aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* MFH: r502567Jan Beich2019-05-254-4/+0
| | | | | | | | | gecko: drop unused libvorbis dep after r485460 Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=502588
* MFH: r502566 r502585Jan Beich2019-05-252-3/+3
| | | | | | | | | www/firefox: require more recent icu/rust/cbindgen after r490910/r501604 Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=502587
* MFH: r502572Tobias Kortkamp2019-05-251-3/+8
| | | | | | | | | | | | net-p2p/ctcs: Install with executable permissions and correct shebang PR: 238116 Submitted by: debdrup@gmail.com Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=502573
* MFH: r502459Lars Engels2019-05-253-6/+6
| | | | | | | | | net-mgmt/icinga2: Update to 2.10.5 Approved by: ports-secteam (miwi) Notes: svn path=/branches/2019Q2/; revision=502508
* MFH: r502340 net-mgmt/nagios-check_smartmon: Fix ValueError with some drive ↵Kubilay Kocak2019-05-242-11/+79
| | | | | | | | | | | | | | | | | | | | | | | | | values After upgrading to version 20100318_4, users reported ValueError for some disks [1] Also fix Python 3.x compatibility [2] While I'm here: - Pet portlint, NO_* in USE{S} section - Make concurrent-safe, installs executables in libexec PR: 236873 Reported by: Thomas Eckhardt <freebsd eckieck de> [1] Submitted by: Thomas Eckhardt <freebsd eckieck de> [1] Submitted by: Krzysztof <ports bsdserwis com> (maintainer) [2] Approved by: Krzysztof <ports bsdserwis com> (maintainer) Approved by: ports-secteam (miwi, blanket: runtime bugfix) Notes: svn path=/branches/2019Q2/; revision=502450
* MFH: r501964 devel/py-cbor2: Remove Python 3 support restrictionKubilay Kocak2019-05-243-4/+47
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This package supports Python 3.x support, so allow it accordingly. It is required for an upcoming www/py-autobahn update (Python 2/3 compatible). During QA, a UnicodeDecodeError was observed running tests under Python 3: File "/usr/local/lib/python3.6/site-packages/py/_vendored_packages/iniconfig.py", line 82, in _parse for lineno, line in enumerate(line_iter): File "/usr/local/lib/python3.6/encodings/ascii.py", line 26, in decode return codecs.ascii_decode(input, self.errors)[0] UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 165: ordinal not in range(128) pytest uses the py package, which vendors the iniconfig package, which isn't unicode aware [1][2][3]. Patch out unicode characters from setup.cfg accordingly until it's resolved. While investigating the cause of the above issue, a fix for setup.cfg's encoding was identified, which removes the need to set the locale via USE_LOCALE so remove it accordingly. While I'm here: - Pet portlint, spurious space at end of line in pkg-descr - Add LICENSE_FILE/TEST_DEPENDS/test target/NO_ARCH [1] https://github.com/pytest-dev/pytest/issues/3799 [2] https://github.com/RonnyPfannschmidt/iniconfig/issues/5 [3] https://github.com/RonnyPfannschmidt/iniconfig/issues/4 portlint: OK (looks fine.) porttest: OK (poudriere: 12amd64{py36,py27}) maketest: 215 passed, 1 skipped in 3.29 seconds (Python 2.7) maketest: 209 passed, 7 skipped in 3.07 seconds (Python 3.6) Approved by: portmgr (blanket: ports/framework compliance) Approved by: ports-secteam (joneum, blanket: ports/framework compliance) Notes: svn path=/branches/2019Q2/; revision=502449
* MFH: r501563 textproc/py-rdflib: Make concurrent safeKubilay Kocak2019-05-241-4/+12
| | | | | | | | | | | | | | | | This package installs scripts into LOCALBASE/bin, so must be concurrent safe so packages for multiple Python versions don't conflict [1] on installation. [1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-May/116293.html Reported by: Luis Espinoza Jr. <ljejr hotmail com> (via freebsd-ports) [1] Approved by: koobs (python, maintainer) Approved by: ports-secteam (blanket: port bug(s)) Notes: svn path=/branches/2019Q2/; revision=502448
