Commit graph

63 commits

Author SHA1 Message Date
Jochen Neumeister
d0fb3afd50 databases/mysql57-*: fix build with libressl
Sponsored by:	Netzkommune GmbH
2021-08-10 06:02:31 +02:00
Xin LI
974e13b501 net/openldap24-server: Make SASL permanent for OpenLDAP port.
PR:		ports/257374
Reviewed by:	obrien
Approved by:	portmgr (exp-run by antoine)
Differential Revision: https://reviews.freebsd.org/D31301
2021-08-01 01:32:35 -07:00
Jochen Neumeister
853341f747 databases/mysql57-*: update to 5.7.35
Full Changelog: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-35.html

Sponsored by:	Netzkommune GmbH
2021-07-27 18:20:46 +02:00
Po-Chuan Hsieh
f4acead636
devel/protobuf: Update to 3.17.3
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/protocolbuffers/protobuf/releases
PR:		257026
Exp-run by:	antoine
2021-07-22 02:11:52 +08:00
Dima Panov
ebbb2d5133 databases/mysql57-*: update to 5.7.32 GA release
Release Notes: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-34.html

PR:	255748 (based on)
MFH:	2021Q2
Approved by:	joneum@ (implicit)
2021-05-30 19:39:09 +10:00
Mathieu Arnold
305f148f48
Remove # $FreeBSD$ from Makefiles. 2021-04-06 16:31:07 +02:00
Dima Panov
fa82d30804 databases/mysql56*: update to 5.7.33 release
Disable detect of TLSv1.3 functions - it's broken with LibreSSL

Release Notes:	https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-33.html
Requested by:	joneum
2021-02-03 02:02:58 +00:00
Sunpoet Po-Chuan Hsieh
fef65679d6 Bump PORTREVISION for devel/protobuf shlib change 2021-01-26 14:01:09 +00:00
Jochen Neumeister
3e67f95cb9 databases/mysq57-{client, server}: Update to latest release 5.7.32
Full Changelog: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-32.html

Sponsored by:	Netzkommune GmbH
2020-10-20 08:53:44 +00:00
Sunpoet Po-Chuan Hsieh
b94e8d8c27 Bump PORTREVISION for devel/protobuf shlib change 2020-08-30 20:19:41 +00:00
Jochen Neumeister
d98e6b5c26 databases/mysq57-{client, server}: Update to latest release 5.7.31
Full Changelog: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-31.html

Submitted by:	fluffy
MFH:		2020Q3
Security:	0ed71663-c369-11ea-b53c-d4c9ef517024
Sponsored by:	Netzkommune GmbH
2020-07-13 19:09:05 +00:00
Jochen Neumeister
9f08727261 databases/mysql57-client: fix SIGSEGV due to static OpenSSL linking
As opposed to MySQL 8.0.x branch that switched to dynamic linking for OpenSSL libraries, MySQL 5.7.30 still statically links client applications with OpenSSL.

Meantime, OpenSSL supports dynamic loading of external engines like security/gost-engine. If such engine is configured to load in the openssl.cnf, mysql CLI application crashes at start with SIGSEGV early trying to initialize OpenSSL.

This loads dynamic engine library libgost.so that calls OpenSSL function using second (uninitialized) instance of OpenSSL leading to crash.

The problem is fixed with small backport from MySQL 8.0.x for cmake/ssl.cmake distribution file we already patching anyway.

https://github.com/openssl/openssl/issues/12368

PR:		247803
Reported by:	eugen
Sponsored by:	Netzkommune GmbH
2020-07-09 10:09:40 +00:00
Sunpoet Po-Chuan Hsieh
1c489784e1 Bump PORTREVISION for devel/protobuf shlib change 2020-06-03 18:32:05 +00:00
Jochen Neumeister
83a7644990 In file included from /usr/obj/usr/ports/databases/mysql57-client/work/mysql-5.7.30/vio/viosslfactories.c:29:
/usr/obj/usr/ports/databases/mysql57-client/work/mysql-5.7.30/include/my_openssl.h:55:30: error: use of undeclared identifier 'OPENSSL_INIT_NO_ATEXIT'
  return OPENSSL_init_crypto(OPENSSL_INIT_NO_ATEXIT, NULL);

