After upgrading to version 20100318_4, users reported ValueError for
some disks [1]
Also fix Python 3.x compatibility [2]
While I'm here:
- Pet portlint, NO_* in USE{S} section
- Make concurrent-safe, installs executables in libexec
PR: 236873
Reported by: Thomas Eckhardt <freebsd eckieck de> [1]
Submitted by: Thomas Eckhardt <freebsd eckieck de> [1]
Submitted by: Krzysztof <ports bsdserwis com> (maintainer) [2]
Approved by: Krzysztof <ports bsdserwis com> (maintainer)
Approved by: ports-secteam (miwi, blanket: runtime bugfix)
This package supports Python 3.x support, so allow it accordingly. It is
required for an upcoming www/py-autobahn update (Python 2/3 compatible).
During QA, a UnicodeDecodeError was observed running tests under Python 3:
File "/usr/local/lib/python3.6/site-packages/py/_vendored_packages/iniconfig.py", line 82, in _parse
for lineno, line in enumerate(line_iter):
File "/usr/local/lib/python3.6/encodings/ascii.py", line 26, in decode
return codecs.ascii_decode(input, self.errors)[0]
UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 165: ordinal not in range(128)
pytest uses the py package, which vendors the iniconfig package, which
isn't unicode aware [1][2][3]. Patch out unicode characters from setup.cfg
accordingly until it's resolved.
While investigating the cause of the above issue, a fix for setup.cfg's
encoding was identified, which removes the need to set the locale via
USE_LOCALE so remove it accordingly.
While I'm here:
- Pet portlint, spurious space at end of line in pkg-descr
- Add LICENSE_FILE/TEST_DEPENDS/test target/NO_ARCH
[1] https://github.com/pytest-dev/pytest/issues/3799
[2] https://github.com/RonnyPfannschmidt/iniconfig/issues/5
[3] https://github.com/RonnyPfannschmidt/iniconfig/issues/4
portlint: OK (looks fine.)
porttest: OK (poudriere: 12amd64{py36,py27})
maketest: 215 passed, 1 skipped in 3.29 seconds (Python 2.7)
maketest: 209 passed, 7 skipped in 3.07 seconds (Python 3.6)
Approved by: portmgr (blanket: ports/framework compliance)
Approved by: ports-secteam (joneum, blanket: ports/framework compliance)
This package installs scripts into LOCALBASE/bin, so must be concurrent
safe so packages for multiple Python versions don't conflict [1] on
installation.
[1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-May/116293.html
Reported by: Luis Espinoza Jr. <ljejr hotmail com> (via freebsd-ports) [1]
Approved by: koobs (python, maintainer)
Approved by: ports-secteam (blanket: port bug(s))
audio/lv2: Fix Python (3.x) build, Add missing dependencies
While lv2 itself works fine with any Python version we support, the build
fails using a Python > 3.6, since the build bundles an old version of waf.
waf upstream fixed the bug in a later version. [1]
Restrict Python to up to 3.6 for now. [2]
While here:
- Add missing dependencies identified in QA. [3]
- Pet portlint (USES order)
[1] facdc0b173
PR: 235103
Reported by: cs [3]
Submitted by: Charlie Li <ml+freebsd vishwin info> [2][3]
Approved by: Michael Beer <beerml sigma6audio de>
audio/lv2: Remove CONFLICTS_INSTALL
lv2core expired and was deleted on 2016-11-30 in ports r427460
I only noted this after committing ports r499627, so remove it accordingly.
PR: 235103
Approved by: Michael Beer <beerml sigma6audio de> (maintainer)
Approved by: ports-secteam (blanket: build fix, missing dependencies)
mail/exim: Rename LMDB_LIBS to _LMDB_LIBS
It otherwise looks like an options helper that appears after
bsd.port.options.mk which will be flagged as a DEV_ERROR after
D19553. Rename LMDB_INCLUDES too for consistency.
mail/exim: Fix build (linker) flags
"-export-dynamic" in EXIM_DYNAMIC_LDFLAGS is a linker option, currently
producing a warning during build:
/usr/bin/ld: warning: cannot find entry symbol xport-dynamic; defaulting to 00000000004019c0
The only reason that plugin modules work is that the option is redundant
with -rdynamic.
