Commit Graph

495235 Commits

Author SHA1 Message Date
Christoph Moench-Tegeder
dcd1fe0196 MFH: r527565
switch kicad-doc from source to pre-built docs

The build process is rather unstable on our asciidoc toolchain, but
then the doc files are completely independent of OS and machine
architecture, so there's nothing which stops us from just taking the
ready-built files from upstream. At the same time this enables two
additional documentation languages (polnish and chinese) - their
build process was even more unstable than the rest in my environment.

PR:		241183

Approved by:	ports-secteam (joneum@)
2020-03-01 18:10:41 +00:00
Jan Beich
bbfffc9f42 MFH: r527425
emulators/citra: update to s20200229

Changes:	f106e7613...cd46e62ad
Approved by:	ports-secteam (swills, implicit for snapshots)
2020-02-29 15:54:56 +00:00
Matthias Fechner
b4013ae841 MFH: r527417
textproc/apache-solr: security related update to 8.4.1
Switch java version to current LTS version.

Security:	e59cb761-5ad8-11ea-abb7-001b217b3468

Approved by:	ports-secteam (joneum)
2020-02-29 14:48:12 +00:00
Jochen Neumeister
4f0db06072 MFH: r527391
Fix build on non-x86 and nun-aarch6

PR:		244073
Submitted by:	pkubaj
Sponsored by:	Netzkommune GmbH

Approved by:	ports-secteam (joneum)
2020-02-28 22:07:00 +00:00
Niclas Zeising
d9b554e4ec MFH: r527102
x11/xdm: Fix generation of etc/X11/xdm/Xresources

By some stupidity of autotools, spacing for a sed regexp used to generate
Xresources gets broken, and the sed command doen't match as it should.  This
results in an Xresources file with an extra '#endif /* XPM */', which breaks
the file.
Patch Makefile.in to fix the regexp and have Xresources generated properly.

PR:		244404
Reported by:	olgeni

Approved by:	ports-secteam (joenum)
2020-02-26 20:53:39 +00:00
Tijl Coosemans
c4b69fd407 MFH: r527000
Update to 2.16.5.

Security:	https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-02
Approved by:	ports-secteam (joneum)
2020-02-25 10:00:08 +00:00
Dima Panov
8dfa9bdf81 MFH: r527012
mail/opensmtpd: update to 6.6.4p1 security releaase

SECURITY RELEASE

An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.

Approved by:	ports-secteam (joneum)
Security:	CVE-2020-8793, CVE-2020-8794
2020-02-25 03:22:59 +00:00
Dima Panov
5a3400175f MFH: r526973
net/freeradius-client: unbreak fetch, update to 1.1.7 release

Maintainer didn't unbreak the port over 3 months since it was marked unfetchable,
version 1.1.7 was released 26.05.2017

Approved by:	maintainer (timeout)

Approved by:	ports-secteam (joneum)
2020-02-25 03:20:58 +00:00
Bernard Spil
ed9ca44054 MFH: r526689
irc/weechat: Security update to 2.7.1

Security:	8e3f1812-54d9-11ea-8d49-d4c9ef517024

Approved by:	ports-secteam (joneum)
2020-02-22 14:33:32 +00:00
Matthias Andree
212066a9cf MFH: r526760
Update Postfix to 3.4.9 (bugfix-only release)

While here, also strip libexec/postfix/postlogd.

Announcement: http://www.postfix.org/announcements/postfix-3.4.9.html
 Fixed in all supported stable releases:
    Bug (introduced: Postfix 3.1): smtp_dns_resolver_options were broken while adding support for negative DNS response caching in postscreen. Postfix was inadvertently changed to call res_query() instead of res_search(). Reported by Jaroslav Skarvada.

    Bug (introduced: Postfix 2.5): Postfix ignored the CONNECT macro overrides from a Milter application. Postfix now evaluates the Milter macros for an SMTP CONNECT event after the Postfix-to-Milter connection is negotiated. Problem reported by David Bürgin.

    Bug (introduced: Postfix 3.0): sanitize (remote) server responses before storing them in the verify database, to avoid Postfix warnings about malformed UTF8. Found during code maintenance.