* MFH: r500847 comms/hylafax: Update to 6.0.7Kubilay Kocak2019-05-244-26/+17
| | | | | | | | | | | | | | - Remove upstreamed [1] patch-libhylafax_FaxRecvInfo.c++ - Pet portlint: section order, deprecated @exec [1] http://git.hylafax.org/HylaFAX?a=commit;h=dfc8a6ffe5a6031c6df716186681f92dac0d07cb Security: 3df5a920-6edc-11e9-a44b-0050562a4d7b Approved by: ports-secteam (joneum) Notes: svn path=/branches/2019Q2/; revision=502447
* MFH: devel/py-buildbot{-*}: Update to 2.2.0 (r500101 r500102 r500578)Kubilay Kocak2019-05-2416-104/+58
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | buildbot: - Now python 3 only (3.5+) - Add missing tests_requires to setup.py buildbot-worker: - Retains Python 2/3 compatibility - Remove setup.py patch (upstreamed) Changelog: https://docs.buildbot.net/current/relnotes/index.html#buildbot-2-2-0-2019-04-07 Security: 5536ea5f-6814-11e9-a8f7-0050562a4d7b Unbreak devel/py-buildbot-*: Limit to Python 3.5+ These packages only support Python 3.x [1], currently failing to build: File "/usr/local/lib/python2.7/site-packages/buildbot_pkg.py", line 254, in run super().run() TypeError: super() takes at least 1 argument (0 given) antoine@ fixed fallout in py-buildbot-www in ports r500102 [1] https://github.com/buildbot/buildbot/commit/403722c20e7f96707be3d15db54b25f472b8a525 Reported by: pkg-fallout Approved by: ports-secteam (joneum (r500101), blanket: build fix) Notes: svn path=/branches/2019Q2/; revision=502446
* MFH: r499978 devel/py-posix_ipc: Update to 1.0.4Kubilay Kocak2019-05-243-16/+19
| | | | | | | | | | | Changelog: http://semanchuk.com/philip/posix_ipc/history.html Approved by: ports-secteam (bugfix release(s)) Notes: svn path=/branches/2019Q2/; revision=502445
* MFH: r499976 mail/py-spambayes: Update to 1.1b3Kubilay Kocak2019-05-242-3/+4
| | | | | | | Approved by: ports-secteam (blanket: bugfix release(s)) Notes: svn path=/branches/2019Q2/; revision=502444
* MFH: audio/lv2: r499627 r502442Kubilay Kocak2019-05-241-6/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | audio/lv2: Fix Python (3.x) build, Add missing dependencies While lv2 itself works fine with any Python version we support, the build fails using a Python > 3.6, since the build bundles an old version of waf. waf upstream fixed the bug in a later version. [1] Restrict Python to up to 3.6 for now. [2] While here: - Add missing dependencies identified in QA. [3] - Pet portlint (USES order) [1] https://gitlab.com/ita1024/waf/commit/facdc0b173d933073832c768ec1917c553cb369c PR: 235103 Reported by: cs [3] Submitted by: Charlie Li <ml+freebsd vishwin info> [2][3] Approved by: Michael Beer <beerml sigma6audio de> audio/lv2: Remove CONFLICTS_INSTALL lv2core expired and was deleted on 2016-11-30 in ports r427460 I only noted this after committing ports r499627, so remove it accordingly. PR: 235103 Approved by: Michael Beer <beerml sigma6audio de> (maintainer) Approved by: ports-secteam (blanket: build fix, missing dependencies) Notes: svn path=/branches/2019Q2/; revision=502443
* MFH: mail/exim: r499265 r499536Kubilay Kocak2019-05-241-8/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | mail/exim: Rename LMDB_LIBS to _LMDB_LIBS It otherwise looks like an options helper that appears after bsd.port.options.mk which will be flagged as a DEV_ERROR after D19553. Rename LMDB_INCLUDES too for consistency. mail/exim: Fix build (linker) flags "-export-dynamic" in EXIM_DYNAMIC_LDFLAGS is a linker option, currently producing a warning during build: /usr/bin/ld: warning: cannot find entry symbol xport-dynamic; defaulting to 00000000004019c0 The only reason that plugin modules work is that the option is redundant with -rdynamic. This change makes the minimum necessary change not relying on linker argument compatibility (- vs --). PR: 236426 Submitted by: <andrew tao11 riddles org uk> Approved by: portmgr (maintainer timeout: ~6 weeks, "just fix it") Approved by: ports-secteam (blanket: port bug(s)) Notes: svn path=/branches/2019Q2/; revision=502438
