241cbb79d4e32f5f5dce0c2e43975ab2b9b75c60d5c49f852d5d873fcfd8be35b30d175fe4836f71f8ad7aad527cc6052b4265858fcbe
DIST thunderbird-102.9.1-hsb.xpi 736541 BLAKE2B 84597e3bc71222a68f3de1c31684bd8a4e80743b8ac1049f9ed9302e2dc7aa1a59316cdfeb0a95bfd157c6aec8b6ee19b39d38f592323b2080eccc6e2bc86836 SHA512 b115527235396c82fd7b70e12470e62c133f4668f3b4c19dcc03db2544aa15958e0b1346be3becddc1a4ff17db984af2b439ce69196e23a6cb1e75c09dded215
DIST thunderbird-102.9.1-hu.xpi 741200 BLAKE2B ddb95ef662d1b939fc2a85ddf5ce7e56cd77b54007293d31f590a1a55b53e14872364ef1a67d89f646921cf9f9f8b88ef4e49e7b809bc709759d2b6e7f69ed77 SHA512 bca5dc6afac1e07ce5b5da3f1583552f05f0920a31c0c678dee49125b5256186f92328068d6f61db3c33bfce5a78be016abf464e32fe84d081929e00b0d48b9f
DIST thunderbird-102.9.1-id.xpi 653191 BLAKE2B 0b39b5b482ddbc01e4be80df62f40f47631a8c764e1449093c517ee7f88a9c08098740f7444fdb0ec55e164e926dceb7f0a133d94d16c2120687e63bb5d1a692 SHA512 9bacbbddf693175ffa555c90a367cedcd8ea0e56b8acfa3921dfcd5793a53695e78e39385a00dcd96e95eb3211c52c055eaa76eb8dac305116f8d41e46c9c199
DIST thunderbird-102.9.1-is.xpi 706391 BLAKE2B c544042a70102ee36dd697520559a6d07bcfc4a91cc32d0f076e8b2416069d150fadf7dee0239ed137ba157a5539d8ac97007f8c7dc64bb7e5893bfe817d4442 SHA512 a6bea30ca4493543c15915c6100b0b73697e0ee9336cda914fc0407fc38519e89a7be60a94ab3776a3cb615a0a593519d4fbf57f6b783004d184b85161b219ce
DIST thunderbird-102.9.1-it.xpi 639986 BLAKE2B 7ddbe58e2031c6f53642360f2a06a477371fac124a06174481b6e45a7491fdcd4d77fca223e0bddfadd417834373856b776509b92e174b161c75d7a3be57bea3 SHA512 65e23a945aac3147a7816c9eefacf656448cdad0e1bc72d7eba16e8071f5d791ba276faa18b7793895a3a30751243e5f20e8c8eab4a3b14dac3578570c1c4d3c
DIST thunderbird-102.9.1-ja.xpi 781906 BLAKE2B b3de0288b02d78aa759728356846468114aa329cafceb3e8df31e570c63ee87bf48f23b96be5ff6efc3c6e3037b3336c7e1a009ecf8b20394469c511a6d6f05a SHA512 972f58e5cdf7cead42e441833f7ef74d5e688b8620e5323ac6d513cd1d1b55cc491785ce7878356e15ab7cb7cf7e1015a9e9a9fe4cff45fdf183b40e419098d2
DIST thunderbird-102.9.1-ka.xpi 769802 BLAKE2B d5fc023abe9b70d53833f71c376de2a2c34591e7ed94a35adba7ac370731a97d94d607df9114db50023b3fa117120b28c199994a2002a573fd2c1bfec6d2f8f7 SHA512 293aa93579baaa1ccd9481080396ef1377833bd3fddf297207a31e52d4f195f8456099cfd58618540ce313d4a66fe7ac7794f4d7fa9c430e6561bd7f4294277a
DIST thunderbird-102.9.1-kab.xpi 702702 BLAKE2B 3c490b4656fe11e142b84934b6010eb929351ba814d9289db85c751240cb6bbf541a742e9760061c845763422f766c97ae03d09ae4cb9610407e124d51f25d8a SHA512 ae905de1d7f963370fcc42dd10b15bcb40f903f44e5a481514068be0d0aaed84bf2178bf6b4bf648c5c00f5e3ab7003bd1c364c9cba59666cb5fedbff540e0bd
DIST thunderbird-102.9.1-kk.xpi 810967 BLAKE2B a503d8e277a5121d7c738566dc055b755fff749ed750972f44269a11b06e8c31a2c04198282c36e923d9e61d19e2922a6db0918d063208c21dfeb8e0d0db125d SHA512 f0e27c2e8dce359d17ccfe7b8f0aa43fc96cf543a3b8c9fb91c79839b52b85d210d83c553e720e250f090c407fac7df6f83208dfa5118b5e4f67eed3376548a5
DIST thunderbird-102.9.1-ko.xpi 716820 BLAKE2B 22ba74205a07c472f2245eec7c792987b8eff5788f2c416eb4d8469fba2f95bc0970648759cb42d40e34801fed269543453b1cf76a82882ab863baaa9eae9b40 SHA512 3e2cd0997e095dffd2365fde8f331baa14d86ee7e75357ef5c0103cf5ca704c48a062aebd3cd990c1e8c068e686249100cd1437170ecdd247a11855a05d74804
DIST thunderbird-102.9.1-lt.xpi 690854 BLAKE2B 752d735b104aaa365b8a96a31dea08e2e9d0ccb3381f9fb90dc02a27560e67be4ef8f309b6c5c7efb12e084cf9aa40ebf0de32fdfe71d613409cbc7bd90759a5 SHA512 8cb24e5241796026ac3cc8555808ca684701ac18a8997f8ecf41303935055a023bc85ef792297c99bc1c49dd43d6fa89966fe70c5025d42a1af835aabe22fc03
DIST thunderbird-102.9.1-lv.xpi 617743 BLAKE2B 2974c8f0cbb424c9eba58717e7efec70d516944f7cae978405a7f9c09132de57ea94bdbdb82ffaf3f9c1fae91636c92c5d341bb4b03923e9086163383f3035f6 SHA512 926975bb048ab6e324a9fd3a8ca015debc4f40ec9fb9b7bd6cfed21fdb446aaffbaf7db5abf06eeb1721482c1a4db18ff3870fbabb57c0400d12953b43751b14
DIST thunderbird-102.9.1-ms.xpi 577757 BLAKE2B 38b59e5e1e8e0538c85288da7c8693d22685d8cf7378a44830fbde2b9f6ce66576f5fe21faff0471aa799e696d4070c2a204edc4a096fdf2aa9600a24369e6d7 SHA512 a77659a97cffa43da0d97789bb293c1c24b9b8e043b1b795c2e69e39c92cf69c944770e1e66d530df13966b33bee553b1e1f542325d53310d9c59623165ce947
DIST thunderbird-102.9.1-nb-NO.xpi 662680 BLAKE2B ff68c816dd194f40c333c06a85d339715bfcd1cafb2dc572c4c924551a7b4cfe4edea27e27241adb88735f525ee4260e265e296d8c07e38e882d4fd46ff38e32 SHA512 3a9d6e8569886870319750ed7ff6eb05f8932aa227510f3576c8e52c17b8ee094776fe05dfc79e983d894a51ff9087986bef59e7837e87cf3a9da384d643f6ab
DIST thunderbird-102.9.1-nl.xpi 703274 BLAKE2B 691b2208c61e62c92bee625e70172d14a8a409853930a33a03cf2645ef25e1beeb14efbae0c8c22dad23d2b5191d0b7c184efee3608de8053027ad3d95090e83 SHA512 49c6f517aac3f4a870800d4db4bff747e5ef25b8aaee11a809b73f3fa3b467f16df597513e4b42db2a1d4cf63e766f8f2a57c3ff1b98a7875cfd246020ea52cf
DIST thunderbird-102.9.1-nn-NO.xpi 672831 BLAKE2B 9dc6d9a583f791f03fb20c1aaa2474389436e9f9e7abb09f9ea93ef8a00a466d6f8047a1fc5eea2bc5c2488088d040aca51478a7d73df5f4873d51e1c1e230a2 SHA512 e2d49777c24734bf5e784904a5bbe2340cf3935ca3fe8b8dc59550a1bc16dc169e22d4fc5990e79be8c257db8e8c2865524e7324b2eaadd47e99475eff8abd0e
DIST thunderbird-102.9.1-pa-IN.xpi 668031 BLAKE2B 3b38274e1b7859a51862e469c26605ff5bb843dd7d5fad7a3d7a0f25bbf249b183aa571b5f4f76569bdd633c2730c388eb5814ef717f56be2e8dca8db5ff4a1e SHA512 5b2056d1f454061bd3502cb730861f78a7592832f00f85f834415a9b540f7a65f81c1c72fd5f4edc2a51f3dee0fda21c8038c26c4a7dd48b0ca0b8410b9a75c3
DIST thunderbird-102.9.1-pl.xpi 716230 BLAKE2B 3e9c7e6c874bf5bc17c1ceb4a2efa5a9cb90959b545e1865867ccc1472cceb9e6d2a89392e1cff47cb9dfbe149d7a41e8b7afe2675c3d3384c8c281f26d8f0b9 SHA512 0a0545250551d5951f20c69b96180e7970c2cffee1b577a522c9e8e1554ebfb416152662afd13f9da24f43007213da31785f805f186f9f1c3c6fcddd67c330dd
