Commit Graph

472257 Commits

Author SHA1 Message Date
Torsten Zuehlsdorff
fad212cfb1 MFH: r501843
databases/pgpool-II-36: Upgrade from 3.6.16 to 3.6.17

Changelog:

  Enhancements

    - Doc: Improve Reference II, PCP commands document. (Tatsuo Ishii)
    - Speed up failover when all of backends are down. (Tatsuo Ishii)
    - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii)
    - Doc: add restrictions entry. (Takuma Hoshiai)

  Bug fixes

    - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng)
    - Remove unused .sgml file. (Takuma Hoshiai)
    - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii)
    - Fix black_function_list's broken default value. (Tatsuo Ishii)
    - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii)
    - Fix DROP DATABASE failure. (Tatsuo Ishii)
    - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai)
    - Add missing test/watchdog_setup to EXTRA_DIST. (bug 470) (Bo Peng)
    - Doc: mention that multi-statement queries are sent to primary node only. (bug 492) (Tatsuo Ishii)
    - Abort session if failover/failback is ongoing to prevent potential segfault. (bug 481, bug 482) (Tatsuo Ishii)
    - Fix compiler warnings. (Tatsuo Ishii)
    - Fix memory leak in "batch" mode in extended query. (bug 468) (Tatsuo Ishii)

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-6-17.html

Approved by:	ports-secteam (mivy)
2019-05-23 08:41:21 +00:00
Torsten Zuehlsdorff
e0b8fd7b21 MFH: r501842
databases/pgpool-II-35: Upgrade from 3.5.20 to 3.5.21

Changelog:

  Enhancements

    - Speed up failover when all of backends are down. (Tatsuo Ishii)
    - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii)

  Bug fixes

    - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng)
    - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii)
    - Fix black_function_list's broken default value. (Tatsuo Ishii)
    - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii)
    - Fix DROP DATABASE failure. (Tatsuo Ishii)
    - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai)
    - Abort session if failover/failback is ongoing to prevent potential segfault. (bug 481, bug 482) (Tatsuo Ishii)
    - Fix compiler warnings. (Tatsuo Ishii)
    - Fix memory leak in "batch" mode in extended query. (bug 468) (Tatsuo Ishii)

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-5-21.html

Approved by:	ports-secteam (mivy)
2019-05-23 08:40:38 +00:00
Torsten Zuehlsdorff
8f422baf8f MFH: r501841
databases/pgpool: Upgrade from 3.4.23 to 3.4.24

Changelog:

  Enhancements

    - Speed up failover when all of backends are down. (Tatsuo Ishii)
    - pgpool-recovery extension and pgpool_setup is now ready for the next major release PostgreSQL 12. (Tatsuo Ishii)

  Bug fixes

    - Fix the wrong error message "ERROR: connection cache is full", when all backend nodes are down. (bug 487) (Bo Peng)
    - Avoid exit/fork storm of pool_worker_child process. (Tatsuo Ishii)
    - Fix black_function_list's broken default value. (Tatsuo Ishii)
    - Fix "not enough space in buffer" error. (bug 499) (Tatsuo Ishii)
    - The error occurred while processing error message returned from backend and the cause is that the query string in question is too big. Problem is, the buffer is in fixed size (8192 bytes). Eliminate the fixed size buffer and use palloced buffer instead. This also saves some memory copy work.
    - Fix DROP DATABASE failure. (Tatsuo Ishii)
    - Fix wrong variable in read_status_file() function. (bug 493) (Takuma Hoshiai)
    - Fix compiler warnings. (Tatsuo Ishii)

Changelog taken from: http://www.pgpool.net/docs/latest/en/html/release-3-4-24.html

Approved by:	ports-secteam (mivy)
2019-05-23 08:39:48 +00:00
Niclas Zeising
9ca2b38930 MFH: r502190
graphics/drm-devel-kmod: fix package

Fix packaging of graphics/drm-devel-kmod, the amdkfd module has been
disabled, and I missed this last night.  Remove it from the pkg-plist by
commenting it out for all architectures for now.
This is a stop gap measure to get the port to package, until I can touch
base with johalun and jmd about how to handle this permanently.

