Commit graph

235720 commits

Author SHA1 Message Date
dholland
1ffcb1b08e Cast argument of sqrt to double to placate Solaris compiler.
Also while here remove one article of pkglint.
2015-06-25 06:22:11 +00:00
dholland
d2e5ecc915 Extend this patch to a second chunk of code with the same logic.
Seen in the Solaris build.
2015-06-25 06:01:01 +00:00
ryoon
b7e3c26936 Updated www/aipo to 8.0.1 2015-06-24 19:57:20 +00:00
ryoon
18804510cd Update to 8.0.1
Changelog:
* Add messaging.
* UI improvements including for Smartphone.
* Many improvements.
2015-06-24 19:56:28 +00:00
joerg
645bd75cb4 Properly install our config.guess, the symlink isn't picked up
otherwise. Fix makefml for Perl 5.22. Drop now redundant patch against
the original config.guess.
2015-06-24 19:49:56 +00:00
khorben
b9497c26bc Update the list of build dependencies for devel/py-protobuf
This should effectively fix building this package.
2015-06-24 18:09:59 +00:00
bouyer
8049183841 Add a missing PERL5_PACKLIST entry, should fix build with new perl 2015-06-24 18:07:45 +00:00
bouyer
0fd96baf2c Also depend on p5-CGI and p5-CGI-Fast. Should fix build with new perl 2015-06-24 18:05:57 +00:00
khorben
3bac42a839 Add devel/py-google-apputils
This is necessary to fix building devel/py-protobuf.
2015-06-24 18:01:27 +00:00
khorben
c5104a2954 Add devel/py-google-apputils 0.4.2
I am doing this in the freeze period because it is a necessary addition to
effectively be able to let devel/py-protobuf build again. My apologies if
this is not good enough a reason.
2015-06-24 17:59:19 +00:00
pettai
ce56745470 NSD 4.1.3
=========

FEATURES:
- nsd-control addzones and delzones read list of zones from stdin.
- hmac sha224, sha384 and sha512 support.
- max-interfaces raised to 32.

BUG FIXES:
- Fix #665: when removing subdomain, nsd does not reparse parent zone.
- Fix task and zonestat files to be stored in a subdirectory in tmp
  to stop privilege elevation.
- Fix crash in zone parser for relative dname after error in origin.
- Fix that formerrors are ratelimited.
2015-06-24 12:18:03 +00:00
he
b146ac941a Remove reference to file no longer part of the perl distribution.
Add a Configure test to verify that including <fenv.h> doesn't produce
a build error, as it will in quite few cases on NetBSD on archs which
are not amd64, i386 or sparc in NetBSD 6.x.  If the test build fails,
pretend we don't have fenv.h.

Validated that the result builds on NetBSD/evbarm 6.0 and NetBSD/i386 6.1.5.

Build fix, so no need to bump PKGREVISION.

OK by wiz@
2015-06-24 11:43:42 +00:00
sevan
99a9a01fc5 Add -lclucene-shared on FreeBSD
Reviewed by wiz@
2015-06-24 10:54:38 +00:00
nros
081f7ed27f Fix linking with pulseaudio.
Bump pkgrevision.
Requested by wiz.
2015-06-24 09:54:10 +00:00
jperkin
36a38ba72d Enable long double math on OS X Mavericks. 2015-06-24 07:17:21 +00:00
bouyer
0e4aaaa9a9 Updated sysutils/xenkernel45 to 4.5.1
Updated sysutils/xentools45 to 4.5.1
2015-06-23 17:47:19 +00:00
bouyer
f724e8d4c5 Upgrade xenkernel45 and xentools45 to 4.5.1.
Note that the  patch for XSA135 for qemu-traditional, which was
no applied  to the 4.5 branch before the release due to an oversight,
is applied here (xentools45/patches/patch-XSA135).

Selected entries from the relase notes:
    a246727: cpupool: fix shutdown with cpupools with different schedulers [Dario Faggioli]
    5b2f480: libelf: fix elf_parse_bsdsyms call [Roger Pau Monné]
    8faef24: VT-d: extend quirks to newer desktop chipsets [Jan Beulich]
    24fcf17: x86/VPMU: add lost Intel processor [Alan Robinson]
    131889c: x86/crash: don't use set_fixmap() in the crash path [Andrew Cooper]
    8791a30: x86/apic: Disable the LAPIC later in smp_send_stop() [Andrew Cooper]
    fbd26f2: x86/pvh: disable posted interrupts [Roger Pau Monné]
    0d8cbca: libxl: In libxl_set_vcpuonline check for maximum number of VCPUs against the cpumap. [Konrad Rzeszutek Wilk]
    bf06e40: libxl: event handling: ao_inprogress does waits while reports outstanding [Ian Jackson]
    97051bd: libxl: event handling: Break out ao_work_outstanding [Ian Jackson]
    0bc9f98: x86/traps: loop in the correct direction in compat_iret() [Andrew Cooper]
    fcfbdb4: gnttab: add missing version check to GNTTABOP_swap_grant_ref handling [Jan Beulich]
    09f76cb: cpupools: avoid crashing if shutting down with free CPUs [Dario Faggioli]
    f237ee4: cpupool: assigning a CPU to a pool can fail [Dario Faggioli]
    b986072: xen: common: Use unbounded array for symbols_offset. [Ian Campbell]
    5eac1be: x86/irq: limit the maximum number of domain PIRQs [Andrew Cooper]
    9c3d34d: x86: don't unconditionally touch the hvm_domain union during domain construction [Andrew Cooper]
    9d5b2b0: tools/xenconsoled: Increase file descriptor limit [Andrew Cooper]
    cfc4c43: ocaml/xenctrl: Fix stub_xc_readconsolering() [Andrew Cooper]
    032673c: ocaml/xenctrl: Make failwith_xc() thread safe [Andrew Cooper]
    c91ed88: ocaml/xenctrl: Check return values from hypercalls [Andrew Cooper]
    fa62913: libxl: Domain destroy: fork [Ian Jackson]
    c9b13f3: libxl: Domain destroy: unlock userdata earlier [Ian Jackson]
    0b19348: libxl: In domain death search, start search at first domid we want [Ian Jackson]
    ddfe333: x86: don't change affinity with interrupt unmasked [Jan Beulich]
    bf30232: x86: don't clear high 32 bits of RAX on sub-word guest I/O port reads [Jan Beulich]
    a824bf9: x86_emulate: fix EFLAGS setting of CMPXCHG emulation [Eugene Korenevsky]
    f653b7f: x86/hvm: implicitly disable an ioreq server when it is destroyed [Paul Durrant]
    8dbdcc3: x86/hvm: actually release ioreq server pages [Paul Durrant]
    56fe488: x86/hvm: fix the unknown nested vmexit reason 80000021 bug [Liang Li]
    4a52101: VT-d: improve fault info logging [Jan Beulich]
    5a7c042: x86/MSI: fix error handling [Jan Beulich]
    51d8325: LZ4 : fix the data abort issue [JeHyeon Yeon]
    0327c93: hvmloader: don't treat ROM BAR like other BARs [Jan Beulich]
    f2e08aa: domctl/sysctl: don't leak hypervisor stack to toolstacks [Andrew Cooper]
    3771b5a: arm64: fix fls() [Jan Beulich]
    9246d2e: domctl: don't allow a toolstack domain to call domain_pause() on itself [Andrew Cooper]
    f5bca81: Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64 GFNs (or less) [Konrad Rzeszutek Wilk]
    7fe1c1b: x86: don't apply reboot quirks if reboot set by user [Ross Lagerwall]
    969df12: Revert "cpupools: update domU's node-affinity on the cpupool_unassign_cpu() path" [Jan Beulich]
    483c6cd: honor MEMF_no_refcount in alloc_heap_pages() [Jan Beulich]
    6616c4d: tools: libxl: Explicitly disable graphics backends on qemu cmdline [Ian Campbell]
    d0b141e: x86/tboot: invalidate FIX_TBOOT_MAP_ADDRESS mapping after use [Jan Beulich]
    902998e: x86emul: fully ignore segment override for register-only operations [Jan Beulich]
    25c6ee8: pre-fill structures for certain HYPERVISOR_xen_version sub-ops [Aaron Adams]
    7ef0364: x86/HVM: return all ones on wrong-sized reads of system device I/O ports [Jan Beulich]
    3665563: tools/libxc: Don't leave scratch_pfn uninitialised if the domain has no memory [Andrew Cooper]
    75ac8cf: x86/nmi: fix shootdown of pcpus running in VMX non-root mode [Andrew Cooper]
    1e44c92: x86/hvm: explicitly mark ioreq server pages dirty [Paul Durrant]
    2bfef90: x86/hvm: wait for at least one ioreq server to be enabled [Paul Durrant]
    d976397: x86/VPMU: disable when NMI watchdog is on [Boris Ostrovsky]
    84f2484: libxc: introduce a per architecture scratch pfn for temporary grant mapping [Julien Grall]
    6302c61: Install libxlutil.h [Jim Fehlig]
    d8e78d6: bunzip2: off by one in get_next_block() [Dan Carpenter]
    8a855b3: docs/commandline: correct information for 'x2apic_phys' parameter [Andrew Cooper]
    3a777be: x86: vcpu_destroy_pagetables() must not return -EINTR [Konrad Rzeszutek Wilk]
    1acb3b6: handle XENMEM_get_vnumainfo in compat_memory_op [Wei Liu]
    4eec09f: x86: correctly check for sub-leaf zero of leaf 7 in pv_cpuid() [Jan Beulich]
    7788cbb: x86: don't expose XSAVES capability to PV guests [Jan Beulich]
    4cfc54b: xsm/evtchn: never pretend to have successfully created a Xen event channel [Andrew Cooper]
    2fdd521: common/memory: fix an XSM error path [Jan Beulich]
    ad83ad9: x86emul: tighten CLFLUSH emulation [Jan Beulich]
    1928318: dt-uart: use ':' as separator between path and options [Ian Campbell]
    9ae1853: libxl: Don't ignore error when we fail to give access to ioport/irq/iomem [Julien Grall]