This fix a problem with libressl

PR:		246070
MFH:		2020Q2
Sponsored by:	Netzkommune GmbH
2020-05-04 09:44:07 +00:00
Jochen Neumeister
10fe9bef59 databases/mysq56-{client, server}: Update to latest release 5.7.30
Bugs Fixed:
- InnoDB: The row_upd_clust_rec_by_insert function, which marks a clustered index record as deleted and inserts an updated version of the record into the clustered index, passed an incorrect n_ext value (the total number of external fields) to lower level functions, causing an assertion failure.
- InnoDB: An operation performed with the innodb_buffer_pool_evict debug variable set to uncompressed caused an assertion failure.
- InnoDB: An add column operation caused an assertion failure. The failure was due to a dangling pointer.
- nnoDB: Updating certain InnoDB system variables that take string values raised invalid read errors during Valgrind testing.
- InnoDB: An insert statement on a table with a spatial index raised a record type mismatch assertion due to a tuple corruption.
- InnoDB: A function that calculates undo log record size could calculate an incorrect length value in the case of a corrupted undo log record, resulting in a malloc failure. Assertion code was added to detect incorrect calculations.
- Replication: While an SQL statement was in the process of being rewritten for the binary log so that sensitive information did not appear in plain text, if a SHOW PROCESSLIST statement was used to inspect the query, the query could become corrupted when it was written to the binary log, causing replication to stop. The process of rewriting the query is now kept private, and the query thread is updated only when rewriting is complete.
- Replication: When a GRANT or REVOKE statement is only partially executed, an incident event is logged in the binary log, which makes the replication slave's applier thread stop so that the slave can be reconciled manually with the master. Previously, if a failed GRANT or REVOKE statement was the first statement executed in the session, no GTID was applied to the incident event (because the cache manager did not yet exist for the session), causing an error on the replication slave. Also, no incident event was logged in the situation where a GRANT statement created a user but then failed because the privileges had been specified incorrectly, again causing an error on the replication slave. Both these issues have now been fixed.
- Replication: When a replication slave has a generated column that the master does not have in that table, with a secondary index on the generated column, the generated expression should be evaluated and the value stored by the storage engine in the secondary index. When row-based binary logging is in use, the replication slave assigns default values to any fields that are not in the master's definition of the table. In the case of a generated column, which does not have a default value, the slave was previously assigning a null or a zero value to the column. This value was then stored by the storage engine in the secondary index, causing both the table and the index to become corrupted. To fix this issue, generated columns in a table on a replication slave are now re-evaluated before the values are sent to the storage engine.
- Replication: In the event of an unplanned disconnection of a replication slave from the master, the reference to the master's dump thread might not be removed from the list of registered slaves, in which case statements that accessed the list of slaves would fail. The issue has now been fixed.
- Replication: With the settings binlog_format=MIXED, tx_isolation=READ-COMMITTED, and binlog_row_image=FULL, an INSERT ... SELECT query involving a transactional storage engine omitted any columns with a null value from the row image written to the binary log. This happened because when processing INSERT ... SELECT statements, the columns were marked for inserts before the binary logging format was selected. The issue has now been fixed.

Full Changelog: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-30.html

MFH:		2020Q2
Security:	21d59ea3-8559-11ea-a5e2-d4c9ef517024 (MySQL - Server)
Security:	622b5c47-855b-11ea-a5e2-d4c9ef517024 (MySQL - Client)
Sponsored by:	Netzkommune GmbH
2020-04-30 08:15:11 +00:00
Sunpoet Po-Chuan Hsieh
11493c54b5 Bump PORTREVISION for devel/protobuf shlib change 2020-01-22 05:53:20 +00:00
Jochen Neumeister
b8dcc4acd1 databases/mysq56-{client, server}: Update to latest release 5.7.29
Bugs Fixed:
- InnoDB: os_file_get_parent_dir warnings were encountered when compiling MySQL with GCC 9.2.0.
- InnoDB: An internal function (btr_push_update_extern_fields()) used to fetch newly added externally stored fields and update them during a pessimistic update or when going back to a previous version of a record was no longer required. Newly added externally stored fields are updated by a different function. Also, the method used to determine the number of externally stored fields was corrected.
- InnoDB: A comparison function found two records to be equal when attempting to merge non-leaf pages of a spatial index. The function was unable to handle this unexpected condition, which resulted in a long semaphore wait and an eventual assertion failure.
- Replication: A memory leak could occur when a failed replication group member tried to rejoin a minority group and was disallowed from doing so.
- Docker packages were missing the LDAP authentication plugins.

More Infos: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-29.html

Approved by:	mmokhi (maintainer, implicit)
MFH:		2020Q1
Security:	a6cf65ad-37d2-11ea-a1c7-b499baebfeaf
Sponsored by:	Netzkommune GmbH
2020-01-16 15:14:58 +00:00
Jochen Neumeister
30dddc8d38 /ram/usr/ports/databases/mysql57-client/work/mysql-5.7.28/vio/viosslfactories.c:505:27: error: use of undeclared identifier 'SSL_OP_NO_TLSv1_3'
| SSL_OP_NO_TLSv1_3

This patch fix this error

PR:		242474
Approved by:	mmokhi (maintainer, implicit)
Sponsored by:	Netzkommune GmbH
2019-12-07 17:55:57 +00:00
Antoine Brodin
492635ae54 Make the build dependency more accurate 2019-09-28 06:45:25 +00:00
Antoine Brodin
a2bae2b2b9 Revert r513041, it breaks the ports
Reported by:	pkg-fallout
Pointy hat:	bapt
2019-09-28 06:08:55 +00:00
Baptiste Daroussin
b1659bc2f5 sasl.h header does not belong at all to openldap package
but to the cyrus-sasl2 package already listed in the dependency in the above line.
Just remove the wrong dependency line
2019-09-27 15:08:46 +00:00
Mathieu Arnold
78d1aff1fc Convert to UCL & cleanup pkg-message (categories d) 2019-08-13 16:01:59 +00:00
Mahdi Mokhtari
4b382c759b databases/mysq56-{client, server}: Update to latest release 5.7.27
This update includes security fixes on issues that are
mentioned on upstream critical patch report.
Further info:
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html#AppendixMSQL

PR:		239271
Submitted by:	Greg Veldman <freebsd@gregv.net>
Reported by:	Markus Kohlmeyer <rootservice@gmail.com>
Sponsored by:	Platform.sh
2019-08-05 23:37:31 +00:00
Sunpoet Po-Chuan Hsieh
4f3e0d828f Bump PORTREVISION for devel/protobuf shlib change 2019-07-31 16:38:52 +00:00
Mahdi Mokhtari
2e596e3fc4 databases/mysql57-{client, server}: Update to latest release 5.7.26
This update includes:
Bugfix:
- InnoDB: Optimized internal temporary tables did not support
    in-place UPDATE operations
- InnoDB: A function called by a CREATE TABLE thread attempted access after free()
- InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES
    was not updated when adding an index
- The authentication_ldap_simple plugin could enforce authentication incorrectly
More info: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-26.html

Security Fix:
CVE-2019-2632, CVE-2019-1559, CVE-2018-3123, and other fixes.
More info: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL

PR:		237399
Reported by:	Brent Busby <brent@jfi.uchicago.edu>
Sponsored by:	The FreeBSD Foundation
2019-04-28 21:34:14 +00:00
Mahdi Mokhtari
27b0903197 databases/mysql57-{client, server}: Update to latest release 5.7.25
This update (released on Jan 21st) includes:
Deprecation:
  -Tools resolveip and resolve_stack_dump utilities are now deprecated.
    (Will be removed on MySQL8.0).
Bugfix:
  -Fix a memory leak caused by a dangling pointer. (Bug #28693568)
  -Fix mishandling of SIGHUP by server could result in a server exit.
    (Bug #27966483, Bug #90742).
  -Correct potential incorrect out-of-memory checks performed by parser.
    (Bug #25633994).

More info from upstream:
  https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-25.html

PR:		234983
Reported by:	 Markus Kohlmeyer < rootservice@gmail.com >
Sponsored by:	The FreeBSD Foundation
2019-01-21 20:40:48 +00:00
Mark Linimon
c3c004771c Fix build on GCC-based architectures by removing default assumption that
FreeBSD == clang.

Approved by:	portmgr (tier-2 blanket)
2019-01-03 15:05:51 +00:00
Mahdi Mokhtari
577a3f0178 databases/mysql57-client: Fix build for i386
Make MySQL build-script assume that FreeBSD's Clang (on i386)
doesn't have "atomic_*" functions builtin implemented.
This is added to cmake/os/FreeBSD.cmake to make the merge for upstream easier.

This fixes the build of mysql57-client on the i386 again.

PR:		229605
Submitted by:	PitDron <pitdron@gmail.com>
Reported by:	gbromov@gmail.com
Sponsored by:	The FreeBSD Foundation
2018-12-26 12:01:58 +00:00
Mahdi Mokhtari
0e518dc7c3 databases/mysql57-client: Fix the build with GCC-based architectures
This patch adds a condition to FreeBSD part of MySQL CMake-scripts
to recognize gcc as well as Clang, while taking care of Unsupported compilers too.

