Commit graph

7505 commits

Author SHA1 Message Date
obache
7007c4329d let to do "patch" target before "bootstrap" 2014-02-03 07:02:32 +00:00
taca
eab7274cb8 Revert accidently commit files which not yet ready. 2014-02-02 07:48:35 +00:00
taca
70a91cc08a Utilize PKGNAME_REQD to determine required Ruby version.
Address to PR pkg/48509.
2014-02-02 07:46:16 +00:00
rodent
2b629adf41 +py-six; Packaged originally in pkgsrc-wip by:
ahp-nils@users.sourceforge.net
2014-02-02 00:11:51 +00:00
rodent
3cdac2c6a4 Import py27-six-1.5.2 as lang/py-six.
Six is a Python 2 and 3 compatibility library. It provides utility functions
for smoothing over the differences between the Python versions with the goal
of writing Python code that is compatible on both Python versions. See the
documentation for more information on what is provided.

Six supports Python 2.4+.
2014-02-02 00:10:18 +00:00
obache
bb8824708c first command in do-configure is same as default one, so removed it
and let rest parts to be post-configure.
2014-02-01 13:08:57 +00:00
obache
dead6904a9 define and use DISTNAME to match its naming. 2014-02-01 13:06:19 +00:00
schnoebe
595729284c pkg/48500: add a hack on NetBSD/alpha to add the gcc compiler flag
-fno-tree-ter, removing the alignment warnings printed by the
	    NetBSD/alpha kernel when perl was executed.

	    bump PKGREVISION
2014-01-31 17:38:48 +00:00
wiz
91e0ff3d1b Add unittest2. 2014-01-31 11:26:12 +00:00
obache
ecd62f92bc Add dynamic PLIST support with USE_DESTDIR=no, and also simplify for reverse
condition.
inspired by print-PLIST.
2014-01-31 09:04:36 +00:00
obache
e19ac8c8d8 fixes lost of bootstrap binary for vairous platforms with last update. 2014-01-31 04:39:18 +00:00
obache
3c67d26cee works with builtin curses (with NetBSD-6).
Bump PKGREVISION.
2014-01-30 07:57:35 +00:00
wiz
8c8b6f323e Convert to distutils.mk.
Remove PYTHON_VERSIONS_ACCEPTED which is basically just the default.
Bump PKGREVISION.
2014-01-29 07:50:28 +00:00
agc
8e5e82e2ae Add and enable nuitka 2014-01-29 01:17:12 +00:00
agc
ceaeca5973 Initial import of nuitka-0.5.0.1 into the packages collection.
Nuitka is a Python to C++ compiler

	Right now Nuitka is a good replacement for the Python interpreter and
	compiles every construct that CPython 2.6, 2.7, 3.2 and 3.3 offer.  It
	translates the Python into a C++ program that then uses "libpython" to
	execute in the same way as CPython does, in a very compatible way.

	It is somewhat faster than CPython already, but currently it doesn't
	make all the optimizations possible, but a 258% factor on pystone is a
	good start (number is from version 0.3.11).
2014-01-29 01:14:31 +00:00
ryoon
5fccf66f9d Fix PLIST for SunOS. This change should fix SunOS packaging. 2014-01-27 11:04:20 +00:00
ryoon
2a9456fa7d Fix library names under OpenBSD for consistent PLIST 2014-01-26 03:51:12 +00:00
wiz
f8bf97b99e Do not use py-distrbute with Python 3.x, but always use py-setuptools
(as was the default for Python-2.x in this file).

py-distribute is by now obsolete, and py-setuptools the standard way.
2014-01-26 00:41:07 +00:00
wiz
8ade7e8c21 Add missing egg to PLIST. Bump PKGREVISION.
(breakage happened during previous commit, sorry)
2014-01-26 00:30:02 +00:00
ryoon
ff7317ad1c Update to 1.7.51
I cannot find release notes for OpenJDK7, I will quote from Oracle's
JDK 7u51 release notes.

Changelog:
7u51: http://www.oracle.com/technetwork/java/javase/7u51-relnotes-2085002.html
Olson Data 2013h
JDK 7u51 contains Olson time zone data version 2013h.

New Features and Changes
Jarsigner updated to encourage timestamping

Timestamping for a signed jar is now strongly recommended. The Jarsigner tool will print out an informational warning at signing or verifying when timestamp is missing. For more information, see Signing JAR Files.

