net/castor - The NetBSD Packages Collection

Client for plain-text protocols like Gemini, Gopher and Finger

Graphical client for plain-text protocols written in Rust with GTK.
It currently supports the Gemini, Gopher and Finger protocols.

Build dependencies

lang/rust pkgtools/x11-links x11/xcb-proto x11/xorgproto x11/xcb-proto devel/glib2-tools pkgtools/mktools pkgtools/digest devel/pkgconf pkgtools/cwrappers

Runtime dependencies

devel/at-spi2-core devel/at-spi2-core graphics/cairo graphics/cairo sysutils/desktop-file-utils graphics/gdk-pixbuf2 devel/glib2 x11/gtk3 graphics/hicolor-icon-theme devel/pango devel/at-spi2-core graphics/cairo sysutils/desktop-file-utils graphics/gdk-pixbuf2 devel/glib2 x11/gtk3 graphics/hicolor-icon-theme devel/pango

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64castor-0.9.0nb9.tgz
NetBSD 10.0aarch64castor-0.9.0nb9.tgz
NetBSD 10.0earmv7hfcastor-0.9.0nb9.tgz
NetBSD 10.0earmv7hfcastor-0.9.0nb7.tgz
NetBSD 10.0earmv7hfcastor-0.9.0nb9.tgz
NetBSD 10.0i386castor-0.9.0nb9.tgz
NetBSD 10.0i386castor-0.9.0nb9.tgz
NetBSD 10.0powerpccastor-0.9.0nb3.tgz
NetBSD 10.0powerpccastor-0.9.0nb7.tgz
NetBSD 10.0powerpccastor-0.9.0nb7.tgz
NetBSD 10.0sparc64castor-0.9.0nb9.tgz
NetBSD 10.0sparc64castor-0.9.0nb9.tgz
NetBSD 10.0x86_64castor-0.9.0nb9.tgz
NetBSD 10.0x86_64castor-0.9.0nb9.tgz
NetBSD 9.0earmv7hfcastor-0.9.0nb7.tgz
NetBSD 9.0earmv7hfcastor-0.9.0nb9.tgz
NetBSD 9.0i386castor-0.9.0nb9.tgz
NetBSD 9.0i386castor-0.9.0nb9.tgz
NetBSD 9.0powerpccastor-0.9.0nb7.tgz
NetBSD 9.0powerpccastor-0.9.0nb3.tgz
NetBSD 9.0powerpccastor-0.9.0nb7.tgz
NetBSD 9.0x86_64castor-0.9.0nb9.tgz
NetBSD 9.0x86_64castor-0.9.0nb9.tgz
NetBSD 9.3x86_64castor-0.9.0nb9.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.