Compare commits

...

51 Commits

Author SHA1 Message Date
bsiegert c405ada6af Pullup ticket #6646 2022-06-13 16:14:00 +00:00
bsiegert d608446417 Pullup ticket #6646 - requested by nia
graphics/gdk-pixbuf2: security fix

Revisions pulled up:
- graphics/gdk-pixbuf2/Makefile                                 1.53
- graphics/gdk-pixbuf2/PLIST                                    1.22
- graphics/gdk-pixbuf2/distinfo                                 1.51

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sat Jun 11 12:46:06 UTC 2022

   Modified Files:
   	pkgsrc/graphics/gdk-pixbuf2: Makefile PLIST distinfo

   Log Message:
   gdk-pixbuf2: update to 2.42.8

   2.42.8 (stable)
   ===

   - Clear the pixbuf's memory buffer to avoid returning uninitialized memory
   - Turn GdkPixbufModule functions into typed callbacks
   - tiff: Use non-deprecated C99 integer types
   - gif: Check for overflow when compositing or clearing frames
   - Change png/jpeg/tiff build options from boolean to feature
   - jpeg: Do not rely on UB around setjmp/longjmp
   - Build fixes
   - Documentation fixes
   - Translation updates
2022-06-13 16:13:38 +00:00
bsiegert c08c61630b Pullup tickets #6643 to #6645 2022-06-11 10:42:24 +00:00
bsiegert 3b43596b25 Pullup ticket #6645 - requested by taca
www/apache24: security fix

Revisions pulled up:
- www/apache24/Makefile                                         1.111
- www/apache24/distinfo                                         1.53

---
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Thu Jun  9 18:15:51 UTC 2022

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo

   Log Message:
   apache24: updated to 2.4.54

   Changes with Apache 2.4.54

   *) SECURITY: CVE-2022-31813: mod_proxy X-Forwarded-For dropped by
      hop-by-hop mechanism (cve.mitre.org)
      Apache HTTP Server 2.4.53 and earlier may not send the
      X-Forwarded-* headers to the origin server based on client side
      Connection header hop-by-hop mechanism.
      This may be used to bypass IP based authentication on the origin
      server/application.
      Credits: The Apache HTTP Server project would like to thank
      Gaetan Ferry (Synacktiv) for reporting this issue

   *) SECURITY: CVE-2022-30556: Information Disclosure in mod_lua with
      websockets (cve.mitre.org)
      Apache HTTP Server 2.4.53 and earlier may return lengths to
      applications calling r:wsread() that point past the end of the
      storage allocated for the buffer.
      Credits: The Apache HTTP Server project would like to thank
      Ronald Crane (Zippenhop LLC) for reporting this issue

   *) SECURITY: CVE-2022-30522: mod_sed denial of service
      (cve.mitre.org)
      If Apache HTTP Server 2.4.53 is configured to do transformations
      with mod_sed in contexts where the input to mod_sed may be very
      large, mod_sed may make excessively large memory allocations and
      trigger an abort.
      Credits: This issue was found by Brian Moussalli from the JFrog
      Security Research team

   *) SECURITY: CVE-2022-29404: Denial of service in mod_lua
      r:parsebody (cve.mitre.org)
      In Apache HTTP Server 2.4.53 and earlier, a malicious request to
      a lua script that calls r:parsebody(0) may cause a denial of
      service due to no default limit on possible input size.
      Credits: The Apache HTTP Server project would like to thank
      Ronald Crane (Zippenhop LLC) for reporting this issue

   *) SECURITY: CVE-2022-28615: Read beyond bounds in
      ap_strcmp_match() (cve.mitre.org)
      Apache HTTP Server 2.4.53 and earlier may crash or disclose
      information due to a read beyond bounds in ap_strcmp_match()
      when provided with an extremely large input buffer.  While no
      code distributed with the server can be coerced into such a
      call, third-party modules or lua scripts that use
      ap_strcmp_match() may hypothetically be affected.
      Credits: The Apache HTTP Server project would like to thank
      Ronald Crane (Zippenhop LLC) for reporting this issue

   *) SECURITY: CVE-2022-28614: read beyond bounds via ap_rwrite()
      (cve.mitre.org)
      The ap_rwrite() function in Apache HTTP Server 2.4.53 and
      earlier may read unintended memory if an attacker can cause the
      server to reflect very large input using ap_rwrite() or
      ap_rputs(), such as with mod_luas r:puts() function.
      Credits: The Apache HTTP Server project would like to thank
      Ronald Crane (Zippenhop LLC) for reporting this issue

   *) SECURITY: CVE-2022-28330: read beyond bounds in mod_isapi
      (cve.mitre.org)
      Apache HTTP Server 2.4.53 and earlier on Windows may read beyond
      bounds when configured to process requests with the mod_isapi
      module.
      Credits: The Apache HTTP Server project would like to thank
      Ronald Crane (Zippenhop LLC) for reporting this issue

   *) SECURITY: CVE-2022-26377: mod_proxy_ajp: Possible request
      smuggling (cve.mitre.org)
      Inconsistent Interpretation of HTTP Requests ('HTTP Request
      Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server
      allows an attacker to smuggle requests to the AJP server it
      forwards requests to.  This issue affects Apache HTTP Server
      Apache HTTP Server 2.4 version 2.4.53 and prior versions.
      Credits: Ricter Z @ 360 Noah Lab

   *) mod_ssl: SSLFIPS compatible with OpenSSL 3.0.

   *) mod_proxy_http: Avoid 417 responses for non forwardable 100-continue.

   *) mod_md:  a bug was fixed that caused very large MDomains
      with the combined DNS names exceeding ~7k to fail, as
      request bodies would contain partially wrong data from
      uninitialized memory. This would have appeared as failure
      in signing-up/renewing such configurations.

   *) mod_proxy_http: Avoid 417 responses for non forwardable 100-continue.

   *) MPM event: Restart children processes killed before idle maintenance.

   *) ab: Allow for TLSv1.3 when the SSL library supports it.

   *) core: Disable TCP_NOPUSH optimization on OSX since it might introduce
      transmission delays.

   *) MPM event: Fix accounting of active/total processes on ungraceful restart,

   *) core: make ap_escape_quotes() work correctly on strings
      with more than MAX_INT/2 characters, counting quotes double.
      Credit to <generalbugs@zippenhop.com> for finding this.

   *) mod_md: the `MDCertificateAuthority` directive can take more than one URL/name of
      an ACME CA. This gives a failover for renewals when several consecutive attempts
      to get a certificate failed.
      A new directive was added: `MDRetryDelay` sets the delay of retries.
      A new directive was added: `MDRetryFailover` sets the number of errored
      attempts before an alternate CA is selected for certificate renewals.

   *) mod_http2: remove unused and insecure code.

   *) mod_proxy: Add backend port to log messages to
      ease identification of involved service.

   *) mod_http2: removing unscheduling of ongoing tasks when
      connection shows potential abuse by a client. This proved
      counter-productive and the abuse detection can false flag
      requests using server-side-events.
      Fixes <https://github.com/icing/mod_h2/issues/231>.

   *) mod_md: Implement full auto status ("key: value" type status output).
      Especially not only status summary counts for certificates and
      OCSP stapling but also lists. Auto status format is similar to
      what was used for mod_proxy_balancer.

   *) mod_md: fixed a bug leading to failed transfers for OCSP
      stapling information when more than 6 certificates needed
      updates in the same run.

   *) mod_proxy: Set a status code of 502 in case the backend just closed the
      connection in reply to our forwarded request.

   *) mod_md: a possible NULL pointer deref was fixed in
      the JSON code for persisting time periods (start+end).
      Fixes #282 on mod_md's github.
      Thanks to @marcstern for finding this.

   *) mod_heartmonitor: Set the documented default value
      "10" for HeartbeatMaxServers instead of "0". With "0"
      no shared memory slotmem was initialized.

   *) mod_md: added support for managing certificates via a
      local tailscale daemon for users of that secure networking.
      This gives trusted certificates for tailscale assigned
      domain names in the *.ts.net space.
2022-06-11 10:42:04 +00:00
bsiegert 1a128b48b3 Pullup ticket #6644 - requested by taca
www/ruby-rack: security fix

Revisions pulled up:
- www/ruby-rack/Makefile                                        1.30
- www/ruby-rack/distinfo                                        1.28

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Sat May 28 09:55:51 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-rack: Makefile distinfo

   Log Message:
   www/ruby-rack: update to 2.2.3.1

   2.2.3.1 (2022-05-27)

   * [CVE-2022-30123] Fix shell escaping issue in Common Logger
   * [CVE-2022-30122] Restrict parsing of broken MIME attachments
2022-06-11 10:36:38 +00:00
bsiegert 612d52357b Pullup ticket #6643 - requested by taca
security/clamav-doc: build fix after pullup #6625

Revisions pulled up:
- security/clamav-doc/Makefile                                  1.7
- security/clamav-doc/PLIST                                     1.9

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Sun May 15 04:46:32 UTC 2022

   Modified Files:
   	pkgsrc/security/clamav-doc: Makefile PLIST

   Log Message:
   clamav-doc: fix PLIST

   Bump PKGREVISION.
2022-06-11 10:33:10 +00:00
bsiegert 21a6a3dc93 Forgot to commit the changelog for my last batch of pullups 2022-06-11 10:32:00 +00:00
spz 3d7d2e7d00 tickets #6635 #6636 #6639 #6640 #6641 #6642 2022-06-05 15:22:50 +00:00
spz 06c9fd88de Pullup ticket #6642 - requested by nia
lang/gcc6: build fix

Revisions pulled up:
- lang/gcc6/Makefile                                            1.36

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sat May 21 12:21:44 UTC 2022

   Modified Files:
   	pkgsrc/lang/gcc6: Makefile

   Log Message:
   gcc6: workaround: get this at least building by disabling RELRO


   To generate a diff of this commit:
   cvs rdiff -u -r1.35 -r1.36 pkgsrc/lang/gcc6/Makefile
2022-06-05 13:25:24 +00:00
spz e2fa4d8725 Pullup ticket #6641 - requested by nia
databases/mariadb105-client: security update
databases/mariadb105-server: security update

Revisions pulled up:
- databases/mariadb105-client/Makefile.common                   1.16
- databases/mariadb105-client/distinfo                          1.13
- databases/mariadb105-client/patches/patch-CMakeLists.txt      1.2
- databases/mariadb105-server/Makefile                          1.25
- databases/mariadb105-server/PLIST                             1.10

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sat May 21 10:38:26 UTC 2022

   Modified Files:
   	pkgsrc/databases/mariadb105-client: Makefile.common distinfo
   	pkgsrc/databases/mariadb105-client/patches: patch-CMakeLists.txt
   	pkgsrc/databases/mariadb105-server: Makefile PLIST

   Log Message:
   mariadb105: Update to 10.5.16

                            MariaDB 10.5.16 Release Notes

   Notable Items

     InnoDB

        * innodb_disallow_writes removed (MDEV-25975)
        * InnoDB gap locking fixes (MDEV-20605, MDEV-28422)
        * InnoDB performance improvements (MDEV-27557, MDEV-28185)

     Replication

        * Server initialization time gtid_slave_pos purge related reason of
          crashing in binlog background thread is removed (MDEV-26473)
        * Shutdown of the semisync master can't produce inconsistent state
          anymore (MDEV-11853)
        * Binlogs disappear after rsync IST (MDEV-28583)
        * autocommit=0 slave hang is eliminated (DBAAS-7828)
        * master crash is eliminated in compressed semisync replication protocol
          with packet counting amendment (MDEV-25580)
        * OPTIMIZE on a sequence does not cause counterfactual
          ER_BINLOG_UNSAFE_STATEMENT anymore (MDEV-24617)
        * Automatically generated Gtid_log_list_event is made to recognize
          within replication event group as a formal member (MDEV-28550)
        * Replication unsafe INSERT .. ON DUPLICATE KEY UPDATE using two or more
          unique key values at a time with MIXED format binlogging is corrected
          (MDEV-28310)
        * Replication unsafe INSERT .. ON DUPLICATE KEY UPDATE stops issuing
          unnessary "Unsafe statement" with MIXED binlog format (MDEV-21810)
        * Incomplete replication event groups are detected to error out by the
          slave IO thread (MDEV-27697)
        * mysqlbinlog --stop-never --raw now flushes the result file to disk
          after each processed event so the file can be listed with the actual
          bytes (MDEV-14608)

     Backup

        * Incorrect binlogs after Galera SST using rsync and mariabackup
          (MDEV-27524)
        * mariabackup does not detect multi-source replication slave
          (MDEV-21037)
        * Useless warning "InnoDB: Allocated tablespace ID <id> for <tablename>,
          old maximum was 0" during backup stage (MDEV-27343)
        * mariabackup prepare fails for incrementals if a new schema is created
          after full backup is taken (MDEV-28446)

     Optimizer

        * A SEGV in Item_field::used_tables/update_depend_map_for_order...
          (MDEV-26402)
        * ANALYZE FORMAT=JSON fields are incorrect for UNION ALL queries
          (MDEV-27699)
        * Subquery in an UPDATE query uses full scan instead of range
          (MDEV-22377)
        * Assertion `item1->type() = Item::FIELD_ITEM ... (MDEV-19398)
        * Server crashes in Expression_cache_tracker::fetch_current_stats
          (MDEV-28268)
        * MariaDB server crash at Item_subselect::init_expr_cache_tracker
          (MDEV-26164, MDEV-26047)
        * Crash with union of my_decimal type in ORDER BY clause (MDEV-25994)
        * SIGSEGV in st_join_table::cleanup (MDEV-24560)
        * Assertion `!eliminated' failed in Item_subselect::exec (MDEV-28437)

     General

        * Server error messages are now available in Chinese (MDEV-28227)
        * For RHEL/CentOS 7, non x86_64 architectures are no longer supported
          upstream and so our support will also be dropped with this release

     Security

        * Fixes for the following security vulnerabilities:
             * CVE-2022-27376
             * CVE-2022-27377
             * CVE-2022-27378
             * CVE-2022-27379
             * CVE-2022-27380
             * CVE-2022-27381
             * CVE-2022-27382
             * CVE-2022-27383
             * CVE-2022-27384
             * CVE-2022-27386
             * CVE-2022-27387
             * CVE-2022-27444
             * CVE-2022-27445
             * CVE-2022-27446
             * CVE-2022-27447
             * CVE-2022-27448
             * CVE-2022-27449
             * CVE-2022-27451
             * CVE-2022-27452
             * CVE-2022-27455
             * CVE-2022-27456
             * CVE-2022-27457
             * CVE-2022-27458


   To generate a diff of this commit:
   cvs rdiff -u -r1.15 -r1.16 pkgsrc/databases/mariadb105-client/Makefile.common
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/databases/mariadb105-client/distinfo
   cvs rdiff -u -r1.1 -r1.2 \
       pkgsrc/databases/mariadb105-client/patches/patch-CMakeLists.txt
   cvs rdiff -u -r1.24 -r1.25 pkgsrc/databases/mariadb105-server/Makefile
   cvs rdiff -u -r1.9 -r1.10 pkgsrc/databases/mariadb105-server/PLIST
2022-06-05 10:42:39 +00:00
spz a94a13df56 Pullup ticket #6640 - requested by nia
databases/mariadb106-client: security update
databases/mariadb106-server: security update

Revisions pulled up:
- databases/mariadb106-client/Makefile.common                   1.8
- databases/mariadb106-client/distinfo                          1.9
- databases/mariadb106-client/patches/patch-CMakeLists.txt      1.3
- databases/mariadb106-client/patches/patch-storage_innobase_include_transactional__lock__guard.h 1.3
- databases/mariadb106-server/Makefile                          1.15
- databases/mariadb106-server/PLIST                             1.7

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sat May 21 09:36:03 UTC 2022

   Modified Files:
   	pkgsrc/databases/mariadb106-client: Makefile.common distinfo
   	pkgsrc/databases/mariadb106-client/patches: patch-CMakeLists.txt
   	    patch-storage_innobase_include_transactional__lock__guard.h
   	pkgsrc/databases/mariadb106-server: Makefile PLIST

   Log Message:
   mariadb106: update to 10.6.8

                             MariaDB 10.6.8 Release Notes

   Notable Items

     InnoDB

        * innodb_disallow_writes removed (MDEV-25975)
        * InnoDB gap locking fixes (MDEV-20605, MDEV-28422)
        * InnoDB performance improvements (MDEV-27557, MDEV-28185, MDEV-27767,
          MDEV-28313, MDEV-28137, MDEV-28465, MDEV-26789)
        * Backup regression fixes (MDEV-27919)
        * InnoDB portability: FreeBSD futexes (MDEV-26476), POWER and s390x
          transactional memory (MDEV-27956)
        * ALTER TABLE: Fixed bogus duplicate key errors (MDEV-15250)
        * DDL and crash recovery fixes (MDEV-27274, MDEV-27234, MDEV-27817)
        * Requests to recalculate persistent statistics were sometimes lost
          (MDEV-27805)

     Replication

        * Semisync-slave server recovery is refined to correctly rollback
          prepared transaction (MDEV-28461)
        * Circular semisync setup endless event circulation is handled
          (MDEV-27760)
        * Semisync-slave server recovery is extended to work on new server_id
          server (MDEV-27342)
        * Server initialization time gtid_slave_pos purge related reason of
          crashing in binlog background thread is removed (MDEV-26473)
        * Shutdown of the semisync master can't produce inconsistent state
          anymore (MDEV-11853)
        * Binlogs disappear after rsync IST (MDEV-28583)
        * autocommit=0 slave hang is eliminated (DBAAS-7828)
        * master crash is eliminated in compressed semisync replication protocol
          with packet counting amendment (MDEV-25580)
        * OPTIMIZE on a sequence does not cause counterfactual
          ER_BINLOG_UNSAFE_STATEMENT anymore (MDEV-24617)
        * Automatically generated Gtid_log_list_event is made to recognize
          within replication event group as a formal member (MDEV-28550)
        * Replication unsafe INSERT .. ON DUPLICATE KEY UPDATE using two or more
          unique key values at a time with MIXED format binlogging is corrected
          (MDEV-28310)
        * Replication unsafe INSERT .. ON DUPLICATE KEY UPDATE stops issuing
          unnessary "Unsafe statement" with MIXED binlog format (MDEV-21810)
        * Incomplete replication event groups are detected to error out by the
          slave IO thread (MDEV-27697)
        * mysqlbinlog --stop-never --raw now flushes the result file to disk
          after each processed event so the file can be listed with the actual
          bytes (MDEV-14608)

     Backup

        * Incorrect binlogs after Galera SST using rsync and mariabackup
          (MDEV-27524)
        * mariabackup does not detect multi-source replication slave
          (MDEV-21037)
        * Useless warning "InnoDB: Allocated tablespace ID <id> for <tablename>,
          old maximum was 0" during backup stage (MDEV-27343)
        * mariabackup prepare fails for incrementals if a new schema is created
          after full backup is taken (MDEV-28446)

     Optimizer

        * Query performance degradation in newer MariaDB versions when using
          many tables (MDEV-28073)
        * A SEGV in Item_field::used_tables/update_depend_map_for_order...
          (MDEV-26402)
        * ANALYZE FORMAT=JSON fields are incorrect for UNION ALL queries
          (MDEV-27699)
        * Subquery in an UPDATE query uses full scan instead of range
          (MDEV-22377)
        * Assertion `item1->type() = Item::FIELD_ITEM ... (MDEV-19398)
        * Server crashes in Expression_cache_tracker::fetch_current_stats
          (MDEV-28268)
        * MariaDB server crash at Item_subselect::init_expr_cache_tracker
          (MDEV-26164, MDEV-26047)
        * Crash with union of my_decimal type in ORDER BY clause (MDEV-25994)
        * SIGSEGV in st_join_table::cleanup (MDEV-24560)
        * Assertion `!eliminated' failed in Item_subselect::exec (MDEV-28437)

     General

        * Server error messages are now available in Chinese (MDEV-28227)
        * For RHEL/CentOS 7, non x86_64 architectures are no longer supported
          upstream and so our support will also be dropped with this release
        * Packages for Ubuntu 22.04 LTS "Jammy" and Fedora 36 are not yet
          available pending the resolution of MDEV-28133: Backport OpenSSL-3.0
          compatibility to 10.6 branch

     Security

        * Fixes for the following security vulnerabilities:
             * CVE-2022-27376
             * CVE-2022-27377
             * CVE-2022-27378
             * CVE-2022-27379
             * CVE-2022-27380
             * CVE-2022-27381
             * CVE-2022-27382
             * CVE-2022-27383
             * CVE-2022-27384
             * CVE-2022-27386
             * CVE-2022-27387
             * CVE-2022-27444
             * CVE-2022-27445
             * CVE-2022-27446
             * CVE-2022-27447
             * CVE-2022-27448
             * CVE-2022-27449
             * CVE-2022-27451
             * CVE-2022-27452
             * CVE-2022-27455
             * CVE-2022-27456
             * CVE-2022-27457
             * CVE-2022-27458


   To generate a diff of this commit:
   cvs rdiff -u -r1.7 -r1.8 pkgsrc/databases/mariadb106-client/Makefile.common
   cvs rdiff -u -r1.8 -r1.9 pkgsrc/databases/mariadb106-client/distinfo
   cvs rdiff -u -r1.2 -r1.3 \
       pkgsrc/databases/mariadb106-client/patches/patch-CMakeLists.txt \
       pkgsrc/databases/mariadb106-client/patches/patch-storage_innobase_include_transactional__lock__guard.h
   cvs rdiff -u -r1.14 -r1.15 pkgsrc/databases/mariadb106-server/Makefile
   cvs rdiff -u -r1.6 -r1.7 pkgsrc/databases/mariadb106-server/PLIST
2022-06-05 10:11:03 +00:00
spz 31ce053224 Pullup ticket #6639 - requested by nia
print/poppler: build fix

Revisions pulled up:
- print/poppler/Makefile.common                                 1.134
- print/poppler/buildlink3.mk                                   1.90

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sat May 21 07:43:57 UTC 2022

   Modified Files:
   	pkgsrc/print/poppler: Makefile.common buildlink3.mk

   Log Message:
   poppler: Bump GCC requirement to GCC 7, it wants std::optional.


   To generate a diff of this commit:
   cvs rdiff -u -r1.133 -r1.134 pkgsrc/print/poppler/Makefile.common
   cvs rdiff -u -r1.89 -r1.90 pkgsrc/print/poppler/buildlink3.mk
2022-06-05 08:24:08 +00:00
spz 907f549fff Pullup ticket #6636 - requested by nia
www/firefox91-l10n: dependency update

Revisions pulled up:
- www/firefox91-l10n/Makefile                                   1.11
- www/firefox91-l10n/distinfo                                   1.13

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Mon May 16 21:21:29 UTC 2022

   Modified Files:
   	pkgsrc/www/firefox91-l10n: Makefile distinfo

   Log Message:
   firefox91-l10n: sync with firefox91


   To generate a diff of this commit:
   cvs rdiff -u -r1.10 -r1.11 pkgsrc/www/firefox91-l10n/Makefile
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/firefox91-l10n/distinfo
2022-06-05 06:20:41 +00:00
spz 030b086863 Pullup ticket #6635 - requested by nia
www/firefox91: security update

Revisions pulled up:
- www/firefox91/Makefile                                        1.18
- www/firefox91/distinfo                                        1.13
- www/firefox91/patches/patch-browser_app_profile_firefox.js    1.2

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Mon May 16 21:16:00 UTC 2022

   Modified Files:
   	pkgsrc/www/firefox91: Makefile distinfo
   	pkgsrc/www/firefox91/patches: patch-browser_app_profile_firefox.js

   Log Message:
   firefox91: update to 91.9.0

   Security Vulnerabilities fixed in Firefox ESR 91.9

       #CVE-2022-29914: Fullscreen notification bypass using popups

       #CVE-2022-29909: Bypassing permission prompt in nested browsing contexts

       #CVE-2022-29916: Leaking browser history with CSS variables

       #CVE-2022-29911: iframe Sandbox bypass

       #CVE-2022-29912: Reader mode bypassed SameSite cookies

       #CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR
       91.9


   To generate a diff of this commit:
   cvs rdiff -u -r1.17 -r1.18 pkgsrc/www/firefox91/Makefile
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/firefox91/distinfo
   cvs rdiff -u -r1.1 -r1.2 \
       pkgsrc/www/firefox91/patches/patch-browser_app_profile_firefox.js
2022-06-05 06:09:37 +00:00
spz 026d327f5d pullups #6628 #6629 #6630 #6631 2022-06-04 10:32:40 +00:00
spz f1421270f7 Pullup ticket #6631 - requested by taca
databases/ruby-activerecord70: security update
devel/ruby-activejob70: security update
devel/ruby-activemodel70: security update
devel/ruby-activestorage70: security update
devel/ruby-activesupport70: security update
devel/ruby-railties70: security update
lang/ruby: version info update
mail/ruby-actionmailbox70: security update
mail/ruby-actionmailer70: security update
textproc/ruby-actiontext70: security update
www/ruby-actioncable70: security update
www/ruby-actionpack70: security update
www/ruby-actionview70: security update
www/ruby-rails70: security update


Revisions pulled up:
- databases/ruby-activerecord70/distinfo                        1.5
- devel/ruby-activejob70/distinfo                               1.5
- devel/ruby-activemodel70/distinfo                             1.5
- devel/ruby-activestorage70/Makefile                           1.4
- devel/ruby-activestorage70/distinfo                           1.5
- devel/ruby-activesupport70/distinfo                           1.5
- devel/ruby-railties70/distinfo                                1.5
- lang/ruby/rails.mk                                            1.122
- mail/ruby-actionmailbox70/distinfo                            1.5
- mail/ruby-actionmailer70/distinfo                             1.5
- textproc/ruby-actiontext70/distinfo                           1.5
- www/ruby-actioncable70/distinfo                               1.5
- www/ruby-actionpack70/distinfo                                1.5
- www/ruby-actionview70/distinfo                                1.5
- www/ruby-rails70/distinfo                                     1.5

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:39:02 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rails.mk

   Log Message:
   lang/ruby/rails.mk: start update of Ruby on Rails to 7.0.2.4


   To generate a diff of this commit:
   cvs rdiff -u -r1.121 -r1.122 pkgsrc/lang/ruby/rails.mk

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:39:53 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activesupport70: distinfo

   Log Message:
   devel/ruby-activesupport70: update to 7.0.2.4

   ## Rails 7.0.2.4 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
       in names of tags and names of attributes, following the specification of XML.

       *Álvaro Martín Fraguas*


   To generate a diff of this commit:
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/devel/ruby-activesupport70/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:40:27 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionview70: distinfo

   Log Message:
   www/ruby-actionview70: update to 7.0.2.4

   ## Rails 7.0.2.4 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Escape dangerous characters in names of tags and names of attributes in the
       tag helpers, following the XML specification. Rename the option
       `:escape_attributes` to `:escape`, to simplify by applying the option to the
       whole tag.

       *Álvaro Martín Fraguas*


   To generate a diff of this commit:
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/www/ruby-actionview70/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:40:53 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionpack70: distinfo

   Log Message:
   www/ruby-actionpack70: update to 7.0.2.4

   ## Rails 7.0.2.4 (April 26, 2022) ##

   *   Allow Content Security Policy DSL to generate for API responses.

       *Tim Wade*


   To generate a diff of this commit:
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/www/ruby-actionpack70/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:41:42 UTC 2022

   Modified Files:
   	pkgsrc/databases/ruby-activerecord70: distinfo
   	pkgsrc/devel/ruby-activejob70: distinfo
   	pkgsrc/devel/ruby-activemodel70: distinfo
   	pkgsrc/devel/ruby-activestorage70: Makefile distinfo
   	pkgsrc/devel/ruby-railties70: distinfo
   	pkgsrc/mail/ruby-actionmailbox70: distinfo
   	pkgsrc/mail/ruby-actionmailer70: distinfo
   	pkgsrc/textproc/ruby-actiontext70: distinfo
   	pkgsrc/www/ruby-actioncable70: distinfo
   	pkgsrc/www/ruby-rails70: distinfo

   Log Message:
   Update rest of Ruby on Rails 70 components.