This change makes the minimum necessary change not relying on linker
argument compatibility (- vs --).
PR: 236426
Submitted by: <andrew tao11 riddles org uk>
Approved by: portmgr (maintainer timeout: ~6 weeks, "just fix it")
Approved by: ports-secteam (blanket: port bug(s))
Update to upstream release 1.1.1
While on it:
- Pet portlint
- Fix missing USES=gnome
multimedia/libbluray: Fix environment variable conflict with portmaster
libbluray (> 1.0.2,1) uses the PACKAGES variable in its configure scripts
that contains the names of packages it depends on. Portmaster also uses the
PACKAGES environment variable.
Using portmaster to install libbluray results in a corrupted libbluray
pkgconfig file containing portmasters PACKAGES path:
Requires.private: /usr/home/koobs/repos/freebsd/ports/packages libxml-2.0 freetype2 fontconfig
This breaks libbluray consumers such as ffmpeg.
This change nulls out the PACKAGES variable during the configure stage of
the build to prevent the issue. [1]
While I'm here,
- Sort JAVA_* and USE_* entries.
PR: 226009
Reported by: Martin Birgmeier <d8zNeCFG aon at> [1]
Submitted by: VVD <vvd unislabs com> [1]
Approved by: portmgr (unmaintained port)
Approved by: ports-secteam (blanket: bugfix release(s), runtime bugfix, missing dependencies)
- Rejig test invocation to exclude a test that hangs
- Update pkg-descr WWW to https://, where it redirects to
Changelog:
https://www.fabfile.org/changelog-v1.html
PR: 235194
Submitted by: Dani <i.dani outlook com>
Approved by: ports-secteam (blanket: bugfix release(s))
Upstream supports and tests against up to Python 3.6 [1] and declares up to
3.6 in its Trove Classifiers [2].
Fix incorrect Python version support declaration in USES=python accordingly,
allowing Python 3.x builds. [3]
While I'm here, add TEST_DEPENDS and a test target to help with QA.
[1] https://github.com/diyan/pywinrm/blob/master/.travis.yml
[2] setup.py: 'Programming Language :: Python :: 3.6'
PR: 237178 [3]
Reported by: <timp87 gmail com> [3]
Approved by: portmgr (blanket: bug fix, framework compliance)
Approved by: ports-secteam (blanket: bugfix)
databases/pgpool: Upgrade from 3.4.23 to 3.4.24
Changelog:
Enhancements
- Speed up failover when all of backends are down. (Tatsuo Ishii)
- pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii)
Bug fixes
- Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng)
- Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii)
- Fix black_function_list's broken default value. (Tatsuo Ishii)
- Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii)
- The error occurred while processing error message returned from backend and the cause is that the query string in question is too big. Problem is, the buffer is in fixed size (8192 bytes). Eliminate the fixed size buffer and use palloced buffer instead. This also saves some memory copy work.
- Fix DROP DATABASE failure. (Tatsuo Ishii)
- Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai)
- Fix compiler warnings. (Tatsuo Ishii)
Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-4-24.html
Approved by: ports-secteam (mivy)
graphics/drm-devel-kmod: fix package
Fix packaging of graphics/drm-devel-kmod, the amdkfd module has been
disabled, and I missed this last night. Remove it from the pkg-plist by
commenting it out for all architectures for now.
This is a stop gap measure to get the port to package, until I can touch
base with johalun and jmd about how to handle this permanently.
Sponsored by: B3 Init
Approved by: ports-secteam (implicit, drm-drivers blanket)
add graphics/drm-devel-kmod
Add graphics/drm-devel-kmod, development version of the lkpi based DRM
graphics drivers. This version is experimental, and for recent CURRENT
only.
This version currently corresponds to Linux 5.0 DRM drivers, and should give
better support for more recent Intel and AMD GPUs.