In addition, this release also contains the following fixes to qemu-traditional:

    afaa35b: ... by default. Add a per-device "permissive" mode similar to pciback's to allow restoring previous behavior (and hence break security again, i.e. should be used only for trusted guests). [Jan Beulich]
    3cff7ad: Since the next patch will turn all not explicitly described fields read-only by default, those fields that have guest writable bits need to be given explicit descriptors. [Jan Beulich]
    ec61b93: The adjustments are solely to make the subsequent patches work right (and hence make the patch set consistent), namely if permissive mode (introduced by the last patch) gets used (as both reserved registers and reserved fields must be similarly protected from guest access in default mode, but the guest should be allowed access to them in permissive mode). [Jan Beulich]
    37c77b8: xen_pt_emu_reg_pcie[]'s PCI_EXP_DEVCAP needs to cover all bits as read- only to avoid unintended write-back (just a precaution, the field ought to be read-only in hardware). [Jan Beulich]
    2dc4059: This is just to avoid having to adjust that calculation later in multiple places. [Jan Beulich]
    29d9566: xen_pt_pmcsr_reg_write() needs an adjustment to deal with the RW1C nature of the not passed through bit 15 (PCI_PM_CTRL_PME_STATUS). [Jan Beulich]
    2e19270: There's no point in xen_pt_pmcsr_reg_{read,write}() each ORing PCI_PM_CTRL_STATE_MASK and PCI_PM_CTRL_NO_SOFT_RESET into a local emu_mask variable - we can have the same effect by setting the field descriptor's emu_mask member suitably right away. Note that xen_pt_pmcsr_reg_write() is being retained in order to allow later patches to be less intrusive. [Jan Beulich]
    751d20d: Without this the actual XSA-131 fix would cause the enable bit to not get set anymore (due to the write back getting suppressed there based on the OR of emu_mask, ro_mask, and res_mask). [Jan Beulich]
    51f3b5b: ... to avoid allowing the guest to cause the control domain's disk to fill. [Jan Beulich]
    7f99bb9: It's being used by the hypervisor. For now simply mimic a device not capable of masking, and fully emulate any accesses a guest may issue nevertheless as simple reads/writes without side effects. [Jan Beulich]
    6fc82bf: The old logic didn't work as intended when an access spanned multiple fields (for example a 32-bit access to the location of the MSI Message Data field with the high 16 bits not being covered by any known field). Remove it and derive which fields not to write to from the accessed fields' emulation masks: When they're all ones, there's no point in doing any host write. [Jan Beulich]
    e42b84c: fdc: force the fifo access to be in bounds of the allocated buffer [Petr Matousek]
    62e4158: xen: limit guest control of PCI command register [Jan Beulich]
    3499745: cirrus: fix an uninitialized variable [Jan Beulich]