   No change except version.


   To generate a diff of this commit:
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/databases/ruby-activerecord70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/devel/ruby-activejob70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/devel/ruby-activemodel70/distinfo
   cvs rdiff -u -r1.3 -r1.4 pkgsrc/devel/ruby-activestorage70/Makefile
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/devel/ruby-activestorage70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/devel/ruby-railties70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/mail/ruby-actionmailbox70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/mail/ruby-actionmailer70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/textproc/ruby-actiontext70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/www/ruby-actioncable70/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/www/ruby-rails70/distinfo
2022-06-04 09:47:10 +00:00
spz 5eae0b65f9 Pullup ticket #6630 - requested by taca
databases/ruby-activerecord61: security update
devel/ruby-activejob61: security update
devel/ruby-activemodel61: security update
devel/ruby-activestorage61: security update
devel/ruby-activesupport61: security update
devel/ruby-railties61: security update
lang/ruby: version info update
mail/ruby-actionmailbox61: security update
mail/ruby-actionmailer61: security update
textproc/ruby-actiontext61: security update
www/ruby-actioncable61: security update
www/ruby-actionpack61: security update
www/ruby-actionview61: security update
www/ruby-rails61: security update

Revisions pulled up:
- databases/ruby-activerecord61/distinfo                        1.12
- devel/ruby-activejob61/distinfo                               1.12
- devel/ruby-activemodel61/distinfo                             1.12
- devel/ruby-activestorage61/Makefile                           1.5
- devel/ruby-activestorage61/distinfo                           1.12
- devel/ruby-activesupport61/Makefile                           1.4
- devel/ruby-activesupport61/distinfo                           1.12
- devel/ruby-railties61/distinfo                                1.12
- lang/ruby/rails.mk                                            1.121
- mail/ruby-actionmailbox61/PLIST                               1.2
- mail/ruby-actionmailbox61/distinfo                            1.12
- mail/ruby-actionmailer61/PLIST                                1.2
- mail/ruby-actionmailer61/distinfo                             1.12
- textproc/ruby-actiontext61/distinfo                           1.12
- www/ruby-actioncable61/distinfo                               1.12
- www/ruby-actionpack61/distinfo                                1.12
- www/ruby-actionview61/distinfo                                1.12
- www/ruby-rails61/distinfo                                     1.12

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:38:25 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rails.mk

   Log Message:
   lang/ruby/rails.mk: Really update of Ruby on Rails to 6.1.5.1


   To generate a diff of this commit:
   cvs rdiff -u -r1.120 -r1.121 pkgsrc/lang/ruby/rails.mk

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:28:21 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activesupport61: Makefile distinfo

   Log Message:
   devel/ruby-activesupport61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
       in names of tags and names of attributes, following the specification of XML.

       *Álvaro Martín Fraguas*

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Fix `ActiveSupport::Duration.build` to support negative values.

       The algorithm to collect the `parts` of the `ActiveSupport::Duration`
       ignored the sign of the `value` and accumulated incorrect part values. This
       impacted `ActiveSupport::Duration#sum` (which is dependent on `parts`) but
       not `ActiveSupport::Duration#eql?` (which is dependent on `value`).

       *Caleb Buxton*, *Braden Staudacher*

   *   `Time#change` and methods that call it (eg. `Time#advance`) will now
       return a `Time` with the timezone argument provided, if the caller was
       initialized with a timezone argument.

       Fixes [#42467](https://github.com/rails/rails/issues/42467).

       *Alex Ghiculescu*

   *   Clone to keep extended Logger methods for tagged logger.

       *Orhan Toy*

   *   `assert_changes` works on including `ActiveSupport::Assertions` module.

       *Pedro Medeiros*


   To generate a diff of this commit:
   cvs rdiff -u -r1.3 -r1.4 pkgsrc/devel/ruby-activesupport61/Makefile
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/devel/ruby-activesupport61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:28:57 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activemodel61: distinfo

   Log Message:
   devel/ruby-activemodel61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Clear secure password cache if password is set to `nil`

       Before:

          user.password = 'something'
          user.password = nil

          user.password # => 'something'

       Now:

          user.password = 'something'
          user.password = nil

          user.password # => nil

       *Markus Doits*

   *   Fix delegation in `ActiveModel::Type::Registry#lookup` and `ActiveModel::Type.lookup`

       Passing a last positional argument `{}` would be incorrectly considered as keyword argument.

       *Benoit Daloze*

   *   Fix `to_json` after `changes_applied` for `ActiveModel::Dirty` object.

       *Ryuta Kamizono*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/devel/ruby-activemodel61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:29:32 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionview61: distinfo

   Log Message:
   www/ruby-actionview61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Escape dangerous characters in names of tags and names of attributes in the
       tag helpers, following the XML specification. Rename the option
       `:escape_attributes` to `:escape`, to simplify by applying the option to the
       whole tag.

       *Álvaro Martín Fraguas*

   ## Rails 6.1.5 (March 09, 2022) ##

   *   `preload_link_tag` properly inserts `as` attributes for files with `image` MIME
       types, such as JPG or SVG.

       *Nate Berkopec*

   *   Add `autocomplete="off"` to all generated hidden fields.

       Fixes #42610.

       *Ryan Baumann*

   *   Fix `current_page?` when URL has trailing slash.

       This fixes the `current_page?` helper when the given URL has a trailing slash,
       and is an absolute URL or also has query params.

       Fixes #33956.

       *Jonathan Hefner*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/www/ruby-actionview61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:30:02 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionpack61: distinfo

   Log Message:
   www/ruby-actionpack61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   Allow Content Security Policy DSL to generate for API responses.

       *Tim Wade*

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Fix `content_security_policy` returning invalid directives.

       Directives such as `self`, `unsafe-eval` and few others were not
       single quoted when the directive was the result of calling a lambda
       returning an array.

       ```ruby
       content_security_policy do |policy|
         policy.frame_ancestors lambda { [:self, "https://example.com"] }
       end
       ```

       With this fix the policy generated from above will now be valid.

       *Edouard Chin*

   *   Update `HostAuthorization` middleware to render debug info only
       when `config.consider_all_requests_local` is set to true.

       Also, blocked host info is always logged with level `error`.

       Fixes #42813.

       *Nikita Vyrko*

   *   Dup arrays that get "converted".

       Fixes #43681.

       *Aaron Patterson*

   *   Don't show deprecation warning for equal paths.

       *Anton Rieder*

   *   Fix crash in `ActionController::Instrumentation` with invalid HTTP formats.

       Fixes #43094.

       *Alex Ghiculescu*

   *   Add fallback host for SystemTestCase driven by RackTest.

       Fixes #42780.

       *Petrik de Heus*

   *   Add more detail about what hosts are allowed.

       *Alex Ghiculescu*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/www/ruby-actionpack61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:30:33 UTC 2022

   Modified Files:
   	pkgsrc/databases/ruby-activerecord61: distinfo

   Log Message:
   databases/ruby-activerecord61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Fix `ActiveRecord::ConnectionAdapters::SchemaCache#deep_deduplicate` for Ruby 2.6.

       Ruby 2.6 and 2.7 have slightly different implementations of the `String#@-` method.
       In Ruby 2.6, the receiver of the `String#@-` method is modified under certain circumstances.
       This was later identified as a bug (https://bugs.ruby-lang.org/issues/15926) and only
       fixed in Ruby 2.7.

       Before the changes in this commit, the
       `ActiveRecord::ConnectionAdapters::SchemaCache#deep_deduplicate` method, which internally
       calls the `String#@-` method, could also modify an input string argument in Ruby 2.6 --
       changing a tainted, unfrozen string into a tainted, frozen string.

       Fixes #43056

       *Eric O'Hanlon*

   *   Fix migration compatibility to create SQLite references/belongs_to column as integer when
       migration version is 6.0.

       `reference`/`belongs_to` in migrations with version 6.0 were creating columns as
       bigint instead of integer for the SQLite Adapter.

       *Marcelo Lauxen*

   *   Fix dbconsole for 3-tier config.

       *Eileen M. Uchitelle*

   *   Better handle SQL queries with invalid encoding.

       ```ruby
       Post.create(name: "broken \xC8 UTF-8")
       ```

       Would cause all adapters to fail in a non controlled way in the code
       responsible to detect write queries.

       The query is now properly passed to the database connection, which might or might
       not be able to handle it, but will either succeed or failed in a more correct way.

       *Jean Boussier*

   *   Ignore persisted in-memory records when merging target lists.

       *Kevin Sjöberg*

   *   Fix regression bug that caused ignoring additional conditions for preloading
       `has_many` through relations.

       Fixes #43132

       *Alexander Pauly*

   *   Fix `ActiveRecord::InternalMetadata` to not be broken by
       `config.active_record.record_timestamps = false`

       Since the model always create the timestamp columns, it has to set them, otherwise it breaks
       various DB management tasks.

       Fixes #42983

       *Jean Boussier*

   *   Fix duplicate active record objects on `inverse_of`.

       *Justin Carvalho*

   *   Fix duplicate objects stored in has many association after save.

       Fixes #42549.

       *Alex Ghiculescu*

   *   Fix performance regression in `CollectionAssocation#build`.

       *Alex Ghiculescu*

   *   Fix retrieving default value for text column for MariaDB.

       *fatkodima*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/databases/ruby-activerecord61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:31:02 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activestorage61: Makefile distinfo

   Log Message:
   devel/ruby-activestorage61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Attachments can be deleted after their association is no longer defined.

       Fixes #42514

       *Don Sisco*


   To generate a diff of this commit:
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/devel/ruby-activestorage61/Makefile
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/devel/ruby-activestorage61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:31:47 UTC 2022

   Modified Files:
   	pkgsrc/mail/ruby-actionmailbox61: PLIST distinfo

   Log Message:
   mail/ruby-actionmailbox61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Add `attachments` to the list of permitted parameters for inbound emails conductor.

       When using the conductor to test inbound emails with attachments, this prevents an
       unpermitted parameter warning in default configurations, and prevents errors for
       applications that set:

       ```ruby
       config.action_controller.action_on_unpermitted_parameters = :raise
       ```

       *David Jones*, *Dana Henke*


   To generate a diff of this commit:
   cvs rdiff -u -r1.1 -r1.2 pkgsrc/mail/ruby-actionmailbox61/PLIST
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/mail/ruby-actionmailbox61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:32:28 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actioncable61: distinfo

   Log Message:
   www/ruby-actioncable61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   The Action Cable client now ensures successful channel subscriptions:

       * The client maintains a set of pending subscriptions until either
         the server confirms the subscription or the channel is torn down.
       * Rectifies the race condition where an unsubscribe is rapidly followed
         by a subscribe (on the same channel identifier) and the requests are
         handled out of order by the ActionCable server, thereby ignoring the
         subscribe command.

       *Daniel Spinosa*

   *   Truncate broadcast logging messages.

       *J Smith*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/www/ruby-actioncable61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:32:59 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-railties61: distinfo

   Log Message:
   devel/ruby-railties61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   In `zeitwerk` mode, setup the `once` autoloader first, and the `main` autoloader after it.
       This order plays better with shared namespaces.

       *Xavier Noria*

   *   Handle paths with spaces when editing credentials.

       *Alex Ghiculescu*

   *   Support Psych 4 when loading secrets.

       *Nat Morcos*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/devel/ruby-railties61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:33:27 UTC 2022

   Modified Files:
   	pkgsrc/textproc/ruby-actiontext61: distinfo

   Log Message:
   textproc/ruby-actiontext61: update to 6.1.5.1

   ## Rails 6.1.5.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 6.1.5 (March 09, 2022) ##

   *   Fix Action Text extra trix content wrapper.

       *Alexandre Ruban*


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/textproc/ruby-actiontext61/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:34:37 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activejob61: distinfo
   	pkgsrc/mail/ruby-actionmailer61: PLIST distinfo
   	pkgsrc/www/ruby-rails61: distinfo

   Log Message:
   Update rest of Ruby on Rails 61 components.

   No change except version.


   To generate a diff of this commit:
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/devel/ruby-activejob61/distinfo
   cvs rdiff -u -r1.1 -r1.2 pkgsrc/mail/ruby-actionmailer61/PLIST
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/mail/ruby-actionmailer61/distinfo
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/www/ruby-rails61/distinfo
2022-06-04 09:31:41 +00:00
spz 4cd04eddee Pullup ticket #6629 - requested by taca
databases/ruby-activerecord60: security update
devel/ruby-activejob60: security update
devel/ruby-activemodel60: security update
devel/ruby-activestorage60: security update
devel/ruby-activesupport60: security update
devel/ruby-railties60: security update
lang/ruby: version info update
mail/ruby-actionmailbox60: security update
mail/ruby-actionmailer60: security update
textproc/ruby-actiontext60: security update
www/ruby-actioncable60: security update
www/ruby-actionpack60: security update
www/ruby-actionview60: security update
www/ruby-rails60: security update


Revisions pulled up:
- databases/ruby-activerecord60/distinfo                        1.17
- devel/ruby-activejob60/distinfo                               1.17
- devel/ruby-activemodel60/distinfo                             1.17
- devel/ruby-activestorage60/distinfo                           1.17
- devel/ruby-activesupport60/distinfo                           1.17
- devel/ruby-railties60/distinfo                                1.17
- lang/ruby/rails.mk                                            1.120
- mail/ruby-actionmailbox60/distinfo                            1.17
- mail/ruby-actionmailer60/distinfo                             1.17
- textproc/ruby-actiontext60/distinfo                           1.17
- www/ruby-actioncable60/distinfo                               1.17
- www/ruby-actionpack60/distinfo                                1.17
- www/ruby-actionview60/distinfo                                1.17
- www/ruby-rails60/distinfo                                     1.17

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:20:39 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rails.mk

   Log Message:
   lang/ruby/rails.mk: start update of Ruby on Rails to 6.0.4.8


   To generate a diff of this commit:
   cvs rdiff -u -r1.119 -r1.120 pkgsrc/lang/ruby/rails.mk

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:21:25 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activesupport60: distinfo

   Log Message:
   devel/ruby-activesupport60: update to 6.0.4.8

   ## Rails 6.0.4.8 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
       in names of tags and names of attributes, following the specification of XML.

       *Álvaro Martín Fraguas*


   To generate a diff of this commit:
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/devel/ruby-activesupport60/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:23:12 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionview60: distinfo

   Log Message:
   www/ruby-actionview60: update to 6.0.4.8

   ## Rails 6.0.4.8 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Escape dangerous characters in names of tags and names of attributes in the
       tag helpers, following the XML specification. Rename the option
       `:escape_attributes` to `:escape`, to simplify by applying the option to the
       whole tag.

       *Álvaro Martín Fraguas*


   To generate a diff of this commit:
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/www/ruby-actionview60/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:23:48 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionpack60: distinfo

   Log Message:
   www/ruby-actionpack60: update to 6.0.4.8

   ## Rails 6.0.4.8 (April 26, 2022) ##

   *   Allow Content Security Policy DSL to generate for API responses.

       *Tim Wade*


   To generate a diff of this commit:
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/www/ruby-actionpack60/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:24:55 UTC 2022

   Modified Files:
   	pkgsrc/databases/ruby-activerecord60: distinfo
   	pkgsrc/devel/ruby-activejob60: distinfo
   	pkgsrc/devel/ruby-activemodel60: distinfo
   	pkgsrc/devel/ruby-activestorage60: distinfo
   	pkgsrc/devel/ruby-railties60: distinfo
   	pkgsrc/mail/ruby-actionmailbox60: distinfo
   	pkgsrc/mail/ruby-actionmailer60: distinfo
   	pkgsrc/textproc/ruby-actiontext60: distinfo
   	pkgsrc/www/ruby-actioncable60: distinfo
   	pkgsrc/www/ruby-rails60: distinfo

   Log Message:
   Update rest of Ruby on Rails 60 components.

   No change except version.


   To generate a diff of this commit:
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/databases/ruby-activerecord60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/devel/ruby-activejob60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/devel/ruby-activemodel60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/devel/ruby-activestorage60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/devel/ruby-railties60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/mail/ruby-actionmailbox60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/mail/ruby-actionmailer60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/textproc/ruby-actiontext60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/www/ruby-actioncable60/distinfo
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/www/ruby-rails60/distinfo
2022-06-04 09:17:02 +00:00
spz dc79db0274 Pullup ticket #6628 - requested by taca
databases/ruby-activerecord52: security update
devel/ruby-activejob52: security update
devel/ruby-activemodel52: security update
devel/ruby-activestorage52: security update
devel/ruby-activesupport52: security update
devel/ruby-railties52: security update
lang/ruby: version info update
mail/ruby-actionmailer52: security update
www/ruby-actioncable52: security update
www/ruby-actionpack52: security update
www/ruby-actionview52: security update
www/ruby-rails52: security update


Revisions pulled up:
- databases/ruby-activerecord52/distinfo                        1.13
- devel/ruby-activejob52/distinfo                               1.13
- devel/ruby-activemodel52/distinfo                             1.13
- devel/ruby-activestorage52/distinfo                           1.13
- devel/ruby-activesupport52/distinfo                           1.13
- devel/ruby-railties52/distinfo                                1.13
- lang/ruby/rails.mk                                            1.119
- mail/ruby-actionmailer52/distinfo                             1.13
- www/ruby-actioncable52/distinfo                               1.13
- www/ruby-actionpack52/Makefile                                1.2
- www/ruby-actionpack52/distinfo                                1.13
- www/ruby-actionview52/distinfo                                1.13
- www/ruby-rails52/distinfo                                     1.13

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:02:07 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rails.mk

   Log Message:
   lang/ruby/rails.mk: start update of Ruby on Rails to 5.2.7.1


   To generate a diff of this commit:
   cvs rdiff -u -r1.118 -r1.119 pkgsrc/lang/ruby/rails.mk

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:03:50 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activesupport52: distinfo

   Log Message:
   devel/ruby-activesupport52: update to 5.2.7.1

   ## Rails 5.2.7.1 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
       in names of tags and names of attributes, following the specification of XML.

       *Álvaro Martín Fraguas*

   ## Rails 5.2.7 (March 10, 2022) ##

   *   Restore support to Ruby 2.2.

       *ojab*


   To generate a diff of this commit:
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/devel/ruby-activesupport52/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:04:44 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionview52: distinfo

   Log Message:
   www/ruby-actionview52: update to 5.2.7.1

   ## Rails 5.2.7.1 (April 26, 2022) ##

   *   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

       Escape dangerous characters in names of tags and names of attributes in the
       tag helpers, following the XML specification. Rename the option
       `:escape_attributes` to `:escape`, to simplify by applying the option to the
       whole tag.

       *Álvaro Martín Fraguas*

   ## Rails 5.2.7 (March 10, 2022) ##

   *   No changes.


   To generate a diff of this commit:
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/ruby-actionview52/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:05:24 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-actionpack52: Makefile distinfo

   Log Message:
   www/ruby-actionpack52: update to 5.2.7.1

   ## Rails 5.2.7.1 (April 26, 2022) ##

   *   Allow Content Security Policy DSL to generate for API responses.

       *Tim Wade*

   ## Rails 5.2.7 (March 10, 2022) ##

   *   No changes.


   To generate a diff of this commit:
   cvs rdiff -u -r1.1 -r1.2 pkgsrc/www/ruby-actionpack52/Makefile
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/ruby-actionpack52/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:06:04 UTC 2022

   Modified Files:
   	pkgsrc/devel/ruby-activestorage52: distinfo

   Log Message:
   devel/ruby-activestorage52: update to 5.2.7.1

   ## Rails 5.2.7.1 (April 26, 2022) ##

   *   No changes.

   ## Rails 5.2.7 (March 10, 2022) ##

   *   Fix `ActiveStorage.supported_image_processing_methods` and
       `ActiveStorage.unsupported_image_processing_arguments` that were not being applied.

       *Rafael Mendonça França*


   To generate a diff of this commit:
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/devel/ruby-activestorage52/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 03:08:16 UTC 2022

   Modified Files:
   	pkgsrc/databases/ruby-activerecord52: distinfo
   	pkgsrc/devel/ruby-activejob52: distinfo
   	pkgsrc/devel/ruby-activemodel52: distinfo
   	pkgsrc/devel/ruby-railties52: distinfo
   	pkgsrc/mail/ruby-actionmailer52: distinfo
   	pkgsrc/www/ruby-actioncable52: distinfo
   	pkgsrc/www/ruby-rails52: distinfo

   Log Message:
   Update rest of Ruby on Rails 52 components.

   No change except version.


   To generate a diff of this commit:
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/databases/ruby-activerecord52/distinfo
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/devel/ruby-activejob52/distinfo
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/devel/ruby-activemodel52/distinfo
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/devel/ruby-railties52/distinfo
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/mail/ruby-actionmailer52/distinfo
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/ruby-actioncable52/distinfo
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/ruby-rails52/distinfo
2022-06-04 09:00:30 +00:00
bsiegert 8d7d5323e5 Pullup ticket #6638 - requested by khorben
www/gitea: security fix

Revisions pulled up:
- www/gitea/Makefile                                            1.73
- www/gitea/distinfo                                            1.31
- www/gitea/go-modules.mk                                       1.2

---
   Module Name:    pkgsrc
   Committed By:   khorben
   Date:           Wed May 18 18:38:34 UTC 2022

   Modified Files:
           pkgsrc/www/gitea: Makefile distinfo go-modules.mk

   Log Message:
   gitea: update to 1.16.8

   This is a security update:

   * CVE-2022-30781
   * CVE-2022-27313
   * and more security issues fixed but without CVEs - see below

   XXX pull-up to pkgsrc-2022Q1

   Tested on NetBSD/amd64.

   Changes in 1.16.8:

   ENHANCEMENTS

   * Add doctor check/fix for bogus action rows (#19656) (#19669)
   * Make .cs highlighting legible on dark themes (#19604) (#19605)

   BUGFIXES

   * Fix oauth setting list bug (#19681)
   * Delete user related oauth stuff on user deletion too (#19677) (#19680)
   * Fix new release from tags list UI (#19670) (#19673)
   * Prevent NPE when checking repo units if the user is nil (#19625) (#19630)
   * GetFeeds must always discard actions with dangling repo_id (#19598) (#19629)
   * Call MultipartForm.RemoveAll when request finishes (#19606) (#19607)
   * Avoid MoreThanOne error when creating a branch whose name conflicts with other ref names (#19557) (#19591)
   * Fix sending empty notifications (#19589) (#19590)
   * Ignore DNS error when doing migration allow/block check (#19566) (#19567)
   * Fix issue overview for teams (#19652) (#19653)

   Changes in 1.16.7:

   SECURITY

   * Escape git fetch remote (#19487) (#19490) CVE-2022-30781

   BUGFIXES

   * Don't overwrite err with nil (#19572) (#19574)
   * On Migrations, only write commit-graph if wiki clone was successful (#19563) (#19568)
   * Respect DefaultUserIsRestricted system default when creating new user (#19310) (#19560)
   * Don't error when branch's commit doesn't exist (#19547) (#19548)
   * Support hostname:port to pass host matcher's check (#19543) (#19544)
   * Prevent intermittent race in attribute reader close (#19537) (#19539)
   * Fix 64-bit atomic operations on 32-bit machines (#19531) (#19532)
   * Prevent dangling archiver goroutine (#19516) (#19526)
   * Fix migrate release from github (#19510) (#19523)
   * When view _Siderbar or _Footer, just display once (#19501) (#19522)
   * Fix blame page select range error and some typos (#19503)
   * Fix name of doctor fix "authorized-keys" in hints (#19464) (#19484)
   * User specific repoID or xorm builder conditions for issue search (#19475) (#19476)
   * Prevent dangling cat-file calls (goroutine alternative) (#19454) (#19466)
   * RepoAssignment ensure to close before overwrite (#19449) (#19460)
   * Set correct PR status on 3way on conflict checking (#19457) (#19458)
   * Mark TemplateLoading error as "UnprocessableEntity" (#19445) (#19446)

   Changes in 1.16.6:

   ENHANCEMENTS

   * Only request write when necessary (#18657) (#19422)
   * Disable service worker by default (#18914) (#19342)

   BUGFIXES

   * When dumping trim the standard suffices instead of a random suffix (#19440) (#19447)
   * Fix DELETE request for non-existent public key (#19443) (#19444)
   * Don't panic on ErrEmailInvalid (#19441) (#19442)
   * Add uploadpack.allowAnySHA1InWant to allow --filter=blob:none with older git clients (#19430) (#19438)
   * Warn on SSH connection for incorrect configuration (#19317) (#19437)
   * Search Issues via API, dont show 500 if filter result in empty list (#19244) (#19436)
   * When updating mirror repo intervals by API reschedule next update too (#19429) (#19433)
   * Fix nil error when some pages are rendered outside request context (#19427) (#19428)
   * Fix double blob-hunk on diff page (#19404) (#19405)
   * Don't allow merging PR's which are being conflict checked (#19357) (#19358)
   * Fix middleware function's placements (#19377) (#19378)
   * Fix invalid CSRF token bug, make sure CSRF tokens can be up-to-date (#19338)
   * Restore user autoregistration with email addresses (#19261) (#19312)
   * Move checks for pulls before merge into own function (#19271) (#19277)
   * Granular webhook events in editHook (#19251) (#19257)
   * Only send webhook events to active system webhooks and only deliver to active hooks (#19234) (#19248)
   * Use full output of git show-ref --tags to get tags for PushUpdateAddTag (#19235) (#19236)
   * Touch mirrors on even on fail to update (#19217) (#19233)
   * Hide sensitive content on admin panel progress monitor (#19218 & #19226) (#19231)
   * Fix clone url JS error for the empty repo page (#19209)
   * Bump goldmark to v1.4.11 (#19201) (#19203)

   TESTING

   * Prevent intermittent failures in RepoIndexerTest (#19225 #19229) (#19228)

   BUILD

   * Revert the minimal golang version requirement from 1.17 to 1.16 and add a warning in Makefile (#19319)

   MISC

   * Performance improvement for add team user when org has more than 1000 repositories (#19227) (#19289)
   * Check go and nodejs version by go.mod and package.json (#19197) (#19254)

   Changes in 1.16.5:

   BREAKING

   * Bump to build with go1.18 (#19120 et al) (#19127)

   SECURITY

   * Prevent redirect to Host (2) (#19175) (#19186)
   * Try to prevent autolinking of displaynames by email readers (#19169) (#19183)
   * Clean paths when looking in Storage (#19124) (#19179)
   * Do not send notification emails to inactive users (#19131) (#19139)
   * Do not send activation email if manual confirm is set (#19119) (#19122)

   ENHANCEMENTS

   * Use the new/choose link for New Issue on project page (#19172) (#19176)

   BUGFIXES

   * Fix showing issues in your repositories (#18916) (#19191)
   * Fix compare link in active feeds for new branch (#19149) (#19185)
   * Redirect .wiki/* ui link to /wiki (#18831) (#19184)
   * Ensure deploy keys with write access can push (#19010) (#19182)
   * Ensure that setting.LocalURL always has a trailing slash (#19171) (#19177)
   * Cleanup protected branches when deleting users & teams (#19158) (#19174)
   * Use IterateBufferSize whilst querying repositories during adoption check (#19140) (#19160)
   * Fix NPE /repos/issues/search when not signed in (#19154) (#19155)
   * Use custom favicon when viewing static files if it exists (#19130) (#19152)
   * Fix the editor height in review box (#19003) (#19147)
   * Ensure isSSH is set whenever DISABLE_HTTP_GIT is set (#19028) (#19146)
   * Fix wrong scopes caused by empty scope input (#19029) (#19145)
   * Make migrations SKIP_TLS_VERIFY apply to git too (#19132) (#19141)
   * Handle email address not exist (#19089) (#19121)