See 8023338.
Changes to Security Slider:

The following changes to Security Slider were included in this release(7u51):

    Block Self-Signed and Unsigned applets on High Security Setting
    Require Permissions Attribute for High Security Setting
    Warn users of missing Permissions Attributes for Medium Security Setting

For more information, see Java Control Panel documentation.
Prompt users to clear previously remembered decisions:

In JDK 7u51, users are given an option to restore the security prompts, for any prompts that were hidden prior to installing the latest release. For more information, see Install Documentation for Windows.

It is recommended that users restore security prompts after every 30 days to ensure better protection.

Note: This option is offered only during Auto update on Mac OS.
Exception Site List:

The Exception Site List feature allows end users to run Java applets and Java Web Start applications that do not meet the latest security requirements. Rich Internet Applications that are hosted on a site in the exception site list are allowed to run with the applicable security prompts.

For more information, see Exception Site List documentation.
Change in Default Socket Permissions

The default socket permissions assigned to all code including untrusted code have been changed in this release. Previously, all code was able to bind any socket type to any port number greater than or equal to 1024. It is still possible to bind sockets to the ephemeral port range on each system. The exact range of ephemeral ports varies from one operating system to another, but it is typically in the high range (such as from 49152 to 65535). The new restriction is that binding sockets outside of the ephemeral range now requires an explicit permission in the system security policy.

Most applications using client tcp sockets and a security manager will not see any problem, as these typically bind to ephemeral ports anyway. Applications using datagram sockets or server tcp sockets (and a security manager) may encounter security exceptions where none were seen before. If this occurs, users should review whether the port number being requested is expected, and if this is the case, a socket permission grant can be added to the local security policy, to resolve the issue.

See 8011786 (not public).
Change in JAXP Xalan Extension Functions

In JDK 7u51, a change has been made in JAXP Xalan Extension functions to always use the default DOM implementation when Security Manager is present. This change affects the NodeSet created by DOM Document.

Before this change, the DOM implementation is located through the DOM factory lookup process. With this change, when security is enabled, the lookup process is skipped and the default DOM implementation is used.

This change will only affect those applications that use a 3rd party DOM implementation. In general, the NodeSet structure is expected to be compatible with that of the JDK default implementation.
Bug Fixes

This release contains fixes for security vulnerabilities. For more information, see Oracle Java SE Critical Patch Update Advisory.

For a list of bug fixes included in this release, see JDK 7u51 Bug Fixes page.

The following are some of the notable bug fixes in this release:

Area: tools/jar
Synopsis: Clarify jar verifications

The jarsigner tool prints out more messages when there are severe warnings and -strict is on. For details, see the jarsigner tool documentation (Windows)(Solaris/Linux).

See 8024302 (not public).
2014-01-25 13:53:22 +00:00
ryoon
f551befeae Update to 4.6.4
* Add OpenBSD/amd64 5.4 support

Changelog:
* Bugfixes
2014-01-25 13:38:47 +00:00
ryoon
cf6045e0c6 Fix build under SunOS 2014-01-25 12:26:14 +00:00
wiz
5500e288ad Remove support for PYTHON_PATCH_SCRIPTS; use REPLACE_PYTHON. 2014-01-25 10:45:50 +00:00
wiz
100fa79faf Remove PYTHON_VERSIONS_INCLUDE_3X.
Allow python-3.x by default.
2014-01-25 10:31:01 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
ryoon
923314ccf3 Fix OpenBSD 5.3 build and supress warning under OpenBSD 5.4
* OpenBSD has no libdb like NetBSD
2014-01-24 16:37:19 +00:00
obache
45a19863bb Move PY_PEP3147 specific PRINT_PLIST handling from common mk/plist/print-plist.mk
to lang/python/extension.mk, handling reverse way.
2014-01-24 12:42:52 +00:00
wiz
b9d4bf73d5 Fix syntax; fix variable evaluation problem. 2014-01-23 16:18:42 +00:00
wiz
bed47e9617 Remove py-psyco. From the homepage:
12 March 2012

    Psyco is unmaintained and dead. Please look at PyPy for the
    state-of-the-art in JIT compilers for Python.
2014-01-23 15:24:47 +00:00
wiz
904b9a681e Add support for "foo:link" and "foo:build" for link dependencies
and build dependencies.
For link dependencies, the corresponding buildlink3.mk file will be
included (instead of DEPENDS).
For build dependencies, BUILD_DEPENDS is used (instead of DEPENDS).

