Commit Graph

503339 Commits

Author SHA1 Message Date
Kai Knoblich
cc6d1f18c8 MFH: r531828
net-mgmt/netbox: Update to 2.7.12

Changelog:

Enhancements:
* Reference VRF by name rather than RD during IP/prefix import
* Use absolute URLs in rack elevation SVG renderings
* Allow connecting cables between two circuit terminations
* Add the webhook_receiver management command to assist in troubleshooting
  outgoing webhooks

Bug Fixes:
* Fix typing of count_ipaddresses on interface serializer
* Fail cleanly when trying to import multiple device types simultaneously
* Fix exception when disconnecting a cable from a power feed
* Tweak display of unset custom integer fields
* Fix reservation edit/delete button URLs on rack view

https://github.com/netbox-community/netbox/releases/tag/v2.7.12

Approved by:	ports-secteam (joneum)
2020-04-16 19:30:08 +00:00
Tijl Coosemans
ea73549b8c MFH: r531766
Update to 2.16.6.

Security:	https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04
Approved by:	ports-secteam (joneum)
2020-04-16 18:15:31 +00:00
Niclas Zeising
12e06e87eb MFH: r531787
x11-drivers/xf86-video-ati: Fix missing hw cursor

Add an upstream patch (submitted by myself and danfe) to fix the issue where
the hw cursor sometimes does not work when using x11-drivers/xf86-video-ati.
Big thanks to danfe@ for debugging and testing and figuring out what's going
on.

For details on the change, see upstream issue:
https://gitlab.freedesktop.org/xorg/driver/xf86-video-ati/-/issues/190

PR:		237642
Reported by:	jwb

Approved by:	ports-secteam (joenum)
2020-04-16 17:47:56 +00:00
Steve Wills
ebeb8c2443 MFH: r531845
databases/memcached: update to 1.6.5

PR:		245628
Submitted by:	Artyom Davidov <ard_1@mail.ru>

Approved by:	ports-secteam (implicit, bug fix release)
2020-04-16 12:41:13 +00:00
Matthias Andree
aebd71086a MFH: r531837
security/openvpn: Fix illegal client float (CVE-2020-11810)

There is a time frame between allocating peer-id and initializing data
channel key (which is performed on receiving push request or on async
push-reply) in which the existing peer-id float checks do not work right.

If a "rogue" data channel packet arrives during that time frame from another
address and with same peer-id, this would cause client to float to that new
address.

The net effect of this behaviour is that the VPN session for the "victim
client" is broken. Since the "attacker client" does not have suitable keys,
it can not inject or steal VPN traffic from the other session. The time
window is small and it can not be used to attack a specific client's session,
unless some other way is found to make it disconnect and reconnect first.

This fix is inherited by the openvpn-mbedtls slave port.

Blanket "Backport of security and reliability fixes which only result in
PORTREVISION bumps and no changes to enabled features. for example, adding
a patch fixing a buffer overflow."

Obtained from:	Lev Stipakov (OpenVPN)
Security:	CVE-2020-11810
Security:	8604121c-7fc2-11ea-bcac-7781e90b0c8f

Approved by:	ports-secteam@ (blanket security/reliability fix)
2020-04-16 09:48:23 +00:00
Jung-uk Kim
b579db31e2 MFH: r531817
Update to 32.0.0.363.

Approved by:	ports-secteam (blanket)
2020-04-16 05:38:43 +00:00
Jan Beich
c759f8ffc9 MFH: r531625 r531733
devel/git-cinnabar: unbreak after r531622

../helper/cinnabar-helper.c:195:41: error: too few arguments to function call, expected 5, have 4
        st = open_istream(oid, &type, &sz, NULL);
             ~~~~~~~~~~~~                      ^
./streaming.h:11:1: note: 'open_istream' declared here
struct git_istream *open_istream(struct repository *, const struct object_id *,
^

Obtained from:	upstream
Approved by:	ports-secteam blanket
2020-04-16 03:05:48 +00:00
Kyle Evans
c1ddb8e968 MFH: r531802
security/bsmtrace: switch MAINTAINER over to csjp@

alm@ and csjp@ are both upstream maintainers of bsmtrace; they've decided to
transfer maintainership of bsmtrace over to csjp@. PORTREVISION bump to
reflect the new maintainer in the package.

Approved by:	alm (maintainer, via e-mail)
Approved by:	koobs (mentor, ports)

Approved by:	ports-secteam (blanket: metadata update, MAINTAINER consistency)
2020-04-16 00:28:06 +00:00
Kyle Evans
15ade024d9 MFH: r531736
Fix r531689 i386 build.

PR:		236616, 244847
Submitted by:	kevans
MFH-with:	r531689

Approved by:	ports-secteam (blanket: i386 build fix)
2020-04-16 00:19:35 +00:00
Mathieu Arnold
e3d70adc89 MFH: r531791 r531792
Update to 9.11.18 & 9.16.2.

Changes:	https://downloads.isc.org/isc/bind9/9.16.2/RELEASE-NOTES-bind-9.16.2.html
Changes:	https://downloads.isc.org/isc/bind9/9.11.18/RELEASE-NOTES-bind-9.11.18.html
2020-04-15 20:47:57 +00:00
Jan Beich
54e03dbb58 MFH: r531780
devel/android-tools-adb: fix TEST=on after r527733

socket_spec_test.cpp:101: Failure
Expected equality of these values:
  5555
  get_host_socket_spec_port("vsock:5555", &error)
    Which is: -1

* thread #1, name = 'adb_test', stop reason = signal SIGILL: privileged instruction
    frame #0: 0x00000000003fc604 adb_test`GetThreadId() at logger_write.cpp:240:31
   237  #endif
   238
   239  // Copied from base/threads.cpp
-> 240  static uint64_t GetThreadId() {
   241  #if defined(__BIONIC__)
   242    return gettid();
   243  #elif defined(__APPLE__)
(lldb) bt
* thread #1, name = 'adb_test', stop reason = signal SIGILL: privileged instruction
  * frame #0: 0x00000000003fc604 adb_test`GetThreadId() at logger_write.cpp:240:31
    frame #1: 0x00000000003fc3ce adb_test`::__android_log_stderr_logger(logger_data=0x00007fffffffce60, message="foobar") at logger_write.cpp:274:18
    frame #2: 0x00000000003fc92a adb_test`::__android_log_write_logger_data(logger_data=0x00007fffffffce60, msg="foobar") at logger_write.cpp:329:3
    frame #3: 0x00000000003f6c44 adb_test`android::base::LogMessage::LogLine(file="logging_test.cpp", line=603, severity=ERROR, tag=0x0000000000000000, message="foobar") at logging.cpp:581:5
    frame #4: 0x00000000003f683d adb_test`android::base::LogMessage::~LogMessage(this=0x00007fffffffd000) at logging.cpp:542:7
    frame #5: 0x00000000004f76fe adb_test`TestLoggingInConstructor() at logging_test.cpp:603:3

