Commit graph

62 commits

Author SHA1 Message Date
nia
3df0f20e22 security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-26 11:16:56 +00:00
nia
fa4b2904a6 security: Remove SHA1 hashes for distfiles 2021-10-07 14:53:40 +00:00
wiz
6eae1297d5 *: recursive bump for perl 5.34 2021-05-24 19:49:01 +00:00
tnn
0486a0e468 openpam/builtin.mk: also set -DNO_STATIC_MODULES in CFLAGS for NetBSD
Not all packages respect CPPFLAGS. This will allow to remove
-DNO_STATIC_MODULES hacks in various places.
2020-10-23 09:16:05 +00:00
wiz
00da7815c0 *: bump PKGREVISION for perl-5.32. 2020-08-31 18:06:29 +00:00
schmonz
e428b0ac72 Strip -lcrypt on macOS, which (at least in recent versions) doesn't have it. 2020-07-15 19:35:04 +00:00
riastradh
f1e9327670 security/openpam: define NO_STATIC_MODULES on NetBSD
This is a hack to work around a mistake in the NetBSD openpam build
which leaked into the public header files.  We will fix this in the
NetBSD build but it's been in the public header files for nearly a
decade now, with each individual pam module sometimes having this
workaround, so let's apply the workaround uniformly for now.

PR security/39313
PR security/55216
2020-04-28 23:01:26 +00:00
tnn
4a49290f3a openpam: needs pkg-config 2020-03-18 12:20:45 +00:00
triaxx
bc20954e21 openpam: fix PR pkg/54907
pkgsrc changes:
---------------
  - Add -lcript to pam_unix.so
  - Bump revision
2020-01-30 11:17:05 +00:00
triaxx
e4a43216e5 security: added py-certbot-dns-digitalocean version 1.0.0 2019-12-30 19:44:33 +00:00
rillig
9fd786bb11 security: align variable assignments
pkglint -Wall -F --only aligned --only indent -r

No manual corrections.
2019-11-04 21:12:51 +00:00
wiz
84e123ddd2 Bump PKGREVISIONs for perl 5.30.0 2019-08-11 13:17:48 +00:00
triaxx
2532a43fae openpam: add example configuration files
sudo compiled with -pam and PREFER_PKGSRC=yes now works out of the box
2018-08-27 08:59:52 +00:00
wiz
93b46879c7 Recursive bump for perl5-5.28.0 2018-08-22 09:43:40 +00:00
wiz
6604375af3 openpam: remove patch that is not in distinfo 2018-05-31 07:29:01 +00:00
triaxx
4431450b02 openpam: update to 20170430
* patch-lib_libpam_openpam__constants.c:
  * comment it (make pkglint happy)
  * fix OPENPAM_MODULES_DIR (avoid openpam loading basesystem modules)
* remove "CONFIGURE_ARGS+=  --without-pam-su" (option not recognized by configure)
* change '_dep_' to 'dep' in builtin.mk (make pkglint happy)
* fix paths in manpages

Changes from upstream:
============================================================================
OpenPAM Resedacea                                               2017-04-30

  - BUGFIX: Reinstore the NULL check in pam_end(3) which was removed in
    OpenPAM Radula, as it breaks common error-handling constructs.

  - BUGFIX: Return PAM_SYMBOL_ERR instead of PAM_SYSTEM_ERR from the
    dispatcher when the required service function could not be found.

  - ENHANCE: Introduce the PAM_BAD_HANDLE error code for when pamh is
    NULL in API functions that have a NULL check.

  - ENHANCE: Introduce the PAM_BAD_ITEM, PAM_BAD_FEATURE and
    PAM_BAD_CONSTANT error codes for situations where we previously
    incorrectly used PAM_SYMBOL_ERR to denote that an invalid constant
    had been passed to an API function.

  - ENHANCE: Improve the RETURN VALUES section in API man pages,
    especially for functions that cannot fail, which were incorrectly
    documented as returning -1 on failure.
 ============================================================================
OpenPAM Radula                                                  2017-02-19

  - BUGFIX: Fix an inverted test which prevented pam_get_authtok(3) and
    pam_get_user(3) from using application-provided custom prompts.

  - BUGFIX: Plug a memory leak in pam_set_item(3).

  - BUGFIX: Plug a potential memory leak in openpam_readlinev(3).