* MFH: r499535 x11/xsetroot: Fix minor pkg-descr typoKubilay Kocak2019-05-241-1/+1
| | | | | | | | | | | PR: 237431 Submitted by: Ruslan Garipov <brigadir15 gmail com> Approved by: portmgr (blanket: "just fix it") Approved by: ports-secteam (blanket: just fix it) Notes: svn path=/branches/2019Q2/; revision=502437
* MFH: r499534 x11/xsetroot: Fix minor pkg-descr typoKubilay Kocak2019-05-241-1/+1
| | | | | | | | | | | PR: 237431 Submitted by: Ruslan Garipov <brigadir15 gmail com> Approved by: portmgr (blanket: "just fix it") Approved by: ports-secteam (blanket: just fix it) Notes: svn path=/branches/2019Q2/; revision=502436
* MFH: multimedia/libbluray: r498276 r499532Kubilay Kocak2019-05-243-11/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update to upstream release 1.1.1 While on it: - Pet portlint - Fix missing USES=gnome multimedia/libbluray: Fix environment variable conflict with portmaster libbluray (> 1.0.2,1) uses the PACKAGES variable in its configure scripts that contains the names of packages it depends on. Portmaster also uses the PACKAGES environment variable. Using portmaster to install libbluray results in a corrupted libbluray pkgconfig file containing portmasters PACKAGES path: Requires.private: /usr/home/koobs/repos/freebsd/ports/packages libxml-2.0 freetype2 fontconfig This breaks libbluray consumers such as ffmpeg. This change nulls out the PACKAGES variable during the configure stage of the build to prevent the issue. [1] While I'm here, - Sort JAVA_* and USE_* entries. PR: 226009 Reported by: Martin Birgmeier <d8zNeCFG aon at> [1] Submitted by: VVD <vvd unislabs com> [1] Approved by: portmgr (unmaintained port) Approved by: ports-secteam (blanket: bugfix release(s), runtime bugfix, missing dependencies) Notes: svn path=/branches/2019Q2/; revision=502435
* MFH: r499452 devel/py-fabric: Update to 1.14.1Kubilay Kocak2019-05-243-9/+10
| | | | | | | | | | | | | | | | | - Rejig test invocation to exclude a test that hangs - Update pkg-descr WWW to https://, where it redirects to Changelog: https://www.fabfile.org/changelog-v1.html PR: 235194 Submitted by: Dani <i.dani outlook com> Approved by: ports-secteam (blanket: bugfix release(s)) Notes: svn path=/branches/2019Q2/; revision=502434
* MFH: r499435 devel/libhtp: Update to 0.5.30Kubilay Kocak2019-05-242-7/+7
| | | | | | | | | | | | | | Changelog: https://github.com/OISF/libhtp/blob/0.5.30/ChangeLog PR: 233385 Submitted by: Lorenzo Salvadore <phascolarctos protonmail ch> Approved by: ports-secteam (blanket: bug fix release(s)) Notes: svn path=/branches/2019Q2/; revision=502433
* MFH: r498996 security/py-pywinrm: Allow builds with Python 3.xKubilay Kocak2019-05-241-2/+11
| | | | | | | | | | | | | | | | | | | | | | Upstream supports and tests against up to Python 3.6 [1] and declares up to 3.6 in its Trove Classifiers [2]. Fix incorrect Python version support declaration in USES=python accordingly, allowing Python 3.x builds. [3] While I'm here, add TEST_DEPENDS and a test target to help with QA. [1] https://github.com/diyan/pywinrm/blob/master/.travis.yml [2] setup.py: 'Programming Language :: Python :: 3.6' PR: 237178 [3] Reported by: <timp87 gmail com> [3] Approved by: portmgr (blanket: bug fix, framework compliance) Approved by: ports-secteam (blanket: bugfix) Notes: svn path=/branches/2019Q2/; revision=502431
* MFH: r502350Niclas Zeising2019-05-232-5/+5
| | | | | | | | | | | | | | graphics/drm-legacy-kmod: Update snapshot Update graphics/drm-legacy-kmod to the latest snapshot, with fixes for ppc64. Sponsored by: B3 Init Approved by: ports-secteam (implicit, drm-drivers blanket) Notes: svn path=/branches/2019Q2/; revision=502351