   MISC

   * Update json-iterator to allow compilation with go1.18 (#18644) (#19100)
   * Update golang.org/x/crypto (#19097) (#19098)

   Changes in 1.16.4:

   SECURITY

   * Restrict email address validation (#17688) (#19085)
   * Fix lfs bug (#19072) (#19080)

   ENHANCEMENTS

   * Improve SyncMirrors logging (#19045) (#19050)

   BUGFIXES

   * Refactor mirror code & fix StartToMirror (#18904) (#19075)
   * Update the webauthn_credential_id_sequence in Postgres (#19048) (#19060)
   * Prevent 500 when there is an error during new auth source post (#19041) (#19059)
   * If rendering has failed due to a net.OpError stop rendering (attempt 2) (#19049) (#19056)
   * Fix flag validation (#19046) (#19051)
   * Add pam account authorization check (#19040) (#19047)
   * Ignore missing comment for user notifications (#18954) (#19043)
   * Set rel="nofollow noindex" on new issue links (#19023) (#19042)
   * Upgrading binding package (#19034) (#19035)
   * Don't show context cancelled errors in attribute reader (#19006) (#19027)
   * Fix update hint bug (#18996) (#19002)

   MISC

   * Fix potential assignee query for repo (#18994) (#18999)

   Changes in 1.16.3:

   SECURITY

   * Git backend ignore replace objects (#18979) (#18980) CVE-2022-27313

   ENHANCEMENTS

   * Adjust error for already locked db and prevent level db lock on malformed connstr (#18923) (#18938)

   BUGFIXES

   * Set max text height to prevent overflow (#18862) (#18977)
   * Fix newAttachmentPaths deletion for DeleteRepository() (#18973) (#18974)
   * Accounts with WebAuthn only (no TOTP) now exist ... fix code to handle that case (#18897) (#18964)
   * Send 404 on /{org}.gpg (#18959) (#18962)
   * Fix admin user list pagination (#18957) (#18960)
   * Fix lfs management setting (#18947) (#18946)
   * Fix login with email panic when email is not exist (#18942)
   * Update go-org to v1.6.1 (#18932) (#18933)
   * Fix <strong> html in translation (#18929) (#18931)
   * Fix page and missing return on unadopted repos API (#18848) (#18927)
   * Allow adminstrator teams members to see other teams (#18918) (#18919)
   * Don't treat BOM escape sequence as hidden character. (#18909) (#18910)
   * Correctly link URLs to users/repos with dashes, dots or underscores (  (#18908)
   * Fix redirect when using lowercase repo name (#18775) (#18902)
   * Fix migration v210 (#18893) (#18892)
   * Fix team management UI (#18887) (18886)
   * BeforeSourcePath should point to base commit (#18880) (#18799)

   TRANSLATION

   * Backport locales from master (#18944)

   MISC

   * Don't update email for organisation (#18905) (#18906)

   Changes in 1.16.2:

   ENHANCEMENTS

   * Show fullname on issue edits and gpg/ssh signing info (#18828)
   * Immediately Hammer if second kill is sent (#18823) (#18826)
   * Allow mermaid render error to wrap (#18791)

   BUGFIXES

   * Fix ldap user sync missed email in email_address table (#18786) (#18876)
   * Update assignees check to include any writing team and change org sidebar (#18680) (#18873)
   * Don't report signal: killed errors in serviceRPC (#18850) (#18865)
   * Fix bug where certain LDAP settings were reverted (#18859)
   * Update go-org to 1.6.0 (#18824) (#18839)
   * Fix login with email for ldap users (#18800) (#18836)
   * Fix bug for get user by email (#18834)
   * Fix panic in EscapeReader (#18820) (#18821)
   * Fix ldap loginname (#18789) (#18804)
   * Remove redundant call to UpdateRepoStats during migration (#18591) (#18794)
   * In disk_channel queues synchronously push to disk on shutdown (#18415) (#18788)
   * Fix template bug of LFS lock (#18784) (#18787)
   * Attempt to fix the webauthn migration again - part 3 (#18770) (#18771)
   * Send mail to issue/pr assignee/reviewer also when OnMention is set (#18707) (#18765)
   * Fix a broken link in commits_list_small.tmpl (#18763) (#18764)
   * Increase the size of the webauthn_credential credential_id field (#18739) (#18756)
   * Prevent dangling GetAttribute calls (#18754) (#18755)
   * Fix isempty detection of git repository (#18746) (#18750)
   * Fix source code line highlighting on external tracker (#18729) (#18740)
   * Prevent double encoding of branch names in delete branch (#18714) (#18738)
   * Always set PullRequestWorkInProgressPrefixes in PrepareViewPullInfo (#18713) (#18737)
   * Fix forked repositories missed tags (#18719) (#18735)
   * Fix release typo (#18728) (#18731)
   * Separate the details links of commit-statuses in headers (#18661) (#18730)
   * Update object repo with the migrated repository (#18684) (#18726)
   * Fix bug for version update hint (#18701) (#18705)
   * Fix issue with docker-rootless shimming script (#18690) (#18699)
   * Let MinUnitAccessMode return correct perm (#18675) (#18689)
   * Prevent security failure due to bad APP_ID (#18678) (#18682)
   * Restart zero worker if there is still work to do (#18658) (#18672)
   * If rendering has failed due to a net.OpError stop rendering (#18642) (#18645)

   TESTING

   * Ensure git tag tests and others create test repos in tmpdir (#18447) (#18767)

   BUILD

   * Reduce CI go module downloads, add make targets (#18708, #18475, #18443) (#18741)

   MISC

   * Put buttons back in org dashboard (#18817) (#18825)
   * Various Mermaid improvements (#18776) (#18780)
   * C preprocessor colors improvement (#18671) (#18696)
   * Fix the missing i18n key for update checker (#18646) (#18665)
2022-05-30 18:59:42 +00:00
bsiegert 8bf771864e Pullup ticket #6637 - requested by nia
multimedia/libaom: security fix

Revisions pulled up:
- multimedia/libaom/Makefile                                    1.22
- multimedia/libaom/distinfo                                    1.16
- multimedia/libaom/patches/patch-aom__ports_ppc__cpudetect.c   1.3
- multimedia/libaom/patches/patch-build_cmake_aom__configure.cmake 1.5
- multimedia/libaom/patches/patch-build_cmake_version.cmake     1.3

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Tue May 17 21:44:11 UTC 2022

   Modified Files:
   	pkgsrc/multimedia/libaom: Makefile distinfo
   	pkgsrc/multimedia/libaom/patches: patch-aom__ports_ppc__cpudetect.c
   	    patch-build_cmake_aom__configure.cmake
   	    patch-build_cmake_version.cmake

   Log Message:
   libaom: Update to 3.3.0

   2022-01-28 v3.3.0
     This release includes compression efficiency and perceptual quality
     improvements, speedup and memory optimizations, some new features, and
     several bug fixes.

     - New Features
       * AV1 RT: Introducing CDEF search level 5
       * Changed real time speed 4 to behave the same as real time speed 5
       * Add --deltaq-strength
       * rtc: Allow scene-change and overshoot detection for svc
       * rtc: Intra-only frame for svc
       * AV1 RT: Option 2 for codec control AV1E_SET_ENABLE_CDEF to disable
         CDEF on non-ref frames
       * New codec controls AV1E_SET_LOOPFILTER_CONTROL and
         AOME_GET_LOOPFILTER_LEVEL
       * Improvements to three pass encoding

     - Compression Efficiency Improvements
       * Overall compression gains: 0.6%

     - Perceptual Quality Improvements
       * Improves the perceptual quality of high QP encoding for delta-q mode 4
       * Auto select noise synthesis level for all intra

     - Speedup and Memory Optimizations
       * Added many SSE2 optimizations.
       * Good quality 2-pass encoder speedups:
         o Speed 2: 9%
         o Speed 3: 12.5%
         o Speed 4: 8%
         o Speed 5: 3%
         o Speed 6: 4%
       * Real time mode encoder speedups:
         o Speed 5: 2.6% BDRate gain, 4% speedup
         o Speed 6: 3.5% BDRate gain, 4% speedup
         o Speed 9: 1% BDRate gain, 3% speedup
         o Speed 10: 3% BDRate gain, neutral speedup
       * All intra encoding speedups (AVIF):
         o Single thread - speed 6: 8%
         o Single thread - speed 9: 15%
         o Multi thread(8) - speed 6: 14%
         o Multi thread(8) - speed 9: 34%

     - Bug Fixes
       * Issue 3163: Segmentation fault when using --enable-keyframe-filtering=2
       * Issue 2436: Integer overflow in av1_warp_affine_c()
       * Issue 3226: armv7 build failure due to gcc-11
       * Issue 3195: Bug report on libaom (AddressSanitizer: heap-buffer-overflow)
       * Issue 3191: Bug report on libaom (AddressSanitizer: SEGV on unknown
         address)
       * Issue 3176: Some SSE2/SADx4AvgTest.* tests fail on Windows
       * Issue 3175: Some SSE2/SADSkipTest.* tests fail on Windows
2022-05-20 13:05:56 +00:00
bsiegert 779aa485db Pullup ticket #6634 - requested by sborrill
mail/sendmail: bugfix for SMTP AUTH

Revisions pulled up:
- mail/sendmail/Makefile                                        1.141
- mail/sendmail/distinfo                                        1.68
- mail/sendmail/patches/patch-bo                                1.5

---
   Module Name:	pkgsrc
   Committed By:	sborrill
   Date:		Tue May 10 13:46:49 UTC 2022

   Modified Files:
   	pkgsrc/mail/sendmail: Makefile distinfo
   	pkgsrc/mail/sendmail/patches: patch-bo

   Log Message:
   sendmail: fix SMTP AUTH

   Pull in SMTP AUTH fix from 8.17.1.9.
   Bump PKGREVISION
2022-05-20 12:58:37 +00:00
bsiegert de3bab2936 Pullup ticket #6633 - requested by gutteridge
textproc/libxml2: security fix

Revisions pulled up:
- textproc/libxml2/Makefile                                     1.164
- textproc/libxml2/Makefile.common                              1.16
- textproc/libxml2/distinfo                                     1.141
- textproc/py-libxml2/Makefile                                  1.81

---
   Module Name:    pkgsrc
   Committed By:   gutteridge
   Date:           Fri May  6 00:55:55 UTC 2022

   Modified Files:
           pkgsrc/textproc/libxml2: Makefile Makefile.common distinfo
           pkgsrc/textproc/py-libxml2: Makefile

   Log Message:
   libxml2: update to 2.9.14, includes security fixes

   v2.9.14: May 02 2022:
      - Security:
     [CVE-2022-29824] Integer overflow in xmlBuf and xmlBuffer
     Fix potential double-free in xmlXPtrStringRangeFunction
     Fix memory leak in xmlFindCharEncodingHandler
     Normalize XPath strings in-place
     Prevent integer-overflow in htmlSkipBlankChars() and xmlSkipBlankChars()
       (David Kilzer)
     Fix leak of xmlElementContent (David Kilzer)

      - Bug fixes:
     Fix parsing of subtracted regex character classes
     Fix recursion check in xinclude.c
     Reset last error in xmlCleanupGlobals
     Fix certain combinations of regex range quantifiers
     Fix range quantifier on subregex

      - Improvements:
     Fix recovery from invalid HTML start tags

      - Build system, portability:
     Define LFS macros before including system headers
     Initialize XPath floating-point globals
     configure: check for icu DEFS (James Hilliard)
     configure.ac: produce tar.xz only (GNOME policy) (David Seifert)
     CMakeLists.txt: Fix LIBXML_VERSION_NUMBER
     Fix build with older Python versions
     Fix --without-valid build
2022-05-20 12:56:56 +00:00
bsiegert 3b8903c6fc Pullup ticket #6632 - requested by nia
math/py-numpy: build fix

Revisions pulled up:
- math/py-numpy/Makefile                                        1.92

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sun May  8 10:18:31 UTC 2022

   Modified Files:
   	pkgsrc/math/py-numpy: Makefile

   Log Message:
   py-numpy: Expects compiler to default to C++11.
2022-05-20 12:54:08 +00:00
bsiegert c375cecd08 Note pullup ticket #6625 2022-05-08 15:29:10 +00:00
bsiegert 2af05099d8 Pullup ticket #6625 - requested by taca
security/clamav: security fix

Revisions pulled up:
- security/clamav/Makefile                                      1.84
- security/clamav/Makefile.common                               1.23
- security/clamav/buildlink3.mk                                 1.16
- security/clamav/distinfo                                      1.42

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May  5 00:44:07 UTC 2022

   Modified Files:
   	pkgsrc/security/clamav: Makefile Makefile.common buildlink3.mk distinfo

   Log Message:
   security/clamav: update to 0.103.6

   0.103.6 (2022-05-04)

   ClamAV 0.103.6 is a critical patch release with the following fixes:

   - [CVE-2022-20770](CVE-2022-20770): Fixed a possible infinite loop vulner=
   ability
     in the CHM file parser.
     Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
   and
     prior versions.
     Thank you to Micha=A9=A9 Dardas for reporting this issue.

   - [CVE-2022-20796](CVE-2022-20796): Fixed a possible NULL-pointer derefer=
   ence
     crash in the scan verdict cache check.
     Issue affects versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2.
     Thank you to Alexander Patrakov and Antoine Gatineau for reporting this=
    issue.

   - [CVE-2022-20771](CVE-2022-20771): Fixed a possible infinite loop vulner=
   ability
     in the TIFF file parser.
     Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
   and
     prior versions.
     The issue only occurs if the "--alert-broken-media" ClamScan option is
     enabled. For ClamD, the affected option is "AlertBrokenMedia yes", and =
   for
     libclamav it is the "CL_SCAN_HEURISTIC_BROKEN_MEDIA" scan option.
     Thank you to Micha=A9=A9 Dardas for reporting this issue.

   - [CVE-2022-20785](CVE-2022-20785): Fixed a possible memory leak in the
     HTML file parser / Javascript normalizer.
     Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
   and
     prior versions.
     Thank you to Micha=A9=A9 Dardas for reporting this issue.

   - [CVE-2022-20792](CVE-2022-20792): Fixed a possible multi-byte heap buff=
   er
     overflow write vulnerability in the signature database load module.
     The fix was to update the vendored regex library to the latest version.
     Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
   and
     prior versions.
     Thank you to Micha=A9=A9 Dardas for reporting this issue.

   - ClamOnAcc: Fixed a number of assorted stability issues and added niceti=
   es for
     debugging ClamOnAcc. Patches courtesy of Frank Fegert.

   - Fixed an issue causing byte-compare subsignatures to cause an alert whe=
   n they
     match even if other conditions of the given logical signatures were not=
    met.

   - Fix memleak when using multiple byte-compare subsignatures.
     This fix was backported from 0.104.0.
     Thank you to Andrea De Pasquale for contributing the fix.

   - Assorted bug fixes and improvements.

   Special thanks to the following people for code contributions and bug rep=
   orts:
   - Alexander Patrakov
   - Andrea De Pasquale
   - Antoine Gatineau
   - Frank Fegert
   - Micha=A9=A9 Dardas
2022-05-08 15:28:34 +00:00
bsiegert 12ce22410b Pullup tickets up to #6627 2022-05-08 14:58:27 +00:00
bsiegert af7ddbbd24 Pullup tickets #6626 and #6627 - requested by taca
ruby30-base: build fix
ruby31-base: build fix

Revisions pulled up:
- lang/ruby/platform.mk                                         1.10-1.12
- lang/ruby/rubyversion.mk                                      1.251
- lang/ruby30-base/Makefile                                     1.7
- lang/ruby30-base/distinfo                                     1.9-1.10
- lang/ruby30-base/patches/patch-configure                      1.2
- lang/ruby30-base/patches/patch-include_ruby_internal_static__assert.h 1.1
- lang/ruby31-base/Makefile                                     1.4-1.5
- lang/ruby31-base/distinfo                                     1.4-1.7
- lang/ruby31-base/patches/patch-configure                      1.2
- lang/ruby31-base/patches/patch-include_ruby_internal_static__assert.h 1.1
- lang/ruby31-base/patches/patch-template_Makefile.in           1.1
- lang/ruby31-base/patches/patch-tool_runruby.rb                1.1

---
   Module Name:	pkgsrc
   Committed By:	jperkin
   Date:		Wed May  4 15:49:51 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby31-base: Makefile distinfo
   	pkgsrc/lang/ruby31-base/patches: patch-configure

   Log Message:
   ruby31-base: Retain _XOPEN_SOURCE on SunOS.

   Fixes build of eventmachine (which assumes the XPG4.2 "void *" type for
   iov_base), and mirrors settings of ruby 2.x.   Bump PKGREVISION.

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed May  4 16:16:49 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: platform.mk

   Log Message:
   lang/ruby: fix build problem of Ruby 3.1 on NetBSD 8

   Fix build problem of Ruby 3.1 on NetBSD 8 by disabling dtrace.

   Ruby 3.1 dtrace(1) to modify compiled object files during build process.
   But something wrong on NetBSD 8, includeing 8.2_STABLE.

   For example, vm.o contains these symbols on NetBSD 9:

   0000000000000000 A __dtrace_ruby___array__create
   0000000000000000 A __dtrace_ruby___cmethod__entry
   0000000000000000 A __dtrace_ruby___cmethod__return
   0000000000000000 A __dtrace_ruby___hash__create
   0000000000000000 A __dtrace_ruby___method__entry
   0000000000000000 A __dtrace_ruby___method__return
   0000000000000000 A __dtraceenabled_ruby___array__create
   0000000000000000 A __dtraceenabled_ruby___cmethod__entry
   0000000000000000 A __dtraceenabled_ruby___cmethod__return
   0000000000000000 A __dtraceenabled_ruby___hash__create
   0000000000000000 A __dtraceenabled_ruby___method__entry
   0000000000000000 A __dtraceenabled_ruby___method__return

   But on NetBSD 8:

   0000000000000000 A __dtrace_ruby___array-create
   0000000000000000 A __dtrace_ruby___cmethod-entry
   0000000000000000 A __dtrace_ruby___cmethod-return
   0000000000000000 A __dtrace_ruby___hash-create
   0000000000000000 A __dtrace_ruby___method-entry
   0000000000000000 A __dtrace_ruby___method-return
   0000000000000000 A __dtraceenabled_ruby___array-create
   0000000000000000 A __dtraceenabled_ruby___cmethod-entry
   0000000000000000 A __dtraceenabled_ruby___cmethod-return
   0000000000000000 A __dtraceenabled_ruby___hash-create
   0000000000000000 A __dtraceenabled_ruby___method-entry
   0000000000000000 A __dtraceenabled_ruby___method-return

---
   Module Name:	pkgsrc
   Committed By:	jperkin
   Date:		Wed May  4 15:49:16 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby30-base: Makefile distinfo
   	pkgsrc/lang/ruby30-base/patches: patch-configure

   Log Message:
   ruby30-base: Retain _XOPEN_SOURCE on SunOS.

   Fixes build of eventmachine (which assumes the XPG4.2 "void *" type for
   iov_base), and mirrors settings of ruby 2.x.   Bump PKGREVISION.

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed May  4 16:44:53 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: platform.mk
   	pkgsrc/lang/ruby30-base: distinfo
   	pkgsrc/lang/ruby31-base: distinfo
   Added Files:
   	pkgsrc/lang/ruby30-base/patches:
   	    patch-include_ruby_internal_static__assert.h
   	pkgsrc/lang/ruby31-base/patches:
   	    patch-include_ruby_internal_static__assert.h

   Log Message:
   lang/ruby: fix Ruby 3.0 build problem on NetBSD 8.0

   Something wrong with expantion of static_assert macro in <assert.h>
   on NetBSD 8.0.  So, avoid use of static_assert on NetBSD 8.0.

   NetBSD 8.1 and later dose not have this problem.

---
   Module Name:	pkgsrc
   Committed By:	jperkin
   Date:		Thu May  5 10:15:17 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rubyversion.mk

   Log Message:
   ruby: Handle ruby31 changing the config triple for arm64 macOS.

---
   Module Name:	pkgsrc
   Committed By:	jperkin
   Date:		Thu May  5 10:25:06 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby31-base: distinfo
   Added Files:
   	pkgsrc/lang/ruby31-base/patches: patch-tool_runruby.rb

   Log Message:
   ruby31-base: Fix install on macOS arm64.

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Sat May  7 09:36:16 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: platform.mk
   	pkgsrc/lang/ruby31-base: Makefile distinfo
   Added Files:
   	pkgsrc/lang/ruby31-base/patches: patch-template_Makefile.in

   Log Message:
   lang/ruby31-base: better fix than privious one

   Instead of disabling DTrace, process object file yjit.o with "dtrace -G".

   Bump PKGREVISION.
2022-05-08 14:53:37 +00:00
bsiegert cf06b2089e Pullup ticket #6624 - requested by taca
www/drupal7: security fix

Revisions pulled up:
- www/drupal7/Makefile                                          1.76
- www/drupal7/PLIST                                             1.30
- www/drupal7/distinfo                                          1.60

---
   Module Name:	pkgsrc
   Committed By:	wen
   Date:		Sat Apr 30 08:50:35 UTC 2022

   Modified Files:
   	pkgsrc/www/drupal7: Makefile PLIST distinfo

   Log Message:
   Update to 7.89

   Upstream changes:
   Drupal 7.89, 2022-03-02
   -----------------------
   - Bug fixes for PHP 8.1
   - Fix tests for PostgreSQL

   Drupal 7.88, 2022-02-15
   -----------------------
   - Fixed security issues:
      - SA-CORE-2022-003

   Drupal 7.87, 2022-01-19
   -----------------------
   - Fix regression caused by jQuery UI position() backport
2022-05-07 10:16:54 +00:00
bsiegert 4646ce37d4 Pullup ticket #6623 - requested by taca
www/ruby-puma: security fix

Revisions pulled up:
- www/ruby-puma/Makefile                                        1.33
- www/ruby-puma/distinfo                                        1.30

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Sun Apr 24 14:43:10 UTC 2022

   Modified Files:
   	pkgsrc/www/ruby-puma: Makefile distinfo

   Log Message:
   www/ruby-puma: update to 5.6.4

   5.6.4 (2022-03-30)

   Security

   * Close several HTTP Request Smuggling exploits (CVE-2022-24790)

   5.6.2 (2022-02-11)

   Bugfix/Security

   * Response body will always be closed. (GHSA-rmj8-8hhh-gv5h, related to #2809)

   5.6.1 (2022-01-26)

   Bugfixes

   * Reverted a commit which appeared to be causing occasional blank header
     values (#2809)

   5.6.0 (2022-01-25)

   Features

   * Support localhost integration in ssl_bind (#2764, #2708)
   * Allow backlog parameter to be set with ssl_bind DSL (#2780)
   * Remove yaml (psych) requirement in StateFile (#2784)
   * Allow culling of oldest workers, previously was only youngest (#2773,
     #2794)
   * Add worker_check_interval configuration option (#2759)
   * Always send lowlevel_error response to client (#2731, #2341)
   * Support for cert_pem and key_pem with ssl_bind DSL (#2728)

   Bugfixes

   * Keep thread names under 15 characters, prevents breakage on some OSes
     (#2733)
   * Fix two 'old-style-definition' compile warning (#2807, #2806)
   * Log environment correctly using option value (#2799)
   * Fix warning from Ruby master (will be 3.2.0) (#2785)
   * extconf.rb - fix openssl with old Windows builds (#2757)
   * server.rb - rescue handling (Errno::EBADF) for @notify.close (#2745)

   Refactor

   * server.rb - refactor code using @options[:remote_address] (#2742)
   * [jruby] a couple refactorings - avoid copy-ing bytes (#2730)
2022-05-07 10:02:40 +00:00
bsiegert 8bc94b8887 Pullup ticket #6622 - requested by taca
textproc/ruby-yajl: security fix

Revisions pulled up:
- textproc/ruby-yajl/Makefile                                   1.8
- textproc/ruby-yajl/PLIST                                      1.7
- textproc/ruby-yajl/distinfo                                   1.9

---
   Module Name:    pkgsrc
   Committed By:   taca
   Date:           Sun Apr 24 14:39:32 UTC 2022

   Modified Files:
           pkgsrc/textproc/ruby-yajl: Makefile PLIST distinfo

   Log Message:
   textproc/ruby-yajl: update to 1.4.2

   1.4.2 (2022-04-04)

   No release note nor proper changelog.  But there is security fix.

   Please refer
   <https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm>
   in detail.
2022-05-07 10:01:18 +00:00
bsiegert f4fb1a9594 tickets #6620 and #6621 2022-04-23 19:04:59 +00:00
bsiegert c695fd2804 Pullup ticket #6621 - requested by nia
devel/afl++: ARM build fix

Revisions pulled up:
- devel/afl++/Makefile                                          1.3
- devel/afl++/PLIST                                             1.2

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sun Apr 17 07:34:46 UTC 2022

   Modified Files:
   	pkgsrc/devel/afl++: Makefile PLIST

   Log Message:
   afl++: fix PLIST on aarch64
2022-04-23 19:04:36 +00:00
bsiegert 0a33a4411f Pullup ticket #6620 - requested by nia
multimedia/pitivi: build fix

Revisions pulled up:
- multimedia/pitivi/Makefile                                    1.67
- multimedia/pitivi/PLIST                                       1.8
- multimedia/pitivi/distinfo                                    1.9
- multimedia/pitivi/patches/patch-meson.build                   1.2

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sun Apr 17 07:18:06 UTC 2022

   Modified Files:
   	pkgsrc/multimedia/pitivi: Makefile PLIST distinfo
   	pkgsrc/multimedia/pitivi/patches: patch-meson.build

   Log Message:
   pitivi: Adapt to new gst-plugins world. Fixes build.
2022-04-23 19:04:05 +00:00
spz ed674c21e2 Tickets #6613 - #6619 2022-04-16 10:17:03 +00:00
spz 561a48eaa9 Pullup ticket #6619 - requested by gutteridge
devel/git-base: security update
devel/git: security update

Revisions pulled up:
- devel/git-base/distinfo                                       1.117
- devel/git/Makefile.version                                    1.103

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   gutteridge
   Date:           Thu Apr 14 23:39:21 UTC 2022

   Modified Files:
           pkgsrc/devel/git: Makefile.version
           pkgsrc/devel/git-base: distinfo

   Log Message:
   git: update to 2.35.3

   Includes a fix for CVE-2022-24765. Addresses PR pkg/56796 from
   Eric N Vander Weele.

   Git v2.35.2 Release Notes
   ============
   This release merges up the fixes that appear in v2.30.3,
   v2.31.2, v2.32.1, v2.33.2 and v2.34.2 to address the security
   issue CVE-2022-24765; see the release notes for these versions
   for details.

   Release notes for 2.35.3 simply state:

   This release merges up the fixes that appear in v2.35.3.


   To generate a diff of this commit:
   cvs rdiff -u -r1.102 -r1.103 pkgsrc/devel/git/Makefile.version
   cvs rdiff -u -r1.116 -r1.117 pkgsrc/devel/git-base/distinfo
2022-04-16 10:16:11 +00:00
spz c7fc063b4f Pullup ticket #6618 - requested by taca
lang/ruby31-base: security update

Revisions pulled up:
- lang/ruby/rubyversion.mk                                      1.249
- lang/ruby31-base/distinfo                                     1.3

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Apr 12 15:12:13 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rubyversion.mk
   	pkgsrc/lang/ruby31-base: distinfo

   Log Message:
   lang/ruby31-base: update to 3.1.2

   Ruby 3.1.2 has been released.

   This release includes security fixes.  Please check the topics below for
   details.