DIST thunderbird-102.9.1-pt-BR.xpi 711150 BLAKE2B 2f4b136169b5457708d4e8b41116698e6ec30eb5747c23956eda376e313a58adac5889cb728462ecba02d8f2e925748099985f2a34dd9234fb1d769f5409a1c1 SHA512 dcee7d17d408717623c1042b90b27c995eb91966b12f54de2759e45ea1728174cd5ef41f438f9c4ba65f635f1c6e026bc333bdd7c5bc06212c488df707001687
DIST thunderbird-102.9.1-pt-PT.xpi 686909 BLAKE2B d2827dd239d824c47bffba9ad12e42d3d5eeda498397c9eba6301d81c422ac7a93c95f47cf2433461e144b16f7f4fa8e40bf755413ce6ef78373b33c9d1b3b0c SHA512 737372d1876aff607c079ec15e91427d978e540a254cb1076397e9a8c4d28767d0222fb0e449262397cb45e56d05ad0c9bafce7d23e937d0267195324ad49614
DIST thunderbird-102.9.1-rm.xpi 701682 BLAKE2B cc044041472b6b0ae1a31bf7871e0f43fceedc34d913715dc8adc330d613d6a55d79e9e5503796af5a2807c76bd7b8d86ee0a5a5f3420dc154a02ee3dc06f16a SHA512 e24eb9cb9b9cc4e63e9f99e7d34ea015cdcbd2fd93ba59cb201ffacbf9b20d4bf1c9d06dfe5dcb03893986bbc2a18e0c247295e4fa421ec15b82c51c50869eb0
DIST thunderbird-102.9.1-ro.xpi 661281 BLAKE2B c33cb53e21db62414bc7388fdaeeb85ad65f436b50d54dda447cc8aa89a8c4f03f0b7bdc01a99564d441830cb66631974ae605bcdccf32d3e5251fe2dc1b5a67 SHA512 e3eb3c21b976253cd21b50e0728b65000e2435624c155afecce300406882df1b93b8c3bbe2da0239c98b1acbd9a4dfe593c1bd1f9beb570984fbec1e92ed39d8
DIST thunderbird-102.9.1-ru.xpi 827219 BLAKE2B 749ab7142372899ec02663f8daab7810b314702bb47cdef5f0b55d0f48204cfe68edab4d2c6f13e34eea1bacc87e84a2ebe85cd056dae6cd205fd11763661deb SHA512 6fea866ccbcec77bdc84e293bc455623361f9a1bf8aa25a4b833d6c4c83d0e27ab26968c98216fb7c830d02f270485846b4035f67163318049167198d9b82cbc
DIST thunderbird-102.9.1-sk.xpi 740980 BLAKE2B 927cea47f878c69ef27aa57974e0ea28e5782930074168e55880e82692b464ecee2f4111c3adf226bf29e1d037f42ef1253d8f8dd8caed8bf274a5a01f1e47c6 SHA512 0085c0b259f7671ddbfc529cac4c9e3e27b09084221deca4aafcf500b0bc73b774b21c83474deebe08b542599d977314f8f015327c2646ae292730c2d4ad2c0b
DIST thunderbird-102.9.1-sl.xpi 704060 BLAKE2B bc5d1e8337c28b17e82c719dc195b7c1eab5fe382851dd8b2de17d88fd62fdcc7ce00a366ad0774d00349b8c5655ea5fbba8773f38d4e8b7fa6889c9e72f9d5b SHA512 8088b9536ffb333d3fa9b70249e984b5345068c1daa3c49139f493ee11f3624c0e9f416927f749843b946e93eb9ebe382cad5ae00b47094ae0af47b93ca2d9b8
DIST thunderbird-102.9.1-sq.xpi 726035 BLAKE2B 9d50c3efb8fbfc3e698776374134a1ec67ae0a3eddb948881fc2d1a560fb7ee31b71abc5a158395d247b299a8a4692cd8ac2ddf175b9be542641e43ca06296a7 SHA512 2f149aa369e4ba52f6ede11810049deb895d0b507e789406068c290094a24a313b06fe50548c7acb135674decec1d75d8f63b5b74c082ec5408371d6501f5c28
DIST thunderbird-102.9.1-sr.xpi 720556 BLAKE2B 08ae7d196a9ff1bfed1bd0bcfcf408a6e1b6a0f465b28b2142f7f9e74c7f250b21fa8f14b5074e933e709b863928be9eb39141bc75f7d34258cf73d8250fbf56 SHA512 24154f6536f9196692ce17cba062adb7f1f46d00378f1ac28e2d72fa3e64a120ce139bf55eece1bb28c448351a77b5841188cf2600bbc66b0fb3e27bc8df54ff
DIST thunderbird-102.9.1-sv-SE.xpi 706952 BLAKE2B 15022666ff26c4ac01cba3497cc5743e43a414626aae6dfa86da756fecb1bb60386ff0fa980036fa80abfe3170055f0f04451b75281fba6c9405264cf4ce3fba SHA512 599718d0e3dc44df3b0a0d8541d784ac7146d5057fa52a616fc73be83f08447b82f6ff9241a686e129f9e178e2b81cb004cd2ea00d5b8b646bf03455c58225bb
DIST thunderbird-102.9.1-th.xpi 758235 BLAKE2B 31029f538d3113240c39b4f23fbcd42cbfee0049c8999ef354f38dcfaa54d76fd65b32c2fa1e040432d6a206f018dddd4390d9dcd8ef96175d91728b34ea337c SHA512 d4269b6ac010d90c3457ebb5652aaf46d208bb135e1dd91198fb52e0ddc0fd76630dbae8e9dabb7387550fc43f6908e7f013d80c02e6b68f113554e089462049
DIST thunderbird-102.9.1-tr.xpi 720175 BLAKE2B f0fb3fd04c6976a292480272117ce5d06956593f86877bf7f4912a17a86e4277fc476f5351a336f83a5e8d64ffdb658299d62bc8aba94747007a89110bc8ebef SHA512 44e9ed5cd54c0d207d2670e6e6753253c996e6e6752e708ed5513b9628ba5950d49fdcac686f2261d8fa32ad848995b2546acba1599d58c9866aa2b1f1b5a6bf
DIST thunderbird-102.9.1-uk.xpi 818663 BLAKE2B a52dd588993d5f5ed0b3a6b89b8958fe1a3a2f713ff852f1427bb5b16afc922a17be98fdcd85a37cc8d5647d280cc7fbaf5582fa5e04a10ec0dc0845a50abc49 SHA512 df7db03a9dd48318780f5cb60e37405898f5d0edffa0c96040924e4440a30ae14e4aaa2cb2a80139373a4228f8159420ac02ed146a8329a4fb9249d170c1a46a
DIST thunderbird-102.9.1-uz.xpi 593012 BLAKE2B 49f0db519654f466fdb2f45fcd16495919c93ae55743e512e0243f1dfa099c077dc8c0616ee2ead10d4fdef471f3c2bdee48c959ba7e24c51edc1c0f05355b12 SHA512 05758070482f3f467ff1f3415ea8e85c2cfbf0455dbd1bb503bc61d679a27d4ab4e133e5be1e72078b9dfe791c7d60c38e61fc12774a7c99d12d0eb37401e18e
DIST thunderbird-102.9.1-vi.xpi 745663 BLAKE2B 362a9cb76087b5058d13bd01b656252d852c7af32e2287062348175d8358f448a7aaba45c9c0b5c1b945c31b81557b969bffea1f63d0ded16b0fc597a921612e SHA512 18b55ed318096aaccfc64b6b6d31668c4bcd8ed2dff353833b7f124649652e81b2125f74ecc1cbef36ae580f040dccc45f43b6e997aaef48137b4487c47d87e4
DIST thunderbird-102.9.1-zh-CN.xpi 739886 BLAKE2B 80b2851545b7b81fc1e80e978b8fc3ef4596da70820903851174eb8925c4572df6242a946c6f7a9a694078d8d7c0bf1c1ad94993c853f695a2040d01e70f8cc8 SHA512 292a0810d8ba90017c5a2370197c883e77bed74270f3079fa8dddb8db2884b67581a2eb74dabeea9b375bf7d46e1f6233d21cd4b5a1c0124d8c1379ba430d309
DIST thunderbird-102.9.1-zh-TW.xpi 748346 BLAKE2B d55821dfb8c5b8321bc1dbbb0d609c63018f10cd6813c5e3827a03c9087fb32d07cef53f45abb651c8af8e593ed0061308c963378d72dd840e97446e68cc1c03 SHA512 d751cb5e9c9a9e103b5c79a16d295b44f66cea2753aaf1bdfe21f635d7a692d10f5573c5ee40980c6ae2625a6d1f35311fd62f6ae64389761fdfc8654e40b4ed
DIST thunderbird-102.9.1.source.tar.xz 503181696 BLAKE2B b2f437489284105dce072b6a3816b3fad52fd4a5d4d7fd65284473896ef6f7134102fa71b77b62f2dc25c3135cc5c287471ab87add160d7437996904c76f4c87 SHA512 0a4aa344387d19ab6e8e70a08f27ea0e47e74f90e8cf47545870b7ef30b08babfae9be229b13bee31b6797c45683859ba54ecbc0d1e31c40f780851ae0c0a84b

