Re: [NEW] textproc/py-rst2ansi

2023-11-29 Thread Paul Galbraith

On 2023-11-15 11:26 p.m., Paul Galbraith wrote:

On 2023-11-02 5:49 a.m., Stuart Henderson wrote:

On 2023/09/25 21:12, Paul Galbraith wrote:

On 2023-09-25 6:11 a.m., Stuart Henderson wrote:

Missing dep on docutils.
Please skip devel from CATEGORIES, just put it in textproc.

Thanks Stuart, changes attached.


OK sthen@ if someone would like to import it.


Any takers?


Can anyone import this one?  Thanks!



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremy Evans
CVSROOT:/cvs
Module name:ports
Changes by: jer...@cvs.openbsd.org  2023/11/29 16:42:16

Modified files:
geo/pgpointcloud: Makefile distinfo 
geo/pgpointcloud/pkg: PLIST 
Removed files:
geo/pgpointcloud/patches: patch-pgsql_pc_pgsql_c 

Log message:
Update to pgpointcloud 1.2.5, which supports PostgreSQL 16.

Remove backported patch for PostgreSQL 16 support.

OK tb@, sthen@



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremy Evans
CVSROOT:/cvs
Module name:ports
Changes by: jer...@cvs.openbsd.org  2023/11/29 16:42:00

Modified files:
databases/postgresql-pllua: Makefile distinfo 

Log message:
Update to pllua 2.0.12 to work with PostgreSQL 16.

OK tb@, sthen@



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremy Evans
CVSROOT:/cvs
Module name:ports
Changes by: jer...@cvs.openbsd.org  2023/11/29 16:41:45

Modified files:
databases/postgresql-odbc: Makefile distinfo 
Added files:
databases/postgresql-odbc/patches: patch-psqlodbc_h 

Log message:
Update to postgresql-odbc 16.00..

Add patch to work with PostgreSQL 16.

OK tb@, sthen@



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremy Evans
CVSROOT:/cvs
Module name:ports
Changes by: jer...@cvs.openbsd.org  2023/11/29 16:41:30

Modified files:
databases/postgresql-previous: Makefile distinfo 
databases/postgresql-previous/patches: 
   patch-src_bin_scripts_vacuumdb_c 
   
patch-src_include_storage_s_lock_h 
   
patch-src_interfaces_libpq_Makefile 
databases/postgresql-previous/pkg: PLIST 

Log message:
Update postgresql-previous to PostgreSQL 15.4 following PostgreSQL update to 
16.1

OK tb@, sthen@



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremy Evans
CVSROOT:/cvs
Module name:ports
Changes by: jer...@cvs.openbsd.org  2023/11/29 16:41:15

Modified files:
databases/postgresql: Makefile distinfo 
databases/postgresql/patches: patch-src_backend_libpq_ip_c 
  patch-src_include_storage_s_lock_h 
  
patch-src_interfaces_ecpg_compatlib_Makefile 
  
patch-src_interfaces_ecpg_ecpglib_Makefile 
  
patch-src_interfaces_ecpg_pgtypeslib_Makefile 
  patch-src_interfaces_libpq_Makefile 
databases/postgresql/pkg: PLIST-contrib PLIST-docs PLIST-server 

Log message:
Update to PostgreSQL 16.1

This adds textproc/icu4c as a dependency, since PostgreSQL 16 requires
that by default.  This allows additional collations to work.

Bulk testing by tb@

Input from tb@ and sthen@

OK tb@, sthen@



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:ports
Changes by: j...@cvs.openbsd.org2023/11/29 15:56:00

Modified files:
graphics/glslang: Makefile 
Added files:
graphics/glslang/patches: patch-StandAlone_CMakeLists_txt 

Log message:
Add a hack to link against libstdc++fs when using ports-gcc

Fixes the build on non-clang archs.  ok thfr@ (maintainer)



Re: Early Look: PostgreSQL 16.0

2023-11-29 Thread Theo Buehler
> Can someone test this in a bulk?  Also, OKs to apply this if no fallout
> from the bulk?

No fallout.

ok tb



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:ports
Changes by: j...@cvs.openbsd.org2023/11/29 15:11:18

Modified files:
lang/mawk  : Makefile distinfo 

Log message:
Update to mawk-1.3.4.20231126



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 15:09:20

Modified files:
security/py-cryptography: Makefile crates.inc distinfo 
security/py-cryptography_vectors: Makefile distinfo 
security/py-cryptography_vectors/pkg: PLIST 

Log message:
update to py3-cryptography-41.0.6
CVE-2023-49083 NULL-dereference when loading PKCS7 certificates



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 15:09:21

Modified files:
security/py-cryptography: Tag: OPENBSD_7_4 Makefile crates.inc 
  distinfo 
security/py-cryptography_vectors: Tag: OPENBSD_7_4 Makefile 
  distinfo 
security/py-cryptography_vectors/pkg: Tag: OPENBSD_7_4 PLIST 

Log message:
update to py3-cryptography-41.0.6
CVE-2023-49083 NULL-dereference when loading PKCS7 certificates



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Robert Nagy
CVSROOT:/cvs
Module name:ports
Changes by: rob...@cvs.openbsd.org  2023/11/29 15:06:05

Modified files:
www/ungoogled-chromium: Makefile distinfo 

Log message:
update to 119.0.6045.199



Re: devel/p5-Locale-Codes: Update to 3.76

2023-11-29 Thread Benoit Lecocq




On 28/11/2023 02:26, wen heping wrote:

Hi, ports@:

 Here is a simple patch for devel/p5-Locale-Codes to update to 3.76.
It build well and pass all tests on amd64-current system.

 The changelog is:
 3.76  2023-09-05  sbeck
   -  Fixed problem in distro
  Accidentally created a distribution (3.75) that is broken. GitHub
  #18
  3.75  2023-09-01  sbeck
   -  NEW CODE(s)
  3.74  2023-06-07  sbeck
   -  NEW CODE(s)


Regards,
wen


Committed, thanks !



Re: [new] net/senpai

2023-11-29 Thread Johannes Thyssen Tishman
2023-11-29T20:29:42Z "Moritz Buhl" :

> On Wed, Nov 29, 2023 at 07:53:05PM +, Johannes Thyssen Tishman wrote:
> > 2023-11-22T17:55:02Z "Johannes Thyssen Tishman" :
> > 
> > > please find attached a port for senpai, an IRC client.
> > >
> > > from pkg/DESCR:
> > > > senpai is an IRC client that works best with bouncers:
> > > > 
> > > > - no logs are kept,
> > > > - history is fetched from the server via CHATHISTORY,
> > > > - networks are fetched from the server via bouncer-networks,
> > > > - messages can be searched in logs via SEARCH.
> > >
> > > senpai was specifically developed to work with the soju bouncer
> > > (which I just submitted). In comparison to weechat or irssi which
> > > are very featureful, senpai it is rather simple and quite easy to
> > > configure.
> > >
> > > Feedback, OKs?
> > >
> > > Kind regards,
> > > Johannes
> > 
> > *ping*
> > 
>
> I just noticed that there is a v0.3.0 already:
> https://git.sr.ht/~taiite/senpai/refs/v0.3.0
>
> I am not any good at reviewing ports but I see nothing wrong with
> the Makefile.

