Commit Graph

472122 Commits

Author SHA1 Message Date
Steve Wills
d6abc2f228 MFH: r499246
security/libssh2: update to 1.8.1

PR:		236711
Submitted by:	Leonid Nevecherya <nevecherya@gmail.com>
Approved by:	sbz (maintainer)
Security:	6e58e1e9-2636-413e-9f84-4c0e21143628
Approved by:	ports-secteam (implicit)
2019-04-18 10:38:10 +00:00
Jan Beich
880386ae95 MFH: r499223
games/openbor: update to 6986

Changes:	85a39aff...58253a62
Approved by:	ports-secteam (feld, implicit for snapshots)
2019-04-18 00:55:03 +00:00
Jan Beich
b5eda15fce MFH: r499221
emulators/citra: update to s20190417

Changes:	bbc8fd716...0ec45f694
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-04-18 00:54:39 +00:00
Jochen Neumeister
a115e171b6 MFH: r499158
Update to 1.7.6

Changelog: https://blog.gitea.io/2019/04/gitea-1.7.6-is-released/

PR:		237303
Submitted by:	stb@lassitu.de (maintainer)
Security:	b747783f-5fb6-11e9-b2ac-08002705f877
Sponsored by:	Netzkommune Gmbh

Approved by:	ports-secteam (joneum)
2019-04-17 07:54:02 +00:00
Stephen Hurd
f455b8bf4b MFH: r499037
Fix build when hamlib is installed.

Put /usr/local/include at end of AM_CPPFLAGS instead of at beginning,
ensures the included header files are used.

Link included hamlib using ${libdir}/libhamlib.a rather than -lhamlib to
ensure the included static hamlib is used instead of a dynamic one in the
library path.

Approved by:	ports-secteam (miwi)
2019-04-17 03:00:38 +00:00
Rodrigo Osorio
5ed3256ec4 MFH: r499020
Add missing run dependency to security/ca_root_nss

Caddy has a feature for automatic Certification installation
from let's encrypt for HTTPS.
Without security/ca_root_nss certificates are impossible to
install, because root certificate is missing.

Bump PORTREVISION.

PR:		237293
Submitted by:	Pwny Tail <pwnytail@bsd.services>
Approved by:	 Fabian Freyer <fabian.freyer@physik.tu-berlin.de> (maintainer)

Approved by:	ports-secteam
2019-04-16 12:48:05 +00:00
Jan Beich
c30a6409e8 MFH: r499065
devel/android-tools-simpleperf: chase homepage

Approved by:	ports-secteam blanket
2019-04-16 00:43:22 +00:00
Jan Beich
5b82e7c139 MFH: r499063
emulators/citra: update to s20190415

Changes:	4a206237b...bbc8fd716
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-04-16 00:43:00 +00:00
Thomas Zander
ccc6993f6d MFH: r499032
Update to upstream version 1.7.10

Details:
- Bug fixes and documentation improvements, see
  https://github.com/containous/traefik/releases/tag/v1.7.10

Approved by:	ports-secteam (riggs)
2019-04-15 16:28:35 +00:00
Koichiro Iwao
ed8de19100 MFH: r498906
Bump PORTREVISION to force rebuild with correct dependency

PR:		237279

Approved by:	portmgr (miwi)
2019-04-15 13:12:36 +00:00
Ryan Steinmetz
bfa9670907 MFH: r498582
- Update to 3.0.19

PR:		237182

Approved by:	ports-secteam (with hat)
2019-04-15 13:11:13 +00:00
Koichiro Iwao
e18e07dd38 MFH: r498905
graphics/vigra: Fix typo s/DPEENDS/DEPENDS/

PR:		237279
Submitted by:	Darren Mulligan <fixer@bsdmail.com>

Approved by:	portmgr (miwi)
2019-04-15 13:01:14 +00:00
Tobias Kortkamp
9ab2b3ac86 MFH: r499002
net-mgmt/mk-livestatus: Restore fix from r485075

mk-livestatus always builds with Nagios 4 support again and
--without-nagios4 is still broken.

