Even though DEBUG was picked through CFLAGS by the port, do append to
CXXFLAGS and LDFLAGS such that DEBUG ends in CXXFLAGS also iff set.
Simply use the existing LINK.cc instead of rolling our own:
$ make -p | grep ^LINK.cc
LINK.cc = ${CXX} ${CXXFLAGS} ${CPPFLAGS} ${LDFLAGS}
OK stsp
CONFIGURE_STYLE and SEPARATE_BUILD are set to default, so drop them.
Consequently, as there's no configure target, substitute variables in
post-patch not pre-configure.
With SEPARATE_BUILD=no WRKSRC and WRKBUILD are identical, but install built
files still from the latter to be consistent.
Move the hardcoded list of processors into PROCESSORS.
OK stsp
Go 1.11 and earlier allowed code to use cgo mangled names ("_Ctype_"
prefixed), even though they should be using the cgo prefix ("C.").
Go 1.12 enforces use of the cgo prefix, so fix this here.
ok jasper@ sthen@
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
Fixes the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
Fixes the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
Add a "meta" table that just contains a schema version and a hash.
So that some clients (e.g., portroach) can automatically figure out
whether a rebuild is required.