Thanks for letting me know Moritz. Please find an updated port
attached.


senpai-0.3.0.tar.gz
Description: application/gzip


CVS: cvs.openbsd.org: ports

2023-11-29 Thread James Turner
CVSROOT:/cvs
Module name:ports
Changes by: jtur...@cvs.openbsd.org 2023/11/29 13:52:54

Modified files:
www/kcgi   : Makefile distinfo 
www/kcgi/pkg   : PLIST 

Log message:
Update kcgi to 0.13.2. Comment out shared libs.



Re: [new] net/senpai

2023-11-29 Thread Johannes Thyssen Tishman
2023-11-22T17:55:02Z "Johannes Thyssen Tishman" :

> please find attached a port for senpai, an IRC client.
>
> from pkg/DESCR:
> > senpai is an IRC client that works best with bouncers:
> > 
> > - no logs are kept,
> > - history is fetched from the server via CHATHISTORY,
> > - networks are fetched from the server via bouncer-networks,
> > - messages can be searched in logs via SEARCH.
>
> senpai was specifically developed to work with the soju bouncer
> (which I just submitted). In comparison to weechat or irssi which
> are very featureful, senpai it is rather simple and quite easy to
> configure.
>
> Feedback, OKs?
>
> Kind regards,
> Johannes

*ping*



Re: [new] net/soju

2023-11-29 Thread Johannes Thyssen Tishman
2023-11-27T19:43:36Z "Johannes Thyssen Tishman" :

> 2023-11-22T17:49:18Z "Johannes Thyssen Tishman" :
>
> > please find attached a port for soju, an IRC bouncer.
> >
> > from pkg/DESCR:
> > > soju is a user-friendly IRC bouncer. soju connects to upstream IRC
> > > servers on behalf of the user to provide extra functionality. soju
> > > supports many features such as multiple users, numerous IRCv3
> > > extensions, chat history playback and detached channels. It is
> > > well-suited for both small and large deployments.
> >
> > soju is the IRC bouncer behind chat.sr.ht and AFAIK it is also
> > developed by the SourceHut project. It is really easy to configure
> > and I've been running it for a couple of days without any issues.
> >
> > Feedback, OKs?
> >
> > Kind regards,
> > Johannes
>
> A new release was made today. Please find the updated port attached.

*ping*



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 12:23:49

Modified files:
net/eduvpn/vpn-user-portal: Makefile distinfo 
net/eduvpn/vpn-user-portal/pkg: PLIST 

Log message:
update to vpn-user-portal-3.5.2



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 12:18:56

Modified files:
lang/lucee : Makefile distinfo 

Log message:
update to lucee-5.4.4.38



Re: converters/html2text new upstream

2023-11-29 Thread Jan Stary
"html2text understands all HTML 3.2 constructs". Cool!

The output seems quite inferior to e.g. lynx -dump
- is anyone using it?


On Nov 28 12:56:01, ataraxia...@ataraxia937.xyz wrote:
> converters/html2text has a new maintainer and is hosted at 
> https://github.com/grobian/html2text . There is a 2.x release series and the 
> current version is 2.2.3.
> 
> 



Re: Upgrade git-annex to 10.20230802

2023-11-29 Thread James Cook

On Tue, Nov 28, 2023 at 09:05:04PM -0800, Greg Steuck wrote:

Thank you for giving these a try. Care to try again with just the single
patch included?


Oops, yes, was applying both patches before. With just this one, 
it's working fine so far. Will report back if I have trouble.


Thanks!

--
James



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:ports
Changes by: j...@cvs.openbsd.org2023/11/29 11:00:25

ports/devel/libstdthreads/patches

Update of /cvs/ports/devel/libstdthreads/patches
In directory cvs.openbsd.org:/tmp/cvs-serv22443/patches

Log Message:
Directory /cvs/ports/devel/libstdthreads/patches added to the repository



UPDATE: sysutils/vultr-cli-2.21.0

2023-11-29 Thread Adriano Barbosa
Hi.
Update for sysutils/vultr-cli-2.21.0

Changelog: https://github.com/vultr/vultr-cli/releases/tag/v2.21.0
- Add container registry commands (#380)
- Add flag to export kubeconfig (#361)
- Add usage command for database (#378)
- Bump github.com/spf13/cobra from 1.7.0 to 1.8.0 (#371)
- Bump golang.org/x/oauth2 from 0.13.0 to 0.14.0 (#373)
- Bump golang.org/x/oauth2 from 0.14.0 to 0.15.0 (#379)
- Bump govultr to v3.4.0 (#374)
- Release v2.21.0 #minor
- Support Managed Database Read Replica Promotion (#375)
- Update govultr to v3.4.1 (#376)
- Update the bare-metal and instance tags display to use delimiters (#372)

Obrigado!
--
Adriano


Index: Makefile
===
RCS file: /cvs/ports/sysutils/vultr-cli/Makefile,v
retrieving revision 1.17
diff -u -p -r1.17 Makefile
--- Makefile2 Nov 2023 02:59:52 -   1.17
+++ Makefile29 Nov 2023 17:28:19 -
@@ -1,7 +1,7 @@
 COMMENT =  Vultr Command Line Interface
 
 MODGO_MODNAME =github.com/vultr/vultr-cli/v2
-MODGO_VERSION =v2.20.0
+MODGO_VERSION =v2.21.0
 