   * CVE-2022-28738: Double free in Regexp compilation
   * CVE-2022-28739: Buffer overrun in String-to-Float conversion

   See the commit logs for further details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.248 -r1.249 pkgsrc/lang/ruby/rubyversion.mk
   cvs rdiff -u -r1.2 -r1.3 pkgsrc/lang/ruby31-base/distinfo
2022-04-16 09:41:21 +00:00
spz 1d1f048bb2 Pullup ticket #6617 - requested by taca
lang/ruby30-base: security update

Revisions pulled up:
- lang/ruby/rubyversion.mk                                      1.248
- lang/ruby30-base/Makefile                                     1.6
- lang/ruby30-base/PLIST                                        1.7
- lang/ruby30-base/distinfo                                     1.8
- lang/ruby30/Makefile                                          1.3

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Apr 12 14:52:27 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rubyversion.mk
   	pkgsrc/lang/ruby30: Makefile
   	pkgsrc/lang/ruby30-base: Makefile PLIST distinfo

   Log Message:
   lang/ruby30-base: update to 3.0.4

   Ruby 3.0.4 has been released.

   This release includes security fixes.  Please check the topics below for
   details.

   * CVE-2022-28738: Double free in Regexp compilation
   * CVE-2022-28739: Buffer overrun in String-to-Float conversion

   See the commit logs for further details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.247 -r1.248 pkgsrc/lang/ruby/rubyversion.mk
   cvs rdiff -u -r1.2 -r1.3 pkgsrc/lang/ruby30/Makefile
   cvs rdiff -u -r1.5 -r1.6 pkgsrc/lang/ruby30-base/Makefile
   cvs rdiff -u -r1.6 -r1.7 pkgsrc/lang/ruby30-base/PLIST
   cvs rdiff -u -r1.7 -r1.8 pkgsrc/lang/ruby30-base/distinfo
2022-04-16 09:23:40 +00:00
spz 991b768f98 Pullup ticket #6616 - requested by taca
lang/ruby27: security update

Revisions pulled up:
- lang/ruby/rubyversion.mk                                      1.247
- lang/ruby27-base/Makefile                                     1.9
- lang/ruby27-base/distinfo                                     1.10
- lang/ruby27/Makefile                                          1.3

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Apr 12 14:21:00 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rubyversion.mk
   	pkgsrc/lang/ruby27: Makefile
   	pkgsrc/lang/ruby27-base: Makefile distinfo

   Log Message:
   lang/ruby27-base: update to 2.6.7

   Ruby 2.7.6 has been released.

   This release includes a security fix.  Please check the topics below for
   details.

   CVE-2022-28739: Buffer overrun in String-to-Float conversion

   This release also includes some bug fixes.  See the commit logs for further
   details.

   After thies release, we end the normal maintenance phase of Ruby 2.7, and
   Ruby 2.7 enters the security maintenance phase.  This means that we will no
   longer backport any bug fixes to Ruby 2.7 excpet security fixes.  Ther term
   of the security maintenance pahse is scheduled for a year.  Ruby 2.7 reaches
   EOL and its official support ends by the end of the security maintenance
   phase.  Therefore, we recommend that you start to plan upgrade to Ruby 3.0
   or 3.1.


   To generate a diff of this commit:
   cvs rdiff -u -r1.246 -r1.247 pkgsrc/lang/ruby/rubyversion.mk
   cvs rdiff -u -r1.2 -r1.3 pkgsrc/lang/ruby27/Makefile
   cvs rdiff -u -r1.8 -r1.9 pkgsrc/lang/ruby27-base/Makefile
   cvs rdiff -u -r1.9 -r1.10 pkgsrc/lang/ruby27-base/distinfo
2022-04-16 09:10:21 +00:00
spz 3495f6898d Pullup ticket #6615 - requested by taca
lang/ruby26-base: security-update

Revisions pulled up:
- lang/ruby/rubyversion.mk                                      1.246
- lang/ruby26-base/Makefile                                     1.17
- lang/ruby26-base/distinfo                                     1.16
- lang/ruby26/Makefile                                          1.6

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Apr 12 14:16:44 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby26: Makefile
   	pkgsrc/lang/ruby26-base: Makefile distinfo

   Log Message:
   lang/ruby26-base: update to 2.6.10

   Here is release announce:

   Ruby 2.6.10 has been released.

   This release includes a security fix.  Please check the topics below for
   details.

   	CVE-2022-28739: Buffer overrun in String-to-Float conversion

   This release also includes a fix of a build problem with very old compilers
   and a fix of a regression of date library.  See the commit logs for further
   details.

   After this release, Ruby 2.6 reaches EOL.  In other words, this is expected
   to be the last release of Ruby 2.6 series.  We will not release Ruby 2.6.11
   even if a security vulnerability is found (but ocould release if a severe
   regression is found).  We recommend all Ruby 2.6 users to start migration to
   Ruby 3.1, 3.0, or 2.7 immediately.


   To generate a diff of this commit:
   cvs rdiff -u -r1.5 -r1.6 pkgsrc/lang/ruby26/Makefile
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/lang/ruby26-base/Makefile
   cvs rdiff -u -r1.15 -r1.16 pkgsrc/lang/ruby26-base/distinfo

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Apr 12 14:19:26 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rubyversion.mk

   Log Message:
   lang/ruby: forgot to commit for 2.6.10


   To generate a diff of this commit:
   cvs rdiff -u -r1.245 -r1.246 pkgsrc/lang/ruby/rubyversion.mk
2022-04-16 08:59:30 +00:00
spz db13faccd8 Pullup ticket #6613 - requested by bsiegert
devel/java-subversion: security update
devel/p5-subversion: security update
devel/py-subversion: security update
devel/ruby-subversion: security update
devel/subversion-base: security update
devel/subversion: security update

Revisions pulled up:
- devel/java-subversion/Makefile                                1.62
- devel/p5-subversion/Makefile                                  1.122
- devel/py-subversion/Makefile                                  1.95
- devel/ruby-subversion/Makefile                                1.84
- devel/subversion-base/Makefile                                1.130
- devel/subversion/Makefile                                     1.68
- devel/subversion/Makefile.version                             1.88
- devel/subversion/distinfo                                     1.119

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Tue Apr 12 16:24:29 UTC 2022

   Modified Files:
           pkgsrc/devel/java-subversion: Makefile
           pkgsrc/devel/p5-subversion: Makefile
           pkgsrc/devel/py-subversion: Makefile
           pkgsrc/devel/ruby-subversion: Makefile
           pkgsrc/devel/subversion: Makefile.version distinfo
           pkgsrc/devel/subversion-base: Makefile

   Log Message:
   subversion: update to 1.4.2 (security).

   HIS RELEASE CONTAINS TWO IMPORTANT SECURITY FIXES:

   CVE-2021-28544
   "SVN authz protected copyfrom paths regression"

   The full security advisory for CVE-2021-28544 is available at:
       https://subversion.apache.org/security/CVE-2021-28544-advisory.txt
       https://subversion.apache.org/security/CVE-2021-28544-advisory.txt.asc

   A brief summary of this advisory follows:

      Subversion servers reveal 'copyfrom' paths that should be hidden according to
      configured path-based authorization (authz) rules.  When a node has been
      copied from a protected location, users with access to the copy can see the
      `copyfrom' path of the original.  This also reveals the fact that
      the node was copied.
      Only the 'copyfrom' path is revealed; not its contents. Both httpd
      and svnserve
      servers are vulnerable.

      We recommend all users to upgrade to a known fixed release of the
      Subversion server.

      This issue was reported by Evgeny Kotkov

   CVE-2022-24070
   "Subversion's mod_dav_svn is vulnerable to memory corruption"

   The full security advisory for CVE-2022-24070 is available at:
       https://subversion.apache.org/security/CVE-2022-24070-advisory.txt
       https://subversion.apache.org/security/CVE-2022-24070-advisory.txt.asc

   A brief summary of this advisory follows:

      While looking up path-based authorization rules, mod_dav_svn servers
      may attempt to use memory which has already been freed.

      We recommend all users to upgrade to a known fixed release of the
      Subversion server.

      This issue was reported by Thomas Weißschuh


   To generate a diff of this commit:
   cvs rdiff -u -r1.61 -r1.62 pkgsrc/devel/java-subversion/Makefile
   cvs rdiff -u -r1.121 -r1.122 pkgsrc/devel/p5-subversion/Makefile
   cvs rdiff -u -r1.94 -r1.95 pkgsrc/devel/py-subversion/Makefile
   cvs rdiff -u -r1.83 -r1.84 pkgsrc/devel/ruby-subversion/Makefile
   cvs rdiff -u -r1.87 -r1.88 pkgsrc/devel/subversion/Makefile.version
   cvs rdiff -u -r1.118 -r1.119 pkgsrc/devel/subversion/distinfo
   cvs rdiff -u -r1.129 -r1.130 pkgsrc/devel/subversion-base/Makefile

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   wiz
   Date:           Tue Apr 12 21:40:36 UTC 2022

   Modified Files:
           pkgsrc/devel/subversion: Makefile

   Log Message:
   subversion: reset PKGREVISION after update


   To generate a diff of this commit:
   cvs rdiff -u -r1.67 -r1.68 pkgsrc/devel/subversion/Makefile
2022-04-16 08:40:44 +00:00
spz 27365b2f62 Pullup ticket #6614 - requested by tron
mail/mutt: security update

Revisions pulled up:
- mail/mutt/Makefile                                            1.259
- mail/mutt/distinfo                                            1.107

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	tron
   Date:		Wed Apr 13 08:24:37 UTC 2022

   Modified Files:
   	pkgsrc/mail/mutt: Makefile distinfo

   Log Message:
   mutt: Update to version 2.2.3

   This is a bug-fix release, addressing CVE-2022-1328: a buffer overread in
   the uuencoded decoder routine.

   Also fixed were a possible integer overflow issue in the general iconv and
   rfc2047-conversion iconv functions. These are not believed to be
   exploitable.


   To generate a diff of this commit:
   cvs rdiff -u -r1.258 -r1.259 pkgsrc/mail/mutt/Makefile
   cvs rdiff -u -r1.106 -r1.107 pkgsrc/mail/mutt/distinfo
2022-04-16 05:03:19 +00:00
bsiegert bf1ca0c728 Pullup ticket #6612 2022-04-13 07:17:05 +00:00
bsiegert 38fa109f93 Pullup ticket #6612 - requested by nia
www/firefox91: security fix
www/firefox91-l10n: dependent update

Revisions pulled up:
- www/firefox91-l10n/Makefile                                   1.10
- www/firefox91-l10n/distinfo                                   1.12
- www/firefox91/Makefile                                        1.16
- www/firefox91/distinfo                                        1.12

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sun Apr 10 13:43:44 UTC 2022

   Modified Files:
   	pkgsrc/www/firefox91: Makefile distinfo
   	pkgsrc/www/firefox91-l10n: Makefile distinfo

   Log Message:
   firefox91: update to 91.8.0

   Security Vulnerabilities fixed in Firefox ESR 91.8

   #CVE-2022-1097: Use-after-free in NSSToken objects

   #CVE-2022-28281: Out of bounds write due to unexpected WebAuthN Extensions

   #CVE-2022-1196: Use-after-free after VR Process destruction

   #CVE-2022-28282: Use-after-free in DocumentL10n::TranslateDocument

   #CVE-2022-28285: Incorrect AliasSet used in JIT Codegen

   #CVE-2022-28286: iframe contents could be rendered outside the border

   #CVE-2022-24713: Denial of Service via complex regular expressions

   #CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
2022-04-13 07:16:36 +00:00
bsiegert f3b6c385dd The first set of pullups, up to ticket #6611 2022-04-02 09:21:06 +00:00
bsiegert 2704efc015 Pullup ticket #6611 - requested by nia
lang/ruby: NetBSD/arm build fix

Revisions pulled up:
- lang/ruby/rubyversion.mk                                      1.245

---
   Module Name:	pkgsrc
   Committed By:	nia
   Date:		Sat Apr  2 07:51:46 UTC 2022

   Modified Files:
   	pkgsrc/lang/ruby: rubyversion.mk

   Log Message:
   ruby: Do not append an ABI on NetBSD to the arch-specific extension
   directory. Failure seen in:

   http://victory.netbsd.org/pkgsrc/packages/reports/2022Q1/evbarm7-9.0/20220330.2134/ruby31-base-3.1.1/install.log
2022-04-02 09:20:32 +00:00
bsiegert 55cc510432 Pullup ticket #6610 - requested by wiz
sysutils/ioping: build fix

Revisions pulled up:
- sysutils/ioping/distinfo                                      1.8

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Tue Mar 29 17:48:53 UTC 2022

   Modified Files:
   	pkgsrc/sysutils/ioping: distinfo

   Log Message:
   ioping: fix patch checksum
2022-04-02 09:12:30 +00:00
bsiegert 9aec59bca4 Pullup ticket #6609 - requested by tnn
www/gitea: build fix

Revisions pulled up:
- www/gitea/Makefile                                            1.69
- www/gitea/distinfo                                            1.30
- www/gitea/go-modules.mk                                       1.1

---
   Module Name:	pkgsrc
   Committed By:	tnn
   Date:		Mon Mar 28 15:59:22 UTC 2022

   Modified Files:
   	pkgsrc/www/gitea: Makefile distinfo
   Added Files:
   	pkgsrc/www/gitea: go-modules.mk

   Log Message:
   gitea: don't download distfiles during build phase (convert to go-module.mk)
2022-04-02 09:12:22 +00:00
bsiegert 65d939279d Pullup ticket #6608 - requested by tnn
devel/SDL: NetBSD/i386 build fix

Revisions pulled up:
- devel/SDL/distinfo                                            1.86
- devel/SDL/patches/patch-build-scripts_strip__fPIC.sh          1.1

---
   Module Name:	pkgsrc
   Committed By:	tnn
   Date:		Mon Mar 28 14:34:13 UTC 2022

   Modified Files:
   	pkgsrc/devel/SDL: distinfo
   Added Files:
   	pkgsrc/devel/SDL/patches: patch-build-scripts_strip__fPIC.sh

   Log Message:
   SDL: fix build on NetBSD/i386

   XXX maybe pullup 2022Q1?
2022-04-01 19:05:14 +00:00
bsiegert 36d41767df Pullup ticket #6607 - requested by wiz
devel/R-tcltk2: mark as broken (infinite loop)

Revisions pulled up:
- devel/R-tcltk2/Makefile                                       1.5

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Mon Mar 28 15:51:46 UTC 2022

   Modified Files:
   	pkgsrc/devel/R-tcltk2: Makefile

   Log Message:
   R-tcltk2: mark as BROKEN

   Infinite loop during build, see PR pkg/56696.
2022-04-01 18:56:13 +00:00
wiz 844baea9aa doc: add CHANGES file for pkgsrc-2022Q1 2022-03-28 13:41:08 +00:00
152 changed files with 11876 additions and 783 deletions

View File

@ -1,9 +1,9 @@
# $NetBSD: Makefile.common,v 1.15 2022/02/19 09:57:51 nia Exp $
# $NetBSD: Makefile.common,v 1.15.2.1 2022/06/05 10:42:39 spz Exp $
#
# used by databases/mariadb105-client/Makefile
# used by databases/mariadb105-server/Makefile
DISTNAME= mariadb-10.5.15
DISTNAME= mariadb-10.5.16
CATEGORIES= databases
MASTER_SITES= https://archive.mariadb.org/${DISTNAME}/source/

View File

@ -1,10 +1,10 @@
$NetBSD: distinfo,v 1.11 2022/02/19 09:57:51 nia Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/05 10:42:39 spz Exp $
BLAKE2s (mariadb-10.5.15.tar.gz) = 947a7041705c273ca23d5882a1378077701fe7ab3b8e02a2914b5a96b9258853
SHA512 (mariadb-10.5.15.tar.gz) = ea3d99fd9ad8adc8187fb5d722ff16cde90c7cca4b3572e410814ae39e0246b7a83b4dc1e72f95de58c1c12a9563fb524dcca2dd1fb8f595cc41625a2fb0af76
Size (mariadb-10.5.15.tar.gz) = 102803624 bytes
BLAKE2s (mariadb-10.5.16.tar.gz) = bafab69afbafc1e6dc34cd8cd7a50fa9383abb5a971ecae5762bb116479c3e75
SHA512 (mariadb-10.5.16.tar.gz) = 28cea63cc3c5e1b236fb13593285e5d4b9aac5eaf259784e760def42bca8b09954510d39014a7a7c9e8656d61f5995a356df2f2ebb0df2696dd739ff3de5865d
Size (mariadb-10.5.16.tar.gz) = 105798374 bytes
SHA1 (patch-BUILD_compile-pentium32-gcov) = 89a7da728f94f19c153b4d2d2d6ba5462acc941f
SHA1 (patch-CMakeLists.txt) = 893f329ed03e01144df166debb4d902ad0304811
SHA1 (patch-CMakeLists.txt) = 574131db46854715758c60ba5f026498f5b29564
SHA1 (patch-client_CMakeLists.txt) = 8fdd8a182304f0b84e120ce95334ace23d02ce88
SHA1 (patch-extra_wolfssl_wolfssl_certs_intermediate_genintcerts.sh) = cd9a982889b88f811c3e14ebdf9795b0fa5d1fad
SHA1 (patch-include_my__global.h) = a3b831f91ba2efea9f78e70ab4f706da23b80403

View File

@ -1,19 +1,19 @@
$NetBSD: patch-CMakeLists.txt,v 1.1 2021/05/23 15:32:47 nia Exp $
$NetBSD: patch-CMakeLists.txt,v 1.1.8.1 2022/06/05 10:42:39 spz Exp $
Allow building a server-only configuration.
--- CMakeLists.txt.orig 2021-05-05 21:00:18.000000000 +0000
--- CMakeLists.txt.orig 2022-05-18 07:55:26.000000000 +0000
+++ CMakeLists.txt
@@ -421,8 +421,6 @@ ENDIF()
@@ -432,8 +432,6 @@ ENDIF()
UNSET (MYSQLD_STATIC_PLUGIN_LIBS CACHE)
-INCLUDE(mariadb_connector_c) # this does ADD_SUBDIRECTORY(libmariadb)
-
INCLUDE(cpack_tgz)
INCLUDE(cpack_rpm)
INCLUDE(cpack_deb)
@@ -432,13 +430,11 @@ MARK_AS_ADVANCED(PYTHON_SHEBANG)
@@ -444,13 +442,11 @@ MARK_AS_ADVANCED(PYTHON_SHEBANG)
# Add storage engines and plugins.
CONFIGURE_PLUGINS()
@ -27,7 +27,7 @@ Allow building a server-only configuration.
ADD_SUBDIRECTORY(extra)
ADD_SUBDIRECTORY(libservices)
ADD_SUBDIRECTORY(sql/share)
@@ -461,23 +457,26 @@ IF(NOT WITHOUT_SERVER)
@@ -476,23 +472,26 @@ IF(NOT WITHOUT_SERVER)
ADD_SUBDIRECTORY(win/upgrade_wizard)
ADD_SUBDIRECTORY(win/packaging)
ENDIF()

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.9 2021/12/10 13:29:24 nia Exp $
@comment $NetBSD: PLIST,v 1.9.4.1 2022/06/05 10:42:39 spz Exp $
bin/aria_chk
bin/aria_dump_log
bin/aria_ftdump
@ -47,6 +47,7 @@ bin/resolve_stack_dump
bin/resolveip
${PLIST.rocksdb}bin/sst_dump
${PLIST.embedded}bin/test-connect-t
bin/wsrep_sst_backup
bin/wsrep_sst_common
bin/wsrep_sst_mariabackup
bin/wsrep_sst_mysqldump
@ -352,6 +353,7 @@ share/doc/mysql/README-wsrep
share/doc/mysql/README.md
share/doc/mysql/THIRDPARTY
${PLIST.auth_pam}share/examples/mariadb_auth_pam/user_map.conf
share/mysql/bulgarian/errmsg.sys
share/mysql/charsets/Index.xml
share/mysql/charsets/README
share/mysql/charsets/armscii8.xml
@ -378,6 +380,7 @@ share/mysql/charsets/latin7.xml
share/mysql/charsets/macce.xml
share/mysql/charsets/macroman.xml
share/mysql/charsets/swe7.xml
share/mysql/chinese/errmsg.sys
share/mysql/czech/errmsg.sys
share/mysql/danish/errmsg.sys
share/mysql/dutch/errmsg.sys

View File

@ -1,9 +1,9 @@
# $NetBSD: Makefile.common,v 1.7 2022/02/19 09:13:21 nia Exp $
# $NetBSD: Makefile.common,v 1.7.2.1 2022/06/05 10:11:03 spz Exp $
#
# used by databases/mariadb106-client/Makefile
# used by databases/mariadb106-server/Makefile
DISTNAME= mariadb-10.6.7
DISTNAME= mariadb-10.6.8
CATEGORIES= databases
MASTER_SITES= https://archive.mariadb.org/${DISTNAME}/source/

View File

@ -1,10 +1,10 @@
$NetBSD: distinfo,v 1.6 2022/02/19 09:13:21 nia Exp $
$NetBSD: distinfo,v 1.6.2.1 2022/06/05 10:11:03 spz Exp $
BLAKE2s (mariadb-10.6.7.tar.gz) = 5d4b482e6e06b337ff8180a2fe8b94b8e9f1cc1cea6b7dfe89eaa05c56eab701
SHA512 (mariadb-10.6.7.tar.gz) = 2d26f56ea5f39b800a6f279c8411d4091b4f4d3acbf3ea1864068328d34a1437e7c46c08d3772009357fd89602e58f214266038e177c0a4fac914a5e5d01e3e6
Size (mariadb-10.6.7.tar.gz) = 85882896 bytes
BLAKE2s (mariadb-10.6.8.tar.gz) = cef1165c096ddb486ac4eba76720639d66cea9c844ab5702f5a8b1a213898380
SHA512 (mariadb-10.6.8.tar.gz) = b4327000eb3e5fc75bbd78de9890b0464217a432c8aac744948af94e092ffeef1f101885b81ec49029900a92b0018838e46efcf225056a9b06f35a04ecf26aab
Size (mariadb-10.6.8.tar.gz) = 88794744 bytes
SHA1 (patch-BUILD_compile-pentium32-gcov) = 89a7da728f94f19c153b4d2d2d6ba5462acc941f
SHA1 (patch-CMakeLists.txt) = ea2f334ff1743e1676fe73e9946d0759c68e1d31
SHA1 (patch-CMakeLists.txt) = 042d9d361a5c3ff7e7df15f5de4a30eb7984cddd
SHA1 (patch-client_CMakeLists.txt) = 8fdd8a182304f0b84e120ce95334ace23d02ce88
SHA1 (patch-extra_wolfssl_wolfssl_certs_intermediate_genintcerts.sh) = cd9a982889b88f811c3e14ebdf9795b0fa5d1fad
SHA1 (patch-include_my__global.h) = a3b831f91ba2efea9f78e70ab4f706da23b80403
@ -14,7 +14,7 @@ SHA1 (patch-scripts_mysqld__safe.sh) = 4124e4c8df1527049f5eec9f3d2d4bbe80e7c33f
SHA1 (patch-sql_mysqld.cc) = 19d325124cde1b45376c9710cdd104dc460f4bea
SHA1 (patch-storage_connect_ioapi.c) = 804e2d9d3722fbe4d5ed773cc98a4114fe4cf8a3
SHA1 (patch-storage_connect_tabvct.cpp) = 2e3c7cd7e4b0a86d443da47d3cc514b8b276d836
SHA1 (patch-storage_innobase_include_transactional__lock__guard.h) = e47938072cdbd5c21d24622d8550b2c127fbb9df
SHA1 (patch-storage_innobase_include_transactional__lock__guard.h) = d5ff507acdd21858791246ef5a2559e653cb7833
SHA1 (patch-storage_rocksdb_rdb__io__watchdog.cc) = 85ee5007cfda0d3070ec20b2b774738b01f8e083
SHA1 (patch-storage_rocksdb_rdb__io__watchdog.h) = d790c092d7d35d014c5ef209635c18614c3a8301
SHA1 (patch-storage_rocksdb_rocksdb_Makefile) = 67ea4d154f4f623fdca739f50b236c973e118a12

View File

@ -1,19 +1,19 @@
$NetBSD: patch-CMakeLists.txt,v 1.2 2021/11/27 23:40:28 nia Exp $
$NetBSD: patch-CMakeLists.txt,v 1.2.4.1 2022/06/05 10:11:03 spz Exp $
Allow building a server-only configuration.
--- CMakeLists.txt.orig 2021-11-05 20:03:29.000000000 +0000
--- CMakeLists.txt.orig 2022-05-18 08:34:14.000000000 +0000
+++ CMakeLists.txt
@@ -418,8 +418,6 @@ ENDIF()
@@ -421,8 +421,6 @@ ENDIF()
UNSET (MYSQLD_STATIC_PLUGIN_LIBS CACHE)
-INCLUDE(mariadb_connector_c) # this does ADD_SUBDIRECTORY(libmariadb)
-
INCLUDE(cpack_tgz)
INCLUDE(cpack_rpm)
INCLUDE(cpack_deb)
@@ -429,19 +427,16 @@ MARK_AS_ADVANCED(PYTHON_SHEBANG)
@@ -433,19 +431,16 @@ MARK_AS_ADVANCED(PYTHON_SHEBANG)
# Add storage engines and plugins.
CONFIGURE_PLUGINS()
@ -33,7 +33,7 @@ Allow building a server-only configuration.
ADD_SUBDIRECTORY(sql)
OPTION (WITH_EMBEDDED_SERVER "Compile MariaDB with embedded server" OFF)
IF(WITH_EMBEDDED_SERVER)
@@ -460,23 +455,26 @@ IF(NOT WITHOUT_SERVER)
@@ -464,23 +459,26 @@ IF(NOT WITHOUT_SERVER)
ADD_SUBDIRECTORY(win/upgrade_wizard)
ADD_SUBDIRECTORY(win/packaging)
ENDIF()
@ -65,7 +65,7 @@ Allow building a server-only configuration.
ENDIF()
# minimal target to build only binaries for export
ADD_CUSTOM_TARGET(import_executables DEPENDS ${EXPORTED})
@@ -557,41 +555,3 @@ IF(NON_DISTRIBUTABLE_WARNING)
@@ -561,41 +559,3 @@ IF(NON_DISTRIBUTABLE_WARNING)
MESSAGE(WARNING "
You have linked MariaDB with ${NON_DISTRIBUTABLE_WARNING} libraries! You may not distribute the resulting binary. If you do, you will put yourself into a legal problem with the Free Software Foundation.")
ENDIF()

View File

@ -1,13 +1,13 @@
$NetBSD: patch-storage_innobase_include_transactional__lock__guard.h,v 1.2 2022/02/19 09:13:21 nia Exp $
$NetBSD: patch-storage_innobase_include_transactional__lock__guard.h,v 1.2.2.1 2022/06/05 10:11:03 spz Exp $
Strange build failures on NetBSD:
error: 'rw_lock' is not an accessible base of 'page_hash_latch'
--- storage/innobase/include/transactional_lock_guard.h.orig 2022-02-10 20:17:09.000000000 +0000
--- storage/innobase/include/transactional_lock_guard.h.orig 2022-05-18 08:34:16.000000000 +0000
+++ storage/innobase/include/transactional_lock_guard.h
@@ -21,12 +21,6 @@ this program; if not, write to the Free
#if defined __powerpc64__ && defined __clang__ && defined __linux__
#elif defined __powerpc64__&&defined __GNUC__&&defined __linux__&&__GNUC__ > 4
#if defined __powerpc64__
#elif defined __s390__
#elif defined _MSC_VER && (defined _M_IX86 || defined _M_X64) && !defined(__clang__)
-#elif defined __GNUC__ && (defined __i386__ || defined __x86_64__)
-# if __GNUC__ >= 8

