Commit Graph

456682 Commits

Author SHA1 Message Date
Guido Falsi
50d651a12d MFH: r484897
- Update xca to 2.1.2
- The new version works fine with OpenSSL 1.1.1
- Drop Qt4 option and move to Qt5
- Fix portlint warning
- Project moved to github
- Update WWW in pkg-descr
- Take maintainership

Approved by:	ports-secteam (eadler)
2018-11-15 07:46:53 +00:00
Jan Beich
5bec6c27ab MFH: r484978
emulators/rpcs3: update to 0.0.5.1037

Changes:	2e1aec4de...0044eb44e
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-11-15 00:27:27 +00:00
Jan Beich
491800be48 MFH: r484979
emulators/citra: update to s20181113

Changes:	f43524fff...b1f55c9ca
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-11-15 00:26:41 +00:00
Jan Beich
96f380d43f MFH: r484946
multimedia/gnome-mpv: chase compiler used by mpv

On GCC architectures OPENCV option in multimedia/ffmpeg appears to
require consumers to pass -L${_GCC_RUNTIME}. So, use modern GCC where
this is implicit.

//usr/local/lib/libopencv_core.so.3.4: undefined reference to `std::__detail::_List_node_base::_M_hook(std::__detail::_List_node_base*)@GLIBCXX_3.4.15'
//usr/local/lib/libopencv_core.so.3.4: undefined reference to `std::__throw_bad_function_call()@GLIBCXX_3.4.14'

PR:		233120
Submitted by:	linimon
Approved by:	ports-secteam blanket
2018-11-14 21:40:30 +00:00
Tobias Kortkamp
4a0308955b MFH: r484918
mail/imapfilter: Drop LibreSSL patch and unbreak build with OpenSSL 1.1.1

The patch added in ports r435498 broke OpenSSL 1.1.x compatibility.
A different fix for LibreSSL was committed upstream so the patch
is no longer needed since imapfilter 2.6.11 [1].

[1] c1865ba1ab

PR:		232132
Approved by:	bofh (maintainer timeout, 1 month)

Approved by:	ports-secteam blanket
2018-11-14 12:01:01 +00:00
Jung-uk Kim
e7e626e240 MFH: r484902
Update to 31.0.0.148.

https://helpx.adobe.com/security/products/flash-player/apsb18-39.html

Approved by:	ports-secteam (blanket)
2018-11-13 23:15:53 +00:00
Mark Felder
88b53c8d4b MFH: r484681
- Add missing RUN_DEPENDS

PR:		233104
Submitted by:	jdc@koitsu.org
2018-11-13 21:06:37 +00:00
Li-Wen Hsu
18533333f6 MFH: r484853 r484854
Add support of -fuse-ld=lld

Merge support from upstream gcc for -fuse-ld=lld.  It's already committed and
should appear in a future release.

PR:		233174
Submitted by:	brooks
Sponsored by:	The FreeBSD Foundation

Remove a sneaked change in r484853

Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (miwi)
2018-11-13 08:21:08 +00:00
Jan Beich
54375a6d8c MFH: r484847
emulators/rpcs3: update to 0.0.5.1035

Changes:	7180c1f2d...2e1aec4de
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-11-13 00:24:43 +00:00
Jan Beich
7d8cd9cff7 MFH: r484848
emulators/citra: update to s20181111

Changes:	a59920ed3...f43524fff
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-11-13 00:23:52 +00:00
Bryan Drewery
b2611c3baa MFH: r484842
- Fix X509 build after r484765 openssl fix
- Fix patch URL for KERB_GSSAPI
- Add FLAVORs for x509 and gssapi since they are distinct types of
  OpenSSH rather than feature flags.

Approved by:	portmgr (implicit)
2018-11-12 21:55:57 +00:00
Bryan Drewery
b22d50c0e1 MFH: r484765 r484823 r484824
Update to 7.9p1.

