Commit Graph

513885 Commits

Author SHA1 Message Date
Li-Wen Hsu
4ec222c83a MFH: r545313
math/units: Add a default option READLINE to tuggle readline support

This makes sure the readline support is tuggled in the build time and not
affected by the libreadline installed or not during build/run time.

PR:		248631
Submitted by:	ports-units@shalott.net
Approved by:	jharris@widomaker.com (maintainer)

Approved by:	portmgr (blanket: build, run, dependency fix)
2020-08-19 11:20:02 +00:00
Piotr Kubaj
49b609a5c6 MFH: r545302
deskutils/terminal-image-viewer: fix build on GCC architectures

-lstdc++fs is necessary for GCC:
/usr/local/bin/ld: tiv.cpp:(.text.startup+0x19cc): undefined reference to `std::experimental::filesystem::v1::__cxx11::directory_iterator::operator++()'

Approved by:	portmgr (fix build blanket)
2020-08-19 10:38:39 +00:00
Piotr Kubaj
93286c0b32 MFH: r545294
science/simgrid: fix build on non-aarch64, non-x86

Add libunwind to LIB_DEPENDS only on aarch64, amd64 and i386. Port builds fine without it on powerpc64

Approved by:	portmgr (fix build blanket)
2020-08-19 09:29:16 +00:00
Ganael LAPLANCHE
ad176ca4ac MFH: r545276
Fix sssd startup following libldb changes

PR:		239022
Submitted by:	patrik@hildingsson.se
Approved by:	lukas.slebodnik@intrak.sk (maintainer timeout)

Approved by:	ports-secteam (joneum)
2020-08-19 09:21:08 +00:00
Niclas Zeising
7e200874af MFH: r545235
devel/libunwind: Fix build with -fno-common

Fix the build of devel/libunwind with -fno-common (the default on FreeBSD
current after the llvm 11 update).
Add an upstream patch (pulling it from the official github mirror) to fix
the build woth -fno-common.

Approved by:	ports-secteam (joenum)
2020-08-19 08:42:48 +00:00
Niclas Zeising
e84388b685 MFH: r545265
emulators/tpm-emulator: Fix -fno-common

Fix the build with -fno-common, which is the default in llvm 11.

Approved by:	ports-secteam (joenum)
2020-08-19 08:39:53 +00:00
Niclas Zeising
24f4959a80 MFH: r545264
security/trousers: fix security issues

Fix three security issues in security/trousers:

* CVE-2020-24332
  If the tcsd daemon is started with root privileges,
  the creation of the system.data file is prone to symlink attacks

* CVE-2020-24330
  If the tcsd daemon is started with root privileges,
  it fails to drop the root gid after it is no longer needed

* CVE-2020-24331
  If the tcsd daemon is started with root privileges,
  the tss user has read and write access to the /etc/tcsd.conf file

Add patches to fix potential use-after-free
Fix build with -fno-common

Security:	e37a0a7b-e1a7-11ea-9538-0c9d925bbbc0

Approved by:	ports-secteam (joenum)
2020-08-19 08:37:56 +00:00
Niclas Zeising
9d6a279f53 MFH: r545262
x11-drivers/xf86-video-intel: Update snapshot

Update the snapshot of x11-driver/xf86-video-intel
- Fix build with -fno-common
- Fix MIT-SHM detection
- Drop SNA/UXA options in favor of xorg.conf(5)
- Add hyphen to output names for consistency with modesetting(4x)
- Add UDEV and XVMC options
- Add "make test" support
- Drop unused dependencies
- Switch to upstream versioning scheme
- Document all patches
- Simplify and deprecate _WITH_GETLINE
- Fix most style warnings

PR:		236003
Submitted by:	jbiech

Approved by:	ports-secteam (joenum)
2020-08-19 08:37:00 +00:00
Niclas Zeising
189d3fae83 MFH: r545261
x11-drivers/xf86-video-openchrome: fix -fno-common

Fix the build with -fno-common, which is the default with llvm 11.

Approved by:	ports-secteam (joenum)
2020-08-19 08:35:52 +00:00
Niclas Zeising
4c6b50423d MFH: r545260
x11/drivers/xf86-video-amdgpu: Fix -fno-common

Pull in a patch from upstream to fix the build of xf86-video-amdgpu with
-fno-common, which is the default with llvm 11.

