Re: [new] gurk-rs - a cli signal client

2023-02-16 Thread Stefan Hagen
Marcus MERIGHI wrote (2023-02-11 17:14 CET):
> sh+openbsd-po...@codevoid.de (Stefan Hagen), 2023.02.10 (Fri) 19:28 (CET):
> > here is a command line signal client. It's lacking a lot of features,
> > but basic text send/receive functionality is there.
> 
> for me the client quits upon receiving messages, reliably.
> 
> 2023-02-11T15:50:33.433155Z ERROR panic: thread 'main' panicked at
> 'called `Result::unwrap()` on an `Err` value: Error { kind:
> Uncategorized, message: "no current exe available (short)" }':
> /usr/ports/pobj/gurk-rs-0.3.0/gurk-rs-0.3.0/modcargo-crates/ \
> notify-rust-4.5.10/src/notification.rs:23

Oh, that's unfortunate and it's keeping me from going forward. I know it 
works for me and kn@ had some success. But I also don't want to import 
something that only works for half of the people. Missing features are 
fine, but it shouldn't break like that.

> Regarding
> Signal Messenger client for the terminal written in Rust.
> 
> While beeing completely right it does not tell that it is a Text User
> Interface (TUI). Maybe steeli^Wtaking a bit from tut(1)'s description?
> 
> So 
> TUI for Mastodon with vim inspired keys
> becomes
> Signal Messenger client TUI with strange key bindings

Ironically, I find "for the terminal" clearer than TUI.

Only change in the attached version:

$ cat pkg/DESCR
Signal Messenger TUI client written in rust. It's an early development
version which allows sending and receiving text messages from the
terminal. The non-configurable key bindings can be viewed with F1.

I'd be happy to see some reports where it works.

Best regards,
Stefan


gurk-rs.tgz
Description: application/tar-gz


CVS: cvs.openbsd.org: ports

2023-02-16 Thread Robert Nagy
CVSROOT:/cvs
Module name:ports
Changes by: rob...@cvs.openbsd.org  2023/02/16 23:54:57

Modified files:
mail/grommunio/web: Makefile distinfo 

Log message:
update to upstream's git repo's HEAD



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Rafael Sadowski
CVSROOT:/cvs
Module name:ports
Changes by: rsadow...@cvs.openbsd.org   2023/02/16 23:54:34

Modified files:
devel/jenkins/devel: Makefile distinfo 

Log message:
Update jenkins-devel to 2.391



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Klemens Nanni
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/02/16 16:45:16

Modified files:
devel/abseil-cpp: Makefile 
devel/abseil-cpp/pkg: PLIST 
Added files:
devel/abseil-cpp/patches: patch-absl_log_CMakeLists_txt 

Log message:
Ship scoped_mock_log

Built already, package it as well so that ports can use it.
for tb (working on new devel/protobuf tests)



UPDATE: Tor Browser 12.0.3 for 7.2-stable

2023-02-16 Thread Caspar Schutijser
And here is the diff for 7.2-stable. It's still building but OK
provided it works out?

Caspar


Index: meta/tor-browser/Makefile
===
RCS file: /cvs/ports/meta/tor-browser/Makefile,v
retrieving revision 1.59.2.6
diff -u -p -r1.59.2.6 Makefile
--- meta/tor-browser/Makefile   28 Jan 2023 21:04:58 -  1.59.2.6
+++ meta/tor-browser/Makefile   16 Feb 2023 21:49:42 -
@@ -2,11 +2,11 @@ COMMENT=  Tor Browser meta package
 
 MAINTAINER=Caspar Schutijser 
 
-PKGNAME=   tor-browser-12.0.2
+PKGNAME=   tor-browser-12.0.3
 ONLY_FOR_ARCHS =   amd64
 
-RUN_DEPENDS=   www/tor-browser/browser>=12.0.2 \
-   www/tor-browser/noscript>=11.4.14 \
+RUN_DEPENDS=   www/tor-browser/browser>=12.0.3 \
+   www/tor-browser/noscript>=11.4.16 \
net/tor>=0.4.7.13
 
 .include 
Index: www/tor-browser/Makefile.inc
===
RCS file: /cvs/ports/www/tor-browser/Makefile.inc,v
retrieving revision 1.57.2.6
diff -u -p -r1.57.2.6 Makefile.inc
--- www/tor-browser/Makefile.inc28 Jan 2023 21:04:58 -  1.57.2.6
+++ www/tor-browser/Makefile.inc16 Feb 2023 21:49:42 -
@@ -3,7 +3,7 @@ HOMEPAGE ?= https://www.torproject.org
 PERMIT_PACKAGE ?=  Yes
 CATEGORIES =   www
 BROWSER_NAME = tor-browser
-TB_VERSION =   12.0.2
+TB_VERSION =   12.0.3
 TB_PREFIX =tb
 
 # keep meta/tor-browser in sync
Index: www/tor-browser/browser/Makefile
===
RCS file: /cvs/ports/www/tor-browser/browser/Makefile,v
retrieving revision 1.88.2.7
diff -u -p -r1.88.2.7 Makefile
--- www/tor-browser/browser/Makefile28 Jan 2023 21:04:58 -  1.88.2.7
+++ www/tor-browser/browser/Makefile16 Feb 2023 21:49:42 -
@@ -12,7 +12,7 @@ EXTRACT_SUFX =.tar.xz
 PATCHORIG =.pat.orig
 
 PKGNAME =  ${TB_PREFIX}-browser-${TB_VERSION:S/a/alpha/}
-DISTNAME = src-firefox-tor-browser-102.7.0esr-12.0-1-build1
+DISTNAME = src-firefox-tor-browser-102.8.0esr-12.0-1-build2
 
 FIX_EXTRACT_PERMISSIONS= Yes
 DISTFILES +=   ${DISTNAME}.tar.xz \
Index: www/tor-browser/browser/distinfo
===
RCS file: /cvs/ports/www/tor-browser/browser/distinfo,v
retrieving revision 1.55.2.6
diff -u -p -r1.55.2.6 distinfo
--- www/tor-browser/browser/distinfo28 Jan 2023 21:04:58 -  1.55.2.6
+++ www/tor-browser/browser/distinfo16 Feb 2023 21:49:42 -
@@ -1,4 +1,4 @@
-SHA256 (mozilla/src-firefox-tor-browser-102.7.0esr-12.0-1-build1.tar.xz) = 
2ow6l3X0+AjqeEKMrb6EjQ8v3yamwZOzRSWQ4k9Ve/M=
-SHA256 (mozilla/tor-browser-linux64-12.0.2_ALL.tar.xz) = 
qX2uQP1jXM/FEm1QBFm5Q3Uo5KSzXMWJsI1swRQnlng=
-SIZE (mozilla/src-firefox-tor-browser-102.7.0esr-12.0-1-build1.tar.xz) = 
511809384
-SIZE (mozilla/tor-browser-linux64-12.0.2_ALL.tar.xz) = 104624868
+SHA256 (mozilla/src-firefox-tor-browser-102.8.0esr-12.0-1-build2.tar.xz) = 
9qVftsQjugF7QVgrXZH5xH4tc342d11K+S4KXV3jNwY=
+SHA256 (mozilla/tor-browser-linux64-12.0.3_ALL.tar.xz) = 
bOGY/RdwD6O7QIuOiBw7OVnZfpumGGso6hwMJJwN2g0=
+SIZE (mozilla/src-firefox-tor-browser-102.8.0esr-12.0-1-build2.tar.xz) = 
511929236
+SIZE (mozilla/tor-browser-linux64-12.0.3_ALL.tar.xz) = 105682144
Index: www/tor-browser/noscript/Makefile
===
RCS file: /cvs/ports/www/tor-browser/noscript/Makefile,v
retrieving revision 1.45.2.3
diff -u -p -r1.45.2.3 Makefile
--- www/tor-browser/noscript/Makefile   28 Jan 2023 21:04:58 -  1.45.2.3
+++ www/tor-browser/noscript/Makefile   16 Feb 2023 21:49:42 -
@@ -1,5 +1,5 @@
 ADDON_NAME =   noscript
-V =11.4.14
+V =11.4.16
 COMMENT =  Tor Browser add-on: flexible JS blocker
 HOMEPAGE = https://noscript.net
 MASTER_SITES = https://secure.informaction.com/download/releases/
Index: www/tor-browser/noscript/distinfo
===
RCS file: /cvs/ports/www/tor-browser/noscript/distinfo,v
retrieving revision 1.40.2.3
diff -u -p -r1.40.2.3 distinfo
--- www/tor-browser/noscript/distinfo   28 Jan 2023 21:04:58 -  1.40.2.3
+++ www/tor-browser/noscript/distinfo   16 Feb 2023 21:49:42 -
@@ -1,2 +1,2 @@
-SHA256 (noscript-11.4.14.xpi) = FK9qPLwmnARfLZUOHk98KZgbNaerxh0kE/W7i9cxGFc=
-SIZE (noscript-11.4.14.xpi) = 948881
+SHA256 (noscript-11.4.16.xpi) = RL3d2JvuEeUuCeqWeuvTqpltwtZsGoGejf2vmhbMdTs=
+SIZE (noscript-11.4.16.xpi) = 949002



UPDATE: Tor Browser 12.0.3

2023-02-16 Thread Caspar Schutijser
Hi,

Below is a diff that updates Tor Browser to 12.0.3. Tested on amd64.

Diff for 7.2-stable to follow.

Comments or OKs?

Caspar 


Index: meta/tor-browser/Makefile
===
RCS file: /cvs/ports/meta/tor-browser/Makefile,v
retrieving revision 1.67
diff -u -p -r1.67 Makefile
--- meta/tor-browser/Makefile   29 Jan 2023 08:56:47 -  1.67
+++ meta/tor-browser/Makefile   16 Feb 2023 21:49:29 -
@@ -2,11 +2,11 @@ COMMENT=  Tor Browser meta package
 
 MAINTAINER=Caspar Schutijser 
 
-PKGNAME=   tor-browser-12.0.2
+PKGNAME=   tor-browser-12.0.3
 ONLY_FOR_ARCHS =   amd64
 
-RUN_DEPENDS=   www/tor-browser/browser>=12.0.2 \
-   www/tor-browser/noscript>=11.4.14 \
+RUN_DEPENDS=   www/tor-browser/browser>=12.0.3 \
+   www/tor-browser/noscript>=11.4.16 \
net/tor>=0.4.7.13
 
 .include 
Index: www/tor-browser/Makefile.inc
===
RCS file: /cvs/ports/www/tor-browser/Makefile.inc,v
retrieving revision 1.64
diff -u -p -r1.64 Makefile.inc
--- www/tor-browser/Makefile.inc29 Jan 2023 08:56:47 -  1.64
+++ www/tor-browser/Makefile.inc16 Feb 2023 21:49:29 -
@@ -3,7 +3,7 @@ HOMEPAGE ?= https://www.torproject.org
 PERMIT_PACKAGE ?=  Yes
 CATEGORIES =   www
 BROWSER_NAME = tor-browser
-TB_VERSION =   12.0.2
+TB_VERSION =   12.0.3
 TB_PREFIX =tb
 
 # keep meta/tor-browser in sync
Index: www/tor-browser/browser/Makefile
===
RCS file: /cvs/ports/www/tor-browser/browser/Makefile,v
retrieving revision 1.102
diff -u -p -r1.102 Makefile
--- www/tor-browser/browser/Makefile29 Jan 2023 08:56:47 -  1.102
+++ www/tor-browser/browser/Makefile16 Feb 2023 21:49:29 -
@@ -12,7 +12,7 @@ EXTRACT_SUFX =.tar.xz
 PATCHORIG =.pat.orig
 
 PKGNAME =  ${TB_PREFIX}-browser-${TB_VERSION:S/a/alpha/}
-DISTNAME = src-firefox-tor-browser-102.7.0esr-12.0-1-build1
+DISTNAME = src-firefox-tor-browser-102.8.0esr-12.0-1-build2
 
