Commit graph

307526 commits

Author SHA1 Message Date
nia
a54a00e2a3 mpv: More evdev mouse button definitions now needed 2019-12-10 10:45:07 +00:00
leot
df3b22227a doc: Updated print/ghostscript-agpl to 9.50 2019-12-10 10:44:20 +00:00
leot
73c6ffc637 ghostscript-agpl: Update to 9.50
Changes:
Version 9.50 (2019-09-30)

Highlights in this release include:

  * The change to version 9.50 (rather than the intended 9.28) follows
    recognition of the extent and importance of the file access control
    redesign/reimplementation outlined below.
  * The file access control capability (enable with -dSAFER) has been
    completely rewritten, with a ground-up rethink of the design. For more
    details, see: SAFER.

    It is important to note that -dSAFER now only enables the file access
    controls, and no longer applies restrictions to standard Postscript
    functionality (specifically, restrictions on setpagedevice. If your
    application relies on these Postscript restrictions, see OLDSAFER, and
    please get in touch, as we do plan to remove those Postscript restrictions
    unless we have reason not to.

    IMPORTANT: File access controls are now enabled by default. In order to run
    Ghostscript without these controls, see NOSAFER

    Important Note for Windows Users: See below under Incompatible Changes
  * IMPORTANT: We are in the process of forking LittleCMS. LCMS2 is not thread
    safe, and cannot be made thread safe without breaking the ABI. Our fork
    will be thread safe, and include performance enhancements (these changes
    have all be been offered and rejected upstream). We will maintain
    compatibility between Ghostscript and LCMS2 for a time, but not in
    perpetuity. Our fork will be available as its own package separately from
    Ghostscript (and MuPDF).
  * The usual round of bug fixes, compatibility changes, and incremental
    improvements.
  * Special thanks to Akira Kakuto, Paul Wessel, William Bader, Nelson H. F.
    Beebe and everyone else who put time and effort into testing this new
    release.

For a list of open issues, or to report problems, please visit
bugs.ghostscript.com.

Incompatible changes

  * There are a couple of subtle incompatibilities between the old and new
    SAFER implementations. Firstly, as mentioned above, SAFER now leaves
    standard Postcript functionality unchanged (except for the file access
    limitations). Secondly, the interaction with save/restore operations,
    see SAFER.

    Important Note for Windows Users:
    The file/path pattern matching is case sensitive, even on Windows. This is
    a change in behaviour compared to the old code which, on Windows, was case
    insensitive. This is in recognition of changes in Windows behaviour, in
    that it now supports (although does not enforce) case sensitivity.
  * The following is not strictly speaking new to 9.50, as not much has changed
    since 9.27 in this area, but for those who don't upgrade with every
    release:

    The process of "tidying" the Postscript name space should have removed only
    non-standard and undocumented operators. Nevertheless, it is possible that
    any integrations or utilities that rely on those non-standard and
    undocumented operators may stop working, or may change behaviour.

    If you encounter such a case, please contact us (either the #ghostscript
    IRC channel, or the gs-devel mailing list would be best), and we'll work
    with you to either find an alternative solution or return the previous
    functionality, if there is genuinely no other option.

    One case we know this has occurred is GSView 5 (and earlier). GSView 5
    support for PDF files relied upon internal use only features which are no
    longer available. GSView 5 will still work as previously for Postscript
    files. For PDF files, users are encouraged to look at MuPDF.
2019-12-10 10:44:09 +00:00
leot
4b290b4f3e doc: Updated graphics/jbig2dec to 0.17 2019-12-10 10:36:11 +00:00
leot
b1758b2024 jbig2dec: Update to 0.17
pkgsrc changes:
 - Update HOMEPAGE