- Fixes build on 12, head, and openssl-devel.
- GSSAPI and HPN are currently marked BROKEN as I don't want to block
  the main update for anyone.

  http://www.openssh.com/txt/release-7.8
  http://www.openssh.com/txt/release-7.9

- Fix HPN for 7.9p1
- DOCS is required for HPN but it's not exclusively a flavor so needs to be
  in the default list.
- Fix a build-time OpenSSL version comparison [1]

PR:		233157 [1]
Reported by:	Robert Schulze <rs@bytecamp.net> [1]
Obtained from:	upstream c0a35265907533be10ca151ac797f34ae0d68969 [1]

- Update KERB_GSSAPI for 7.9p1

Approved by:	portmgr (implicit)
2018-11-12 21:06:47 +00:00
Carlos J. Puga Medina
737b609390 MFH: r484700
- Fix building against Lua(JIT). The configuration switch change since version 1.3.2.
  When building without poudriere, it would always pick LuaJIT over Lua if both are installed,
  basically ignoring the configuration knob.
- Bump PORTREVISION

PR:		233142 (based on)
Submitted by:	Ralf van der Enden <tremere@cainites.net>

Approved by:	ports-secteam (miwi)
2018-11-12 10:28:03 +00:00
Carlos J. Puga Medina
c0f8e8be95 MFH: r484678
dns/dnsdist: Update to 1.3.3

Changelog: https://dnsdist.org/changelog.html#change-1.3.3

Approved by:	ports-secteam (miwi)
2018-11-12 10:26:13 +00:00
Jochen Neumeister
6bfe5b3a0c MFH: r484634
Update to 2.6.1

Changelog:
- Security fix with btsync:// protocol
- Fixed crashes when reading damaged database
- Removed false positive "Cannot get list of trackers" error message
- Fixed joining multicasts on 172.16.0.0/12 networks
- Fixed showing duplicated peers and devices on OS X
- Fixed failure to save settings in WebUI sometimes
- Fixed decrypting files on encrypted peer

Changelog: https://help.resilio.com/hc/en-us/articles/206216855-Sync-2-x-change-log

PR:		232345
Reported by:	Volodymyr Kostyrko <arcade@b1t.name> (maintainer)
Sponsored by:	Netzkommune GmbH

Approved by:	ports-secteam (miwi)
2018-11-12 10:19:21 +00:00
Jochen Neumeister
828cde6dc6 MFH: r484689
Update to 0.37

- Add LICENSE_FILE

This update fix a build error with FreeBSD 13:

/wrkdirs/usr/ports/www/mod_setenvifplus/work/mod_setenvifplus-0.22/apache2/mod_setenvifplus.c:179:18: error: variable has incomplete type 'EVP_CIPHER_CTX' (aka 'struct evp_cipher_ctx_st')
  EVP_CIPHER_CTX cipher_ctx;
                 ^
/usr/include/openssl/ossl_typ.h:90:16: note: forward declaration of 'struct evp_cipher_ctx_st'
typedef struct evp_cipher_ctx_st EVP_CIPHER_CTX;
               ^
/wrkdirs/usr/ports/www/mod_setenvifplus/work/mod_setenvifplus-0.22/apache2/mod_setenvifplus.c:227:18: error: variable has incomplete type 'EVP_CIPHER_CTX' (aka 'struct evp_cipher_ctx_st')
  EVP_CIPHER_CTX cipher_ctx;
                 ^
/usr/include/openssl/ossl_typ.h:90:16: note: forward declaration of 'struct evp_cipher_ctx_st'
typedef struct evp_cipher_ctx_st EVP_CIPHER_CTX;

Sponsored by:	Netzkommune GmbH

Approved by:	ports-secteam (miwi)
2018-11-12 10:16:23 +00:00
Thomas Zander
d4288be0cb MFH: r484606
Fix build with NLS disabled

Details:
- Unconditionally depend on gettext-tools at build time since
  msgfmt is still required to create vlc.appdata.xml

PR:		232967
Reported by:	Trond.Endrestol@ximalas.info

Approved by:	ports-secteam (riggs)
2018-11-10 13:11:13 +00:00
Sunpoet Po-Chuan Hsieh
522c5aeae0 MFH: r483535
Add missing RUN_DEPENDS

- Bump PORTREVISION for dependency change

PR:		232819
Submitted by:	Brad Warren <bmw@eff.org>

Approved by:	ports-secteam (blanket)
2018-11-10 13:07:15 +00:00
Jan Beich
5660ac067c MFH: r484600
emulators/rpcs3: unbreak build with clang > 6.0.0

Assertion failed: (D->getCachedLinkage() == LV.getLinkage()), function getLVForDecl, file /usr/src/contrib/llvm/tools/clang/lib/AST/Decl.cpp, line 1394.