* thread #1, name = 'adb_test', stop reason = signal SIGSEGV: invalid address (fault address: 0x14)
    frame #0: 0x00000000004c8dc8 adb_test`file_RemoveFileIfExists_EACCES_Test::TestBody(this=0x0000000800f91060) at file_test.cpp:247:19
   244    // root can bypass permission restrictions, so drop root.
   245    if (getuid() == 0) {
   246      passwd* shell = getpwnam("shell");
-> 247      setgid(shell->pw_gid);
   248      setuid(shell->pw_uid);
   249    }
   250
(lldb) bt
* thread #1, name = 'adb_test', stop reason = signal SIGSEGV: invalid address (fault address: 0x14)
  * frame #0: 0x00000000004c8dc8 adb_test`file_RemoveFileIfExists_EACCES_Test::TestBody(this=0x0000000800f91060) at file_test.cpp:247:19
    frame #1: 0x0000000800982d6e libgtest.so`void testing::internal::HandleSehExceptionsInMethodIfSupported<testing::Test, void>(object=0x0000000800f91060, method=21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00, location="the test body")(), char const*) at gtest.cc:2433:10
    frame #2: 0x0000000800962399 libgtest.so`void testing::internal::HandleExceptionsInMethodIfSupported<testing::Test, void>(object=0x0000000800f91060, method=21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00, location="the test body")(), char const*) at gtest.cc:2469:14
    frame #3: 0x0000000800942b43 libgtest.so`testing::Test::Run(this=0x0000000800f91060) at gtest.cc:2508:5
    frame #4: 0x0000000800943792 libgtest.so`testing::TestInfo::Run(this=0x0000000800fa3ba0) at gtest.cc:2684:11
    frame #5: 0x0000000800943e17 libgtest.so`testing::TestSuite::Run(this=0x0000000800fa34a0) at gtest.cc:2816:28
    frame #6: 0x0000000800950480 libgtest.so`testing::internal::UnitTestImpl::RunAllTests(this=0x0000000800fa4000) at gtest.cc:5338:44
    frame #7: 0x0000000800987bfe libgtest.so`bool testing::internal::HandleSehExceptionsInMethodIfSupported<testing::internal::UnitTestImpl, bool>(object=0x0000000800fa4000, method=40 00 95 00 08 00 00 00 00 00 00 00 00 00 00 00, location="auxiliary test code (environments or event listeners)")(), char const*) at gtest.cc:2433:10
    frame #8: 0x00000008009650a9 libgtest.so`bool testing::internal::HandleExceptionsInMethodIfSupported<testing::internal::UnitTestImpl, bool>(object=0x0000000800fa4000, method=40 00 95 00 08 00 00 00 00 00 00 00 00 00 00 00, location="auxiliary test code (environments or event listeners)")(), char const*) at gtest.cc:2469:14
    frame #9: 0x000000080094ffd4 libgtest.so`testing::UnitTest::Run(this=0x000000080099a0d8) at gtest.cc:4925:10
    frame #10: 0x0000000000543cf1 adb_test`RUN_ALL_TESTS() at gtest.h:2473:46
    frame #11: 0x0000000000543c70 adb_test`main(argc=1, argv=0x00007fffffffeae8) at test_main.cpp:24:10
    frame #12: 0x000000000031710f adb_test`_start(ap=<unavailable>, cleanup=<unavailable>) at crt1.c:76:7

PR:		245642
Submitted by:	Marcin Cieślak (based on)
Approved by:	ports-secteam blanket (crash fix)
2020-04-15 19:16:27 +00:00
Guido Falsi
19267472d2 MFH: r531758
Import patch from upstream pull request to stop easystroke creating
zombie processes for each spawned process.

Obtained from:	https://github.com/thjaeger/easystroke/pull/6

Approved by:	portmgr (blanket: runtime fix)
2020-04-15 14:55:03 +00:00
Renato Botelho
31eb82bf11 MFH: r531622 r531627 r531715
devel/git: Update to 2.26.0

Sponsored by:	Rubicon Communications, LLC (Netgate)

devel/git: Fix build

I've committed the wrong changes in r531622 breaking git build.  Fix it now.

Reported by:	mandree and jbeich
Sponsored by:	Rubicon Communications, LLC (Netgate)

devel/git: Update to 2.26.1

Security:	CVE-2020-5260
Sponsored by:	Rubicon Communications, LLC (Netgate)

Approved by:	ports-secteam (joneum)
2020-04-15 14:21:57 +00:00
Fernando Apesteguía
08e1301ff5 MFH: r531747
x11-themes/cursor-jimmac-theme: Update MASTER_SITES, unbreak

PR:	245608
Submitted by:	ps.ports@smyrak.com (maintainer)

Approved by:	portmgr
2020-04-15 07:40:27 +00:00
Craig Leres
98a3b92a7b MFH: r531729
security/zeek: Update to 3.0.4 and address a remote crash vulnerability:

   e059d4ec2e/NEWS

 - Fix stack overflow in POP3 analyzer. An attacker can crash Zeek
   remotely via crafted packet sequence.

Other fixes:

 - Fix use-after-free in Zeek lambda functions with uninitialized
   locals

 - Fix buffer overflow due to tables/records created at parse-time
   not rebuilt on record redef

 - Fix SMB NegotiateContextList parsing

 - Fix binpac flowbuffer frame length parsing doing too much bounds
   checking

 - Fix parsing ERSPAN III optional sub-header

 - Fix bug in intel indicator normalization

 - Fix connection duration thresholding

 - Fix X509Common.h header include for external plugins

 - Fix incorrect targeting of node-specific Broker/Cluster messages

Approved by:	ports-secteam (joneum)
2020-04-14 21:27:30 +00:00
Craig Leres
60a65a6854 MFH: r531711
security/zeek: Fix typo in the rc.d script

(From the PR) "bro_stop" should say "zeek_stop" instead.