This release also contains the security fixes for XSA-117 to XSA-136, with the exception of XSA-124 which documents security risks of non-standard PCI device functionality that cannot be addressed in software. It also includes an update to XSA-98 and XSA-59.
2015-06-23 17:45:33 +00:00
jperkin
53df2e9a2a Updated misc/tmux to 2.0nb1 2015-06-23 15:05:11 +00:00
jperkin
6066116395 Apply build change from MacPorts to fix open(1) behaviour from within a
tmux session on Darwin.  Noticed by Cesar Crusius in joyent/pkgsrc#246.

Bump PKGREVISION.
2015-06-23 15:05:02 +00:00
taca
3904924d8f Note update of misc/rubygems package to 2.4.8. 2015-06-23 14:08:26 +00:00
taca
89cc6cb52e Update rubygems to 2.4.8, including security fix for CVE-2015-3900.
=== 2.4.8 / 2015-06-08

Bug fixes:

* Tightened API endpoint checks for CVE-2015-3900

=== 2.4.7 / 2015-05-14

Bug fixes:

* Backport: Limit API endpoint to original security domain for CVE-2015-3900.
  Fix by claudijd
2015-06-23 14:07:36 +00:00
taca
297e6b6491 Note update of ruby200-base, ruby21-base and ruby22-base. 2015-06-23 14:05:25 +00:00
taca
08cff58043 Add security fix for rubygems, CVE-2015-3900.
Bump PKGREVISION.
2015-06-23 14:03:02 +00:00
ryoon
ff193e1317 Updated databases/mongodb to 3.0.4 2015-06-23 13:31:48 +00:00
ryoon
76f7627381 Update to 3.0.4
Changelog:
MongoDB 3.0.4 is released
June 6, 2015

MongoDB 3.0.4 is out and is ready for production deployment. This release contains only fixes since 3.0.3, and is a recommended upgrade for all 3.0 users.

Fixed in this release:

    SERVER-17923 Creating/dropping multiple background indexes on the same collection can cause fatal error on secondaries
    SERVER-18079 Large performance drop with documents > 16k on Windows
    SERVER-18190 Secondary reads block replication
    SERVER-18213 Lots of WriteConflict during multi-upsert with WiredTiger storage engine
    SERVER-18316 Database with WT engine fails to recover after system crash
    SERVER-18475 authSchemaUpgrade fails when the system.users contains non MONGODB-CR users
    SERVER-18629 WiredTiger journal system syncs wrong directory
    SERVER-18822 Sharded clusters with WiredTiger primaries may lose writes during chunk migration


Announcing MongoDB 3.0 and Bug Hunt Winners
March 3, 2015

Today MongoDB 3.0 is generally available; you can download now.