Sponsored by:	B3 Init

Approved by:	ports-secteam (implicit, drm-drivers blanket)
2019-05-21 06:25:21 +00:00
Niclas Zeising
32b6a4aca5 MFH: r502187
Hook graphics/drm-current-kmod to the build

Reminded by:	antoine
Sponsored by:	B3 Init

Approved by:	ports-secteam (implicit, drm-drivers blanket)
2019-05-21 05:52:53 +00:00
Jan Beich
9c428006e4 MFH: r502180
sysutils/pesign: unbreak

Obtained from:	upstream
Approved by:	ports-secteam blanket
2019-05-21 00:44:31 +00:00
Niclas Zeising
31cce6f5ec MFH: r502165 r502166 r502167 r502168
add graphics/drm-devel-kmod

Add graphics/drm-devel-kmod, development version of the lkpi based DRM
graphics drivers.  This version is experimental, and for recent CURRENT
only.

This version currently corresponds to Linux 5.0 DRM drivers, and should give
better support for more recent Intel and AMD GPUs.

Please note that this port is copied from drm-current-kmod, rather than
resurrected from the old drm-devel-kmod port, that's because
drm-current-kmod was created by copying the old drm-devel-kmod when that
went to a more stable version.

Big thank you to everyone who has worked on this, and johalun in particuar,
who has done most of the heavy lifting.

Approved by:	jmd (maintainer, implicit)
Sponsored by:	B3 Init

drm-kmod ports: Update conflicts

Update conflicts for all drm-kmod ports to take into account the new
drm-devel-kmod port.

Sponsored by:	B3 Init

Remove old drm-devel-kmod entry

Sponsored by:	B3 Init

graphics/drm-current-kmod: Adjust FreeBSD compat

Update the FreeBSD OSVERSION compat of drm-current-kmod after the latest
update in r502043.

Suggested by:	jbeich
Discussed with:	johalun
Aproved by:	jmd (maintainer, implicit)
Sponsored by:	B3 Init

Approved by:	ports-secteam (implicit, drm-drivers blanket)
2019-05-20 20:45:19 +00:00
Thomas Zander
2733d43b86 MFH: r502163
Update to upstream version 34.0.0

Details:
- Bug fix release, see
  https://mkvtoolnix.download/doc/NEWS.md

Approved by:	ports-secteam (riggs)
2019-05-20 20:18:54 +00:00
Ryan Steinmetz
2207692e37 MFH: r502120
- Unbreak with latest version of go
- Add deprecation notice
- Bump PORTREVISION

Approved by:	ports-secteam (with hat)
2019-05-20 15:32:06 +00:00
Jan Beich
1d7091df9a MFH: r498218 r498378 r498617 r500326 r500943 r501029 r501192 r501550 r502105 r502111
multimedia/svt-av1: update to 0.5.0

Changes:	https://github.com/OpenVisualCloud/SVT-AV1/compare/90b56a8...v0.5.0
Approved by:	ports-secteam (miwi)
2019-05-20 13:19:59 +00:00
Niclas Zeising
b385d904ee MFH: r502043
graphics/drm-current-kmod: Update snapshot

Update graphics/drm-current-kmod to the latest snapshot.
This update takes into account changes in lkpi in base, and makes use of
debugfs in base, instead of the bundled one.

note: If you are on an older version of current, prior to r347973, you might
need to update current first, before updating this driver.