  - BUGFIX: In openpam_readword(3), support line continuations within
    whitespace.

  - ENHANCE: Add a feature flag to control fallback to "other" policy.

  - ENHANCE: Add a pam_return(8) module which returns an arbitrary
    code specified in the module options.

  - ENHANCE: More and better unit tests.
2018-05-15 07:57:32 +00:00
rillig
b381c6e2f3 Sort PLIST files.
Unsorted entries in PLIST files have generated a pkglint warning for at
least 12 years. Somewhat more recently, pkglint has learned to sort
PLIST files automatically. Since pkglint 5.4.23, the sorting is only
done in obvious, simple cases. These have been applied by running:

  pkglint -Cnone,PLIST -Wnone,plist-sort -r -F
2018-01-01 22:29:15 +00:00
rillig
4760eca917 Replaced $(ROUND) with ${CURLY} variable references.
This has been a pkglint warning for several years now, and pkglint can even
fix it automatically. And it did for this commit.

Only in lang/mercury, two passes of autofixing were necessary because there
were nested variables.
2018-01-01 18:16:35 +00:00
wiz
42426a5a45 Follow some redirects. 2017-09-03 08:53:04 +00:00
wiz
73716d23de Bump PKGREVISION for perl-5.24.0 for everything mentioning perl. 2016-07-09 06:38:30 +00:00
tnn
e2177365f6 include <limits.h> for PATH_MAX 2016-03-10 12:57:09 +00:00
agc
5293710fb4 Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:17:40 +00:00
wiz
2e65d464e8 Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
2015-06-12 10:50:58 +00:00
joerg
0ee6f0bc7c Update OpenPAM to Ourouparia including Errata fix. 2015-06-07 22:46:08 +00:00
joerg
b6c7847ef0 Update OpenPAM to openpam-20130907 (Nummularia), including a fix for
CVE-2014-3879:

- Better dynamic loader, supports specifying modules without ".so"
  prefix.
- Improve documentation.
- openpam_subst, openpam_readword and openpam_readlinev helpers
- PAM_HOST item for better password prompts
- user_prompt, authtok_prompt and oldauthtok_prompt module options
- pamtest(1) program for testing policies and modules
2014-06-10 13:17:42 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
obache
4a153fe6a6 Use find-headers instead of find-files to detect builtin header files. 2013-11-23 12:10:13 +00:00
wiz
d2ca14a3f1 Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
asau
1a433eae91 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
wiz
8b5d49eb78 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
spz
ff51a5bbfb added prevention of CVE-2011-4122 taken from NetBSD src 2011-12-13 15:57:08 +00:00
joerg
f0bbd1517d Remove @dirrm entries from PLISTs 2009-06-14 18:13:25 +00:00
joerg
2d1ba244e9 Simply and speed up buildlink3.mk files and processing.
This changes the buildlink3.mk files to use an include guard for the
recursive include. The use of BUILDLINK_DEPTH, BUILDLINK_DEPENDS,
BUILDLINK_PACKAGES and BUILDLINK_ORDER is handled by a single new
variable BUILDLINK_TREE. Each buildlink3.mk file adds a pair of
enter/exit marker, which can be used to reconstruct the tree and
to determine first level includes. Avoiding := for large variables
(BUILDLINK_ORDER) speeds up parse time as += has linear complexity.
The include guard reduces system time by avoiding reading files over and
over again. For complex packages this reduces both %user and %sys time to
half of the former time.
2009-03-20 19:23:50 +00:00
jlam
c788841be5 Add changes from NetBSD src that add casts to fix warnings on platforms
where size_t is unsigned long.
2008-02-18 18:22:18 +00:00
jlam
eb65092610 Update security/openpam to openpam-20071221 (Hydrangea). Changes from
version 20050616 (Figwort) include:

 - ENHANCE: API function arguments are now const where appropriate, to
   match corresponding changes in the Solaris PAM and Linux-PAM APIs.

 - ENHANCE: corrected a number of C namespace violations.