Our community was critical to ensuring the quality of the release. Thank you to everyone who participated in our 3.0 Bug Hunt. From the submissions, we've selected winners based on the user impact and severity of the bugs found.

First Prize

Mark Callaghan, Member of Technical Staff, Facebook
During the 3.0 release cycle, Mark submitted 10 bug reports and collaborated closely with the MongoDB engineering team to debug the issues he uncovered. As a first place winner, Mark will receive a free pass to MongoDB World in New York City on June 1-2, including a front row seat to the keynote sessions. Mark was also eligible to receive a $1,000 Amazon gift card but opted to donate the award to a charity. We are donating $1,000 to CodeStarters.org in his name.

Honorable Mentions

Nick Judson, Conevity
Nick submitted SERVER-17299, uncovering excessive memory allocation on Windows when using "snappy" compression in WiredTiger.

Koshelyaev Konstantin, RTEC
Koshelyaev submitted SERVER-16664, which uncovered a memory overflow in WiredTiger when using "zlib" compression.

Tim Callaghan, Crunchtime!
In submitting SERVER-16867, Tim found an uncaught WriteConflict exception affecting replicated writes during insert-heavy workloads.

Nathan Arthur, PreEmptive Solutions
Nathan submitted SERVER-16724, which found an issue with how collection metadata is persisted.

Thijs Cadier, AppSignal
Thijs submitted SERVER-16197, which revealed a bug in the build system interaction with the new MongoDB tools.

Nick, Koshelyaev, Tim, Nathan, and Thijs will also receive tickets to MongoDB World in New York City on June 1-2 (with reserved front-row seat for keynote sessions), $250 Amazon Gift Cards, and MongoDB t-shirts.

Congratulations to the winners and thanks to everyone who downloaded, tested and gave feedback on the release candidates.
2015-06-23 13:31:24 +00:00
ryoon
c8f6de416d Updated net/owncloudclient to 1.8.1 2015-06-23 13:29:01 +00:00
ryoon
a915b821d4 Update to 1.8.1
Changelog:
Release 1.8.1 May 7th 2015

    Make "operation canceled" error a soft error
    Do not throw an error for files that are scheduled to be removed, but can not be found on the server. (#2919)
    Windows: Reset QNAM to proper function after hibernation. (#2899, #2895, #2973)
    Fix argument verification of --confdir (#2453)
    Fix a crash when accessing a dangling UploadDevice pointer (#2984)
    Add-folder wizard: Make sure there is a scrollbar if folder names are too long (#2962)
    Add-folder Wizard: Select the newly created folder
    Activity: Correctly restore column sizes (#3005)
    SSL Button: do not crash on empty certificate chain
    SSL Button: Make menu creation lazy (#3007, #2990)
    Lookup system proxy async to avoid hangs (#2993, #2802)
    ShareDialog: Some GUI refinements
    ShareDialog: On creation of a share always retrieve the share. This makes sure that if a default expiration date is set this is reflected in the dialog. (#2889)
    ShareDialog: Only show share dialog if we are connected.
    HttpCreds: Fill pw dialog with previous password. (#2848, #2879)
    HttpCreds: Delete password from old location. (#2186)
    Do not store Session Cookies in the client cookie storage
    CookieJar: Don't accidentally overwrite cookies. (#2808)
    ProtocolWidget: Always add seconds to the DateTime locale. (#2535)
    Updater: Give context as to which app is about to be updated (#3040)
    Windows: Add version information for owncloud.exe. This should help us know what version or build number a crash report was generated with.
    Fix a crash on shutdown in ~SocketApi (#3057)
    SyncEngine: Show more timing measurements (#3064)
    Discovery: Add warning if returned etag is 0
    Fix a crash caused by an invalid DiscoveryDirectoryResult::iterator (#3051)
    Sync: Fix sync of deletions during 503. (#2894)
    Handle redirect of auth request. (#3082)
    Discovery: Fix parsing of broken XML replies, which fixes local file disappearing (#3102)
    Migration: Silently restore files that were deleted locally by bug (#3102)
    Sort folder sizes SelectiveSyncTreeView numerically (#3112)
    Sync: PropagateDownload: Read the mtime from the file system after writing it (#3103)
    Sync: Propagate download: Fix restoring files for which the conflict file exists (#3106)
    Use identical User Agents and version for csync and the Qt parts
    Prevent another crash in ~SocketApi (#3118)
    Windows: Fix rename of finished file (#3073)
    AccountWizard: Fix auth error handling (#3155)
    Documentation fixes
    Infrastructure/build fixes
    Win32/OS X: Apply patch from OpenSSL to handle oudated intermediates gracefully (#3087)
2015-06-23 13:28:35 +00:00
ryoon
3a769e4864 Updated devel/nss to 3.19.2 2015-06-23 13:17:13 +00:00
ryoon
147d8bb3be Update to 3.19.2
* Approved by wiz@.