Approved by:	jmd (maintainer, implicit)
Sponsored by:	B3 Init

Approved by:	ports-secteam (implicit, drm-drivers blanket)
2019-05-19 20:06:51 +00:00
Jan Beich
6fe4b4426e MFH: r501998
games/openbor: update to 7022

Changes:	dc6a1516...c5cfb660
Approved by:	ports-secteam (feld, implicit for snapshots)
2019-05-19 00:52:15 +00:00
Jan Beich
da115906d5 MFH: r501995
mail/thunderbird: update to 60.7.0

Changes:	https://www.thunderbird.net/thunderbird/60.7.0/releasenotes/
Reported by:	Repology
Approved by:	ports-secteam blanket
2019-05-19 00:51:42 +00:00
Jan Beich
76a617a8b2 MFH: r501856
www/firefox: restore SafeBrowsing v4 after r495403

Required for phishing protection. Not covered by uBlock Origin lists.
Looks like #Mozilla didn't announce the POLA-violating change anywhere
public despite backporting to ESR60.

https://bugzilla.mozilla.org/show_bug.cgi?id=1531176

Approved by:	ports-secteam blanket
2019-05-17 12:07:54 +00:00
Jan Beich
357ee1e984 MFH: r501604 r501832
www/firefox: update to 67.0

Changes:	https://www.mozilla.org/firefox/67.0/releasenotes/
PR:		236651
Security:	44b6dfbf-4ef7-4d52-ad52-2b1b05d81272
Approved by:	ports-secteam (miwi)
Differential Revision:	https://reviews.freebsd.org/D19654
2019-05-17 12:06:35 +00:00
Jan Beich
6718932582 MFH: r501798
www/firefox-esr: update to 60.7.0

Changes:	https://www.mozilla.org/firefox/60.7.0/releasenotes/
Approved by:	ports-secteam blanket
2019-05-17 12:04:35 +00:00
Guido Falsi
113a84121b MFH: r501697
Add explicit build depend on python, since it's actually used during
the install phase.

PR:		237862
Submitted by:	Christopher <inbox@alleghenycomputer.com>

Approved by:	ports-secteam (miwi)
2019-05-15 09:42:04 +00:00
Jung-uk Kim
b315333f55 MFH: r501668
Update to 32.0.0.192.

https://helpx.adobe.com/security/products/flash-player/apsb19-26.html

Approved by:	ports-secteam (blanket)
2019-05-14 21:16:49 +00:00
Emanuel Haupt
9dbc56742e MFH: r501560
Mark MAKE_JOBS_UNSAFE due to a makefile race condition.

PR:		237874
Submitted by:	pkubaj@FreeBSD.org
Approved by:	ports-secteam (blanket)
2019-05-14 08:50:24 +00:00
Jan Beich
5d50a2a54c MFH: r501606
devel/rust-cbindgen: update to 0.8.7

Changes:	https://github.com/eqrion/cbindgen/compare/v0.8.6...v0.8.7
Approved by:	ports-secteam blanket (required by Firefox 68)
2019-05-14 00:57:25 +00:00
Dmitry Marakasov
bffdd51b5e MFH: r501598
- Fix build with VIEWER enabled
- Add missing USES
- Switch to USES=localbase and opt_CMAKE_BOOL

PR:		237607
Reported by:	doralitze@chaotikum.org
Approved by:	monwarez@mailoo.org (maintainer)
Approved by:	ports-secteam (with hat)
2019-05-13 21:48:04 +00:00
Mahdi Mokhtari
2bfcd1b9e1 MFH: r501261
databases/mysql80-{client, server}: Update to latest release 8.0.16

This update includes:
Bugfixes:
- InnoDB: Undo tablespaces remained unencrypted after enabling
    undo tablespace encryption at startup. (Bug #29477795)
- InnoDB: Problematic macros introduced with undo tablespace DDL support
    (Bug #29324132, Bug #94243).
- InnoDB: Static thread local variables defined at the wrong scope
    were not released at thread exit. (Bug #29305186)
-  Memory leaks discovered in the innochecksum  (Bug #28917614, Bug #93164).

New features:
- MySQL C API now supports asynchronous functions for
    nonblocking communication with the MySQL server.
- MySQL now supports a new Chinese collation, utf8mb4_zh_0900_as_cs
- CMake now causes the build process to link with the llvm lld linker
    for Clang if it is available.