Add cairo support.
2014-01-23 11:14:15 +00:00
joerg
eb8a9fa899 Force serial GC during build. Fix friend forward with default arguments.
Fix incorrect return value.
2014-01-20 19:25:11 +00:00
joerg
cc3c278511 Sync PLIST with file system content on NetBSD/current. Bump revision. 2014-01-20 19:21:31 +00:00
joerg
c9381bc131 Fix build with TCL 8.6 2014-01-20 19:20:07 +00:00
wiz
b1b011c6cc + ephem 2014-01-20 12:51:29 +00:00
wiz
0cab36e688 Add X. 2014-01-20 12:36:28 +00:00
ryoon
437b8ad5e9 Update to 3.4
* Tested under NetBSD/amd64 6.99.28 and Debian GNU/Linux/amd64 7.3

Changelog:
From: http://llvm.org/svn/llvm-project/llvm/tags/RELEASE_34/final/docs/ReleaseNotes.rst
Non-comprehensive list of changes in this release
=================================================

* This is expected to be the last release of LLVM which compiles using a C++98
  toolchain. We expect to start using some C++11 features in LLVM and other
  sub-projects starting after this release. That said, we are committed to
  supporting a reasonable set of modern C++ toolchains as the host compiler on
  all of the platforms. This will at least include Visual Studio 2012 on
  Windows, and Clang 3.1 or GCC 4.7.x on Mac and Linux. The final set of
  compilers (and the C++11 features they support) is not set in stone, but we
  wanted users of LLVM to have a heads up that the next release will involve
  a substantial change in the host toolchain requirements.

* The regression tests now fail if any command in a pipe fails. To disable it in
  a directory, just add ``config.pipefail = False`` to its ``lit.local.cfg``.
  See :doc:`Lit <CommandGuide/lit>` for the details.

* Support for exception handling has been removed from the old JIT. Use MCJIT
  if you need EH support.

* The R600 backend is not marked experimental anymore and is built by default.

* ``APFloat::isNormal()`` was renamed to ``APFloat::isFiniteNonZero()`` and
  ``APFloat::isIEEENormal()`` was renamed to ``APFloat::isNormal()``. This
  ensures that ``APFloat::isNormal()`` conforms to IEEE-754R-2008.

* The library call simplification pass has been removed.  Its functionality
  has been integrated into the instruction combiner and function attribute
  marking passes.

* Support for building using Visual Studio 2008 has been dropped. Use VS 2010
  or later instead. For more information, see the `Getting Started using Visual
  Studio <GettingStartedVS.html>`_ page.

* The Loop Vectorizer that was previously enabled for ``-O3`` is now enabled
  for ``-Os`` and ``-O2``.

* The new SLP Vectorizer is now enabled by default.

* ``llvm-ar`` now uses the new Object library and produces archives and
  symbol tables in the gnu format.

* FileCheck now allows specifing ``-check-prefix`` multiple times. This
  helps reduce duplicate check lines when using multiple RUN lines.

* The bitcast instruction no longer allows casting between pointers
   with different address spaces. To achieve this, use the new addrspacecast
   instruction.

* Different sized pointers for different address spaces should now
  generally work. This is primarily useful for GPU targets.

* OCaml bindings have been significantly extended to cover almost all of the
  LLVM libraries.

Mips Target
-----------

Support for the MIPS SIMD Architecture (MSA) has been added. MSA is supported
through inline assembly, intrinsics with the prefix '``__builtin_msa``', and
normal code generation.

For more information on MSA (including documentation for the instruction set),
see the `MIPS SIMD page at Imagination Technologies
<http://imgtec.com/mips/mips-simd.asp>`_

PowerPC Target
--------------

Changes in the PowerPC backend include:

* fast-isel support (for faster ``-O0`` code generation)
* many improvements to the builtin assembler
* support for generating unaligned (Altivec) vector loads
* support for generating the fcpsgn instruction
* generate ``frin`` for ``round()`` (not ``nearbyint()`` and ``rint()``, which
  had been done only in fast-math mode)
* improved instruction scheduling for embedded cores (such as the A2)
* improved prologue/epilogue generation (especially in 32-bit mode)
* support for dynamic stack alignment (and dynamic stack allocations with large alignments)
* improved generation of counter-register-based loops
* bug fixes

SPARC Target
------------

The SPARC backend got many improvements, namely

* experimental SPARC V9 backend
* JIT support for SPARC
* fp128 support
* exception handling
* TLS support
* leaf functions optimization
* bug fixes

SystemZ/s390x Backend
---------------------

LLVM and clang can now optimize for zEnterprise z196 and zEnterprise EC12
targets.  In clang these targets are selected using ``-march=z196`` and
``-march=zEC12`` respectively.

From: http://llvm.org/svn/llvm-project/cfe/tags/RELEASE_34/final/docs/ReleaseNotes.rst
What's New in Clang 3.4?
========================

Some of the major new features and improvements to Clang are listed here.
Generic improvements to Clang as a whole or to its underlying infrastructure
are described first, followed by language-specific sections with improvements
to Clang's support for those languages.