Changes:
Version 0.17 (2019 October 1)
 * Updated documentation with accurate contact information.
 * Moved version number to jbig2.h, and adapted configure
   correspondingly. Added pkg-config file to be installed
   along side library. Added run-time check of version
   number so that the correct header is used with the matching
   binary library.
 * Bug fixes.
2019-12-10 10:35:59 +00:00
leot
a34c25891b jbig2dec: Update LICENSE: it's under AGPLv3, not GPLv3! 2019-12-10 10:31:58 +00:00
gutteridge
547e2ece5d wm/enlightenment: fix PLIST for OSes which build libhack
Build fix for Linux, SunOS, et al.
2019-12-10 02:41:56 +00:00
taca
3cbc7fdb7e www/php-apcu_bc: allow build with php73
Allow build with php73.
2019-12-10 00:11:29 +00:00
rillig
7fca2ecbbd doc: Updated pkgtools/pkglint to 19.3.16 2019-12-09 20:38:25 +00:00
rillig
394bfa01cb pkgtools/pkglint: update to 19.3.16
Changes since 19.3.15:

When a package-settable variable gets a default value using the ?=
operator, pkglint no longer suggests to include bsd.prefs.mk, since that
doesn't make sense. Including bsd.prefs.mk only defines user-settable
and system-provided variables.

User and group names may be a single character only. While not widely
used, it's syntactically valid and there's no reason to prevent this.

In variable assignments, when pkglint removes unnecessary whitespace
between the variable name and the operator, it keeps the indentation of
the variable value the same as before. Previously, the indentation had
been changed, which required another run of pkglint --autofix.

PREFIX can only be used as a replacement for LOCALBASE after the whole
package Makefile has been loaded. This is because PREFIX is defined
very late, by bsd.pkg.mk. Therefore, don't suggest to replace LOCALBASE
with PREFIX in .if conditions.

When pkglint suggests to replace INSTALL_DATA_DIR commands with setting
INSTALLATION_DIRS instead, paths with a trailing slash are correctly
looked up in the PLIST. This suggests to use AUTO_MKDIRS more often.
2019-12-09 20:38:15 +00:00
adam
3e52824897 Updated lang/npm, devel/yarn 2019-12-09 20:15:57 +00:00
adam
4d2a1e38dd yarn: updated to 1.19.2
1.19.2
Folders like .cache won't be pruned from the node_modules after each install.
Correctly installs workspace child dependencies when workspace child not symlinked to root.
Makes running scripts with Plug'n Play possible on node 13.
Change run command to check cwd/node_modules/.bin for commands. Fixes run in workspaces.
2019-12-09 20:15:36 +00:00
adam
412c750fc9 npm: updated to 6.13.2
6.13.2:

BUG FIXES
* fix docs target typo
* fix(packageRelativePath): fix 'where' for file deps
* Revert "windows: Add preliminary WSL support for npm and npx"
* remove unnecessary package.json read when reading shrinkwrap
* fix(fund): open url for string shorthand
* Don't log error message if git tagging is disabled
* Warn the user that it is uninstalling npm-install
2019-12-09 20:10:19 +00:00
adam
35a64ff804 Updated lang/nodejs 2019-12-09 20:08:25 +00:00
adam
ca7e1ae5cf nodejs8: update Makefile after recent changes to nodejs/Makefile.common 2019-12-09 20:06:43 +00:00
adam
48c0cb6a3b nodejs: added version 12.13.1, removed version 6.14.3
Moved nodejs to nodejs10 - version 10.17.0

Version 12.13.1 'Erbium' (LTS):

Notable changes
Experimental support for building Node.js with Python 3 is improved.
ICU time zone data is updated to version 2019c. This fixes the date offset in Brazil.
2019-12-09 20:05:40 +00:00
adam
7a3df3ad92 nodejs: updated to 13.3.0
Version 13.3.0:

Notable Changes
fs:
Reworked experimental recursive rmdir()
The maxBusyTries option is renamed to maxRetries, and its default is set to 0. The emfileWait option has been removed, and EMFILE errors use the same retry logic as other errors. The retryDelay option is now supported. ENFILE errors are now retried.
http:
Make maximum header size configurable per-stream or per-server
http2:
Make maximum tolerated rejected streams configurable
Allow to configure maximum tolerated invalid frames
wasi:
Introduce initial WASI support
2019-12-09 20:03:51 +00:00
nros
f3b87ff387 Fix compilation on platforms that need sys/loadavg.h for loadavg
Make mod_load look for sys/loadavg.h using configure and include it if found.
2019-12-09 19:22:57 +00:00
adam
065f6023b0 Updated security/gnupg2, mail/exim, mail/exim-html 2019-12-09 18:47:29 +00:00
adam
b333d0b822 exim: updated to 4.93
Exim version 4.93
-----------------

JH/01 OpenSSL: With debug enabled output keying information sufficient, server
      side, to decode a TLS 1.3 packet capture.