Please note that this port is copied from drm-current-kmod, rather than
resurrected from the old drm-devel-kmod port, that's because
drm-current-kmod was created by copying the old drm-devel-kmod when that
went to a more stable version.
Big thank you to everyone who has worked on this, and johalun in particuar,
who has done most of the heavy lifting.
Approved by: jmd (maintainer, implicit)
Sponsored by: B3 Init
drm-kmod ports: Update conflicts
Update conflicts for all drm-kmod ports to take into account the new
drm-devel-kmod port.
Sponsored by: B3 Init
Remove old drm-devel-kmod entry
Sponsored by: B3 Init
graphics/drm-current-kmod: Adjust FreeBSD compat
Update the FreeBSD OSVERSION compat of drm-current-kmod after the latest
update in r502043.
Suggested by: jbeich
Discussed with: johalun
Aproved by: jmd (maintainer, implicit)
Sponsored by: B3 Init
Approved by: ports-secteam (implicit, drm-drivers blanket)
graphics/drm-current-kmod: Update snapshot
Update graphics/drm-current-kmod to the latest snapshot.
This update takes into account changes in lkpi in base, and makes use of
debugfs in base, instead of the bundled one.
note: If you are on an older version of current, prior to r347973, you might
need to update current first, before updating this driver.
Approved by: jmd (maintainer, implicit)
Sponsored by: B3 Init
Approved by: ports-secteam (implicit, drm-drivers blanket)
www/firefox: restore SafeBrowsing v4 after r495403
Required for phishing protection. Not covered by uBlock Origin lists.
Looks like #Mozilla didn't announce the POLA-violating change anywhere
public despite backporting to ESR60.
https://bugzilla.mozilla.org/show_bug.cgi?id=1531176
Approved by: ports-secteam blanket
Add explicit build depend on python, since it's actually used during
the install phase.
PR: 237862
Submitted by: Christopher <inbox@alleghenycomputer.com>
Approved by: ports-secteam (miwi)
databases/mysql80-{client, server}: Update to latest release 8.0.16
This update includes:
Bugfixes:
- InnoDB: Undo tablespaces remained unencrypted after enabling
undo tablespace encryption at startup. (Bug #29477795)
- InnoDB: Problematic macros introduced with undo tablespace DDL support
(Bug #29324132, Bug #94243).
- InnoDB: Static thread local variables defined at the wrong scope
were not released at thread exit. (Bug #29305186)
- Memory leaks discovered in the innochecksum (Bug #28917614, Bug #93164).
New features:
- MySQL C API now supports asynchronous functions for
nonblocking communication with the MySQL server.
- MySQL now supports a new Chinese collation, utf8mb4_zh_0900_as_cs
- CMake now causes the build process to link with the llvm lld linker
for Clang if it is available.
Security Fix:
CVE-2019-2632, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695 and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL
PR: 237399
Reported by: Brent Busby <brent@jfi.uchicago.edu>
Sponsored by: The FreeBSD Foundation
Approved by: ports-secteam (feld, CVE-patch blanket)
databases/mysql57-{client, server}: Update to latest release 5.7.26
This update includes:
Bugfix:
- InnoDB: Optimized internal temporary tables did not support
in-place UPDATE operations
- InnoDB: A function called by a CREATE TABLE thread attempted access after free()
- InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES
was not updated when adding an index
- The authentication_ldap_simple plugin could enforce authentication incorrectly
More info: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-26.html
Security Fix:
CVE-2019-2632, CVE-2019-1559, CVE-2018-3123, and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL
PR: 237399
Reported by: Brent Busby <brent@jfi.uchicago.edu>
Sponsored by: The FreeBSD Foundation
Approved by: ports-secteam (feld, CVE-patch blanket)
databases/mysql56-{client, server}: Update to latest release 5.6.44
This update includes
Bugfix:
- InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES
was not updated when adding an index
- MySQL 5.6 did not build with maintainer mode enabled with GCC 7
- A damaged mysql.user table could cause a server exit
- mysqladmin shutdown did not wait for mysqld to shut down
More info: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-44.html
Security Fix:
CVE-2019-1559, CVE-2018-3123 and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL<Paste>
PR: 237399
Reported by: Brent Busby <brent@jfi.uchicago.edu>
Sponsored by: The FreeBSD Foundation
Approved by: ports-secteam (feld, CVE-patch blanket)
sysutils/py-google-compute-engine: disable boto
This avoids breakage when running with python3
PR: 237877
Submitted by: Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer)
Approved by: ports-secteam (implicit, bug fix)
Patch to add missing config and take the maintainership
Two new variables was added to instance_config.cfg file
in version 2.8.13 to allow the addition and removal of
users from groups.
