Commit Graph

472103 Commits

Author SHA1 Message Date
Jan Beich
8cf274f3f1 MFH: r498775
games/openbor: update to 6982

Changes:	21e153f5...85a39aff
Approved by:	ports-secteam (feld, implicit for snapshots)
2019-04-13 00:38:45 +00:00
Jan Beich
1f86bc9773 MFH: r498623
multimedia/libva-intel-media-driver: update to 19.1.p3.6

Changes:	3598ba46...42f6f231
Approved by:	ports-secteam (joneum)
2019-04-12 22:36:31 +00:00
Jan Beich
9dc3d18216 MFH: r498770
devel/icu: unbreak on big-endian after r496981

gmake[2]: *** No rule to make target 'out', needed by 'out/icudt64b.dat'.  Stop.
gmake[2]: Leaving directory '/usr/ports/devel/icu/work/icu/source/data'

PR:		236860
Reported by:	Piotr Kubaj, pkg-fallout
Obtained from:	Gentoo
Approved by:	ports-secteam blanket
2019-04-12 22:35:40 +00:00
Dimitry Andric
bef1ed3bc3 MFH: r498377
Fix build of www/squid and www/squid-devel with clang 8

This fixes an error with a defaulted copy constructor:

../../src/security/ServerOptions.h:38:5: error: explicitly defaulted copy constructor is implicitly deleted [-Werror,-Wdefaulted-function-deleted]
    ServerOptions(const ServerOptions &) = default;
    ^
../../src/security/ServerOptions.h:110:29: note: copy constructor of 'ServerOptions' is implicitly deleted because field 'clientCaStack' has a deleted copy constructor
    X509_NAME_STACK_Pointer clientCaStack;
                            ^
/usr/include/c++/v1/memory:2494:3: note: copy constructor is implicitly deleted because 'unique_ptr<stack_st_X509_NAME, Security::ServerOptions::sk_X509_NAME_free_wrapper>' has a user-declared move constructor
  unique_ptr(unique_ptr&& __u) noexcept
  ^

The copy constructor can instead be deleted.

Approved by:	portmgr (joneum)
PR:		236210
2019-04-12 20:26:19 +00:00
Li-Wen Hsu
f758635887 MFH: r498576
- Update to 2.164.2

Approved by:	swils (maintainer, implicitly)
Security:	8e9c3f5a-715b-4336-8d05-19babef55e9e
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (miwi)
2019-04-12 18:47:37 +00:00
Li-Wen Hsu
662b9d2731 MFH: r498571
- Update to 2.172

MFC after:	2 weeks
Security:	8e9c3f5a-715b-4336-8d05-19babef55e9e
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (miwi)
2019-04-12 18:44:00 +00:00
Mark Felder
d09b562a02 MFH: r498730
security/tlswrap: Add patch to fix support for modern OpenSSL

PR:		236137
2019-04-12 17:11:38 +00:00
Antoine Brodin
04f5ef28e7 MFH: r498723
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-12 15:20:21 +00:00
Matthias Fechner
74034141fd MFH: r498058 r498676
Bugfix upgrade to 11.9.6.
https://about.gitlab.com/2019/04/04/gitlab-11-9-6-released/

Security Update to 11.9.7.
Please see here for more details:
https://about.gitlab.com/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/

It should be merged to 2019Q2 together with:
www/gitlab-ce
498058
devel/gitaly
498360

Security:	a0602fa0-5c1c-11e9-abd6-001b217b3468

Approved by:	ports-secteam (joneum)
2019-04-12 11:19:22 +00:00
Matthias Fechner
e7393a20ac MFH: r498360
Changed the build order that the port also works with bundler version 2.

Approved by:	ports-secteam (joneum)
2019-04-12 11:17:59 +00:00
Luca Pizzamiglio
5d0bf282c6 MFH: r498468
devel/pecl-xdebug: Update to 2.7.1

Changelog:	https://xdebug.org/updates.php#x_2_7_1
Sponsored by:	trivago N.V.

Approved by:	portmgr ports-secteam
2019-04-12 09:27:55 +00:00
Vasil Dimov
6fdfbaeb3c MFH: r498557
ftp/wget: Upgrade from 1.20 to 1.20.3

Changelog: http://git.savannah.gnu.org/cgit/wget.git/plain/NEWS

Security:	CVE-2018-20483

Approved by:	ports-secteam (joneum)
2019-04-12 08:55:48 +00:00
Antoine Brodin
8cc6181dbb MFH: r498703
Mark BROKEN on i386

Reported by:	pkg-fallout
2019-04-12 08:19:29 +00:00
Koichiro Iwao
5fd0fb13b9 MFH: r498459
deskutils/meteo: fix build with GCC-based architectures

PR:		237027
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
Approved by:	Hiroki Tagato <tagattie@yandex.com> (maintainer)