This is an enhancement on the initial patch by Piotr Kubaj <pkubaj@anongoth.pl> that
committed by linimon on r488087.

PR:		234172
Sponsored by:	The FreeBSD Foundation
2018-12-22 17:16:56 +00:00
Mark Linimon
efbcacd6f5 Actually add the fix.
Reported by:	maintainer
2018-12-22 10:24:17 +00:00
Mark Linimon
0b94eb0bba Fix port not compiling on GCC-based architectures, because MySQL believed
only that Clang was used on FreeBSD.

PR:		234172
Submitted by:	Piotr Kubaj
Approved by:	portmgr (tier-2 blanket)
2018-12-22 01:06:06 +00:00
Mahdi Mokhtari
efc9b62813 databases/mysql57-{client, server}: Fix inconsistencies on texinfo and man files
This is port of r485867 from mysql56-{client, server}

Differential Revision:	The FreeBSD Foundation
2018-11-25 16:30:00 +00:00
Mahdi Mokhtari
61e60d6d52 databases/mysql57-{client, server}: Update to 5.7.24
Delete merged-to-upstream FreeBSD patches, edit half-merged ones.

Upstream bugfixes:
    Regression of Bug #27753193 (segfault on ALTER TABLE adding primary key, InnoDB)
    Query interruption during a lock wait caused an error: Bug #28068293
    Raised assertion during an OPTIMIZE TABLE operation for InnoDB: Bug #27753193
More info on update: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-24.html

PR:		232685
Reported by:	Markus Kohlmeyer <rootservice@gmail.com>
Sponsored by:	The FreeBSD Foundation
2018-10-28 22:31:54 +00:00
Mahdi Mokhtari
5220e89ee4 mysql57-{client, server}: Update ports to 5.7.23
This update includes Oracle Critical Patch Advisory published on July 2018
More info:
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixMSQL

PR:		229860
Submitted by:	Dani <i.dani@outlook.com<
Reported by:	Markus Kohlmeyer <rootservice@gmail.com>
Reviewed by:	brnrd , koobs
Sponsored by:	The FreeBSD Foundation
2018-08-10 21:45:08 +00:00
Mahdi Mokhtari
2a7c735229 databases/mysql57-client: Fix build with 10.x default compiler/linker
The upstream seems merged our local-patches but
added a -R flag to its `c++` [actually ld] command.
The -R $DIR is like -rpath on 11.x and CURRENT bases but not on 10.x
We then use -rpath to make sure it works on all supported bases.

Reported by:	John W. O'Brien <john@saltant.com>
Sponsored by:	Netzkommune GmbH
2018-04-22 16:24:08 +00:00
Mahdi Mokhtari
e1538d5247 mysql57-{client, server}: Update port to 5.7.22
This update includes fixes for multiple CVEs including:
    CVE-2018-2755 in replication component, MySQL protocol
    CVE-2018-2805 in GIS extention
    CVE-2018-2782 in InnoDB
    and more info on http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html#AppendixMSQL

PR:		227621
Reported by:	Markus Kohlmeyer <rootservice@gmail.com>
Sponsored by:	Netzkommune GmbH
2018-04-20 10:47:54 +00:00
Mahdi Mokhtari
553f6ced0d databases/mysql56-{client, server}: Update to 5.7.21
This update fixes bugs like CVE-2018-2696, CVE-2018-2562, CVE-2018-2640,
CVE-2018-2668, CVE-2017-3737 (and more) in MySQL protocol by upstream.

Delete local patches (CMake plugin macros) that are merged by upstream.

PR:		225195
Sponsored by:	Netzkommune GmbH
2018-01-17 22:43:46 +00:00
Mahdi Mokhtari
5db7e93eca databases/mysql57-{client, server}: Complete Upgrade of to 5.7.20 (as done by port-secteam in r452458)
Using FreeBSD-ports libcurl and protobuf instead of bundled ones
This upgrade includes:
-Deprecation of these syntax constructs for table and column:
.col_name
.tbl_name
.tbl_name.col_name
-Bugfix of memory-leak in mysqldump

Reviewed by:	mat (mentor)
Approved by:	mat (mentor)
Sponsored by:	Netzkommune GmbH
Differential Revision:	https://reviews.freebsd.org/D12712
2017-10-21 18:12:35 +00:00
Mahdi Mokhtari
85d7d2170a databases/mysql57-{server client}: Fix broken SASL/LDAP integration on newest 5.7.19 upgrade
-Add a SASL/LDAP option for mysql57-client
-Fix plugin.cmake for "FreeBSD != Linux" case

For new plugin, MySQL build assumes everything is MacOS or Windows or Linux.
This breaks upgrades when you have SASL/LDAP client-library installed.
Because it "Decides" that you "Want" SASL/LDAP support and tries to build it.