I am also taking over the maintainership of this packages
as previously discussed with Helen.
Bump PORTREVISION.
PR: 236500
Submitted by: Lucas Kanashiro <lucas.kanashiro@collabora.com>
Approved by: Helen Koike <helen.koike@collabora.com> (maintainer)
sysutils/py-google-compute-engine: update to 20190416 [1]
This fixes a python3 runtime issue [1]
While here, pull in missing dependency in python3 case [2]
PR: 237505 [1]
PR: 237203 [2]
Submitted by: Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) [1]
Submitted by: Miroslav Lachman <000.fbsd@quip.cz> [2]
Approved by: Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) [2]
sysutils/py-google-compute-engine: fix daemons in python 2.7 case
PR: 237845
Reviewed by: koobs
Approved by: implicit (portmgr, python, jfi blanket)
Approved by: ports-secteam (implicit)
The PostgreSQL Global Development Group has released an update to all
supported versions of our database system, including 11.3, 10.8, 9.6.13,
9.5.17, and 9.4.22. This release fixes two security issues in the
PostgreSQL server, a security issue found in two of the PostgreSQL
Windows installers, and over 60 bugs reported over the last three months.
Security: CVE-2019-10129: Memory disclosure in partition routing
Prior to this release, a user running PostgreSQL 11 can read arbitrary
bytes of server memory by executing a purpose-crafted INSERT statement
to a partitioned table.
Security: CVE-2019-10130: Selectivity estimators bypass row security policies
PostgreSQL maintains statistics for tables by sampling data available in
columns; this data is consulted during the query planning process. Prior
to this release, a user able to execute SQL queries with permissions to
read a given column could craft a leaky operator that could read
whatever data had been sampled from that column. If this happened to
include values from rows that the user is forbidden to see by a row
security policy, the user could effectively bypass the policy. This is
fixed by only allowing a non-leakproof operator to use this data if
there are no relevant row security policies for the table.
This issue is present in PostgreSQL 9.5, 9.6, 10, and 11. The PostgreSQL
project thanks Dean Rasheed for reporting this problem.
Also fix a FreeBSD port problem with LLVM [1] and add promote command
to `service postgresql` [2]
PR: 236100, 234879
Submitted by: tomonori.usaka@ubin.jp [1], Trix Farrar [2]
Approved by: ports-secteam (joneum)
- Add USES=shebangfix where required in geany and geany-plugin-*
ports. This fixes build issues reported by users [1]
- Only bump PORTREVISION for geany-plugin-geanypy since the file
modified in it by shebangfix is actually installed with the pkg
PR: 237862 [1]
Submitted by: Christopher <inbox@alleghenycomputer.com>
Approved by: ports-secteam (joneum)
sysutils/pesign: mark BROKEN after r501212
In file included from /usr/local/include/nss/nss/cert.h:22,
from efikeygen.c:39:
efikeygen.c: In function 'add_cert_type':
/usr/local/include/nss/nss/certt.h:445:5: error: unsigned conversion from 'int' to 'unsigned char' changes value from '496' to '240' [-Werror=overflow]
(NS_CERT_TYPE_SSL_CLIENT | NS_CERT_TYPE_SSL_SERVER | NS_CERT_TYPE_EMAIL | \
^
efikeygen.c:208:23: note: in expansion of macro 'NS_CERT_TYPE_APP'
unsigned char type = NS_CERT_TYPE_APP;
^~~~~~~~~~~~~~~~
Reported by: pkg-fallout
Approved by: ports-secteam blanket