JH/02 OpenSSL: Suppress the sending of (stateful) TLS1.3 session tickets.
      Previously the default library behaviour applied, sending two, each in
      its own TCP segment.

JH/03 Debug output for ACL now gives the config file name and line number for
      each verb.

JH/04 The default received_header_text now uses the RFC 8314 tls cipher clause.

JH/05 DKIM: ensure that dkim_domain elements are lowercased before use.

JH/06 Fix buggy handling of autoreply bounce_return_size_limit, and a possible
      buffer overrun for (non-chunking) other transports.

JH/07 GnuTLS: Our use of late (post-handshake) certificate verification, under
      TLS1.3, means that a server rejecting a client certificate is not visible
      to the client until the first read of encrypted data (typically the
      response to EHLO).  Add detection for that case and treat it as a failed
      TLS connection attempt, so that the normal retry-in-clear can work (if
      suitably configured).

JB/01 Bug 2375: fix expansions of 822 addresses having comments in local-part
      and/or domain.  Found and fixed by Jason Betts.

JH/08 Add hardening against SRV & TLSA lookups the hit CNAMEs (a nonvalid
      configuration).  If a CNAME target was not a wellformed name pattern, a
      crash could result.

JH/09 Logging: Fix initial listening-on line for multiple ports for an IP when
      the OS reports them interleaved with other addresses.

JH/10 OpenSSL: Fix aggregation of messages.  Previously, when PIPELINING was
      used both for input and for a verify callout, both encrypted, SMTP
      responses being sent by the server could be lost.  This resulted in
      dropped connections and sometimes bounces generated by a peer sending
      to this system.

JH/11 Harden plaintext authenticator against a badly misconfigured client-send
      string.  Previously it was possible to cause undefined behaviour in a
      library routine (usually a crash).  Found by "zerons".

JH/12 Bug 2384: fix "-bP smtp_receive_timeout".  Previously it returned no
      output.

JH/13 Bug 2386: Fix builds with Dane under LibreSSL 2.9.0 onward.  Some old
      API was removed, so update to use the newer ones.

JH/14 Bug 1891: Close the log file if receiving a non-smtp message, without
      any timeout set, is taking a long time.  Previously we would hang on to a
      rotated logfile "forever" if the input was arriving with long gaps
      (a previous attempt to fix addressed lack, for a long time, of initial
      input).

HS/01 Bug 2390: Use message_id for tempfile creation to avoid races in a
      shared (NFS) environment. The length of the tempfile name is now
      4 + 16 ("hdr.$message_exim_id") which might break on file
      systems which restrict the file name length to lower values.
      (It was "hdr.$pid".)

HS/02 Bug 2390: Use message_id for tempfile creation to avoid races in a
      shared (NFS) environment.

HS/03 Bug 2392: exigrep does case sensitive *option* processing (as it
      did for all versions <4.90). Notably -M, -m, --invert, -I may be
      affected.

JH/15 Use unsigned when creating bitmasks in macros, to avoid build errors
      on some platforms for bit 31.

JH/16 GnuTLS: rework ciphersuite strings under recent library versions.  Thanks
      to changes apparently associated with TLS1.3 handling some of the APIs
      previously used were either nonfunctional or inappropriate.  Strings
      like TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM__AEAD:256
      and TLS1.2:ECDHE_SECP256R1__RSA_SHA256__AES_128_CBC__SHA256:128 replace
      the previous TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256 .
      This affects log line X= elements, the $tls_{in,out}_cipher variables,
      and the use of specific cipher names in the encrypted= ACL condition.

JH/17 OpenSSL: the default openssl_options now disables ssl_v3.