* MFH: r501845Torsten Zuehlsdorff2019-05-232-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | databases/pgpool-II-40: Upgrade from 4.0.4 to 4.0.5 Changelog: Enhancements - Doc: Improve Reference II, PCP commands document. (Tatsuo Ishii) - Speed up failover when all of backends are down. (Tatsuo Ishii) - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii) - Doc: add restrictions entry. (Takuma Hoshiai) Bug fixes - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng) - Remove unused .sgml file. (Takuma Hoshiai) - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii) - Fix black_function_list's broken default value. (Tatsuo Ishii) - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii) - Fix DROP DATABASE failure. (Tatsuo Ishii) - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai) - Add missing test/watchdog_setup to EXTRA_DIST. (bug 470) (Bo Peng) - Doc: mention that multi-statement queries are sent to primary node only. (bug 492) (Tatsuo Ishii) - Fix md5 auth broken in raw mode with more than 1 backends. (bug 491) (Tatsuo Ishii) - Test: Fix occasional regression test failure of 014.watchdog_test_quorum_bypass. (Tatsuo Ishii) - Abort session if failover/failback is ongoing to prevent potential segfault. (bug 481, bug 482) (Tatsuo Ishii) - Fix compiler warnings. (Tatsuo Ishii) - Fix memory leak in "batch" mode in extended query. (bug 468) (Tatsuo Ishii) Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-4-0-5.html Approved by: ports-secteam (mivy) Notes: svn path=/branches/2019Q2/; revision=502326
* MFH: r501844Torsten Zuehlsdorff2019-05-232-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | databases/pgpool-II-37: Upgrade from 3.7.9 to 3.7.10 Changelog Enhancements - Doc: Improve Reference II, PCP commands document. (Tatsuo Ishii) - Speed up failover when all of backends are down. (Tatsuo Ishii) - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii) - Doc: add restrictions entry. (Takuma Hoshiai) Bug fixes - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng) - Remove unused .sgml file. (Takuma Hoshiai) - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii) - Fix black_function_list's broken default value. (Tatsuo Ishii) - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii) - Fix DROP DATABASE failure. (Tatsuo Ishii) - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai) - Add missing test/watchdog_setup to EXTRA_DIST. (bug 470) (Bo Peng) - Doc: mention that multi-statement queries are sent to primary node only. (bug 492) (Tatsuo Ishii) - Test: Fix occasional regression test failure of 014.watchdog_test_quorum_bypass. (Tatsuo Ishii) - Abort session if failover/failback is ongoing to prevent potential segfault. (bug 481, bug 482) (Tatsuo Ishii) - Fix compiler warnings. (Tatsuo Ishii) - Fix memory leak in "batch" mode in extended query. (bug 468) (Tatsuo Ishii) Approved by: ports-secteam (mivy) Notes: svn path=/branches/2019Q2/; revision=502325
* MFH: r501843Torsten Zuehlsdorff2019-05-232-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | databases/pgpool-II-36: Upgrade from 3.6.16 to 3.6.17 Changelog: Enhancements - Doc: Improve Reference II, PCP commands document. (Tatsuo Ishii) - Speed up failover when all of backends are down. (Tatsuo Ishii) - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii) - Doc: add restrictions entry. (Takuma Hoshiai) Bug fixes - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng) - Remove unused .sgml file. (Takuma Hoshiai) - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii) - Fix black_function_list's broken default value. (Tatsuo Ishii) - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii) - Fix DROP DATABASE failure. (Tatsuo Ishii) - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai) - Add missing test/watchdog_setup to EXTRA_DIST. (bug 470) (Bo Peng) - Doc: mention that multi-statement queries are sent to primary node only. (bug 492) (Tatsuo Ishii) - Abort session if failover/failback is ongoing to prevent potential segfault. (bug 481, bug 482) (Tatsuo Ishii) - Fix compiler warnings. (Tatsuo Ishii) - Fix memory leak in "batch" mode in extended query. (bug 468) (Tatsuo Ishii) Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-6-17.html Approved by: ports-secteam (mivy) Notes: svn path=/branches/2019Q2/; revision=502324