 - ENHANCE: the module cache has been removed, allowing long-lived
   applications to pick up module changes.  This also allows multiple
   threads to use PAM simultaneously (as long as they use separate PAM
   contexts), since the module cache was the only part of OpenPAM that
   was not thread-safe.
2008-02-18 16:48:12 +00:00
obache
f3bc31c6d2 Need to allow leading underscore of OPENPAM_VERSION for old(?) version. 2008-01-29 00:52:58 +00:00
bjs
a7c1b4774c Remove leading underscore from OPENPAM_VERSION for BUILTIN_VERSION.openpam,
as openpam "Hydrangea" now defines OPENPAM_VERSION.  This caused the
version inquiry to fail.
2008-01-28 01:15:26 +00:00
joerg
7ae978be7d Update to OpenPAM Figwort (20050616):
- BUGFIX: Correct several small signedness and initialization bugs
  discovered during review by the NetBSD team.

- BUGFIX: Modify gendoc.pl to sort cross-references in dictionary
  order within each section.

- ENHANCE: if a policy specifies a relative module path,
  prepend the
  module directory so we never call dlopen(3) with a relative
  path.

- ENHANCE: add a pam.conf(5) manual page.
2007-09-06 18:54:44 +00:00
jlam
c16221a4db Change the format of BUILDLINK_ORDER to contain depth information as well,
and add a new helper target and script, "show-buildlink3", that outputs
a listing of the buildlink3.mk files included as well as the depth at
which they are included.

For example, "make show-buildlink3" in fonts/Xft2 displays:

	zlib
	fontconfig
	    iconv
	    zlib
	    freetype2
	    expat
	freetype2
	Xrender
	    renderproto
2006-07-08 23:10:35 +00:00
jlam
9430e49307 Track information in a new variable BUILDLINK_ORDER that informs us
of the order in which buildlink3.mk files are (recursively) included
by a package Makefile.
2006-07-08 22:38:58 +00:00
reed
5abef9be14 Over 1200 files touched but no revisions bumped :)
RECOMMENDED is removed. It becomes ABI_DEPENDS.

BUILDLINK_RECOMMENDED.foo becomes BUILDLINK_ABI_DEPENDS.foo.

BUILDLINK_DEPENDS.foo becomes BUILDLINK_API_DEPENDS.foo.

BUILDLINK_DEPENDS does not change.

IGNORE_RECOMMENDED (which defaulted to "no") becomes USE_ABI_DEPENDS
which defaults to "yes".

Added to obsolete.mk checking for IGNORE_RECOMMENDED.

I did not manually go through and fix any aesthetic tab/spacing issues.

I have tested the above patch on DragonFly building and packaging
subversion and pkglint and their many dependencies.

I have also tested USE_ABI_DEPENDS=no on my NetBSD workstation (where I
have used IGNORE_RECOMMENDED for a long time). I have been an active user
of IGNORE_RECOMMENDED since it was available.

As suggested, I removed the documentation sentences suggesting bumping for
"security" issues.

As discussed on tech-pkg.

I will commit to revbump, pkglint, pkg_install, createbuildlink separately.

Note that if you use wip, it will fail!  I will commit to pkgsrc-wip
later (within day).
2006-04-06 06:21:32 +00:00
jlam
d71a98aa8e Avoid extra stat() calls by not repeatedly checking whether a file
exists on the disk -- we can just check whether a variable defined by
find-files.mk is "__nonexistent__" or not.
2006-03-30 18:06:17 +00:00
joerg
68323ec994 Take maintainership. 2006-03-14 16:23:46 +00:00
jlam
641e118d57 Drop maintainership for packages that I no longer have time to maintain. 2006-03-14 16:00:40 +00:00
jlam
dc9594e09d Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mk
automatically detects whether we want the pkginstall machinery to be
used by the package Makefile.
2005-12-29 06:21:30 +00:00
jlam
2558c0291d Change my MAINTAINER email address to the one I've been using for
pkgsrc work.
2005-12-17 05:20:21 +00:00
rillig
579e977969 Ran "pkglint --autofix", which corrected some of the quoting issues in
CONFIGURE_ARGS.
2005-12-05 23:55:01 +00:00
rillig
b71a1d488b Fixed pkglint warnings. The warnings are mostly quoting issues, for
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some
other changes are outlined in

    http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-12-05 20:49:47 +00:00
rillig
1ef7570dd5 Added RCS Id to line 1. 2005-10-23 20:21:43 +00:00
jlam
dbaf1e860b Fix copy-and-paste error -- in the case where we prefer the pkgsrc
version of the software, USE_BUILTIN.<pkg> should be set to "no", not
to ${IS_BUILTIN.<pkg>}.
2005-06-09 06:07:29 +00:00