JH/18 GnuTLS: fix $tls_out_ocsp under hosts_request_ocsp. Previously the
      verification result was not updated unless hosts_require_ocsp applied.

JH/19 Bug 2398: fix listing of a named-queue.  Previously, even with the option
      queue_list_requires_admin set to false, non-admin users were denied the
      facility.

JH/20 Bug 2389: fix server advertising of usable certificates, under GnuTLS in
      directory-of-certs mode.  Previously they were advertised despite the
      documentation.

JH/21 The smtp transport option "hosts_noproxy_tls" is now unset by default.
      A single TCP connection by a client will now hold a TLS connection open
      for multiple message deliveries, by default.  Previoud the default was to
      not do so.

JH/22 The smtp transport option "hosts_try_dane" now enables all hosts by
      default.  If built with the facility, DANE will be used.  The facility
      SUPPORT_DANE is now enabled in the prototype build Makefile "EDITME".

JH/23 The build default is now for TLS to be included; the SUPPORT_TLS define
      is replaced with DISABLE_TLS.  Either USE_GNUTLS or (the new) USE_OPENSSL
      must be defined and you must still, unless you define DISABLE_TLS, manage
      the the include-dir and library-file requirements that go with that
      choice.  Non-TLS builds are still supported.

JH/24 Fix duplicated logging of peer name/address, on a transport connection-
      reject under TFO.

JH/25 The smtp transport option "hosts_try_fastopen" now enables all hosts by
      default.  If the platform supports and has the facility enabled, it will
      be requested on all coneections.

JH/26 The PIPE_CONNECT facility is promoted from experimental status and is now
      controlled by the build-time option SUPPORT_PIPE_CONNECT.

PP/01 Unbreak heimdal_gssapi, broken in 4.92.

JH/27 Bug 2404: Use the main-section configuration option "dsn_from" for
      success-DSN messages.  Previously the From: header was always the default
      one for these; the option was ignored.

JH/28 Fix the timeout on smtp response to apply to the whole response.
      Previously it was reset for every read, so a teergrubing peer sending
      single bytes within the time limit could extend the connection for a
      long time.  Credit to Qualsys Security Advisory Team for the discovery.

JH/29 Fix DSN Final-Recipient: field.  Previously it was the post-routing
      delivery address, which leaked information of the results of local
      forwarding.  Change to the original envelope recipient address, per
      standards.

JH/30 Bug 2411: Fix DSN generation when RFC 3461 failure notification is
      requested.  Previously not bounce was generated and a log entry of
      error ignored was made.

JH/31 Avoid re-expansion in ${sort } expansion. (CVE-2019-13917)

JH/32 Introduce a general tainting mechanism for values read from the input
      channel, and values derived from them.  Refuse to expand any tainted
      values, to catch one form of exploit.

JH/33 Bug 2413: Fix dkim_strict option.  Previously the expansion result
      was unused and the unexpanded text used for the test.  Found and
      fixed by Ruben Jenster.

JH/34 Fix crash after TLS shutdown.  When the TCP/SMTP channel was left open,
      an attempt to use a TLS library read routine dereffed a nul pointer,
      causing a segfault.

JH/35 Bug 2409: filter out-of-spec chars from callout response before using
      them in our smtp response.

JH/36 Have the general router option retry_use_local_part default to true when
      any of the restrictive preconditions are set (to anything).  Previously it
      was only for check_local user.  The change removes one item of manual
      configuration which is required for proper retries when a remote router
      handles a subset of addresses for a domain.

JH/37 Appendfile: when evaluating quota use (non-quota_size_regex) take the file
      link count into consideration.

HS/04 Fix handling of very log lines in -H files. If a -<key> <value> line
      caused the extension of big_buffer, the following lines were ignored.

JH/38 Bug 1395: Teach the DNS negative-cache about TTL value from the SOA in
      accordance with RFC 2308.  Previously there was no expiry, so a longlived
      receive process (eg. due to ACL delays) versus a short SOA value could
      surprise.

HS/05 Handle trailing backslash gracefully. (CVE-2019-15846)

JH/39 Promote DMARC support to mainline.

