Commit Graph

503569 Commits

Author SHA1 Message Date
Jan Beich
22e399d695 MFH: r535269
gecko: drop x11/startup-notification dependency

https://bugzilla.mozilla.org/show_bug.cgi?id=726479

Approved by:	ports-secteam blanket
2020-07-02 02:57:44 +00:00
Jan Beich
0c297e89d3 MFH: r535268
gecko: drop GCONF option after upstream

https://bugzilla.mozilla.org/show_bug.cgi?id=1433685

Approved by:	ports-secteam blanket
2020-07-02 02:55:57 +00:00
Jan Beich
aa84ed68fa MFH: r535267
gecko: drop --with-system-bz2 after upstream

https://bugzilla.mozilla.org/show_bug.cgi?id=1418425

Approved by:	ports-secteam blanket
2020-07-02 02:23:22 +00:00
Christoph Moench-Tegeder
4d8d3039f4 MFH: r540952
mail/thunderbird: update to 68.10.0

https://www.thunderbird.net/en-US/thunderbird/68.10.0/releasenotes/

Approved by:	ports-secteam (blanket: web browser alike)
2020-07-01 12:14:59 +00:00
Jochen Neumeister
7792892754 MFH: r540936
Update to 7.72

Changelog:
 - https://www.drupal.org/project/drupal/releases/7.71
 - https://www.drupal.org/project/drupal/releases/7.72

Security:	b51d5391-bb76-11ea-9172-4c72b94353b5
Sponsored by:	Netzkommune GmbH

Approved by:	ports-secteam (with hat)
2020-07-01 08:53:46 +00:00
Jan Beich
18bcb107f8 MFH: r540921
www/firefox: update to 78.0.1

Changes:	https://www.mozilla.org/firefox/78.0.1/releasenotes/
Approved by:	ports-secteam blanket
2020-07-01 02:27:46 +00:00
Jan Beich
bd41d23903 [direct commit] www/firefox: unbreak after r540842
r532707 is not in 2020Q2 but 2020Q3 ETA in ~1 day, so use bundled ICU.
https://hg.mozilla.org/releases/mozilla-release/rev/61970f5454db

===>   firefox-78.0_2,1 depends on package: icu>=67.1,1 - not found
===>   Installing existing package /packages/All/icu-66.1,1.txz
[121amd64-quarterly-job-12] Installing icu-66.1,1...
[121amd64-quarterly-job-12] Extracting icu-66.1,1: .......... done
===>   firefox-78.0_2,1 depends on package: icu>=67.1,1 - not found
*** Error code 1

Reported by:	pkg-fallout
Approved by:	ports-secteam blanket
2020-06-30 17:18:05 +00:00
Fernando Apesteguía
7e284b51e9 MFH: r540899
sysutils/monit: Update to 5.27.0

ChangeLog: https://bitbucket.org/tildeslash/monit/src/release-5-27-0/CHANGES

PR:	247649
Submitted by:	martinp@tildeslash.com (maintainer)

Approved by:	ports-secteam (blanket, runtime fix)
2020-06-30 16:10:30 +00:00
Jochen Neumeister
0a89435634 MFH: r540864
Update to 5.4.2

Changelog: https://wordpress.org/news/2020/04/wordpress-5-4-1/

Sponsored by:	Netzkommune GmbH

Approved by:	ports-secteam (with hat)
2020-06-30 07:41:41 +00:00
Jan Beich
17fb721ef9 MFH: r534395 r539972 r540400 r540404 r540515
www/firefox: update to 78.0

Changes:	https://www.mozilla.org/firefox/78.0/releasenotes/
PR:		247329
Approved by:	ports-secteam blanket
Differential Revision:	https://reviews.freebsd.org/D25301
2020-06-29 23:15:26 +00:00
Jan Beich
a84c6b015b MFH: r540355
www/firefox-esr: update to 68.10.0

Changes:	https://www.mozilla.org/firefox/68.10.0/releasenotes/
Approved by:	ports-secteam blanket
2020-06-29 23:11:47 +00:00
Danilo G. Baio
9556cc6a80 MFH: r540713
sysutils/py-bitrot: Update to 1.0.0

Changelog:	https://github.com/ambv/bitrot/blob/1.0.0/README.rst#100

PR:		247493
Submitted by:	Darren Mulligan <fixer@bsdmail.com> (maintainer)

