*/*: Bump PORTREVISION for known Qt private API abusers
Qt 6.10.1 edition.
These ports are known to directly use or link to a library that uses the
Qt private API and must be rebuilt with every Qt update.
Qt *public* API/ABI compatability is excellent, so most consumers don't
need to necessarily be rebuilt between patch or even minor releases, but
use of the private API breaks this compatibility between even patch
releases and its use is highly discouraged.
This list [1] is based on histortical data. We don't have time to
revisit every port on the list with each Qt update, so if your port has
dropped Qt private headers and was bumped in error, please remove it
yourself if you have write access to the Wiki or alert someone on kde@.
[1] https://wiki.freebsd.org/KDE/Qt
security/easy-rsa: update to v3.2.5
Also convert files/pkg-message.in to UCL
so it's also displayed on upgrade not only on install.
ChangeLog: https://github.com/OpenVPN/easy-rsa/releases/tag/v3.2.5
MFH: 2025Q4 in a few days (due to UCL pkg-message)
PyQt6: Update to 6.10.0
Update tools:
devel/py-qtbuilder: Update to 1.19.1
devel/py-qt5-sip: Update to 12.17.2
devel/py-qt6-sip: Update to 13.10.3
devel/py-sip: Update to 6.15.0
Qt6: Update to 6.10.1
I'm not giving the usual fanfare. This has been an absolute slog.
Ports changes:
qt6-base: Added WAYLAND option. This is congruent with the X11 option.
We really don't recommend disabling this option, but it is
available for advanced users who don't want wayland for
whatever reason.