Security Fix:
CVE-2019-2632, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695 and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL

PR:		237399
Reported by:	Brent Busby <brent@jfi.uchicago.edu>
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (feld, CVE-patch blanket)
2019-05-13 19:33:29 +00:00
Mahdi Mokhtari
cb855b101f MFH: r500373
databases/mysql57-{client, server}: Update to latest release 5.7.26
This update includes:
Bugfix:
- InnoDB: Optimized internal temporary tables did not support
    in-place UPDATE operations
- InnoDB: A function called by a CREATE TABLE thread attempted access after free()
- InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES
    was not updated when adding an index
- The authentication_ldap_simple plugin could enforce authentication incorrectly
More info: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-26.html

Security Fix:
CVE-2019-2632, CVE-2019-1559, CVE-2018-3123, and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL

PR:		237399
Reported by:	Brent Busby <brent@jfi.uchicago.edu>
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (feld, CVE-patch blanket)
2019-05-13 19:30:22 +00:00
Mahdi Mokhtari
3141b61298 MFH: r500372
databases/mysql56-{client, server}: Update to latest release 5.6.44
This update includes
Bugfix:
- InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES
    was not updated when adding an index
- MySQL 5.6 did not build with maintainer mode enabled with GCC 7
- A damaged mysql.user table could cause a server exit
- mysqladmin shutdown did not wait for mysqld to shut down
More info: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-44.html

Security Fix:
CVE-2019-1559, CVE-2018-3123 and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL<Paste>

PR:		237399
Reported by:	Brent Busby <brent@jfi.uchicago.edu>
Sponsored by:	The FreeBSD Foundation

Approved by:	ports-secteam (feld, CVE-patch blanket)
2019-05-13 19:27:31 +00:00
Steve Wills
3335f29aca MFH: r501581
sysutils/py-google-compute-engine: disable boto

This avoids breakage when running with python3

PR:		237877
Submitted by:	Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer)

Approved by:	ports-secteam (implicit, bug fix)
2019-05-13 18:32:59 +00:00
Jan Beich
a0193ace47 MFH: r501575
multimedia/libva: reroll

--- libva-2.4.1.orig/meson.build	2019-04-07 17:44:47 UTC
+++ libva-2.4.1/meson.build	2019-04-17 10:07:39 UTC
@@ -20,7 +20,7 @@ project(
 # - reset minor version to zero when major version is incremented
 va_api_major_version = 1
 va_api_minor_version = 4
-va_api_micro_version = 0
+va_api_micro_version = 1

 va_api_version = '@0@.@1@.@2@'.format(va_api_major_version,
 				      va_api_minor_version,

Reported by:	Ravenports
Approved by:	ports-secteam blanket
2019-05-13 15:21:40 +00:00
Steve Wills
226cb5b61d MFH: r498656 r499790 r501547
Patch to add missing config and take the maintainership

Two new variables was added to instance_config.cfg file
in version 2.8.13 to allow the addition and removal of
users from groups.
I am also taking over the maintainership of this packages
as previously discussed with Helen.

Bump PORTREVISION.

PR:		236500
Submitted by:	Lucas Kanashiro <lucas.kanashiro@collabora.com>
Approved by:	Helen Koike <helen.koike@collabora.com> (maintainer)

sysutils/py-google-compute-engine: update to 20190416 [1]

This fixes a python3 runtime issue [1]

While here, pull in missing dependency in python3 case [2]

PR:		237505 [1]
PR:		237203 [2]
Submitted by:	Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) [1]
Submitted by:	Miroslav Lachman <000.fbsd@quip.cz> [2]
Approved by:	Lucas Kanashiro <lucas.kanashiro@collabora.com> (maintainer) [2]

sysutils/py-google-compute-engine: fix daemons in python 2.7 case

PR:		237845
Reviewed by:	koobs
Approved by:	implicit (portmgr, python, jfi blanket)

Approved by:	ports-secteam (implicit)
2019-05-13 11:16:29 +00:00
Palle Girgensohn
19c1a45e18 MFH: r501149
The PostgreSQL Global Development Group has released an update to all
supported versions of our database system, including 11.3, 10.8, 9.6.13,
9.5.17, and 9.4.22. This release fixes two security issues in the
PostgreSQL server, a security issue found in two of the PostgreSQL
Windows installers, and over 60 bugs reported over the last three months.