Approved by:	ports-secteam (joenum)
2020-08-19 08:32:48 +00:00
Niclas Zeising
1db700806b MFH: r545240
graphics/mesa: Fix build with -fno-common

Pull in a bunch of upstream patches to graphics/mesa to fix build with
-fno-common, which is the default after the llvm 11 import.

Approved by:	ports-secteam (joenum)
2020-08-19 08:31:54 +00:00
Niclas Zeising
bb06cbbcec MFH: r545237
cad/iverilog: Fix build with -fno-common

Fix the build with -fno-common, which is the default in llvm 11 (and gcc10).

Approved by:	ports-secteam (joenum)
2020-08-19 08:28:38 +00:00
Dmitri Goutnik
d1911b1240 MFH: r545229
shells/elvish: Update to 0.14.1

- pet portclippy while here

Changes:	https://github.com/elves/elvish/releases/tag/v0.14.1
PR:		248700
Submitted by:	Adam Jimerson <vendion@gmail.com> (maintainer)

Approved by:	ports-secteam blanket (bugfix release)
2020-08-18 12:37:42 +00:00
Jan Beich
2492c858ee MFH: r545207
www/py-flexget: update to 3.1.67

Changes:	https://github.com/Flexget/Flexget/compare/v3.1.65...v3.1.67
Reported by:	Repology
Approved by:	ports-secteam blanket (crash fix)
2020-08-18 00:55:50 +00:00
Piotr Kubaj
f38a453ca4 MFH: r545200
audio/faustlive: fix build on GCC architectures

Don't explicitly add -L/usr/lib, it makes GCC from ports link against base libstdc++. Clang still links fine to base libraries.

Approved by:	portmgr (fix build blanket)
2020-08-18 00:02:47 +00:00
Piotr Kubaj
9f8d7322dd MFH: r545197
math/cadical: fix build on GCC architectures

Use | instead of , in the sed command to workaround for -Wl,rpath in CXXFLAGS.

Approved by:	portmgr (fix build blanket)
2020-08-17 23:55:56 +00:00
Florian Smeets
5290c24670 MFH: r545185
Update to 14.2.11

Release info:
We're happy to announce the availability of the eleventh release in the
Nautilus series. This release brings a number of bugfixes across all
major components of Ceph. We recommend that all Nautilus users upgrade
to this release.

Notable Changes
---------------
* RGW: The `radosgw-admin` sub-commands dealing with orphans --
  `radosgw-admin orphans find`, `radosgw-admin orphans finish`,
  `radosgw-admin orphans list-jobs` -- have been deprecated. They
  have not been actively maintained and they store intermediate
  results on the cluster, which could fill a nearly-full cluster.
  They have been replaced by a tool, currently considered
  experimental, `rgw-orphan-list`.

* Now when noscrub and/or nodeep-scrub flags are set globally or per pool,
  scheduled scrubs of the type disabled will be aborted. All user initiated
  scrubs are NOT interrupted.

* Fixed a ceph-osd crash in _committed_osd_maps when there is a failure to encode
  the first incremental map. issue#46443: https://github.com/ceph/ceph/pull/46443

For the detailed changelog please refer to the blog entry at
https://ceph.io/releases/v14-2-11-nautilus-released/

PR:		248673
Submitted by:	Willem Jan Withagen <wjw@digiware.nl>
Security:	f20eb9a4-dfea-11ea-a9b8-9c5c8e84d621
Approved by:	ports-secteam (joneum)
2020-08-17 20:19:12 +00:00
Piotr Kubaj
92a0edd07b MFH: r545180
www/osrm-backend: fix build on GCC architectures