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.6 2021/12/10 13:29:24 nia Exp $
@comment $NetBSD: PLIST,v 1.6.4.1 2022/06/05 10:11:04 spz Exp $
bin/aria_chk
bin/aria_dump_log
bin/aria_ftdump
@ -43,6 +43,7 @@ bin/resolve_stack_dump
bin/resolveip
${PLIST.rocksdb}bin/sst_dump
${PLIST.embedded}bin/test-connect-t
bin/wsrep_sst_backup
bin/wsrep_sst_common
bin/wsrep_sst_mariabackup
bin/wsrep_sst_mysqldump
@ -352,6 +353,7 @@ share/doc/mysql/README-wsrep
share/doc/mysql/README.md
share/doc/mysql/THIRDPARTY
${PLIST.auth_pam}share/examples/mariadb_auth_pam/user_map.conf
share/mysql/bulgarian/errmsg.sys
share/mysql/charsets/Index.xml
share/mysql/charsets/README
share/mysql/charsets/armscii8.xml
@ -378,6 +380,7 @@ share/mysql/charsets/latin7.xml
share/mysql/charsets/macce.xml
share/mysql/charsets/macroman.xml
share/mysql/charsets/swe7.xml
share/mysql/chinese/errmsg.sys
share/mysql/czech/errmsg.sys
share/mysql/danish/errmsg.sys
share/mysql/dutch/errmsg.sys

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:27 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:30 spz Exp $
BLAKE2s (activerecord-5.2.6.3.gem) = 155795632dd27fadac7e1be0d54d306d023ab149b77b72123870cc8b71acccaf
SHA512 (activerecord-5.2.6.3.gem) = 3eb34df2814bf1d636bf45ca47778564ac678c45e205365c8d4f029ad22d75ce7c2dd6ab143e058473e174238fe73014bf590c312f5eec0b1bb258977636fc36
Size (activerecord-5.2.6.3.gem) = 358400 bytes
BLAKE2s (activerecord-5.2.7.1.gem) = 8e3b9047e8458a76a41c8965cbcb5de6048937ad12f80f75252ba37d190d86d1
SHA512 (activerecord-5.2.7.1.gem) = 1b721469a883f1dc1a56cecace67d348fb7da5171bb33c5a8decb8748076779d674bfa0562085139889776092d3ae0960ef4fb8d87a40ea9c1987a4118561b8e
Size (activerecord-5.2.7.1.gem) = 358400 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:02 spz Exp $
BLAKE2s (activerecord-6.0.4.7.gem) = 8f55665fb71cd650a1930d78a59c71f6c28cf194b1d87190b6d6e02539a45249
SHA512 (activerecord-6.0.4.7.gem) = 0222a7bfc4a7cd9f33765eb3b482ca6df049cfa795cd4533733ec7352f5555ec5b77d35f299fa3382dc84ec669eb3297a8e82741c64f4f99fbc2ac3a3e9e0e66
Size (activerecord-6.0.4.7.gem) = 410624 bytes
BLAKE2s (activerecord-6.0.4.8.gem) = 853f210c909cc70e0d646dbc95cdeb49ddc9fa4e81c5dca3b5596aa73f7733de
SHA512 (activerecord-6.0.4.8.gem) = 23761be90d479be5d8c8b9276f4bd47e5ec661009de0abda085c17f9ed92f9e59ddb9d661d1736371165116753cbd28cb46695b8553c3946dda127b550624252
Size (activerecord-6.0.4.8.gem) = 410624 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:51 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:41 spz Exp $
BLAKE2s (activerecord-6.1.4.7.gem) = b8ce61e4baaa9099c3c22605bfd8d11cbeb31217e74182f75f3097fbfc1209c4
SHA512 (activerecord-6.1.4.7.gem) = 371b9832b7c264b859b4baed54672da4d00127fc5fb1728d81bcc15d28335bfeaf7bf69114e69e2d5b5285de932efd9d88e93e2e35281f92e0490626824ec8d8
Size (activerecord-6.1.4.7.gem) = 430592 bytes
BLAKE2s (activerecord-6.1.5.1.gem) = a0af64fdab45ecf8a5407b332056daced301fad947094a988b10507f7e890f67
SHA512 (activerecord-6.1.5.1.gem) = 2aa385079e34065185997605345380a2cda70d9770c2b5501af6de3e77574edf48b6694052957d6bd9b3bf8f67c461ed47abaff87f81a9216115933e77e2acc4
Size (activerecord-6.1.5.1.gem) = 432128 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:04 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:10 spz Exp $
BLAKE2s (activerecord-7.0.2.3.gem) = f543c770c820966029419def6c96990cdcda846a53b16e03f629b46bd704536e
SHA512 (activerecord-7.0.2.3.gem) = bd395d46897532c13dbf9443769e133c1a4f55400caa4577592166f1a81b6fdb30e4b025c1711124c36bc323f5807ea5f245e74de7cd9c73459b8a0aeadbf14a
Size (activerecord-7.0.2.3.gem) = 473088 bytes
BLAKE2s (activerecord-7.0.2.4.gem) = dd60eecad26616c746e40c85a1364cd28713405250da039923099d9e7ffe1b04
SHA512 (activerecord-7.0.2.4.gem) = 7d5bb169a09ace9c0222ef4619b8938ebd97cbd9ff1769badfe8f080247f59def0ac989ed527d44d81b017b16e7b213f8d5fd1c8188d9686864c464e67e61cb7
Size (activerecord-7.0.2.4.gem) = 473088 bytes

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.4 2020/12/04 20:45:05 nia Exp $
# $NetBSD: Makefile,v 1.4.12.1 2022/04/01 18:56:13 bsiegert Exp $
R_PKGNAME= tcltk2
R_PKGVER= 1.2-11
@ -9,6 +9,8 @@ MAINTAINER= pkgsrc-users@NetBSD.org
COMMENT= Tcl/Tk additions
LICENSE= gnu-lgpl-v3 # + file LICENSE
BROKEN= "Infinite loop during build, see pkg/56696"
USE_LANGUAGES= # none
REPLACE_PYTHON+= inst/tklibs/ttktheme_clearlooks/create_imgs.py

View File

@ -1,10 +1,11 @@
$NetBSD: distinfo,v 1.85 2021/10/26 10:14:10 nia Exp $
$NetBSD: distinfo,v 1.85.4.1 2022/04/01 19:05:14 bsiegert Exp $
BLAKE2s (SDL-1.2.15.tar.gz) = 4c189e4973635d37bbc9a4d87512bbbeb950d49c4862bc59f1bf2c37b9c54cc7
SHA512 (SDL-1.2.15.tar.gz) = ac392d916e6953b0925a7cbb0f232affea33339ef69b47a0a7898492afb9784b93138986df53d6da6d3e2ad79af1e9482df565ecca30f89428be0ae6851b1adc
Size (SDL-1.2.15.tar.gz) = 3920622 bytes
SHA1 (patch-aa) = 00fb7a85caf8fc9f08298d0a07a4587757fdffb0
SHA1 (patch-ac) = 8b2dddff9ad449b19b35ef364e2d960e46284563
SHA1 (patch-build-scripts_strip__fPIC.sh) = 51a6271cadac350a76b6e556727e27955067afb5
SHA1 (patch-src_audio_SDL__wave.c) = ff42d973c9c5a7643ffa5acb248e15e821d2145f
SHA1 (patch-src_audio_bsd_SDL__bsdaudio.c) = 7f5fbf4d839e52fce028810dc807b404fcd51442
SHA1 (patch-src_audio_dma_SDL__dmaaudio.c) = cede64d04e8872b11851bfcacbc99059df973881

View File

@ -0,0 +1,19 @@
$NetBSD: patch-build-scripts_strip__fPIC.sh,v 1.1.2.2 2022/04/01 19:05:15 bsiegert Exp $
strip -pie for nasm
--- build-scripts/strip_fPIC.sh.orig 2012-01-19 06:30:05.000000000 +0000
+++ build-scripts/strip_fPIC.sh
@@ -8,6 +8,12 @@ while [ $# -gt 0 ]; do
-fPIC)
# Ignore -fPIC option
;;
+ -pie)
+ # Ignore -pie option for nasm
+ if echo "${command}" | grep -v "^ [^ ]*nasm " > /dev/null; then
+ command="$command $1"
+ fi
+ ;;
-fno-common)
# Ignore -fPIC and -DPIC options
;;

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.2 2022/03/19 08:35:18 wiz Exp $
# $NetBSD: Makefile,v 1.2.2.1 2022/04/23 19:04:36 bsiegert Exp $
DISTNAME= AFLplusplus-2.62c
PKGNAME= ${DISTNAME:C/AFLplusplus/afl++/}
@ -33,4 +33,11 @@ REPLACE_SH+= afl-plot
REPLACE_BASH+= afl-cmin
REPLACE_BASH+= afl-cmin.bash
.include "../../mk/bsd.prefs.mk"
PLIST_VARS+= amd64
.if ${MACHINE_ARCH} == "x86_64"
PLIST.amd64= yes
.endif
.include "../../mk/bsd.pkg.mk"

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.1 2020/04/17 17:51:09 wiz Exp $
@comment $NetBSD: PLIST,v 1.1.16.1 2022/04/23 19:04:36 bsiegert Exp $
bin/afl-analyze
bin/afl-clang
bin/afl-clang++
@ -14,11 +14,11 @@ bin/afl-system-config
bin/afl-tmin
bin/afl-whatsup
lib/afl/afl-as
lib/afl/argvfuzz32.so
lib/afl/argvfuzz64.so
${PLIST.amd64}lib/afl/argvfuzz32.so
${PLIST.amd64}lib/afl/argvfuzz64.so
lib/afl/as
lib/afl/socketfuzz32.so
lib/afl/socketfuzz64.so
${PLIST.amd64}lib/afl/socketfuzz32.so
${PLIST.amd64}lib/afl/socketfuzz64.so
man/man8/afl-analyze.8
man/man8/afl-as.8
man/man8/afl-cmin.8

View File

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.116 2022/01/31 13:03:42 adam Exp $
$NetBSD: distinfo,v 1.116.2.1 2022/04/16 10:16:11 spz Exp $
BLAKE2s (git-2.35.1.tar.xz) = 6c607fc9eba2e931f2721fe4fb767e79b9bccb20341560735651d76f1ace9a29
SHA512 (git-2.35.1.tar.xz) = 926c6813ef61931e1a1c43dfd7b15e20dc5878c1752876bd08f039249c9ed09f20f096b2f01947de9c9522c942e9fa8c1363d7d31a488bbe3f93c0cff31fcbcb
Size (git-2.35.1.tar.xz) = 6874520 bytes
BLAKE2s (git-2.35.3.tar.xz) = 5dac9bc0177f534465a8345eace089a59da9774ea3414aeae12ae324983e6efe
SHA512 (git-2.35.3.tar.xz) = c92f8663988c57702bb5ee542ac8f36e8a43d377d16106ee462ce0b0a575b9d51baaafc654bf1821fbea2fe476ffd64d7fb87084c7de4dd8065b01d5083492c5
Size (git-2.35.3.tar.xz) = 6876328 bytes
SHA1 (patch-Documentation_Makefile) = 6025adac0fbb4b403f3954e6dac9d690dfb22daa
SHA1 (patch-Makefile) = e3e07365a22c8612e0f5ff3b7befb2bdd788dfb8
SHA1 (patch-config.mak.uname) = 5316873147acf5b6ef29e426946280bb6441c886

View File

@ -1,7 +1,7 @@
# $NetBSD: Makefile.version,v 1.102 2022/01/31 13:03:42 adam Exp $
# $NetBSD: Makefile.version,v 1.102.2.1 2022/04/16 10:16:11 spz Exp $
#
# used by devel/git/Makefile.common
# used by devel/git-cvs/Makefile
# used by devel/git-svn/Makefile
GIT_VERSION= 2.35.1
GIT_VERSION= 2.35.3

View File

@ -1,7 +1,6 @@
# $NetBSD: Makefile,v 1.61 2021/12/08 16:03:59 adam Exp $
# $NetBSD: Makefile,v 1.61.4.1 2022/04/16 08:40:44 spz Exp $
PKGNAME= java-subversion-${SVNVER}
PKGREVISION= 3
COMMENT= Java bindings for Subversion
MAKE_JOBS_SAFE= no

View File

@ -1,13 +1,13 @@
$NetBSD: patch-aa,v 1.1.1.1 2009/04/18 02:27:21 rh Exp $
$NetBSD: patch-aa,v 1.1 2009/04/18 02:19:23 rh Exp $
--- GNUmakefile.orig 2009-04-18 11:56:31.000000000 +1000
--- GNUmakefile.orig 2009-04-18 10:49:03.000000000 +1000
+++ GNUmakefile
@@ -38,7 +38,7 @@ GNUSTEP_INSTALLATION_DOMAIN = SYSTEM
include $(GNUSTEP_MAKEFILES)/common.make
include ./Version
-SUBPROJECTS = Foundation Resources examples
+SUBPROJECTS = examples
+SUBPROJECTS = Foundation Resources
include $(GNUSTEP_MAKEFILES)/aggregate.make

View File

@ -1,7 +1,6 @@
# $NetBSD: Makefile,v 1.121 2021/12/08 16:04:04 adam Exp $
# $NetBSD: Makefile,v 1.121.4.1 2022/04/16 08:40:44 spz Exp $
PKGNAME= p5-subversion-${SVNVER}
PKGREVISION= 3
COMMENT= Perl bindings for Subversion
.include "../../devel/subversion/Makefile.common"

View File

@ -1,7 +1,6 @@
# $NetBSD: Makefile,v 1.94 2021/12/08 16:04:05 adam Exp $
# $NetBSD: Makefile,v 1.94.4.1 2022/04/16 08:40:44 spz Exp $
PKGNAME= ${PYPKGPREFIX}-subversion-${SVNVER}
PKGREVISION= 3
COMMENT= Python bindings and tools for Subversion
.include "../../devel/subversion/Makefile.common"

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:26 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:30 spz Exp $
BLAKE2s (activejob-5.2.6.3.gem) = ae28b7d9f32eb474ebd041c252c009a2edfebe88794cac92445a3ef930865180
SHA512 (activejob-5.2.6.3.gem) = 8aa99e428a6ce9afe7512e37529dbb7659f0a32b9aaf33985400505d97b265628108131c589d6dfacb49d8504e5eb51115b595818d383a0fb104e13cee3c685b
Size (activejob-5.2.6.3.gem) = 26624 bytes
BLAKE2s (activejob-5.2.7.1.gem) = 59d51f77072d5a2c67b936e0541f22d794572314903239ecba1595a6e8237414
SHA512 (activejob-5.2.7.1.gem) = 47730b7609c93f888610ba872182ac0a24855adfba59794d6bb112f449e71aa709d8805084aaf02774ff79daf7a21e8329cce674c8a0b44cd02a0f80c35843ae
Size (activejob-5.2.7.1.gem) = 26624 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:02 spz Exp $
BLAKE2s (activejob-6.0.4.7.gem) = 0747327d6067c7e8a961ce62217f695ab58ad495bbc7d7364d47abfa7cce1864
SHA512 (activejob-6.0.4.7.gem) = 422a3f930f8b361b1c0d36080944eded3984492c3de96ca55f8fe4a322e09176b08c1fd561c68ff7ee10ae7a8afbf955369de4494c8a0e350afaec64e5ed595c
Size (activejob-6.0.4.7.gem) = 31744 bytes
BLAKE2s (activejob-6.0.4.8.gem) = 4b68a5f8b416e527135167401718c7cacc989b16a63f355488295a5940fdd879
SHA512 (activejob-6.0.4.8.gem) = 095a65b1e7e3372a5e9609a6b47b9787ebebde04705d79da22c17644ec8c8a56a92c6d3fffcd638055f81f79120484ca87c6cd2ca6d2c865c0a1495cb2414a29
Size (activejob-6.0.4.8.gem) = 31744 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:50 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:41 spz Exp $
BLAKE2s (activejob-6.1.4.7.gem) = 0f7db5ef5b8cf5031a143fd20906c4e188ba344390830e05883fd36ac2fecf4d
SHA512 (activejob-6.1.4.7.gem) = b4ef6cf7a84302490a040efb4a7519d3f4452cbc1b5f13b4e83d0ee851dae111604b2a8211e6292668348afb429e2c4a9acd0013a6798f685964fd27e7857bde
Size (activejob-6.1.4.7.gem) = 32768 bytes
BLAKE2s (activejob-6.1.5.1.gem) = af53c43fbc9df1b47ab93c323880d46fc726fa5f0fe3b92e87218eddd4432867
SHA512 (activejob-6.1.5.1.gem) = b3961cc784e6ebf7799db312e305f8fa679c773d65fff12a7459b3798e3c689f449db1823e9f20ec2a56074df3bb12ade2b9e9c55c951d8e7bd5f0e7c71ec66c
Size (activejob-6.1.5.1.gem) = 32768 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:03 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:10 spz Exp $
BLAKE2s (activejob-7.0.2.3.gem) = 563954d88e0a1b9e1412dd90b551eb3192e8755bac2ecc35b441b80fb904bc72
SHA512 (activejob-7.0.2.3.gem) = 96d5b9d6d9c69242d5e8a02c125085e2fd06b218171721f40d5127ce9105876c71f9eb95fb5d68b75ff894b8c8573c108123be66a7fa9991b264a752a7e841e3
Size (activejob-7.0.2.3.gem) = 32768 bytes
BLAKE2s (activejob-7.0.2.4.gem) = 19bd44a69eec407c39b79ffda2b4430d52e9e800de286b4d5142f326f2bf1bd5
SHA512 (activejob-7.0.2.4.gem) = d383cc27449385d264172a684ccc1ae5e424f29372372437409b415609a04e0d3583d1a4e16a0a9d024c3853401848f462b50b8fac1b33a64227695946938d0a
Size (activejob-7.0.2.4.gem) = 32768 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:26 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:30 spz Exp $
BLAKE2s (activemodel-5.2.6.3.gem) = e639071a17c37267997d2a7a4a85e2ae6de0ea67193ca70370ab3b4fc69b8189
SHA512 (activemodel-5.2.6.3.gem) = 3ae50d55890d82be487e693e1f654741e47737c5c812f16ed8872d18111fd0bb66fd8c8ec19535063ae901f11bf6e131ca73e7f74b774c8e4bd7797e6c1a5a0d
Size (activemodel-5.2.6.3.gem) = 56832 bytes
BLAKE2s (activemodel-5.2.7.1.gem) = def8a7172598b5aecfd40dbfe33b5a0777cdb3df6138d4eb32aca739b77447b6
SHA512 (activemodel-5.2.7.1.gem) = 1b879b879d12eb55279d315af8ac65979facf1fa16e772427d4e4900efdc74a772f9f3bda0c64ef64ab4934fab5563b060c90a28bc4bf00a7bf5b7a736e6ceba
Size (activemodel-5.2.7.1.gem) = 56832 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:02 spz Exp $
BLAKE2s (activemodel-6.0.4.7.gem) = 38f8f253a371d1f9e37a59aeb67e895654c98dc052ae269bfe365d277b2de913
SHA512 (activemodel-6.0.4.7.gem) = f0b84e2874a031eb34a98f32599e10e2acb633cfd5abc825b2a53604ce01964066d4a817b23cfea5809bea0451002601023bb9d71b578bacf69436a513c5a91a
Size (activemodel-6.0.4.7.gem) = 58880 bytes
BLAKE2s (activemodel-6.0.4.8.gem) = a5d19938975c6786628760167afc65d2460c3514c73c4c1f3e6371d7d5cb8661
SHA512 (activemodel-6.0.4.8.gem) = 27a4a947502123fd5334dbcb24ccab9dfbab9ed8d0306feac1386634d8b54af2deac132a036d30d260853737f8764e70e752a44423e52935da0a85628abe7085
Size (activemodel-6.0.4.8.gem) = 58880 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:50 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:41 spz Exp $
BLAKE2s (activemodel-6.1.4.7.gem) = 4502bbd15b21e76a4c684150a22bcf852bc024b486ee5df17d2a0ba126b565a4
SHA512 (activemodel-6.1.4.7.gem) = b27341b6446e36985c3bf3500ca567d1a6d25f40b7b584ec955a5cce2a00423840437594c5b53c557501d7c6dd0718fc952407ca2ce7b584afa1004853f47967
Size (activemodel-6.1.4.7.gem) = 62464 bytes
BLAKE2s (activemodel-6.1.5.1.gem) = 814342ebe451f37056ee312f909570a6aef11cbafc17d6184f92855315752a4f
SHA512 (activemodel-6.1.5.1.gem) = 6798d3677d5361f83a203eddd9ccbe4657362548e9daf329b950e7ba3f610c3be775cb28b12d5f645634318e956c3eb65b42dba398e31e0324627d9a54b53680
Size (activemodel-6.1.5.1.gem) = 62464 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:03 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:10 spz Exp $
BLAKE2s (activemodel-7.0.2.3.gem) = 44c9cf121484f442902faa0d6ad95fcbcb225c44bf495f9d78949cd0fa2269db
SHA512 (activemodel-7.0.2.3.gem) = bf79f5863823c870a93e4f589a7f9829c3d8099e2031f30180378f77ff346d671a6702c977c19aa7dcbb474328c4786af6a545e169659766605ef02566a9f8f8
Size (activemodel-7.0.2.3.gem) = 60928 bytes
BLAKE2s (activemodel-7.0.2.4.gem) = 5c069c4323f01d1148b17a868321368254d434250376fc8b250636489e615d9c
SHA512 (activemodel-7.0.2.4.gem) = ba18bc3c2ac01149aaa8bfe23858eb17b71e70a6c5a9b6abd7719d43192f300ebe6c98ee934fc7b31ec04a45aa00bfe41adb7c48e18d1cbf17270e4f5e3aec12
Size (activemodel-7.0.2.4.gem) = 60928 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:27 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:30 spz Exp $
BLAKE2s (activestorage-5.2.6.3.gem) = 085944607c3b424946d5505c1b7731070652f8c6b6c81bcf2c280615cdb47f2e
SHA512 (activestorage-5.2.6.3.gem) = f8c6c63391a17b74f728c5d51c862c9a5598bc67c3455ff37926606489ed88dfe3268bd086741cc1622a5c770bb9f14bce88ae6bf73c65b92dca5839399b0a1d
Size (activestorage-5.2.6.3.gem) = 46592 bytes
BLAKE2s (activestorage-5.2.7.1.gem) = 1df6fc9463b5e12aae95704f6ff15bff607b26c97ac1fda941ec3357398c40f9
SHA512 (activestorage-5.2.7.1.gem) = 2154ab52a5a1b4e98eecfee9f6082586cfbc53fefe8ea7d5b1cf9d25a9dc1435093e3020bf3965b506a7709537d7c65a0446d41fc3da91700b73201c1d305553
Size (activestorage-5.2.7.1.gem) = 46592 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:02 spz Exp $
BLAKE2s (activestorage-6.0.4.7.gem) = 26dda710432cde99b5df615adddb525691a39a51b11ca443126ce11665a09d45
SHA512 (activestorage-6.0.4.7.gem) = d403b51e67e5be20dfffb36e1c412ba32eff5b0d86c9917e7197f4ac02b08b593b08256c63abdf6310a9ce82b4bc41d6ddee387abd67042221a28e817a722fab
Size (activestorage-6.0.4.7.gem) = 53248 bytes
BLAKE2s (activestorage-6.0.4.8.gem) = a0bdad21c190f73cebde295d021901b94f45684b8de7f6f6c9abaaa3b1c30fb2
SHA512 (activestorage-6.0.4.8.gem) = 3801367c10c83caaf72c21072d95c623cb710e23a1919bb7283ea46b5fa57a386c1b48955f1f04a6a29b47c745cbf17f6d55104da9941e78f0d908d70407437c
Size (activestorage-6.0.4.8.gem) = 53248 bytes

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.4 2022/03/27 06:29:57 wiz Exp $
# $NetBSD: Makefile,v 1.4.2.1 2022/06/04 09:31:41 spz Exp $
DISTNAME= activestorage-${RAILS_VERSION}
PKGNAME= ${RUBY_PKGPREFIX}-activestorage${RUBY_RAILS}-${RAILS_VERSION}
@ -13,7 +13,7 @@ DEPENDS+= ${RUBY_ACTIONPACK_DEPENDS}
DEPENDS+= ${RUBY_ACTIVEJOB_DEPENDS}
DEPENDS+= ${RUBY_ACTIVERECORD_DEPENDS}
DEPENDS+= ${RUBY_PKGPREFIX}-marcel>=1.0.0<1.1:../../devel/ruby-marcel
#DEPDENS+= ${RUBY_PKGPREFIX}-mini_mime>=1.0.2:../../mail/ruby-mini_mime
DEPDENS+= ${RUBY_PKGPREFIX}-mini_mime>=1.1.0:../../mail/ruby-mini_mime
USE_LANGUAGES= # none

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:51 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:41 spz Exp $
BLAKE2s (activestorage-6.1.4.7.gem) = d9dafd14770e107cf64c5c3ba771deaf12fd4ec91b48a50dd2d6dda7055dc33c
SHA512 (activestorage-6.1.4.7.gem) = c64da9deb46d29d7d62e2072aed901e81d51e4697ea3fbcf3d764aaee00bd9e8da8c30539f3ba27630e6e929fefdb6f2fe09e5d8743e725abd0d984a35d1273f
Size (activestorage-6.1.4.7.gem) = 57344 bytes
BLAKE2s (activestorage-6.1.5.1.gem) = 7fbd5941b5b3a094a6bf1e42cbd093816e2d09cafaee85e0a96b817998d8716d
SHA512 (activestorage-6.1.5.1.gem) = bd447549f4a8462f976d8bd1c4a7bb26db89d1738c9f88e75dc87fb008374b0b6b3fd1e5ea77a677ab7cb434dac8b4485a2ec8aac86652817c89c3f634e846e1
Size (activestorage-6.1.5.1.gem) = 57856 bytes

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.3 2022/03/27 06:43:11 wiz Exp $
# $NetBSD: Makefile,v 1.3.2.1 2022/06/04 09:47:10 spz Exp $
DISTNAME= activestorage-${RAILS_VERSION}
PKGNAME= ${RUBY_PKGPREFIX}-activestorage${RUBY_RAILS}-${RAILS_VERSION}
@ -13,7 +13,7 @@ DEPENDS+= ${RUBY_ACTIONPACK_DEPENDS}
DEPENDS+= ${RUBY_ACTIVEJOB_DEPENDS}
DEPENDS+= ${RUBY_ACTIVERECORD_DEPENDS}
DEPENDS+= ${RUBY_PKGPREFIX}-marcel>=1.0.0<1.1:../../devel/ruby-marcel
#DEPDENS+= ${RUBY_PKGPREFIX}-mini_mime>=1.1.0:../../mail/ruby-mini_mime
DEPDENS+= ${RUBY_PKGPREFIX}-mini_mime>=1.1.0:../../mail/ruby-mini_mime
USE_LANGUAGES= # none