PR:		231952
Reported by:	pkg-fallout
Submitted by:	Roman CAT
Approved by:	ports-secteam blanket
2018-11-10 10:28:33 +00:00
Jan Beich
a840101341 MFH: r484563
emulators/rpcs3: update to 0.0.5.1030

Changes:	90f816595...7180c1f2d
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-11-10 00:38:31 +00:00
Jan Beich
02fd86c47b MFH: r484564
emulators/citra: update to s20181108

Changes:	1444d6010...a59920ed3
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-11-10 00:36:55 +00:00
Antoine Brodin
2ec180ffa5 MFH: r481153 r483677
- Update to 1.5.3

PR:		231047
Submitted by:	Iblis Lin <iblis@hs.ntnu.edu.tw>
Approved by:	joe@thrallingpenguin.com (maintainer)

net/mosquitto: Fix OpenSSL build

PR:		232168
Submitted by:	Nathan <ndowens@yahoo.com>
Approved by:	joe@thrallingpenguin.com (maintainer)
2018-11-09 22:52:39 +00:00
Antoine Brodin
7b448d4687 MFH: r484224
Update both sysutils/sysadm and sysutils/sysadm-client to version 1.1
2018-11-09 22:49:12 +00:00
Antoine Brodin
60790a612a MFH: r484260
Fix build for 12 with opendssl 1.1.0+

Regenerate patches with makepatch
Add license

Reported by:	pkg-fallout
2018-11-09 22:46:30 +00:00
Guido Falsi
ddd8e10264 MFH: r484458
Add patch to stop xfburn crashing when trying to burn an audio CD.

Reported and tested by:	Holger Wagemann <Holger.Wagemann@posteo.de>

Approved by:	ports-secteam (miwi)
2018-11-09 21:37:25 +00:00
Steve Wills
c47d6aece7 MFH: r484541
www/lighttpd: update to 1.4.51

PR:		232278
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl> (maintainer)
Security:	92a6efd0-e40d-11e8-ada4-408d5cf35399
Approved by:	ports-secteam (implicit)
2018-11-09 19:32:09 +00:00
Antoine Brodin
dc9e123105 MFH: r483747
www/mod_auth_pubtkt: update to 0.13

PR:		232894
Submitted by:	mk@neon1.net (maintainer)
2018-11-09 13:19:20 +00:00
Antoine Brodin
f0813b6965 MFH: r481903 r483542
www/rssroll: Update to 0.6.1

PR:		230691
Submitted by:	Nikola Kolev <koue@chaosophia.net>

www/rssroll: update to 0.6.2

PR:		232806
Submitted by:	Nikola Kolev <koue@chaosophia.net> (maintainer)
2018-11-09 11:48:55 +00:00
Niclas Zeising
694822b1f8 MFH: r483848
graphics/drm-legacy-kmod: Update snapshot

This improves debugging output in some cases.  No other functional changes.

Approved by:	maintainer (jmd, implicit)

Approved by:	ports-secteam (riggs)
2018-11-09 07:53:36 +00:00
Antoine Brodin
42a5412e6c MFH: r483736
Update to recent version 1.2.0, it supports OpenSSL 1.1.1 now.
2018-11-08 19:37:51 +00:00
Sergey A. Osokin
91cb84db25 MFH: r484324
Security update from 1.15.5 to 1.15.6.

Temporary disable third-party upstream_fair module, it should
be updated to build with the modern version of the nginx.

While I'm here fix some whitespaces.

