CVS: cvs.openbsd.org: ports

2023-03-14 Thread Sebastien Marie
CVSROOT:/cvs
Module name:ports
Changes by: sema...@cvs.openbsd.org 2023/03/14 23:51:55

Modified files:
www/woob   : Makefile 

Log message:
www/woob add missing RUN_DEPENDS (py-packaging)



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Sebastien Marie
CVSROOT:/cvs
Module name:ports
Changes by: sema...@cvs.openbsd.org 2023/03/14 23:49:47

Modified files:
lang/rust  : Makefile distinfo 
lang/rust/patches: patch-src_bootstrap_bootstrap_py 
   patch-src_bootstrap_lib_rs 
   patch-src_bootstrap_test_rs 
Added files:
lang/rust/patches: 
   
patch-tests_run-make-fulldeps_relocation-model_Makefile 
   patch-tests_ui-fulldeps_myriad-closures_rs 
   patch-tests_ui_sse2_rs 
Removed files:
lang/rust/patches: 
   
patch-src_test_run-make-fulldeps_relocation-model_Makefile 
   patch-src_test_ui-fulldeps_myriad-closures_rs 
   patch-src_test_ui_sse2_rs 

Log message:
update lang/rust to 1.68.0

Announce: https://blog.rust-lang.org/2023/03/09/Rust-1.68.0.html
Changelog: 
https://github.com/rust-lang/rust/blob/master/RELEASES.md#version-1680-2023-03-09



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Aisha Tammy
CVSROOT:/cvs
Module name:ports
Changes by: ai...@cvs.openbsd.org   2023/03/14 20:00:52

Modified files:
lang/node  : Makefile distinfo 
lang/node/patches: patch-node_gyp 
lang/node/pkg  : PLIST 

Log message:
update to 18.15.0

patch from Volker Schlecht (maintainer) who tested on amd64,arm64,i386

I tested on arm64, works fine for me



CVS: cvs.openbsd.org: ports

2023-03-14 Thread James Turner
CVSROOT:/cvs
Module name:ports
Changes by: jtur...@cvs.openbsd.org 2023/03/14 19:57:58

Modified files:
lang/microscheme: Makefile distinfo 
lang/microscheme/patches: patch-makefile 
lang/microscheme/pkg: PLIST 

Log message:
Update microscheme to tagged 0.9.4 release



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Daniel Jakots
CVSROOT:/cvs
Module name:ports
Changes by: d...@cvs.openbsd.org2023/03/14 19:39:40

Modified files:
sysutils/vultr-cli: Makefile distinfo modules.inc 

Log message:
Update to vultr-cli-2.15.1

>From Adriano Barbosa (maintainer)



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Aaron Bieber
CVSROOT:/cvs
Module name:ports
Changes by: abie...@cvs.openbsd.org 2023/03/14 18:35:38

Modified files:
security/rbw   : Makefile crates.inc distinfo 

Log message:
Update rbw to 1.6.0

OK aisha@



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Aaron Bieber
CVSROOT:/cvs
Module name:ports
Changes by: abie...@cvs.openbsd.org 2023/03/14 18:33:20

Modified files:
net/tailscale  : Makefile distinfo modules.inc 

Log message:
Update tailscale to 1.38.1



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Kurt Mosiejczuk
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/03/14 15:19:02

Modified files:
graphics/opencolorio: Makefile 

Log message:
Mark graphics/opencolorio BROKEN-sparc64



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/03/14 14:35:36

Modified files:
mail/grommunio/web: Makefile 

Log message:
set DPB_PROPERTIES=lonesome on i386, this has been failing on most builds
with out of memory when running one or other of the java jscompiler parts



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Matthias Kilian
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/03/14 14:05:32

Modified files:
lang/ghc   : Makefile 
lang/ghc/pkg   : PLIST 
Removed files:
lang/ghc/files : Process.hsc 
lang/ghc/patches: patch-libraries_unix_unix_cabal 

Log message:
Remove our pledge(2) interface patch from ghc.

It's broken since OpenBSD-6.3, nothing in the ports tree is or was
using it.

When necessary, I could easily write a separate "library" interfacing
pledge(2) and unveil(2) that then should be hosted on hackage.haskell.org.

ok gnezdo@, kn@, sthen@



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Klemens Nanni
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/03/14 13:30:15

Modified files:
devel/libevent2: Makefile 

Log message:
Fix shebang for packaged event_rpcgen.py



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Stefan Hagen
CVSROOT:/cvs
Module name:ports
Changes by: s...@cvs.openbsd.org2023/03/14 13:00:02

Modified files:
sysutils/hcloud: Makefile distinfo modules.inc 

Log message:
Update hcloud to 1.31.1

1.31.1
* ci: fix issue where release pipeline fails and no assets are produced
* fix(ci): race-condition in signing macos binaries