Merge two upstream commits to fix build:
/wrkdirs/usr/ports/www/osrm-backend/work/osrm-backend-5.22.0/src/storage/io_config.cpp: In member function 'bool osrm::storage::IOConfig::IsValid() const':
/wrkdirs/usr/ports/www/osrm-backend/work/osrm-backend-5.22.0/src/storage/io_config.cpp:18:89: error: call of overloaded 'is_regular_file(<brace-enclosed initializer list>)' is ambiguous
   18 |         if (!boost::filesystem::is_regular_file({base_path.string() + fileName.string()}))
      |                                                                                         ^
In file included from /usr/local/include/boost/filesystem.hpp:18,
                 from /wrkdirs/usr/ports/www/osrm-backend/work/osrm-backend-5.22.0/include/storage/io_config.hpp:8,
                 from /wrkdirs/usr/ports/www/osrm-backend/work/osrm-backend-5.22.0/src/storage/io_config.cpp:1:
/usr/local/include/boost/filesystem/directory.hpp:171:20: note: candidate: 'bool boost::filesystem::is_regular_file(const boost::filesystem::directory_entry&)'
  171 | inline bool        is_regular_file(const directory_entry& e) BOOST_NOEXCEPT { return filesystem::is_regular_file(e.status()); }
      |                    ^~~~~~~~~~~~~~~
In file included from /usr/local/include/boost/filesystem.hpp:19,
                 from /wrkdirs/usr/ports/www/osrm-backend/work/osrm-backend-5.22.0/include/storage/io_config.hpp:8,
                 from /wrkdirs/usr/ports/www/osrm-backend/work/osrm-backend-5.22.0/src/storage/io_config.cpp:1:
/usr/local/include/boost/filesystem/operations.hpp:169:6: note: candidate: 'bool boost::filesystem::is_regular_file(const boost::filesystem::path&)'
  169 | bool is_regular_file(const path& p)  {return is_regular_file(detail::status(p));}
      |      ^~~~~~~~~~~~~~~

Approved by:	portmgr (fix build blanket)
2020-08-17 20:02:04 +00:00
Niclas Zeising
bd7f2cece0 MFH: r543914 r544154 r544630 r545155
With these changes libX11 in 2020Q3 branch should be mostly up to date with
what's in the default ports tree branch.

This is needed because the amount of patches fixing various issues started to
pile up, and it was hard to merge the needed patches one by one.

x11/libX11: Update to 1.6.10

Update x11/libX11 to 1.6.10.
Changelog:
https://lists.x.org/archives/xorg-announce/2020-July/003052.html

PR:		248409
Submitted by:	VVD

x11/libX11: Fix regression after security fixes

Add an upstream patch that fixes regressions after the last round of
security updates, and the update to 1.6.10.
This regression causes issues with emacs, at least.

Reported by:	Kevin Oberman

x11/libX11: Update to 1.6.11

Update x11/libX11 to 1.6.11.
This is effectively a noop, since the only change between 1.6.10 and 1.6.11
has already been included in the port.
Bump the version anyway to keep things up to date.

x11/libX11: Fix regression with inputh methods

Add an upstream patch to fix regressions with input metods, where input
method clients can't connect to the input method server. [1]
While here, add a patch that removes register keywords and fixes compiles
against libX11 headers with C++17.

PR:		248549 [1]
Reported by:	Atsuo Ohki

Approved by:	ports-secteam (joenum)
2020-08-17 17:01:51 +00:00
Piotr Kubaj
a698e325b5 MFH: r545169
science/code_saturne: fix build on GCC architectures

Use C++11 compiler:
cs_paramedmem_remapper.cxx:124: error: ISO C++ forbids initialization of member '_sphere_cen'

Define __XSI_VISIBLE to make gettimeofday() available.

Approved by:	portmgr (fix build blanket)
2020-08-17 15:34:47 +00:00
Tijl Coosemans
e9d3f27dd6 MFH: r541216
print/cups-pdf: fix patching paths

Approved by:	ports-secteam (build fix blanket)
2020-08-17 08:47:30 +00:00
Koichiro Iwao
d34512b3b0 MFH: r545139
mail/coolmail: Update maintainer's email

PR:		248687
Submitted by:	Udo.Schweigert@siemens.com (maintainer)

Approved by:	portmgr blanket (consistent metadata)
2020-08-17 08:40:40 +00:00
Koichiro Iwao
29a59604f3 MFH: r545138
net/iplog: Mark broken on 13-CURRENT

Also update maintainer's email.