JH/40 Bug 2452: Add a References: header to DSNs.

JH/41 With GnuTLS 3.6.0 (and later) do not attempt to manage Diffie-Hellman
      parameters.  The relevant library call is documented as "Deprecated: This
      function is unnecessary and discouraged on GnuTLS 3.6.0 or later. Since
      3.6.0, DH parameters are negotiated following RFC7919."

HS/06 Change the default of dnssec_request_domains to "*"

JH/42 Bug 2545: Fix CHUNKING for all RCPT commands rejected.  Previously we
      carried on and emitted a BDAT command, even when PIPELINING was not
      active.

JH/43 Bug 2465: Fix taint-handling in dsearch lookup.  Previously a nontainted
      buffer was used for the filename, resulting in a trap when tainted
      arguments (eg. $domain) were used.

JH/44 With OpenSSL 1.1.1 (onwards) disable renegotiation for TLS1.2 and below;
      recommended to avoid a possible server-load attack.  The feature can be
      re-enabled via the openssl_options main cofiguration option.

JH/45 local_scan API: documented the current smtp_printf() call. This changed
      for version 4.90 - adding a "more data" boolean to the arguments.
      Bumped the ABI version number also, this having been missed previously;
      release versions 4.90 to 4.92.3 inclusive were effectively broken in
      respect of usage of smtp_printf() by either local_scan code or libraries
      accessed via the ${dlfunc } expansion item.  Both will need coding
      adjustment for any calls to smtp_printf() to match the new function
      signature; a FALSE value for the new argument is always safe.

JH/46 FreeBSD: fix use of the sendfile() syscall.  The shim was not updating
      the file-offset (which the Linux syscall does, and exim expects); this
      resulted in an indefinite loop.

JH/47 ARC: fix crash in signing, triggered when a configuration error failed
      to do ARC verification.  The Authentication-Results: header line added
      by the configuration then had no ARC item.
2019-12-09 18:46:00 +00:00
adam
cd291e58da gnupg2: updated to 2.2.19
Noteworthy changes in version 2.2.19:

* gpg: Fix double free when decrypting for hidden recipients.
  Regression in 2.2.18.

* gpg: Use auto-key-locate for encryption even for mail addressed
  given with angle brackets.

* gpgsm: Add special case for certain expired intermediate
  certificates.
2019-12-09 18:44:52 +00:00
jperkin
b4a0ad227e salt-docs: Skip legitimate hardcoded paths. 2019-12-09 16:52:51 +00:00
taca
3a1100de71 lang/php: update examples to php73 in comment
Update examples to php73 in comment.
2019-12-09 14:23:45 +00:00
taca
6d679e8fbd Bump PKGREVISION by changing of default PHP version. 2019-12-09 14:20:54 +00:00
taca
3f32114284 lang/php: change default version of php to 7.3.x
Change default version of php from 7.1.x to 7.3.x.

* PHP 7.1.x is now EOL after 1st Dec 2019.
* PHP 7.3.x is actively maintained release.
2019-12-09 14:19:44 +00:00
rin
aff4b7b83f doc: Updated graphics/gnuplot to 5.2.8nb1 2019-12-09 12:59:50 +00:00
rin
556b4fddc8 PR pkg/54623 (Joern Clausen)
Disable gnuplot-pdf-doc by default. This option requires TeX packages,
that are too much for users who merely wants to plot graphs.

Bump revision.
2019-12-09 12:57:22 +00:00
leot
c7cd278fdd doc: Updated net/gallery-dl to 1.12.0 2019-12-09 11:56:30 +00:00
leot
17c392d45f gallery-dl: Update to 1.12.0
Changes:
1.12.0
------
### Additions
 - [flickr] support 3k, 4k, 5k, and 6k photo sizes (#472)
 - [imgur] add extractor for subreddit links (#500)
 - [newgrounds] add extractors for `audio` listings and general `media`
   files (#394)
 - [newgrounds] implement login support (#394)
 - [postprocessor:metadata] implement a `extension-format` option (#477)
 - `--exec-after`

