head	1.2;
access;
symbols
	pkgsrc-2026Q1:1.2.0.40
	pkgsrc-2026Q1-base:1.2
	pkgsrc-2025Q4:1.2.0.38
	pkgsrc-2025Q4-base:1.2
	pkgsrc-2025Q3:1.2.0.36
	pkgsrc-2025Q3-base:1.2
	pkgsrc-2025Q2:1.2.0.34
	pkgsrc-2025Q2-base:1.2
	pkgsrc-2025Q1:1.2.0.32
	pkgsrc-2025Q1-base:1.2
	pkgsrc-2024Q4:1.2.0.30
	pkgsrc-2024Q4-base:1.2
	pkgsrc-2024Q3:1.2.0.28
	pkgsrc-2024Q3-base:1.2
	pkgsrc-2024Q2:1.2.0.26
	pkgsrc-2024Q2-base:1.2
	pkgsrc-2024Q1:1.2.0.24
	pkgsrc-2024Q1-base:1.2
	pkgsrc-2023Q4:1.2.0.22
	pkgsrc-2023Q4-base:1.2
	pkgsrc-2023Q3:1.2.0.20
	pkgsrc-2023Q3-base:1.2
	pkgsrc-2023Q2:1.2.0.18
	pkgsrc-2023Q2-base:1.2
	pkgsrc-2023Q1:1.2.0.16
	pkgsrc-2023Q1-base:1.2
	pkgsrc-2022Q4:1.2.0.14
	pkgsrc-2022Q4-base:1.2
	pkgsrc-2022Q3:1.2.0.12
	pkgsrc-2022Q3-base:1.2
	pkgsrc-2022Q2:1.2.0.10
	pkgsrc-2022Q2-base:1.2
	pkgsrc-2022Q1:1.2.0.8
	pkgsrc-2022Q1-base:1.2
	pkgsrc-2021Q4:1.2.0.6
	pkgsrc-2021Q4-base:1.2
	pkgsrc-2021Q3:1.2.0.4
	pkgsrc-2021Q3-base:1.2
	pkgsrc-2021Q2:1.2.0.2
	pkgsrc-2021Q2-base:1.2
	pkgsrc-2021Q1:1.1.0.20
	pkgsrc-2021Q1-base:1.1
	pkgsrc-2020Q4:1.1.0.18
	pkgsrc-2020Q4-base:1.1
	pkgsrc-2020Q3:1.1.0.16
	pkgsrc-2020Q3-base:1.1
	pkgsrc-2020Q2:1.1.0.14
	pkgsrc-2020Q2-base:1.1
	pkgsrc-2020Q1:1.1.0.10
	pkgsrc-2020Q1-base:1.1
	pkgsrc-2019Q4:1.1.0.12
	pkgsrc-2019Q4-base:1.1
	pkgsrc-2019Q3:1.1.0.8
	pkgsrc-2019Q3-base:1.1
	pkgsrc-2019Q2:1.1.0.6
	pkgsrc-2019Q2-base:1.1
	pkgsrc-2019Q1:1.1.0.4
	pkgsrc-2019Q1-base:1.1
	pkgsrc-2018Q4:1.1.0.2
	pkgsrc-2018Q4-base:1.1;
locks; strict;
comment	@# @;


1.2
date	2021.05.20.19.24.13;	author hauke;	state Exp;
branches;
next	1.1;
commitid	l0MsnkmPL5c23VTC;

1.1
date	2018.10.17.13.54.39;	author hauke;	state Exp;
branches;
next	;
commitid	QdWuX4YE39BLMjWA;


desc
@@


1.2
log
@sysutils/tsm8 -- TSM client update to v8.1.12

pkgsrc changes: cli client tested with FreeBSD 13

Upstream changes:

V8.1.12

Security Bulletin: Stack-based Buffer Overflow vulnerabilities in IBM
Spectrum Protect Back-up Archive Client and IBM Spectrum Protect for
Space Management (CVE-2021-29672, CVE-2021-20546)
https://www.ibm.com/support/pages/node/6445497

Security Bulletin: Vulnerabilities in OpenSSL affect IBM Spectrum
Protect Backup-Archive Client NetApp Services (CVE-2020-1971,
CVE-2021-23840, CVE-2021-23841)
https://www.ibm.com/support/pages/node/6445489

Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM
Spectrum Protect Backup-Archive Client, IBM Spectrum Protect for Space
Management, and IBM Spectrum Protect for Virtual Environments
(CVE-2020-27221, CVE-2020-14782)
https://www.ibm.com/support/pages/node/6445483

To find the fixed APARs in this version, see: IBM Spectrum Protect
Backup-Archive Client 8.1.12 APARs and 8.1.12.x APARs
https://www.ibm.com/support/pages/node/6429561
@
text
@===========================================================================
$NetBSD: MESSAGE,v 1.1 2018/10/17 13:54:39 hauke Exp $

Tivoli Storage Manager Client has been installed in
		${EMULDIR}/opt/tivoli
with binaries in
		${EMULDIR}/opt/tivoli/tsm/client/ba/bin
and configuration in
		${PKG_SYSCONFDIR}

NetBSD configuration hints:

- TSM expects ${EMULDIR}/etc/mtab to exist, and be meaningful.
  The suse_base package sets up a symlink to ${EMULDIR}/proc/mounts,
  which works on NetBSD 3 or newer if you mount procfs like
  >> procfs  ${EMULDIR}/linux/proc  procfs  ro,linux  0 0 <<
  in /etc/fstab.
  Alternatively, make ${EMULDIR}/etc/mtab a symlink to /etc/fstab.

- Make sure 'passworddir' is set in tsm.sys, so that the passwd file
  ends up in ${PKG_SYSCONFDIR} instead of the shadow hierarchy.

- The environment variables DSM_DIR, DSM_CONFIG, DSM_LOG
  need to be set properly. DSM_LOG may inadvertently end up in the emul
  shadow hierarchy.
  There is a sample start script in ${PREFIX}/share/examples/tsm.

- For backing up the native filesystem hierarchy, use a construct
  like "ln -s / /.`hostname`" to break out of the emul shadow hierarchy.

===========================================================================
@


1.1
log
@Add IBM Spectrum Protect (aka Tivoli Storage Manager) client.
@
text
@d2 1
a2 1
$NetBSD$
d13 2
a14 2
- TSM expects ${EMULDIR}/etc/mtab to exist and be meaningful. The
  suse_base package sets up a symlink to ${EMULDIR}/proc/mounts,
d16 1
a16 1
  >> procfs  /emul/linux/proc  procfs  ro,linux  0 0 <<
d20 1
a20 1
- Make sure 'passworddir' is set in tsm.sys so that the passwd file
a30 3
- If you want to use the GUI client dsmj (option java), the directory
  containing the java binary needs to be in PATH.

@