PR:		248686
Submitted by:	Udo.Schweigert@siemens.com (maintainer)

Approved by:	portmgr blanket (consistent metadata)
2020-08-17 08:38:45 +00:00
Piotr Kubaj
82b48f0c63 MFH: r545127
security/libfido2: fix build on GCC architectures

Use newer compiler:
/wrkdirs/usr/ports/security/libfido2/work/libfido2-1.4.0/src/fido.h:115: error: wrong number of arguments specified for '__deprecated__' attribute

Approved by:	portmgr (fix build blanket)
2020-08-16 18:46:05 +00:00
Steve Wills
9a33016c8b MFH: r545114
security/py-ecdsa: update to 0.13.3

PR:		247823
Reported by:	ehaupt
Approved by:	koobs (maintainer)
Security:	a23ebf36-e8b6-4665-b0f3-4c977f9a145c

Approved by:	ports-secteam (implicit)
2020-08-16 13:28:46 +00:00
Steve Wills
c38e98b901 MFH: r541347
sysutils/consul: update to 1.8.0

While here, fix bug in rc script creation

Approved by:	ports-secteam (implicit)
2020-08-16 13:16:38 +00:00
Piotr Kubaj
3a79a13688 MFH: r545108
multimedia/php-pHash: fix build on GCC architectures

x265 requires C++11 compiler:
/usr/local/lib/libx265.so.179: undefined reference to `std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::reserve(unsigned long)@GLIBCXX_3.4.21'

Approved by:	portmgr (fix build blanket)
2020-08-16 13:08:49 +00:00
Matthias Andree
75935eef6f MFH: r544849
graphics/ilmbase, graphics/openexr: security update to v2.5.3

ChangeLog:
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.3

"Patch release with various bug/security fixes and build/install fixes, plus a performance optimization:

 * Various sanitizer/fuzz-identified issues related to handling of invalid input
 * Fixes to misc compiler warnings [...]
 * Read performance optimization (#782)
 * Fix for building on non-glibc (#798)
 * Fixes to tests"

The full name of shared libraries changed from *.25.0.1 to *.25.0.2
=> PORTREVISION bumps for all ports that use either ilmbase or openexr
coming up in separate commit to ease MFH.

All test builds of direct users succeeded on 12.1 amd64.

Bump PORTREVISION of all ports using ilmbase or openexr.

Security:	b1d6b383-dd51-11ea-a688-7b12871ef3ad

Approved by:	ports-secteam@ (joneum@)
2020-08-16 09:51:32 +00:00
Joseph Mingrone
59c22beddc MFH: r545067 r545068
www/chromium: Update to version 84.0.4147.125

Upstream changes:
https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html

--

www/chromium: Fix U2F authentication

PR:		247744
Submitted by:	gonzo
Reported by:	Henry Hu <henry.hu.sh@gmail.com>

Approved by:	ports-secteam (blanket)
2020-08-15 21:02:33 +00:00
Tijl Coosemans
202ffb3143 MFH: r544878
Update to 7.29.0-57.el7_8.1.

Approved by:	ports-secteam (linux blanket)
2020-08-15 16:49:46 +00:00
Tijl Coosemans
1c9f615e25 MFH: r542337
Update to 1.10.24-14.el7_8.

Approved by:	ports-secteam (linux blanket)
2020-08-15 16:48:22 +00:00
Tijl Coosemans
46aa06f12d MFH: r542338 r544880
Update kernel-headers to 3.10.0-1127.13.1.el7.

Update kernel-headers to 3.10.0-1127.18.2.el7.

Approved by:	ports-secteam (linux blanket)
2020-08-15 16:46:59 +00:00
Tijl Coosemans
fce4f00a06 MFH: r542333 r544879
Update to 219-73.el7_8.8.

Update to 219-73.el7_8.9.

Approved by:	ports-secteam (linux blanket)
2020-08-15 16:45:12 +00:00
Larry Rosenman
5984eddf32 MFH: r544857
mail/dovecot, mail/dovecot-pigeonhole: upgrade to 2.3.11.3 and 0.5.11, repectively.