PR:		245612
Reported by:	bugs@codejammer.se

Approved by:	ports-secteam (joneum)
2020-04-14 20:30:37 +00:00
Jan Beich
69c3d10e10 MFH: r531647
emulators/yuzu: advertise Vulkan support

Vulkan lazy bindings are always enabled, built against bundled headers

Approved by:	ports-secteam (joneum)
2020-04-14 19:15:58 +00:00
Guido Falsi
08a2ad490a MFH: r531641
Add patch replacing lua_tonumber() with lua_tointeger() inside
htons() calls.

Tese were causing build to fail on armv7, and it's more correct anyway.

Submitted by:	garga (via email)

Approved by:	ports-secteam (joneum)
2020-04-14 19:04:21 +00:00
Kyle Evans
0aaca77f4d MFH: r531689
emulators/virtualbox-ose: Switch build to USES= compiler:c++14-lang

The runtime breakage that started occurring after the LLVM 7 -> 8 transition
has been diagnosed with help from cem@, and the attached patch fixes it. The
problem ended up being that tail-call optimization was being applied to this
function (which should probably be written in assembly instead) and moving
the tail-call to later on after some stack manipulations. The problem with
this is that this particular function uses alloca() to carefully craft a
stack that it's expecting to be used for the function it's calling at the
end.

The new patch fixes this using a technique that was committed later on in
upstream changeset 75061 to address a similar failure with GCC sanitizers
enabled. The FreeBSD-specific component of this patch is using the different
stack setup if __clang__ is defined as well.

The extra hunk in the Config patch has been added because the VirtualBox
build system cannot cope with LLVM version numbers in the way it's
expecting. Hardcode it to GCC 4.2 for FreeBSD, which is what the clang
__GNU* macros describe, to fix build breakage that happens with newer LLVM
as the build system decides our LLVM is an even older and more broken
version of GCC with a broken regparm.

PR:		236616, 244847
Approved by:	koobs (mentor)

Approved by:	ports-secteam (blanket: major runtime fix caused by bad build)
2020-04-14 13:51:04 +00:00
Jan Beich
763027ab13 MFH: r531649
emulators/citra: update to s20200413

Changes:	23921e320...7e4a132a7
Approved by:	ports-secteam (swills, implicit for snapshots)
2020-04-14 00:57:22 +00:00
Rene Ladan
ed814bdbf8 MFH: r531592
www/chromium: update to 81.0.4044.92

Currently the camera and geolocation do not work.

Submitted by:	Matthias Wolf
Obtained from:	https://github.com/gliaskos/freebsd-chromium/pull/173
Obtained from:	https://github.com/gliaskos/freebsd-chromium/pull/174
Security:	https://www.vuxml.org/freebsd/6e3b700a-7ca3-11ea-b594-3065ec8fd3ec.html

Approved by:	ports-secteam (joneum)
2020-04-13 17:12:01 +00:00
Brooks Davis
20a4008835 MFH: r531333
Fix bitrotted code.

Drop maintainership.  I don't use this port much as evidenced by the
fact that one of these bugs was fixed in Arch Linux in 2016
(https://bugs.archlinux.org/task/46571).

Submitted by:	Jacob D Hunt

Approved by:	ports-secteam (joneum)
2020-04-13 17:07:46 +00:00
Piotr Kubaj
dcf90e2f1d MFH: r531597
multimedia/obs-qtwebkit: fix build on powerpc64

cc1plus: error: unrecognized command line option "-std=c++11"

Additionally, this port tries to use SSE, so it needs -DNO_WARN_X86_INTRINSICS -maltivec -mvsx on powerpc64 to use GCC's translation layer to AltiVec.

Also respect CXXFLAGS to make it work.

PR:		243658
Approved by:	swills (maintainer)
Approved by:	portmgr (fix build blanket)
2020-04-13 12:13:32 +00:00
Antoine Brodin
22ff8e12c9 MFH: r531579
Mark BROKEN: fails to configure

Reported by:	pkg-fallout
2020-04-13 07:06:28 +00:00
Guido Falsi
299b10193d MFH: r531554
x11/libxfce4menu: Fix leaked keygrabs when layout changes

As diagnosed by Jethro Nederhof, xfce-shortcuts-grabber.c attempts to update
grabbed key shortcuts when xkeyboard layout changes. Unfortunately, it had no
memory of which keycodes it has actually grabbed. Instead, it attempted to
ungrab the *new* keycode, which obviously doesn't actually ungrab those codes.