File diff suppressed because it is too large Load Diff

Binary file not shown.

@ -1,2 +1,3 @@
DIST zdkimfilter-3.13.tar.gz 928058 BLAKE2B 70e16bb9063e966b03d5fd96b8ec458cf5451bb7ce3941539687897a6ad5446a05a8da54a129352ada98b9ed9d4412f3534e189034e9b2507ffe22d0aecf5f1d SHA512 1d3a5d1e5b9f8d56f6a03dd08c09ac7ee52fc9af0d305da3965fbd59e6dffcc85238f448df6746ad4f692dfe2bc928a1209ca6630c63ee3c378cb2660f019ce4
DIST zdkimfilter-3.14.tar.gz 937212 BLAKE2B 93a7e74ad347d171527c24d0f9ee8c38895607ebb3bf08505eef1083cc63d199f82f98d45b9537ecd60e46716f9601694fc8df9d1a96dfd5f7ce74f1646c13ab SHA512 3d8fa2955fe4c61de961d5396a14cdfd60e7df4c48b19dcdc283688192693ad4876ce470a2e9de18292f3addb7f9c2fed3586e4fe11ab3a362456af7c036eb1b
DIST zdkimfilter-3.15.tar.gz 940615 BLAKE2B 7d28b116ecbe64700eaecb5c51b4a11d01c02c59873d22bd4f909274a270e836f75a0ce4fd0b722ff4dcfc6b83e0383789fa31acd8493ed3d1a641807246e9da SHA512 9df73cb246146cd217704887d4e3d78460e492803337cf75b4fcdc28c0ac0565d84340f85d07891af5b07d36b34aedf45182bb52ef53ac30e6ae3d8dec53977c

@ -0,0 +1,35 @@
# Copyright 1999-2023 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
DESCRIPTION="DKIM filter for Courier-MTA"
HOMEPAGE="https://www.tana.it/sw/zdkimfilter"
SRC_URI="https://www.tana.it/sw/zdkimfilter/${P}.tar.gz"
LICENSE="GPL-3+"
SLOT="0"
KEYWORDS="~amd64"
IUSE="debug"
DEPEND="net-libs/gnutls
mail-mta/courier
dev-db/opendbx
dev-libs/nettle:=
net-dns/libidn2:=
dev-libs/libunistring:=
dev-libs/libbsd"
RDEPEND="${DEPEND}"
# Tests don't work with portage sandbox
RESTRICT="test"
src_configure() {
econf $(use_enable debug)
}
src_install() {
emake DESTDIR="${D}" install
diropts -o mail -g mail
dodir /etc/courier/filters/keys
dodoc release-notes-*.txt README ChangeLog
dodoc odbx_example.{conf,sql}
}

Binary file not shown.

