to new (if you see messages with keywords like "Severity: %severity" you
need to do this) - at present there's a built-in converter but this won't
stay around forever.
No need for compression here as it slows down installation quite noticably.
Use simpler pax(1).
find(1) has -delete, so use that over `xargs rm' while here.
OK rsadowski
No need for compression here as it slows down installation quite noticably.
Use simpler pax(1).
SUBST_PROGRAM already ensure BINMODE, so drop the unneeded chmod(1).
OK rsadowski sthen
Even though DEBUG was picked through CFLAGS by the port, do append to
CXXFLAGS and LDFLAGS such that DEBUG ends in CXXFLAGS also iff set.
Simply use the existing LINK.cc instead of rolling our own:
$ make -p | grep ^LINK.cc
LINK.cc = ${CXX} ${CXXFLAGS} ${CPPFLAGS} ${LDFLAGS}
OK stsp
CONFIGURE_STYLE and SEPARATE_BUILD are set to default, so drop them.
Consequently, as there's no configure target, substitute variables in
post-patch not pre-configure.
With SEPARATE_BUILD=no WRKSRC and WRKBUILD are identical, but install built
files still from the latter to be consistent.
Move the hardcoded list of processors into PROCESSORS.
OK stsp
Go 1.11 and earlier allowed code to use cgo mangled names ("_Ctype_"
prefixed), even though they should be using the cgo prefix ("C.").
Go 1.12 enforces use of the cgo prefix, so fix this here.
ok jasper@ sthen@
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
Fixes the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors