434 Commits

Author SHA1 Message Date
jeremy
d158fcdb44 Update to Ruby 2.7.4 2021-07-09 17:05:03 +00:00
jeremy
0232a6d1a3 Update to Ruby 3.0.2 2021-07-09 17:04:32 +00:00
rsadowski
41ca901dd9 Add missing applications from MESSAGE in UNMESSAGE
OK jeremy@
2021-05-25 17:36:45 +00:00
sthen
2eeb0edb88 ruby/2.7: Reinstate coroutine/copy/Context.h patch, unbreaking build on
archs which don't use a more specific version of Context.h (alloca.h
dep). ok phessler@ jeremy@
2021-04-09 14:43:07 +00:00
jeremy
7e2b8dcb08 Update to Ruby 2.6.7 2021-04-07 14:58:10 +00:00
jeremy
93ef3081d8 Update to Ruby 2.7.3
Drop a few patches now incorporated upstream.
2021-04-07 14:57:23 +00:00
jeremy
503e8aa88d Update to Ruby 3.0.1 2021-04-07 14:56:12 +00:00
visa
c356496cca Fix lang/ruby/3.0 build on mips64.
* Disable the peephole optimizer on mips64 to avoid occasional crashes.

* Ensure sufficient alignment of builtin bytecode arrays so that
  compiler.c can cast and access the data through struct ibf_header
  without crashing (OpenBSD/mips64 requires strict alignment).

OK jeremy@
2021-03-23 14:58:37 +00:00
jca
a1079c92d0 Unbreak, don't try to use __thread on base-gcc archs
ok jeremy@ (maintainer)
2021-01-03 21:27:12 +00:00
jcs
ed4c6e9925 mention ruby-shims in ruby MESSAGE files as an alternative to adding
symlinks

ok kn
2021-01-03 15:44:41 +00:00
jeremy
139904be2e Add support for ruby30 FLAVOR for building Ruby ports for Ruby 3.0 2020-12-28 16:48:27 +00:00
jeremy
96e847240a Hookup Ruby 3.0 2020-12-28 16:46:04 +00:00
jeremy
96dde96d66 Import Ruby 3.0.0
OK rsadowski
2020-12-28 16:45:27 +00:00
jeremy
bf7b95714d Use a better fix for the copy coroutine fiber implementation
This comes from the Ruby fiber maintainer.  It doesn't require compiling a
couple files without optimization, and it was able to get through a make
test run without crashing on sparc64, which uses the copy coroutine fiber
implementation.

OK kn@
2020-12-08 01:03:31 +00:00
jeremy
583914273f Switch default Ruby version to Ruby 2.7 2020-11-17 03:15:34 +00:00
kn
7c1cbf5f19 Switch github.com/<commit>.diff URLs to .patch in PATCHFILES
The latter includes the original commit message which we then
get to see in "make patch" output.
2020-11-05 20:21:35 +00:00
jeremy
94f9388dab Add distpatch to fix crashes when using fibers on sparc64
Also add local patch to compile a couple of fiber-related
files with -O0, as that is also needed to prevent the crash
on sparc64.

Add a second distpatch to fix a regression in 2.7.2 causing
a crash when calling ffi_closure_free.

OK kn@
2020-10-30 22:07:20 +00:00
jeremy
c1d48166b3 Update to Ruby 2.7.2 2020-10-05 17:13:13 +00:00
jeremy
e613e6846a Send Ruby 2.5 to the attic
OK kn@, jasper@
2020-10-05 16:34:48 +00:00
jeremy
46bf1f83c7 Unhook Ruby 2.5 2020-10-05 16:33:46 +00:00
jeremy
8cecd2fdea Remove ruby25 FLAVOR support from lang/ruby module
OK kn@, jasper@
2020-10-05 16:33:09 +00:00
abieber
936eebd141 Enable TLS 1.3 in ruby 2.7. Patch from tb@, tests from myself.
OK jeremy@
2020-08-18 23:40:13 +00:00
visa
48e85e0a2a Disable the peephole optimizer on mips64 to fix intermittent crashes.
OK jeremy@
2020-07-22 10:22:34 +00:00
jeremy
d690687ffc Update to Ruby 2.7.1 2020-04-03 01:47:41 +00:00
jeremy
d9fd50f09f Update to Ruby 2.6.6 2020-04-03 01:47:05 +00:00
jeremy
3aad3ccaa0 Update to Ruby 2.5.8 2020-04-03 01:45:59 +00:00
naddy
d159f8d1ad Make use of "find -exec {} +" (which is POSIX) and "find -delete"
(which is not) throughout the ports Makefiles.