PR:		232716
Reported by:	Leonid Vasiliev <leo9641@yandex.ru>
Approved by:	egypcio (maintainer)

Approved by:	ports-secteam blanket
2019-04-15 08:35:56 +00:00
Mark Linimon
a6fe1115dc MFH: r498995
These ports now build on powerpc64.

Approved by:	portmgr (tier-2 blanket)
2019-04-15 06:24:33 +00:00
Jan Beich
6f27da5048 MFH: r498870
emulators/citra: update to s20190413

Changes:	e9c2b27c6...4a206237b
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-04-14 00:48:06 +00:00
Thomas Zander
cc93bb8a97 MFH: r498832
Update to upstream version 33.0.0

Details:
- Bug fix release, see
  https://mkvtoolnix.download/doc/NEWS.md

Approved by:	ports-secteam (riggs)
2019-04-13 20:26:46 +00:00
Jan Beich
671b6dddd7 MFH: r498803
multimedia/gmmlib: update to 19.1.2

Changes:	https://github.com/intel/gmmlib/compare/intel-gmmlib-19.1.1...intel-gmmlib-19.1.2
Reported by:	portscout
Approved by:	ports-secteam (joneum)
2019-04-13 19:22:55 +00:00
Antoine Brodin
4127e2a5cf MFH: r498795
Mark BROKEN: fails to configure

checking for NETTLE... no
configure: error: Package requirements (nettle >= 2.4) were not met:
Package 'nettle', required by 'virtual:world', not found

Reported by:	pkg-fallout
2019-04-13 06:06:47 +00:00
Steve Wills
e70320f2ab MFH: r498788
dns/nsd: Update to 4.1.27

PR:		236785
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>

Approved by:	ports-secteam (implicit)
2019-04-13 01:13:22 +00:00
Jan Beich
8cf274f3f1 MFH: r498775
games/openbor: update to 6982

Changes:	21e153f5...85a39aff
Approved by:	ports-secteam (feld, implicit for snapshots)
2019-04-13 00:38:45 +00:00
Jan Beich
1f86bc9773 MFH: r498623
multimedia/libva-intel-media-driver: update to 19.1.p3.6

Changes:	3598ba46...42f6f231
Approved by:	ports-secteam (joneum)
2019-04-12 22:36:31 +00:00
Jan Beich
9dc3d18216 MFH: r498770
devel/icu: unbreak on big-endian after r496981

gmake[2]: *** No rule to make target 'out', needed by 'out/icudt64b.dat'.  Stop.
gmake[2]: Leaving directory '/usr/ports/devel/icu/work/icu/source/data'

PR:		236860
Reported by:	Piotr Kubaj, pkg-fallout
Obtained from:	Gentoo
Approved by:	ports-secteam blanket
2019-04-12 22:35:40 +00:00
Dimitry Andric
bef1ed3bc3 MFH: r498377
Fix build of www/squid and www/squid-devel with clang 8

This fixes an error with a defaulted copy constructor:

../../src/security/ServerOptions.h:38:5: error: explicitly defaulted copy constructor is implicitly deleted [-Werror,-Wdefaulted-function-deleted]
    ServerOptions(const ServerOptions &) = default;
    ^
../../src/security/ServerOptions.h:110:29: note: copy constructor of 'ServerOptions' is implicitly deleted because field 'clientCaStack' has a deleted copy constructor
    X509_NAME_STACK_Pointer clientCaStack;
                            ^
/usr/include/c++/v1/memory:2494:3: note: copy constructor is implicitly deleted because 'unique_ptr<stack_st_X509_NAME, Security::ServerOptions::sk_X509_NAME_free_wrapper>' has a user-declared move constructor
  unique_ptr(unique_ptr&& __u) noexcept
  ^

The copy constructor can instead be deleted.