Approved by:	portmgr (joneum)
2019-04-12 07:54:33 +00:00
Antoine Brodin
84350d5ee2 MFH: r497940
net/boringtun: Mark IGNORE because the first and only available release was deleted from upstream
2019-04-12 07:32:59 +00:00
Antoine Brodin
f5f00dbe2a MFH: r498695
Mark BROKEN: fails to build

extract.c:42:8: error: unknown type name 'u_int64'
extern u_int64 extract(struct ftio *, struct parsetree *, struct ftver *, struct ftio *, int);
       ^
extract.c:81:13: error: expected ';' after expression
     u_int64 total_flows;
            ^
            ;

Reported by:	pkg-fallout
2019-04-12 05:47:54 +00:00
Antoine Brodin
f4d4268109 MFH: r498693
Mark BROKEN on i386

Reported by:	pkg-fallout
2019-04-12 05:37:59 +00:00
Tobias Kortkamp
314183d0ab MFH: r498687
graphics/netpbm: Update to 10.86.02

- Fixes yet another bug in pnmcrop

Changes:	https://gitlab.com/tobiask/netpbm/raw/v10.86.02/doc/HISTORY

Approved by:	ports-secteam blanket
2019-04-11 22:46:16 +00:00
Antoine Brodin
d1a99834b6 MFH: r498679
Mark BROKEN on i386: missing distinfo

Reported by:	pkg-fallout
2019-04-11 20:33:26 +00:00
Torsten Zuehlsdorff
72cdfbe5fe MFH: r498659
PHP: Change MOD_PRIO for imap to avoid core dumps

PR:		235917
Reported by:	Sergey Anokhin <admin@5034.ru>

Approved by:	ports-secteam (joneum)
2019-04-11 10:58:18 +00:00
Koichiro Iwao
948c13d10f MFH: r498632
net/remotebox: Update dependency after net/tigervnc separation

- vncviewer is now installed as net/tigervnc-viewer
- Bump PORTREISION due to dependency change
- Pet portlint (extra item in USES section)

PR:		236928
Submitted by:	myself
Approved by:	kai (maintainer)

Approved by:	portmgr (antonie)
2019-04-11 06:00:34 +00:00
Jan Beich
39147b130c MFH: r498630
www/firefox: update to 66.0.3

Changes:	https://www.mozilla.org/firefox/66.0.3/releasenotes/
PR:		235300
Approved by:	ports-secteam blanket
2019-04-11 02:06:58 +00:00
Jan Beich
d1b475f443 MFH: r498621
emulators/citra: update to s20190409

Changes:	2ff7ed420...e9c2b27c6
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-04-11 00:54:26 +00:00
Torsten Zuehlsdorff
b74cb8c84d MFH: r498353
databases/pgpool-II-40: Upgrade from 4.0.3 to 4.0.4

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii, Yugo Nagata)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

    * Doc: add more explanation to follow_master_command. (Tatsuo Ishii)

      Add description how follow_master_command is executed etc.

    * Doc: add note to detach_false_primary configuration parameter. (bug 469) (Tatsuo Ishii)

      To use this feature, sr_check_user must be super user or in pg_monitor group.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-4-0-4.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:45:37 +00:00
Torsten Zuehlsdorff
bdfe2823c0 MFH: r498352
databases/pgpool-II-37: Upgrade from 3.7.8 to 3.7.9

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii, Yugo Nagata)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-7-9.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:43:46 +00:00
Torsten Zuehlsdorff
ea4911c771 MFH: r498351
databases/pgpool-II-36: Upgrade from 3.6.15 to 3.6.16

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii, Yugo Nagata)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

    Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-6-16.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:42:35 +00:00
Torsten Zuehlsdorff
0ced55ec23 MFH: r498350
databases/pgpool: Upgrade from 3.5.19 to 3.5.20

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-5-20.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:41:04 +00:00
Torsten Zuehlsdorff
27335e4549 MFH: r498348
databases/pgpool: Update from 3.4.22 to 3.4.23

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-4-23.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:37:41 +00:00
Jung-uk Kim
431c85174d MFH: r498535
Update to 32.0.0.171.

https://helpx.adobe.com/security/products/flash-player/apsb19-19.html

Approved by:	ports-secteam (blanket)
2019-04-10 07:41:34 +00:00
Mark Linimon
25ff2d9617 MFH: r498488
Add -fnested-functions to CFLAGS when using base GCC to fix build.

While here, pet portlint.

Approved by:	portmgr (tier-2 blanket)
2019-04-09 18:07:29 +00:00
Mark Linimon
eddfb0a564 MFH: r498486
This port requires a C++11-compatible compiler, so add USES=compiler:c++11-lang
to fix build on GCC-based architectures.

While here, add USES=sdl.

PR:		237100
Submitted by:	Piotr Kubaj
Approved by:	portmgr (tier-2 blanket)
2019-04-09 18:00:27 +00:00
Mark Linimon
3bf4463578 MFH: r498484
Remove #pragma GCC diagnostic to fix build on GCC-based architectures.