* MFH: r501842Torsten Zuehlsdorff2019-05-232-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | databases/pgpool-II-35: Upgrade from 3.5.20 to 3.5.21 Changelog: Enhancements - Speed up failover when all of backends are down. (Tatsuo Ishii) - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii) Bug fixes - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng) - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii) - Fix black_function_list's broken default value. (Tatsuo Ishii) - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii) - Fix DROP DATABASE failure. (Tatsuo Ishii) - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai) - Abort session if failover/failback is ongoing to prevent potential segfault. (bug 481, bug 482) (Tatsuo Ishii) - Fix compiler warnings. (Tatsuo Ishii) - Fix memory leak in "batch" mode in extended query. (bug 468) (Tatsuo Ishii) Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-5-21.html Approved by: ports-secteam (mivy) Notes: svn path=/branches/2019Q2/; revision=502323
* MFH: r501841Torsten Zuehlsdorff2019-05-232-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | databases/pgpool: Upgrade from 3.4.23 to 3.4.24 Changelog: Enhancements - Speed up failover when all of backends are down. (Tatsuo Ishii) - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii) Bug fixes - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng) - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii) - Fix black_function_list's broken default value. (Tatsuo Ishii) - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii) - The error occurred while processing error message returned from backend and the cause is that the query string in question is too big. Problem is, the buffer is in fixed size (8192 bytes). Eliminate the fixed size buffer and use palloced buffer instead. This also saves some memory copy work. - Fix DROP DATABASE failure. (Tatsuo Ishii) - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai) - Fix compiler warnings. (Tatsuo Ishii) Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-4-24.html Approved by: ports-secteam (mivy) Notes: svn path=/branches/2019Q2/; revision=502322
* MFH: r502190Niclas Zeising2019-05-211-1/+2
| | | | | | | | | | | | | | | | | graphics/drm-devel-kmod: fix package Fix packaging of graphics/drm-devel-kmod, the amdkfd module has been disabled, and I missed this last night. Remove it from the pkg-plist by commenting it out for all architectures for now. This is a stop gap measure to get the port to package, until I can touch base with johalun and jmd about how to handle this permanently. Sponsored by: B3 Init Approved by: ports-secteam (implicit, drm-drivers blanket) Notes: svn path=/branches/2019Q2/; revision=502191
* MFH: r502187Niclas Zeising2019-05-211-0/+1
| | | | | | | | | | | | Hook graphics/drm-current-kmod to the build Reminded by: antoine Sponsored by: B3 Init Approved by: ports-secteam (implicit, drm-drivers blanket) Notes: svn path=/branches/2019Q2/; revision=502189
* MFH: r502180Jan Beich2019-05-212-1/+6
| | | | | | | | | | sysutils/pesign: unbreak Obtained from: upstream Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=502185
* MFH: r502165 r502166 r502167 r502168Niclas Zeising2019-05-2010-6/+117
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | add graphics/drm-devel-kmod Add graphics/drm-devel-kmod, development version of the lkpi based DRM graphics drivers. This version is experimental, and for recent CURRENT only. This version currently corresponds to Linux 5.0 DRM drivers, and should give better support for more recent Intel and AMD GPUs. Please note that this port is copied from drm-current-kmod, rather than resurrected from the old drm-devel-kmod port, that's because drm-current-kmod was created by copying the old drm-devel-kmod when that went to a more stable version. Big thank you to everyone who