Approved by:	ports-secteam (joneum)
2020-06-29 22:35:01 +00:00
Jochen Neumeister
072332113d MFH: r540837
Update to 5.4.2

Changelog: https://wordpress.org/news/2020/04/wordpress-5-4-1/

Reported by:	delphij
Sponsored by:	Netzkommune GmbH
Differential Revision:	https://reviews.freebsd.org/D25262

Approved by:	ports-secteam (with hat)
2020-06-29 22:29:59 +00:00
Kurt Jaeger
80212bcf07 MFH: r540820
databases/mongodb36: update 3.6.17 -> 3.6.18

PR:		247394
Submitted by:	Ronald Klop <ronald-lists@klop.ws>
Approved by:	dev@dudu.ro (maintainer)
Relnotes:	https://docs.mongodb.com/manual/release-notes/3.6/#may-1-2020
Security:	CVE-2020-7921
Approved by:	portmgr (security fix blanket)
2020-06-29 18:20:34 +00:00
Niclas Zeising
2cbbd49ac6 MFH: r530651 r534246 r535833 r536629 r538859 r540343
This updates mail/mutt to 1.14.5

This merges all changes to mail/mutt that have been done to FreeBSD ports
head branch during the 2020Q2 period.  This is needed in order to update
mail/mutt to 1.14.5 in order to fix security issues.

mail/mutt: upgrade 1.13.4 -> 1.13.5

- Bring back vvv quote/initials patches
- Remove NNTP option (XML as well)
- Update default option patches context

PR:		245175
Submitted by:	Derek Schrock <dereks@lifeofadishwasher.com> (maintainer)
Relnotes:	https://marc.info/?l=mutt-users&m=158542977114051&w=2

mail/mutt: update 1.13.5 -> 1.14.0

- Default DEBUG option
  (very small performance impact and ~4% binary size increase)

PR:		246270
Submitted by:	Derek Schrock <dereks@lifeofadishwasher.com> (maintainer)
Relnotes:	http://www.mutt.org/relnotes/1.14/

mail/mutt: update 1.14.0 -> 1.14.1

- Rename DEBUG option to DEBUG_LOGS
- Add lang/perl5 deps that triggers a Muttrc rebuild
- Make smime patch optional due to perl build deps.
- Remove unnecessary doc patches and REINPLACE_CMD
- Move build changing patches to make targets
- ASPELL updates the (pre)built Muttrc to not require a rebuild

PR:		246559
Submitted by:	Derek Schrock <dereks@lifeofadishwasher.com> (maintainer)
Relnotes:	https://marc.info/?l=mutt-users&m=158965668315387&w=2

mail/mutt: Update to 1.14.2

ChangeLog: http://www.mutt.org/

PR:	246731
Submitted by:	dereks@lifeofadishwasher.com (maintainer)

mail/mutt: Update to 1.14.3

- Update to 1.14.3
- Muttrc removed from dist. making perl a BUILD_DEPENDS
- manual.txt removed from dist. making lynx a DOCS_BUILD_DEPENDS
- Remove MASTER_SITES not updated or can't connect

PR:		247266
Submitted by:	Derek Schrock <dereks@lifeofadishwasher.com> (maintainer)
Relnotes:	https://marc.info/?l=mutt-users&m=159217236324614&w=2

mail/mutt: Update to 1.14.5

Update mail/mutt to 1.14.5, this is a security fix release, with fixes for
CVE-2020-14093 and CVE-2020-14954

PR:		247400
Submitted by:	Derek Schrock
Security:	5b397852-b1d0-11ea-a11c-4437e6ad11c4
		29b13a34-b1d2-11ea-a11c-4437e6ad11c4

Approved by:	ports-secteam (joenum)
2020-06-29 14:58:48 +00:00
Matthias Andree
155f180f89 MFH: r540716 r540718 r540719
security/putty*: upgrade to 0.74 security fix release

Changelog:
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html

among them are these two---and more bugfixes beyond not listed here:

  * Security fix: if an SSH server accepted an offer of a public key
    and then rejected the signature, PuTTY could access freed memory,
    if the key had come from an SSH agent.

  * Security feature: new config option to disable PuTTY's dynamic
    host key preference policy, if you prefer to avoid giving away
    to eavesdroppers which hosts you have stored keys for.