 FIX_EXTRACT_PERMISSIONS= Yes
 DISTFILES +=   ${DISTNAME}.tar.xz \
Index: www/tor-browser/browser/distinfo
===
RCS file: /cvs/ports/www/tor-browser/browser/distinfo,v
retrieving revision 1.62
diff -u -p -r1.62 distinfo
--- www/tor-browser/browser/distinfo29 Jan 2023 08:56:47 -  1.62
+++ www/tor-browser/browser/distinfo16 Feb 2023 21:49:29 -
@@ -1,6 +1,6 @@
-SHA256 (mozilla/src-firefox-tor-browser-102.7.0esr-12.0-1-build1.tar.xz) = 
2ow6l3X0+AjqeEKMrb6EjQ8v3yamwZOzRSWQ4k9Ve/M=
-SHA256 (mozilla/tor-browser-linux64-12.0.2_ALL.tar.xz) = 
qX2uQP1jXM/FEm1QBFm5Q3Uo5KSzXMWJsI1swRQnlng=
-SHA256 (mozilla/tor-expert-bundle-12.0.2-linux-x86_64.tar.gz) = 
CDGdr0NeqXDPlUiVz2Boj04C/o9X6Z9eoPeZ5QkU/EU=
-SIZE (mozilla/src-firefox-tor-browser-102.7.0esr-12.0-1-build1.tar.xz) = 
511809384
-SIZE (mozilla/tor-browser-linux64-12.0.2_ALL.tar.xz) = 104624868
-SIZE (mozilla/tor-expert-bundle-12.0.2-linux-x86_64.tar.gz) = 17690176
+SHA256 (mozilla/src-firefox-tor-browser-102.8.0esr-12.0-1-build2.tar.xz) = 
9qVftsQjugF7QVgrXZH5xH4tc342d11K+S4KXV3jNwY=
+SHA256 (mozilla/tor-browser-linux64-12.0.3_ALL.tar.xz) = 
bOGY/RdwD6O7QIuOiBw7OVnZfpumGGso6hwMJJwN2g0=
+SHA256 (mozilla/tor-expert-bundle-12.0.3-linux-x86_64.tar.gz) = 
QzVWFJNuoqchH1jHTxt0khklmus6IbTekcnbqCZKNSE=
+SIZE (mozilla/src-firefox-tor-browser-102.8.0esr-12.0-1-build2.tar.xz) = 
511929236
+SIZE (mozilla/tor-browser-linux64-12.0.3_ALL.tar.xz) = 105682144
+SIZE (mozilla/tor-expert-bundle-12.0.3-linux-x86_64.tar.gz) = 17694429
Index: www/tor-browser/noscript/Makefile
===
RCS file: /cvs/ports/www/tor-browser/noscript/Makefile,v
retrieving revision 1.49
diff -u -p -r1.49 Makefile
--- www/tor-browser/noscript/Makefile   29 Jan 2023 08:56:47 -  1.49
+++ www/tor-browser/noscript/Makefile   16 Feb 2023 21:49:29 -
@@ -1,5 +1,5 @@
 ADDON_NAME =   noscript
-V =11.4.14
+V =11.4.16
 COMMENT =  Tor Browser add-on: flexible JS blocker
 HOMEPAGE = https://noscript.net
 MASTER_SITES = https://secure.informaction.com/download/releases/
Index: www/tor-browser/noscript/distinfo
===
RCS file: /cvs/ports/www/tor-browser/noscript/distinfo,v
retrieving revision 1.43
diff -u -p -r1.43 distinfo
--- www/tor-browser/noscript/distinfo   29 Jan 2023 08:56:47 -  1.43
+++ www/tor-browser/noscript/distinfo   16 Feb 2023 21:49:29 -
@@ -1,2 +1,2 @@
-SHA256 (noscript-11.4.14.xpi) = FK9qPLwmnARfLZUOHk98KZgbNaerxh0kE/W7i9cxGFc=
-SIZE (noscript-11.4.14.xpi) = 948881
+SHA256 (noscript-11.4.16.xpi) = 

Re: [Update] lang/node 18.14.0

2023-02-16 Thread A Tammy


On 2/12/23 09:02, Volker Schlecht wrote:
> ping
>
> On 2/5/23 14:17, Volker Schlecht wrote:
>> Update lang/node to 18.14.0
>>
>> * reinstate old patch to disable building the bundled googletest,
>> because that could lead to build-time conflicts when devel/gtest is
>> installed, now that the version of devel/gtest has diverged from the
>> bundled version again
>>
>> * This fixes a build issue on riscv64 that slipped into v18.13.0
>> https://github.com/nodejs/node/commit/1e11247b91
>>
>> * PLIST churn due to updated npm
>>
>> Built and tested on amd64, i386 and arm64; riscv64 is very likely to
>> work now as well ...
>
builds and works for me on amd64, ok aisha@

don't have any other arch around so can't test. Anyone wants to weigh in?

Aisha



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Klemens Nanni
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/02/16 13:37:29

Modified files:
converters/rpm2cpio: Makefile 

Log message:
update freebsd homepage from svnweb to cgit



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Klemens Nanni
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/02/16 12:00:25

Modified files:
sysutils   : Makefile 

Log message:
+nix



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Klemens Nanni
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/02/16 11:59:44

Log message:
Import sysutils/nix 2.3.16

Feedback Tests OK abieber
---
Nix is a powerful package manager for Linux and other Unix systems that
makes package management reliable and reproducible. It provides atomic
upgrades and rollbacks, side-by-side installation of multiple versions
of a package, multi-user package management and easy setup of build
environments.

Status:

Vendor Tag: kn
Release Tags:   kn_20230216

N ports/sysutils/nix/Makefile
N ports/sysutils/nix/distinfo
N ports/sysutils/nix/patches/patch-src_nix_local_mk
N ports/sysutils/nix/patches/patch-src_libexpr_local_mk
N ports/sysutils/nix/patches/patch-src_libexpr_primops_fetchGit_cc
N ports/sysutils/nix/patches/patch-src_libstore_download_cc
N ports/sysutils/nix/patches/patch-src_libstore_local_mk
N ports/sysutils/nix/patches/patch-src_libutil_local_mk
N ports/sysutils/nix/patches/patch-src_nix-daemon_nix-daemon_cc
N ports/sysutils/nix/patches/patch-src_nix-prefetch-url_nix-prefetch-url_cc
N ports/sysutils/nix/pkg/DESCR
N ports/sysutils/nix/pkg/PLIST

No conflicts created by this import



Re: i386 LLVM 15 bulk build results (pilot-link and jpilot)

2023-02-16 Thread Klemens Nanni
16.02.2023 17:05, Stuart Henderson пишет:
> comms/pilot-link  cvs rm?

only there for comms/jpilot which lacks behind updates and already
needed an -fno-common fix.

aja even removed those two ports back in 2015 already, only to readd
them for "a user", but I can't find out what/who that was/is.

I think users toying around with PalmOS devices today can just pick
another OS that still packages and hopefully maintaines those ports.