 DISTNAME = vultr-cli-${MODGO_VERSION}
 
Index: distinfo
===
RCS file: /cvs/ports/sysutils/vultr-cli/distinfo,v
retrieving revision 1.14
diff -u -p -r1.14 distinfo
--- distinfo2 Nov 2023 02:59:52 -   1.14
+++ distinfo29 Nov 2023 17:28:19 -
@@ -76,8 +76,8 @@ SHA256 (go_modules/github.com/coreos/go-
 SHA256 (go_modules/github.com/coreos/go-semver/@v/v0.3.0.zip) = 
svwHU5X/w0z/S5ZGgdCuPNIgls/K3Slw7qqHdZbOshA=
 SHA256 (go_modules/github.com/coreos/go-systemd/v22/@v/v22.3.2.mod) = 
3pM5X+kwhvgFU4INFASJ4x6Tv+BFfhtN48dyVW1TSEA=
 SHA256 (go_modules/github.com/coreos/go-systemd/v22/@v/v22.3.2.zip) = 
ARNK6Jv0qRwX7rH4Ql4QZPm95kzzzgyc9Uap+h7iXmQ=
-SHA256 (go_modules/github.com/cpuguy83/go-md2man/v2/@v/v2.0.2.mod) = 
FMOvou9iNVXBtINNH4ixTfd1Sa/uheV1DBkQJGW3iro=
-SHA256 (go_modules/github.com/cpuguy83/go-md2man/v2/@v/v2.0.2.zip) = 
cKfmCYCc8qksVTUQTbXrgtdcVL/P7S0iTofdL9lyn2I=
+SHA256 (go_modules/github.com/cpuguy83/go-md2man/v2/@v/v2.0.3.mod) = 
FMOvou9iNVXBtINNH4ixTfd1Sa/uheV1DBkQJGW3iro=
+SHA256 (go_modules/github.com/cpuguy83/go-md2man/v2/@v/v2.0.3.zip) = 
qoaihq2pVZmpyOKXYj0SxNTrbsYzTHnW3IszU6dI8Q0=
 SHA256 (go_modules/github.com/davecgh/go-spew/@v/v1.1.0.mod) = 
vLKTkyUSN7eaF7bBm/KRNPQ+j0OMMZiYj81GGhzfBcw=
 SHA256 (go_modules/github.com/davecgh/go-spew/@v/v1.1.1.mod) = 
vLKTkyUSN7eaF7bBm/KRNPQ+j0OMMZiYj81GGhzfBcw=
 SHA256 
(go_modules/github.com/davecgh/go-spew/@v/v1.1.2-0.20180830191138-d8f796af33cc.mod)
 = vLKTkyUSN7eaF7bBm/KRNPQ+j0OMMZiYj81GGhzfBcw=
@@ -192,8 +192,8 @@ SHA256 (go_modules/github.com/hashicorp/
 SHA256 (go_modules/github.com/hashicorp/go-hclog/@v/v1.5.0.zip) = 
N+rpkwnFQrMqp+KLzQI24d7YrM5KrcJdjlqKsDBmSC0=
 SHA256 (go_modules/github.com/hashicorp/go-immutable-radix/@v/v1.3.1.mod) = 
FxqS33DrUZYp/sNWbDemfKZ9zaZph45SNXG3iIYXtIc=
 SHA256 (go_modules/github.com/hashicorp/go-immutable-radix/@v/v1.3.1.zip) = 
R/PXm1cILV2z+WZUetTeKgBUTfs2J5D78s7xoWG03j8=
-SHA256 (go_modules/github.com/hashicorp/go-retryablehttp/@v/v0.7.4.mod) = 
xjZcmWZKgniQRqAjUTow55779TfaRFk9R52+j4EmIR4=
-SHA256 (go_modules/github.com/hashicorp/go-retryablehttp/@v/v0.7.4.zip) = 
APbYXFyLMn9W1JrUjvHS35Sv/qNAykbOgnQVunXbRxI=
+SHA256 (go_modules/github.com/hashicorp/go-retryablehttp/@v/v0.7.5.mod) = 
xjZcmWZKgniQRqAjUTow55779TfaRFk9R52+j4EmIR4=
+SHA256 (go_modules/github.com/hashicorp/go-retryablehttp/@v/v0.7.5.zip) = 
B4K56HRzXa/Fw6f2x9c/PHAislu7NOjBNfpfUC6JpzU=
 SHA256 (go_modules/github.com/hashicorp/go-rootcerts/@v/v1.0.2.mod) = 
NaHPdeJMsG8rYBPBb9+7E7dAqN0on8MyFLDAOymXZRM=
 SHA256 (go_modules/github.com/hashicorp/go-rootcerts/@v/v1.0.2.zip) = 
hkpI5kLoeic/te9guzV1vXSnCQUQ+TFDFj+mcAvjGUg=
 SHA256 (go_modules/github.com/hashicorp/golang-lru/@v/v0.5.0.mod) = 
7MVj0/TOy1MabwKUAdRbpsHQQzDhBLxFNdhKUYckmrA=
@@ -283,8 +283,8 @@ SHA256 (go_modules/github.com/spf13/afer
 SHA256 (go_modules/github.com/spf13/afero/@v/v1.9.5.mod) = 
7AzG9WMo/h64YtSdeP9nw4kmJ9TUoRs3tPw/IklzLPI=
 SHA256 (go_modules/github.com/spf13/cast/@v/v1.5.1.mod) = 
LiJpVa7il0veVa3F4wrRC+0YmyNA1g3bM53VX/mYwng=
 SHA256 (go_modules/github.com/spf13/cast/@v/v1.5.1.zip) = 
FfE7y6W8/oFe3McbrM7NKsIC9V4oF6SGdpcuqVAoM9g=
-SHA256 (go_modules/github.com/spf13/cobra/@v/v1.7.0.mod) = 
iXkezzf44QdTS3WVML6aJSpqUBCL1Faa+LbPgLm8GcE=
-SHA256 (go_modules/github.com/spf13/cobra/@v/v1.7.0.zip) = 
nBa7iShqk2Du5rosI5PDiXfbduvZp/XWQ58/+YAxUFI=
+SHA256 (go_modules/github.com/spf13/cobra/@v/v1.8.0.mod) = 
0Lr/kPXMU4Lv1ARYqg4JFzar5McJS3kdyjxC6oJ8Yb8=
+SHA256 (go_modules/github.com/spf13/cobra/@v/v1.8.0.zip) = 
uhKSS7+bQMPfrd7kX7lxpDkI63P+D/u/f9nmWeKFyZw=
 SHA256 (go_modules/github.com/spf13/pflag/@v/v1.0.5.mod) = 
FsbfwOtY6zyRE84ZfUYMZyXGR+RoisJtMcjtafHrvGg=
 SHA256 (go_modules/github.com/spf13/pflag/@v/v1.0.5.zip) = 
/G5wTy9qhN3Nzm3gQE5TQPogyGdhgb9dOBsXiIEHuoQ=
 SHA256 (go_modules/github.com/spf13/viper/@v/v1.17.0.mod) = 

CVS: cvs.openbsd.org: ports

2023-11-29 Thread Frederic Cambus
CVSROOT:/cvs
Module name:ports
Changes by: fcam...@cvs.openbsd.org 2023/11/29 09:57:30

Modified files:
emulators/mame : Makefile distinfo 

Log message:
Update mame to 0.261.



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 09:18:30

Modified files:
security/uacme : Makefile 
security/uacme/pkg: PLIST 

Log message:
switch uacme from gnutls to libressl; I missed that libressl gained
support for the things that uacme needed.

this disables ualpn which wants SSL_CLIENT_HELLO_RETRY, SSL_set0_wbio(),
SSL_client_hello_get0_ext(), SSL_CTX_set_client_hello_cb() - I consider
that a reasonable tradeoff, but if someone really needs it I could be
persuaded to readd gnutls as a flavour.



Re: CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
On 2023/11/29 08:43, Daniel Jakots wrote:
> On Tue, 28 Nov 2023 15:45:12 +0100, Theo Buehler 
> wrote:
> 
> > On Tue, Nov 28, 2023 at 07:39:55AM -0700, Frederic Cambus wrote:
> > > CVSROOT:  /cvs
> > > Module name:  ports
> > > Changes by:   fcam...@cvs.openbsd.org 2023/11/28
> > > 07:39:55
> > > 
> > > Modified files:
> > >   textproc/ripgrep: Makefile 
> > > 
> > > Log message:
> > > ripgrep: trim trailing garbage in COMMENT.
> > >   
> > 
> > I'm pretty sure this was done to unconfuse some syntax highlighters.
> 
> Indeed. I didn't mention the reason in the commit message, but semarie
> gave it in his email:
> https://marc.info/?l=openbsd-ports=149517933012753=2
> 
> > Also, this would have needed a REVISION bump. So either revert or
> > bump, please.
> 
> Did the comment actually change? Sebastien said:
> 
> > The comment text is unaffected (make show=COMMENT is right).

