Commit Graph

46 Commits

Author SHA1 Message Date
ajacoutot
c4096e6659 Stop using the daemon class in @newuser.
If we need to make an exception we can do it and properly document the
reason but by default we should just use the default login class.
rc.d uses daemon or the login class provided in login.conf.d so this has
no impact there.

discussed with sthen@, tb@ and robert@

praying that my grep/sed skills did not break anything and still
believing in portbump :-)
2022-11-08 11:16:56 +00:00
sthen
bf829e7fe0 update to solr-8.11.2 2022-06-18 15:48:39 +00:00
ajacoutot
63bb5dd789 Drop SOLR_INCLUDE to simplify rc.d script and remove handcrafted rc_start
function.

ok sthen@ (maintainer)
2022-05-21 12:43:13 +00:00
ajacoutot
9e45440fb2 Use the rc_exec function instead of ${rcexec}. 2022-05-21 10:50:49 +00:00
sthen
ee85c0713e add a login.conf.d fragment for solr 2022-05-12 10:31:58 +00:00
sthen
a98e0e6666 remove rcs IDs in ports that I maintain 2022-03-07 21:36:41 +00:00
sthen
f59339bca1 update to solr-8.11.1 2021-12-16 12:40:23 +00:00
sthen
43af7df944 ugh, and another bit 2021-12-15 12:19:32 +00:00
sthen
3353d14aa1 oops, extra bit crept in from a previous attempt at replacing the log4j version 2021-12-15 12:18:23 +00:00
sthen
2725beac05 patch solr to set -Dlog4j2.formatMsgNoLookups=true (log4j vulnerability) 2021-12-15 12:17:11 +00:00
sthen
d879695973 update to solr-8.11.0 2021-11-14 11:19:29 +00:00
sthen
8a66cf9849 update to solr-8.10.1 2021-10-19 07:23:43 +00:00
sthen
84507fa906 update to solr-8.10.0 2021-10-03 19:29:08 +00:00
sthen
577fe1e268 change some hardcoded 'rm *.orig'-like commands to ${PATCHORIG} 2021-08-01 21:06:54 +00:00
sthen
1e9c872d47 update to solr-8.9.0 2021-06-17 07:09:56 +00:00
kurt
f9d899e6a0 Bump revision on all 1.8+ ports since now they will build with jdk
1.8 on aarch64 and their run depends will also change. okay ian@
2021-05-19 01:50:29 +00:00
sthen
a19abe8a0e update solr-8.8.2, fixes a couple of CVEs. ok naddy@ 2021-04-13 20:44:07 +00:00
sthen
c2fd5a2403 update to solr-8.8.1 2021-02-23 14:40:58 +00:00
sthen
3615c55871 update to solr-8.8.0 2021-01-29 14:41:34 +00:00
sthen
43b69366ab update to solr-8.7.0 2020-11-06 14:39:19 +00:00
sthen
0213100e3d update to solr-8.6.3 2020-10-08 14:14:35 +00:00
sthen
1a353cd00f update to solr-8.6.2 2020-09-01 22:05:11 +00:00
sthen
cc0286185c update to solr-8.6.1 2020-08-18 07:28:52 +00:00
sthen
a6d778b7f6 update to solr-8.6.0 2020-07-20 12:30:09 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
8d93a6a2c9 update to solr-8.5.2 2020-06-01 13:44:41 +00:00
sthen
6014d7983f update to solr-8.5.1 2020-04-16 13:20:17 +00:00
sthen
4867a559bd update to solr-8.5.0 2020-03-19 19:19:23 +00:00
sthen
250b9a2e64 update to solr-8.4.1 2020-01-15 16:45:13 +00:00
sthen
b9a3611c2f update to solr-8.4.0 2019-12-30 13:55:48 +00:00
sthen
39a09181d1 update to solr-8.3.1 2019-12-03 14:27:58 +00:00
sthen
153ed2619b update to solr-8.3.0 2019-11-03 19:09:46 +00:00
sthen
f4fd274a89 update to solr-8.2.0 2019-08-01 12:40:52 +00:00
kurt
7705a5ad0b Revision bump all java ports for the jre package removal and java.port.mk
changes.
2019-06-11 00:38:33 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
917d0473b9 update to solr-8.1.1 2019-05-29 21:28:59 +00:00
sthen
60bb36eb70 update to solr-8.1.0 2019-05-15 08:18:34 +00:00
sthen
bcda23c550 update to solr-8.0.0 2019-03-21 13:15:35 +00:00
sthen
eb69ece243 update to solr-7.7.0 2019-02-11 11:31:54 +00:00
sthen
8740369ab4 update to solr-7.6.0 2018-12-30 21:58:00 +00:00
sthen
a6795e69da update to solr-7.5.0, take maintainer 2018-10-04 20:43:02 +00:00
sthen
f5121b352f bump to ensure -current version is > -stable version for future updates
(plist/pkg_add changes mean the -current plist couldn't be copied directly
to -stable)
2018-07-04 19:20:52 +00:00
sthen
848214b9c2 update to solr-7.4.0 2018-06-23 14:55:03 +00:00
sthen
ebb8f3ba27 update to solr-7.3.1, if you aren't restricting to local-only traffic
then you probably want this ..

CVE-2018-8010: XXE vulnerability due to Apache Solr configset upload
2018-05-24 10:24:37 +00:00
sthen
5f0f3115d0 security update to solr-7.3.0
CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter

This vulnerability relates to an XML external entity expansion (XXE) in the
`&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be
used as XXE using file/ftp/http protocols in order to read arbitrary local
files from the Solr server or the internal network. See [1] for more details.

Mitigation:
Users are advised to upgrade to either Solr 6.6.3 or Solr 7.3.0 releases both
of which address the vulnerability. Once upgrade is complete, no other steps
are required. Those releases disable external entities in anonymous XML files
passed through this request parameter.

If users are unable to upgrade to Solr 6.6.3 or Solr 7.3.0 then they are
advised to disable data import handler in their solrconfig.xml file and
restart their Solr instances. Alternatively, if Solr instances are only used
locally without access to public internet, the vulnerability cannot be used
directly, so it may not be required to update, and instead reverse proxies or
Solr client applications should be guarded to not allow end users to inject
`dataConfig` request parameters.
2018-04-10 12:22:39 +00:00
sthen
70fc0e3ef9 import ports/textproc/solr, ok landry@
Solr is a standalone enterprise search server with a REST-like API
supporting JSON, XML, CSV or binary over HTTP for document addition
and searches.
2018-03-06 11:06:21 +00:00