PR:		237097
Submitted by:	Piotr Kubaj
Approved by:	portmgr (tier-2 blanket)
2019-04-09 17:47:42 +00:00
Antoine Brodin
c27fb10e52 MFH: r498462
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-09 08:08:50 +00:00
Antoine Brodin
5e132044be MFH: r498460
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-09 08:05:50 +00:00
Antoine Brodin
484dcff61f MFH: r498449
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-09 05:50:31 +00:00
Antoine Brodin
fe44c48247 MFH: r498447
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-09 05:48:52 +00:00
Antoine Brodin
42c954e110 MFH: r498445
Mark BROKEN on i386

main.cpp:104:24: error: non-constant-expression cannot be narrowed from type 'unsigned int' to 'time_t' (aka 'int') in initializer list [-Wc++11-narrowing]
    timeval timeout = {refreshdelay, 0};
                       ^~~~~~~~~~~~

Reported by:	pkg-fallout
2019-04-09 05:38:43 +00:00
Antoine Brodin
fd2c454d97 MFH: r498443
Mark BROKEN on amd64: fails to configure

checking build system type... Invalid configuration `amd64-portbld-freebsd11.2': machine `amd64-portbld' not recognized

Reported by:	pkg-fallout
2019-04-09 05:34:22 +00:00
Jan Beich
8b2b78ae0a MFH: r498437
emulators/citra: update to s20190407

Changes:	d5bcb45b2...2ff7ed420
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-04-09 00:32:47 +00:00
Mark Linimon
ff8e9d191a MFH: r498385
Add compiler:c++11-lang to USES to fix build on GCC-based architectures:

  /usr/local/lib/libgraphite2.so.3: undefined reference to `__cxa_throw_bad_array_new_length@CXXABI_1.3.8'

While here, pet portlint and alpha sort some USE* variables.

Approved by:	portmgr (tier-2 blanket)
2019-04-08 16:50:55 +00:00
Jan Beich
d74e95a85e MFH: r498363
www/firefox: enable -fstack-protector-strong

aarch64 already used it, so switch x86 as well. Mk/bsd.ssp.mk doesn't
appear maintained, anyway.

Approved by:	ports-secteam blanket
2019-04-08 12:40:26 +00:00
Jan Beich
72234d27ad MFH: r498362
www/firefox: switch to upstream fix for non-x86

PR:		233707
Approved by:	ports-secteam blanket
2019-04-08 12:40:01 +00:00
Cy Schubert
709ae1fdca MFH: r498232
racoon2 as maintained by Chrisos Zoulas (@netbsd.org) only supports
opnessl111. Mark it as unsupported on FreeBSD 11.

Approved by:	portmgr (miwi@)
2019-04-08 04:02:12 +00:00
Tobias Kortkamp
00228fee29 MFH: r498261
graphics/netpbm: Update to 10.86.01

Changes:	https://gitlab.com/tobiask/netpbm/raw/v10.86.01/doc/HISTORY

Approved by:	ports-secteam blanket
2019-04-08 00:45:06 +00:00
Tobias Kortkamp
7b75219e6d MFH: r498336
devel/ccls: Fix build with multiple llvm* packages installed

Apparently it is possible for the build to pick multiple LLVM
versions if LLVM_DIR is not explicitly set similar to Clang_DIR.

$ grep llvm $(make -V CONFIGURE_WRKSRC)/CMakeCache.txt
Clang_DIR:PATH=/usr/local/llvm80/lib/cmake/clang
LLVM_DIR:PATH=/usr/local/llvm50/lib/cmake/llvm

PR:		237089
Submitted by:	fullermd@over-yonder.net

Approved by:	ports-secteam blanket
2019-04-08 00:38:29 +00:00
Mark Linimon
55d6457115 MFH: r498293
Maintainer Update nsysctl 0.1 -> 0.1.1:

  Fix "pkg-fallout": includes in opaque.c for no i386/amd64
  delete sysctlmibinfo.h/c: add devel/libsysctlmibinfo to LIB_DEPENDS

Note: this obsoletes files/patch-opaque.c.

PR:		236802
Submitted by:	maintainer

Approved by:	portmgr (tier-2 blanket)
2019-04-07 16:41:54 +00:00
Mark Linimon
4728eb0006 MFH: r498288
Fix build on GCC-based architectures by setting -Wno-reserved-user-defined-literal
only for clang.

While here, pet portlint (add 'gl' to USES).

Approved by:	portmgr (tier-2 blanket)
2019-04-07 16:34:21 +00:00
Mark Linimon
2e578cd3ed MFH: r498285
Don't use GCC 4.2 on GCC-based architectures; this port requires at
least GCC 4.7, so change USE_GCC=any to USE_GCC=yes.

PR:		236903
Submitted by:	Piotr Kubaj
Approved by:	portmgr (tier-2 blanket)
2019-04-07 16:28:00 +00:00
Antoine Brodin
da917f0d40 MFH: r498259
Mark BROKEN on i386

In file included from crafty.c:28:
./tbprobe.c:111:9: error: invalid operand for instruction
__asm__("bsfq %1, %0": "=r"(idx):"rm"(b));

Reported by:	pkg-fallout
2019-04-07 06:28:17 +00:00
Antoine Brodin
5026189f88 MFH: r498256
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-07 06:21:11 +00:00