Security:       6190c0cd-b945-11ea-9401-2dcf562daa69
Security:       CVE-2020-14002
Security:       FZI-2020-5

security/putty*: rename and update LICENCE from tarball.

Approved by:	ports-secteam (joneum@) [540716]
Approved by:	ports-secteam (blanket, metadata update) [540718, 540719]
2020-06-29 10:43:54 +00:00
Kubilay Kocak
7be9088b27 MFH: r540742 lang/ferite: Update pkg-descr: WWW URL
Reported by:	RoboNuggie (via Twitter)

Approved by:	ports-secteam (blanket: bugfix (incorrect metadata))
2020-06-29 03:39:17 +00:00
Jan Beich
2deacbbbfd MFH: r540663
security/nss: update to 3.54

Changes:	https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.54_release_notes
Changes:	https://hg.mozilla.org/projects/nss/shortlog/NSS_3_54_RTM
ABI:		https://abi-laboratory.pro/tracker/timeline/nss/
Reported by:	Repology
Approved by:	ports-secteam blanket (required by Firefox 79)
2020-06-28 01:25:24 +00:00
Jan Beich
d4781f3ddb MFH: r540655
emulators/ppsspp: unbreak OLDJOY after r512863

SDL/SDLJoystick.cpp:24:13: error: no member named 'bPS3Controller' in 'Config'
                        g_Config.bPS3Controller = true;
                        ~~~~~~~~ ^
SDL/SDLJoystick.cpp:27:22: error: no member named 'bPS3Controller' in 'Config'
        if (g_Config.bPS3Controller)
            ~~~~~~~~ ^

Approved by:	ports-secteam blanket
2020-06-27 23:25:30 +00:00
Jan Beich
4feeba3dda MFH: r540629
emulators/ppsspp: use system snappy after r483177

https://github.com/hrydgard/ppsspp/commit/8ba1f049dae9

Approved by:	ports-secteam blanket (regression fix)
2020-06-27 18:10:45 +00:00
Jan Beich
94992e615d MFH: r540346
devel/rust-cbindgen: update to 0.14.3

Changes:	https://github.com/eqrion/cbindgen/compare/v0.14.2...v0.14.3
Reported by:	GitHub (watch releases)
Approved by:	ports-secteam blanket (required by Firefox 79)
2020-06-27 18:04:49 +00:00
Joseph Mingrone
ad22e35120 MFH: r540411
www/chromium: Update to 83.0.4103.106 and fix synchronization

PR:		244185, 246387
Reported by:	bourne.identity@hotmail.com
Approved by:	ports-secteam (implicit), chromium@ (rene), cem
Obtained from:	Robert Nagy via OpenBSD port
Security:	https://www.vuxml.org/freebsd/6a5d15b6-b661-11ea-8015-e09467587c17.html
Differential Revision:	https://reviews.freebsd.org/D25449
2020-06-26 08:44:32 +00:00
Jan Beich
c22697154f MFH: r540345
devel/nspr: update to 4.26

Changes:	http://mozilla.6506.n7.nabble.com/ANNOUNCE-NSPR-4-26-Release-td385653.html
ABI:		https://abi-laboratory.pro/tracker/timeline/nspr/
Reported by:	Repology
Approved by:	ports-secteam blanket (required by Firefox 79)
2020-06-24 20:54:28 +00:00
Cy Schubert
350658cbbd MFH: r540010
Update 4.2.8p14 --> 4.2.8p15

Summary: Systems that use a CMAC algorithm in ntp.keys will not release
a bit of memory on each packet that uses a CMAC keyid, eventually causing
ntpd to run out of memory and fail. The CMAC cleanup from
https://bugs.ntp.org/3447, part of ntp-4.2.8p11, introduced a bug whereby
the CMAC data structure was no longer completely removed.

Security:	NTP Bug 3661
Approved by:	portmgr (joneum)
2020-06-24 14:23:18 +00:00
Dima Panov
119d50b142 MFH: r539884
databases/py-mysqlclient: revert gc threaded patch

It caused python sigabort with a "GC object already tracked" message in singlethreaded app.
This happens only with a fetchmany() on a streaming cursor, MySQLdb.cursors.SSCursor.