Approved by:	portmgr (joneum)
PR:		236210
2019-04-12 20:26:19 +00:00
Li-Wen Hsu
f758635887 MFH: r498576
- Update to 2.164.2

Approved by:	swils (maintainer, implicitly)
Security:	8e9c3f5a-715b-4336-8d05-19babef55e9e
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (miwi)
2019-04-12 18:47:37 +00:00
Li-Wen Hsu
662b9d2731 MFH: r498571
- Update to 2.172

MFC after:	2 weeks
Security:	8e9c3f5a-715b-4336-8d05-19babef55e9e
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (miwi)
2019-04-12 18:44:00 +00:00
Mark Felder
d09b562a02 MFH: r498730
security/tlswrap: Add patch to fix support for modern OpenSSL

PR:		236137
2019-04-12 17:11:38 +00:00
Antoine Brodin
04f5ef28e7 MFH: r498723
Mark BROKEN on FreeBSD 12 and 13

Reported by:	pkg-fallout
2019-04-12 15:20:21 +00:00
Matthias Fechner
74034141fd MFH: r498058 r498676
Bugfix upgrade to 11.9.6.
https://about.gitlab.com/2019/04/04/gitlab-11-9-6-released/

Security Update to 11.9.7.
Please see here for more details:
https://about.gitlab.com/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/

It should be merged to 2019Q2 together with:
www/gitlab-ce
498058
devel/gitaly
498360

Security:	a0602fa0-5c1c-11e9-abd6-001b217b3468

Approved by:	ports-secteam (joneum)
2019-04-12 11:19:22 +00:00
Matthias Fechner
e7393a20ac MFH: r498360
Changed the build order that the port also works with bundler version 2.

Approved by:	ports-secteam (joneum)
2019-04-12 11:17:59 +00:00
Luca Pizzamiglio
5d0bf282c6 MFH: r498468
devel/pecl-xdebug: Update to 2.7.1

Changelog:	https://xdebug.org/updates.php#x_2_7_1
Sponsored by:	trivago N.V.

Approved by:	portmgr ports-secteam
2019-04-12 09:27:55 +00:00
Vasil Dimov
6fdfbaeb3c MFH: r498557
ftp/wget: Upgrade from 1.20 to 1.20.3

Changelog: http://git.savannah.gnu.org/cgit/wget.git/plain/NEWS

Security:	CVE-2018-20483

Approved by:	ports-secteam (joneum)
2019-04-12 08:55:48 +00:00
Antoine Brodin
8cc6181dbb MFH: r498703
Mark BROKEN on i386

Reported by:	pkg-fallout
2019-04-12 08:19:29 +00:00
Koichiro Iwao
5fd0fb13b9 MFH: r498459
deskutils/meteo: fix build with GCC-based architectures

PR:		237027
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
Approved by:	Hiroki Tagato <tagattie@yandex.com> (maintainer)

Approved by:	portmgr (joneum)
2019-04-12 07:54:33 +00:00
Antoine Brodin
84350d5ee2 MFH: r497940
net/boringtun: Mark IGNORE because the first and only available release was deleted from upstream
2019-04-12 07:32:59 +00:00
Antoine Brodin
f5f00dbe2a MFH: r498695
Mark BROKEN: fails to build

extract.c:42:8: error: unknown type name 'u_int64'
extern u_int64 extract(struct ftio *, struct parsetree *, struct ftver *, struct ftio *, int);
       ^
extract.c:81:13: error: expected ';' after expression
     u_int64 total_flows;
            ^
            ;

Reported by:	pkg-fallout
2019-04-12 05:47:54 +00:00
Antoine Brodin
f4d4268109 MFH: r498693
Mark BROKEN on i386

Reported by:	pkg-fallout
2019-04-12 05:37:59 +00:00
Tobias Kortkamp
314183d0ab MFH: r498687
graphics/netpbm: Update to 10.86.02

- Fixes yet another bug in pnmcrop

Changes:	https://gitlab.com/tobiask/netpbm/raw/v10.86.02/doc/HISTORY

Approved by:	ports-secteam blanket
2019-04-11 22:46:16 +00:00
Antoine Brodin
d1a99834b6 MFH: r498679
Mark BROKEN on i386: missing distinfo

Reported by:	pkg-fallout
2019-04-11 20:33:26 +00:00
Torsten Zuehlsdorff
72cdfbe5fe MFH: r498659
PHP: Change MOD_PRIO for imap to avoid core dumps

PR:		235917
Reported by:	Sergey Anokhin <admin@5034.ru>

Approved by:	ports-secteam (joneum)
2019-04-11 10:58:18 +00:00
Koichiro Iwao
948c13d10f MFH: r498632
net/remotebox: Update dependency after net/tigervnc separation