@ -1,3 +1,3 @@
DIST strawberry-1.0.14.tar.xz 11234760 BLAKE2B 2dc0d1cee93ffa130da403c986c147f5d3eb59689079a0450183edc53947f7472ea5ff69c57c8ce971f03e89896d06c51bf22bcf57f97adb97067c8a35cf0e15 SHA512 bf667cb93b8f0ffdb8dc625df821bc4355e3845629ff25ed57d7999e19072edffab05f27dbea90adf0bb9a9cbe478856a292a1a6f7ed2c5f37442548699a4c02
DIST strawberry-1.0.15.tar.xz 11230148 BLAKE2B a6ee4dac23dc3c4707a6b31f39bd794975e2c8aeab438419cf2972a1a7f3b9bf54837550db542e2c19bcf08346b04ec9d952e84529865e067c5e7df0a9e0189d SHA512 074b3da1dea22e1e21fcb1039d77e9edf898953ff0a16b28d4ad36052b454e669a4a92e988f1091e7987104149764e411ca68bd95b5f1e18f3e744d2c7dd3625
DIST strawberry-1.0.16.tar.xz 11248508 BLAKE2B cd44e116251eee869151598a576b61de8f2ddb664dd6790250570ef7ad19399223c3ccc2fb0bca79325dfa49abfd5bbbe4dd3eedff20ef32637f9b003b762959 SHA512 6048ef22287a11882c015d7de7405cece64382a65289edd635bde4c20c87c00f96231e3335f77cf62849ceaa33e62115784e43cbe8d638d3c6918b1b1948a1ac
DIST strawberry-1.0.17.tar.xz 11244908 BLAKE2B ad838be23bbf441e1617ccc45e48e54baa829f327fccfc8f3070fd211eaaaa00d690cecef36858f91b59a1114c4df84c9b72b98ec3affb56f9516167d6fb8484 SHA512 7629997f1734b537057b8e49ed443c48733ce5787ebf79939c77aa07f193d36e5ced15df62c03b784644fc058b3067d46e192a0de0cc9fb0a2338dc76d738973

Binary file not shown.

@ -1 +1 @@
Thu, 30 Mar 2023 04:39:55 +0000
Thu, 30 Mar 2023 08:39:59 +0000

@ -1 +1 @@
Thu, 30 Mar 2023 04:39:55 +0000
Thu, 30 Mar 2023 08:39:59 +0000

Binary file not shown.

@ -1,15 +0,0 @@
DEFINED_PHASES=compile configure install preinst prepare setup test
DEPEND=dev-java/bsf:2.3 java-virtuals/servlet-api:3.0 test? ( dev-java/ant-junit:0 ) source? ( app-arch/zip ) virtual/jdk:1.8 >=dev-java/java-config-2.2.0-r3 source? ( app-arch/zip ) >=dev-java/ant-core-1.8.2:0 dev-java/javatoolkit
DESCRIPTION=A small embeddable Java source interpreter
EAPI=7
HOMEPAGE=https://github.com/beanshell/beanshell
INHERIT=java-pkg-2 java-ant-2
IUSE=doc source test
KEYWORDS=amd64 ~arm arm64 ppc64 x86 ~amd64-linux ~x86-linux
LICENSE=LGPL-2.1
RDEPEND=dev-java/bsf:2.3 java-virtuals/servlet-api:3.0 >=virtual/jre-1.8 >=dev-java/java-config-2.2.0-r3 source? ( app-arch/zip )
RESTRICT=!test? ( test )
SLOT=0
SRC_URI=https://github.com/beanshell/beanshell/archive/2.0b6.tar.gz -> bsh-2.0b6.tar.gz
_eclasses_=java-ant-2 5a1b508f2544b7cac8ec27c170676de0 java-pkg-2 1794573de2f5124d88b64ee5dc9aabb4 java-utils-2 8c72ea36a4935f626b13a30141d0d39c multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=c3a61360fb8c1450e51dc796bf358959

@ -13,4 +13,4 @@ RESTRICT=test !test? ( test )
SLOT=0
SRC_URI=https://github.com/beanshell/beanshell/archive/2.1.1.tar.gz -> bsh-2.1.1.tar.gz
_eclasses_=java-pkg-2 1794573de2f5124d88b64ee5dc9aabb4 java-pkg-simple 7dacd744ab3fb5ec581318fefaa7a9e5 java-utils-2 8c72ea36a4935f626b13a30141d0d39c
_md5_=34e3219c2b204952e0628b3e6d8f9397
_md5_=c2b894c1e9522897465b54876842b96f

@ -4,10 +4,10 @@ DESCRIPTION=A non-interactive scripting language
EAPI=8
HOMEPAGE=https://www.skarnet.org/software/execline/
INHERIT=toolchain-funcs
KEYWORDS=~amd64 ~arm ~riscv x86
KEYWORDS=amd64 ~arm ~riscv x86
LICENSE=ISC
RDEPEND=>=dev-libs/skalibs-2.13.0.0:=
SLOT=0/2.9
SRC_URI=https://www.skarnet.org/software/execline/execline-2.9.2.1.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=85e6ae4e2b8675325c47156b1ba16a33
_md5_=3140ba1a19b8c6c2fa564227b710df5f

@ -3,9 +3,9 @@ DESCRIPTION=General-purpose libraries from skarnet.org
EAPI=8
HOMEPAGE=https://www.skarnet.org/software/skalibs/
INHERIT=toolchain-funcs
KEYWORDS=~amd64 ~arm ~arm64 ~riscv x86
KEYWORDS=amd64 ~arm ~arm64 ~riscv x86
LICENSE=ISC
SLOT=0/2.13
SRC_URI=https://www.skarnet.org/software/skalibs/skalibs-2.13.1.0.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=99608c871ffc24f9b0b89fa2a3e0c994
_md5_=ee27f4564d6eba86f7d05d9b708efbe5

@ -1,17 +1,17 @@
BDEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby27? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) test? ( ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) )
BDEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) ruby_targets_ruby27? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby32? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby32(-)] ) ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] ) test? ( ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] ) )
DEFINED_PHASES=compile configure install prepare setup test unpack
DEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] )
DEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] )
DESCRIPTION=Registry for information about MIME media type definitions
EAPI=8
HOMEPAGE=https://github.com/mime-types/mime-types-data
INHERIT=ruby-fakegem
IUSE=ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 doc test
IUSE=ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 ruby_targets_ruby32 doc test
KEYWORDS=~alpha amd64 arm arm64 ~hppa ~loong ppc ppc64 ~riscv ~s390 sparc x86 ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
LICENSE=MIT
RDEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] )
REQUIRED_USE=|| ( ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 )
RDEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] )
REQUIRED_USE=|| ( ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 ruby_targets_ruby32 )
RESTRICT=!test? ( test )
SLOT=3
SRC_URI=https://rubygems.org/gems/mime-types-data-3.2023.0218.1.gem
_eclasses_=estack 055c42df72f76a4f45ec92b35e83cd56 multilib d1408425c7c4a7669b9b17735404b693 ruby-fakegem b3d68f90713fe925c1833722c17f6ef8 ruby-ng 378d61ff0c0fe75e24cc380111c71424 ruby-utils 2412b1152083f1e866ae6df229d51d30 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=b5d674f4c107ceb5b0d1fe3e58a5d844
_md5_=f29a6813fa60bcd0009b051e82453a3e

@ -0,0 +1,17 @@
BDEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) ruby_targets_ruby27? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby32? ( doc? ( dev-ruby/rdoc[ruby_targets_ruby32(-)] ) ) ruby_targets_ruby27? ( test? ( dev-ruby/rake[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( test? ( dev-ruby/rake[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( test? ( dev-ruby/rake[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby32? ( test? ( dev-ruby/rake[ruby_targets_ruby32(-)] ) ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] ) test? ( ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] ) )
DEFINED_PHASES=compile configure install prepare setup test unpack
DEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] )
DESCRIPTION=This library reads and writes .netrc files
EAPI=8
HOMEPAGE=https://github.com/heroku/netrc
INHERIT=ruby-fakegem
IUSE=ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 ruby_targets_ruby32 doc test test
KEYWORDS=~amd64 ~arm ~arm64 ~x86
LICENSE=MIT
RDEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) ruby_targets_ruby32? ( virtual/rubygems[ruby_targets_ruby32(-)] )
REQUIRED_USE=|| ( ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 ruby_targets_ruby32 )
RESTRICT=!test? ( test ) !test? ( test )
SLOT=0
SRC_URI=https://rubygems.org/gems/netrc-0.11.0.gem
_eclasses_=estack 055c42df72f76a4f45ec92b35e83cd56 multilib d1408425c7c4a7669b9b17735404b693 ruby-fakegem b3d68f90713fe925c1833722c17f6ef8 ruby-ng 378d61ff0c0fe75e24cc380111c71424 ruby-utils 2412b1152083f1e866ae6df229d51d30 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=2e26007b3cf8ba925b00e986b0c4122c