I'm OK with removing both pilot-link and jpilot, now that they fail.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Omar Polo
CVSROOT:/cvs
Module name:ports
Changes by: o...@cvs.openbsd.org2023/02/16 10:28:05

Modified files:
lang/clojure   : Makefile distinfo 

Log message:
update lang/clojure to 1.11.1.1224

- fix issue with git tag verification with repos with a large number of them
- disallow http :mvn/repos
- add rlwrap -m to clj for multiline editing



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Tracey Emery
CVSROOT:/cvs
Module name:ports
Changes by: tra...@cvs.openbsd.org  2023/02/16 10:18:10

Modified files:
devel/py-esptool: Makefile distinfo 
devel/py-esptool/pkg: PLIST 

Log message:
Update devel/py-esptool to 4.5. ok sthen@



[Update] devel/py-esptool 4.3 -> 4.5

2023-02-16 Thread Tracey Emery
Hello,

Here is a simple update to the esptool, bringing us to 4.5. Compile
tested on sparc64, compile and flash tested on amd64 out to an esp32
board.

ok?

-- 

Tracey Emery

Index: Makefile
===
RCS file: /home/cvs/ports/devel/py-esptool/Makefile,v
retrieving revision 1.14
diff -u -p -r1.14 Makefile
--- Makefile26 Nov 2022 15:02:52 -  1.14
+++ Makefile13 Feb 2023 16:05:23 -
@@ -1,9 +1,8 @@
 COMMENT =  esp8266 and esp32 rom bootloader communication tool
 
-MODPY_EGG_VERSION =4.3
+MODPY_EGG_VERSION =4.5
 DISTNAME = esptool-${MODPY_EGG_VERSION}
 PKGNAME =  py-${DISTNAME}
-REVISION = 1
 
 CATEGORIES =   devel
 HOMEPAGE = https://github.com/espressif/esptool
Index: distinfo
===
RCS file: /home/cvs/ports/devel/py-esptool/distinfo,v
retrieving revision 1.8
diff -u -p -r1.8 distinfo
--- distinfo14 Oct 2022 14:00:17 -  1.8
+++ distinfo13 Feb 2023 16:06:49 -
@@ -1,2 +1,2 @@
-SHA256 (esptool-4.3.tar.gz) = A9ADEu7yWLr4P679C5ErIlHdBEAkLancsbGP517WFMM=
-SIZE (esptool-4.3.tar.gz) = 222498
+SHA256 (esptool-4.5.tar.gz) = 6yYC5q+MuPbzLVBGRBs6ECzUjFBeSvz4NqlaT8OQAqY=
+SIZE (esptool-4.5.tar.gz) = 248883
Index: pkg/PLIST
===
RCS file: /home/cvs/ports/devel/py-esptool/pkg/PLIST,v
retrieving revision 1.8
diff -u -p -r1.8 PLIST
--- pkg/PLIST   26 Nov 2022 15:02:52 -  1.8
+++ pkg/PLIST   13 Feb 2023 16:09:37 -
@@ -95,6 +95,23 @@ lib/python${MODPY_VERSION}/site-packages
 lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32c6/fields.py
 
lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32c6/mem_definition.py
 lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32c6/operations.py
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/__init__.py
+${MODPY_COMMENT}lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}/
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}__init__.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}__init__.${MODPY_PYC_MAGIC_TAG}pyc
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}emulate_efuse_controller.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}emulate_efuse_controller.${MODPY_PYC_MAGIC_TAG}pyc
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}fields.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}fields.${MODPY_PYC_MAGIC_TAG}pyc
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}mem_definition.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}mem_definition.${MODPY_PYC_MAGIC_TAG}pyc
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}operations.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/${MODPY_PYCACHE}operations.${MODPY_PYC_MAGIC_TAG}pyc
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/emulate_efuse_controller.py
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/fields.py
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/mem_definition.py
+lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2/operations.py
 lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2beta1/
 
lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2beta1/__init__.py
 
${MODPY_COMMENT}lib/python${MODPY_VERSION}/site-packages/espefuse/efuse/esp32h2beta1/${MODPY_PYCACHE}/
@@ -173,6 +190,14 @@ lib/python${MODPY_VERSION}/site-packages
 
lib/python${MODPY_VERSION}/site-packages/espsecure/${MODPY_PYCACHE}__init__.${MODPY_PYC_MAGIC_TAG}pyc
 
lib/python${MODPY_VERSION}/site-packages/espsecure/${MODPY_PYCACHE}__main__.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
 
lib/python${MODPY_VERSION}/site-packages/espsecure/${MODPY_PYCACHE}__main__.${MODPY_PYC_MAGIC_TAG}pyc
+lib/python${MODPY_VERSION}/site-packages/espsecure/esp_hsm_sign/
+lib/python${MODPY_VERSION}/site-packages/espsecure/esp_hsm_sign/__init__.py
+${MODPY_COMMENT}lib/python${MODPY_VERSION}/site-packages/espsecure/esp_hsm_sign/${MODPY_PYCACHE}/
+lib/python${MODPY_VERSION}/site-packages/espsecure/esp_hsm_sign/${MODPY_PYCACHE}__init__.${MODPY_PYC_MAGIC_TAG}${MODPY_PYOEXTENSION}
+lib/python${MODPY_VERSION}/site-packages/espsecure/esp_hsm_sign/${MODPY_PYCACHE}__init__.${MODPY_PYC_MAGIC_TAG}pyc

CVS: cvs.openbsd.org: ports

2023-02-16 Thread Robert Nagy
CVSROOT:/cvs
Module name:ports
Changes by: rob...@cvs.openbsd.org  2023/02/16 10:11:47

Modified files:
www/ungoogled-chromium: Makefile distinfo 
www/ungoogled-chromium/patches: 

patch-chrome_browser_file_system_access_chrome_file_system_access_permission_context_cc
 

Log message:
update to 110.0.5481.100



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Robert Nagy
CVSROOT:/cvs
Module name:ports
Changes by: rob...@cvs.openbsd.org  2023/02/16 10:10:49

Modified files:
www/chromium   : Makefile distinfo 
www/chromium/patches: 
  
patch-chrome_browser_file_system_access_chrome_file_system_access_permission_context_cc
 

Log message:
update to 110.0.5481.100



i386 LLVM 15 bulk build results

2023-02-16 Thread Stuart Henderson
Most results are the same as amd64, but there are two new ones.

comms/pilot-linkcvs rm?
databases/p5-sybperlcvs rm?
devel/afl++ update awaiting ok
devel/arm-none-eabi/newlib
devel/avr32/gcc-bootstrap
devel/py-llvmlite   -> broken
devel/qcoro
devel/ti-msp430gcc
editors/axe
>editors/libreofficei386: ld.lld SIGILL
games/scorched3d
games/spider
games/xjewel
graphics/drawpile   (unrelated missing bump)
japanese/Wnn
japanese/canna
>lang/gforthi386: segfault when running new built binary
lang/mono   (unrelated __syscall)
mail/geary
misc/xgas
security/cryptcat   cvs rm?
security/john-jumbo
shells/ksh93
www/midori
www/sogo
x11/chbg
x11/eterm
x11/gnome/usage
x11/gnustep/pantomime
x11/mate/engrampa
x11/rep-gtk


lang/gforth: segfault from newly built gforth binary used during
the build.