dovecot changelog:
* CVE-2020-12100: Parsing mails with a large number of MIME parts could
  have resulted in excessive CPU usage or a crash due to running out of
  stack memory.
* CVE-2020-12673: Dovecot's NTLM implementation does not correctly check
  message buffer size, which leads to reading past allocation which can
  lead to crash.
* CVE-2020-10967: lmtp/submission: Issuing the RCPT command with an
  address that has the empty quoted string as local-part causes the lmtp
  service to crash.
* CVE-2020-12674: Dovecot's RPA mechanism implementation accepts
  zero-length message, which leads to assert-crash later on.
* Events: Fix inconsistency in events. See event documentation in
  https://doc.dovecot.org.
* imap_command_finished event's cmd_name field now contains "unknown"
  for unknown commands. A new "cmd_input_name" field contains the
  command name exactly as it was sent.
* lib-index: Renamed mail_cache_compress_* settings to mail_cache_purge_*.
  Note that these settings are mainly intended for testing and usually
  shouldn't be changed.
* events: Renamed "index" event category to "mail-index".
* events: service:<name> category is now using the name from
  configuration file.
* dns-client: service dns_client was renamed to dns-client.
* log: Prefixes generally use the service name from configuration file.
  For example dict-async service will now use
  "dict-async(pid): " log prefix instead of "dict(pid): "
* *-login: Changed logging done by proxying to use a consistent prefix
  containing the IP address and port.
* *-login: Changed disconnection log messages to be slightly clearer.
+ dict: Add events for dictionaries.
+ lib-index: Finish logging with events.
+ oauth2: Support local validation of JWT tokens.
+ stats: Add support for dynamic histograms and grouping. See
  https://doc.dovecot.org/configuration_manual/stats/.
+ imap: Implement RFC 8514: IMAP SAVEDATE
+ lib-index: If a long-running transaction (e.g. SORT/FETCH on a huge
  folder) adds a lot of data to dovecot.index.cache file, commit those
  changes periodically to make them visible to other concurrent sessions
  as well.
+ stats: Add OpenMetrics exporter for statistics. See
  https://doc.dovecot.org/configuration_manual/stats/openmetrics/.
+ stats: Support disabling stats-writer socket by setting
  stats_writer_socket_path="".
- auth-worker: Process keeps slowly increasing its memory usage and
  eventually dies with "out of memory" due to reaching vsz_limit.
- auth: Prevent potential timing attacks in authentication secret
  comparisons: OAUTH2 JWT-token HMAC, imap-urlauth token, crypt() result.
- auth: Several auth-mechanisms allowed input to be truncated by NUL
  which can potentially lead to unintentional issues or even successful
  logins which should have failed.
- auth: When auth policy returned a delay, auth_request_finished event
  had policy_result=ok field instead of policy_result=delayed.
- auth: auth process crash when auth_policy_server_url is set to an
  invalid URL.
- auth: Lua passdb/userdb leaks stack elements per call, eventually
  causing the stack to become too deep and crashing the auth or
  auth-worker process.
- dict-ldap: Crash occurs if var_expand template expansion fails.
- dict: If dict client disconnected while iteration was still running,
  dict process could have started using 100% CPU, although it was still
  handling clients.
- doveadm: Running doveadm commands via proxying may hang, especially
  when doveadm is printing a lot of output.
- imap: "MOVE * destfolder" goes to a loop copying the last mail to the
  destination until the imap process dies due to running out of memory.
- imap: Running "UID MOVE 1:* Trash" on an empty folder goes to infinite
  loop.
- imap: SEARCH doesn't support $.
- lib-compress: Buffer over-read in zlib stream read.
- lib-dns: If DNS lookup times out, lib-dns can cause crash in calling
  process.
- lib-index: Fixed several bugs in dovecot.index.cache handling that
  could have caused cached data to be lost.
- lib-index: Writing to >=1 GB dovecot.index.cache files may cause
  assert-crashes:
  Panic: file mail-index-util.c: line 37 (mail_index_uint32_to_offset):
  assertion failed: (offset < 0x40000000)
- lib-mail: v2.3.11 regression: MIME parts not returned correctly by
  Dovecot MIME parser.
- lib-ssl-iostream: Fix buggy OpenSSL error handling without
  assert-crashing. If there is no error available, log it as an error
  instead of crashing:
  Panic: file iostream-openssl.c: line 599 (openssl_iostream_handle_error):
  assertion failed: (errno != 0)
- lib-ssl-iostream: ssl_key_password setting did not work.
- pop3-login: Login didn't handle commands in multiple IP packets properly.
  This mainly affected large XCLIENT commands or a large SASL initial
  response parameter in the AUTH command.
- pop3: pop3_deleted_flag setting was broken, causing:
  Panic: file seq-range-array.c: line 472 (seq_range_array_invert):
  assertion failed: (range[count-1].seq2 <= max_seq)
- pop3-login: Login would fail with "Input buffer full" if the initial
  response for SASL was too long.
- submission: A segfault crash may occur when the client or server
  disconnects while a non-transaction command like NOOP or VRFY is still
  being processed.
- virtual: Copying/moving mails with IMAP into a virtual folder
assert-crashes:
  Panic: file cmd-copy.c: line 152 (fetch_and_copy): assertion failed:
  (copy_ctx->copy_count == seq_range_count(&copy_ctx->saved_uids))