1.31.0
* server/list: Add missing PlacementGroup to JSON
* Update the toml library to the latest version
* Adding an age column to the cli
* feat(completion): read network zones from API



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/03/14 12:55:43

Modified files:
security/openssl: Makefile 

Log message:
Link OpenSSL 3.1 to build



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/03/14 12:54:42

Log message:
Import OpenSSL 3.1, ok sthen

Some more assembly, notably for riscv and ppc. Otherwise nothing to write
home about. No QUIC. There's now one test failure on sparc64. This is new.

https://www.openssl.org/news/openssl-3.1-notes.html

Status:

Vendor Tag: tb
Release Tags:   tb_20230314

N ports/security/openssl/3.1/Makefile
N ports/security/openssl/3.1/distinfo
N ports/security/openssl/3.1/patches/patch-Configurations_shared-info_pl
N ports/security/openssl/3.1/patches/patch-crypto_bn_build_info
N ports/security/openssl/3.1/patches/patch-apps_rehash_c
N ports/security/openssl/3.1/patches/patch-crypto_rsa_rsa_ossl_c
N ports/security/openssl/3.1/patches/patch-Configurations_unix-Makefile_tmpl
N ports/security/openssl/3.1/patches/patch-crypto_bn_asm_armv8-mont_pl
N ports/security/openssl/3.1/patches/patch-crypto_aes_asm_vpaes-armv8_pl
N ports/security/openssl/3.1/patches/patch-Configurations_10-main_conf
N 
ports/security/openssl/3.1/patches/patch-crypto_ec_asm_ecp_nistz256-armv8_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_sha_asm_keccak1600-armv8_pl
N ports/security/openssl/3.1/patches/patch-crypto_chacha_asm_chacha-armv8_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_modes_asm_aes-gcm-armv8_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_modes_asm_ghashv8-armx_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_poly1305_asm_poly1305-armv8_pl
N ports/security/openssl/3.1/patches/patch-crypto_aes_asm_aesv8-armx_pl
N ports/security/openssl/3.1/patches/patch-crypto_sha_asm_sha1-armv8_pl
N ports/security/openssl/3.1/patches/patch-crypto_sha_asm_sha512-armv8_pl
N ports/security/openssl/3.1/patches/patch-crypto_aes_asm_aes-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_aes_asm_aesni-sha1-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_aes_asm_aesni-sha256-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_aes_asm_aesni-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_aes_asm_bsaes-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_aes_asm_vpaes-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_bn_asm_rsaz-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_bn_asm_x86_64-mont5_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_camellia_asm_cmll-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_chacha_asm_chacha-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_ec_asm_ecp_nistz256-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_modes_asm_aesni-gcm-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_modes_asm_ghash-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_poly1305_asm_poly1305-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_sha_asm_keccak1600-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_sha_asm_sha1-mb-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_sha_asm_sha1-x86_64_pl
N 
ports/security/openssl/3.1/patches/patch-crypto_sha_asm_sha256-mb-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_sha_asm_sha512-x86_64_pl
N ports/security/openssl/3.1/patches/patch-crypto_whrlpool_asm_wp-x86_64_pl
N ports/security/openssl/3.1/pkg/DESCR
N ports/security/openssl/3.1/pkg/PLIST

No conflicts created by this import



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Robert Nagy
CVSROOT:/cvs
Module name:ports
Changes by: rob...@cvs.openbsd.org  2023/03/14 12:25:44

Modified files:
www/chromium/patches: patch-v8_include_v8config_h 
www/ungoogled-chromium/patches: patch-v8_include_v8config_h 
www/iridium/patches: patch-v8_include_v8config_h 

Log message:
disable the preserve_most attribute usage in v8 on arm64 to unbreak runtime
until it gets investigated



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/03/14 09:16:37

Modified files:
sysutils/ipmitool/patches: patch-configure_ac 

Log message:
remove patch chunk which was included in the new upstream tar; reported by naddy



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Stefan Sperling
CVSROOT:/cvs
Module name:ports
Changes by: s...@cvs.openbsd.org2023/03/14 08:22:56

Modified files:
games/zelda3   : Makefile distinfo 
games/zelda3-data: Makefile distinfo 
Removed files:
games/zelda3/patches: patch-types_h 

Log message:
update games/zelda3 to new upstream tag "0.2-beta"

Compared to our previous snapshot this fixes known gameplay glitches and bugs.



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:ports
Changes by: j...@cvs.openbsd.org2023/03/14 07:16:39

Modified files:
editors/emacs  : Makefile 

Log message:
Bump to be ahead of -stable



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:ports
Changes by: j...@cvs.openbsd.org2023/03/14 07:16:02

Modified files:
editors/emacs  : Tag: OPENBSD_7_2 Makefile 
Added files:
editors/emacs/patches: Tag: OPENBSD_7_2 patch-lib-src_etags_c 
   patch-lisp_htmlfontify_el 
   patch-lisp_progmodes_ruby-mode_el 

Log message:
Backport security fixes from the emacs-28 branch

Fixes for CVE-2022-45939, CVE-2022-48337, CVE-2022-48338, CVE-2022-48339
Prevent arbitrary command execution in ctags/etags handling and
htmlfontify/ruby modes.