This went unnoticed for some time, probably because nothing collided with
important keys. Recently, a default PrintScreen shortcut was added to Xfce,
which for whatever reason seems to collide with Up in initial layout. When the
kbd layout changes, the shortcut ungrabs the *new* Printscreen keycode and then
re-grabs the same keycode, leaving the Up keycode grabbed.

Fix this by giving xfce-shortcuts-grabber some memory of which keycodes it has
grabbed. When it grabs a key, it remembers the keycode it grabbed in the
XfceKey object. When it ungrabs a key, it ungrabs the keycodes in the XfceKey
object, rather than those for the new keyboard layout.

PR:		244290
Reported by:	Aryeh Friedman <aryeh.friedman AT gmail.com>, many others
Approved by:	madpilot
Differential Revision:	https://reviews.freebsd.org/D24338

Approved by:	portmgr (blanket, runtime fix)
2020-04-12 20:47:19 +00:00
Tobias C. Berner
f0017d2c84 MFH: r531540 r531541
astro/opencpn: Update to 5.0.0

PR:		243447
Submitted by:	ml@netfence.it (maintainer)

astro/opencp: remove manual man compression

Approved by:	ports-secteam (blanket)
2020-04-12 18:40:55 +00:00
Adam Weinberger
1665011444 MFH: r531528
Approved by:	portmgr (with hat)

vim: Fix environment contamination from libcanberra

Vim will link against libcanberra if it's present, leading to an
undeclared link and breakage risk if canberra is removed. It only really
makes sense for it to do this during a gnome build, so explicitly
enable it there and disable it elsewhere.

PR:		245460
Reported by:	Andy Mender
2020-04-12 16:12:07 +00:00
Antoine Brodin
e069d2dabc MFH: r530708
www/py-flask-smorest: Update to 0.21.0

PR:		244950
Submitted by:	Goran Meki? <meka@tilda.center>
2020-04-12 15:33:33 +00:00
Antoine Brodin
4f4c1e5233 MFH: r531087
www/p5-Net-Curl: upgrade 0.42 -> 0.44

PR:		245322
Submitted by:	Andrew Fengler <andrew.fengler@scaleengine.com> (maintainer)
Relnotes:	https://metacpan.org/changes/distribution/Net-Curl
2020-04-12 15:24:15 +00:00
Antoine Brodin
fc1a7b5640 MFH: r531513
Mark BROKEN: fails to build

Reported by:	pkg-fallout
2020-04-12 12:58:21 +00:00
Tobias Kortkamp
fd2f6e6b2e MFH: r531510
security/keepassxc: Update to 2.5.4

Changes:	https://github.com/keepassxreboot/keepassxc/releases/tag/2.5.4
PR:		245499
Approved by:	Andrew Romanenko <melanhit@gmail.com> (maintainer)

Approved by:	ports-secteam blanket
2020-04-12 12:49:49 +00:00
Matthias Andree
3a61ee3829 MFH: r531475 r531476 r531477 r531478
dns/dnsmasq: repair damage from UNAUTHORIZED UCL conversion of pkg-message

The pkg-message contains a security note that is necessary on
new installs and on updates alike.

Since per the porter's handbook, the UCL does not support enumeration
of types, and this is not relevant on removal, the UCL change must be
reverted.  While here, remove formatting.

Failure inducing commit:
|------------------------------------------------------------------------
|r508835 | mat | 2019-08-13 18:01:59 +0200 (Tue, 13 Aug 2019) | 2 lines
|
|Convert to UCL & cleanup pkg-message (categories d)
|
|------------------------------------------------------------------------

NOTE: The UCL conversion of files/pkg-message.in was not authorized
and damaging and no heads-up was sent to the maintainer.

portmgr@ MUST act more carefully with sweeping changes and hand them out
for review first.

dns/dnsmasq-devel: synch non-UCL pkg-message.in

e2fsprogs, rawtherapee: Repair more UCL pkg-message conversion errors.

Both pkg-message texts are relevant for updates.

Reverting this part of UNAUTHORIZED commits, and bump PORTREVISION.
Clean up pkg-message.

Failure-inducing commits:

------------------------------------------------------------------------
r508837 | mat | 2019-08-13 18:03:11 +0200 (Tue, 13 Aug 2019) | 2 lines

Convert to UCL & cleanup pkg-message (categories e-g)

------------------------------------------------------------------------
r508909 | mat | 2019-08-14 14:16:12 +0200 (Wed, 14 Aug 2019) | 2 lines

Convert to UCL & cleanup pkg-message (categories s)

------------------------------------------------------------------------

mail/mailman: repair incomplete UCL conversion of pkg-message.in

There are parts of the install message that are also relevant on
updates, but were missed. Add them, and bump PORTREVISION.

Failure-inducing commit:

------------------------------------------------------------------------
r508882 | mat | 2019-08-14 00:29:42 +0200 (Wed, 14 Aug 2019) | 2 lines

onvert to UCL & cleanup pkg-message (categories l-m)

------------------------------------------------------------------------

Approved by:	ports-secteam@ (blanket, only changing pkg-message[.in])
2020-04-12 02:43:28 +00:00
Jan Beich
29dc44ba5d MFH: r531433
multimedia/librav1e: unbreak PREFIX != LOCALBASE

$ poudriere testport -Pj 113i386 multimedia/librav1e
[...]
strip: open /wrkdirs/usr/ports/multimedia/librav1e/work/stage/prefix/librav1e-0.3.1_3/lib/*.so failed: No such file or directory

PR:		245536
Reported by:	mi
Approved by:	ports-secteam blanket
2020-04-11 16:19:19 +00:00
Jan Beich
3277d30469 MFH: r531422
emulators/rpcs3: unbreak audio after r529285

INFO: OpenAudioDevice failed: Fragment size must be a power of two
Segfault reading location 00000000000000d4 at 0000000001de1abd.
Emu Thread Name: 'cellAudio Thread'.
Thread id = 0x89cf05700.

Approved by:	ports-secteam blanket (crash fix)
2020-04-11 13:01:16 +00:00
Mark Linimon
53720ae1d0 MFH: r531403
Mark as BROKEN on 13 for the time being while the regression is being
investigated.

PR:		245520
Submitted by:	maintainer

Approved by:	portmgr ("just fix it")
2020-04-11 06:53:15 +00:00
Tobias Kortkamp
afe3204040 MFH: r531394
deskutils/ausweisapp2: Fix build on FreeBSD 11.3

CMake Error at /usr/local/share/cmake/Modules/FindPackageHandleStandardArgs.cmake:146 (message):
  Could NOT find OpenSSL, try to set the path to OpenSSL root folder in the
  system variable OPENSSL_ROOT_DIR: Found unsuitable version "1.0.2s", but
  required is at least "1.1" (found /usr/lib/libcrypto.so)
Call Stack (most recent call first):
  /usr/local/share/cmake/Modules/FindPackageHandleStandardArgs.cmake:391 (_FPHSA_FAILURE_MESSAGE)
  /usr/local/share/cmake/Modules/FindOpenSSL.cmake:447 (find_package_handle_standard_args)
  cmake/Libraries.cmake:71 (FIND_PACKAGE)
  CMakeLists.txt:145 (INCLUDE)

While here remove unnecessary qt5-buildtools and qt5-linguisttools
run dependencies.

PR:		245088
Approved by:	freebsd@sysctl.cz (maintainer)

Approved by:	ports-secteam blanket
2020-04-11 05:01:36 +00:00
Piotr Kubaj
b03ab444e9 MFH: r531390
graphics/libavif: fix build on GCC architectures

Use newer GCC to avoid error caused by -Werror:
/wrkdirs/usr/ports/graphics/libavif/work/libavif-0.6.3/src/reformat.c:316: warning: comparison is always false due to limited range of data type

Approved by:	portmgr (fix build blanket)
2020-04-11 00:57:33 +00:00
Piotr Kubaj
2ffc61f9da MFH: r531342
cad/graywolf: fix build on GCC architectures

C11 compiler is necessary:
/wrkdirs/usr/ports/cad/graywolf/work/graywolf-0.1.6-3-g6c5e24f/src/twmc/wireratio.c:92: error: expected declaration specifiers before 'gsl_matrix'

Approved by:	portmgr (fix build blanket)
2020-04-10 21:44:54 +00:00
Stephen Hurd
3db9691803 MFH: r531299
Put the ignore block back in to silence pkg-fallout

Approved by:	ports-secteam (blanket, build fix)
2020-04-10 15:08:22 +00:00
Kai Knoblich
416dd652f5 MFH: r531307
textproc/py-ocrmypdf: Update to 9.7.0

Changelog:

https://github.com/jbarlow83/OCRmyPDF/blob/v9.7.0/docs/release_notes.rst

Approved by:	ports-secteam bug/regression fix blanket
2020-04-10 10:40:51 +00:00
Kai Knoblich
7528c3d180 MFH: r531190
net-mgmt/py-napalm-logs: Update to 0.9

* Switch to GitHub for a while to make use of the test suite.