---
./preforth -p ".:~+:." -e 's" mach16b.fs"' ./kernel/main.fs -e "save-cross 
kernl16b.fi- /usr/local/bin/gforth-0.7.3 bye"
Segmentation fault.

(gdb) bt
#0  0x03928b44 in ?? ()
#1  0x1aa6f9d2 in gforth_go ()
#2  0x1aa72307 in main ()
---


editors/libreoffice: ld.lld SIGILLs about 20 minutes into attempting
to link libmergedlo.so, which is a huge library (3500-odd .o files
linked with -flto-thin; the c++ command line expands to about 350K(!)).

No difference if I remove -flto=thin.

ld.lld.core doesn't seem very useful. Not sure how to find what
the actual instruction is. I'm retrying running directly under gdb
now and will reply later if I get anything more useful.

(interestingly top's cpu time counter stops updating after a while
when running ld, despite close to 100% cpu use).


---
Core was generated by `ld.lld'.
Program terminated with signal SIGILL, Illegal instruction.

warning: Unexpected size of section `.reg2/164683' in core file.
#0  0x01e13cff in ?? ()
[Current thread is 1 (process 164683)]
(gdb) bt
#0  0x01e13cff in ?? ()
#1  0x01dfaabb in ?? ()
#2  0x01df9f1c in ?? ()
#3  0x01e12382 in ?? ()
#4  0x01dfa9df in ?? ()
#5  0x01df9f1c in ?? ()
#6  0x01dfabf7 in ?? ()
#7  0x01e6606c in ?? ()
#8  0x01e520b9 in ?? ()
#9  0x01e6771a in ?? ()
#10 0x01e6aa34 in ?? () 
09:29:25 [301/374]
#11 0x01e6aa34 in ?? ()
#12 0x01e6aa34 in ?? ()
#13 0x01e6aa34 in ?? ()
[... same 0x01e6aa34 for many lines ...]
#272 0x01e6aa34 in ?? ()
#273 0x01e6aa34 in ?? ()
#274 0x01e5b79e in ?? ()
#275 0x01e4fedb in ?? ()
#276 0x01e63438 in ?? ()
#277 0x01e642de in ?? ()
#278 0x01e7111c in ?? ()
#279 0x01e5f3f9 in ?? ()
#280 0x01e7aac5 in ?? ()
#281 0x01e7a07a in ?? ()
#282 0x01e79d95 in ?? ()
#283 0x01e79864 in ?? ()
#284 0x01e7977c in ?? ()
#285 0x01e77307 in ?? ()
#286 0x01e7662c in ?? ()
#287 0x01e8d432 in ?? ()
#288 0x025c4db9 in ?? ()
#289 0x025c48a0 in ?? ()
#290 0x022f8300 in ?? ()
#291 0x028e6962 in ?? ()
#292 0x028e5982 in ?? ()
#293 0x028e5334 in ?? ()
#294 0x022bb5a0 in ?? ()
#295 0x028e61c6 in ?? ()
#296 0x022f7ada in ?? ()
#297 0x01db6faf in ?? ()
#298 0x022c6f0a in ?? ()
#299 0x021f8aeb in ?? ()
#300 0x022fb610 in ?? ()
#301 0x021f6082 in ?? ()
#302 0x022c6a40 in ?? ()
#303 0x021f790b in ?? ()
#304 0x022fc0e0 in ?? ()
#305 0x021f6ece in ?? ()
#306 0x022c6c5a in ?? ()
#307 0x01db5c3b in ?? ()
#308 0x028a5933 in ?? ()
#309 0x022d08da in ?? ()
#310 0x01db5c3b in ?? ()
#311 0x0221e49f in ?? ()
#312 0x02220c68 in ?? ()
#313 0x02220ae9 in ?? ()
#314 0x01a66f52 in ?? ()
#315 0x01a66b8a in ?? ()
#316 0x01a6ef54 in ?? ()
#317 0x02aea75f in ?? ()
#318 0x02aead81 in ?? ()
#319 0x0c29f4cd in _rthread_start (v=0x30a4c82c) at 
/usr/src/lib/librthread/rthread.c:96
#320 0x0a9094f2 in __tfork_thread () at 
/usr/src/lib/libc/arch/i386/sys/tfork_thread.S:92
(gdb)
---



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 09:02:51

Modified files:
sysutils/packer: Makefile distinfo modules.inc 

Log message:
Update to packer-1.8.6.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 09:01:58

Modified files:
sysutils/terraform: Makefile distinfo 

Log message:
Update to terraform-1.3.9.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 08:44:47

Modified files:
sysutils/nomad : Makefile distinfo 

Log message:
Update to nomad-1.4.4.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 07:39:33

Modified files:
www/webkitgtk4 : Tag: OPENBSD_7_2 Makefile distinfo 

Log message:
SECURITY update to webkitgtk40-2.38.5.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 07:12:08

Modified files:
x11/gnome/desktop: Makefile distinfo 

Log message:
Update to gnome-desktop-43.2.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 07:11:50

Modified files:
devel/spidermonkey102: Makefile distinfo 

Log message:
Update to spidermonkey102-102.8.0.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 07:08:06

Modified files:
x11/gnome/backgrounds: Makefile distinfo 

Log message:
Update to gnome-backgrounds-43.1.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/02/16 06:49:56

Modified files:
www/webkitgtk4 : Makefile distinfo 

Log message:
SECURITY update to webkitgtk40-2.38.5.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Marc Espie
CVSROOT:/cvs
Module name:ports
Changes by: es...@cvs.openbsd.org   2023/02/16 06:44:14

Modified files:
infrastructure/lib/DPB: Engine.pm Grabber.pm PkgPath.pm 

Log message:
add a bit of glue for EXTRA dependencies so that distfiles get fetched
properly.  Fixes the case for
BUILD_DEPENDS = some/path:patch
where some/path is only used for :patch
and also possible race conditions where the dependent port could
be built before the depending port got to fetch.

thx robert@ for bringing that to my attention,
sthen@ and naddy@ for testing widely



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/02/16 06:01:45

Modified files:
security/clamav: Tag: OPENBSD_7_2 Makefile distinfo 

Log message:
update to clamav-0.105.2, fixes include:

CVE-2023-20032: Fixed a possible remote code execution vulnerability in
the HFS+ file parser.