* Replace find|xargs with find -exec {} +
* Replace -exec {} \; with -exec {} + if applicable.
* Use the -delete operator to remove files and empty directories.
* Combine and tweak some find(1) invocations while here.

ok kn@ rsadowski@ espie@
2020-03-20 16:44:21 +00:00
jeremy
f3bd5c4acc Add support for building ruby ports with ruby27 FLAVOR 2020-01-02 21:21:56 +00:00
jeremy
8482fa05a5 Hookup Ruby 2.7.0 2020-01-02 21:20:48 +00:00
jeremy
a42f110cd1 Import Ruby 2.7.0
OK jca@
2020-01-02 21:19:57 +00:00
jeremy
239f38cbff Use more automated debug package creation 2019-11-19 17:20:12 +00:00
jeremy
555f88c968 Build debug packages for ruby 2019-11-10 13:50:00 +00:00
jeremy
de3ff8b109 Send ruby 2.4 to the Attic 2019-11-05 08:04:49 +00:00
jeremy
8fe525d69c Unhook ruby 2.4 2019-11-05 08:03:30 +00:00
jeremy
7f7e067fc3 Remove support for building ruby ports with ruby24 FLAVOR 2019-11-05 08:03:15 +00:00
jeremy
6d7b2d106b Update to Ruby 2.4.9, fixing the following vulnerabilities:
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
2019-10-03 18:39:57 +00:00
jeremy
98377b0f7d Update to Ruby 2.5.7, fixing the following vulnerabilities:
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
2019-10-03 18:39:26 +00:00
jeremy
f6c2326c22 Update to Ruby 2.6.5, fixing the following vulnerabilities:
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
2019-10-03 18:38:54 +00:00
jeremy
10a6a2a44f Update to Ruby 2.6.4
Drop PATCHFILES as the patch is now included.

Backport use of realpath(3) for File.realpath to allow unveil(2) to work.
2019-08-30 15:58:26 +00:00
jeremy
e1be06f6c9 Update to Ruby 2.5.6
Backport use of realpath(3) for File.realpath to allow unveil(2) to work.
2019-08-30 15:57:24 +00:00
jeremy
3ad28dcb8a Update to Ruby 2.4.7
Backport use of realpath(3) for File.realpath to allow unveil(2) to work.
2019-08-30 15:56:31 +00:00
jeremy
79e271ba08 Update to PERMIT_PACKAGE 2019-07-12 04:13:15 +00:00
sthen
6ff3e55398 bump REVISION in a bunch of ports known or likely to use struct kinfo_proc,
there may be some missing as my unpacked ports source is a little out of date
but this should catch the main things people might run into

the struct was reordered a second time in sysctl.h r1.192 to improve
compatibility but amd64 snapshot packages made it out before that happened
so the bumps are still needed
2019-06-25 20:25:20 +00:00
jeremy
a7ec63804c Fix waking up on received signals
Changes in thread internals between ruby 2.5 and 2.6 resulted in
ruby processes not waking up when receiving some signals.  Fix
this by backporting an upstream patch.  Remove three patches to
the tests that skipped tests. Two of these issues were fixed by
this upstream patch, and the other was fixed by the pthread fifo
fdlock fix.
2019-05-27 21:42:01 +00:00
jeremy
2a9b1c9854 Make ruby 2.6 the default ruby version 2019-04-29 00:35:58 +00:00
jeremy
6bb2a9dd70 Update to ruby 2.6.3 2019-04-26 15:46:28 +00:00
jeremy
f95e2ed20b Update to ruby 2.4.6 2019-04-03 17:25:25 +00:00
jeremy
ea5b1a22a7 Use upstream patch to fix the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
2019-03-15 16:46:41 +00:00
jeremy
147d437975 Update to ruby 2.5.5
Fixes the following vulnerabilities in rubygems:

CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
2019-03-15 16:45:36 +00:00
jeremy
5245052a1f Update to ruby 2.6.2
Fixes the following vulnerabilities in rubygems:

CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
2019-03-15 16:44:49 +00:00