Security:	CVE-2019-10129: Memory disclosure in partition routing

Prior to this release, a user running PostgreSQL 11 can read arbitrary
bytes of server memory by executing a purpose-crafted INSERT statement
to a partitioned table.

Security:	CVE-2019-10130: Selectivity estimators bypass row security policies

PostgreSQL maintains statistics for tables by sampling data available in
columns; this data is consulted during the query planning process. Prior
to this release, a user able to execute SQL queries with permissions to
read a given column could craft a leaky operator that could read
whatever data had been sampled from that column.  If this happened to
include values from rows that the user is forbidden to see by a row
security policy, the user could effectively bypass the policy.  This is
fixed by only allowing a non-leakproof operator to use this data if
there are no relevant row security policies for the table.

This issue is present in PostgreSQL 9.5, 9.6, 10, and 11. The PostgreSQL
project thanks Dean Rasheed for reporting this problem.

Also fix a FreeBSD port problem with LLVM [1] and add promote command
to `service postgresql` [2]

PR:	236100, 234879
Submitted by:	tomonori.usaka@ubin.jp [1], Trix Farrar [2]

Approved by:	ports-secteam (joneum)
2019-05-13 10:57:29 +00:00
Guido Falsi
0e3aafd92f MFH: r501536
- Add USES=shebangfix where required in geany and geany-plugin-*
  ports. This fixes build issues reported by users [1]
- Only bump PORTREVISION for geany-plugin-geanypy since the file
  modified in it by shebangfix is actually installed with the pkg

PR:		237862 [1]
Submitted by:	Christopher <inbox@alleghenycomputer.com>

Approved by:	ports-secteam (joneum)
2019-05-13 09:18:47 +00:00
Jan Beich
736feed9b1 MFH: r501375
sysutils/pesign: mark BROKEN after r501212

In file included from /usr/local/include/nss/nss/cert.h:22,
                 from efikeygen.c:39:
efikeygen.c: In function 'add_cert_type':
/usr/local/include/nss/nss/certt.h:445:5: error: unsigned conversion from 'int' to 'unsigned char' changes value from '496' to '240' [-Werror=overflow]
     (NS_CERT_TYPE_SSL_CLIENT | NS_CERT_TYPE_SSL_SERVER | NS_CERT_TYPE_EMAIL | \
     ^
efikeygen.c:208:23: note: in expansion of macro 'NS_CERT_TYPE_APP'
  unsigned char type = NS_CERT_TYPE_APP;
                       ^~~~~~~~~~~~~~~~

Reported by:	pkg-fallout
Approved by:	ports-secteam blanket
2019-05-12 11:29:54 +00:00
Jan Beich
87a358300f MFH: r501313
multimedia/dav1d: update to 0.3.1

Changes:	https://code.videolan.org/videolan/dav1d/tags/0.3.1
Changes:	https://code.videolan.org/videolan/dav1d/blob/0.3.1/NEWS
Changes:	https://code.videolan.org/videolan/dav1d/compare/0.3.0...0.3.1
Approved by:	ports-secteam (required by Firefox 68)
2019-05-11 23:34:46 +00:00
Jan Beich
27592423bd MFH: r501327
security/nss: unbreak on powerpc64 after r501212

crypto_primitives.c: In function 'swap8b':
crypto_primitives.c:31: error: 'SHA_MASK8' undeclared (first use in this
function)
crypto_primitives.c:31: error: (Each undeclared identifier is reported only
once
crypto_primitives.c:31: error: for each function it appears in.)
crypto_primitives.c:32: error: 'SHA_MASK16' undeclared (first use in this
function)