### Changes
 - [deviantart] ensure consistent username capitalization (#455)
 - [directlink] split `{path}` into `{path}/{filename}.{extension}`
 - [twitter] update metadata fields with user/author information
 - [postprocessor:metadata] filter private entries & rename `format` to
   `content-format`
 - Enable `cookies-update` by default

### Fixes
 - [2chan] fix metadata extraction
 - [behance] get images from 'media_collection' modules
 - [bobx] fix image downloads by randomly generating session cookies (#482)
 - [deviantart] revert to getting download URLs from OAuth API calls (#488)
 - [deviantart] fix URL generation from '/extended_fetch' results (#505)
 - [flickr] adjust OAuth redirect URI (#503)
 - [hentaifox] fix extraction
 - [imagefap] adapt to new image URL format
 - [imgbb] fix error in galleries without user info (#471)
 - [instagram] prevent errors with missing 'video_url' fields (#479)
 - [nijie] fix `date` parsing
 - [pixiv] match new search URLs (#507)
 - [plurk] fix comment pagination
 - [sexcom] send specific Referer headers when downloading videos
 - [twitter] fix infinite loops (#499)
 - [vsco] fix user profile and collection extraction (#480)
 - Fix Cloudflare DDoS protection bypass

### Removals
 - `--abort-on-skip`
2019-12-09 11:56:17 +00:00
leot
af8fb95194 doc: Updated net/youtube-dl to 20191128nb1 2019-12-09 11:46:12 +00:00
leot
a36f6a72a4 youtube-dl: Apply a patch to fix rai extractor
Shared upstream via:

 <https://github.com/ytdl-org/youtube-dl/pull/23040/>
2019-12-09 11:45:59 +00:00
jperkin
40abe01800 go113: Update SunOS PLIST for new layout. 2019-12-09 10:13:38 +00:00
jperkin
29b6a22896 *: Include go-vars.mk where appropriate. 2019-12-09 10:11:35 +00:00
jperkin
bef8286b1f go: Split *_SUPPORTED variables out into new go-vars.mk.
It's not always possible to include go-package.mk earlier than bsd.prefs.mk
in a package, for example if the package defines its own do-install target,
so move out the *_SUPPORTED variables that need to be included first.
2019-12-09 09:59:31 +00:00
nros
56f45db8de Use ICONV_CONST from autotools instead of hardcoding OS versions
Use ICONV_CONST instead of hardcoding osversions, this is more portable.
Fixes build on SmartOS.
2019-12-09 09:31:06 +00:00
ng0
4b9e8757bd doc: Updated cross/dasm to 2.20.11nb1 2019-12-09 09:30:10 +00:00
ng0
85464e20d2 cross/dasm: Revbump to avoid distfiles conflict. 2019-12-09 09:29:15 +00:00
triaxx
ec8deb05da doc: Updated mail/postfix to 3.4.8 2019-12-09 08:45:47 +00:00
triaxx
1f7f0659c6 postfix: update to 3.4.8
upstream changes:
-----------------
    Fix for an Exim interoperability problem when postscreen after-220 checks
    are enabled. Bug introduced in Postfix 3.4: the code that detected
    "PIPELINING after BDAT" looked at the wrong variable. The warning now says
    "BDAT without valid RCPT", and the error is no longer treated as a command
    PIPELINING error, thus allowing mail to be delivered. Meanwhile, Exim has
    been fixed to stop sending BDAT commands when postscreen rejects all RCPT
    commands.

    Usability bug, introduced in Postfix 3.4: the parser for key/certificate
    chain files rejected inputs that contain an EC PARAMETERS object. While
    this is technically correct (the documentation says what types are allowed)
    this is surprising behavior because the legacy cert/key parameters will
    accept such inputs. For now, the parser skips object types that it does not
    know about for usability, and logs a warning because ignoring inputs is not
    kosher.