Last release which will build as C++98
--------------------------------------

This is expected to be the last release of Clang which compiles using a C++98
toolchain. We expect to start using some C++11 features in Clang starting after
this release. That said, we are committed to supporting a reasonable set of
modern C++ toolchains as the host compiler on all of the platforms. This will
at least include Visual Studio 2012 on Windows, and Clang 3.1 or GCC 4.7.x on
Mac and Linux. The final set of compilers (and the C++11 features they support)
is not set in stone, but we wanted users of Clang to have a heads up that the
next release will involve a substantial change in the host toolchain
requirements.

Note that this change is part of a change for the entire LLVM project, not just
Clang.

Major New Features
------------------

Improvements to Clang's diagnostics
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Clang's diagnostics are constantly being improved to catch more issues, explain
them more clearly, and provide more accurate source information about them. The
improvements since the 3.3 release include:

- -Wheader-guard warns on mismatches between the #ifndef and #define lines
  in a header guard.

  .. code-block:: c

    #ifndef multiple
    #define multi
    #endif

  returns
  `warning: 'multiple' is used as a header guard here, followed by #define of a different macro [-Wheader-guard]`

- -Wlogical-not-parentheses warns when a logical not ('!') only applies to the
  left-hand side of a comparison.  This warning is part of -Wparentheses.

  .. code-block:: c++

    int i1 = 0, i2 = 1;
    bool ret;
    ret = !i1 == i2;

  returns
  `warning: logical not is only applied to the left hand side of this comparison [-Wlogical-not-parentheses]`


- Boolean increment, a deprecated feature, has own warning flag
  -Wdeprecated-increment-bool, and is still part of -Wdeprecated.
- Clang errors on builtin enum increments and decrements.

  .. code-block:: c++

    enum A { A1, A2 };
    void test() {
    	A a;
    	a++;
    }

  returns
  `error: must use 'enum' tag to refer to type 'A'`


- -Wloop-analysis now warns on for-loops which have the same increment or
  decrement in the loop header as the last statement in the loop.

  .. code-block:: c

    void foo(char *a, char *b, unsigned c) {
	  for (unsigned i = 0; i < c; ++i) {
		a[i] = b[i];
		++i;
	  }
    }

  returns
  `warning: variable 'i' is incremented both in the loop header and in the loop body [-Wloop-analysis]`

- -Wuninitialized now performs checking across field initializers to detect
  when one field in used uninitialized in another field initialization.

  .. code-block:: c++

    class A {
      int x;
      int y;
      A() : x(y) {}
    };

  returns
  `warning: field 'y' is uninitialized when used here [-Wuninitialized]`

- Clang can detect initializer list use inside a macro and suggest parentheses
  if possible to fix.
- Many improvements to Clang's typo correction facilities, such as:

  + Adding global namespace qualifiers so that corrections can refer to shadowed
    or otherwise ambiguous or unreachable namespaces.
  + Including accessible class members in the set of typo correction candidates,
    so that corrections requiring a class name in the name specifier are now
    possible.
  + Allowing typo corrections that involve removing a name specifier.
  + In some situations, correcting function names when a function was given the
    wrong number of arguments, including situations where the original function
    name was correct but was shadowed by a lexically closer function with the
    same name yet took a different number of arguments.
  + Offering typo suggestions for 'using' declarations.
  + Providing better diagnostics and fixit suggestions in more situations when
    a '->' was used instead of '.' or vice versa.
  + Providing more relevant suggestions for typos followed by '.' or '='.
  + Various performance improvements when searching for typo correction
    candidates.

- `LeakSanitizer <LeakSanitizer.html>`_ is an experimental memory leak detector
  which can be combined with AddressSanitizer.

New Compiler Flags
------------------

- Clang no longer special cases -O4 to enable lto. Explicitly pass -flto to
  enable it.
- Clang no longer fails on >= -O5. These flags are mapped to -O3 instead.
- Command line "clang -O3 -flto a.c -c" and "clang -emit-llvm a.c -c"
  are no longer equivalent.
- Clang now errors on unknown -m flags (``-munknown-to-clang``),
  unknown -f flags (``-funknown-to-clang``) and unknown
  options (``-what-is-this``).

C Language Changes in Clang
---------------------------

- Added new checked arithmetic builtins for security critical applications.

C++ Language Changes in Clang
-----------------------------

- Fixed an ABI regression, introduced in Clang 3.2, which affected
  member offsets for classes inheriting from certain classes with tail padding.
  See Bug16537.