PR:		246313
Reported by:	Jeroen Pulles <jeroen.pulles@gmail.com>

Approved by:	ports-secteam (joneum)
2020-06-23 17:26:07 +00:00
Thomas Zander
034e1ea32c MFH: r539962
Update to recent upstream snapshot 2020-06-21

Approved by:	ports-secteam (riggs)
2020-06-23 08:11:36 +00:00
Jan Beich
16c1895f43 MFH: r539955
multimedia/dav1d: unbreak on 12.1 i386 after r539947

ld: error: can't create dynamic relocation R_386_32 against local symbol in readonly segment; recompile object files with -fPIC or pass '-Wl,-z,notext' to allow text relocations in the output
>>> defined in src/25a6634@@dav1d@sha/mc_sse.obj
>>> referenced by ../src/x86/mc_sse.asm
>>>               src/25a6634@@dav1d@sha/mc_sse.obj:(.text+0x6969)

Reported by:	pkg-fallout
Approved by:	ports-secteam blanket
2020-06-23 01:19:12 +00:00
Jan Beich
aeba40bb7a MFH: r539948
emulators/citra: update to s20200621

Changes:	8ce81b19b...7444c9513
Approved by:	ports-secteam (swills, implicit for snapshots)
2020-06-23 00:29:41 +00:00
Jan Beich
326dc124b9 MFH: r539947
multimedia/dav1d: update to 0.7.1

Changes:	https://code.videolan.org/videolan/dav1d/tags/0.7.1
Changes:	https://code.videolan.org/videolan/dav1d/blob/0.7.1/NEWS
Changes:	https://code.videolan.org/videolan/dav1d/compare/0.7.0...0.7.1
Reported by:	Repology
Approved by:	ports-secteam blanket (required by Firefox 79)
2020-06-23 00:29:13 +00:00
Danilo G. Baio
6522c566b9 MFH: r533797 r539739
python 3.5 will reach End-of-life on 2020-09-13

lang/python35: Fix security issues

The patches for CVE-2019-18348 and CVE-2020-8492 are in the 3.5 branch
and will be present in a next release.

PR:		246984
Approved by:	python (with hat)
Security:	ca595a25-91d8-11ea-b470-080027846a02 (CVE-2019-18348)
Security:	a27b0bb6-84fc-11ea-b5b4-641c67a117d8 (CVE-2020-8492)

Approved by:	ports-secteam (blanket, backport of security fix)
2020-06-22 11:05:02 +00:00
Bernard Spil
c6e94d7f56 MFH: r536602
databases/mariadb104-server: Fix configuration location / overhaul

 * Fix configuration location [1]
 * Share patches between client and server
 * Provide minimal configuration for client and server
 * Make the wsrep config a sample only
 * Fixup plists

PR:		246694 [1]
Reported by:	<theis gmx at>

Approved by:	ports-secteam (joneum)
2020-06-21 13:32:26 +00:00
Xin LI
26501ed514 MFH: r539750 r539751
ports-mgmt/pkg: Respect liblzma.pc if available.
ports-mgmt/pkg-devel: Respect liblzma.pc if available.

Note that this is meant to be a temporary hack and will be reverted once the
freebsd/pkg have solved this in the build infrastructure.

PR:			200142
Approved by:		portmgr (bapt over IRC)
2020-06-20 21:26:46 +00:00
Tobias C. Berner
b5927dc684 MFH: r539618
multimed/vlc: update to 3.0.11

Access:
 * rtp descriptor leak on error fix

Demux:
 * Fixed regression with some encrypted HLS streams
 * Live HLS delay until first update fix
 * HLS rendition switch regression fix
 * Fix imprecise m4a seek

Decoder:
 * Fixed missing captions with some capture cards

Audio filters:
 * soxr resampling fixes

Contribs:
 * Updated libfaad to 2.9.2 (Parametric Stereo regression)
 * Updated libarchive to 3.4.2

macOS:
 * Fixed moving video window with mouse
 * Fixed UI issue showing "permissions warning" unnecessarily often
 * Fixed stack buffer overflow listing bluray mount points
 * Fixed potential crashes at startup

Audio Output:
 * Fix sound not coming back after a pause with CoreAudio (macOS/iOS)