CVE-2023-20052: Fixed a possible remote information leak vulnerability
in the DMG file parser.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/02/16 05:51:46

Modified files:
security/clamav: Makefile distinfo 

Log message:
update to clamav-1.0.1, fixes include:

CVE-2023-20032: Fixed a possible remote code execution vulnerability in
the HFS+ file parser.

CVE-2023-20052: Fixed a possible remote information leak vulnerability
in the DMG file parser.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/02/16 05:47:31

Modified files:
www/trac   : Makefile distinfo 
www/trac/pkg   : PLIST 

Log message:
update to trac-1.5.4



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/02/16 05:47:19

Modified files:
net/isc-bind   : Makefile distinfo 

Log message:
update to isc-bind-9.18.12



Re: PostgreSQL 15.2

2023-02-16 Thread vtamara

Thank you.

I have noticed that PostgreSQL 15 requires more shared memory than 
PostgreSQL 14.

The diagnose I see in /var/postgresql/logfile is:

 ERROR:  could not open shared memory segment "/PostgreSQL.4139364318": 
No such file or directory


To overcome this I have increased values in /etc/sysctl.conf as follows:

kern.seminfo.semmni=1024
kern.seminfo.semmns=2048

kern.shminfo.shmmax=15000
kern.shminfo.shmall=591200
kern.shminfo.shmmni=8192
kern.shminfo.shmseg=256


Any suggestions about this?

IMHO it is worth mentioning it in 
/usr/local/share/doc/pkg-readmes/postgresql-server


Blessings.

El 2023-02-09 11:54, Jeremy Evans escribió:

This updates to PostgreSQL 15.2, released today.  Release announcement:
https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/

One security issue, CVE-2022-41862: Client memory disclosure when
connecting, with Kerberos, to modified server. Is there anyone running
PostgreSQL clients on OpenBSD using Kerberos authentication and
connecting to potentially untrusted servers?

No problems in my testing on amd64.  I plan to commit in a couple days
unless I hear objections.

Thanks,
Jeremy

Index: Makefile
===
RCS file: /cvs/ports/databases/postgresql/Makefile,v
retrieving revision 1.292
diff -u -p -r1.292 Makefile
--- Makefile16 Nov 2022 02:59:22 -  1.292
+++ Makefile9 Feb 2023 15:56:11 -
@@ -5,7 +5,7 @@ COMMENT-contrib=PostgreSQL RDBMS contrib
 COMMENT-plpython=Python procedural language for PostgreSQL
 COMMENT-pg_upgrade=Support for upgrading PostgreSQL data from previous 
version


-VERSION=   15.1
+VERSION=   15.2
 PREV_MAJOR=14
 DISTNAME=  postgresql-${VERSION}
 PKGNAME-main=  postgresql-client-${VERSION}
Index: distinfo
===
RCS file: /cvs/ports/databases/postgresql/distinfo,v
retrieving revision 1.95
diff -u -p -r1.95 distinfo
--- distinfo16 Nov 2022 02:59:22 -  1.95
+++ distinfo9 Feb 2023 15:56:28 -
@@ -1,2 +1,2 @@
-SHA256 (postgresql-15.1.tar.gz) = 
6izwWahYgmVLmJrNB+3BIYMxZKMDQPruDTYVz3BY5mw=

-SIZE (postgresql-15.1.tar.gz) = 29778341
+SHA256 (postgresql-15.2.tar.gz) = 
7M0gjz50Eq17xMZI7Mh+CqUU4CwkpI9xv55GkQvyhMo=

+SIZE (postgresql-15.2.tar.gz) = 29811750
Index: pkg/PLIST-contrib
===
RCS file: /cvs/ports/databases/postgresql/pkg/PLIST-contrib,v
retrieving revision 1.25
diff -u -p -r1.25 PLIST-contrib
--- pkg/PLIST-contrib   16 Nov 2022 02:59:23 -  1.25
+++ pkg/PLIST-contrib   9 Feb 2023 16:05:51 -
@@ -183,6 +183,7 @@ share/postgresql/extension/pageinspect--
 share/postgresql/extension/pageinspect--1.7--1.8.sql
 share/postgresql/extension/pageinspect--1.8--1.9.sql
 share/postgresql/extension/pageinspect--1.9--1.10.sql
+share/postgresql/extension/pageinspect--1.10--1.11.sql
 share/postgresql/extension/pageinspect.control
 share/postgresql/extension/pg_buffercache--1.0--1.1.sql
 share/postgresql/extension/pg_buffercache--1.1--1.2.sql
Index: pkg/PLIST-docs
===
RCS file: /cvs/ports/databases/postgresql/pkg/PLIST-docs,v
retrieving revision 1.108
diff -u -p -r1.108 PLIST-docs
--- pkg/PLIST-docs  16 Nov 2022 02:59:23 -  1.108
+++ pkg/PLIST-docs  9 Feb 2023 16:06:27 -
@@ -717,6 +717,7 @@ share/doc/postgresql/html/regress-varian
 share/doc/postgresql/html/regress.html
 share/doc/postgresql/html/release-15.html
 share/doc/postgresql/html/release-15-1.html
+share/doc/postgresql/html/release-15-2.html
 share/doc/postgresql/html/release-prior.html
 share/doc/postgresql/html/release.html
 share/doc/postgresql/html/replication-origins.html


--
Dios, gracias por tu amor infinito.
--
  Vladimir Támara Patiño.  http://vtamara.pasosdeJesus.org/
  http://www.pasosdejesus.org/dominio_publico_colombia.html



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Peter Hessler
CVSROOT:/cvs
Module name:ports
Changes by: phess...@cvs.openbsd.org2023/02/16 04:09:26

Modified files:
games/choria   : Makefile 
games/choria/patches: patch-CMakeLists_txt 

Log message:
Don't globally set SSE for all builds, unbreak non-intel arches such as arm64.

While here, change post-patch target to pre-configure, so make update-patches
works as expected.