PR:		237841
Reported by:	jhibbits
Approved by:	ports-secteam blanket
2019-05-11 23:21:36 +00:00
Michael Reifenberger
8937b6aed2 MFH: r500659
Apply fix for installation with ruby 2.5

PR:		237478
Submitted by:	Koichiro Iwao

Approved by:	portmgr (blanket: Build, runtime or packaging fixes, if the quarterly branch version is currently broken)
2019-05-11 14:48:41 +00:00
Bernard Spil
c8996a20f8 MFH: r501255
databases/mariadb102-server: Security update to 10.2.24

 - CMake OPTIONS refactoring
 - Move everything to master port

Security:	4e1997e8-5de0-11e9-b95c-b499baebfeaf

Approved by:	ports-secteam (joneum)
2019-05-11 13:19:12 +00:00
Guido Falsi
ffa8e6e225 MFH: r501188
- Fix reported sporadic crashes
- Enumerate all displays for backlight support
- Fix some compile warnings
- When building debug binaries enable extra debugging code too

PR:		237714
Submitted by:	rozhuk.im@gmail.com

Approved by:	ports-secteam (miwi)
2019-05-11 07:49:22 +00:00
Jan Beich
b62f4b9996 MFH: r501212
security/nss: update to 3.44

Changes:	https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.44_release_notes
Changes:	https://hg.mozilla.org/projects/nss/shortlog/NSS_3_44_RTM
ABI:		https://abi-laboratory.pro/tracker/timeline/nss/
Approved by:	ports-secteam blanket (required by Firefox 68)
2019-05-11 01:00:21 +00:00
Jan Beich
404cdc8cfe MFH: r501203
emulators/rpcs3: unbreak EVDEV after r487789

In file included from rpcs3/rpcs3qt/pad_settings_dialog.cpp:24:
In file included from rpcs3/evdev_joystick_handler.h:7:
/usr/local/include/libevdev-1.0/libevdev/libevdev.h:30:10: fatal error: 'linux/input.h' file not found
 #include <linux/input.h>
          ^~~~~~~~~~~~~~~

Approved by:	ports-secteam blanket
2019-05-10 23:59:59 +00:00
Jan Beich
98964c18cb MFH: r501202
emulators/rpcs3: document broken GDB after r482459

Utilities/GDBDebugServer.cpp:357:36: error: no member named 'cr_pack' in 'ppu_thread'
                return u32_to_padded_hex(thread->cr_pack());
                                         ~~~~~~  ^
Utilities/GDBDebugServer.cpp:386:11: error: no member named 'cr_unpack' in 'ppu_thread'
                thread->cr_unpack(hex_to_u32(value));
                ~~~~~~  ^
Utilities/GDBDebugServer.cpp:736:22: error: out-of-line definition of 'on_task' does not match any declaration in 'GDBDebugServer'
void GDBDebugServer::on_task()
                     ^~~~~~~
Utilities/GDBDebugServer.cpp:811:22: error: out-of-line definition of 'on_exit' does not match any declaration in 'GDBDebugServer'
void GDBDebugServer::on_exit()
                     ^~~~~~~
Utilities/GDBDebugServer.cpp:822:29: error: out-of-line definition of 'get_name' does not match any declaration in 'GDBDebugServer'
std::string GDBDebugServer::get_name() const
                            ^~~~~~~~
Utilities/GDBDebugServer.cpp:827:22: error: out-of-line definition of 'on_stop' does not match any declaration in 'GDBDebugServer'
void GDBDebugServer::on_stop()
                     ^~~~~~~
Utilities/GDBDebugServer.cpp:831:8: error: no member named 'notify' in 'GDBDebugServer'
        this->notify();
        ~~~~  ^
Utilities/GDBDebugServer.cpp:832:2: error: use of undeclared identifier 'old_thread'; did you mean 'pad_thread'?
        old_thread::on_stop();
        ^~~~~~~~~~
        pad_thread
rpcs3/Emu/System.h:197:38: note: 'pad_thread' declared here
        std::function<std::shared_ptr<class pad_thread>()> get_pad_handler;
                                            ^
Utilities/GDBDebugServer.cpp:832:2: error: incomplete type 'pad_thread' named in nested name specifier
        old_thread::on_stop();
        ^~~~~~~~~~~~
rpcs3/Emu/System.h:197:38: note: forward declaration of 'pad_thread'
        std::function<std::shared_ptr<class pad_thread>()> get_pad_handler;
                                            ^
Utilities/GDBDebugServer.cpp:841:2: error: use of undeclared identifier 'notify'
        notify();
        ^
rpcs3/Emu/System.cpp:1543:30: error: no member named 'on_stop' in 'GDBDebugServer'
        fxm::get<GDBDebugServer>()->on_stop();
        ~~~~~~~~~~~~~~~~~~~~~~~~~~  ^