* Add a "do-test" target to make future QA easier.

Changelog since 0.7:

https://napalm-logs.com/en/latest/releases/0.9.0.html
https://napalm-logs.com/en/latest/releases/0.8.0.html

Approved by:	ports-secteam runtime fix blanket
2020-04-10 10:39:41 +00:00
Sunpoet Po-Chuan Hsieh
17a2a3c24d MFH: r530415
Fix build with curl 7.69.1

Approved by:	ports-secteam (blanket)
2020-04-09 16:35:11 +00:00
Tobias Kortkamp
5c1b4c4b30 MFH: r531172
audio/fluidsynth: Update to v2.1.2

Changes:	https://github.com/FluidSynth/fluidsynth/releases/tag/v2.1.2
PR:		245416
Approved by:	multimedia (tcberner)

Approved by:	ports-secteam blanket
2020-04-09 04:25:52 +00:00
Jan Beich
4d29f3f4b3 MFH: r531163
emulators/citra: update to s20200407

Changes:	3b1b8b7e1...23921e320
Approved by:	ports-secteam (swills, implicit for snapshots)
2020-04-09 00:49:37 +00:00
Jan Beich
90f06ff05f MFH: r531153
multimedia/intel-media-sdk: update to 20.1.0

Changes:	https://github.com/Intel-Media-SDK/MediaSDK/compare/1b7d4964...intel-mediasdk-20.1.0
Approved by:	ports-secteam blanket (reliability fixes)
2020-04-08 23:13:42 +00:00
Jan Beich
177842f756 MFH: r531152
multimedia/libva-intel-media-driver: update to 20.1.1

Changes:	https://github.com/intel/media-driver/compare/intel-media-20.1.0r...intel-media-20.1.1
Changes:	https://github.com/intel/media-driver/releases/tag/intel-media-20.1.1
Reported by:	GitHub (watch releases)
Approved by:	ports-secteam blanket (reliability fixes)
2020-04-08 23:13:16 +00:00
Jan Beich
4b0cacc1bc MFH: r531151
security/nss: update to 3.51.1

Changes:	https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.51.1_release_notes
Changes:	https://hg.mozilla.org/projects/nss/shortlog/NSS_3_51_1_RTM
ABI:		https://abi-laboratory.pro/tracker/timeline/nss/
Approved by:	ports-secteam blanket (required by Firefox 76)
2020-04-08 23:11:34 +00:00
Ashish SHUKLA
80543d5297 MFH: r530404 (runtime fix)
- Fix brokenness with net/libsignal 2.3.3. Upstream depends on
  particular version (2.3.2), so reference its distfile, build
  it in tree.
- Bump PORTREVISION as dependencies are changed

PR:		245281

Approved by:	portmgr (blanket)
2020-04-08 15:51:52 +00:00
Ben Woods
fccff046ed MFH: r530981
net-mgmt/cacti: Update to 1.2.10

Changes this release:
  https://github.com/Cacti/cacti/blob/release/1.2.10/CHANGELOG

PR:		245198
Submitted by:	Michael Muenz <m.muenz@gmail.com>
Approved by:	Daniel Austin <freebsd-ports@dan.me.uk> (maintainer)
Security:	https://www.vuxml.org/freebsd/e2b564fc-7462-11ea-af63-38d547003487.html

Approved by:	ports-secteam (joneum)
2020-04-08 14:13:36 +00:00
Christoph Moench-Tegeder
9076ceada9 MFH: r531040
mail/thunderbird: update to 68.7.0 (rc1)

Release Notes (soon):
  https://www.thunderbird.net/en-US/thunderbird/68.7.0/releasenotes/

Approved by:	ports-secteam (blanket: web browser alike)
2020-04-08 13:27:42 +00:00