pigeonhole changelog:
* managesieve: managesieve_max_line_length setting is now a "size" type
  instead of just number of bytes. This allows using e.g. "64k" as the
  value.
- lib-sieve: When folding white space is used in the Message-ID header,
  it is not stripped away correctly before the message ID value is used,
  causing e.g. garbled log lines at delivery.

PR:		248640
PR:		248644
Submitted by:	juraj@lutter.sk
Reported by:	juraj@lutter.sk
Security:	87a07de1-e55e-4d51-bb64-8d117829a26a
Security:	CVE-2020-12100
Security:	CVE-2020-12673
Security:	CVE-2020-10967
Security:	CVE-2020-12674

Approved by:	ports-secteam (joneum)
2020-08-15 16:05:35 +00:00
Danilo G. Baio
077b27bca7 MFH: r544946
net-mgmt/snmptt: Update to 1.4.2, Fix security issue

Changelog:	http://snmptt.sourceforge.net/changelog.shtml

PR:		248162
Submitted by:	nistor@snickers.org (maintainer)
Security:	b8ea5b66-deff-11ea-adef-641c67a117d8

Approved by:	ports-secteam (blanket: bug and security fix release)
2020-08-15 14:48:25 +00:00
Steve Wills
e24be5f908 MFH: r542133 r542984
security/vault: update to 1.4.3

security/vault: update to 1.5.0

Approved by:	ports-secteam (implicit)
2020-08-15 13:38:53 +00:00
Tobias C. Berner
e0c6110861 MFH: r544922
editors/jove: fix fetch

PR:		248588
Submitted by:	gspu <gspurki@gmail.com>

Approved by:	ports-secteam (implicit)
2020-08-15 08:43:45 +00:00
Tobias C. Berner
ccfe159bda MFH: r544912
games/homura: Switch back to wine-devel

This fixes internet problems in AdventureQuest3D, Origin and maybe in other
games too.

PR:		248539
Submitted by:	Alexander Vereeken <Alexander88207@protonmail.com> (maintainer)

Approved by:	ports-secteam (implicit)
2020-08-15 06:00:27 +00:00
Dima Panov
c012967e58 MFH: r544870
Update LibreOffice suite to 6.4.6 maintenance release

Relnotes:	https://wiki.documentfoundation.org/ReleaseNotes/6.4

Approved by:	ports-secteam (joneum via irc)
2020-08-14 11:34:08 +00:00
Piotr Kubaj
6219baaaa6 MFH: r544844
misc/nn-insight: fix build with GCC and on head

Add missing includes. This fixes build on stable/12 for powerpc64 (with GCC) and on head with powerpc64. Looking at https://www.freshports.org/misc/nn-insight/, it seems currently doesn't build even on head/amd64, so those includes should fix it.

The original error that made me look into it was:
/wrkdirs/usr/ports/misc/nn-insight/work/nn-insight-1.0.5/tensor.h:18:75: error: 'std::shared_ptr' has not been declared
   18 | bool readTensorDataAsJson(const char *fileName, const TensorShape &shape, std::shared_ptr<const float> &tensorData);
      |                                                                           ^~~

Approved by:	portmgr (fix build blanket)
2020-08-13 21:43:07 +00:00
Jung-uk Kim
fad4763883 MFH: r544827
Fix building emulators/virtualbox-ose-additions on head after vaccess(9) KPI
change.

Approved by:	ports-secteam (blanket, build fix)
2020-08-13 18:22:22 +00:00
Cy Schubert
2afc11fe92 MFH: r544738
pkg delete tripwire results in an infinite loop due to it askking
whether to retain the tripwrie databse or not. The resolution is
to notify the user to manually remove the tripwrie database if it
is not longer needed. (Packaging bugfix.)