PR:		243879
Submitted by:	Juraj Lutter <juraj@lutter.sk>
Approved by:	maintainer timeout 15d (ohauer@)
Differential Revision:	https://reviews.freebsd.org/D23502

Approved by:	ports-secteam (joneum@)
2020-02-22 13:28:58 +00:00
Thomas Zander
8185799a37 MFH: r526761
Update to upstream version 1.7.21

Details:
- Bugfix release, see
  https://github.com/containous/traefik/releases/tag/v1.7.21

Approved by:	ports-secteam (riggs)
2020-02-22 12:18:52 +00:00
Torsten Zuehlsdorff
30f1a3ab92 MFH: r526724
lang/php74: Upgrade from 7.4.2 to 7.4.3

Changelog:

    Core:
        Fixed bug #79146 (cscript can fail to run on some systems).
        Fixed bug #79155 (Property nullability lost when using multiple property definition).
        Fixed bug #78323 (Code 0 is returned on invalid options).
        Fixed bug #78989 (Delayed variance check involving trait segfaults).
        Fixed bug #79174 (cookie values with spaces fail to round-trip).
        Fixed bug #76047 (Use-after-free when accessing already destructed backtrace arguments).
    COM:
        Fixed bug #79247 (Garbage collecting variant objects segfaults).
    CURL:
        Fixed bug #79078 (Hypothetical use-after-free in curl_multi_add_handle()).
    FFI:
        Fixed bug #79096 (FFI Struct Segfault).
    IMAP:
        Fixed bug #79112 (IMAP extension can't find OpenSSL libraries at configure time).
    Intl:
        Fixed bug #79212 (NumberFormatter::format() may detect wrong type).
    Libxml:
        Fixed bug #79191 (Error in SoapClient ctor disables DOMDocument::save()).
    MBString:
        Fixed bug #79149 (SEGV in mb_convert_encoding with non-string encodings).
    MySQLi:
        Fixed bug #78666 (Properties may emit a warning on var_dump()).
    MySQLnd:
        Fixed bug #79084 (mysqlnd may fetch wrong column indexes with MYSQLI_BOTH).
        Fixed bug #79011 (MySQL caching_sha2_password Access denied for password with more than 20 chars).
    Opcache:
        Fixed bug #79114 (Eval class during preload causes class to be only half available).
        Fixed bug #79128 (Preloading segfaults if preload_user is used).
        Fixed bug #79193 (Incorrect type inference for self::$field =& $field).
    OpenSSL:
        Fixed bug #79145 (openssl memory leak).
    Phar:
        Fixed bug #79082 (Files added to tar with Phar::buildFromIterator have all-access permissions). (CVE-2020-7063)
        Fixed bug #79171 (heap-buffer-overflow in phar_extract_file). (CVE-2020-7061)
        Fixed bug #76584 (PharFileInfo::decompress not working).
    Reflection:
        Fixed bug #79115 (ReflectionClass::isCloneable call reflected class __destruct).
    Session:
        Fixed bug #79221 (Null Pointer Dereference in PHP Session Upload Progress). (CVE-2020-7062)
    Standard:
        Fixed bug #78902 (Memory leak when using stream_filter_append).
        Fixed bug #78969 (PASSWORD_DEFAULT should match PASSWORD_BCRYPT instead of being null).
    Testing:
        Fixed bug #78090 (bug45161.phpt takes forever to finish).
    XSL:
        Fixed bug #70078 (XSL callbacks with nodes as parameter leak memory).
    Zip:
        Add ZipArchive::CM_LZMA2 and ZipArchive::CM_XZ constants (since libzip 1.6.0).
        Add ZipArchive::RDONLY (since libzip 1.0.0).
        Add ZipArchive::ER_* missing constants.
        Add ZipArchive::LIBZIP_VERSION constant.
        Fixed bug #73119 (Wrong return for ZipArchive::addEmptyDir Method).

