When building without poudriere, it would always pick LuaJIT over Lua if both are installed,
basically ignoring the configuration knob.
- Bump PORTREVISION
PR: 233142 (based on)
Submitted by: Ralf van der Enden <tremere@cainites.net>
MFH: 2018Q4
After a discussion on the mailing list on moving manpages to
${PREFIX}/share/man for consistency with base where it is
installed in usr/share/man, it appeared the same should happen
to GNU info files which were installed under share in base and
not in ports.
Now texinfo is not in base on any of the supported version of FreeBSD
it is possible to proceed to this move and it is easier to do than
the manpage change.
Other benefit than consistency are less patching: all build tools but
cmake are expecting info files to be under share/info and cmake (patched here)
was having an exception for BSD so the patch makes FreeBSD case less
specific for them
Bump revision of all impacted ports
PR: 232907
exp-run by: antoine
Differential Revision: https://reviews.freebsd.org/D17816
Simplify some ports where DragonFlyBSD no longer needs to be special-cased.
Submitted by: rene
Reviewed by: bapt, jbeich
Differential Revision: https://reviews.freebsd.org/D17724
It was never (widely|really) used, and support for it has been dropped
in OpenSSL starting at 1.1, and BIND9 starting at 9.13.
PR: 231980
Reported by: mfechner
* Fix BUG-21: add try/except around conversions from signed python
integers
Port build now uses cython.
Add missing devel/mtbl dependency.
Pet portlint (USES/USE ordering).
Sponsored by: Farsight Security, Inc.
dnsdist-lua.cc:76:10: error: no viable conversion from returned value of type 'boost::logic::tribool' to function return type 'bool'
return g_noLuaSideEffect==true;
^~~~~~~~~~~~~~~~~~~~~~~
PR: 232525
Security: the installed example configuration file shows a way of
disabling WPAD hijacking, but leaves it commented out. Extend pkg-message.
Changelog: <http://thekelleys.org.uk/dnsmasq/CHANGELOG>
Since installing v2.80 isn't a fix against the vulnerability, and fixing
it needs administrator intervention on upgrades, I am not marking this in
vuxml for now, since we'd need to mark v2.80 vulnerable, too.
MFH: 2018Q4
Security: CERT VU#598349
CHANGELOG since test7:
Include in the example config file a formulation which stops DHCP clients
from claiming the DNS name "wpad".
This is a fix for the CERT Vulnerability VU#598349.
Changes since test6, from CHANGELOG:
Change anti cache-snooping behaviour with queries with the
recursion-desired bit unset. Instead to returning SERVFAIL, we
now always forward, and never answer from the cache. This
allows "dig +trace" command to work.
Include in the example config file a formulation which
stops DHCP clients from claiming the DNS name "wpad".
This is a fix for the CERT Vulnerability VU#598349.