413 Commits

Author SHA1 Message Date
abieber
936eebd141 Enable TLS 1.3 in ruby 2.7. Patch from tb@, tests from myself.
OK jeremy@
2020-08-18 23:40:13 +00:00
visa
48e85e0a2a Disable the peephole optimizer on mips64 to fix intermittent crashes.
OK jeremy@
2020-07-22 10:22:34 +00:00
jeremy
d690687ffc Update to Ruby 2.7.1 2020-04-03 01:47:41 +00:00
jeremy
d9fd50f09f Update to Ruby 2.6.6 2020-04-03 01:47:05 +00:00
jeremy
3aad3ccaa0 Update to Ruby 2.5.8 2020-04-03 01:45:59 +00:00
naddy
d159f8d1ad Make use of "find -exec {} +" (which is POSIX) and "find -delete"
(which is not) throughout the ports Makefiles.

* Replace find|xargs with find -exec {} +
* Replace -exec {} \; with -exec {} + if applicable.
* Use the -delete operator to remove files and empty directories.
* Combine and tweak some find(1) invocations while here.

ok kn@ rsadowski@ espie@
2020-03-20 16:44:21 +00:00
jeremy
f3bd5c4acc Add support for building ruby ports with ruby27 FLAVOR 2020-01-02 21:21:56 +00:00
jeremy
8482fa05a5 Hookup Ruby 2.7.0 2020-01-02 21:20:48 +00:00
jeremy
a42f110cd1 Import Ruby 2.7.0
OK jca@
2020-01-02 21:19:57 +00:00
jeremy
239f38cbff Use more automated debug package creation 2019-11-19 17:20:12 +00:00
jeremy
555f88c968 Build debug packages for ruby 2019-11-10 13:50:00 +00:00
jeremy
de3ff8b109 Send ruby 2.4 to the Attic 2019-11-05 08:04:49 +00:00
jeremy
8fe525d69c Unhook ruby 2.4 2019-11-05 08:03:30 +00:00
jeremy
7f7e067fc3 Remove support for building ruby ports with ruby24 FLAVOR 2019-11-05 08:03:15 +00:00
jeremy
6d7b2d106b Update to Ruby 2.4.9, fixing the following vulnerabilities:
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
2019-10-03 18:39:57 +00:00
jeremy
98377b0f7d Update to Ruby 2.5.7, fixing the following vulnerabilities:
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
2019-10-03 18:39:26 +00:00
jeremy
f6c2326c22 Update to Ruby 2.6.5, fixing the following vulnerabilities:
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
2019-10-03 18:38:54 +00:00
jeremy
10a6a2a44f Update to Ruby 2.6.4
Drop PATCHFILES as the patch is now included.

Backport use of realpath(3) for File.realpath to allow unveil(2) to work.
2019-08-30 15:58:26 +00:00
jeremy
e1be06f6c9 Update to Ruby 2.5.6
Backport use of realpath(3) for File.realpath to allow unveil(2) to work.
2019-08-30 15:57:24 +00:00
jeremy
3ad28dcb8a Update to Ruby 2.4.7
Backport use of realpath(3) for File.realpath to allow unveil(2) to work.
2019-08-30 15:56:31 +00:00
jeremy
79e271ba08 Update to PERMIT_PACKAGE 2019-07-12 04:13:15 +00:00
sthen
6ff3e55398 bump REVISION in a bunch of ports known or likely to use struct kinfo_proc,
there may be some missing as my unpacked ports source is a little out of date
but this should catch the main things people might run into

the struct was reordered a second time in sysctl.h r1.192 to improve
compatibility but amd64 snapshot packages made it out before that happened
so the bumps are still needed
2019-06-25 20:25:20 +00:00
jeremy
a7ec63804c Fix waking up on received signals
Changes in thread internals between ruby 2.5 and 2.6 resulted in
ruby processes not waking up when receiving some signals.  Fix
this by backporting an upstream patch.  Remove three patches to
the tests that skipped tests. Two of these issues were fixed by
this upstream patch, and the other was fixed by the pthread fifo
fdlock fix.
2019-05-27 21:42:01 +00:00
jeremy
2a9b1c9854 Make ruby 2.6 the default ruby version 2019-04-29 00:35:58 +00:00
jeremy
6bb2a9dd70 Update to ruby 2.6.3 2019-04-26 15:46:28 +00:00
jeremy
f95e2ed20b Update to ruby 2.4.6 2019-04-03 17:25:25 +00:00
jeremy
ea5b1a22a7 Use upstream patch to fix the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
2019-03-15 16:46:41 +00:00
jeremy
147d437975 Update to ruby 2.5.5
Fixes the following vulnerabilities in rubygems:

CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
2019-03-15 16:45:36 +00:00
jeremy
5245052a1f Update to ruby 2.6.2
Fixes the following vulnerabilities in rubygems:

CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
2019-03-15 16:44:49 +00:00
jeremy
16da32da5f Update to ruby 2.6.1 2019-02-01 16:24:59 +00:00
jeremy
8b866cfc06 Add support for building ruby 2.6 packages for ruby ports using ruby26 FLAVOR
While here, fix MODRUBY_SITEDIR and MODRUBY_LIBREV for the
jruby FLAVOR, even though no ports currently use either.
2019-01-16 17:11:57 +00:00
jeremy
22bd3e0d0a Hookup ruby 2.6.0 2019-01-14 16:18:21 +00:00
jeremy
0d9f363af6 Import ruby 2.6.0
Help and testing from jca@ and George Koehler
OK jca@
2019-01-14 16:13:05 +00:00
jeremy
9cc172603d Bump REVISION after ASN1_dup prototype added back to LibreSSL
Recommended by jca@ and jsing@
2018-11-30 15:19:07 +00:00
naddy
84174f9106 bump for package path change devel/gmp -> devel/gmp,-main 2018-11-02 18:48:39 +00:00
jeremy
f3bf72cdd7 Send ruby 2.3 to the Attic 2018-10-29 14:40:51 +00:00
jeremy
1a276d60ff Unhook ruby 2.3 2018-10-29 14:38:28 +00:00
jeremy
b6999fd84a Switch the default ruby version from ruby 2.4 to ruby 2.5. Remove
support for building with ruby 2.3.
2018-10-26 16:12:24 +00:00
jsing
6ac36c352a Stop pulling in a header (asn1_mac.h) with ancient OpenSSL macro cruft -
pull in asn1.h directly instead.

ok jeremy@ (a long time ago; committing just in time for removal!)
2018-10-24 17:07:31 +00:00
jeremy
30db53a5bb Update to ruby 2.5.3
Fixes CVE-2018-16395 and CVE-2018-16396.

Lots of PLIST changes due to switch from manual PLIST handling to using
make update-plist.
2018-10-22 14:46:53 +00:00
jeremy
49c98a6d14 Update to ruby 2.4.5
Fixes CVE-2018-16395 and CVE-2018-16396.

Lots of PLIST changes due to switch from manual PLIST handling to using
make update-plist.
2018-10-22 14:45:52 +00:00
jeremy
4d9d5324b0 Update to ruby 2.3.8
Fixes CVE-2018-16395 and CVE-2018-16396.

Lots of PLIST changes due to switch from manual PLIST handling to using
make update-plist.
2018-10-22 14:44:57 +00:00
jeremy
ee71667ee4 Remove patches added to work around fifo fdlock bug, tests no longer hang
No bumps as these files are not part of the packages.
2018-07-04 01:38:05 +00:00
jeremy
9c37b1b669 Add OpenBSD comment to rubygems-ext.PLIST
Bump ruby gem ext ports as this changes the package.

Requested by espie@
2018-06-13 22:26:52 +00:00
espie
ad171de161 thinko 2018-05-27 11:37:31 +00:00
espie
9732413348 kill the ^VAR idiom in SUBST_VARS, prefer passing explicit options to
update-plist (this will allow me to remove some crazy duplicate code
in pkg_add and update-plist)
2018-05-27 10:56:33 +00:00
jeremy
f374615e17 Update to the latest versions of ruby: 2.5.1, 2.4.4, and 2.3.7.
This fixes the following CVEs: 2017-17742, 2018-6914, 2018-8777,
2018-8778, 2018-8779, and 2018-8780.

While here, switch HOMEPAGE and MASTER_SITES from http to https,
requested by tj@.
2018-03-31 21:12:45 +00:00
jeremy
7b3eb6690d Restore missing $OpenBSD$ entry in ri_docs PLIST
Pointed out by juanfra@
2018-03-08 15:00:27 +00:00
sthen
23f03b0df4 Better fix. It was actually X509_STORE_get_ex_new_index that we don't
have, but Ruby was guarding this by a single function check for
X509_STORE_set_ex_data. In most cases they are doing nice checks in
extconf.rb for the exact function so convert to doing the same here.
2018-02-23 09:54:25 +00:00
sthen
87b689426d quick fix for X509_STORE_set_ex_data to let this package/run; config checking
sets HAVE_X509_STORE_SET_EX_DATA though we don't actually have it yet, causing
undefined symbol when running ruby as part of "make fake" to generate docs.
2018-02-22 21:35:11 +00:00