Yes, compare before/after with

make show=COMMENT | sed s/$/x/



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stefan Sperling
CVSROOT:/cvs
Module name:ports
Changes by: s...@cvs.openbsd.org2023/11/29 08:18:14

Modified files:
devel/got  : Makefile distinfo 
Removed files:
devel/got/patches: patch-lib_repository_c 

Log message:
update to got 0.94

see git repository history for per-change authorship information
- in diff error message, say what was being diffed
- gotwebd.css: vertically align briefs age and author
- honor fetch_all_branches configuration again
- tog: switch back to patience diff algorithm by default for pretty diffs
- gotwebd: render all the datetimes in a time tag
- slightly reword 'got merge' documentation to hopefully be more clear
- make 'tog diff' release the work-tree lock earlier
- got patch: handle embedded NULs in lines of patch files with binary data
- simplify usage of the 'mesg' histedit script command
- fix some fd leaks in error paths and avoid some double-close()
- use ibuf_fd_set() instead of reaching into the ibuf struct
- gotwebd: remove dead ipproto handling in host() and host_if()
- allow setting variables in gotd.conf syntax
- fix gotwebd unveil permissions; gotwebd now runs entirely read-only
- reduce gotwebd pledges to the minimum currently required
- gotwebd.conf: drop support for inferring listen addresses via interface names
- gotwebd.conf: use listen * instead of listen "" to listen on any address
- gotwebd: get rid of got_sockaddr.[ch] usage to help -portable
- allow gotd repo read/write processes to max out data-size resource limits
- gotwebd: replace proc.c with much simpler code
- gotwebd: don't chdir to / before spawning the child processes
- remove the quite ineffective gotwebd repository cache to fix stability issues
- fix memory leak on error in got_privsep_recv_painted_commits()
- gotwebd: fix broken signal catching
- detect concurrent changes to the set of pack files while matching object IDs



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/11/29 07:20:58

Modified files:
geo/pdal   : Makefile distinfo 

Log message:
geo/pdal: update to 2.6.1.

see https://github.com/PDAL/PDAL/releases/tag/2.6.1



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/11/29 06:48:13

Modified files:
x11/gnome/backgrounds: Makefile 

Log message:
Add RDEP on graphics/webp-pixbuf-loader.



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 06:47:19

Modified files:
devel/spidermonkey115/patches: 
   patch-modules_fdlibm_src_math_private_h 

Log message:
sync i386 typedefs with our headers; unbreaks i386 build. ok aja@



Re: CVS: cvs.openbsd.org: ports

2023-11-29 Thread Daniel Jakots
On Tue, 28 Nov 2023 15:45:12 +0100, Theo Buehler 
wrote:

> On Tue, Nov 28, 2023 at 07:39:55AM -0700, Frederic Cambus wrote:
> > CVSROOT:/cvs
> > Module name:ports
> > Changes by: fcam...@cvs.openbsd.org 2023/11/28
> > 07:39:55
> > 
> > Modified files:
> > textproc/ripgrep: Makefile 
> > 
> > Log message:
> > ripgrep: trim trailing garbage in COMMENT.
> >   
> 
> I'm pretty sure this was done to unconfuse some syntax highlighters.

Indeed. I didn't mention the reason in the commit message, but semarie
gave it in his email:
https://marc.info/?l=openbsd-ports=149517933012753=2

> Also, this would have needed a REVISION bump. So either revert or
> bump, please.

Did the comment actually change? Sebastien said:

> The comment text is unaffected (make show=COMMENT is right).

Cheers,
Daniel



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Daniel Dickman
CVSROOT:/cvs
Module name:ports
Changes by: dan...@cvs.openbsd.org  2023/11/29 06:29:47

Modified files:
devel/py-ipykernel: Makefile 

Log message:
ipykernel needs hatchling

reported by tb@, thanks!



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Marc Espie
CVSROOT:/cvs
Module name:ports
Changes by: es...@cvs.openbsd.org   2023/11/29 06:19:55

Modified files:
devel/quirks   : Makefile 
devel/quirks/pkg: PLIST 

Log message:
Add "option updatedb" to plist

REQUIRES CURRENT PKG TOOLS TO BUILD AND USE



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/11/29 06:10:18

Modified files:
wayland/slurp  : Makefile 
wayland/swaybg : Makefile 
wayland/swaylock: Makefile 
wayland/wev: Makefile 

Log message:
wayland/{slurp,swaybg,swaylock,wev}: set COMPILER to fix build on sparc64



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/11/29 06:08:58

Modified files:
sysutils/seatd : Makefile 

Log message:
sysutils/seatd: set COMPILER, should fix the build on sparc64



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/11/29 06:06:45

Modified files:
graphics/libliftoff/patches: patch-meson_build 

Log message:
graphics/libliftoff: drop -Werror, should fix build on sparc64

from jca@



sparc64 bulk build report

2023-11-29 Thread kmos
Bulk build on sparc64-0a.ports.openbsd.org

Started : Sun Nov 26 22:51:26 MST 2023
Finished: Wed Nov 29 05:46:25 MST 2023
Duration: 2 Days 6 hours 55 minutes

Built using OpenBSD 7.4-current (GENERIC.MP) #1941: Fri Nov 24 05:18:45 MST 2023

Built 8462 packages

Number of packages built each day:
Nov 26: 1981
Nov 27: 3055
Nov 28: 3152
Nov 29: 274



Critical path missing pkgs:
http://build-failures.rhaalovely.net/sparc64/2023-11-26/summary.log

Build failures: 42
http://build-failures.rhaalovely.net/sparc64/2023-11-26/audio/libsmackerdec.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/audio/ncmpc.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/audio/xmms2.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/databases/ruby-amalgalite,ruby31.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/arm-none-eabi/gdb.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/avr/gcc.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/mtxclient.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/py-thrift,python3.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/vim-command-t.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/xsd.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/devel/yder.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/emulators/libretro-pcsx-rearmed.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/cataclysm-dda,no_x11.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/choria.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/emptyclip.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/ezquake.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/fheroes2.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/gnukem.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/libgdx/1.9.11.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/games/scid.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/graphics/glslang.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/graphics/libliftoff.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/graphics/spirv-tools.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/graphics/tesseract/tesseract.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/lang/rust.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/mail/rspamd,hyperscan.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/math/gunits.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/math/openfst.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/shells/nsh.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/sysutils/borgmatic.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/sysutils/flashrom.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/sysutils/pftop.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/sysutils/seatd.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/sysutils/u-boot-asahi.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/textproc/libmarisa.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/textproc/rapidjson.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/textproc/redland-bindings,-main.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/wayland/slurp.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/wayland/swaybg.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/wayland/swaylock.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/wayland/wev.log
http://build-failures.rhaalovely.net/sparc64/2023-11-26/x11/polybar.log