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:04 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:10 spz Exp $
BLAKE2s (activestorage-7.0.2.3.gem) = ae54a6c1a1e60acbc34f8f3faed40a8ef6a3104552dd2cc066824b605253c588
SHA512 (activestorage-7.0.2.3.gem) = 6dac2c63f6bc52634201e70a1501bdea8c3b57864b238712ecf75e0f48216dd6b21178a4095ff18c87f0894f94694c81afcc1eab354b1a7ed3b38fc6a51ab9ab
Size (activestorage-7.0.2.3.gem) = 65024 bytes
BLAKE2s (activestorage-7.0.2.4.gem) = c776b19b55f6aa500855bf0590e7c9f3b4cb67a66edc09bf6782bc4b0e862a26
SHA512 (activestorage-7.0.2.4.gem) = 70c93eec6b5ede46b576d82873d2eee5b84a0a8d078e253e44e6a2b55cc6c57df52fdfc294e0eaaf71bb46656d29558d67ea7e2802f1bd539138e753dd03bbd4
Size (activestorage-7.0.2.4.gem) = 65024 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:26 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:31 spz Exp $
BLAKE2s (activesupport-5.2.6.3.gem) = 5e0125a6d54a5e8cab8f4ecd747b9c72008b02ba279d2b979f6f833136ad07af
SHA512 (activesupport-5.2.6.3.gem) = a3e06073104ddcf1882f639dd8259c0701f44a8ec5057e998a388dbd9f8c84ddd584348d206526d5bded85262f6ce3bc213c23030bf2e1792840a04a13ca6173
Size (activesupport-5.2.6.3.gem) = 382464 bytes
BLAKE2s (activesupport-5.2.7.1.gem) = c206815f99f83197fc48d6c3dd75baf3afb46a07755b1d560bb4237d5c40b4b4
SHA512 (activesupport-5.2.7.1.gem) = ec3435648fc1ce141e43dd973eec8f5e599002f18fbb6ed11e56b95031e0e3aad53bcd0720033a17c526d4dac911803e2da961cdbe786165642d16369fb60cbc
Size (activesupport-5.2.7.1.gem) = 382976 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:03 spz Exp $
BLAKE2s (activesupport-6.0.4.7.gem) = 2e7c70f0f215d176744a0567b34d7460649053f711396a573caf85a4f601c877
SHA512 (activesupport-6.0.4.7.gem) = cde1d527022436689a71823ce3ee46e35cf0619038796e15a96ecf78df4f7c56c905926e582a3e14cb7892f4cf0b74bfda8b7dc99e58ccd1a47367a7484d37aa
Size (activesupport-6.0.4.7.gem) = 214528 bytes
BLAKE2s (activesupport-6.0.4.8.gem) = 385041791e6108207a243639072d6bb48d31984d0d6b8f302ab2197cf401a52b
SHA512 (activesupport-6.0.4.8.gem) = 9e9874f5d4bebfd0f889ea78de126fd5f7e9abfe32c27dc3e6e06431a7fba0441e7bc0669414cacb8e60a51a1a38913738005ced8a1612d0238abaaca0db07ff
Size (activesupport-6.0.4.8.gem) = 215040 bytes

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.3 2022/03/27 06:31:56 wiz Exp $
# $NetBSD: Makefile,v 1.3.2.1 2022/06/04 09:31:41 spz Exp $
DISTNAME= activesupport-${RAILS_VERSION}
PKGNAME= ${RUBY_PKGPREFIX}-activesupport${RUBY_RAILS}-${RAILS_VERSION}
@ -12,7 +12,7 @@ LICENSE= mit
DEPENDS+= ${RUBY_PKGPREFIX}-i18n>=1.6:../../devel/ruby-i18n
DEPENDS+= ${RUBY_PKGPREFIX}-tzinfo>=2.0<3:../../time/ruby-tzinfo
DEPENDS+= ${RUBY_PKGPREFIX}-concurrent-ruby>=1.0<2:../../devel/ruby-concurrent-ruby
DEPENDS+= ${RUBY_PKGPREFIX}-zeitwerk>=2.2<3:../../devel/ruby-zeitwerk
DEPENDS+= ${RUBY_PKGPREFIX}-zeitwerk>=2.3<3:../../devel/ruby-zeitwerk
# minitest 5.4.3 is bundled with Ruby 2.2 and later.
#DEPENDS+= ${RUBY_PKGPREFIX}-minitest>=5.1<6:../../devel/ruby-minitest

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:50 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:41 spz Exp $
BLAKE2s (activesupport-6.1.4.7.gem) = dca85318e9a9d3a90a4697d4e654e122d0f9350a594ff8b22f16bc906bc07980
SHA512 (activesupport-6.1.4.7.gem) = 39a59530f016dcf1db8a1c56bbcf77ec4f0ba11201844a65a2e2ebefbfc5f670f3b0b481d4ef7d79e4e1a1bdad12034376fc220fa36592e554fa6c03cfe46f41
Size (activesupport-6.1.4.7.gem) = 219648 bytes
BLAKE2s (activesupport-6.1.5.1.gem) = 337af410ef63ec55c9cfb752ed519287e29ac9f965dc61892458f0b78c00c285
SHA512 (activesupport-6.1.5.1.gem) = d3e2e442236e5abea3d3bd258d782e1406ebfd66840104bc5d1f4830c2e3b058cfb0f0d0cf097d4e261fd291a1e56e89c2c6a5664927ca3c3a8f366f139333fc
Size (activesupport-6.1.5.1.gem) = 220672 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:03 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:10 spz Exp $
BLAKE2s (activesupport-7.0.2.3.gem) = bc7fd0cdfa8627ec10ef134606ddf17a27883c4ad001711bacf38a78f6ad9867
SHA512 (activesupport-7.0.2.3.gem) = 60adee8a89d3c4dea7d8f4dba8447d34b6dcadafe61524a2dee175f71d0671e0b003100367b025fb699cdfa31bb0a902415b84ed922b71fcb92f00f8688b097b
Size (activesupport-7.0.2.3.gem) = 222208 bytes
BLAKE2s (activesupport-7.0.2.4.gem) = 97c1037d84b01a52c22bb15970c8ac29279ec682abc210c34bead369613216fd
SHA512 (activesupport-7.0.2.4.gem) = 750caaf4741a753646cf25c65aecd3c61579e6c5e577bcf4d3588ea6aab798a9a1433ad04170c4e8ad65c391c9a3e815b1cf38143e1425692e1a38f66c14225a
Size (activesupport-7.0.2.4.gem) = 222720 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:27 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:31 spz Exp $
BLAKE2s (railties-5.2.6.3.gem) = fd1a083a46378748fff0a42bee3c7fab64c8dae94512edc3e31bbaa17136cdf8
SHA512 (railties-5.2.6.3.gem) = 30b70592cc1cb5503e2a02992ef713baf81ca6c34086220d036b1bb566e3c060b2008176c33dc84bbc973c197533f3c51faf39d8ecf4e61fdef61268f620b3d9
Size (railties-5.2.6.3.gem) = 236544 bytes
BLAKE2s (railties-5.2.7.1.gem) = 7fd58a4f63b50d300dda6f04138e142612a06e27a95a9d0d94ccf47633ab2fb0
SHA512 (railties-5.2.7.1.gem) = dffd3297c51c8583fef282f14d279f818464a4013040e04c825ffa0387d0dd5eb77ba82015d9d307dad4b78174744b6b63135a087a17564f2b2fc82ecd05a44d
Size (railties-5.2.7.1.gem) = 236544 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:23 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:03 spz Exp $
BLAKE2s (railties-6.0.4.7.gem) = e644dd7b8215925048b3f5d363688a2bdc08db68597920b9f671407dcf276e0e
SHA512 (railties-6.0.4.7.gem) = 833f78db1dce9332d4c41a65fb91511c5d53f7aeec2b41d7aa27d2cd4cab35dc864a6953ff3c5974451fb2f6e69b386f149ea07da5e2285905338dd7eb5009d7
Size (railties-6.0.4.7.gem) = 455680 bytes
BLAKE2s (railties-6.0.4.8.gem) = de53046b0184c548aaf08df548bf8cb3a6638fc7569e1a282326dc566aea9d2c
SHA512 (railties-6.0.4.8.gem) = 12e181ea6e1dc4caefd78041131d6499de23f4828c79072beaa573f23aefe200068caad18a3f0df48ea3cea2f99aab39df359347bd254127ef0f0ac6d6144957
Size (railties-6.0.4.8.gem) = 455680 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:51 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:41 spz Exp $
BLAKE2s (railties-6.1.4.7.gem) = d4a1793c578482803bdaab269b9f0ecf2bcd046bef1a71d576b2cfd68b2095f8
SHA512 (railties-6.1.4.7.gem) = 1c2c254c694fca4b6951592f65d7b305f5cfbd393a1dccd82d39bf55943916f694e930b829390a0df8e7fbcce5cac10a03e1844e2a04caa6a6b0b0d43c62119f
Size (railties-6.1.4.7.gem) = 457216 bytes
BLAKE2s (railties-6.1.5.1.gem) = 6cdb581daf4c18a01d3e77c8801a56e3850bc703f4edbfbb36cc47c3c04e1a20
SHA512 (railties-6.1.5.1.gem) = 49ac6af62ff7ad7224b9c44c81ed43995fbee5f10288cd8aabf66a6a8f6fd229be0aef9ec4e9c70d4b6d556614ea552377bf91da9871eb36f4c9f1995c020b3f
Size (railties-6.1.5.1.gem) = 457216 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:04 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:11 spz Exp $
BLAKE2s (railties-7.0.2.3.gem) = d465f517463a9fd19494db6cb64509171c88b8561ed013254e0bac324962b0db
SHA512 (railties-7.0.2.3.gem) = fc83929d6d4f7a873d313292edbbe6e0e10816615eb1b623a4d53c1178e41277b7933075efe89b05fa51091be72e9de3dd666cacc14e463543b55aae18c67956
Size (railties-7.0.2.3.gem) = 159232 bytes
BLAKE2s (railties-7.0.2.4.gem) = 546667be6b0bde6c02c744f255e08e8e40d0a7468c16a4ecae07d364a52b3356
SHA512 (railties-7.0.2.4.gem) = d5d3e3b5a0e46f6bfb3288035e9522f67544d7fe6e4854264388086628ce074b351f4a0110a63aacfebf11ce28c7b8521dec55f10c148e6316bf6e65ca3668c5
Size (railties-7.0.2.4.gem) = 159232 bytes

View File

@ -1,7 +1,6 @@
# $NetBSD: Makefile,v 1.83 2021/12/08 16:04:07 adam Exp $
# $NetBSD: Makefile,v 1.83.4.1 2022/04/16 08:40:44 spz Exp $
PKGNAME= ${RUBY_PKGPREFIX}-subversion-${SVNVER}
PKGREVISION= 3
COMMENT= Ruby bindings for Subversion
.include "../../devel/subversion/Makefile.common"

View File

@ -1,7 +1,6 @@
# $NetBSD: Makefile,v 1.129 2021/12/08 16:02:03 adam Exp $
# $NetBSD: Makefile,v 1.129.4.1 2022/04/16 08:40:44 spz Exp $
PKGNAME= subversion-base-${SVNVER}
PKGREVISION= 3
COMMENT= Version control system, base programs and libraries
# on at least solaris, configure fails to figure out

View File

@ -1,7 +1,6 @@
# $NetBSD: Makefile,v 1.67 2021/07/21 14:40:29 taca Exp $
# $NetBSD: Makefile,v 1.67.6.1 2022/04/16 08:40:45 spz Exp $
PKGNAME= subversion-${SVNVER}
PKGREVISION= 2
COMMENT= Version control system, meta-package
META_PACKAGE= yes

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile.version,v 1.87 2021/02/14 15:09:19 adam Exp $
# $NetBSD: Makefile.version,v 1.87.10.1 2022/04/16 08:40:45 spz Exp $
# When updating subversion, all packages are updated at the same time
# to have a consistent set of packages. A particularly tricky aspect
@ -7,5 +7,5 @@
# changing the version.
.if !defined(SVNVER)
SVNVER= 1.14.1
SVNVER= 1.14.2
.endif

View File

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.118 2021/10/26 10:19:57 nia Exp $
$NetBSD: distinfo,v 1.118.4.1 2022/04/16 08:40:45 spz Exp $
BLAKE2s (subversion-1.14.1.tar.bz2) = af51085e4a85be8367c51e407958a56118c0bfedda1a6f77576597e092662f42
SHA512 (subversion-1.14.1.tar.bz2) = 0a70c7152b77cdbcb810a029263e4b3240b6ef41d1c19714e793594088d3cca758d40dfbc05622a806b06463becb73207df249393924ce591026b749b875fcdd
Size (subversion-1.14.1.tar.bz2) = 8504612 bytes
BLAKE2s (subversion-1.14.2.tar.bz2) = efb49dfb51b3f6c51ac7fe41b3dc593efeef1f9c2fdfa51567ab3940627162ea
SHA512 (subversion-1.14.2.tar.bz2) = 20ada4688ca07d9fb8da4b7d53b5084568652a3b9418c65e688886bae950a16a3ff37710fcfc9c29ef14a89e75b2ceec4e9cf35d5876a7896ebc2b512cfb9ecc
Size (subversion-1.14.2.tar.bz2) = 8606570 bytes
SHA1 (patch-Makefile.in) = 2df6c733d563c0bc7e0d1b4b6e6e00f82ea8c176
SHA1 (patch-configure) = cca6c305c28005496df0913637a9eb778a846fc0
SHA1 (patch-subversion_bindings_swig_perl_native_Makefile.PL.in) = 3fadde312693f2a304cd7e348c66cbd373c57854

179
doc/CHANGES-pkgsrc-2022Q1 Normal file
View File

@ -0,0 +1,179 @@
$NetBSD: CHANGES-pkgsrc-2022Q1,v 1.1.2.12 2022/06/13 16:14:00 bsiegert Exp $
Changes to packages and infrastructure on the 2022Q1 branch:
Pullup ticket #6607 - requested by wiz
devel/R-tcltk2: mark as broken (infinite loop)
Pullup ticket #6608 - requested by tnn
devel/SDL: NetBSD/i386 build fix
Pullup ticket #6609 - requested by tnn
www/gitea: build fix
Pullup ticket #6610 - requested by wiz
sysutils/ioping: build fix
Pullup ticket #6611 - requested by nia
lang/ruby: NetBSD/arm build fix
Pullup ticket #6612 - requested by nia
www/firefox91: security fix
www/firefox91-l10n: dependent update
Pullup ticket #6613 - requested by bsiegert
devel/java-subversion: security update
devel/p5-subversion: security update
devel/py-subversion: security update
devel/ruby-subversion: security update
devel/subversion-base: security update
devel/subversion: security update
Pullup ticket #6614 - requested by tron
mail/mutt: security update
Pullup ticket #6615 - requested by taca
lang/ruby26-base: security-update
Pullup ticket #6616 - requested by taca
lang/ruby27: security update
Pullup ticket #6617 - requested by taca
lang/ruby30-base: security update
Pullup ticket #6618 - requested by taca
lang/ruby31-base: security update
Pullup ticket #6619 - requested by gutteridge
devel/git-base: security update
devel/git: security update
Pullup ticket #6620 - requested by nia
multimedia/pitivi: build fix
Pullup ticket #6621 - requested by nia
devel/afl++: ARM build fix
Pullup ticket #6622 - requested by taca
textproc/ruby-yajl: security fix
Pullup ticket #6623 - requested by taca
www/ruby-puma: security fix
Pullup ticket #6624 - requested by taca
www/drupal7: security fix
Pullup tickets #6626 and #6627 - requested by taca
ruby30-base: build fix
ruby31-base: build fix
Pullup ticket #6625 - requested by taca
security/clamav: security fix
Pullup ticket #6632 - requested by nia
math/py-numpy: build fix
Pullup ticket #6633 - requested by gutteridge
textproc/libxml2: security fix
Pullup ticket #6634 - requested by sborrill
mail/sendmail: bugfix for SMTP AUTH
Pullup ticket #6637 - requested by nia
multimedia/libaom: security fix
Pullup ticket #6638 - requested by khorben
www/gitea: security fix
Pullup ticket #6628 - requested by taca
databases/ruby-activerecord52: security update
devel/ruby-activejob52: security update
devel/ruby-activemodel52: security update
devel/ruby-activestorage52: security update
devel/ruby-activesupport52: security update
devel/ruby-railties52: security update
lang/ruby: version info update
mail/ruby-actionmailer52: security update
www/ruby-actioncable52: security update
www/ruby-actionpack52: security update
www/ruby-actionview52: security update
www/ruby-rails52: security update
Pullup ticket #6629 - requested by taca
databases/ruby-activerecord60: security update
devel/ruby-activejob60: security update
devel/ruby-activemodel60: security update
devel/ruby-activestorage60: security update
devel/ruby-activesupport60: security update
devel/ruby-railties60: security update
lang/ruby: version info update
mail/ruby-actionmailbox60: security update
mail/ruby-actionmailer60: security update
textproc/ruby-actiontext60: security update
www/ruby-actioncable60: security update
www/ruby-actionpack60: security update
www/ruby-actionview60: security update
www/ruby-rails60: security update
Pullup ticket #6630 - requested by taca
databases/ruby-activerecord61: security update
devel/ruby-activejob61: security update
devel/ruby-activemodel61: security update
devel/ruby-activestorage61: security update
devel/ruby-activesupport61: security update
devel/ruby-railties61: security update
lang/ruby: version info update
mail/ruby-actionmailbox61: security update
mail/ruby-actionmailer61: security update
textproc/ruby-actiontext61: security update
www/ruby-actioncable61: security update
www/ruby-actionpack61: security update
www/ruby-actionview61: security update
www/ruby-rails61: security update
Pullup ticket #6631 - requested by taca
databases/ruby-activerecord70: security update
devel/ruby-activejob70: security update
devel/ruby-activemodel70: security update
devel/ruby-activestorage70: security update
devel/ruby-activesupport70: security update
devel/ruby-railties70: security update
lang/ruby: version info update
mail/ruby-actionmailbox70: security update
mail/ruby-actionmailer70: security update
textproc/ruby-actiontext70: security update
www/ruby-actioncable70: security update
www/ruby-actionpack70: security update
www/ruby-actionview70: security update
www/ruby-rails70: security update
Pullup ticket #6635 - requested by nia
www/firefox91: security update
Pullup ticket #6636 - requested by nia
www/firefox91-l10n: dependency update
Pullup ticket #6639 - requested by nia
print/poppler: build fix
Pullup ticket #6640 - requested by nia
databases/mariadb106-client: security update
Pullup ticket #6641 - requested by nia
databases/mariadb105-client: security update
Pullup ticket #6642 - requested by nia
lang/gcc6: build fix
Pullup ticket #6643 - requested by taca
security/clamav-doc: build fix after pullup #6625
Pullup ticket #6644 - requested by taca
www/ruby-rack: security fix
Pullup ticket #6645 - requested by taca
www/apache24: security fix
Pullup ticket #6646 - requested by nia
graphics/gdk-pixbuf2: security fix

View File

@ -1,8 +1,7 @@
# $NetBSD: Makefile,v 1.52 2021/12/08 16:02:09 adam Exp $
# $NetBSD: Makefile,v 1.52.4.1 2022/06/13 16:13:38 bsiegert Exp $
DISTNAME= gdk-pixbuf-2.42.6
DISTNAME= gdk-pixbuf-2.42.8
PKGNAME= ${DISTNAME:S/pixbuf/pixbuf2/}
PKGREVISION= 1
CATEGORIES= graphics gnome
MASTER_SITES= ${MASTER_SITE_GNOME:=sources/gdk-pixbuf/${PKGVERSION_NOREV:R}/}
EXTRACT_SUFX= .tar.xz

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.21 2021/09/19 08:06:20 nia Exp $
@comment $NetBSD: PLIST,v 1.21.6.1 2022/06/13 16:13:38 bsiegert Exp $
bin/gdk-pixbuf-csource
bin/gdk-pixbuf-pixdata
bin/gdk-pixbuf-query-loaders
@ -31,7 +31,7 @@ lib/girepository-1.0/GdkPixbuf-2.0.typelib
lib/girepository-1.0/GdkPixdata-2.0.typelib
lib/libgdk_pixbuf-2.0.so
lib/libgdk_pixbuf-2.0.so.0
lib/libgdk_pixbuf-2.0.so.0.4200.6
lib/libgdk_pixbuf-2.0.so.0.4200.8
lib/pkgconfig/gdk-pixbuf-2.0.pc
man/man1/gdk-pixbuf-csource.1
man/man1/gdk-pixbuf-query-loaders.1

View File

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.50 2021/11/17 15:14:42 schmonz Exp $
$NetBSD: distinfo,v 1.50.4.1 2022/06/13 16:13:38 bsiegert Exp $
BLAKE2s (gdk-pixbuf-2.42.6.tar.xz) = 523935fc861a24252a741e5544afebb2d7dc5f6150632831099724d97728c293
SHA512 (gdk-pixbuf-2.42.6.tar.xz) = 02e6d89de6cb6c9768d5173dada88c038e2454b4345ebc6f7b012d484303c08e53b58f085e872290555e1ccb74a478fa6cef4623a75f2e1f05c27bfc4e986f4d
Size (gdk-pixbuf-2.42.6.tar.xz) = 7708484 bytes
BLAKE2s (gdk-pixbuf-2.42.8.tar.xz) = eac540223073cbf38906052e2325483934cd1c39994cce6e761c3205b8e0324d
SHA512 (gdk-pixbuf-2.42.8.tar.xz) = 994a1374becec6235d347f4980afcc8b85f43ac373e4d7e00b7445880d0a51932e63b54429b28ab5af09e7c4437f9d6008e1c25b2d44a2c9ef7cc9821b478387
Size (gdk-pixbuf-2.42.8.tar.xz) = 8503020 bytes
SHA1 (patch-gdk-pixbuf_gdk-pixbuf-scaled-anim.c) = a9d2436711b1a1c3bb58beef0df5e485ad6cbe7d
SHA1 (patch-gdk-pixbuf_meson.build) = d54c4f1c5c045c3988fc2bbac19d2aac3e32de89
SHA1 (patch-tests_meson.build) = 6da53b4e168a20dcc546840e4fbd8fc7ac8f03aa

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.35 2022/03/10 16:43:11 nia Exp $
# $NetBSD: Makefile,v 1.35.2.1 2022/06/05 13:25:24 spz Exp $
GCC_PKGNAME= gcc6
.include "version.mk"
@ -21,6 +21,8 @@ LICENSE= gnu-gpl-v2 AND gnu-gpl-v3 AND gnu-lgpl-v2 AND gnu-lgpl-v3
DISTFILES= ${DEFAULT_DISTFILES}
EXTRACT_ONLY= ${DEFAULT_DISTFILES}
# RELRO not applied correctly (needs investigation)
RELRO_SUPPORTED= no
# Relocations result in a linker error on AArch64, but not x86.
MKPIE_SUPPORTED= no
CHECK_RELRO_SKIP+= ${GCC_PKGNAME}/lib/*

View File

@ -1,4 +1,4 @@
# $NetBSD: platform.mk,v 1.9 2022/01/14 15:42:08 taca Exp $
# $NetBSD: platform.mk,v 1.9.2.1 2022/05/08 14:53:37 bsiegert Exp $
#
#
@ -114,6 +114,16 @@ CONFIGURE_ARGS+= --disable-dtrace
CONFIGURE_ARGS+= --disable-dtrace
.endif
#
# NetBSD
#
# NetBSD 8.0 has problem with using static_assert macro.
# This is very ad hoc fix to prevent it.
#
.if ${OPSYS} == "NetBSD" && ${OPSYS_VERSION} == 080000
CFLAGS+= -DRB_AVOID_STATIC_ASSERT
.endif
#
# Solaris
#

View File

@ -1,4 +1,4 @@
# $NetBSD: rails.mk,v 1.118 2022/03/13 15:15:03 taca Exp $
# $NetBSD: rails.mk,v 1.118.2.4 2022/06/04 09:47:11 spz Exp $
.if !defined(_RUBY_RAILS_MK)
_RUBY_RAILS_MK= # defined
@ -47,10 +47,10 @@ _RUBY_RAILS_MK= # defined
#
# current Ruby on Rails versions.
#
RUBY_RAILS52_VERSION?= 5.2.6.3
RUBY_RAILS60_VERSION?= 6.0.4.7
RUBY_RAILS61_VERSION?= 6.1.4.7
RUBY_RAILS70_VERSION?= 7.0.2.3
RUBY_RAILS52_VERSION?= 5.2.7.1
RUBY_RAILS60_VERSION?= 6.0.4.8
RUBY_RAILS61_VERSION?= 6.1.5.1
RUBY_RAILS70_VERSION?= 7.0.2.4
RUBY_RAILS_ACCEPTED?= # defined
RUBY_RAILS_DEFAULT?= 52

View File

@ -1,4 +1,4 @@
# $NetBSD: rubyversion.mk,v 1.244 2022/02/23 15:53:25 jperkin Exp $
# $NetBSD: rubyversion.mk,v 1.244.2.6 2022/05/08 14:53:37 bsiegert Exp $
#
# This file determines which Ruby version is used as a dependency for
@ -213,10 +213,10 @@ RUBY_VERSION_REQD?= ${PKGNAME_REQD:C/ruby([0-9][0-9])-.*/\1/}
.endif
# current supported Ruby's version
RUBY26_VERSION= 2.6.9
RUBY27_VERSION= 2.7.5
RUBY30_VERSION= 3.0.3
RUBY31_VERSION= 3.1.1
RUBY26_VERSION= 2.6.10
RUBY27_VERSION= 2.7.6
RUBY30_VERSION= 3.0.4
RUBY31_VERSION= 3.1.2
# current API compatible version; used for version of shared library
RUBY26_API_VERSION= 2.6.0
@ -280,7 +280,7 @@ RUBY_BIGDECIMAL_VER= 1.4.1
RUBY_BUNDLER_VER= 1.17.2
RUBY_CMATH_VER= 1.0.0
RUBY_CSV_VER= 3.0.9
RUBY_DATE_VER= 2.0.2
RUBY_DATE_VER= 2.0.3
RUBY_DBM_VER= 1.0.0
RUBY_DID_YOU_MEAN_VER= 1.3.0
RUBY_E2MMAP_VER= 0.1.0
@ -394,7 +394,7 @@ RUBY_ABBREV_VER= 0.1.0
RUBY_BASE64_VER= 0.1.0
RUBY_BENCHMARK_VER= 0.1.1
RUBY_BIGDECIMAL_VER= 3.0.0
RUBY_BUNDLER_VER= 2.2.32
RUBY_BUNDLER_VER= 2.2.33
RUBY_CGI_VER= 0.2.1
RUBY_CSV_VER= 3.1.9
RUBY_DATE_VER= 3.1.3
@ -618,11 +618,17 @@ RUBY?= ${PREFIX}/bin/${RUBY_NAME}
RAKE?= ${PREFIX}/bin/${RAKE_NAME}
RDOC?= ${PREFIX}/bin/rdoc${RUBY_SUFFIX}
# ruby31 helpfully changed the config triple...
.if !empty(MACHINE_PLATFORM:MDarwin-*-aarch64) && ${RUBY_VER} >= 31
RUBY_ARCH?= arm64-${LOWER_OPSYS}${APPEND_ELF}${LOWER_OPSYS_VERSUFFIX}${APPEND_ABI}
RUBY_EXTARCH?= arm64-${LOWER_OPSYS}${APPEND_ELF}-${LOWER_OPSYS_VERSUFFIX}
.endif
RUBY_ARCH?= ${MACHINE_GNU_ARCH}-${LOWER_OPSYS}${APPEND_ELF}${LOWER_OPSYS_VERSUFFIX}${APPEND_ABI}
# NetBSD does not append an OS version, so we have to do this OPSYS-specific.
.if ${OPSYS} == "NetBSD"
RUBY_EXTARCH?= ${MACHINE_GNU_ARCH}-${LOWER_OPSYS}${APPEND_ELF}${LOWER_OPSYS_VERSUFFIX}${APPEND_ABI}
RUBY_EXTARCH?= ${MACHINE_GNU_ARCH}-${LOWER_OPSYS}${APPEND_ELF}${LOWER_OPSYS_VERSUFFIX}
.else
RUBY_EXTARCH?= ${MACHINE_GNU_ARCH}-${LOWER_OPSYS}${APPEND_ELF}-${LOWER_OPSYS_VERSUFFIX}${APPEND_ABI}
.endif