Changelog taken from: https://www.php.net/ChangeLog-7.php#7.4.3

Approved by:	ports-secteam (joneum)
2020-02-21 22:46:19 +00:00
Torsten Zuehlsdorff
63f9998505 MFH: r526723
lang/php73: Upgrade from 7.3.14 to 7.3.15

Changelog:

    Core:
        Fixed bug #71876 (Memory corruption htmlspecialchars(): charset `*' not supported).
        Fixed bug #79146 (cscript can fail to run on some systems).
        Fixed bug #78323 (Code 0 is returned on invalid options).
        Fixed bug #76047 (Use-after-free when accessing already destructed backtrace arguments).
    CURL:
        Fixed bug #79078 (Hypothetical use-after-free in curl_multi_add_handle()).
    Intl:
        Fixed bug #79212 (NumberFormatter::format() may detect wrong type).
    Libxml:
        Fixed bug #79191 (Error in SoapClient ctor disables DOMDocument::save()).
    MBString:
        Fixed bug #79154 (mb_convert_encoding() can modify $from_encoding).
    MySQLnd:
        Fixed bug #79084 (mysqlnd may fetch wrong column indexes with MYSQLI_BOTH).
    OpenSSL:
        Fixed bug #79145 (openssl memory leak).
    Phar:
        Fixed bug #79082 (Files added to tar with Phar::buildFromIterator have all-access permissions). (CVE-2020-7063)
        Fixed bug #79171 (heap-buffer-overflow in phar_extract_file). (CVE-2020-7061)
        Fixed bug #76584 (PharFileInfo::decompress not working).
    Reflection:
        Fixed bug #79115 (ReflectionClass::isCloneable call reflected class __destruct).
    Session:
        Fixed bug #79221 (Null Pointer Dereference in PHP Session Upload Progress). (CVE-2020-7062)
    SPL:
        Fixed bug #79151 (heap use after free caused by spl_dllist_it_helper_move_forward).
    Standard:
        Fixed bug #78902 (Memory leak when using stream_filter_append).
    Testing:
        Fixed bug #78090 (bug45161.phpt takes forever to finish).
    XSL:
        Fixed bug #70078 (XSL callbacks with nodes as parameter leak memory).

Changelog taken from: https://www.php.net/ChangeLog-7.php#7.3.15

Approved by:	ports-secteam (joneum)
2020-02-21 22:43:15 +00:00
Torsten Zuehlsdorff
2dd60a109f MFH: r526722
lang/php72: Upgrade from 7.2.27 to 7.2.28

Changelog:

    DOM:
        Fixed bug #77569: (Write Access Violation in DomImplementation).
    Phar:
        Fixed bug #79082 (Files added to tar with Phar::buildFromIterator have all-access permissions). (CVE-2020-7063)
    Session:
        Fixed bug #79221 (Null Pointer Dereference in PHP Session Upload Progress). (CVE-2020-7062)

Changelog taken from: https://www.php.net/ChangeLog-7.php#7.2.28

Approved by:	ports-secteam (joneum)
2020-02-21 22:41:12 +00:00
Niclas Zeising
198cb5af04 MFH: r526720
Graphics/drm-fbsd11.2-kmod: Update snapshot

Update graphics/drm-fbsd11.2-kmod to the latest snapshot.
Make unsynchronized DRM_IOCTL_I915_GEM_USERPTR work in mesa on 7th
generation Haswell graphics.  This is needed for vulkan.
Add devctl (devd) notification for monitor hotplug.

Approved by:	portmgr (implicit, drm-drivers blanket)
2020-02-21 21:45:31 +00:00
Dimitry Andric
381f709927 MFH: r526608
devel/valgrind(-devel): Fix compiler version detection hopefully forever

Every time a compiler major version is bumped, we run into this exact
same error:

===>  Configuring for valgrind-3.10.1.20160113_7,1
...
checking for a supported version of gcc... no (10.0.0)
configure: error: please use gcc >= 3.0 or clang >= 2.9

Attempt to fix this for all versions in the future.

Other fix included: don't use undefined behavior to implement offsetof,
just use the official builtin function instead.

Approved by:	portmgr (joneum)
PR:		244234
2020-02-21 21:29:58 +00:00
Niclas Zeising
5f0d89e975 MFH: r526717
graphics/drm-fbsd12.0-kmod: Update snapshot

Update the graphics/drm-fbsd12.0-kmod snapshot
Make unsynchronized DRM_IOCTL_I915_GEM_USERPTR work in mesa on 7th
generation Haswell graphics.  This is needed for vulkan.