Recurrent failures:
 failures/audio/libsmackerdec.log
 failures/audio/ncmpc.log
 failures/databases/ruby-amalgalite,ruby31.log
 failures/devel/arm-none-eabi/gdb.log
 failures/devel/avr/gcc.log
 failures/devel/mtxclient.log
 failures/devel/py-thrift,python3.log
 failures/devel/vim-command-t.log
 failures/devel/yder.log
 failures/emulators/libretro-pcsx-rearmed.log
 failures/games/cataclysm-dda,no_x11.log
 failures/games/ezquake.log
 failures/games/fheroes2.log
 failures/games/gnukem.log
 failures/games/scid.log
 failures/graphics/glslang.log
 failures/graphics/libliftoff.log
 failures/graphics/spirv-tools.log
 failures/mail/rspamd,hyperscan.log
 failures/math/gunits.log
 failures/math/openfst.log
 failures/shells/nsh.log
 failures/sysutils/borgmatic.log
 failures/sysutils/flashrom.log
 failures/sysutils/pftop.log
 failures/sysutils/seatd.log
 failures/sysutils/u-boot-asahi.log
 failures/textproc/rapidjson.log
 failures/textproc/redland-bindings,-main.log

New failures:
+failures/audio/xmms2.log
+failures/devel/xsd.log
+failures/games/choria.log
+failures/games/emptyclip.log
+failures/games/libgdx/1.9.11.log
+failures/graphics/tesseract/tesseract.log
+failures/lang/rust.log
+failures/textproc/libmarisa.log
+failures/wayland/slurp.log

CVS: cvs.openbsd.org: ports

2023-11-29 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/11/29 05:45:36

Modified files:
security/openssl: Makefile 

Log message:
Link OpenSSL 3.2 to build



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/11/29 05:44:59

Log message:
Import OpenSSL 3.2, ok sthen

In addition to the existing patches in 3.1, there are xonly fixes for SM2.
The SM4 assembly isn't ready for xonly, but it isn't used on OpenBSD, so
is left unpatched. The printf '%n' in rehash was fixed upstream.

Also include a fix for a double free introduced to "fix" a potential leak
in the DANE code. Three reviewers failed to notice that there was a break,
not a return separating two tlsa_free() in a 4 line diff.

Tested on riscv64 by jca, input/help from Claus Assmann, kettenis, sthen

https://www.openssl.org/news/openssl-3.2-notes.html

Status:

Vendor Tag: tb
Release Tags:   tb_20231129

N ports/security/openssl/3.2/Makefile
N ports/security/openssl/3.2/distinfo
N ports/security/openssl/3.2/patches/patch-Configurations_10-main_conf
N ports/security/openssl/3.2/patches/patch-Configurations_shared-info_pl
N ports/security/openssl/3.2/patches/patch-Configurations_unix-Makefile_tmpl
N ports/security/openssl/3.2/patches/patch-crypto_aes_asm_aes-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_aes_asm_aesni-sha1-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_aes_asm_aesni-sha256-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_aes_asm_aesni-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_aes_asm_aesv8-armx_pl
N ports/security/openssl/3.2/patches/patch-crypto_aes_asm_bsaes-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_aes_asm_vpaes-armv8_pl
N ports/security/openssl/3.2/patches/patch-crypto_aes_asm_vpaes-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_bn_asm_armv8-mont_pl
N ports/security/openssl/3.2/patches/patch-crypto_bn_asm_rsaz-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_bn_asm_x86_64-mont5_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_camellia_asm_cmll-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_chacha_asm_chacha-armv8_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_chacha_asm_chacha-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_ec_asm_ecp_nistz256-armv8_pl
N ports/security/openssl/3.2/patches/patch-crypto_modes_asm_ghash-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_ec_asm_ecp_nistz256-x86_64_pl
N ports/security/openssl/3.2/patches/patch-ssl_ssl_lib_c
N 
ports/security/openssl/3.2/patches/patch-crypto_modes_asm_aes-gcm-armv8_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_modes_asm_aesni-gcm-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_modes_asm_ghashv8-armx_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_poly1305_asm_poly1305-armv8_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_poly1305_asm_poly1305-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_sha_asm_keccak1600-armv8_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_sha_asm_keccak1600-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_sha_asm_sha1-armv8_pl
N ports/security/openssl/3.2/patches/patch-crypto_sha_asm_sha1-mb-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_sha_asm_sha1-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_sha_asm_sha256-mb-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_sha_asm_sha512-armv8_pl
N ports/security/openssl/3.2/patches/patch-crypto_sha_asm_sha512-x86_64_pl
N ports/security/openssl/3.2/patches/patch-crypto_whrlpool_asm_wp-x86_64_pl
N 
ports/security/openssl/3.2/patches/patch-crypto_ec_asm_ecp_sm2p256-armv8_pl
N ports/security/openssl/3.2/pkg/DESCR
N ports/security/openssl/3.2/pkg/PLIST

No conflicts created by this import



[update] sysutils/chezmoi to 2.42.1

2023-11-29 Thread Justin Berthault
Hi,

trivial update for chezmoi to 2.42.1


diff /usr/ports
commit - a10c81ec8820d40ccf7b98d16f10c513fc992365
path + /usr/ports
blob - cecf2a6e52dd305e0850d6f7595e73686f1acc8b
file + sysutils/chezmoi/Makefile
--- sysutils/chezmoi/Makefile
+++ sysutils/chezmoi/Makefile
@@ -1,7 +1,7 @@
 COMMENT =  dotfiles manager across multiple diverse machines
 
 MODGO_MODNAME =github.com/twpayne/chezmoi/v2
-MODGO_VERSION =v2.40.4
+MODGO_VERSION =v2.42.1
 