Security:	84ca56be-e1de-11e8-bcfd-00e04c1ea73d
Approved by:	ports-secteam (miwi)

<ChangeLog>

*) Security: when using HTTP/2 a client might cause excessive memory
   consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).

*) Security: processing of a specially crafted mp4 file with the
   ngx_http_mp4_module might result in worker process memory disclosure
   (CVE-2018-16845).

*) Feature: the "proxy_socket_keepalive", "fastcgi_socket_keepalive",
   "grpc_socket_keepalive", "memcached_socket_keepalive",
   "scgi_socket_keepalive", and "uwsgi_socket_keepalive" directives.

*) Bugfix: if nginx was built with OpenSSL 1.1.0 and used with OpenSSL
   1.1.1, the TLS 1.3 protocol was always enabled.

*) Bugfix: working with gRPC backends might result in excessive memory
   consumption.

</ChangeLog>
2018-11-08 17:59:36 +00:00
Antoine Brodin
fbab1577bb MFH: r483941
Mark BROKEN: fails to build

/wrkdirs/usr/ports/math/vtk5/work/VTK5.10.1/Common/vtkOStreamWrapper.cxx:60:1: error: invalid operands to binary expression ('std::__1::ostream' (aka 'basic_ostream<char>') and 'std::__1::ostream')
VTKOSTREAM_OPERATOR(ostream&);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reported by:	pkg-fallout
2018-11-08 15:29:12 +00:00
Tobias Kortkamp
6110b6ed38 MFH: r484444
mail/rss2email2: Add workaround for filtering out bad tags

This can apparently be triggered with malformed RSS feeds.

Traceback (most recent call last):
  File "/usr/share/rss2email/rss2email.py", line 711, in run
    tagline = ",".join(taglist)
TypeError: sequence item 1: expected string or Unicode, NoneType found

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734327

- Reset maintainer due to the long timeout

PR:		214934
Submitted by:	jonathan@invertedearth.net
Approved by:	srg@guglielmo.us (maintainer timeout, ~2 years)

Approved by:	ports-secteam runtime fix blanket
2018-11-08 13:51:18 +00:00
Tobias Kortkamp
dbc91439b1 MFH: r484445
sysutils/fsc: Avoid circular dependency in rc script

rcorder: Circular dependency on provision `DAEMON' in file `/usr/local/etc/rc.d/fscd'.

- Reset maintainer due to the long timeout

PR:		197552
Reported by:	parakleta@darkreality.org
Approved by:	trhodes (maintainer timeout, 3.5 years)
Obtained from:	pkgsrc

Approved by:	ports-secteam runtime fix blanket
2018-11-08 13:50:21 +00:00
Tobias Kortkamp
63ab15ed9d MFH: r484453
mail/nullmailer: Unbreak build with Clang 6 (C++14 by default)

inject.cc:221:3: error: non-constant-expression cannot be narrowed from type 'size_t' (aka 'unsigned long') to 'unsigned int' in initializer list [-Wc++11-narrowing]
  X(Errors-To,         T,F,F,F,F), // 5
  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

http://beefy12.nyi.freebsd.org/data/head-amd64-default/p483866_s340093/logs/nullmailer-1.13_3,1.log

PR:		230496
Submitted by:	Tod McQuillin <devin@spamcop.net>

Approved by:	ports-secteam blanket
2018-11-08 13:46:45 +00:00
Jan Beich
a1659326cf MFH: r484417
emulators/citra: update to s20181106

Changes:	4228cd8b6...1444d6010
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-11-07 22:44:16 +00:00
Jan Beich
c17b688252 MFH: r484416
emulators/rpcs3: update to 0.0.5.1026

Changes:	11681f02c...90f816595
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-11-07 22:43:41 +00:00
Don Lewis
614b01d1bc MFH: r482164
editors/openoffice-4, editors/openoffice-devel:

	Fix build with OpenSSL 1.1.x

	Pet portlint (USES block location)

PR:		232265
Reported by:	pkg-fallout

Approved by:	ports-secteam blanket (unbreak build)
2018-11-07 22:29:43 +00:00
Jochen Neumeister
c7ba2abb58 MFH: r484307
Update to 1.14.1

Changelog:
 - Security: when using HTTP/2 a client might cause excessive memory
   consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).