@ -0,0 +1,17 @@
BDEPEND=test? ( ruby_targets_ruby27? ( dev-ruby/faraday:1[ruby_targets_ruby27(-)] >=dev-ruby/sawyer-0.9:0[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( dev-ruby/faraday:1[ruby_targets_ruby30(-)] >=dev-ruby/sawyer-0.9:0[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( dev-ruby/faraday:1[ruby_targets_ruby31(-)] >=dev-ruby/sawyer-0.9:0[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby27? ( test? ( dev-ruby/jwt[ruby_targets_ruby27(-)] dev-ruby/mime-types[ruby_targets_ruby27(-)] >=dev-ruby/netrc-0.7.7[ruby_targets_ruby27(-)] >=dev-ruby/rbnacl-7.1.1:6[ruby_targets_ruby27(-)] dev-ruby/vcr[ruby_targets_ruby27(-),json] dev-ruby/webmock:3[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( test? ( dev-ruby/jwt[ruby_targets_ruby30(-)] dev-ruby/mime-types[ruby_targets_ruby30(-)] >=dev-ruby/netrc-0.7.7[ruby_targets_ruby30(-)] >=dev-ruby/rbnacl-7.1.1:6[ruby_targets_ruby30(-)] dev-ruby/vcr[ruby_targets_ruby30(-),json] dev-ruby/webmock:3[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( test? ( dev-ruby/jwt[ruby_targets_ruby31(-)] dev-ruby/mime-types[ruby_targets_ruby31(-)] >=dev-ruby/netrc-0.7.7[ruby_targets_ruby31(-)] >=dev-ruby/rbnacl-7.1.1:6[ruby_targets_ruby31(-)] dev-ruby/vcr[ruby_targets_ruby31(-),json] dev-ruby/webmock:3[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby27? ( doc? ( dev-ruby/yard[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( doc? ( dev-ruby/yard[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( doc? ( dev-ruby/yard[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby27? ( test? ( dev-ruby/rspec:3[ruby_targets_ruby27(-)] ) ) ruby_targets_ruby30? ( test? ( dev-ruby/rspec:3[ruby_targets_ruby30(-)] ) ) ruby_targets_ruby31? ( test? ( dev-ruby/rspec:3[ruby_targets_ruby31(-)] ) ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) test? ( ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] ) )
DEFINED_PHASES=compile configure install prepare setup test unpack
DEPEND=ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] )
DESCRIPTION=Ruby toolkit for the Github API
EAPI=8
HOMEPAGE=https://github.com/octokit/octokit.rb
INHERIT=ruby-fakegem
IUSE=test ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 doc test test
KEYWORDS=~amd64 ~arm ~x86
LICENSE=MIT
RDEPEND=ruby_targets_ruby27? ( dev-ruby/faraday:1[ruby_targets_ruby27(-)] >=dev-ruby/sawyer-0.9:0[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( dev-ruby/faraday:1[ruby_targets_ruby30(-)] >=dev-ruby/sawyer-0.9:0[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( dev-ruby/faraday:1[ruby_targets_ruby31(-)] >=dev-ruby/sawyer-0.9:0[ruby_targets_ruby31(-)] ) ruby_targets_ruby27? ( dev-lang/ruby:2.7 ) ruby_targets_ruby30? ( dev-lang/ruby:3.0 ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) ruby_targets_ruby27? ( virtual/rubygems[ruby_targets_ruby27(-)] ) ruby_targets_ruby30? ( virtual/rubygems[ruby_targets_ruby30(-)] ) ruby_targets_ruby31? ( virtual/rubygems[ruby_targets_ruby31(-)] )
REQUIRED_USE=|| ( ruby_targets_ruby27 ruby_targets_ruby30 ruby_targets_ruby31 )
RESTRICT=!test? ( test ) !test? ( test ) !test? ( test )
SLOT=0
SRC_URI=https://github.com/octokit/octokit.rb/archive/v6.1.0.tar.gz -> octokit-6.1.0.tar.gz
_eclasses_=estack 055c42df72f76a4f45ec92b35e83cd56 multilib d1408425c7c4a7669b9b17735404b693 ruby-fakegem b3d68f90713fe925c1833722c17f6ef8 ruby-ng 378d61ff0c0fe75e24cc380111c71424 ruby-utils 2412b1152083f1e866ae6df229d51d30 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=69790e3da966e794f46d7248eba1d7a3

@ -14,4 +14,4 @@ RESTRICT=!test? ( test ) !test? ( test ) !test? ( test )
SLOT=0.8
SRC_URI=https://github.com/simplecov-ruby/simplecov/archive/v0.22.0.tar.gz -> simplecov-0.22.0.tar.gz
_eclasses_=estack 055c42df72f76a4f45ec92b35e83cd56 multilib d1408425c7c4a7669b9b17735404b693 ruby-fakegem b3d68f90713fe925c1833722c17f6ef8 ruby-ng 378d61ff0c0fe75e24cc380111c71424 ruby-utils 2412b1152083f1e866ae6df229d51d30 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=680bba2adfe98ce5bae5ab8849ee59c0
_md5_=fa1f3bb25a0189636c67676c25dbaaf8

File diff suppressed because one or more lines are too long

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install
DEPEND=net-libs/gnutls mail-mta/courier dev-db/opendbx dev-libs/nettle:= net-dns/libidn2:= dev-libs/libunistring:= dev-libs/libbsd
DESCRIPTION=DKIM filter for Courier-MTA
EAPI=8
HOMEPAGE=https://www.tana.it/sw/zdkimfilter
IUSE=debug
KEYWORDS=~amd64
LICENSE=GPL-3+
RDEPEND=net-libs/gnutls mail-mta/courier dev-db/opendbx dev-libs/nettle:= net-dns/libidn2:= dev-libs/libunistring:= dev-libs/libbsd
RESTRICT=test
SLOT=0
SRC_URI=https://www.tana.it/sw/zdkimfilter/zdkimfilter-3.15.tar.gz
_md5_=3fbac38ab5376adb6f31870b2ba444a7