 DISTNAME = chezmoi-${MODGO_VERSION}
 
blob - 7ef1750d80aba06d92b58cc34317544c3715ecfd
file + sysutils/chezmoi/distinfo
--- sysutils/chezmoi/distinfo
+++ sysutils/chezmoi/distinfo
@@ -1,4 +1,4 @@
-SHA256 (chezmoi-v2.40.4.zip) = q/KX3rReXAcsf5xvF1+vszdN4XIXBudWtGh0ipuzTwY=
+SHA256 (chezmoi-v2.42.1.zip) = UhO7Igvs5UvUMrXUkxNrHU1iJnWr3MclYYmqGndsiCg=
 SHA256 (go_modules/cloud.google.com/go/compute/@v/v1.20.1.mod) = 
SI2TVknKeuBzDnUj1v2BwiWJhPotYoT9IlqTVMmt43I=
 SHA256 (go_modules/cloud.google.com/go/compute/@v/v1.20.1.zip) = 
s2OUUpzJxqCU+DEtVG8FeKWQ3mqqHVpUR5j+twjIobA=
 SHA256 (go_modules/cloud.google.com/go/compute/metadata/@v/v0.2.3.mod) = 
ABGpCmT7GqppqtQm/orJyeWjfkthmnvQTUCQlTZatIg=
@@ -15,13 +15,14 @@ SHA256 (go_modules/github.com/!azure!a!d/microsoft-aut
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azcore/@v/v1.7.0.mod) = 
OpfCagdkJsYpdFdLc6MxeD5hyoH1qYX+9dxp49ZN42U=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azcore/@v/v1.7.1.mod) = 
OpfCagdkJsYpdFdLc6MxeD5hyoH1qYX+9dxp49ZN42U=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azcore/@v/v1.8.0.mod) = 
pfXLjM8Gc3XZe/zb3zCHxyeP9/eMHuN4JbIkY3HEoVc=
-SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azcore/@v/v1.8.0.zip) = 
wwn4V+gsYEtu/g5OBWFRNqenVzlPUdvjQpJy3SKBfZ8=
+SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azcore/@v/v1.9.0.mod) = 
m83M0zxyXakNEFthDIsce4Wno35rq1EcTM2Elx+Z0F4=
+SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azcore/@v/v1.9.0.zip) = 
vcpc93v3FWTfj0zFO2B9oKlmxdhhGi/Azf7krMK/jME=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azidentity/@v/v1.3.1.mod) = 
26BfvbYKOINVSNTOGyHSyQBYuzowgNlUYC2dinmHkLI=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azidentity/@v/v1.4.0.mod) = 
VGyPgaDR5BmgkcQYtgzt7pwXaz3rIsbnx8KZS90rpb0=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/azidentity/@v/v1.4.0.zip) = 
OVZiSSVPBeWNiooTJM1EwFRcpAkbNNXYbfuDIGK4MCw=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/internal/@v/v1.3.0.mod) = 
taAvZV66xQR1vv3CMMy7KXov1v5oAwBmXZU5Sib3O2U=
-SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/internal/@v/v1.4.0.mod) = 
FM4QAVEXlxElQ0RgN4j/NPh5UUI7ayZobn9CpxoBB6Y=
-SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/internal/@v/v1.4.0.zip) = 
NKw00rsJRMRI8u2xmt1dY3+K3Z3O35XAD51zFR47RH8=
+SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/internal/@v/v1.5.0.mod) = 
FM4QAVEXlxElQ0RgN4j/NPh5UUI7ayZobn9CpxoBB6Y=
+SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/internal/@v/v1.5.0.zip) = 
1+AnCm2l2dLipveZ02YIDxprA4zL520DYTGg2gg1r/g=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets/@v/v1.0.1.mod)
 = 3FJ/HVva9P1Dta+n9JcOUrixRLSJ1bdzfW57QYHgUkE=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets/@v/v1.0.1.zip)
 = iFMBrQsfkK5itAsFl5YZmihkKPePpu9lowUqggZcOeY=
 SHA256 
(go_modules/github.com/!azure/azure-sdk-for-go/sdk/security/keyvault/internal/@v/v1.0.0.mod)
 = CkQaiZE6J4W+fm7HB8/DxYPwqpr6Dr/al3vSXT/vpS8=
@@ -61,32 +62,34 @@ SHA256 (go_modules/github.com/armon/go-socks5/@v/v0.0.
 SHA256 
(go_modules/github.com/armon/go-socks5/@v/v0.0.0-20160902184237-e75332964ef5.zip)
 = 9HPm3OgmoFUmOYM89yz6qLxxQdqntTdiLX946s/Z37M=
 SHA256 (go_modules/github.com/atotto/clipboard/@v/v0.1.4.mod) = 
hxgiy8ffN5L3ihAIhrf0mfc1VZOOM2uRhoIRlojqitA=
 SHA256 (go_modules/github.com/atotto/clipboard/@v/v0.1.4.zip) = 
1nssNsZidRMJ/S7DUd82UVhL6oQL0nvpqQcCw6I4tD8=
-SHA256 (go_modules/github.com/aws/aws-sdk-go-v2/@v/v1.21.2.mod) = 
llAxLlhWpJXKDly6MYtGbjQAjnqImUcmNEuAT8cXHys=
-SHA256 (go_modules/github.com/aws/aws-sdk-go-v2/@v/v1.21.2.zip) = 
gLoQB8Dq5IMD5yc+G1mwtTMoK8KdnRfq0e2rPit7u4o=
-SHA256 (go_modules/github.com/aws/aws-sdk-go-v2/config/@v/v1.19.1.mod) = 
EpGJ9tfQzdI63lnGN0ZR2fAiQVpEwShQwu5okG1pW4E=
-SHA256 (go_modules/github.com/aws/aws-sdk-go-v2/config/@v/v1.19.1.zip) = 
sn+FPIg1becM5K0ig/qveaaVwCpFj88QKmBGApiA89c=
-SHA256 (go_modules/github.com/aws/aws-sdk-go-v2/credentials/@v/v1.13.43.mod) = 
odMVkJ9FJ23O6LCu7dGP4vJuAYdaiiOIBdNjKOX78h4=
-SHA256 (go_modules/github.com/aws/aws-sdk-go-v2/credentials/@v/v1.13.43.zip) = 
Ilv7MdMHPSJiG+4i91rMTnWIIHXErBTIZMidtAinKpo=
-SHA256 
(go_modules/github.com/aws/aws-sdk-go-v2/feature/ec2/imds/@v/v1.13.13.mod) = 
0S782hS9L5u2pHNxar7GrPWmqAmrtBNfZQojWCfwz0M=
-SHA256 
(go_modules/github.com/aws/aws-sdk-go-v2/feature/ec2/imds/@v/v1.13.13.zip) = 
KhtmXU5Suk4/0jD39OmexL+8KXU9GopzuUFBrSlNQ6U=

CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 05:00:35

Modified files:
security/gpgme : Makefile distinfo 
security/gpgme/patches: patch-configure 

Log message:
update to gpgme-1.23.2



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 04:59:47

Modified files:
net/kea: Makefile distinfo 

Log message:
update to kea-2.4.1



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 04:56:17

Modified files:
security/openssl/3.1: Makefile 

Log message:
bump REVISION, I also fixed @conflict in the PLIST in last commit (to
add another line with the v0 for EPOCH) which I had intended to commit
separately.

uncomment PORTROACH limit, 3.2 will be added soon



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 04:47:58

Modified files:
security/openssl: Makefile.inc 
security/openssl/1.1: Makefile 
security/openssl/1.1/pkg: PLIST 
security/openssl/3.1/pkg: PLIST 

Log message:
Use a variable substitution for eopensslXX to make it easier to compare
PLISTs between openssl versions. Fix fallback SITES while there. OK tb@



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 04:16:44

Modified files:
security/py-bcrypt: Makefile crates.inc distinfo 
security/py-bcrypt/pkg: PLIST 

Log message:
update to py3-bcrypt-4.1.1



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 04:14:40

Modified files:
security/py-passlib: Makefile 
Added files:
security/py-passlib/patches: patch-passlib_handlers_bcrypt_py 

Log message:
py3-passlib: patch to fix with newer bcrypt-4.1.1 (uses __about__.__version__
which is going away), add missing RDEP (still uses deprecated pkg_resources).



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 03:34:25

Modified files:
net/icinga/icinga-php-thirdparty: Makefile distinfo 
net/icinga/icinga-php-thirdparty/pkg: PLIST 

Log message:
update to icinga-php-thirdparty-0.12.1



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Gonzalo L . Rodriguez
CVSROOT:/cvs
Module name:ports
Changes by: gonz...@cvs.openbsd.org 2023/11/29 03:11:17

Modified files:
www/aria2  : Makefile distinfo 

Log message:
Update for Aria2 to 1.37.0

>From wenheping200 at hotmail.com



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 02:49:25

Modified files:
mail/opensmtpd-filters/rspamd: Makefile distinfo 
Added files:
mail/opensmtpd-filters/rspamd/patches: patch-go_mod patch-go_sum 

Log message:
update x/sys dependency in opensmtpd-filter-rspamd to a version which
calls unveil()/pledge() libc wrappers rather than via syscall().

should unbreak with newer lang/go which only allows syscall() with
SYS_IOCTL and SYS_SYSCTL.