Approved by:	portmgr (implicit, drm-drivers blanket)
2020-02-21 21:15:07 +00:00
Kyle Evans
a27e36769d MFH: r526604
www/p5-Gantry: correctly escape $

In make(1), "$$" is the escaped version of "$", rather than the expected
"\$". this expression was getting passed through to ${REINPLACE_CMD} as
"s,\NV{..." rathern than the expected "s,$ENV{..." -- bug #229925 makes \N
an illegal expression, as ordinary characters will be disallowed from being
escaped in preparation for future changes to grant some of these escape
sequences GNU-extended behavior.

PR:		240310
Approved by:	koobs (mentor), bapt (mentor)
Approved by:	portmgr (maintainer timeout: 4 months, blanket: bugfix)
Differential Revision:	https://reviews.freebsd.org/D23701

Approved by:	ports-secteam (blanket: bugfix)
2020-02-21 04:01:57 +00:00
Michael Gmelin
6e9ebf3092 MFH: r526586
Fix accidental overwriting of properties on update

See:
https://github.com/iocage/iocage/issues/1130
b47dc2c47f

PR:		244252

Approved by:	portmgr (runtime fix blanket)
2020-02-20 20:38:00 +00:00
Kyle Evans
9dcb5d4edc MFH: r526580
x11-toolkits/p5-Alien-wxWidgets: remove extraneous escapes

post-patch phase of this port uses sed to replace 'wx-config with
'${WX_CONFIG:T}. Previously it escaped the ', but this is not necessary in
this context.

Remove the extraneous escape so that it doesn't get passed through to sed(1)
as an escape of an ordinary character. This is important as the patch in bug
#229925 will make such escapes an error to ease transition into a world
where some escaped-ordinaries will be granted a special meaning.

PR:		240450
Approved by:	koobs (mentor), bapt (mentor)
Approved by:	portmgr (maintainer timeout: 4 months)
Differential Revision:	https://reviews.freebsd.org/D23702

Approved by:	ports-secteam (implicit, future build fix)
2020-02-20 19:08:31 +00:00
Kyle Evans
6557d2de2a MFH: r526579
x11-toolkits/p5-Alien-wxWidgets: add missing file to pkg-plist

This appears to have been overlooked in a previous update, so note its
presence in the pkg-plist.

This fixes Q/A checks run by `poudriere testport`.

Approved by:	koobs (mentor), bapt (mentor)
Differential Revision:	D23702 (included, but not the primary change)

Approved by:	ports-secteam (implicit, packaging fix)
2020-02-20 19:07:24 +00:00
Kyle Evans
4390f2f8c9 MFH: r526577
www/foswiki: remove redundant escape

= does not need to be escaped in this context; bug #229925 will make this
escape as well as the escape of most ordinary characters an error to reduce
friction when some of these ordinary characters are later granted special
GNU-extended behavior.

No functional change, no need to bump PORTREVISION.

PR:		240309
Approved by:	koobs (mentor), bapt (mentor)
Approved by:	portmgr (maintainer timeout: 4 months)
Differential Revision:	https://reviews.freebsd.org/D23698

Approved by:	ports-secteam (implicit, future build fix)
2020-02-20 19:06:39 +00:00
Kyle Evans
c982d9ec47 MFH: r525282
qemu-user-static: revert SSP_CFLAGS workaround (ports r501032)

This was later diagnosed to be a bug in libc, which has since been addressed
in all supported releases and branches. PORTREVISION is bumped as SSP_CFLAGS
will change the output, and for consumers of these two ports it is
imperative that it be rebuilt against the updated libc to avoid high failure
rates. In testing qemu-user-static-devel failed roughly 60% of the time,
rendering it unusable as each fork/exec was yet one more chance to fail.

The bug was fixed in the following patch levels (FreeBSD-EN-20:01.ssp):
- 12.1-p2
- 12.0-p13
- 11.3-p6

PR:		243735
Approved by:	koobs (ports)

Approved by:	ports-secteam (implicit, runtime fix)
2020-02-20 19:05:03 +00:00
Kyle Evans
14f6a85e21 MFH: r525281
glib20: revert SSP_CFLAGS workaround (ports r500819)

This was later diagnosed to be a bug in libc, which has since been addressed
in all supported releases and branches. PORTREVISION is bumped as SSP_CFLAGS
will change the output.