@ -12,6 +12,6 @@ LICENSE=GPL-3
RDEPEND=dev-db/sqlite:= dev-libs/glib:2 dev-libs/protobuf:= dev-qt/qtconcurrent:5 dev-qt/qtcore:5 dev-qt/qtdbus:5 dev-qt/qtgui:5 dev-qt/qtnetwork:5[ssl] dev-qt/qtsql:5[sqlite] dev-qt/qtwidgets:5 dev-qt/qtx11extras:5 media-libs/alsa-lib media-libs/taglib x11-libs/libX11 cdda? ( dev-libs/libcdio:= ) gstreamer? ( media-libs/chromaprint:= media-libs/gstreamer:1.0 media-libs/gst-plugins-base:1.0 ) icu? ( dev-libs/icu:= ) ipod? ( media-libs/libgpod ) moodbar? ( sci-libs/fftw:3.0 ) mtp? ( media-libs/libmtp ) pulseaudio? ( media-sound/pulseaudio ) vlc? ( media-video/vlc ) gstreamer? ( media-plugins/gst-plugins-meta:1.0 media-plugins/gst-plugins-soup:1.0 media-plugins/gst-plugins-taglib:1.0 ) mtp? ( gnome-base/gvfs[mtp] ) udisks? ( sys-fs/udisks:2 )
REQUIRED_USE=cdda? ( gstreamer ) || ( gstreamer vlc )
SLOT=0
SRC_URI=https://github.com/strawberrymusicplayer/strawberry/releases/download/1.0.16/strawberry-1.0.16.tar.xz
SRC_URI=https://github.com/strawberrymusicplayer/strawberry/releases/download/1.0.17/strawberry-1.0.17.tar.xz
_eclasses_=cmake 7fb5980de96325cbab639f5b2187357c flag-o-matic 514815b1cc0dd4aeac177c2e812b3b1a multilib d1408425c7c4a7669b9b17735404b693 multiprocessing b4e253ab22cef7b1085e9b67c7a3b730 ninja-utils 76050953ad5b70d7e09a6ca55558db92 plocale 950fbaec7deeba41b5bcc0572cca99b9 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e xdg 4a14c5c24f121e7da66e5aab4a168c6e xdg-utils baea6080dd821f5562d715887954c9d3
_md5_=7373f49452340d8e86678d590d278aa9

@ -1,13 +1,13 @@
BDEPEND=app-arch/rpm2targz virtual/pkgconfig
DEFINED_PHASES=install nofetch postinst unpack
DEFINED_PHASES=install postinst unpack
DESCRIPTION=A remote security scanner for Linux - agent component
EAPI=8
HOMEPAGE=https://www.tenable.com/
INHERIT=rpm systemd
KEYWORDS=-* ~amd64
LICENSE=GPL-2 Nessus-EULA
RESTRICT=mirror fetch strip
LICENSE=GPL-2 Tenable-Master-Agreement
RESTRICT=mirror strip
SLOT=0
SRC_URI=NessusAgent-10.3.2-es8.x86_64.rpm
SRC_URI=amd64? ( https://www.tenable.com/downloads/api/v2/pages/nessus-agents/files/NessusAgent-10.3.2-es8.x86_64.rpm ) arm64? ( https://www.tenable.com/downloads/api/v2/pages/nessus-agents/files/NessusAgent-10.3.2-es8.aarch64.rpm )
_eclasses_=estack 055c42df72f76a4f45ec92b35e83cd56 multilib d1408425c7c4a7669b9b17735404b693 rpm f73e907469f65e52192f110dec72dce0 systemd 5f4bb0758df2e483babf68cd517078ca toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=75742f2594741daa0890b037f48f8aea
_md5_=07dec1b9bb3176a970ef2d7bc5d571f6

@ -1,13 +1,13 @@
BDEPEND=app-arch/rpm2targz virtual/pkgconfig
DEFINED_PHASES=install nofetch postinst unpack
DEFINED_PHASES=install postinst unpack
DESCRIPTION=A remote security scanner for Linux
EAPI=8
HOMEPAGE=https://www.tenable.com/
INHERIT=rpm systemd
KEYWORDS=-* ~amd64
LICENSE=GPL-2 Nessus-EULA
RESTRICT=mirror fetch strip
LICENSE=GPL-2 Tenable-Master-Agreement
RESTRICT=mirror strip
SLOT=0
SRC_URI=Nessus-10.5.0-es8.x86_64.rpm
SRC_URI=amd64? ( https://www.tenable.com/downloads/api/v2/pages/nessus/files/Nessus-10.5.0-es8.x86_64.rpm ) arm64? ( https://www.tenable.com/downloads/api/v2/pages/nessus/files/Nessus-10.5.0-es8.aarch64.rpm )
_eclasses_=estack 055c42df72f76a4f45ec92b35e83cd56 multilib d1408425c7c4a7669b9b17735404b693 rpm f73e907469f65e52192f110dec72dce0 systemd 5f4bb0758df2e483babf68cd517078ca toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=c3d08d45ddc90b14f94c977a743e1aa3
_md5_=9a762879378c75b59771e7fdcb8c4e36

@ -5,10 +5,10 @@ EAPI=8
HOMEPAGE=https://www.skarnet.org/software/s6/
INHERIT=toolchain-funcs
IUSE=+execline
KEYWORDS=~amd64 ~arm ~riscv x86
KEYWORDS=amd64 ~arm ~riscv x86
LICENSE=ISC
RDEPEND=>=dev-libs/skalibs-2.13.1.0:= execline? ( dev-lang/execline:= )
SLOT=0/2.11
SRC_URI=https://www.skarnet.org/software/s6/s6-2.11.3.0.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=3d689de63fa74dae3c676d52e116a159
_md5_=c9b53439a0f21021b7a1213d55accc35

@ -5,10 +5,10 @@ EAPI=8
HOMEPAGE=https://www.skarnet.org/software/s6-linux-init/
INHERIT=toolchain-funcs
IUSE=+sysv-utils
KEYWORDS=~amd64 ~arm x86
KEYWORDS=amd64 ~arm x86
LICENSE=ISC
RDEPEND=dev-lang/execline:= >=dev-libs/skalibs-2.13.0.0:= sys-apps/s6:=[execline] sysv-utils? ( !sys-apps/openrc[sysv-utils(-)] !sys-apps/systemd[sysv-utils] !sys-apps/sysvinit )
SLOT=0/1.1
SRC_URI=https://www.skarnet.org/software/s6-linux-init/s6-linux-init-1.1.0.0.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=534758b4b922fccb7b6206e88275c2ab
_md5_=11d9af65023dfbf9ffe65a1cb6026d74

@ -4,10 +4,10 @@ DESCRIPTION=Set of tiny linux utilities
EAPI=8
HOMEPAGE=https://www.skarnet.org/software/s6-linux-utils/
INHERIT=toolchain-funcs
KEYWORDS=~amd64 ~arm ~arm64 x86
KEYWORDS=amd64 ~arm ~arm64 x86
LICENSE=ISC
RDEPEND=>=dev-libs/skalibs-2.13.0.0:=
SLOT=0
SRC_URI=https://www.skarnet.org/software/s6-linux-utils/s6-linux-utils-2.6.1.1.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=1279a5eb720750de621722c44b3452b1
_md5_=c4c2bfcea8244896a56ae90214a2de1a

@ -4,10 +4,10 @@ DESCRIPTION=Set of tiny portable unix utilities
EAPI=8
HOMEPAGE=https://www.skarnet.org/software/s6-portable-utils/
INHERIT=toolchain-funcs
KEYWORDS=~amd64 ~arm x86
KEYWORDS=amd64 ~arm x86
LICENSE=ISC
RDEPEND=>=dev-libs/skalibs-2.13.0.0:=
SLOT=0
SRC_URI=https://www.skarnet.org/software/s6-portable-utils/s6-portable-utils-2.3.0.1.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=b141c824001ddb455698de79b7b2690d
_md5_=1b8aa1eea95bbd86528515a1af33efd3