>From lux @ shellcodes dot org



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:ports
Changes by: j...@cvs.openbsd.org2023/03/14 07:09:48

Modified files:
editors/emacs  : Makefile 
Added files:
editors/emacs/patches: patch-lib-src_etags_c 
   patch-lisp_htmlfontify_el 
   patch-lisp_progmodes_ruby-mode_el 

Log message:
Backport security fixes from the emacs-28 branch

Fixes for CVE-2022-45939, CVE-2022-48337, CVE-2022-48338, CVE-2022-48339
Prevent arbitrary command execution in ctags/etags handling and
htmlfontify/ruby modes.

>From lux @ shellcodes dot org



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Stuart Henderson
CVSROOT:/cvs
Module name:ports
Changes by: st...@cvs.openbsd.org   2023/03/14 06:21:40

Modified files:
devel/jenkins/devel: Makefile 
devel/jenkins/pkg: DESCR 
devel/jenkins/stable: Makefile 

Log message:
rewrite jenkins DESCR; less blurb, more information about what it does
ok rsadowski



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:ports
Changes by: ajacou...@cvs.openbsd.org   2023/03/14 04:34:24

Modified files:
devel/spidermonkey102: Makefile distinfo 

Log message:
Update to spidermonkey102-102.9.0.



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/03/14 04:08:13

Modified files:
x11/mplayer: Makefile 
x11/mplayer/patches: patch-libao2_ao_sndio_c 

Log message:
mplayer: fix a crash when exiting in muted state

Muting mplayer with 'm', then hitting '' segfaults mplayer since it
tries to unmute itself after uninitializing the sndio backend. Clear the
havevol flag on uninit() to block subsequent AOCONTROL_{GET,SET}_VOLUME
operations.

Fix suggested by and ok ratchov



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Giovanni Bechis
CVSROOT:/cvs
Module name:ports
Changes by: giova...@cvs.openbsd.org2023/03/14 04:07:45

Modified files:
www/apache-httpd: Tag: OPENBSD_7_2 Makefile distinfo 
Removed files:
www/apache-httpd/patches: Tag: OPENBSD_7_2 
  patch-modules_http2_h2_c2_filter_c 

Log message:
update to 2.4.56
fixes CVE-2023-27522 and CVE-2023-25690



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Klemens Nanni
CVSROOT:/cvs
Module name:ports
Changes by: k...@cvs.openbsd.org2023/03/14 03:46:22

Modified files:
devel/git  : Makefile distinfo 
devel/git/patches: patch-config_mak_uname 
devel/git/pkg  : PLIST-main 

Log message:
update to git 2.40.0

https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.40.0.txt



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Rafael Sadowski
CVSROOT:/cvs
Module name:ports
Changes by: rsadow...@cvs.openbsd.org   2023/03/14 02:37:24

Modified files:
devel/jenkins/devel: Makefile 
devel/jenkins/pkg: DESCR README jenkins.rc 
devel/jenkins/stable: Makefile 

Log message:
Update URLs, DESCR and remove AJP option

Diff from Alexander Brandes with tweaks by me.



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/03/14 00:56:22

Modified files:
security/p5-Crypt-OpenSSL-DSA: Makefile 
Added files:
security/p5-Crypt-OpenSSL-DSA/patches: patch-DSA_xs 

Log message:
p5-Crypt-OpenSSL-DSA: don't set dummy public key to 0

When the Richards added setters for DSA parameters to OpenSSL 1.1, they
added a check that disallows setting a private key without a corresponding
public key. This was incompatible with existing API surface of the Perl
bindings, so they added a hack. This hack no longer works since we added
a check to the DSA signing operation.

Set the public key to 2 instead, which is good enough to pass the new
checks. This workaround will have to be revisited soon, but it is good
enough for now.

Discussed at length with beck, bluhm, jsing
reported by and ok bluhm (maintainer)



CVS: cvs.openbsd.org: ports

2023-03-14 Thread Theo Buehler
CVSROOT:/cvs
Module name:ports
Changes by: t...@cvs.openbsd.org2023/03/14 00:45:41

Modified files:
net/p5-Net-DNS-SEC: Makefile 
Added files:
net/p5-Net-DNS-SEC/patches: patch-SEC_xs 

Log message:
p5-Net-DNS-SEC: do not set missing DSA private key to 0

This module takes shortcuts and sets missing parameters in at least
DSA and RSA to 0 instead of leaving them unset. This leads to failing
regress tests since sanity checks on DSA parameters have been added
before performing DSA verify and sign operations to prevent infinite
loops.

Discussed at length with beck, bluhm, jsing
reborted by and ok bluhm (maintainer)