has worked on this, and johalun in particuar, who has done most of the heavy lifting. Approved by: jmd (maintainer, implicit) Sponsored by: B3 Init drm-kmod ports: Update conflicts Update conflicts for all drm-kmod ports to take into account the new drm-devel-kmod port. Sponsored by: B3 Init Remove old drm-devel-kmod entry Sponsored by: B3 Init graphics/drm-current-kmod: Adjust FreeBSD compat Update the FreeBSD OSVERSION compat of drm-current-kmod after the latest update in r502043. Suggested by: jbeich Discussed with: johalun Aproved by: jmd (maintainer, implicit) Sponsored by: B3 Init Approved by: ports-secteam (implicit, drm-drivers blanket) Notes: svn path=/branches/2019Q2/; revision=502169
* MFH: r502163Thomas Zander2019-05-202-4/+4
| | | | | | | | | | | | | Update to upstream version 34.0.0 Details: - Bug fix release, see https://mkvtoolnix.download/doc/NEWS.md Approved by: ports-secteam (riggs) Notes: svn path=/branches/2019Q2/; revision=502164
* MFH: r502120Ryan Steinmetz2019-05-203-4/+5
| | | | | | | | | | | - Unbreak with latest version of go - Add deprecation notice - Bump PORTREVISION Approved by: ports-secteam (with hat) Notes: svn path=/branches/2019Q2/; revision=502121
* MFH: r498218 r498378 r498617 r500326 r500943 r501029 r501192 r501550 r502105 ↵Jan Beich2019-05-205-10/+9
| | | | | | | | | | | | r502111 multimedia/svt-av1: update to 0.5.0 Changes: https://github.com/OpenVisualCloud/SVT-AV1/compare/90b56a8...v0.5.0 Approved by: ports-secteam (miwi) Notes: svn path=/branches/2019Q2/; revision=502112
* MFH: r502043Niclas Zeising2019-05-193-6/+5
| | | | | | | | | | | | | | | | | | | graphics/drm-current-kmod: Update snapshot Update graphics/drm-current-kmod to the latest snapshot. This update takes into account changes in lkpi in base, and makes use of debugfs in base, instead of the bundled one. note: If you are on an older version of current, prior to r347973, you might need to update current first, before updating this driver. Approved by: jmd (maintainer, implicit) Sponsored by: B3 Init Approved by: ports-secteam (implicit, drm-drivers blanket) Notes: svn path=/branches/2019Q2/; revision=502045
* MFH: r501998Jan Beich2019-05-192-7/+7
| | | | | | | | | | games/openbor: update to 7022 Changes: https://github.com/DCurrent/openbor/compare/dc6a1516...c5cfb660 Approved by: ports-secteam (feld, implicit for snapshots) Notes: svn path=/branches/2019Q2/; revision=502001
* MFH: r501995Jan Beich2019-05-193-5/+54
| | | | | | | | | | | mail/thunderbird: update to 60.7.0 Changes: https://www.thunderbird.net/thunderbird/60.7.0/releasenotes/ Reported by: Repology Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=502000
* MFH: r501856Jan Beich2019-05-174-3/+5
| | | | | | | | | | | | | | | www/firefox: restore SafeBrowsing v4 after r495403 Required for phishing protection. Not covered by uBlock Origin lists. Looks like #Mozilla didn't announce the POLA-violating change anywhere public despite backporting to ESR60. https://bugzilla.mozilla.org/show_bug.cgi?id=1531176 Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=501860
* MFH: r501604 r501832Jan Beich2019-05-1710-1045/+26
| | | | | | | | | | | | | www/firefox: update to 67.0 Changes: https://www.mozilla.org/firefox/67.0/releasenotes/ PR: 236651 Security: 44b6dfbf-4ef7-4d52-ad52-2b1b05d81272 Approved by: ports-secteam (miwi) Differential Revision: https://reviews.freebsd.org/D19654 Notes: svn path=/branches/2019Q2/; revision=501858
* MFH: r501798Jan Beich2019-05-173-4/+54
| | | | | | | | | | www/firefox-esr: update to 60.7.0 Changes: https://www.mozilla.org/firefox/60.7.0/releasenotes/ Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=501857
* MFH: r501697Guido Falsi2019-05-151-1/+2
| | | | | | | | | | | | | Add explicit build depend on python, since it's actually used during the install phase. PR: 237862 Submitted by: Christopher <inbox@alleghenycomputer.com> Approved by: ports-secteam (miwi) Notes: svn path=/branches/2019Q2/; revision=501700