Changelog:
Network Security Services (NSS) is a patch release for NSS 3.19.

No new functionality is introduced in this release. This release addresses
a backwards compatibility issue with the NSS 3.19.1 release.

Notable Changes:
* In NSS 3.19.1, the minimum key sizes that the freebl cryptographic
implementation (part of the softoken cryptographic module used by default
by NSS) was willing to generate or use was increased - for RSA keys, to
512 bits, and for DH keys, 1023 bits. This was done as part of a security
fix for Bug 1138554 / CVE-2015-4000. Applications that requested or
attempted to use keys smaller then the minimum size would fail. However,
this change in behaviour unintentionally broke existing NSS applications
that need to generate or use such keys, via APIs such as
SECKEY_CreateRSAPrivateKey or SECKEY_CreateDHPrivateKey.

In NSS 3.19.2, this change in freebl behaviour has been reverted. The fix
for Bug 1138554 has been moved to libssl, and will now only affect the
minimum keystrengths used in SSL/TLS.
2015-06-23 13:16:47 +00:00
fhajny
cfcee78428 Updated lang/nodejs to 0.12.5 2015-06-23 09:42:09 +00:00
fhajny
9a5d4ab5f2 Update lang/nodejs to 0.12.5.
2015.06.22, Version 0.12.5 (Stable)
- openssl: upgrade to 1.0.1o (Addressing multiple CVEs)
- npm: upgrade to 2.11.2
- uv: upgrade to 1.6.1
- V8: avoid deadlock when profiling is active (Dmitri Melikyan)
- install: fix source path for openssl headers (Oguz Bastemur)
- install: make sure opensslconf.h is overwritten (Oguz Bastemur)
- timers: fix timeout when added in timer's callback (Julien Gilli)
- windows: broadcast WM_SETTINGCHANGE after install (Mathias Küsel)
2015-06-23 09:41:50 +00:00
jperkin
7f23a5f8c1 Ensure BUILDLINK_API_DEPENDS are only set when not using the builtin
version, otherwise those dependency builtins are not included when
building x11-links.  Fixes missing libxcb links on Linux.
2015-06-22 22:45:06 +00:00
jperkin
ed4fec90dd Pass -DENABLE_LARGEFILE=1 to the build on SunOS, the configure test
only checks for the presence of open64() rather than doing a proper
largefile check.  Fixes 64-bit build.
2015-06-22 22:29:53 +00:00
markd
2ce137a120 Be more forceful in checking for XInput2.1. Fixes build on
NetBSD-6.1.5 with native X.  PR pkg/49986.
2015-06-22 21:28:38 +00:00
jperkin
6dd62e3d57 Substitute hardcoded path to the C++ wrapper, fixing CHECK_WRKREF builds. 2015-06-22 18:51:02 +00:00
jperkin
1163e00bed Substitute hardcoded path to the C++ wrapper. Fixes CHECK_WRKREF builds. 2015-06-22 16:50:38 +00:00
jperkin
71fb39f68f Substitute hardcoded path to the libtool wrapper. Fixes CHECK_WRKREF builds. 2015-06-22 16:22:21 +00:00
jperkin
4fe4cef029 Substitute hardcoded paths to compiler wrapper. Fixes CHECK_WRKREF builds. 2015-06-22 16:16:50 +00:00
ryoon
d156d0929f Ride previous versin bump.
DEPENDS on php-posix and php-curl.
Based on PR pkg/49916 from hauke@.
2015-06-22 16:07:22 +00:00
ryoon
7ed8112062 Updated www/php-owncloud to 8.0.4 2015-06-22 16:03:57 +00:00
ryoon
56eca210c1 Update to 8.0.4
Changelog:
Version 8.0.4 June 9th 2015