The bug was fixed in the following patch levels (FreeBSD-EN-20:01.ssp):
- 12.1-p2
- 12.0-p13
- 11.3-p6

PR:		243735
Approved by:	kwm (gnome, maintainer via IRC)

Approved by:	ports-secteam (miwi)
2020-02-20 19:02:19 +00:00
Matthias Andree
8d5f33c994 MFH: r526535
mail/fetchmail: mail/fetchmailconf: update to 6.4.2, make Python 3 compatible

Fetchmail updated to new revision 6.4.2
- one bugfix
- manual page updates
- update of Chinese (simplified) translation
- massive fetchmailconf overhaul
  + Python 3 compatible (requires py-future)
  + Supports IPv6 and SSL probing
- remove two patches for fetchmail that are in the upstream release
- add a smoke test to fetchmailconf's post-install,
  and a patch to support that running without X11 $DISPLAY.

PR:		244130
Submitted by:	mandree@
Reviewed by:	Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
Approved by:	Corey Halpin <chalpin@cs.wisc.edu> (maintainer)

Approved by:	ports-secteam@ (joneum@)
2020-02-20 18:51:34 +00:00
Cy Schubert
3f7a774106 MFH: r525497
Fix CVE-2019-14868: certain environment variables interpreted as
arithmetic expressions on startup, leading to code injection.

Submitted by:	Siteshwar Vashisht <svashisht@redhat.com>
Reported by:	Marian Rehak
Security:	CVE-2019-14868
		https://bugzilla.redhat.com/show_bug.cgi?id=1757324
		https://access.redhat.com/security/cve/CVE-2019-14868
Approved by:	portmgr (miwi)
2020-02-20 03:42:57 +00:00
Koop Mast
116296778b MFH: r526526
Update webkit2-gtk3 to 2.26.4.

Security:	1cb0af4e-d641-4f99-9432-297a89447a97

Approved by:	ports-secteam@ (joneum@)
2020-02-19 19:56:32 +00:00
Luca Pizzamiglio
6badd78a50 MFH: r526499
devel/pecl-xdebug: Update to 2.9.2

Bug fix release.
Changelog: https://xdebug.org/updates#x_2_9_2

Sponsored by:	trivago N.V.

Approved by:	portmgr
2020-02-19 12:28:53 +00:00
Kai Knoblich
7b77e19910 MFH: r526491
games/anki: Update to 2.1.16

* Backport two patches from upstream that fix the argument handling with
  multimedia/mpv since r520597.

* Also slightly change the MASTER_SITES as upstream distribute tarballs for
  newer versions only via GitHub.

Although there are already some newer releases available use the 2.1.16
release for a while.  It's mainly because the build process has changed a
lot since the 2.1.17 release and still needs to be investigated a little
more closely.

Changelog:

https://apps.ankiweb.net/docs/changes.html#changes-in-2.1.16

Approved by:	ports-secteam bugfix blanket
2020-02-19 08:22:09 +00:00
Thomas Zander
3bb50ea0bc MFH: r526469
Update to upstream version 0.21.20

Details:
- Bugfix release, see
  https://raw.githubusercontent.com/MusicPlayerDaemon/MPD/v0.21.20/NEWS
  includes various fixes for seeking

Approved by:	ports-secteam (riggs)
2020-02-18 19:06:36 +00:00
Koichiro Iwao
7b9982600f MFH: r526441
security/softether5: fix build on non-x86 architectures

Tested on: Raspberry Pi 3 Model B+

Sponsored by:	HAW International

Approved by:	portmgr blanket (fix build)
2020-02-18 08:58:14 +00:00
Matthias Andree
4e116cfa29 MFH: r526434
sysutils/e2fsprogs: Fix powerpc32 build/self-tests
libext2fs: avoid array buffer overruns caused by insane directory blocks

PR:		242798
Reported by:	canardo909@gmx.com
Obtained from:	Theodore Y. Ts'o <tytso@mit.edu> (upstream maintainer)

Approved by:	ports-secteam (blanket, fixing broken self-test by small patch)
2020-02-17 22:14:32 +00:00
Jan Beich
cc4e6adc6e MFH: r526430
www/firefox: update to 73.0.1