View File

@ -1,8 +1,7 @@
# $NetBSD: Makefile,v 1.16 2022/01/14 16:14:34 taca Exp $
# $NetBSD: Makefile,v 1.16.2.1 2022/04/16 08:59:30 spz Exp $
DISTNAME= ${RUBY_DISTNAME}
PKGNAME= ${RUBY_PKGPREFIX}-base-${RUBY_VERSION}
PKGREVISION= 1
CATEGORIES= lang ruby
MASTER_SITES= ${MASTER_SITE_RUBY}

View File

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.15 2021/11/25 15:51:08 taca Exp $
$NetBSD: distinfo,v 1.15.4.1 2022/04/16 08:59:30 spz Exp $
BLAKE2s (ruby-2.6.9.tar.xz) = b353038621a51ee6b7cf8ef4b39b2df938438fc0a790673cb3bc43dd6894abf5
SHA512 (ruby-2.6.9.tar.xz) = f60aa89e685cea324185eb0d13e6b44caef4e4f761cbf9ea1386ae70e39faf3866ac01e4bb5354574f2583e74290b8c80eaf63d126040d52368be6c771476451
Size (ruby-2.6.9.tar.xz) = 11590064 bytes
BLAKE2s (ruby-2.6.10.tar.xz) = 0fc896f882e952428b988f5d4cb0e537e2d78134975318a77e5153a4ea9797cb
SHA512 (ruby-2.6.10.tar.xz) = 06ebf1442c4bf4be62eb710348cfb714cbc4c4acc5125319a425fe76ef2be7cccfd41e50bf3751bfef3ceb8ac47ad41a027d2c2ad560e25ec694e34fd9f62a8a
Size (ruby-2.6.10.tar.xz) = 11582056 bytes
SHA1 (patch-configure) = ccfad7b5e35e87308e187e6c5fb3ffea57ad763d
SHA1 (patch-ext_dbm_extconf.rb) = c998f8735db54b1ae2bc8b6caa359ce88bc7a45b
SHA1 (patch-ext_openssl_ossl__pkey__rsa.c) = 707ab908b6d72e386230b3530700ce861a3754db

View File

@ -1,9 +1,8 @@
# $NetBSD: Makefile,v 1.5 2022/01/14 16:15:14 taca Exp $
# $NetBSD: Makefile,v 1.5.2.1 2022/04/16 08:59:30 spz Exp $
#
DISTNAME= # empty
PKGNAME= ${RUBY_PKGPREFIX}-${RUBY_VERSION}
PKGREVISION= 1
CATEGORIES= lang ruby
MASTER_SITES= # empty
DISTFILES= # empty

View File

@ -1,8 +1,7 @@
# $NetBSD: Makefile,v 1.8 2022/01/14 16:12:19 taca Exp $
# $NetBSD: Makefile,v 1.8.2.1 2022/04/16 09:10:21 spz Exp $
DISTNAME= ${RUBY_DISTNAME}
PKGNAME= ${RUBY_PKGPREFIX}-base-${RUBY_VERSION}
PKGREVISION= 1
CATEGORIES= lang ruby
MASTER_SITES= ${MASTER_SITE_RUBY}

View File

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.9 2021/11/25 16:01:18 taca Exp $
$NetBSD: distinfo,v 1.9.4.1 2022/04/16 09:10:21 spz Exp $
BLAKE2s (ruby-2.7.5.tar.xz) = 4a7ca38866134fe88b0b6f4f3d3279f2661db1d7985bd2ec2c64893e63d0bba8
SHA512 (ruby-2.7.5.tar.xz) = 21c8a713e3ce115fc4c405113ac691ddcefc3419f528b93ca1ac59e7052c1b6e9e241da0e570e291e567f28f3d840824dbcc5967b216cbe7d6ca7a05580fa311
Size (ruby-2.7.5.tar.xz) = 12072980 bytes
BLAKE2s (ruby-2.7.6.tar.xz) = 4cc99a73c925a1652758b41769e06a1a4c8bd9e7cb0da7ffe5ece6e8b132e920
SHA512 (ruby-2.7.6.tar.xz) = e86410b59d5917786fe43b00fd75dedd0e7f84611286b9274c542d2e562088fcee6bcc6c2596c30ccf793280d2bac6bfbb2619ef0513b3ca31f10f88684c7b1f
Size (ruby-2.7.6.tar.xz) = 12084408 bytes
SHA1 (patch-configure) = 5ee800f6824b18efd06e56a659235ea784819f2e
SHA1 (patch-ext_dbm_extconf.rb) = c998f8735db54b1ae2bc8b6caa359ce88bc7a45b
SHA1 (patch-ext_openssl_ossl__pkey__rsa.c) = 925fa135abb90b9a1fa16da14b17c0d2b2bec364

View File

@ -1,9 +1,8 @@
# $NetBSD: Makefile,v 1.2 2022/01/14 16:12:42 taca Exp $
# $NetBSD: Makefile,v 1.2.2.1 2022/04/16 09:10:21 spz Exp $
#
DISTNAME= # empty
PKGNAME= ${RUBY_PKGPREFIX}-${RUBY_VERSION}
PKGREVISION= 1
CATEGORIES= lang ruby
MASTER_SITES= # empty
DISTFILES= # empty

View File

@ -1,8 +1,8 @@
# $NetBSD: Makefile,v 1.5 2022/01/18 08:26:38 wiz Exp $
# $NetBSD: Makefile,v 1.5.2.2 2022/05/08 14:53:37 bsiegert Exp $
DISTNAME= ${RUBY_DISTNAME}
PKGNAME= ${RUBY_PKGPREFIX}-base-${RUBY_VERSION}
PKGREVISION= 2
PKGREVISION= 1
CATEGORIES= lang ruby
MASTER_SITES= ${MASTER_SITE_RUBY}

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.6 2022/01/14 16:16:07 taca Exp $
@comment $NetBSD: PLIST,v 1.6.2.1 2022/04/16 09:23:40 spz Exp $
bin/bundle${RUBY_SUFFIX}
bin/bundler${RUBY_SUFFIX}
bin/erb${RUBY_SUFFIX}
@ -402,6 +402,7 @@ ${RUBY_LIB}/bundler/templates/newgem/lib/newgem/version.rb.tt
${RUBY_LIB}/bundler/templates/newgem/newgem.gemspec.tt
${RUBY_LIB}/bundler/templates/newgem/rspec.tt
${RUBY_LIB}/bundler/templates/newgem/rubocop.yml.tt
${RUBY_LIB}/bundler/templates/newgem/sig/newgem.rbs.tt
${RUBY_LIB}/bundler/templates/newgem/spec/newgem_spec.rb.tt
${RUBY_LIB}/bundler/templates/newgem/spec/spec_helper.rb.tt
${RUBY_LIB}/bundler/templates/newgem/standard.yml.tt
@ -415,11 +416,13 @@ ${RUBY_LIB}/bundler/ui/rg_proxy.rb
${RUBY_LIB}/bundler/ui/shell.rb
${RUBY_LIB}/bundler/ui/silent.rb
${RUBY_LIB}/bundler/uri_credentials_filter.rb
${RUBY_LIB}/bundler/vendor/connection_pool/LICENSE
${RUBY_LIB}/bundler/vendor/connection_pool/lib/connection_pool.rb
${RUBY_LIB}/bundler/vendor/connection_pool/lib/connection_pool/timed_stack.rb
${RUBY_LIB}/bundler/vendor/connection_pool/lib/connection_pool/version.rb
${RUBY_LIB}/bundler/vendor/connection_pool/lib/connection_pool/wrapper.rb
${RUBY_LIB}/bundler/vendor/fileutils/lib/fileutils.rb
${RUBY_LIB}/bundler/vendor/molinillo/LICENSE
${RUBY_LIB}/bundler/vendor/molinillo/lib/molinillo.rb
${RUBY_LIB}/bundler/vendor/molinillo/lib/molinillo/delegates/resolution_state.rb
${RUBY_LIB}/bundler/vendor/molinillo/lib/molinillo/delegates/specification_provider.rb
@ -444,6 +447,7 @@ ${RUBY_LIB}/bundler/vendor/net-http-persistent/lib/net/http/persistent.rb
${RUBY_LIB}/bundler/vendor/net-http-persistent/lib/net/http/persistent/connection.rb
${RUBY_LIB}/bundler/vendor/net-http-persistent/lib/net/http/persistent/pool.rb
${RUBY_LIB}/bundler/vendor/net-http-persistent/lib/net/http/persistent/timed_stack_multi.rb
${RUBY_LIB}/bundler/vendor/thor/LICENSE.md
${RUBY_LIB}/bundler/vendor/thor/lib/thor.rb
${RUBY_LIB}/bundler/vendor/thor/lib/thor/actions.rb
${RUBY_LIB}/bundler/vendor/thor/lib/thor/actions/create_file.rb
@ -1035,6 +1039,7 @@ ${RUBY_LIB}/rubygems/mock_gem_ui.rb
${RUBY_LIB}/rubygems/name_tuple.rb
${RUBY_LIB}/rubygems/openssl.rb
${RUBY_LIB}/rubygems/optparse.rb
${RUBY_LIB}/rubygems/optparse/COPYING
${RUBY_LIB}/rubygems/optparse/lib/optionparser.rb
${RUBY_LIB}/rubygems/optparse/lib/optparse.rb
${RUBY_LIB}/rubygems/optparse/lib/optparse/ac.rb
@ -1092,6 +1097,7 @@ ${RUBY_LIB}/rubygems/resolver/local_specification.rb
${RUBY_LIB}/rubygems/resolver/lock_set.rb
${RUBY_LIB}/rubygems/resolver/lock_specification.rb
${RUBY_LIB}/rubygems/resolver/molinillo.rb
${RUBY_LIB}/rubygems/resolver/molinillo/LICENSE
${RUBY_LIB}/rubygems/resolver/molinillo/lib/molinillo.rb
${RUBY_LIB}/rubygems/resolver/molinillo/lib/molinillo/delegates/resolution_state.rb
${RUBY_LIB}/rubygems/resolver/molinillo/lib/molinillo/delegates/specification_provider.rb

View File

@ -1,13 +1,14 @@
$NetBSD: distinfo,v 1.7 2021/11/25 16:35:52 taca Exp $
$NetBSD: distinfo,v 1.7.4.2 2022/05/08 14:53:37 bsiegert Exp $
BLAKE2s (ruby-3.0.3.tar.xz) = 4c2e9044c837710b2378059e65b43e1124d6d142be065de6d87df179391f4442
SHA512 (ruby-3.0.3.tar.xz) = bb9ea426278d5a7ac46595296f03b82d43df8b7db41045cdf85611e05e26c703c53f700494cd7cf5d4c27fa953bdc5c144317d7720812db0a6e3b6f4bc4d2e00
Size (ruby-3.0.3.tar.xz) = 14991880 bytes
BLAKE2s (ruby-3.0.4.tar.xz) = 2487d6f4bd37ef20715935a50d2cc50f9d50589c9223836bfaa6c3ac7de57b4d
SHA512 (ruby-3.0.4.tar.xz) = 53bf7dd403b0c68af9691882ad8ed7422c8d1f496627428fb4c3caf0b0313715524b744c5f453aced2d49e16e55f3f45b46b9a77aa3097dbfcae7caa0208194b
Size (ruby-3.0.4.tar.xz) = 15830368 bytes
SHA1 (patch-common.mk) = c23eed58427b2fd4ba8fdb3692f609701a666c6d
SHA1 (patch-configure) = a56184876caac5c24b2c2925f364d88c3ebc5662
SHA1 (patch-configure) = 8499cad3c1fb1a1b15392ba375f8d4e737fef2e4
SHA1 (patch-ext_dbm_extconf.rb) = c998f8735db54b1ae2bc8b6caa359ce88bc7a45b
SHA1 (patch-ext_openssl_openssl__missing.h) = 3f8d79736fd14806dfaf76e333eec63ff3ff5890
SHA1 (patch-ext_openssl_ossl__pkey__rsa.c) = 32054bad7bf31040e6d8828f8786de26dc860518
SHA1 (patch-include_ruby_internal_static__assert.h) = 2e509d18d294b03b468e4e7bcb99fb6a71089601
SHA1 (patch-lib_mkmf.rb) = 4a3cd18548dbdf43a13695d4e76f817c0347e335
SHA1 (patch-lib_rdoc_encoding.rb) = 0e82d2942d9bfcb67dc7c994889d7bc5ec2ae85a
SHA1 (patch-lib_rdoc_ri_driver.rb) = f4d3e59e35b608acd4edc17916142c7f033e6198

View File

@ -1,15 +1,15 @@
$NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
$NetBSD: patch-configure,v 1.1.10.1 2022/05/08 14:53:38 bsiegert Exp $
* Adding Interix support.
* Ignore doxygen.
* Ignore VCS.
* Handle SSP in pkgsrc.
* Put -std= in CFLAGS not CPPFLAGS.
* Retain _XOPEN_SOURCE, fixes eventmachine.
* Fix argument for pthread_self() on NetBSD.
--- configure.orig 2020-12-08 09:02:33.000000000 +0000
--- configure.orig 2022-04-12 11:48:57.000000000 +0000
+++ configure
@@ -7991,7 +7991,7 @@ else
@@ -8381,7 +8381,7 @@ else
if test x"$target_alias" = x; then :
case "$target_os" in #(
@ -18,7 +18,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for real target cpu" >&5
$as_echo_n "checking for real target cpu... " >&6; }
@@ -10048,6 +10048,7 @@ fi
@@ -10094,6 +10094,7 @@ fi
stack_protector=no
;; #(
*) :
@ -26,7 +26,26 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
;;
esac
if test -z "${stack_protector+set}"; then :
@@ -11912,6 +11913,10 @@ esac
@@ -11794,18 +11795,6 @@ fi
CPPFLAGS="$CPPFLAGS ${rb_opt}" ;;
esac
done
- # _XOPEN_SOURCE should not be defined for C++ on Solaris.
- # RUBY_APPEND_OPTIONS(CXXFLAGS)
- for rb_opt in -U_XOPEN_SOURCE; do
- case " ${CXXFLAGS-} " in #(
- *" ${rb_opt} "*) :
- ;; #(
- ' ') :
- CXXFLAGS="${rb_opt}" ;; #(
- *) :
- CXXFLAGS="$CXXFLAGS ${rb_opt}" ;;
-esac
- done
fi
@@ -11970,6 +11959,10 @@ esac
ac_cv_func___builtin_setjmp=no
;; #(
@ -37,7 +56,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
*) :
;;
esac
@@ -23493,6 +23498,8 @@ else
@@ -23324,6 +23317,8 @@ else
# ifdef _MSC_VER
# include <malloc.h>
# define alloca _alloca
@ -46,7 +65,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
# else
# ifdef HAVE_ALLOCA_H
# include <alloca.h>
@@ -28791,7 +28798,9 @@ fi
@@ -28622,7 +28617,9 @@ fi
interix*) :
: ${LDSHARED='$(CC) -shared'}
XLDFLAGS="$XLDFLAGS -Wl,-E"
@ -56,7 +75,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
rb_cv_dlopen=yes ;; #(
freebsd*|dragonfly*) :
@@ -29988,7 +29997,7 @@ fi
@@ -29890,7 +29887,7 @@ fi
;; #(
freebsd*|dragonfly*) :
@ -65,7 +84,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
LIBRUBY_SONAME='$(LIBRUBY_SO)'
if test "$rb_cv_binary_elf" != "yes" ; then :
@@ -30067,9 +30076,10 @@ esac
@@ -29969,9 +29966,10 @@ esac
;; #(
darwin*) :
@ -78,7 +97,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
if test "$load_relative" = yes; then :
libprefix="@executable_path/../${libdir_basename}"
@@ -30090,7 +30100,12 @@ fi
@@ -29992,7 +29990,12 @@ fi
;; #(
interix*) :
@ -92,7 +111,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
;; #(
mingw*|cygwin*|mswin*) :
@@ -30272,7 +30287,7 @@ if test "$enable_rpath" = yes; then :
@@ -30174,7 +30177,7 @@ if test "$enable_rpath" = yes; then :
esac
rpathflag=`IFS="$PATH_SEPARATOR"
echo x "$rpathflag" |
@ -101,7 +120,7 @@ $NetBSD: patch-configure,v 1.1 2021/02/14 14:32:41 taca Exp $
`
LIBRUBY_RPATHFLAGS="$LIBRUBY_RPATHFLAGS${rpathflag}"
LIBRUBYARG_SHARED="$LIBRUBY_RPATHFLAGS $LIBRUBYARG_SHARED"
@@ -32996,19 +33011,7 @@ which seems to be undefined. Please mak
@@ -32906,19 +32909,7 @@ which seems to be undefined. Please mak
"Makefile":F)
tmpmk=confmk$$.tmp
{

View File

@ -0,0 +1,15 @@
$NetBSD: patch-include_ruby_internal_static__assert.h,v 1.1.2.2 2022/05/08 14:53:38 bsiegert Exp $
Add the way to stop using static_assert.
--- include/ruby/internal/static_assert.h.orig 2022-04-12 11:48:55.000000000 +0000
+++ include/ruby/internal/static_assert.h
@@ -50,7 +50,7 @@
#elif defined(__STDC_VERSION__) && RBIMPL_COMPILER_SINCE(GCC, 4, 6, 0)
# define RBIMPL_STATIC_ASSERT0 __extension__ _Static_assert
-#elif defined(static_assert)
+#elif defined(static_assert) && !defined(RB_AVOID_STATIC_ASSERT)
# /* Take <assert.h> definition */
# define RBIMPL_STATIC_ASSERT0 static_assert
#endif

View File

@ -1,9 +1,8 @@
# $NetBSD: Makefile,v 1.2 2022/01/14 16:16:44 taca Exp $
# $NetBSD: Makefile,v 1.2.2.1 2022/04/16 09:23:40 spz Exp $
#
DISTNAME= # empty
PKGNAME= ${RUBY_PKGPREFIX}-${RUBY_VERSION}
PKGREVISION= 1
CATEGORIES= lang ruby
MASTER_SITES= # empty
DISTFILES= # empty

View File

@ -1,7 +1,8 @@
# $NetBSD: Makefile,v 1.3 2022/02/20 15:59:09 taca Exp $
# $NetBSD: Makefile,v 1.3.2.1 2022/05/08 14:53:38 bsiegert Exp $
DISTNAME= ${RUBY_DISTNAME}
PKGNAME= ${RUBY_PKGPREFIX}-base-${RUBY_VERSION}
PKGREVISION= 2
CATEGORIES= lang ruby
MASTER_SITES= ${MASTER_SITE_RUBY}

View File

@ -1,11 +1,12 @@
$NetBSD: distinfo,v 1.2 2022/02/20 15:59:09 taca Exp $
$NetBSD: distinfo,v 1.2.2.2 2022/05/08 14:53:38 bsiegert Exp $
BLAKE2s (ruby-3.1.1.tar.xz) = c2785175bbc542c3049a9ccbb8e394ab1548e92ecaa366479bca13eb937b7c5d
SHA512 (ruby-3.1.1.tar.xz) = 8877fa9a458964a59a11529cd10b3d25b5f6238cd4678b6dcea0bd4b750499cf8ff39d8824053b4ab26c5cd0cfb604a57807ce61580175857fcf00b2cff3e55f
Size (ruby-3.1.1.tar.xz) = 15103808 bytes
BLAKE2s (ruby-3.1.2.tar.xz) = 5384cfebbd466de36f68f554be2c045363e6c074d90a94a4c035ecaadf3c878b
SHA512 (ruby-3.1.2.tar.xz) = 4a74e9efc6ea4b3eff4fec7534eb1fff4794d021531defc2e9937e53c6668db8ecdc0fff2bc23d5e6602d0df344a2caa85b31c5414309541e3d5313ec82b6e21
Size (ruby-3.1.2.tar.xz) = 15101588 bytes
SHA1 (patch-common.mk) = c23eed58427b2fd4ba8fdb3692f609701a666c6d
SHA1 (patch-configure) = c8a09d995d9d09c1142f22cf59f04fa61b528a2a
SHA1 (patch-configure) = 3da2fffeaf717e241e9e3b12ad627d09375790da
SHA1 (patch-ext_openssl_openssl__missing.h) = 3f8d79736fd14806dfaf76e333eec63ff3ff5890
SHA1 (patch-include_ruby_internal_static__assert.h) = 7d5c3ae7ff674b9b34639924fcf08237164de9f8
SHA1 (patch-lib_mkmf.rb) = 4a3cd18548dbdf43a13695d4e76f817c0347e335
SHA1 (patch-lib_rdoc_encoding.rb) = 0e82d2942d9bfcb67dc7c994889d7bc5ec2ae85a
SHA1 (patch-lib_rdoc_ri_driver.rb) = f4d3e59e35b608acd4edc17916142c7f033e6198
@ -15,6 +16,8 @@ SHA1 (patch-lib_rubygems_dependency__installer.rb) = 1776508907f17547ffe93f637d6
SHA1 (patch-lib_rubygems_install__update__options.rb) = 1e953b5a517a805fd7184e359fbc06e67a5ff9b3
SHA1 (patch-lib_rubygems_installer.rb) = 03fcd57d4e7ea03cf2ffc3d219fd489e30361014
SHA1 (patch-lib_rubygems_platform.rb) = 7ef0d86c2d84b942db726d293a319d7ea54e56c8
SHA1 (patch-template_Makefile.in) = a4b94293de165e87021b79a0a7f683ba76e168d9
SHA1 (patch-test_rubygems_test__gem.rb) = e624da5b9c49f9409160a7b0fdd2efad17986cab
SHA1 (patch-thread__pthread.c) = 7c1231933a2d6ce9d56891ab512371841697fbca
SHA1 (patch-tool_ifchange) = 1814cd41f0b0a93b181799cb117bd1f57068cf33
SHA1 (patch-tool_runruby.rb) = 5dd8a3bea5e9776f7521f85955dddd2127e4c4d0

View File

@ -1,15 +1,15 @@
$NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
$NetBSD: patch-configure,v 1.1.2.1 2022/05/08 14:53:38 bsiegert Exp $
* Avoid bash specific variable substitution.
* Adding Interix support.
* Ignore doxygen.
* Ignore VCS.
* Handle SSP in pkgsrc.
* Put -std= in CFLAGS not CPPFLAGS.
* Retain _XOPEN_SOURCE, fixes eventmachine.
* Fix argument for pthread_self() on NetBSD.
* Explictly stop display with color.
--- configure.orig 2021-12-25 12:23:16.000000000 +0000
--- configure.orig 2022-04-12 11:11:17.000000000 +0000
+++ configure
@@ -3316,12 +3316,12 @@ case "$target_cpu-$target_os" in #(
target_cpu=arm64
@ -44,7 +44,26 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
;;
esac
if test -z "${stack_protector+set}"; then :
@@ -12226,6 +12227,10 @@ esac
@@ -11981,18 +11982,6 @@ fi
CPPFLAGS="$CPPFLAGS ${rb_opt}" ;;
esac
done
- # _XOPEN_SOURCE should not be defined for C++ on Solaris.
- # RUBY_APPEND_OPTIONS(CXXFLAGS)
- for rb_opt in -U_XOPEN_SOURCE; do
- case " ${CXXFLAGS-} " in #(
- *" ${rb_opt} "*) :
- ;; #(
- ' ') :
- CXXFLAGS="${rb_opt}" ;; #(
- *) :
- CXXFLAGS="$CXXFLAGS ${rb_opt}" ;;
-esac
- done
fi
@@ -12226,6 +12215,10 @@ esac
ac_cv_func___builtin_setjmp=no
;; #(
@ -55,7 +74,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
*) :
;;
esac
@@ -24059,6 +24064,8 @@ else
@@ -24059,6 +24052,8 @@ else
# ifdef _MSC_VER
# include <malloc.h>
# define alloca _alloca
@ -64,7 +83,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
# else
# ifdef HAVE_ALLOCA_H
# include <alloca.h>
@@ -29499,7 +29506,9 @@ fi
@@ -29499,7 +29494,9 @@ fi
interix*) :
: ${LDSHARED='$(CC) -shared'}
XLDFLAGS="$XLDFLAGS -Wl,-E"
@ -74,7 +93,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
rb_cv_dlopen=yes ;; #(
freebsd*|dragonfly*) :
@@ -30700,7 +30709,7 @@ fi
@@ -30700,7 +30697,7 @@ fi
;; #(
freebsd*|dragonfly*) :
@ -83,7 +102,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
LIBRUBY_SONAME='$(LIBRUBY_SO)'
if test "$rb_cv_binary_elf" != "yes" ; then :
@@ -30795,9 +30804,10 @@ esac
@@ -30795,9 +30792,10 @@ esac
;; #(
darwin*) :
@ -96,7 +115,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
if test "$load_relative" = yes; then :
libprefix="@executable_path/../${libdir_basename}"
@@ -30818,7 +30828,12 @@ fi
@@ -30818,7 +30816,12 @@ fi
;; #(
interix*) :
@ -110,7 +129,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
;; #(
cygwin*|msys*|mingw*|mswin*) :
@@ -31000,7 +31015,7 @@ if test "$enable_rpath" = yes; then :
@@ -31000,7 +31003,7 @@ if test "$enable_rpath" = yes; then :
esac
rpathflag=`IFS="$PATH_SEPARATOR"
echo x "$rpathflag" |
@ -119,7 +138,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
`
LIBRUBY_RPATHFLAGS="$LIBRUBY_RPATHFLAGS${rpathflag}"
LIBRUBYARG_SHARED="$LIBRUBY_RPATHFLAGS $LIBRUBYARG_SHARED"
@@ -32550,7 +32565,7 @@ guard=INCLUDE_RUBY_CONFIG_H
@@ -32550,7 +32553,7 @@ guard=INCLUDE_RUBY_CONFIG_H
if test "x$CONFIGURE_TTY" = xyes; then :
color=--color
else
@ -128,7 +147,7 @@ $NetBSD: patch-configure,v 1.1 2022/01/16 13:57:10 taca Exp $
fi
exec ${SHELL} ${tooldir}/ifchange $color "${config_h}" -
) >&6 || as_fn_error $? "failed to create ${config_h}" "$LINENO" 5
@@ -33773,19 +33788,7 @@ which seems to be undefined. Please mak
@@ -33773,19 +33776,7 @@ which seems to be undefined. Please mak
"Makefile":F)
tmpmk=confmk$$.tmp
{

View File

@ -0,0 +1,15 @@
$NetBSD: patch-include_ruby_internal_static__assert.h,v 1.1.2.2 2022/05/08 14:53:38 bsiegert Exp $
Add the way to stop using static_assert.
--- include/ruby/internal/static_assert.h.orig 2022-04-12 11:11:15.000000000 +0000
+++ include/ruby/internal/static_assert.h
@@ -50,7 +50,7 @@
#elif defined(__STDC_VERSION__) && RBIMPL_COMPILER_SINCE(GCC, 4, 6, 0)
# define RBIMPL_STATIC_ASSERT0 __extension__ _Static_assert
-#elif defined(static_assert)
+#elif defined(static_assert) && !defined(RB_AVOID_STATIC_ASSERT)
# /* Take <assert.h> definition */
# define RBIMPL_STATIC_ASSERT0 static_assert
#endif

View File

@ -0,0 +1,16 @@
$NetBSD: patch-template_Makefile.in,v 1.1.2.2 2022/05/08 14:53:38 bsiegert Exp $
Add yjit.o to DTRACE_DEPENDENT_OBJS.
--- template/Makefile.in.orig 2022-04-12 11:11:15.000000000 +0000
+++ template/Makefile.in
@@ -193,7 +193,8 @@ DTRACE_DEPENDENT_OBJS = array.$(OBJEXT)
parse.$(OBJEXT) \
string.$(OBJEXT) \
symbol.$(OBJEXT) \
- vm.$(OBJEXT)
+ vm.$(OBJEXT) \
+ yjit.$(OBJEXT)
THREAD_MODEL = @THREAD_MODEL@