* MFH: r501668Jung-uk Kim2019-05-143-5/+5
| | | | | | | | | | | Update to 32.0.0.192. https://helpx.adobe.com/security/products/flash-player/apsb19-26.html Approved by: ports-secteam (blanket) Notes: svn path=/branches/2019Q2/; revision=501669
* MFH: r501560Emanuel Haupt2019-05-141-0/+2
| | | | | | | | | | | Mark MAKE_JOBS_UNSAFE due to a makefile race condition. PR: 237874 Submitted by: pkubaj@FreeBSD.org Approved by: ports-secteam (blanket) Notes: svn path=/branches/2019Q2/; revision=501633
* MFH: r501606Jan Beich2019-05-142-4/+4
| | | | | | | | | | devel/rust-cbindgen: update to 0.8.7 Changes: https://github.com/eqrion/cbindgen/compare/v0.8.6...v0.8.7 Approved by: ports-secteam blanket (required by Firefox 68) Notes: svn path=/branches/2019Q2/; revision=501608
* MFH: r501598Dmitry Marakasov2019-05-131-9/+5
| | | | | | | | | | | | | | - Fix build with VIEWER enabled - Add missing USES - Switch to USES=localbase and opt_CMAKE_BOOL PR: 237607 Reported by: doralitze@chaotikum.org Approved by: monwarez@mailoo.org (maintainer) Approved by: ports-secteam (with hat) Notes: svn path=/branches/2019Q2/; revision=501599
* MFH: r501261Mahdi Mokhtari2019-05-1313-86/+57
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | databases/mysql80-{client, server}: Update to latest release 8.0.16 This update includes: Bugfixes: - InnoDB: Undo tablespaces remained unencrypted after enabling undo tablespace encryption at startup. (Bug #29477795) - InnoDB: Problematic macros introduced with undo tablespace DDL support (Bug #29324132, Bug #94243). - InnoDB: Static thread local variables defined at the wrong scope were not released at thread exit. (Bug #29305186) - Memory leaks discovered in the innochecksum (Bug #28917614, Bug #93164). New features: - MySQL C API now supports asynchronous functions for nonblocking communication with the MySQL server. - MySQL now supports a new Chinese collation, utf8mb4_zh_0900_as_cs - CMake now causes the build process to link with the llvm lld linker for Clang if it is available. Security Fix: CVE-2019-2632, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695 and other fixes. More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL PR: 237399 Reported by: Brent Busby <brent@jfi.uchicago.edu> Sponsored by: The FreeBSD Foundation Approved by: ports-secteam (feld, CVE-patch blanket) Notes: svn path=/branches/2019Q2/; revision=501591
* MFH: r500373Mahdi Mokhtari2019-05-136-50/+51
| | | | | | | | | | | | | | | | | | | | | | | | | | databases/mysql57-{client, server}: Update to latest release 5.7.26 This update includes: Bugfix: - InnoDB: Optimized internal temporary tables did not support in-place UPDATE operations - InnoDB: A function called by a CREATE TABLE thread attempted access after free() - InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES was not updated when adding an index - The authentication_ldap_simple plugin could enforce authentication incorrectly More info: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-26.html Security Fix: CVE-2019-2632, CVE-2019-1559, CVE-2018-3123, and other fixes. More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL PR: 237399 Reported by: Brent Busby <brent@jfi.uchicago.edu> Sponsored by: The FreeBSD Foundation Approved by: ports-secteam (feld, CVE-patch blanket) Notes: svn path=/branches/2019Q2/; revision=501589
* MFH: r500372Mahdi Mokhtari2019-05-134-14/+17
| | | | | | | | | | | | | | | | | | | | | | | | | databases/mysql56-{client, server}: Update to latest release 5.6.44 This update includes Bugfix: - InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES was not updated when adding an index - MySQL 5.6 did not build with maintainer mode enabled with GCC 7 - A damaged mysql.user table could cause a server exit - mysqladmin shutdown did not wait for mysqld to shut down More info: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-44.html Security Fix: CVE-2019-1559, CVE-2018-3123 and other fixes. More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL<Paste> PR: 237399 Reported by: Brent Busby <brent@jfi.uchicago.edu> Sponsored by: The FreeBSD Foundation Approved by: ports-secteam (feld, CVE-patch blanket) Notes: svn path=/branches/2019Q2/; revision=501588