Misc:
 * Update Youtube script

http://www.videolan.org/security/sb-vlc3011.html
https://github.com/videolan/vlc-3.0/releases/tag/3.0.11
https://github.com/videolan/vlc-3.0/blob/3.0.11/NEWS

PR:		247395
Submitted by:	VVD <vvd@unislabs.com>
Relnotes:a
Security:	77896891-b08a-11ea-937b-b42e99a1b9c3

Approved by:	ports-secteam (joneum)
2020-06-20 06:29:07 +00:00
Jan Beich
b07560af65 MFH: r539683
emulators/citra: update to s20200619

Changes:	2e24183e5...8ce81b19b
Approved by:	ports-secteam (swills, implicit for snapshots)
2020-06-20 01:10:56 +00:00
Lars Engels
589300ab18 MFH: r539543
security/lynis: Update to 3.0.0

This is a major release but also fixes two security problems.

Security:	CVE-2019-13033 CVE-2020-13882

Approved by:	ports-secteam (joneum)
2020-06-19 14:20:16 +00:00
Guido Falsi
354d2bc6ec MFH: r539600
Apply patch from upstream to fix regression in chan_dahdi channel
variables.

Obtainer from:	https://issues.asterisk.org/jira/browse/ASTERISK-28955

Approved by:	ports-secteam (joneum)
2020-06-19 14:18:21 +00:00
Guido Falsi
1dd99cea1b MFH: r539599
Apply patch from upstream to fix regression in chan_dahdi channel
variables.

Obtainer from:	https://issues.asterisk.org/jira/browse/ASTERISK-28955

Approved by:	ports-secteam (joneum)
2020-06-19 14:17:15 +00:00
Piotr Kubaj
b9cef10e71 MFH: r539609
devel/plan9port: fix build on GCC architectures

Use newer GCC:
cc1: error: unrecognized command line option "-Wno-misleading-indentation"
cc1: error: unrecognized command line option "-Wno-stringop-truncation"
cc1: error: unrecognized command line option "-Wno-stringop-overflow"
cc1: error: unrecognized command line option "-Wno-format-truncation"

Approved by:	portmgr (fix build blanket)
2020-06-19 14:01:43 +00:00
Kirill Ponomarev
65a956cdb5 MFH: r539568
Fix runtime error by adding security/py-pycryptodome
and sysutils/py-distro dependencies.
Remove py-ioflo and py-ioflo from tcp transport as they are
not required anymore.

PR:		247391
Submitted by:	ohauer@
Approved by:	maintainer

Approved by:	portmgr (blanket)
2020-06-18 20:23:45 +00:00
Kirill Ponomarev
3aed347340 MFH: r539566
Update to version 3.9.7 which is required for salt-3001

PR:		247390
Submitted by:	ohauer@

Approved by:	portmgr (blanket)
2020-06-18 20:17:49 +00:00
Piotr Kubaj
d9eec2f878 MFH: r539553
multimedia/handbrake: update to 1.3.3

HandBrake 1.3.3 has been released. This patch updates multimedia/handbrake port.
Here is list of changes from 1.3.2.

1. update to ffmpeg 4.2.3 in contrib files
2. code style fix of MASTER_SITES
3. update version.txt from upstream's source tarball.
4. mediainfo filename change
5. add powerpc to architectures list.

Submitted by:	naito.yuichiro_gmail.com (maintainer)
Differential Revision:	https://reviews.freebsd.org/D25292

Approved by:	portmgr (bugfix blanket)
2020-06-18 18:00:14 +00:00
Kirill Ponomarev
588d1b9c2f Remove stalled patch.
Approved by:	portmgr (blanket)
2020-06-18 15:24:16 +00:00
Kirill Ponomarev
7ff922fd1d MFH: r539546
Update to 3001 Sodium.
Changes: https://salt.tips/whats-new-in-salt-sodium/

PR:		247372
Approved by:	maintainer

Approved by:	portmgr (blanket)
2020-06-18 15:15:00 +00:00
Philip Paeps
f2d0e1387a MFH: r539519
dns/bind911: update to 9.11.20.

Security:	CVE-2020-8619
Submitted by:	mat (maintainer)
Approved by:	ports-secteam (joneum)
2020-06-18 08:29:57 +00:00
Philip Paeps
2ce1da89d5 MFH: r539518
Update to 9.16.4.