    Bug introduced in Postfix 2.8: don't gratuitously enable all after-220
    tests when only one such test is enabled. This made selective tests
    impossible with 'good' clients. This will be fixed in older Postfix
    versions at some later time.
2019-12-09 08:45:14 +00:00
gutteridge
75cafaa2ad guile22: fix SunOS builds on releases that provide accept4()
Curiously, the only thing stopping this from building was the second
accept4() test in the configure script, which doesn't supply the
necessary linker arguments. Elsewhere, the build configuration does
correctly set those same arguments. On current members of the SunOS
family, this meant it would falsely think accept4() wasn't defined
when it really was, which would then lead to a signature mismatch
during compilation.
2019-12-09 04:51:57 +00:00
ng0
17c5cbb2d6 cross/dasm: Add forgotten PLIST change. 2019-12-08 23:59:25 +00:00
ng0
ef626ba9cc cross/dasm: Adjust to new upstream location. 2019-12-08 23:58:52 +00:00
leot
fccb7cef63 doc: Updated shells/{,standalone-,static-}tcsh to 6.22.02 2019-12-08 22:10:29 +00:00
leot
1032db2f8b {,standalone-,static-}tcsh: Update to 6.22.02
Changes:
6.22.02 - 20191204
------------------
Fix version in configure.ac

6.22.01 - 20191201
------------------
undo PR/88: Preserve empty arguments in :q, since it breaks
        $ set x=""
        $ alias test "echo "\""$x:q"\"" is working."
        $ alias test
        echo "
2019-12-08 22:08:55 +00:00
rillig
33615ef675 doc: Updated pkgtools/pkglint to 19.3.15 2019-12-08 22:03:53 +00:00
rillig
c08a423e60 pkgtools/pkglint: update pkglint to 19.3.15
Changes since 19.3.14:

Invalid lines in PLIST files are now reported as errors instead of
warnings. If pkglint doesn't know about it, it must be an error.

In PLIST files, all paths are validated to be canonical. That is, no
dotdot components, no absolute paths, no extra slashes, no intermediate
dot components.

Fewer notes for unexpanded variable expressions in DESCR files. Before,
the text $@ was reported as possible Makefile variable even though it
was just a Perl expression.

README files are allowed again in pkgsrc package directories. There was
no convincing argument why these should be forbidden.

A few diagnostics have been changed from NOTE to WARNING or from WARNING
to ERROR, to match their wording.

When pkglint suggests to replace :M with ==, the wording is now "can be
made" instead of "should".
2019-12-08 22:03:37 +00:00
adam
427ede8559 Updated databases/py-peewee, textproc/py-sphinx 2019-12-08 21:56:42 +00:00
adam
4c53ec4eb0 py-sphinx: updated to 2.2.2
Release 2.2.2:

Incompatible changes
* For security reason of python, parallel mode is disabled on macOS and
  Python3.8+

Bugs fixed
* LaTeX: 2019-10-01 LaTeX release breaks :file:`sphinxcyrillic.sty`
* i18n: French, Hindi, Chinese, Japanese and Korean translation messages
  has been broken
* parallel build causes AttributeError on macOS and Python3.8
2019-12-08 21:56:23 +00:00
adam
6f062fd0f2 py-peewee: updated to 3.13.1
3.13.1
Fix a regression when specifying keyword arguments to the atomic() or
transaction() helper methods. Note: this only occurs if you were using Sqlite
and were explicitly setting the lock_type= parameter.


3.13.0
CockroachDB support added

This will be a notable release as it adds support for
CockroachDB, a distributed, horizontally-scalable
SQL database.

CockroachDB usage overview
CockroachDB API documentation
Other features and fixes

Allow FOR UPDATE clause to specify one or more tables (FOR UPDATE OF...).
Support for Postgres LATERAL join.
Properly wrap exceptions raised during explicit commit/rollback in the appropriate peewee-specific exception class.
Capture original exception object and expose it as exc.orig on the wrapped exception.
Properly introspect SMALLINT columns in Postgres schema reflection.
More flexible handling of passing database-specific arguments to atomic() and transaction() context-manager/decorator.
Fix non-deterministic join ordering issue when using the filter() API across several tables
2019-12-08 21:46:35 +00:00
nia
3e106a715a doc: Updated www/firefox68 to 68.3.0 2019-12-08 20:10:31 +00:00