Age | Commit message (Collapse) | Author |
|
Feature safe: yes
|
|
Approved by: portmgr (pav)
Feature safe: yes
|
|
Submitted by: stas@
With hat: ruby@
Feature safe: yes
Approved by: portmgr (pav)
|
|
to Mk/bsd.cran.mk
PR: ports/162238
Submitted by: tota (myself)
Approved by: wen (maintainer of Mk/bsd.cran.mk and many related ports),
David Naylor <naylor_DOT_b_DOT_david_AT_gmail_DOT_com>
(maintainer of math/R-cran-RSvgDevice and math/R-cran-car),
Dan Rue <drue_AT_therub_DOT_org>
(maintainer of math/R-cran-psych, timeout > 2 weeks)
Feature safe: yes
|
|
This is an incremental update and should be much easier to handle than
the transition from 4.6.5 to 4.7.2 in the ports tree.
The official release notes can be found at
http://www.kde.org/announcements/announce-4.7.3.php.
Approved by: avilla (mentor), makc (mentor), portmgr (miwi)
Feature safe: yes
|
|
No ports uses this directly any more via USE_GCC=4.5 and for the sake
of those nine that have USE_GCC=4.5+ we transparently rewrite this to
USE_GCC=4.6+ which has already happened for weeks for tinderbox builds.
Feature safe: yes
|
|
PR: ports/161706
Reported by: rakuco (private email)
Feature safe: yes
|
|
This has been in area51 since April, and discussions with makc
indicate this was only needed when we supported FreeBSD < 7.
Approved by: avilla (mentor), portmgr (tabthorpe)
Feature safe: yes
|
|
Suggested by: miwi@
|
|
- Add a new flag WITHOUT_FBSD10_FIX for maintainer testing
Some additional notes:
We are planing to make 10 exp-run after the 9.0 Release within 2 weeks to poke maintainers
and upstream as to ensure that for the 10.0 Release, everything is fixed and we can remove
the current workaround.
Submitted by: bf@, rea@ (based on)
Thanks to: beat, kwm, dough
Reviewed by: erwin
Tested via PH: 2x exp-run
Approved by: portmgr (myself)
|
|
|
|
|
|
PR: ports/161495
Submitted by: lwhsu
|
|
PR: ports/159962
Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
|
|
|
|
Examples:
USE_APACHE= 22 # specify exact version
USE_APACHE= 13+ # specify [min] version, no [max] version
USE_APACHE= 13-22 # specify [min]-[max] range
USE_APACHE= -22 # specify [max] version, no [min] version
with hat apache@
|
|
by defaulting to GNUSTEP_WITH_GCC42
|
|
conditional up).
Discussed with: bf
|
|
changes based on GCC changes more clearly.
|
|
GCC (the one which also USE_FORTRAN=yes chooses) in case we do have
to install GCC in any case. Only if an acceptable version of GCC
is already present use that one.
This will ease the load on tinderboxes, further the use of current
versions of GCC, and minimize the need to download/carry several
versions of GCC for users of pre-built packages.
PR: 160507
Submitted by: bf
|
|
- Bump PORTREVISION.
Reported by: Carmel <carmel_ny@hotmail.com> via mailing list
|
|
|
|
- x11-wm/xfce4-panel update to 160920
- x11-fm/thunar update to 1.2.3
PR: 160946
160920
160875
Submitted by: Olivier Duchateau <duchateau.olivier@gmail.com>
|
|
Ports that need this can set WITH_FBSD10_FIX to apply the hack, but
only on FreeBSD 10. This is only a temporary workaround as the real fix
lies upstream by fixing the included scripts, but this will take a
long time.
Submitted by: ed, jilles, stas, beat (and more)
Tested on: pointyhat i386-9-exp and i386-10
|
|
PR: ports/161980
Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by: glarkin@ (mentor)
|
|
|
|
- Update versions for garcon, libexo, libxfce4util, thunar, xfce4-panel to
match current in-tree versions [2]
PR: ports/160797 [2]
Submitted by: Olivier Duchateau [duchateau.olivier gmail] [2]
Approved by: oliver@ (previous maintainer) [1]
|
|
PR: ports/161463
Submitted by: Nali Toja <nalitoja AT gmail.com>
|
|
|
|
and multiple vulnerabilities.
|
|
zenoss before install phase, upsetting Tinderbox and pointyhat.
|
|
4.7.2. The official release notes can be found at:
http://kde.org/announcements/announce-4.7.2.php
This release ships with many improvements. Read more about them here:
http://FreeBSD.kde.org/news.php#itemKDESC472availableinports
We'd like to say thanks to all testers and contributors, especially to
lwhsu@ for his effort on hosting our test packages.