MAINTAINER timeout



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Peter Hessler
CVSROOT:/cvs
Module name:ports
Changes by: phess...@cvs.openbsd.org2023/02/16 04:01:52

Modified files:
graphics/openscenegraph: Makefile 

Log message:
specifically disable a hidden dep on cad/oce

OK pascal@ (MAINTANER), tb@



Re: aarch64 bulk build report

2023-02-16 Thread Pascal Stumpf
On Thu, 16 Feb 2023 09:49:17 +0100, Peter Hessler wrote:
> On 2023 Feb 15 (Wed) at 22:09:05 +0100 (+0100), Theo Buehler wrote:
> :> 
> http://build-failures.rhaalovely.net/aarch64/2023-02-13/graphics/openscenegraph.log
> :
> :This is a hidden dep on cad/oce. Not sure if it is desirable to add this
> :relatively heavy dependency or if it's better to neuter it.
> :
> :It seems that there are various other hidden deps. For instance, my logs
> :suggest that the curl module may or may not be picked up. It would be
> :nice if someone who likes dealing with cmake could fix this.
> :
> 
> Here's a patch to disable the hidden dep on cad/oce, OK?

OK.

> curl is already listed in the port as a lib depends, so I don't think I
> should change anything there.

Yep, and that dep is there on purpose.

> Index: Makefile
> ===
> RCS file: /cvs/openbsd/ports/graphics/openscenegraph/Makefile,v
> retrieving revision 1.30
> diff -u -p -u -p -r1.30 Makefile
> --- Makefile  30 Dec 2022 00:13:29 -  1.30
> +++ Makefile  16 Feb 2023 08:44:30 -
> @@ -10,7 +10,7 @@ GH_ACCOUNT =openscenegraph
>  GH_PROJECT = OpenSceneGraph
>  GH_TAGNAME = OpenSceneGraph-$V
>  DISTNAME =   openscenegraph-${V}
> -REVISION =   3
> +REVISION =   4
>  
>  SUBST_VARS +=V
>  
> @@ -64,6 +64,8 @@ LIB_DEPENDS =   devel/sdl \
>   x11/gnome/librsvg
>  
>  NO_TEST =Yes
> +
> +CONFIGURE_ARGS +=-DCMAKE_DISABLE_FIND_PACKAGE_OpenCascade:Bool=Yes
>  
>  # Fix build with OpenEXR>=3 (Imath split)
>  CXXFLAGS +=  -I${LOCALBASE}/include/Imath
> 
> 



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Stuart Cassoff
CVSROOT:/cvs
Module name:ports
Changes by: s...@cvs.openbsd.org2023/02/16 03:19:24

Modified files:
devel/ltcltk   : Makefile distinfo 
devel/ltcltk/pkg: PLIST 
Added files:
devel/ltcltk/patches: patch-src_ltcl_c 
Removed files:
devel/ltcltk/patches: patch-ltcl_c 

Log message:
Update to 0.9_5.
Build against Tcl/Tk 8.6.
Install one more doc file and graphical shell.
Ltcltk moved to a new home.



Re: aarch64 bulk build report

2023-02-16 Thread Theo Buehler
On Thu, Feb 16, 2023 at 09:49:17AM +0100, Peter Hessler wrote:
> On 2023 Feb 15 (Wed) at 22:09:05 +0100 (+0100), Theo Buehler wrote:
> :> 
> http://build-failures.rhaalovely.net/aarch64/2023-02-13/graphics/openscenegraph.log
> :
> :This is a hidden dep on cad/oce. Not sure if it is desirable to add this
> :relatively heavy dependency or if it's better to neuter it.
> :
> :It seems that there are various other hidden deps. For instance, my logs
> :suggest that the curl module may or may not be picked up. It would be
> :nice if someone who likes dealing with cmake could fix this.
> :
> 
> Here's a patch to disable the hidden dep on cad/oce, OK?

Thanks. Certainly makes more sense than adding the dep.

ok

> +CONFIGURE_ARGS += -DCMAKE_DISABLE_FIND_PACKAGE_OpenCascade:Bool=Yes

Remind me... What's not to like about cmake?

> curl is already listed in the port as a lib depends, so I don't think I
> should change anything there.

Right. I was confused by

-- Could NOT find CURL (missing: CURL_DIR)

in the log.

Taking another look, it seems that all other optional deps that exist in
the ports tree are hidden away from the usual include paths, so they
should not be picked up.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/02/16 02:24:56

Modified files:
geo/postgis/patches: 
 patch-deps_flatgeobuf_include_flatbuffers_base_h 

Log message:
geo/postgis: update patch to fix build if abseil-cpp is present

from https://github.com/google/flatbuffers/pull/7824
via https://github.com/MapServer/MapServer/pull/6833



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/02/16 02:22:53

Modified files:
geo/mapserver/patches: 
   patch-flatgeobuf_include_flatbuffers_base_h 

Log message:
geo/mapserver: update patch to fix build if abseil-cpp is present

from https://github.com/MapServer/MapServer/pull/6833



Re: [fix] www/apache-httpd SNI problem

2023-02-16 Thread giovanni

On 2/7/23 15:12, Theo Buehler wrote:

On Tue, Feb 07, 2023 at 12:25:00PM +0100, giova...@paclan.it wrote:

On 1/23/23 17:12, Bambero wrote:


Hi,

This is strange problem probably LibreSSL related.

After upgrade OpenBSD to 7.2 windows clients using google chrome browser have 
problems to connect to apache server.
Some requests are served correct, but periodically browser shows 
NET::CERT_COMMON_NAME_INVALID and in server logs we can see:

AH02645: Server name not provided via TLS extension (using default/first 
virtual host), default

There was no problem under 7.1.

The problem occurs only when using google chrome browser (not chromium) under 
windows.

I compiled under 7.2 version of apache from 7.1 and from current - didn't help.
OpenBSD builtin server works correct.

Problem also submitted here:
https://bugs.chromium.org/p/chromium/issues/detail?id=1409224



Google analysis pointed to the fact that they recently enabled
"Permute TLS extensions" by default in Chrome, is this something we
need to implement in LibreSSL ?


If I understand correctly, this issue occurs if the ALPN extension
precedes the SNI extension in the ClientHello.


On Chromium issue 
(https://bugs.chromium.org/p/chromium/issues/detail?id=1409224) there are a 
couple of Wireshark files that confirm this.