* MFH: r501581Steve Wills2019-05-132-3/+5
| | | | | | | | | | | | | | sysutils/py-google-compute-engine: disable boto This avoids breakage when running with python3 PR: 237877 Submitted by: Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) Approved by: ports-secteam (implicit, bug fix) Notes: svn path=/branches/2019Q2/; revision=501582
* MFH: r501575Jan Beich2019-05-133-8/+9
| | | | | | | | | | | | | | | | | | | | | | multimedia/libva: reroll --- libva-2.4.1.orig/meson.build 2019-04-07 17:44:47 UTC +++ libva-2.4.1/meson.build 2019-04-17 10:07:39 UTC @@ -20,7 +20,7 @@ project( # - reset minor version to zero when major version is incremented va_api_major_version = 1 va_api_minor_version = 4 -va_api_micro_version = 0 +va_api_micro_version = 1 va_api_version = '@0@.@1@.@2@'.format(va_api_major_version, va_api_minor_version, Reported by: Ravenports Approved by: ports-secteam blanket Notes: svn path=/branches/2019Q2/; revision=501576
* MFH: r498656 r499790 r501547Steve Wills2019-05-138-17/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Patch to add missing config and take the maintainership Two new variables was added to instance_config.cfg file in version 2.8.13 to allow the addition and removal of users from groups. I am also taking over the maintainership of this packages as previously discussed with Helen. Bump PORTREVISION. PR: 236500 Submitted by: Lucas Kanashiro <lucas.kanashiro@collabora.com> Approved by: Helen Koike <helen.koike@collabora.com> (maintainer) sysutils/py-google-compute-engine: update to 20190416 [1] This fixes a python3 runtime issue [1] While here, pull in missing dependency in python3 case [2] PR: 237505 [1] PR: 237203 [2] Submitted by: Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) [1] Submitted by: Miroslav Lachman <000.fbsd@quip.cz> [2] Approved by: Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) [2] sysutils/py-google-compute-engine: fix daemons in python 2.7 case PR: 237845 Reviewed by: koobs Approved by: implicit (portmgr, python, jfi blanket) Approved by: ports-secteam (implicit) Notes: svn path=/branches/2019Q2/; revision=501552
* MFH: r501149Palle Girgensohn2019-05-1317-28/+52
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 11.3, 10.8, 9.6.13, 9.5.17, and 9.4.22. This release fixes two security issues in the PostgreSQL server, a security issue found in two of the PostgreSQL Windows installers, and over 60 bugs reported over the last three months. Security: CVE-2019-10129: Memory disclosure in partition routing Prior to this release, a user running PostgreSQL 11 can read arbitrary bytes of server memory by executing a purpose-crafted INSERT statement to a partitioned table. Security: CVE-2019-10130: Selectivity estimators bypass row security policies PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user able to execute SQL queries with permissions to read a given column could craft a leaky operator that could read whatever data had been sampled from that column. If this happened to include values from rows that the user is forbidden to see by a row security policy, the user could effectively bypass the policy. This is fixed by only allowing a non-leakproof operator to use this data if there are no relevant row security policies for the table. This issue is present in PostgreSQL 9.5, 9.6, 10, and 11. The PostgreSQL project thanks Dean Rasheed for reporting this problem. Also fix a FreeBSD port problem with LLVM [1] and add promote command to `service postgresql` [2] PR: 236100, 234879 Submitted by: tomonori.usaka@ubin.jp [1], Trix Farrar [2] Approved by: ports-secteam (joneum) Notes: svn path=/branches/2019Q2/; revision=501551