- Clang 3.4 supports the 2013-08-28 draft of the ISO WG21 SG10 feature test
  macro recommendations. These aim to provide a portable method to determine
  whether a compiler supports a language feature, much like Clang's
  |has_feature macro|_.

.. |has_feature macro| replace:: ``__has_feature`` macro
.. _has_feature macro: LanguageExtensions.html#has-feature-and-has-extension

C++1y Feature Support
^^^^^^^^^^^^^^^^^^^^^

Clang 3.4 supports all the features in the current working draft of the
upcoming C++ standard, provisionally named C++1y. Support for the following
major new features has been added since Clang 3.3:

- Generic lambdas and initialized lambda captures.
- Deduced function return types (``auto f() { return 0; }``).
- Generalized ``constexpr`` support (variable mutation and loops).
- Variable templates and static data member templates.
- Use of ``'`` as a digit separator in numeric literals.
- Support for sized ``::operator delete`` functions.

In addition, ``[[deprecated]]`` is now accepted as a synonym for Clang's
existing ``deprecated`` attribute.

Use ``-std=c++1y`` to enable C++1y mode.

OpenCL C Language Changes in Clang
----------------------------------

- OpenCL C "long" now always has a size of 64 bit, and all OpenCL C
  types are aligned as specified in the OpenCL C standard. Also,
  "char" is now always signed.

Internal API Changes
--------------------

These are major API changes that have happened since the 3.3 release of
Clang. If upgrading an external codebase that uses Clang as a library,
this section should help get you past the largest hurdles of upgrading.

Wide Character Types
^^^^^^^^^^^^^^^^^^^^

The ASTContext class now keeps track of two different types for wide character
types: WCharTy and WideCharTy. WCharTy represents the built-in wchar_t type
available in C++. WideCharTy is the type used for wide character literals; in
C++ it is the same as WCharTy, but in C99, where wchar_t is a typedef, it is an
integer type.

Static Analyzer
---------------

The static analyzer has been greatly improved. This impacts the overall analyzer quality and reduces a number of false positives.
In particular, this release provides enhanced C++ support, reasoning about initializer lists, zeroing constructors, noreturn destructors and modeling of destructor calls on calls to delete.

Clang Format
------------

Clang now includes a new tool ``clang-format`` which can be used to
automatically format C, C++ and Objective-C source code. ``clang-format``
automatically chooses linebreaks and indentation and can be easily integrated
into editors, IDEs and version control systems. It supports several pre-defined
styles as well as precise style control using a multitude of formatting
options. ``clang-format`` itself is just a thin wrapper around a library which
can also be used directly from code refactoring and code translation tools.
More information can be found on `Clang Format's
site <http://clang.llvm.org/docs/ClangFormat.html>`_.
2014-01-19 14:06:41 +00:00
taca
b8cf7faf10 Stop using RUBY_RDOC_VERSION for specifying current ruby-rdoc's version.
It isn't used any other place.
2014-01-19 12:57:42 +00:00
wiz
8756fe5815 Revert unintended commit; pkgsrc not ready yet. 2014-01-18 19:51:28 +00:00
wiz
ff08ab66a9 Support Pmw. 2014-01-18 19:50:27 +00:00
wiz
c9ce474721 Support flup. 2014-01-18 19:05:56 +00:00
wiz
8290172df0 Add jsoblib support (currently unused). 2014-01-18 15:47:24 +00:00
wiz
9b3a044ab6 Add quoting in the hope it fixes NetBSD 5's make(1)'s problems. 2014-01-18 15:13:26 +00:00
ryoon
abb0c51fb1 Fix PR pkg/48530. Fix packaging under NetBSD/i386. 2014-01-18 06:11:37 +00:00
wiz
4c409e7669 Add py-dns/py-dns3 support. 2014-01-17 23:10:05 +00:00
wiz
8098ff9d66 Update to latest version, 0.6.9a from 2007: changes not found.
XXX: let's think about removing this and py-table, shall we?
2014-01-17 22:44:16 +00:00
pho
275e2f126e Fix build on Darwin 9. 2014-01-17 10:03:23 +00:00
wiz
617d02eb1f Add support for python package modules having different pkgsrc packages
depending on python major version.

For now, this supports the dateutil module.
2014-01-16 10:27:36 +00:00
wiz
e0ed2a1727 Switch to gcc48. Bump PKGREVISION. 2014-01-16 09:37:01 +00:00
wiz
63f8dd2e81 Fix incorrect -ldl handling.
From Richard Hansen in PR 48525.

Currently no effective change, so no PKGREVISION bump.
2014-01-15 19:46:12 +00:00
wiz
62425c773d Bump PKGREVISION because gcc48/Makefile says so. 2014-01-14 19:33:10 +00:00