@ -4,10 +4,10 @@ DESCRIPTION=Service manager for the s6 supervision suite
EAPI=8
HOMEPAGE=https://www.skarnet.org/software/s6-rc/
INHERIT=toolchain-funcs
KEYWORDS=~amd64 ~arm x86
KEYWORDS=amd64 ~arm x86
LICENSE=ISC
RDEPEND=dev-lang/execline:= dev-libs/skalibs:= >=sys-apps/s6-2.11.3.0:=[execline]
SLOT=0/0.5
SRC_URI=https://www.skarnet.org/software/s6-rc/s6-rc-0.5.4.1.tar.gz
_eclasses_=multilib d1408425c7c4a7669b9b17735404b693 toolchain-funcs 14a8ae365191b518fad51caad7a08f3e
_md5_=14d5cc246b846fb5c08fef6958e26f85
_md5_=f5f09dd4fb6598601795425e864d46fe

@ -0,0 +1,9 @@
DEFINED_PHASES=install
DESCRIPTION=Broadcom Bluetooth firmware
EAPI=8
HOMEPAGE=https://github.com/winterheart/broadcom-bt-firmware
KEYWORDS=~amd64 ~ppc64 ~x86
LICENSE=broadcom_bcm20702 MIT
SLOT=0
SRC_URI=https://github.com/winterheart/broadcom-bt-firmware/archive/v12.0.1.1105_p4.tar.gz -> broadcom-bt-firmware-12.0.1.1105_p4.tar.gz
_md5_=f876ec5c1755e775823942df2a1d1e7c

@ -5,9 +5,10 @@ EAPI=8
HOMEPAGE=https://wordpress.org/
INHERIT=webapp
IUSE=+akismet examples +themes vhosts vhosts
KEYWORDS=~amd64 ~arm ~hppa ~ppc ~ppc64 ~riscv ~sparc ~x86
LICENSE=GPL-2+
RDEPEND=virtual/httpd-php || ( dev-lang/php[mysql] dev-lang/php[mysqli] ) app-admin/webapp-config
SLOT=6.2_rc3
SRC_URI=https://wordpress.org/wordpress-6.2-RC3.tar.gz
SLOT=6.2
SRC_URI=https://wordpress.org/wordpress-6.2.tar.gz
_eclasses_=webapp 1aad5c010cfdf11d0376c80467b0de4c
_md5_=90f723f2a3581269d6e0943371e78afc

@ -1 +1 @@
Thu, 30 Mar 2023 04:39:55 +0000
Thu, 30 Mar 2023 08:39:59 +0000

@ -1 +1 @@
Thu Mar 30 04:39:55 AM UTC 2023
Thu Mar 30 08:39:59 AM UTC 2023

@ -1 +1 @@
Thu, 30 Mar 2023 05:00:01 +0000
Thu, 30 Mar 2023 09:00:01 +0000

@ -1 +1 @@
5366352fd0ad09a399273682d600ab414ea226a8 1680148711 2023-03-30T03:58:31+00:00
f2d3b7ee58ff8ed4f242e02f826a7eccc9a8299e 1680165081 2023-03-30T08:31:21+00:00

@ -1 +1 @@
1680151201 Thu 30 Mar 2023 04:40:01 AM UTC
1680165601 Thu 30 Mar 2023 08:40:01 AM UTC

@ -1 +1 @@
Thu, 30 Mar 2023 04:39:55 +0000
Thu, 30 Mar 2023 08:39:59 +0000

Binary file not shown.

@ -1 +1,2 @@
DIST NessusAgent-10.3.2-es8.aarch64.rpm 17125280 BLAKE2B 323f41cc201d0b6348473af0cc297154db600f29560ef10a900aeb885b9a1f9577a4b546bb568a102f344856c67480de8beaa2652698ec62b73cd5b2db0bb0f3 SHA512 de49b421ebf4d72c771af2b1d64c25220d2062c3907f3c945061a09e97a2d8855cac668206bf388729365bbd80d58293109a196c1e36c511a70f75055bdef729
DIST NessusAgent-10.3.2-es8.x86_64.rpm 18387452 BLAKE2B 2882209a43fe0d295543399e84e88b2db4738fdc1ad488c5e3448edb052c70f2482e9355dcebdcfa57ec067bfe7830889a5ce0fe99ab02a60c00103e740e4be9 SHA512 c663bb385197988c9c4f55963232dcf82c00456f64b683cd2b5c0092f2c776d89bea731148b5940f839f89104245fa2011486bbd7c78a64aabd310701f547727

@ -9,13 +9,16 @@ MY_P="NessusAgent-${PV}-es8"
DESCRIPTION="A remote security scanner for Linux - agent component"
HOMEPAGE="https://www.tenable.com/"
SRC_URI="${MY_P}.x86_64.rpm"
SRC_URI="
amd64? ( https://www.tenable.com/downloads/api/v2/pages/${PN/-bin/s}/files/${MY_P}.x86_64.rpm )
arm64? ( https://www.tenable.com/downloads/api/v2/pages/${PN/-bin/s}/files/${MY_P}.aarch64.rpm )
"
LICENSE="GPL-2 Nessus-EULA"
LICENSE="GPL-2 Tenable-Master-Agreement"
SLOT="0"
KEYWORDS="-* ~amd64"
RESTRICT="mirror fetch strip"
RESTRICT="mirror strip"
QA_PREBUILT="opt/nessus_agent/bin/nasl
opt/nessus_agent/bin/nessus-mkrand
@ -30,11 +33,6 @@ QA_PREBUILT="opt/nessus_agent/bin/nasl
S="${WORKDIR}"
pkg_nofetch() {
einfo "Please download ${A} from ${HOMEPAGE}downloads/nessus-agents"
einfo "The archive should then be placed into your DISTDIR directory."
}
src_install() {
# Using doins -r would strip executable bits from all binaries
cp -pPR "${S}"/opt "${D}"/ || die "Failed to copy files"

@ -1 +1,2 @@
DIST Nessus-10.5.0-es8.aarch64.rpm 55558460 BLAKE2B 3840a23c109b8edfaf12ac18b1d0eec889d41fb03acd46a7bb801923c85699a4d0b050727a5665cd70357cbb439e610f0243e00e8b8fffc04318b761f1aa58ca SHA512 399e15e1cae61292350ae6aa9e79bbcb806cf39b432da651ee16c00bbc164b87e4ac1156cfa42889819dbeaa0bd2d2227aba3b885e4c32f04b69331c89c330e5
DIST Nessus-10.5.0-es8.x86_64.rpm 56926472 BLAKE2B 5434a89ca806749aebd535b905f473dd43a7a892a5da81ccec69f6f362cbab6115c5a8001bdfdba050dff3a1b60b5e131f6aa6ff04080226565d92131977c952 SHA512 329675aa7cb727a8b7e281067489c343c22beea5ebde619208533df89dd89caaf721047fcddf2f193ce18c2748ec9cd4199e44196712427f805ba95728ee92ac

@ -9,13 +9,16 @@ MY_P="Nessus-${PV}-es8"
DESCRIPTION="A remote security scanner for Linux"
HOMEPAGE="https://www.tenable.com/"
SRC_URI="${MY_P}.x86_64.rpm"
SRC_URI="
amd64? ( https://www.tenable.com/downloads/api/v2/pages/${PN%-bin}/files/${MY_P}.x86_64.rpm )
arm64? ( https://www.tenable.com/downloads/api/v2/pages/${PN%-bin}/files/${MY_P}.aarch64.rpm )
"
LICENSE="GPL-2 Nessus-EULA"
LICENSE="GPL-2 Tenable-Master-Agreement"
SLOT="0"
KEYWORDS="-* ~amd64"
RESTRICT="mirror fetch strip"
RESTRICT="mirror strip"
QA_PREBUILT="opt/nessus/bin/nasl
opt/nessus/bin/ndbg
@ -32,11 +35,6 @@ QA_PREBUILT="opt/nessus/bin/nasl
S="${WORKDIR}"
pkg_nofetch() {
einfo "Please download ${A} from ${HOMEPAGE}downloads/nessus"
einfo "The archive should then be placed into your DISTDIR directory."
}
src_install() {
# Using doins -r would strip executable bits from all binaries
cp -pPR "${S}"/opt "${D}"/ || die "Failed to copy files"

Binary file not shown.