Approved by:	ports-secteam blanket
2019-05-10 23:59:26 +00:00
Jan Beich
514ac130e0 MFH: r501193
multimedia/x265: backport some SVTHEVC fixes

Approved by:	ports-secteam blanket
2019-05-10 18:57:19 +00:00
Cy Schubert
436530a1a0 MFH: r501100
Prepare for the pending removal of ispec from GENERIC, making sure
that the ipsec kld is loaded.

Suggested by:	gallatin@
Approved by:	portmgr (joneum@)
2019-05-09 14:45:09 +00:00
Jan Beich
65390dc18b MFH: r501081
devel/rust-cbindgen: update to 0.8.6

Changes:	https://github.com/eqrion/cbindgen/compare/v0.8.3...v0.8.6
Approved by:	ports-secteam blanket (required by Firefox 68)
2019-05-09 10:19:52 +00:00
Jan Beich
dc16c15414 MFH: r501064
multimedia/ffmpeg: backport AOM warning fix

[libaom-av1 encoder @ 0x807b0d1c0] Value -1.000000 for parameter 'enable-intrabc' out of range [0 - 1]

Approved by:	ports-secteam blanket
2019-05-09 00:54:18 +00:00
Jan Beich
ddb52b114a MFH: r501061
emulators/citra: update to s20190507

Changes:	2c5816978...46b015bef
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-05-09 00:53:14 +00:00
Jan Beich
433f5c8df7 MFH: r497777 r498215 r498433 r498620 r498778 r498828 r499416 r499701 r500618 r500761 r500838 r500939 r501059
devel/git-cinnabar: update to 0.5.1

Changes:	https://github.com/glandium/git-cinnabar/compare/ddd4e3b...0.5.1
Approved by:	ports-secteam (miwi)
2019-05-09 00:30:04 +00:00
Bernard Spil
9c4eca6a4e MFH: r500269
databases/mariadb55-server: Security update to 5.5.64

Security:	4e1997e8-5de0-11e9-b95c-b499baebfeaf

Approved by:	ports-secteam (joneum)
2019-05-08 20:08:56 +00:00
Bernard Spil
01d3910f06 MFH: r500850
databases/mariadb101-server: Security update to 10.1.39

Security:	4e1997e8-5de0-11e9-b95c-b499baebfeaf

Approved by:	ports-secteam (joneum)
2019-05-08 20:07:07 +00:00
Torsten Zuehlsdorff
ee66f22f5d MFH: r501001
lang/php73: Upgrade from 7.3.4 to 7.3.5

Changelog:

    Core:
        Fixed bug #77903 (ArrayIterator stops iterating after offsetSet call).
    CLI:
        Fixed bug #77794 (Incorrect Date header format in built-in server).
    EXIF:
        Fixed bug #77950 (Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG).
    Interbase:
        Fixed bug #72175 (Impossibility of creating multiple connections to Interbase with php 7.x).
    Intl:
        Fixed bug #77895 (IntlDateFormatter::create fails in strict mode if $locale = null).
    litespeed:
        LiteSpeed SAPI 7.3.1, better process management, new API function litespeed_finish_request().
    LDAP:
        Fixed bug #77869 (Core dump when using server controls) (mcmic)
    Mail:
        Fixed bug #77821 (Potential heap corruption in TSendMail()).
    mbstring:
        Implemented FR #72777 (Implement regex stack limits for mbregex functions).
    MySQLi:
        Fixed bug #77773 (Unbuffered queries leak memory - MySQLi / mysqlnd).
    PCRE:
        Fixed bug #77827 (preg_match does not ignore \r in regex flags).
    PDO:
        Fixed bug #77849 (Disable cloning of PDO handle/connection objects).
    phpdbg:
        Fixed bug #76801 (too many open files).
        Fixed bug #77800 (phpdbg segfaults on listing some conditional breakpoints).
        Fixed bug #77805 (phpdbg build fails when readline is shared).
    Reflection:
        Fixed bug #77772 (ReflectionClass::getMethods(null) doesn't work).
        Fixed bug #77882 (Different behavior: always calls destructor).
    Standard:
        Fixed bug #77793 (Segmentation fault in extract() when overwriting reference with itself).
        Fixed bug #77844 (Crash due to null pointer in parse_ini_string with INI_SCANNER_TYPED).
        Fixed bug #77853 (Inconsistent substr_compare behaviour with empty haystack).

Changelog taken from: https://www.php.net/ChangeLog-7.php#7.3.5

Approved by:	ports-secteam (mivy)
2019-05-08 14:26:11 +00:00
Torsten Zuehlsdorff
6ce0d7887e MFH: r501000
lang/php72: Upgrade from 7.2.17 to 7.2.18

Changelog:

    CLI:
        Fixed bug #77794 (Incorrect Date header format in built-in server).
    EXIF:
        Fixed bug #77950 (Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG).
    Interbase:
        Fixed bug #72175 (Impossibility of creating multiple connections to Interbase with php 7.x).
    Intl:
        Fixed bug #77895 (IntlDateFormatter::create fails in strict mode if $locale = null).
    litespeed:
        LiteSpeed SAPI 7.3.1, better process management, new API function litespeed_finish_request().
    Mail:
        Fixed bug #77821 (Potential heap corruption in TSendMail()).
    PCRE:
        Fixed bug #77827 (preg_match does not ignore \r in regex flags).
    PDO:
        Fixed bug #77849 (Disable cloning of PDO handle/connection objects).
    phpdbg:
        Fixed bug #76801 (too many open files).
        Fixed bug #77800 (phpdbg segfaults on listing some conditional breakpoints).
        Fixed bug #77805 (phpdbg build fails when readline is shared).
    Reflection:
        Fixed bug #77772 (ReflectionClass::getMethods(null) doesn't work).
        Fixed bug #77882 (Different behavior: always calls destructor).
    Standard:
        Fixed bug #77680 (recursive mkdir on ftp stream wrapper is incorrect).
        Fixed bug #77844 (Crash due to null pointer in parse_ini_string with INI_SCANNER_TYPED).
        Fixed bug #77853 (Inconsistent substr_compare behaviour with empty haystack).

Changelog taken from: https://www.php.net/ChangeLog-7.php#7.2.18

Approved by:	ports-secteam (mivy)
2019-05-08 14:24:02 +00:00
Torsten Zuehlsdorff
2b7cfa80d8 MFH: r500999 r501013
lang/php71: Update from 7.1.28 to 7.1.29

Changelog:

    EXIF:
        Fixed bug #77950 (Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG).
    Mail:
        Fixed bug #77821 (Potential heap corruption in TSendMail()).

Changelog taken from: https://www.php.net/ChangeLog-7.php#7.1.29

lang/php71: put mailheader patch back

Reported by:	mat

Approved by:	ports-secteam (mivy)
2019-05-08 14:22:06 +00:00
Tijl Coosemans
106b20608b MFH: r499370
Update to 1.22.5.

Merged to 2019Q2 to fix an issue with Ghostscript 9.27.

PR:		237765
Approved by:	ports-secteam (miwi)
2019-05-08 07:52:04 +00:00