Port changes:
* Updated maintainer's address with his other address (previous address verified)
* pkg-message moved up from files/
* bash completion file renamed
PR: 226586
Submitted by: Alexandre C. Guimarães <lbdm@privacychain.ch> (maintainer)
When feasible do this by adding -D_WANT_SEMUN to CFLAGS or CXXFLAGS.
Where this fails due to ports not honoring C*FLAGS, patch using
__FreeBSD_version to enable the definition.
PR: 224300, 224443 (exp-run)
Approved by: portmgr (antoine)
Exp-run: antoine
Sponsored by: DARPA, AFRL
Differential Revision: https://reviews.freebsd.org/D14137
- Includes DNS rebinding fix
- Fixes OpenSSL 1.1 compat
Note that the previous version was no longer vulnerable as FreeBSD had
patches, but this reports the correct version to trackers as some were
banned.
PR: ports/225917
PR: ports/225915
Requires go version >= 1.9.2
Reliable light client
Reliable fast sync
Custom tracing scripts
Native events using abigen
Breaking changes:
Trie pruning is enabled on all --syncmode variations (including
--syncmode=full). If running an archive node, to retain historic data,
disable pruning with `--gcmode=archive`
PR: 225916
Submitted by: Enrique Fynn (maintainer)
Additional port changes:
* Changed to DISTVERSION
* Updated MAINTAINER
* Added to RUN_DEPENDS
* Moved lines to USExx section
* Added USE_PYTHON=noflavors
* Deleted the patch (not applicable any more)
Testing:
* Ran the app, it seems to work properly.
0.6.3.2 fixes the security vulnerability described here:
https://github.com/Bitmessage/PyBitmessage/releases/tag/v0.6.3
CVE is not available.
Reported by: portscout
Approved by: tcberner (mentor, implicit)
MFH: 2018Q1
Calls into build_benocde that use %zu could crash on 64 bit machines
due to the size change of size_t.
Someone can force READ_ENC_IA to fail allowing an internal_error to
be thrown and bring down the client, throw handshake_error instead.
PR: 224664
Submitted by: Henry David Bartholomew <PopularMoment@protonmail.com>
Approved by: maintainer timeout (pipfstarrd@openmailbox.org, > 2 weeks)
MFH: 2018Q1
Security: e4dd787e-0ea9-11e8-95f2-005056925db4
This is done for
* consistency,
* and to simplify the import of the newer KDE Plasma5 desktop and KDE applications
Bumps the dependencies.
Reviewed by: adridg
Differential Revision: https://reviews.freebsd.org/D12979
This removes build dependency on gcc and runtime dependency on gcc's runtime libraries.
Big thanks to Gleb for working on this.
PR: 225185
Submitted by: Gleb Popov <6yearold@gmail.com>
Exp-run by: antoine
Reviewed by: pgj
Differential Revision: https://reviews.freebsd.org/D12043
casyncconn.cpp:585:62: error: invalid operands to binary expression ('__bind<int &, sockaddr *, unsigned long>' and 'int')
if(bind(sock, (struct sockaddr *)&mAddrIN, sizeof(mAddrIN)) == -1)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ ~~
creguserinfo.cpp:156:32: error: non-constant-expression cannot be narrowed from type 'char' to 'unsigned char' in initializer list [-Wc++11-narrowing]
unsigned char charsalt[2] = {((char*)&str)[0],((char*)&str)[1]};
^~~~~~~~~~~~~~~~
creguserinfo.cpp:156:32: note: insert an explicit cast to silence this issue
unsigned char charsalt[2] = {((char*)&str)[0],((char*)&str)[1]};
^~~~~~~~~~~~~~~~
static_cast<unsigned char>( )
script_api.cpp:221:10: error: cannot initialize return object of type 'char *' with an rvalue of type 'bool'
return false;
^~~~~
script_api.cpp:226:46: error: cannot initialize return object of type 'char *' with an rvalue of type 'bool'
if ((!usr) || (usr && !usr->mxConn)) return false;
^~~~~
Reported by: pkg-fallout (blocks 9 ports)
Approved by: portmgr blanket
PoS cryptocurrency that can execute smart contract as part of an UTXO
Combining a modified Bitcoin Core infrastructure with an intercompatible
version of the Ethereum Virtual Machine (EVM), Qtum merges the
reliability of Bitcoin's unfailing blockchain with the endless
possibilities provided by smart contracts.
https://qtum.org/
This will ensure users who do not read UPDATING are still presented with
the message about how to allow clients to connect to the daemon using
DNS when they upgrade the package.
PR: 225150
Reported by: swills
Security: https://www.vuxml.org/freebsd/3e5b8bd3-0c32-452f-a60e-beab7b762351.html