    occ can now optionally run the update routines without disabling all third party apps
    Database handling changes which should improve performance on big systems
    better support for very old cURL versions (for QNAP users)
    Extended X-Accel-Redirect functionality in nginx
    Added work-around for file transfers on 32bit systems
    Improved quota calculation
    Many fixes and improvements to sharing
    Several fixes to upgrade process
    Fix deleted folders on client not showing up in trash
    fix inability to delete files when quota is 0
    Change WebDAV error to 500 instead of 403 on denying overwrite of read-only file
    Fixed enforcing expiration date
    Fix to Provisioning API
    Fixing shared document editing by shared LDAP users
    IE 8/9 fixes
    Several smaller fixes
2015-06-22 16:03:20 +00:00
jperkin
c313655adb Disable CHECK_SHLIBS for the GCC library packages. The libraries will
find their parent GCC package libraries first in RPATH at install time
but will correctly resolve to their own copies at runtime thanks to the
additional paths encoded at build time.  Fixes CHECK_WRKREF builds.
2015-06-22 15:38:08 +00:00
jperkin
134b6261dc Substitute hardcoded paths to compiler wrappers. Fixes CHECK_WRKREF builds. 2015-06-22 15:16:24 +00:00
taca
59a6bf4849 Note update of Rack related pacakges:
www/ruby-rack14		1.4.7
	www/ruby-rack15		1.5.5
	www/ruby-rack		1.6.4
2015-06-22 14:00:39 +00:00
taca
9ee0c3f46d Update ruby-rack to 1.6.4, security fixes.
* Fix CVE-2015-3225.
* Only count files (not all form elements) against the Multipart File Limit.
* Work around a Rails incompatibility in our private API
2015-06-22 13:59:29 +00:00
taca
d5757e7596 Update ruby-rack15 to 1.5.5, security fixes.
* Fix CVE-2014-9490.
* Fix CVE-2015-3225.
* Only count files (not all form elements) against the Multipart File Limit.
2015-06-22 13:58:44 +00:00
taca
9d93069941 Update ruby-rack14 to 1.4.7, security fix.
* Fix CVE-2015-3225.
* Only count files (not all form elements) against the Multipart File Limit.
2015-06-22 13:57:59 +00:00
taca
d09cfb1e0c Note update of Ruby on Rails packages to 3.2.22.
devel/ruby-activesupport32
	devel/ruby-activemodel32
	databases/ruby-activerecord32
	www/ruby-activeresource32
	www/ruby-actionpack32
	mail/ruby-actionmailer32
	devel/ruby-railties32
	www/ruby-rails32
2015-06-22 13:56:46 +00:00
taca
da97ae4a5e Update ruby-rails32 to 3.2.22.
No change except version.
2015-06-22 13:55:30 +00:00
taca
c41babbcff Update ruby-railties32to 3.2.22.
## Rails 3.2.22 (Jun 16, 2015) ##

* No changes.
2015-06-22 13:54:57 +00:00