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/11/29 02:44:32

ports/mail/opensmtpd-filters/rspamd/patches

Update of /cvs/ports/mail/opensmtpd-filters/rspamd/patches
In directory cvs.openbsd.org:/tmp/cvs-serv83431/patches

Log Message:
Directory /cvs/ports/mail/opensmtpd-filters/rspamd/patches added to the 
repository



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Landry Breuil
CVSROOT:/cvs
Module name:ports
Changes by: lan...@cvs.openbsd.org  2023/11/29 02:43:40

Modified files:
net/synapse: Makefile distinfo modules.inc 
net/synapse/pkg: PLIST 

Log message:
net/synapse: update to 1.97.0.

see https://github.com/matrix-org/synapse/releases/tag/v1.97.0
from MAINTAINER Renaud Allard



[update] net/synapse 1.97.0

2023-11-29 Thread Renaud Allard

Hello,

Here is a new update for net/synapse 1.97.0
Tested on amd64

Best RegardsIndex: Makefile
===
RCS file: /cvs/ports/net/synapse/Makefile,v
retrieving revision 1.66
diff -u -p -r1.66 Makefile
--- Makefile	17 Nov 2023 16:56:46 -	1.66
+++ Makefile	29 Nov 2023 09:18:57 -
@@ -1,6 +1,6 @@
 COMMENT =	open network for secure, decentralized communication
 
-MODPY_EGG_VERSION =	1.96.1
+MODPY_EGG_VERSION =	1.97.0
 
 GH_ACCOUNT =	matrix-org
 GH_PROJECT =	synapse
Index: distinfo
===
RCS file: /cvs/ports/net/synapse/distinfo,v
retrieving revision 1.50
diff -u -p -r1.50 distinfo
--- distinfo	17 Nov 2023 16:56:46 -	1.50
+++ distinfo	29 Nov 2023 09:18:57 -
@@ -36,9 +36,9 @@ SHA256 (cargo/regex-automata-0.3.9.tar.g
 SHA256 (cargo/regex-syntax-0.7.5.tar.gz) = 27X7Gs2KGhiz3VvmLSVIXrdw4Fr7QIqWJ9FNRRuuEto=
 SHA256 (cargo/ryu-1.0.11.tar.gz) = RQGr3/OugqHBtHehclLrac7p5m65FcGrqk9E2HPfnwk=
 SHA256 (cargo/scopeguard-1.1.0.tar.gz) = 0pqwxtP8Dukv5m4tmfcA6rF6jVfRwdO3SDgPsguqeM0=
-SHA256 (cargo/serde-1.0.190.tar.gz) = kdPDNMoe6JSixvataY/oxDW3bVBLE9Q28GhdZI1tlvc=
-SHA256 (cargo/serde_derive-1.0.190.tar.gz) = Z8VgnzlOXCvX/FHv2keABOqA70L+6YPVxnpl408ywOM=
-SHA256 (cargo/serde_json-1.0.107.tar.gz) = a0IM5uPYvYgumyQ8bu0128mmEQyXaedLWE4NaNHyDGU=
+SHA256 (cargo/serde-1.0.192.tar.gz) = vKKghISyhdyygtD2eybK3A34sZ+MElAsE9lmv5SC8AE=
+SHA256 (cargo/serde_derive-1.0.192.tar.gz) = 1scgf77J+qSAc/PjB0y+VTr26lEtfCG6RuQ05w6p+8E=
+SHA256 (cargo/serde_json-1.0.108.tar.gz) = PRx+PqxAjRFRAsTCStOT4IIbs6XfTVBqgPhfenQqUms=
 SHA256 (cargo/smallvec-1.10.0.tar.gz) = pQe+/nlUBEVjQd+rEM72bq1MBB9iuLEbu5K//l0JU+A=
 SHA256 (cargo/subtle-2.4.1.tar.gz) = a97zLoFQwqCBEQtCdy/+fXyQMrYGvCJsgmD9l+CXZgE=
 SHA256 (cargo/syn-1.0.104.tar.gz) = SuVI7DbPGYwO93ENPCMJh8LW172YrW7cAnRGJyTFhc4=
@@ -54,7 +54,7 @@ SHA256 (cargo/windows_i686_gnu-0.36.1.ta
 SHA256 (cargo/windows_i686_msvc-0.36.1.tar.gz) = 4ueRcUiygS0e6vrrIql+SBPfpgo/j3jr4gS8yI8S8CQ=
 SHA256 (cargo/windows_x86_64_gnu-0.36.1.tar.gz) = Tc0XG4d2xBuXUh5doSei2GrSgBFIB9Cyqx5GK8dk2eE=
 SHA256 (cargo/windows_x86_64_msvc-0.36.1.tar.gz) = yBHKSoyFPvQgq9hZK6U927rJBBD6tpA7PnmXKmMfdoA=
-SHA256 (synapse-1.96.1.tar.gz) = WNG7gFc2pNzNoaYihTUqBQKBaO463T8vzd0y9VNqrdk=
+SHA256 (synapse-1.97.0.tar.gz) = 0w1zxN0v7RE36dMk8yFbmUSfwx26/2glD8KWGe86PrM=
 SIZE (cargo/aho-corasick-1.0.2.tar.gz) = 167694
 SIZE (cargo/anyhow-1.0.75.tar.gz) = 43901
 SIZE (cargo/arc-swap-1.5.1.tar.gz) = 66157
@@ -93,9 +93,9 @@ SIZE (cargo/regex-automata-0.3.9.tar.gz)
 SIZE (cargo/regex-syntax-0.7.5.tar.gz) = 343366
 SIZE (cargo/ryu-1.0.11.tar.gz) = 47007
 SIZE (cargo/scopeguard-1.1.0.tar.gz) = 11470
-SIZE (cargo/serde-1.0.190.tar.gz) = 76455
-SIZE (cargo/serde_derive-1.0.190.tar.gz) = 55676
-SIZE (cargo/serde_json-1.0.107.tar.gz) = 146458
+SIZE (cargo/serde-1.0.192.tar.gz) = 76866
+SIZE (cargo/serde_derive-1.0.192.tar.gz) = 55690
+SIZE (cargo/serde_json-1.0.108.tar.gz) = 146476
 SIZE (cargo/smallvec-1.10.0.tar.gz) = 31564
 SIZE (cargo/subtle-2.4.1.tar.gz) = 12630
 SIZE (cargo/syn-1.0.104.tar.gz) = 236683
@@ -111,4 +111,4 @@ SIZE (cargo/windows_i686_gnu-0.36.1.tar.
 SIZE (cargo/windows_i686_msvc-0.36.1.tar.gz) = 724575
 SIZE (cargo/windows_x86_64_gnu-0.36.1.tar.gz) = 790934
 SIZE (cargo/windows_x86_64_msvc-0.36.1.tar.gz) = 661999
-SIZE (synapse-1.96.1.tar.gz) = 8419249
+SIZE (synapse-1.97.0.tar.gz) = 8441673
Index: modules.inc
===
RCS file: /cvs/ports/net/synapse/modules.inc,v
retrieving revision 1.18
diff -u -p -r1.18 modules.inc
--- modules.inc	17 Nov 2023 16:56:46 -	1.18
+++ modules.inc	29 Nov 2023 09:18:57 -
@@ -36,9 +36,9 @@ MODCARGO_CRATES +=	regex-automata	0.3.9	
 MODCARGO_CRATES +=	regex-syntax	0.7.5	# MIT OR Apache-2.0
 MODCARGO_CRATES +=	ryu	1.0.11	# Apache-2.0 OR BSL-1.0
 MODCARGO_CRATES +=	scopeguard	1.1.0	# MIT/Apache-2.0
-MODCARGO_CRATES +=	serde	1.0.190	# MIT OR Apache-2.0
-MODCARGO_CRATES +=	serde_derive	1.0.190	# MIT OR Apache-2.0
-MODCARGO_CRATES +=	serde_json	1.0.107	# MIT OR Apache-2.0
+MODCARGO_CRATES +=	serde	1.0.192	# MIT OR Apache-2.0
+MODCARGO_CRATES +=	serde_derive	1.0.192	# MIT OR Apache-2.0
+MODCARGO_CRATES +=	serde_json	1.0.108	# MIT OR Apache-2.0
 MODCARGO_CRATES +=	smallvec	1.10.0	# MIT OR Apache-2.0
 MODCARGO_CRATES +=	subtle	2.4.1	# BSD-3-Clause
 MODCARGO_CRATES +=	syn	1.0.104	# MIT OR Apache-2.0
Index: pkg/PLIST
===
RCS file: /cvs/ports/net/synapse/pkg/PLIST,v
retrieving revision 1.44
diff -u -p -r1.44 PLIST
--- pkg/PLIST	17 Nov 2023 16:56:46 -	1.44
+++ pkg/PLIST	29 Nov 2023 09:18:57 -
@@ -1136,6 +1136,8 @@ lib/python${MODPY_VERSION}/site-packages
 lib/python${MODPY_VERSION}/site-packages/synapse/rest/media/${MODPY_PYCACHE}__init__.${MODPY_PYC_MAGIC_TAG}pyc
 