@ -33,6 +33,33 @@
#--- END OF EXAMPLES ---
# Hans de Graaff <graaff@gentoo.org> (2023-03-30)
# Ships a Certificate Authority bundle from 2014. Not needed on Gentoo
# since we use ca-certificates. Masked for removal on 2023-04-30.
dev-ruby/certified
# Hans de Graaff <graaff@gentoo.org> (2023-03-30)
# ruby27-only package. Last release 5 years ago. Does not build with
# modern C compilers. classifier-reborn depends on this package, and is
# itself a dependency for the now-masked jekyll. Masked for removal on
# 2023-04-30.
dev-ruby/rb-gsl
dev-ruby/classifier-reborn
# Hans de Graaff <graaff@gentoo.org> (2023-03-30)
# ruby27-only package for securily loading YAML files. No longer
# maintained. Broken with newer versions of Psych which is shipped by
# default in Ruby and now supports secure loading by default. Migrate to
# Psych. All packages depending directly or indirectly on safe_yaml have
# also been included. Masked for removal on 2023-04-30.
dev-ruby/safe_yaml
dev-ruby/pathutil
www-apps/jekyll
www-apps/jekyll-coffeescript
www-apps/jekyll-sass-converter
www-apps/jekyll-sitemap
www-apps/jekyll-watch
# Hans de Graaff <graaff@gentoo.org> (2023-03-29)
# ruby27-only slot of rspec. Please use rspec:3 instead. Masked for
# removal on 2023-04-28.

Binary file not shown.

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0/$(ver_cut 1-2)"
KEYWORDS="~amd64 ~arm x86"
KEYWORDS="amd64 ~arm x86"
IUSE="+sysv-utils"
RDEPEND="

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0"
KEYWORDS="~amd64 ~arm ~arm64 x86"
KEYWORDS="amd64 ~arm ~arm64 x86"
RDEPEND=">=dev-libs/skalibs-2.13.0.0:="
DEPEND="${RDEPEND}"

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0"
KEYWORDS="~amd64 ~arm x86"
KEYWORDS="amd64 ~arm x86"
RDEPEND=">=dev-libs/skalibs-2.13.0.0:="
DEPEND="${RDEPEND}"

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0/$(ver_cut 1-2)"
KEYWORDS="~amd64 ~arm x86"
KEYWORDS="amd64 ~arm x86"
RDEPEND="
dev-lang/execline:=

@ -11,7 +11,7 @@ SRC_URI="https://www.skarnet.org/software/${PN}/${P}.tar.gz"
LICENSE="ISC"
SLOT="0/$(ver_cut 1-2)"
KEYWORDS="~amd64 ~arm ~riscv x86"
KEYWORDS="amd64 ~arm ~riscv x86"
IUSE="+execline"
RDEPEND="

Binary file not shown.

@ -1 +1,2 @@
DIST broadcom-bt-firmware-12.0.1.1105_p3.tar.gz 2332072 BLAKE2B 819a95230a19c1f2dcdd0648ae9f29275ddfc133c86c0fcf85657aa1e52baede10e061e5b2a2c0c6b795d83813f86a67ea0378c21b0f2b961439a146241127d8 SHA512 96de9704d392c0d7bbdc4a094d7fbaf3904854af2ac05081cff7c29cfc11690a47e45674af82af33a0a9741a44c68bf6e3801ccdaaa84de8ba0d36039d89f412
DIST broadcom-bt-firmware-12.0.1.1105_p4.tar.gz 2332067 BLAKE2B cc6c2b7b30ec1d7b3cedb1a836be603db60e48d13b02108e7ce4b72dfddea9997d115a4af25f6192c54d4ad4c0acb259b7079885fadf41e9e2e58cdaabf62dad SHA512 f37017d6ae17ed89199e9c87e2f603ba21e278ba75c5c0a62f9b0ed8f2f9118f42e19486cc73b3e9153db79699909581a4f5154a6ce862343f50905eb43afcfa

@ -0,0 +1,18 @@
# Copyright 1999-2023 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
DESCRIPTION="Broadcom Bluetooth firmware"
HOMEPAGE="https://github.com/winterheart/broadcom-bt-firmware"
SRC_URI="https://github.com/winterheart/${PN}/archive/v${PV}.tar.gz -> ${P}.tar.gz"
LICENSE="broadcom_bcm20702 MIT"
SLOT="0"
KEYWORDS="~amd64 ~ppc64 ~x86"
src_install() {
insinto /lib/firmware
doins -r brcm
dodoc DEVICES.md README.md
}

@ -1,5 +1,15 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "https://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<!-- maintainer-needed -->
<maintainer type="person" proxied="yes">
<email>azamat.hackimov@gmail.com</email>
<name>Azamat H. Hackimov</name>
</maintainer>
<maintainer type="project" proxied="proxy">
<email>proxy-maint@gentoo.org</email>
<name>Proxy Maintainers</name>
</maintainer>
<upstream>
<remote-id type="github">winterheart/broadcom-bt-firmware</remote-id>
</upstream>
</pkgmetadata>

Binary file not shown.

@ -1,2 +1,2 @@
DIST wordpress-6.1.1.tar.gz 22751086 BLAKE2B fbbee51219e4237236c39255deb9e31e566c630cfc66f0c4744fec249ae1d07473a6222b7ec5d84079e616d8d2e790521e57809d357ab56582b4a292dbad82f1 SHA512 b50dd9b5e1628a0285d3f0121d6b4cb3617fb696907ef06c935b40d0a46c9853ce12200e011a58675830602aa6d5b6470a98e8cefeec0f7464145bdc344780bb
DIST wordpress-6.2-RC3.tar.gz 23018903 BLAKE2B 268299759a2a412f60d33162a54f677acb424100417bca7e207be5d5e5fb9a230f3a9f6db1039f93ea0513fe4be3f5622b46a1f598b56af08bb4185c56e6103d SHA512 925a3456a61655035d0162a5051307336b6e586aca216a45cc17239266c6e6288924ff6610409d20759bf083c36619e77335852b67ab302d9892cacd2d6dec17
DIST wordpress-6.2.tar.gz 23018887 BLAKE2B 796a0e5c07c8628fbb6406f79b31123f4328f628b8814b02d506f4aed7217ccc5fc07aff3f441be0f1aa55fe8b9a4c184b2b5d0ed0892f1dedddab101632a70d SHA512 207e2d7aad658772f33c91ed37440b06029de7977847efde5ccd6b4687e7430f3f1a6d9e6d40d1b09d0565ed12adc1e25dc4f34a0102aae2899ef9a8ef8b3baf

Loading…
Cancel
Save