Approved by:	portmgr (joneum)
2020-08-13 13:46:33 +00:00
Fernando Apesteguía
7870d88ad1 MFH: r544794
devel/sigar: build after filedesc struct change

In base revision r363214[1] we dropped the fd_lastfile field of the
filedesc struct. This breaks devel/sigar.

The applied solution was proposed by mjg@ in this[2] mail thread.

[1] https://svnweb.freebsd.org/changeset/base/363214
[2] https://lists.freebsd.org/pipermail/freebsd-ports/2020-August/119093.html

PR:	248460
Submitted by:	ronald-lists@klop.ws

Approved by:	ports-secteam (blanket, build fix)
2020-08-13 11:33:04 +00:00
Jason E. Hale
42e41492dd MFH: r544802
x11-themes/qtcurve: Fix patch from r544732

===>  Applying distribution patches for qtcurve-1.9.0
patch: **** can't cd to /wrkdirs/usr/ports/x11-themes/qtcurve/work/qtcurve-1.9: No such file or directory
===>  FAILED Applying distribution patch ee2228ea2f18ac5da9b434ee6089381df815aa94.patch with -p1
*** Error code 1

Reported by:	pkg-fallout

Approved by:	ports-secteam (build fix blanket)
2020-08-13 11:29:06 +00:00
Piotr Kubaj
355d71c446 MFH: r544792
misc/xiphos: fix build on GCC architectures

Use C11 compiler:
/usr/local/include/unicode/localpointer.h:224: error: expected ';' before 'noexcept'

Also required is bumping GCC for misc/biblesync because of libstdc++ ABI error.

Approved by:	portmgr (fix build blanket)
2020-08-13 09:09:58 +00:00
Li-Wen Hsu
3f37eec5e7 MFH: r544748
Update to 2.235.4

Approved by:	swils (maintainer, implicitly)
Security:	eef0d2d9-78c0-441e-8b03-454c5baebe20
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (joneum)
2020-08-13 03:45:15 +00:00
Li-Wen Hsu
95a9f765fa MFH: r544747
Update to 2.252

Security:	eef0d2d9-78c0-441e-8b03-454c5baebe20
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (joneum)
2020-08-13 03:44:07 +00:00
Niclas Zeising
b72436c264 MFH: r544690
devel/libgudev: Update to 233

Update devel/libgudev to 233. [1]
Change to use MASTER_SITE_GNOME.
Disable umockdev since we don't have that in ports, and it's only used for
tests.
Fix COMMENT per portlint.

PR:		248565 [1]
Requested by:	jbeich [1]

Approved by:	ports-secteam (joenum)
2020-08-12 16:47:31 +00:00
Danilo Egea Gondolfo
1de0257dbd MFH: r544616
- Update to 5.6

This revision fixes multiple vulnerabilities, please see: http://bftpd.sourceforge.net/news.html

Approved by:	portmgr (joneum)
2020-08-12 16:13:43 +00:00
Piotr Kubaj
d679c44061 MFH: r544732
x11-themes/qtcurve: fix build on GCC architectures

Merge upstream patch to fix build:
/wrkdirs/usr/ports/x11-themes/qtcurve-gtk2/work/qtcurve-1.9/.cmake_utils_base/cmake_c_macros/include_fix/qtcurve-utils/gtkprops.h: In member function 'constexpr GObject* QtCurve::GtkWidgetProps::Props::_SigConn_tabChildAdd_ObjGetter::operator()(QtCurve::GtkWidgetProps::Props::SigConn<QtCurve::GtkWidgetProps::Props::_SigConn_tabChildAdd_ObjGetter>*) const':
/wrkdirs/usr/ports/x11-themes/qtcurve-gtk2/work/qtcurve-1.9/.cmake_utils_base/cmake_c_macros/include_fix/qtcurve-utils/gtkprops.h:80:24: error: a reinterpret_cast is not a constant expression
   80 |                 return (GObject*)qtcContainerOf(p, Props, name)->m_w;   \
      |                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Approved by:	portmgr (fix build blanket)
2020-08-12 00:05:33 +00:00