While LibreSSL is mostly agnostic to the order of TLS extensions, this
is not true when it comes to calling callbacks from the extension
handlers. This is due to a design flaw in ssl_tlsext.c, which parses and
processes the extensions and calls various callbacks in a single step.

When the ALPN extension is processed in tlsext_alpn_server_parse(), the
alpn_select_cb() (which httpd sets to ssl_callback_alpn_select()) tries
to retrieve the server name set in SNI via init_vhost():

https://github.com/apache/httpd/blob/2.4.55/modules/ssl/ssl_engine_kernel.c#L2750-L2755

The latter does 'servername = SSL_get_servername(ssl, 
TLSEXT_NAMETYPE_host_name);'

https://github.com/apache/httpd/blob/2.4.55/modules/ssl/ssl_engine_kernel.c#L2390

which will succeed if the SNI extension was processed before the ALPN
extension and fail otherwise.

Now this particular issue could be resolved by adding a hack that parses
the SNI before ALPN, but the proper solution will be to rework the
tlsext code to deserialize the extensions first, then process in a
second step.


I think we could add a workaround/hack and then rework extensions 
serializations later.

  Giovanni


Now what is still a complete mystery to me is why this issue is
triggered on 7.2 but not on 7.1. I can't see anything relevant to this
issue that was changed in this area.

PS: Randomizing the order of TLS extensions (as far as the spec allows)
before sending them is a very nice idea and we should probably consider
implementing that in LibreSSL, too...





CVS: cvs.openbsd.org: ports

2023-02-16 Thread Peter Hessler
CVSROOT:/cvs
Module name:ports
Changes by: phess...@cvs.openbsd.org2023/02/16 02:09:41

Modified files:
lang/mono  : Makefile 
Added files:
lang/mono/patches: patch-external_bdwgc_os_dep_c 

Log message:
don't use __syscall when we can directly call it instead



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Stuart Cassoff
CVSROOT:/cvs
Module name:ports
Changes by: s...@cvs.openbsd.org2023/02/16 02:03:12

Modified files:
net/tclcurl: Makefile distinfo 
net/tclcurl/patches: patch-Makefile_in patch-doc_tclcurl_n 
net/tclcurl/pkg: PLIST 
Added files:
net/tclcurl/patches: patch-doc_tclcurl_multi_n 
 patch-doc_tclcurl_share_n 
Removed files:
net/tclcurl/patches: patch-configure patch-generic_tclcurl_h 

Log message:
Update to 7.22.0.
Enable tests. Fix man pages.
TclCurl moved to a new home.



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/02/16 01:56:57

Modified files:
mail/mozilla-thunderbird: Tag: OPENBSD_7_2 Makefile distinfo 

Log message:
mail/mozilla-thunderbird: MFC update to 102.8.0

see https://www.thunderbird.net/en-US/thunderbird/102.8.0/releasenotes/



Re: aarch64 bulk build report

2023-02-16 Thread Peter Hessler
On 2023 Feb 15 (Wed) at 22:09:05 +0100 (+0100), Theo Buehler wrote:
:> 
http://build-failures.rhaalovely.net/aarch64/2023-02-13/graphics/openscenegraph.log
:
:This is a hidden dep on cad/oce. Not sure if it is desirable to add this
:relatively heavy dependency or if it's better to neuter it.
:
:It seems that there are various other hidden deps. For instance, my logs
:suggest that the curl module may or may not be picked up. It would be
:nice if someone who likes dealing with cmake could fix this.
:

Here's a patch to disable the hidden dep on cad/oce, OK?

curl is already listed in the port as a lib depends, so I don't think I
should change anything there.


Index: Makefile
===
RCS file: /cvs/openbsd/ports/graphics/openscenegraph/Makefile,v
retrieving revision 1.30
diff -u -p -u -p -r1.30 Makefile
--- Makefile30 Dec 2022 00:13:29 -  1.30
+++ Makefile16 Feb 2023 08:44:30 -
@@ -10,7 +10,7 @@ GH_ACCOUNT =  openscenegraph
 GH_PROJECT =   OpenSceneGraph
 GH_TAGNAME =   OpenSceneGraph-$V
 DISTNAME = openscenegraph-${V}
-REVISION = 3
+REVISION = 4
 
 SUBST_VARS +=  V
 
@@ -64,6 +64,8 @@ LIB_DEPENDS = devel/sdl \
x11/gnome/librsvg
 
 NO_TEST =  Yes
+
+CONFIGURE_ARGS +=  -DCMAKE_DISABLE_FIND_PACKAGE_OpenCascade:Bool=Yes
 
 # Fix build with OpenEXR>=3 (Imath split)
 CXXFLAGS +=-I${LOCALBASE}/include/Imath




CVS: cvs.openbsd.org: ports

2023-02-16 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/02/16 01:44:37

Modified files:
security/openssl-ruby-tests: Makefile distinfo 

Log message:
Update openssl-ruby-tests to 20230216



Re: CVS: cvs.openbsd.org: ports

2023-02-16 Thread Landry Breuil
Le Thu, Feb 16, 2023 at 01:25:54AM -0700, Landry Breuil a écrit :
> CVSROOT:  /cvs
> Module name:  ports
> Changes by:   lan...@cvs.openbsd.org  2023/02/16 01:25:54
> 
> Modified files:
>   mail/mozilla-thunderbird: Makefile distinfo 
>   mail/mozilla-thunderbird/patches: 
> 
> patch-media_ffvpx_libavcodec_x86_fft_asm 
>   mail/thunderbird-i18n: Makefile.inc distinfo 
> 
> Log message:
> mail/mozilla-thunderbird: update to 102.8.0
> 
> see https://www.thunderbird.net/en-US/thunderbird/102.8.0/releasenotes/
> fixes https://www.mozilla.org/en-US/security/advisories/mfsa2023-07/

forgot to mention 'update tb's patch for ffvpx as done in firefox-esr'



CVS: cvs.openbsd.org: ports

2023-02-16 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/02/16 01:25:54

Modified files:
mail/mozilla-thunderbird: Makefile distinfo 
mail/mozilla-thunderbird/patches: 
  
patch-media_ffvpx_libavcodec_x86_fft_asm 
mail/thunderbird-i18n: Makefile.inc distinfo 

Log message:
mail/mozilla-thunderbird: update to 102.8.0

see https://www.thunderbird.net/en-US/thunderbird/102.8.0/releasenotes/
fixes https://www.mozilla.org/en-US/security/advisories/mfsa2023-07/