 - Security: processing of a specially crafted mp4 file with the
   ngx_http_mp4_module might result in worker process memory disclosure
   (CVE-2018-16845).

 - Bugfix: working with gRPC backends might result in excessive memory
   consumption.

Security:	84ca56be-e1de-11e8-bcfd-00e04c1ea73d
Sponsored by:	Netzkommune HmbH

Approved by:	ports-secteam (miwi)
2018-11-07 06:16:03 +00:00
Jan Beich
4506d41add MFH: r483883
multimedia/ffmpeg: update to 4.0.3

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n4.0.3:/Changelog
ABI:		https://abi-laboratory.pro/tracker/timeline/ffmpeg/
PR:		227726 (for tracking)
Security:	CVE-2018-15822
Approved by:	ports-secteam (miwi)
2018-11-07 03:39:05 +00:00
Sunpoet Po-Chuan Hsieh
0a4bb0b317 MFH: r483728
Update to 2.2.3

Changes:	https://github.com/flavorjones/loofah/releases
		https://github.com/flavorjones/loofah/blob/master/CHANGELOG.md
Security:	36a2a89e-7ee1-4ea4-ae22-7ca38019c8d0

Approved by:	ports-secteam (miwi)
2018-11-06 21:26:49 +00:00
Li-Wen Hsu
15bd5d702a MFH: r481270
- Update to 8.1.0

Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (delphij)
2018-11-06 20:45:27 +00:00
Jan Beich
0a80fa0e69 MFH: r483878
devel/glib20: revert to old g_convert() behavior

PR:		232073
Reported by:	many (via inkscape)
Suggested by:	tijl
Tested by:	glib/tests/convert
Approved by:	ports-secteam blanket
2018-11-06 15:42:38 +00:00
Jean-Sébastien Pédron
999d105526 MFH: r484254
lang/erlang, lang/erlang-runtime*: Indicate which port supports OpenSSL 1.1

With some patching [1], Erlang 19.x supports OpenSSL 1.1.x (lang/erlang,
lang/erlang-runtime19).

However, previous versions are now marked as broken with OpenSSL 1.1.x.

PR:		225898
Submitted by:	brnrd [1]
Obtained from:	Upstream

Approved by:	portmgr (miwi)
2018-11-06 14:12:22 +00:00
Jean-Sébastien Pédron
70f2ae0189 MFH: r484252
sysutils/acpi_call: Fix kernel panic since r336876

PR:		230993
Submitted by:	D Scott Phillips <d.scott.phillips@intel.com>
Reported by:	Theron Tarigo <theron.tarigo@gmail.com>

Approved by:	portmgr (miwi)
2018-11-06 14:01:38 +00:00
Dima Panov
1f6a1fc28d MFH: r484257
- While major 6.4 update still cooking (authors dropped openssl support at all
  in favor of libressl), mark OpenSMTPd as BROKEN with openssl 1.1.x api
- Use https in pkg-descr url

Approved by:	ports-secteam (miwi)
2018-11-06 07:49:38 +00:00
Koichiro Iwao
18320c692f MFH: r484262
net/x2goclient: unbreak the build

While here, adjust USES.

PR:		232962
Submitted by:	w.schwarzenfeld@utanet.at
Approved by:	mentors (implicit)

Approved by:	ports-secteam (miwi)
2018-11-06 07:16:28 +00:00
Jan Beich
ff4ad34b2e MFH: r484264
emulators/citra: update to s20181104

Changes:	7c3d325af...4228cd8b6
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-11-06 00:26:18 +00:00
Jan Beich
bd5ec91b71 MFH: r484263
emulators/rpcs3: update to 0.0.5.1020

Changes:	43b75ccf0...11681f02c
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-11-06 00:24:58 +00:00
Sunpoet Po-Chuan Hsieh
fed03cf906 MFH: r483951
Fix build with curl 7.62.0

Approved by:	ports-secteam (miwi)
2018-11-05 16:54:03 +00:00