- vncviewer is now installed as net/tigervnc-viewer
- Bump PORTREISION due to dependency change
- Pet portlint (extra item in USES section)

PR:		236928
Submitted by:	myself
Approved by:	kai (maintainer)

Approved by:	portmgr (antonie)
2019-04-11 06:00:34 +00:00
Jan Beich
39147b130c MFH: r498630
www/firefox: update to 66.0.3

Changes:	https://www.mozilla.org/firefox/66.0.3/releasenotes/
PR:		235300
Approved by:	ports-secteam blanket
2019-04-11 02:06:58 +00:00
Jan Beich
d1b475f443 MFH: r498621
emulators/citra: update to s20190409

Changes:	2ff7ed420...e9c2b27c6
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-04-11 00:54:26 +00:00
Torsten Zuehlsdorff
b74cb8c84d MFH: r498353
databases/pgpool-II-40: Upgrade from 4.0.3 to 4.0.4

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii, Yugo Nagata)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

    * Doc: add more explanation to follow_master_command. (Tatsuo Ishii)

      Add description how follow_master_command is executed etc.

    * Doc: add note to detach_false_primary configuration parameter. (bug 469) (Tatsuo Ishii)

      To use this feature, sr_check_user must be super user or in pg_monitor group.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-4-0-4.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:45:37 +00:00
Torsten Zuehlsdorff
bdfe2823c0 MFH: r498352
databases/pgpool-II-37: Upgrade from 3.7.8 to 3.7.9

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii, Yugo Nagata)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-7-9.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:43:46 +00:00
Torsten Zuehlsdorff
ea4911c771 MFH: r498351
databases/pgpool-II-36: Upgrade from 3.6.15 to 3.6.16

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii, Yugo Nagata)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

    Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-6-16.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:42:35 +00:00
Torsten Zuehlsdorff
0ced55ec23 MFH: r498350
databases/pgpool: Upgrade from 3.5.19 to 3.5.20

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-5-20.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:41:04 +00:00
Torsten Zuehlsdorff
27335e4549 MFH: r498348
databases/pgpool: Update from 3.4.22 to 3.4.23

Changelog:

Enhancements

    * Add new configuration option ssl_prefer_server_ciphers. (Muhammad Usama)

      Add the new setting ssl_prefer_server_ciphers to let users configure if they want client's or server's cipher order to take preference.

      The default for this parameter is off, which prioritize the client's cipher order as usual. However this is just for keeping backward compatibility, and it is possible that a malicious client uses weak ciphers. For this reason we recommend to set this parameter to on at all times.

    * Allow to set a client cipher list. (Tatsuo Ishii)

      For this purpose new parameter ssl_ciphers, which specifies the cipher list to be accepted by Pgpool-II, is added. This is already implemented in PostgreSQL and useful to enhance security when SSL is enabled.

Bug fixes

    * Fix unnecessary fsync() to pgpool_status file. (Tatsuo Ishii)

      Whenever new connections are created to PostgreSQL backend, fsync() was issued to pgpool_status file, which could generate excessive I/O in certain conditions. So reduce the chance of issuing fsync() so that it is issued only when backend status is changed.

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-4-23.html

Approved by:	ports-secteam (joneum)
2019-04-10 15:37:41 +00:00
Jung-uk Kim
431c85174d MFH: r498535
Update to 32.0.0.171.

https://helpx.adobe.com/security/products/flash-player/apsb19-19.html

Approved by:	ports-secteam (blanket)
2019-04-10 07:41:34 +00:00
Mark Linimon
25ff2d9617 MFH: r498488
Add -fnested-functions to CFLAGS when using base GCC to fix build.

While here, pet portlint.

Approved by:	portmgr (tier-2 blanket)
2019-04-09 18:07:29 +00:00
Mark Linimon
eddfb0a564 MFH: r498486
This port requires a C++11-compatible compiler, so add USES=compiler:c++11-lang
to fix build on GCC-based architectures.

While here, add USES=sdl.

PR:		237100
Submitted by:	Piotr Kubaj
Approved by:	portmgr (tier-2 blanket)
2019-04-09 18:00:27 +00:00