Security:	CVE-2020-8618 CVE-2020-8619
Submitted by:	mat (maintainer)
Approved by:	ports-secteam (joneum)
2020-06-18 08:22:04 +00:00
Jan Beich
1025ec9c9c MFH: r539512
security/nss: update to 3.53.1

Changes:	https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
Changes:	https://hg.mozilla.org/projects/nss/shortlog/NSS_3_53_1_RTM
ABI:		https://abi-laboratory.pro/tracker/timeline/nss/
Security:	CVE-2020-12402
Approved by:	ports-secteam blanket
2020-06-18 01:19:03 +00:00
Kai Knoblich
f8bcf11929 MFH: r538903
audio/supercollider: Update to 3.11.0

* Introduce additional default option AVAHI to make the use of the Avahi
  libraries optional.

* Remove one patch and the whole patching via "post-patch" - both is no
  longer needed.

* While I'm here: Prepare the port for Qt 5.15.0

Changelog:

https://github.com/supercollider/supercollider/releases/tag/Version-3.11.0

PR:		246320
Submitted by:	shamaz.mazum@gmail.com
Approved by:	Neal Nelson <ports@nicandneal.net> (maintainer)

Approved by:	ports-secteam build fix blanket
2020-06-17 08:43:47 +00:00
Kai Knoblich
41311bb7ce MFH: r538664
textproc/py-pdfminer.six: Update to 20191110

* Use this release for a while as it's the last one that supports Python 2.7
  which is still needed by textproc/scancode-toolkit.

* Backport two patches to fix the runtime of CLI scripts.

* Remove "dos2unix" and "shebangfix" macros as they're no longer required.

Changelog since 20181108:

https://github.com/pdfminer/pdfminer.six/blob/20191110/CHANGELOG.md

Approved by:	ports-secteam (joneum)
2020-06-17 08:40:45 +00:00
Kyle Evans
b09861b3bd MFH: r538228 r538329
net/freerdp: update to 2.1.0

This update incorporates many features and improvements since 2.0.0-rc4,
as well as a large mass of security fixes.

Full changelog available:
https://github.com/FreeRDP/FreeRDP/blob/2.1.0/ChangeLog

PR:		245517
Approved by:	koobs (mentor)
Security:	669f3fe8-a07a-11ea-b83e-f0def1f5c5a2

net/freerdp: fix build on FreeBSD 11.x

Apparently this hadn't been caught in my test matrix -- it seems that later
versions of FreeBSD have a getmntent() definition that masked this error.

mntent_compat.c has been adopted from devel/fam, though a better solution
should be sought out going into the future.

Approved by:	koobs (mentor, implicit, just-fix-it)

Approved by:	ports-secteam (joneum)
2020-06-17 02:14:23 +00:00
Xin LI
074f0333fe MFH: r539379
databases/lmdb: in db_env_close0(), destroy robust mutexes if we are
the only remaining user.

When closing an lmdb database, all memory and file descriptor resources
are released, including the shared memory pages that contained the
robust mutex.

However, before this commit, prior to unmapping the pages that contained
the robust mutexex, lmdb did not destroy the mutexes first.  This would
create a problem when an application opens and closes a database, then
open it again.

According to libthr(3), by default, a shared lock backed by a mapped
file in memory is automatically destroyed on the last unmap of the
corresponding file' page, which is allowed by POSIX.

After unmapping the shared pages, the kernel writes off all active
robust mutexes associated with these pages.  However, the userland
threading library still keeps the record (pshared_lookup in
thr_pshared.c of libthr) for these objects as they are not really
destroyed before, so that it don't have to ask the kernel every
time when looking them up.

Now, a later re-open of the database might have mapped the lock file
to the same memory location.  Because the threading library have
remembered the robust mutex object, it would just reuse it even though
it was already invalid from kernel's point of view.  Unfortunately,
regular lock operations would still work for this process.

Should another lmdb process opens the same database, it would attempt
to obtain the robust mutex (no longer recognized by kernel) because it
would see another process holding a file lock, but that would fail
because the robust mutex is invalid for the kernel.

Explicitly destroy the mutex if we are the last remaining user to ensure
the mutex is always in a known defined state.

OpenLDAP ITS #9278

With debugging help from:	kib
PR:				244493
Approved by:			ports-secteam
2020-06-16 21:54:58 +00:00