View File

@ -0,0 +1,15 @@
$NetBSD: patch-tool_runruby.rb,v 1.1.2.2 2022/05/08 14:53:38 bsiegert Exp $
Do not LD_PRELOAD on macOS, breaks chroots.
--- tool/runruby.rb.orig 2022-04-12 11:11:15.000000000 +0000
+++ tool/runruby.rb
@@ -132,7 +132,7 @@ if File.file?(libruby_so)
e = nil if e.empty?
e ||= "LD_PRELOAD" if /linux/ =~ RUBY_PLATFORM
end
- if e
+ unless /darwin/ =~ RUBY_PLATFORM
env[e] = [libruby_so, ENV[e]].compact.join(File::PATH_SEPARATOR)
end
end

View File

@ -1,6 +1,6 @@
# $NetBSD: Makefile,v 1.258 2022/03/25 23:07:54 tron Exp $
# $NetBSD: Makefile,v 1.258.2.1 2022/04/16 05:03:19 spz Exp $
DISTNAME= mutt-2.2.2
DISTNAME= mutt-2.2.3
CATEGORIES= mail
MASTER_SITES= http://ftp.mutt.org/pub/mutt/

View File

@ -1,8 +1,8 @@
$NetBSD: distinfo,v 1.106 2022/03/25 23:07:54 tron Exp $
$NetBSD: distinfo,v 1.106.2.1 2022/04/16 05:03:19 spz Exp $
BLAKE2s (mutt-2.2.2.tar.gz) = caedd9464b016b71e2b58e73c6e3f7060a80fbc3a9e59e7e4521009034c1575e
SHA512 (mutt-2.2.2.tar.gz) = da236c535a4dd18ed92f4b226a009711098c87cc28bbcf3abcd5f31f3ac074abe830f4f7c98cc8cda738a7a6d9421a088915094b33e53e32e9649ccccefe3481
Size (mutt-2.2.2.tar.gz) = 5507066 bytes
BLAKE2s (mutt-2.2.3.tar.gz) = f8db483166cda2df11f25641de491f481a19466b72713bb7f84cd997db818846
SHA512 (mutt-2.2.3.tar.gz) = 47656ee1b741d0d165fde4027fc7278910e39e9d5d0bfc5c52e7e767c3373bd3755833269d256364333fd4502c67490adcd5e4b33f1141f53ad575e9fb1a5131
Size (mutt-2.2.3.tar.gz) = 5509344 bytes
SHA1 (patch-Makefile.in) = 646eab10790053fff80bf8012ea85f40412b330c
SHA1 (patch-color.c) = fc3777cace89e615b13118561ba133c504741bd0
SHA1 (patch-configure) = e9c8afff997485ec6e363d52744c7446c447f293

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:03 spz Exp $
BLAKE2s (actionmailbox-6.0.4.7.gem) = 87bb91413dfedcad831b3e7b5e494b0a08191ffb47f5b8bea1782784e6164bcc
SHA512 (actionmailbox-6.0.4.7.gem) = d768983ec03caec01896bc127db2bf9c617f4be9cd5bd54781267e68fd79ea6e0e0c03b07c5864a9f8c85cc32beb6c28008949be7d8cce9d0116c296e78425c1
Size (actionmailbox-6.0.4.7.gem) = 20992 bytes
BLAKE2s (actionmailbox-6.0.4.8.gem) = b1ed1884e21b5cc60e43477a850551ca76f8015879c25f2d8412529810e7feff
SHA512 (actionmailbox-6.0.4.8.gem) = cb0321f009172186f151e24a4cea508aaf60d8ae47de86c19a11b3683087b60468ef7a3c26474ca83ff05ca685466d943d066a0fca431aa12307ff7d27b5c6a8
Size (actionmailbox-6.0.4.8.gem) = 20992 bytes

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.1 2021/02/14 14:02:59 taca Exp $
@comment $NetBSD: PLIST,v 1.1.10.1 2022/06/04 09:31:42 spz Exp $
${GEM_HOME}/cache/${GEM_NAME}.gem
${GEM_LIBDIR}/CHANGELOG.md
${GEM_LIBDIR}/MIT-LICENSE
@ -39,6 +39,7 @@ ${GEM_LIBDIR}/lib/action_mailbox/mail_ext/address_wrapping.rb
${GEM_LIBDIR}/lib/action_mailbox/mail_ext/addresses.rb
${GEM_LIBDIR}/lib/action_mailbox/mail_ext/from_source.rb
${GEM_LIBDIR}/lib/action_mailbox/mail_ext/recipients.rb
${GEM_LIBDIR}/lib/action_mailbox/mail_with_error_handling.rb
${GEM_LIBDIR}/lib/action_mailbox/relayer.rb
${GEM_LIBDIR}/lib/action_mailbox/router.rb
${GEM_LIBDIR}/lib/action_mailbox/router/route.rb

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:51 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:42 spz Exp $
BLAKE2s (actionmailbox-6.1.4.7.gem) = 25830260070385b9118c350cc42639bdc54cd794b5028d6929c39215a039a772
SHA512 (actionmailbox-6.1.4.7.gem) = 98695b94e4ff60ceb523a7c400bdaf7e0c815ebc6f59631f2b3c1dfa1bced3c20cefe764e47bed04f48b3d12f4b2c3ce4a31c33d7023ce651a8bd20af4923eab
Size (actionmailbox-6.1.4.7.gem) = 22016 bytes
BLAKE2s (actionmailbox-6.1.5.1.gem) = c291557cf00aa42dbcae8ef7fd8ae0057940c9d5a27b7914395f55193e3861d6
SHA512 (actionmailbox-6.1.5.1.gem) = 2850e76c008a2c39f68fa7fe2c5ef2a13acad9abc4d4141d8c21177665a31e3dcf0eeb7ec3464e5988e8f372110868453db0c36660218f415af57955bc8e6d93
Size (actionmailbox-6.1.5.1.gem) = 22528 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:04 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:11 spz Exp $
BLAKE2s (actionmailbox-7.0.2.3.gem) = 1b128d078fce5f3d05332d7c6e03748f276e466501c590ed59abcb9224da49a3
SHA512 (actionmailbox-7.0.2.3.gem) = e295348fce893e702f279ada805055c2b4c81f105c211324463666a53a9790c9e172fcd9aebd49f612ccf2e1917add0d58b10e3c80905b8a9bb2738e10ecd4cc
Size (actionmailbox-7.0.2.3.gem) = 22016 bytes
BLAKE2s (actionmailbox-7.0.2.4.gem) = 943359f4e99693ff40aef85318e0296d3120060424058b7c544f2e8af79f8760
SHA512 (actionmailbox-7.0.2.4.gem) = 1323897c764742c3fccca7d9b628a3ac95561b41cf3e27a3ad533daec90cc2e10ca3449db7ede658a1ca2e288ef75a72bb7bfa1ab28c61d4f853cd7f52c2171e
Size (actionmailbox-7.0.2.4.gem) = 22016 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.12 2022/03/13 15:04:27 taca Exp $
$NetBSD: distinfo,v 1.12.2.1 2022/06/04 09:00:31 spz Exp $
BLAKE2s (actionmailer-5.2.6.3.gem) = 4e34b22d44cd817cc3861da5dfcfa3e08848357feef6ea4fe73faab0b7425023
SHA512 (actionmailer-5.2.6.3.gem) = eab3c2c04a18bba7ef45d20f89bc7ed2ad76b83254fd97dcd388ea72485b51ada2e4f5b6af1ac45eae0b7141dd7c86992fbbc2ccbb92375685896715bc52faa7
Size (actionmailer-5.2.6.3.gem) = 29696 bytes
BLAKE2s (actionmailer-5.2.7.1.gem) = ad38601a56ca5ab66765f23cc0a737a7695abc87b8a3ae7e75d58572d03c13ab
SHA512 (actionmailer-5.2.7.1.gem) = 5c8538e0e6e88e83aa2c36f73da0d65d50623b4d0b667aabbe63850042c895b3aa343891fda586426bc371407eeaa200604cbd6167c231a9564ea40f6dd12dc3
Size (actionmailer-5.2.7.1.gem) = 29696 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.16 2022/03/13 15:08:22 taca Exp $
$NetBSD: distinfo,v 1.16.2.1 2022/06/04 09:17:03 spz Exp $
BLAKE2s (actionmailer-6.0.4.7.gem) = 005fa9037513f779a51d3d3667ebfb1fa349d50b5832e760aa085389db72e201
SHA512 (actionmailer-6.0.4.7.gem) = 91016188d5d89fa1d2f0ac1e0998c39df6a172c08c61678e225073f84649227bf5248bc5c1f742b8cd80b28a2d7c5593116dc66282ab0a8558a9829585f284c9
Size (actionmailer-6.0.4.7.gem) = 31232 bytes
BLAKE2s (actionmailer-6.0.4.8.gem) = 27d71994eef5f57de0c57655f770f20da0e9cc68310b9c23ca67922ef1c6fa6e
SHA512 (actionmailer-6.0.4.8.gem) = 563cc284121c1f50f66ed26e2208623b9f513317987b80cf42ae3759b0df5d531c6336237d754b4b73dd145c93a2b52432fa51c59a677cd71c36247b723dc317
Size (actionmailer-6.0.4.8.gem) = 31232 bytes

View File

@ -1,4 +1,4 @@
@comment $NetBSD: PLIST,v 1.1 2021/02/14 14:02:22 taca Exp $
@comment $NetBSD: PLIST,v 1.1.10.1 2022/06/04 09:31:42 spz Exp $
${GEM_HOME}/cache/${GEM_NAME}.gem
${GEM_LIBDIR}/CHANGELOG.md
${GEM_LIBDIR}/MIT-LICENSE
@ -13,6 +13,7 @@ ${GEM_LIBDIR}/lib/action_mailer/inline_preview_interceptor.rb
${GEM_LIBDIR}/lib/action_mailer/log_subscriber.rb
${GEM_LIBDIR}/lib/action_mailer/mail_delivery_job.rb
${GEM_LIBDIR}/lib/action_mailer/mail_helper.rb
${GEM_LIBDIR}/lib/action_mailer/mail_with_error_handling.rb
${GEM_LIBDIR}/lib/action_mailer/message_delivery.rb
${GEM_LIBDIR}/lib/action_mailer/parameterized.rb
${GEM_LIBDIR}/lib/action_mailer/preview.rb

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.11 2022/03/13 15:11:51 taca Exp $
$NetBSD: distinfo,v 1.11.2.1 2022/06/04 09:31:42 spz Exp $
BLAKE2s (actionmailer-6.1.4.7.gem) = 80da85f7ab6abd68e9773064bb3e99f55b8f6ef3efa1c9fa48474cd07f549eda
SHA512 (actionmailer-6.1.4.7.gem) = 2bfaa3a6dabd9bc1a44fdfa63820013004c08abca65881f6e88e2876936a684064a58b11bebf63bf329eccc47072381350ee01f758456dcd8cf00f8eb667eb66
Size (actionmailer-6.1.4.7.gem) = 30720 bytes
BLAKE2s (actionmailer-6.1.5.1.gem) = 39ad9366cdd5ba092dd426e4de94c325e39cd8f15136534a3ea0c26eafb98e9f
SHA512 (actionmailer-6.1.5.1.gem) = bfb5826c36348822e93c14b24990fd5fda99455b8c054820c0258c9cec1d732bdde9fd0960ffdc1fdac5dcf31cf3beb1784c040afa67dba096038f5c865dcbfc
Size (actionmailer-6.1.5.1.gem) = 30720 bytes

View File

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.4 2022/03/13 15:15:04 taca Exp $
$NetBSD: distinfo,v 1.4.2.1 2022/06/04 09:47:11 spz Exp $
BLAKE2s (actionmailer-7.0.2.3.gem) = bbfd2ad05d4dd2b470c9b1e0d61d3445698f7b9f96b9f2f93c55084d532505dc
SHA512 (actionmailer-7.0.2.3.gem) = d8761a5f964eca7e54edac83c66e5a0b3e9a988351b7ee294e7b421f5aefaac860bc3f1ddcdc93ff84977124a352f5004a053249ad5fce41afdfbbdd040d370f
Size (actionmailer-7.0.2.3.gem) = 30208 bytes
BLAKE2s (actionmailer-7.0.2.4.gem) = 1dbd83a141611ac1a8b0a881b1b565ed0c3db87a832f5e2497d3929c98e0af87
SHA512 (actionmailer-7.0.2.4.gem) = 9e226de5de4f7ef7f932fe26b719ebdf28e3851986bd5b142e37f4d2cac3eb3d782f8ab9879dacaeae7a677fde5cd5a0f5de6fb258a61170aa73eb208f654809
Size (actionmailer-7.0.2.4.gem) = 30208 bytes

View File

@ -1,7 +1,7 @@
# $NetBSD: Makefile,v 1.140 2021/11/09 22:02:36 jnemeth Exp $
# $NetBSD: Makefile,v 1.140.4.1 2022/05/20 12:58:37 bsiegert Exp $
PKGNAME= sendmail-${DIST_VERS}
PKGREVISION= 1
PKGREVISION= 2
COMMENT= The well known Mail Transport Agent
CONFLICTS+= courier-mta-[0-9]* fastforward>=0.51nb2 postfix-[0-9]*

View File

@ -1,4 +1,4 @@
$NetBSD: distinfo,v 1.67 2021/12/19 04:01:11 jnemeth Exp $
$NetBSD: distinfo,v 1.67.4.1 2022/05/20 12:58:37 bsiegert Exp $
BLAKE2s (sendmail.8.16.1.tar.gz) = 6f92d35a8dfe1ba071da197ae53559a1d67290f7042e5650ebbdac3d3045fe2f
SHA512 (sendmail.8.16.1.tar.gz) = d7d4aac3c6d7505782abdb166204901b8b51cac000d610dfe40eda9eef7441a073af9e8e0b14c8719b07b445f55a1e2c28ac63d663d0daa7f1eafc5a101788b2
@ -31,7 +31,7 @@ SHA1 (patch-bg) = 716c90ff76edbdcb223111412bdd011d4a252ca6
SHA1 (patch-bl) = 4fff262691deb2fcacf5013bfeb5aede45783dcd
SHA1 (patch-bm) = b1ec82ab5a97c2dc7f7230d31e47c89b7b5ac1d9
SHA1 (patch-bn) = 3af37c9d3523d6093181ae3b7d4c25bc8173b7f9
SHA1 (patch-bo) = ca819c8f8de9bd67b7e6d5738020c90b03c6fad8
SHA1 (patch-bo) = e55b2cb4ee31fdfa593a307b4ec8ca0799f55060
SHA1 (patch-bp) = 9a1daac264aba6c4fc39a63a464b942dd25b06eb
SHA1 (patch-bq) = 548bf6d373cb49958437548a65803b6f3c6b35d2
SHA1 (patch-br) = 1f0b9716906b91ce2b867bf65e5c06ad16749e36

View File

@ -1,8 +1,12 @@
$NetBSD: patch-bo,v 1.4 2021/07/04 07:57:13 jnemeth Exp $
$NetBSD: patch-bo,v 1.4.6.1 2022/05/20 12:58:37 bsiegert Exp $
Add blacklist support.
Pull up SMTP AUTH fix from 8.17.1.9 as per:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=262935
--- sendmail/sendmail.h.orig 2020-07-02 05:00:37.000000000 +0000
+++ sendmail/sendmail.h
@@ -63,6 +63,10 @@ SM_UNUSED(static char SmailId[]) = "@(#)
+++ sendmail/sendmail.h 2022-05-10 09:51:29.162720330 +0000
@@ -63,6 +63,10 @@
#endif
#include "bf.h"
@ -13,7 +17,16 @@ $NetBSD: patch-bo,v 1.4 2021/07/04 07:57:13 jnemeth Exp $
#include "timers.h"
#include <sm/exc.h>
#include <sm/heap.h>
@@ -2576,6 +2580,8 @@ EXTERN int Hacks; /* bit field of run-ti
@@ -706,7 +710,7 @@
# define SASL_IS_AUTH 2 /* authenticated */
/* SASL options */
-# define SASL_AUTH_AUTH 0x1000 /* use auth= only if authenticated */
+# define SASL_AUTH_AUTH 0x10000 /* use auth= only if authenticated */
# if SASL >= 20101
# define SASL_SEC_MASK SASL_SEC_MAXIMUM /* mask for SASL_SEC_* values: sasl.h */
# else /* SASL >= 20101 */
@@ -2576,6 +2580,8 @@
EXTERN int ConnectionRateWindowSize;

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.90 2022/01/29 07:46:10 wiz Exp $
# $NetBSD: Makefile,v 1.90.2.1 2022/05/20 12:54:08 bsiegert Exp $
DISTNAME= numpy-1.21.5
PKGNAME= ${PYPKGPREFIX}-${DISTNAME}
@ -17,7 +17,7 @@ TEST_DEPENDS+= ${PYPKGPREFIX}-nose-[0-9]*:../../devel/py-nose
TEST_DEPENDS+= ${PYPKGPREFIX}-test-[0-9]*:../../devel/py-test
# error: 'for' loop initial declarations are only allowed in C99 mode
USE_LANGUAGES= c99 c++ fortran
USE_LANGUAGES= c99 c++11 fortran
.include "../../math/py-numpy/Makefile.make_env"

View File

@ -1,6 +1,6 @@
# $NetBSD: Makefile,v 1.21 2021/11/13 11:27:34 nia Exp $
# $NetBSD: Makefile,v 1.21.4.1 2022/05/20 13:05:56 bsiegert Exp $
DISTNAME= libaom-3.2.0
DISTNAME= libaom-3.3.0
CATEGORIES= multimedia
MASTER_SITES= https://storage.googleapis.com/aom-releases/
@ -11,7 +11,6 @@ LICENSE= 2-clause-bsd
MAKE_JOBS_SAFE= no
WRKSRC= ${WRKDIR}
USE_CMAKE= yes
USE_LANGUAGES= c c++
USE_TOOLS+= perl

View File

@ -1,9 +1,9 @@
$NetBSD: distinfo,v 1.15 2021/12/28 17:35:52 gutteridge Exp $
$NetBSD: distinfo,v 1.15.4.1 2022/05/20 13:05:56 bsiegert Exp $
BLAKE2s (libaom-3.2.0.tar.gz) = 0324096a1c955c6db4fa194397280810c36398b51b05833633d621268a88a68c
SHA512 (libaom-3.2.0.tar.gz) = 649bebde85c1a42b0c1c3d2d3b7110b999e3ee1c8e76595259e4e75a8b0f3918e23ff7c7e2c313da4d579882f55bf29765bb882570280adc81f3bc1e82f1ee19
Size (libaom-3.2.0.tar.gz) = 4717955 bytes
SHA1 (patch-aom__ports_ppc__cpudetect.c) = 57bf7974b0be44939a7e9ab59d93a4cf49844411
SHA1 (patch-build_cmake_aom__configure.cmake) = 87a8b65cee873f7deff18cd74c140cd7e8c95924
BLAKE2s (libaom-3.3.0.tar.gz) = 860dad497824c53b87ccae3f047195e94e52649cccf49a9906af3c8290e6cd78
SHA512 (libaom-3.3.0.tar.gz) = 9bd118bf46d777da4e85f348fed95510ce583d16d005d062d33e2899f16f24bdb8b120792a7c77ccb64b4e1ff5b3d934342fb1b356bb426693ef69220f138c5f
Size (libaom-3.3.0.tar.gz) = 4768475 bytes
SHA1 (patch-aom__ports_ppc__cpudetect.c) = 5b34032e3530a3ba65755e7faefb2f1f97855d98
SHA1 (patch-build_cmake_aom__configure.cmake) = d9357e5e52564c4bf5facc9ed20696e0522ae22f
SHA1 (patch-build_cmake_exports.cmake) = be181c5718a5fac75f31bd8e74f214fc8b610ad9
SHA1 (patch-build_cmake_version.cmake) = 1e6b4a1373c0d54cafdc8ad5c153881e41758bd6
SHA1 (patch-build_cmake_version.cmake) = ec0255b02649b49da92d4fa13450850841aa4a33

View File

@ -1,15 +1,15 @@
$NetBSD: patch-aom__ports_ppc__cpudetect.c,v 1.2 2021/12/28 17:35:52 gutteridge Exp $
$NetBSD: patch-aom__ports_ppc__cpudetect.c,v 1.2.4.1 2022/05/20 13:05:56 bsiegert Exp $
Make this at least build on NetBSD.
So far no dynamic CPU feature detection on NetBSD.
--- aom_ports/ppc_cpudetect.c.orig 2021-10-14 18:05:43.000000000 +0000
--- aom_ports/ppc_cpudetect.c.orig 2022-02-15 07:20:42.000000000 +0000
+++ aom_ports/ppc_cpudetect.c
@@ -12,14 +12,16 @@
#include <fcntl.h>
#include <unistd.h>
#include <stdint.h>
+#if !defined(__NetBSD__)
+#ifdef __linux
#include <asm/cputable.h>
#include <linux/auxvec.h>
+#endif
@ -19,7 +19,7 @@ So far no dynamic CPU feature detection on NetBSD.
#include "aom_ports/ppc.h"
-#if CONFIG_RUNTIME_CPU_DETECT
+#if (CONFIG_RUNTIME_CPU_DETECT && !defined(__NetBSD__))
+#if (CONFIG_RUNTIME_CPU_DETECT && defined(__linux))
static int cpu_env_flags(int *flags) {
char *env;
env = getenv("AOM_SIMD_CAPS");

View File

@ -1,16 +1,15 @@
$NetBSD: patch-build_cmake_aom__configure.cmake,v 1.4 2021/10/09 14:47:24 nia Exp $
$NetBSD: patch-build_cmake_aom__configure.cmake,v 1.4.4.1 2022/05/20 13:05:56 bsiegert Exp $
- Don't disable fortify just because it's a release build.
- Set CPU correctly on SunOS.
- Add support for NetBSD/*arm*
--- build/cmake/aom_configure.cmake.orig 2021-10-09 07:54:04.000000000 +0000
--- build/cmake/aom_configure.cmake.orig 2022-02-15 07:20:42.000000000 +0000
+++ build/cmake/aom_configure.cmake
@@ -66,12 +66,16 @@ if(NOT AOM_TARGET_CPU)
" CMAKE_GENERATOR=${CMAKE_GENERATOR}\n")
@@ -67,11 +67,16 @@ if(NOT AOM_TARGET_CPU)
endif()
elseif(cpu_lowercase STREQUAL "i386" OR cpu_lowercase STREQUAL "x86")
- set(AOM_TARGET_CPU "x86")
set(AOM_TARGET_CPU "x86")
- elseif(cpu_lowercase MATCHES "^arm" OR cpu_lowercase MATCHES "^mips")
+ if(${CMAKE_SIZEOF_VOID_P} EQUAL 4)
+ set(AOM_TARGET_CPU "x86")
@ -26,7 +25,7 @@ $NetBSD: patch-build_cmake_aom__configure.cmake,v 1.4 2021/10/09 14:47:24 nia Ex
set(AOM_TARGET_CPU "ppc")
else()
message(WARNING "The architecture ${CMAKE_SYSTEM_PROCESSOR} is not "
@@ -321,9 +325,6 @@ else()
@@ -322,9 +327,6 @@ else()
add_compiler_flag_if_supported("-Werror")
endif()

View File

@ -1,19 +1,21 @@
$NetBSD: patch-build_cmake_version.cmake,v 1.2 2021/10/09 14:47:24 nia Exp $
$NetBSD: patch-build_cmake_version.cmake,v 1.2.4.1 2022/05/20 13:05:56 bsiegert Exp $
Write the correct version number in the aom.pc file.
--- build/cmake/version.cmake.orig 2021-10-09 07:54:04.000000000 +0000
--- build/cmake/version.cmake.orig 2022-02-15 07:20:42.000000000 +0000
+++ build/cmake/version.cmake
@@ -23,28 +23,8 @@ include("${AOM_ROOT}/build/cmake/util.cm
@@ -23,30 +23,7 @@ include("${AOM_ROOT}/build/cmake/util.cm
# Generate the version string for this run.
unset(aom_version)
-if(EXISTS "${GIT_EXECUTABLE}")
- execute_process(COMMAND ${GIT_EXECUTABLE} --git-dir=${AOM_ROOT}/.git describe
- execute_process(COMMAND ${GIT_EXECUTABLE}
- --git-dir=${AOM_ROOT}/.git describe
- --match=v[0-9]*
- OUTPUT_VARIABLE aom_version
- ERROR_QUIET
- RESULT_VARIABLE version_check_result)
-
- if(${version_check_result} EQUAL 0)
- string(STRIP "${aom_version}" aom_version)
-

View File

@ -1,7 +1,7 @@
# $NetBSD: Makefile,v 1.66 2022/01/03 07:26:01 wiz Exp $
# $NetBSD: Makefile,v 1.66.2.1 2022/04/23 19:04:05 bsiegert Exp $
DISTNAME= pitivi-0.999
PKGREVISION= 7
PKGREVISION= 8
CATEGORIES= multimedia
MASTER_SITES= ${MASTER_SITE_GNOME:=sources/pitivi/0.999/}
EXTRACT_SUFX= .tar.xz
@ -49,7 +49,5 @@ LDFLAGS+= -lpython${PYVERSSUFFIX}
.include "../../multimedia/gst-plugins1-editing-services/buildlink3.mk"
.include "../../multimedia/gst-plugins1-good/buildlink3.mk"
.include "../../multimedia/gst-plugins1-gtk/buildlink3.mk"
# HACK: avoid conflict with gst-plugins1-bad...
#.include "../../multimedia/gst-plugins1-transcoder/buildlink3.mk"
.include "../../sysutils/desktop-file-utils/desktopdb.mk"
.include "../../mk/bsd.pkg.mk"

View File

@ -1,11 +1,5 @@
@comment $NetBSD: PLIST,v 1.7 2022/01/03 03:30:44 mef Exp $
bin/gst-transcoder-1.0
@comment $NetBSD: PLIST,v 1.7.2.1 2022/04/23 19:04:05 bsiegert Exp $
bin/pitivi
include/gstreamer-1.0/gst/transcoder/gsttranscoder.h
lib/girepository-1.0/GstTranscoder-1.0.typelib
lib/gstreamer-1.0/libgsttranscode.so
lib/libgsttranscoder-1.0.so
lib/libgsttranscoder-1.0.so.0
lib/pitivi/python/pitivi/__init__.py
lib/pitivi/python/pitivi/__init__.pyc
lib/pitivi/python/pitivi/application.py
@ -114,20 +108,8 @@ lib/pitivi/python/pitivi/viewer/title_overlay.py
lib/pitivi/python/pitivi/viewer/title_overlay.pyc
lib/pitivi/python/pitivi/viewer/viewer.py
lib/pitivi/python/pitivi/viewer/viewer.pyc
lib/pkgconfig/gst-transcoder-1.0.pc
share/appdata/org.pitivi.Pitivi.appdata.xml
share/applications/org.pitivi.Pitivi.desktop
share/gir-1.0/GstTranscoder-1.0.gir
share/gstreamer-1.0/encoding-profiles/device/dvd.gep
share/gstreamer-1.0/encoding-profiles/file-extension/avi.gep
share/gstreamer-1.0/encoding-profiles/file-extension/flv.gep
share/gstreamer-1.0/encoding-profiles/file-extension/mkv.gep
share/gstreamer-1.0/encoding-profiles/file-extension/mp3.gep
share/gstreamer-1.0/encoding-profiles/file-extension/mp4.gep
share/gstreamer-1.0/encoding-profiles/file-extension/oga.gep
share/gstreamer-1.0/encoding-profiles/file-extension/ogv.gep
share/gstreamer-1.0/encoding-profiles/file-extension/webm.gep
share/gstreamer-1.0/encoding-profiles/online-services/youtube.gep
share/help/C/pitivi/about.page
share/help/C/pitivi/cheatsheet.page
share/help/C/pitivi/codecscontainers.page

Some files were not shown because too many files have changed in this diff Show More