Re: UPDATE net/ntfy

2023-11-29 Thread Martin Reindl
Am 28.11.23 um 14:46 schrieb Lucas Gabriel Vuotto:
> Hi Martin, ports,
> 
> Here is an update to ntfy 2.8.0. v2 features a lot of things, mostly
> oriented to running it like a PaaS (signup and tiers), and access tokens
> for users and webpush, also useful in a selfhosted small-scale
> deployment. It also support some new integrations (Twilio for
> text-to-speech calls, Stripe for payments, ...).
> 
> On the ports side, there has been some modifications:
> 
> - Added /var/ntfy to PLIST, as it's a handy place for DBs
> - Small patch for server.yml to hint the operator to user /var/ntfy
>   (will send this one upstream if the previous item is merged in the
>   port)
> - The default, commented-out server.yml is now installed in /etc/ntfy
> - Dropped "--listen-port :8080" from ntfy.rc, favouring defining such an
>   option in the config file (can be discussed--this will make it run at
>   port 80 if there isn't a config file and the default flags are being
>   used, which in turns mean that ntfy won't start.)
> - I spent 2h wondering why would I get a HTTP 200 OK blank page when I
>   tried to visit the web. Not 4xx, no error. Only a blank page. It
>   became clear what the issue was when I read the port Makefile: we
>   don't ship it. I tried to take a stab at building it, but the build
>   relies on esbuild, which currently SIGILLs at startup in my machine.
>   idk if it's because syscall removal is rolled out already (currently
>   running OpenBSD 7.4-current (GENERIC.MP) #1467: Fri Nov 24 22:39:10
>   MST 2023), IBT (I tried it only on my laptop, which does have the
>   hardware), or the fact that the only dependency for it is
>   "golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8" (seems old and
>   I recall issues with Go and x/sys). ftr, I only tried with the built
>   binary and haven't tried building esbuild myself yet.  Also, I'm quite
>   unsure whether it makes any sense to try to port esbuild to current
>   OpenBSD, as I believe that won't fix it being pulled by NPM
>   nevertheless.
>   Instead of generating empty app.html and docs/index.html, write a
>   small text in each explaining that those aren't packaged in OpenBSD
>   and provide a link ot upstream versions, which is at least something.
>   (The docs require mkdocs, a Python package not currently ported. I'll
>   take a look at either porting it or building the docs page locally
>   with a venv, but at a later time.)
> 
>   Lucas

Hello Lucas,

thank you for the diff, looks good!

Maybe we should mention the requirement for esbuild and mkdocs in the
Makefile comment.

-m



Re: CVS: cvs.openbsd.org: ports

2023-11-29 Thread Stuart Henderson
On 2023/11/28 15:45, Theo Buehler wrote:
> On Tue, Nov 28, 2023 at 07:39:55AM -0700, Frederic Cambus wrote:
> > CVSROOT:/cvs
> > Module name:ports
> > Changes by: fcam...@cvs.openbsd.org 2023/11/28 07:39:55
> > 
> > Modified files:
> > textproc/ripgrep: Makefile 
> > 
> > Log message:
> > ripgrep: trim trailing garbage in COMMENT.
> > 
> 
> I'm pretty sure this was done to unconfuse some syntax highlighters.

Mostly emacs, I think. (vim's can handle it).

> Also, this would have needed a REVISION bump. So either revert or bump,
> please.

Yes, this is a gotcha with make - VAR=#
includes whitespace in the variable.

It doesn't matter much for COMMENT (other than tripping PLIST_DB) but
watch out for things with a direct comparison using ==/!= (iirc this
does matter with USE_LIBTOOL).



CVS: cvs.openbsd.org: ports

2023-11-29 Thread Frederic Cambus
CVSROOT:/cvs
Module name:ports
Changes by: fcam...@cvs.openbsd.org 2023/11/29 01:11:01

Modified files:
misc/ytree : Makefile distinfo 

Log message:
Update ytree to 2.06.



Re: CVS: cvs.openbsd.org: ports

2023-11-29 Thread Frederic Cambus
On Tue, Nov 28, 2023 at 03:45:12PM +0100, Theo Buehler wrote:
> On Tue, Nov 28, 2023 at 07:39:55AM -0700, Frederic Cambus wrote:
> > CVSROOT:/cvs
> > Module name:ports
> > Changes by: fcam...@cvs.openbsd.org 2023/11/28 07:39:55
> > 
> > Modified files:
> > textproc/ripgrep: Makefile 
> > 
> > Log message:
> > ripgrep: trim trailing garbage in COMMENT.
> > 
> 
> I'm pretty sure this was done to unconfuse some syntax highlighters.

Thanks for pointing this out, it looks obvious in retrospect.

> Also, this would have needed a REVISION bump. So either revert or bump,
> please.

Missed the trailing whitespace difference indeed :( Thanks for taking
care of the REVISION bump.



Re: openssl 3.2.0

2023-11-29 Thread Theo Buehler
On Wed, Nov 29, 2023 at 05:37:18AM +, Claus Assmann wrote:
> Please note that there is a double-free bug in 3.2.0
> related to DANE - maybe wait until this is fixed?
> See the openssl-users mailing list or
> https://github.com/openssl/openssl/pull/22821
> 

Ah great, thanks. I'll pull in the one line fix unless they release a
new version before I can import.