PR:		220865
Submitted by:	mmokhi
Reported by:	Vladimir Omelchuk <admin@vladiom.com.ua>
Reviewed by:	mat, feld (mentors)
Approved by:	feld (mentor)
MFH:		2017Q3
Differential Revision:	https://reviews.freebsd.org/D11667
2017-07-23 16:45:07 +00:00
Mahdi Mokhtari
b67d2e76a5 databases/mysql57-{client/server}: Update to 5.7.19
ChangeLog for this update: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-19.html

PR:		220849
Reviewed by:	mat (mentor)
Approved by:	mat (mentor)
Sponsored by:	Netzkommune GmbH
Differential Revision:	https://reviews.freebsd.org/D11656
2017-07-19 15:15:42 +00:00
Mark Linimon
74fa808d34 Mark some ports failing on power64. In cases where the error message
was a stub, provide a real one.

While here, pet portlint.

Reported by:	swills
Approved by:	portmgr (tier-2 blanket)
2017-05-20 16:58:10 +00:00
Mahdi Mokhtari
efba8f70aa databases/mysql57-{server client}: Update to latest 5.7.18 release
Fix some no-longer-valid (but needed) patches.

Reviewed by:	feld, mat (mentors)
Approved by:	feld (mentor)
Differential Revision:	https://reviews.freebsd.org/D10392
2017-04-17 14:58:06 +00:00
Jan Beich
a9425224f1 devel/libevent2: drop historical suffix after r362796
PR:		216777
Approved by:	mm (maintainer)
2017-02-20 02:57:04 +00:00
Jan Beich
21a7215c9a devel/libevent2: update to 2.1.8 and cleanup
- DEFAULT_VERSIONS += ssl=openssl-devel is now supported
- devel/py-event and devel/p5-Event-Lib are marked BROKEN

Changes:	https://github.com/libevent/libevent/raw/release-2.1.8-stable/whatsnew-2.1.txt
Changes:	https://github.com/libevent/libevent/raw/release-2.1.8-stable/ChangeLog
PR:		216527
Exp-run by:	antoine
Approved by:	mm (maintainer)
2017-02-04 07:56:59 +00:00
Mark Linimon
aacff1e58c Fix cut-and-paste typo.
Reported by:	maintainer
2016-09-19 10:51:14 +00:00
Mark Linimon
0a8abc1a9e Mark broken on sparc64.
Approved by:	portmgr (tier-2 blanket)
2016-09-18 13:35:42 +00:00
Thomas Zander
b5931dac78 Update to upstream version 5.7.15; fixes zero-day remote vuln CVE-2016-6662
PR:		212690
Submitted by:	mokhi64@gmail.com (maintainer)
MFH:		2016Q3
Security:	CVE 2016-6662
2016-09-16 15:55:15 +00:00
Bernard Spil
b4ada78629 databases/mysql57-server: Fix build with LibreSSL
- Fix building when OPENSSL_VERSION_NUMBER == 2
  - Switch USE_OPENSSL to USES= ssl

PR:		211770
Submitted by:	Markus Kohlmeyer <rootservice@gmail.com>
Reported by:	Markus Kohlmeyer <rootservice@gmail.com>
Approved by:	Mahdi Mokhtari <mokhi64@gmail.com>
MFH:		2016Q3
2016-08-24 18:56:34 +00:00
Thomas Zander
cad0f5776b Make my.cnf path correct according to hier(7), bump PORTREVISION
PR:		209579
Submitted by:	mokhi64@gmail.com
Reviewed by:	rootservice@gmail.com
2016-07-04 14:59:15 +00:00
Kurt Jaeger
e5c8bd2806 databases/mysql57-{server|client}: 5.7.12 -> 5.7.13
Changes:
  http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-13.html

PR:		210042
Approved by:	Mahdi Mokhtari <mokhi64@gmail.com> (maintainer)
2016-06-15 05:40:38 +00:00