Changes:	https://www.mozilla.org/firefox/73.0.1/releasenotes/
PR:		243295
Approved by:	ports-secteam blanket
2020-02-17 20:46:22 +00:00
Matthias Fechner
a600a37ee6 MFH: r524831 r525233 r526069
Update to 12.7.5.
Changelog:
https://about.gitlab.com/releases/2020/01/22/gitlab-12-7-released/
https://about.gitlab.com/releases/2020/01/24/gitlab-12-7-2-released/
https://about.gitlab.com/releases/2020/01/30/security-release-gitlab-12-7-4-released/
https://about.gitlab.com/releases/2020/01/31/gitlab-12-7-5-released/

Use the standard RC system available in FreeBSD.
This makes some commands like:
service gitlab rcvar
available. This is required by configuration management tools like Chef, Puppetm, Salt,
Ansible and more.

PR:		243860
Reported by:	amendlik@gmail.com

Security update to 12.7.6.
Changelog:
https://about.gitlab.com/releases/2020/02/13/critical-security-release-gitlab-12-dot-7-dot-6-released/

Security:	1ece5591-4ea9-11ea-86f0-001b217b3468

Approved by:	ports-secteam (joneum)
2020-02-17 19:03:59 +00:00
Matthias Fechner
d70d7f5168 MFH: r525469
Fixed build for aarch64.
This problem was send upstream here:
https://gitlab.com/gitlab-org/gitlab-workhorse/issues/246

And will be corrected with this merge request:
https://gitlab.com/gitlab-org/gitlab-workhorse/-/merge_requests/456

After the merge request reached the next stable version the two patches:
gitlab-workhorse/files/patch-go.mod
gitlab-workhorse/files/patch-go.sum

can be removed again.

PR:		243804
Reported by:	mikael@FreeBSD.org

Approved by:	ports-secteam (joneum)
2020-02-17 19:00:48 +00:00
Matthias Fechner
59289087e0 MFH: r524826
Update to 2.7.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:59:48 +00:00
Matthias Fechner
b8b8997e49 MFH: r524942
Update to 1.2.2 to work with newer rubygem-addressable.

Approved by:	ports-secteam (joneum)
2020-02-17 18:58:57 +00:00
Matthias Fechner
d6d4ae236c MFH: r524941
Update to 1.8.1 to work with newer rubygem-addressable.

Approved by:	ports-secteam (joneum)
2020-02-17 18:58:07 +00:00
Matthias Fechner
cfea37f1e9 MFH: r524940
Update to 0.2.5 to work with newer rubygem-addressable.

Approved by:	ports-secteam (joneum)
2020-02-17 18:57:25 +00:00
Matthias Fechner
e90b327ce4 MFH: r524939
Update to 0.8.1 to work with newer rubygem-addressable.

Approved by:	ports-secteam (joneum)
2020-02-17 18:56:30 +00:00
Matthias Fechner
013fee5959 MFH: r524836
Unbreak INDEX

Approved by:	ports-secteam (joneum)
2020-02-17 18:55:45 +00:00
Matthias Fechner
30be408e5b MFH: r524830
Update to 11.0.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:53:53 +00:00
Matthias Fechner
66fae808b6 MFH: r524829
Update to 1.83.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:53:03 +00:00
Matthias Fechner
cca5b2ebe0 MFH: r524828
Update to 4.6.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:52:19 +00:00
Matthias Fechner
85ca80fb24 MFH: r524827
Update to 2.3.1 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:51:35 +00:00
Matthias Fechner
465412db4c MFH: r524825
Update to 4.15.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:50:52 +00:00
Matthias Fechner
e3180bff88 MFH: r524824
Update to 1.81.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:50:07 +00:00
Matthias Fechner
f0679ece1f MFH: r524823
Update to 1.2.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:49:26 +00:00
Matthias Fechner
0fdb5adb20 MFH: r524822
Update to 0.8.0 which is required for gitlab-ce 12.7.

Approved by:	ports-secteam (joneum)
2020-02-17 18:48:35 +00:00
Matthias Fechner
519fb01a81 MFH: r524821
Upgraded to version 6.8.1.

Approved by:	ports-secteam (joneum)
2020-02-17 18:47:48 +00:00