PR: 156293 [1]
159219 [2]
160164 [3]
Submitted by: Oleg Sidorkin <osidorkin@gmail.com> [1]
Alvaro Castillo <gobledb@gmail.com> [2]
dkeav04@gmail.com [3]
Tested by: exp-run via pav
|
|
PR: 156543
Submitted by: Pan Tsu <inyaoo@gmail.com>
|
|
- Make sure internal paths are added before system ones.
- Remove phonon-gstreamer dependency from qt4-webkit.
- Remove qt4-gui dependency from qt4-dbus.
|
|
PR: ports/161679
Submitted by: tota (myself)
Approved by: wen (maintainer)
|
|
no one has stepped up to deal with:
archivers/pecl-phar Vulnerable since 2011-01-13
comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server Vulnerable since 2006-10-29
databases/mysql323-client Vulnerable since 2006-10-29
databases/mysql323-scripts Vulnerable since 2006-10-29
databases/mysql40-server Vulnerable since 2006-10-29
databases/mysql40-client Vulnerable since 2006-10-29
databases/mysql40-scripts Vulnerable since 2006-10-29
databases/p5-DBD-mysql40
Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN
deskutils/libopensync-plugin-syncml
Depends on comms/libsyncml, which is DEPRECATED
devel/libsoup22 Vulnerable since 2011-07-28
dns/bind9-sdb-ldap Vulnerable since 2011-06-04
dns/bind9-sdb-postgresql Vulnerable since 2011-06-04
ftp/wgetpro Vulnerable since 2004-12-14
games/quake2forge Vulnerable since 2005-01-21
graphics/linux-tiff Vulnerable since 2004-10-13
japanese/mutt Vulnerable since 2007-07-29
japanese/asterisk14-sounds Depends on net/asterisk14, which is FORBIDDEN
net/asterisk14 Vulnerable since 2011-06-25
net/isc-dhcp31-client Vulnerable since 2011-04-10
net/isc-dhcp31-server Vulnerable since 2011-04-10
net/isc-dhcp31-relay Vulnerable since 2011-04-10
net/asterisk-app-ldap Depends on net/asterisk14, which is FORBIDDEN
net/asterisk-app-notify Depends on net/asterisk14, which is FORBIDDEN
net/asterisk-oh323
Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64
net/asterisk14-addons Depends on net/asterisk14, which is FORBIDDEN
net/astfax Depends on net/asterisk14, which is FORBIDDEN
net-mgmt/nagios2 Vulnerable since 2009-06-30
www/gforge Vulnerable since 2005-08-09
www/linux-flashplugin7 Vulnerable since at least 2008-05-30
www/opera-devel Vulnerable since 2010-06-25, does not fetch
www/plone3 Vulnerable and unsupported upstream
www/serendipity-devel Vulnerable since 2008-04-25
www/ziproxy Vulnerable since 2010-06-15
www/asterisk-gui Depends on net/asterisk14, which is FORBIDDEN
x11-toolkits/linux-pango Vulnerable since 2009-05-13
|
|
Pointy hat to: self, bf
|
|
CFLAGS and LDFLAGS, if USE_FORTRAN=yes has been specified.
Submitted by: bf
|
|
|
|
|
|
Thanks to: flo@ for preparing the www/seamonkey update
|
|
|
|
Thanks to: flo@ for preparing the www/firefox update
|
|
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead
PR: 157936
Submitted by: myself
Exp-runs by: pav
Approved by: pav
|
|
cups-libs, gnutls, libgcrypt, libgpg-error, libtasn1.
|
|
|
|
. cups-libs;
. gnutls;
. libgcrypt;
. libgpg-error;
. libtasn1.
PR: ports/159007
Submitted by: Stas Timokhin <devel@stasyan.com>
|
|
PR:a ports/158776
Submitted by: eadler@
|
|
PR: ports/160434
Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
|
|
Exp-run by: pav
Thanks to: pav, bf (for fixing several ports)
|