Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
5.6.51 30 Jun 2023 01:40:48
![commit hash: 1fb68a4d5483cd0ac802a916d240def524eabce7 commit hash: 1fb68a4d5483cd0ac802a916d240def524eabce7](/images/git.png) ![commit hash: 1fb68a4d5483cd0ac802a916d240def524eabce7 commit hash: 1fb68a4d5483cd0ac802a916d240def524eabce7](/images/codeberg.svg) ![commit hash: 1fb68a4d5483cd0ac802a916d240def524eabce7 commit hash: 1fb68a4d5483cd0ac802a916d240def524eabce7](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Muhammad Moinur Rahman (bofh) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-*: Sunset
2023-06-30 databases/mysql56-*: Upstream support ended in February 2021
Approved by: portmgr (blanket) |
5.6.51 29 Apr 2023 15:14:58
![commit hash: 7cab9ba40f8fd39656074d22b474ed7408e1368e commit hash: 7cab9ba40f8fd39656074d22b474ed7408e1368e](/images/git.png) ![commit hash: 7cab9ba40f8fd39656074d22b474ed7408e1368e commit hash: 7cab9ba40f8fd39656074d22b474ed7408e1368e](/images/codeberg.svg) ![commit hash: 7cab9ba40f8fd39656074d22b474ed7408e1368e commit hash: 7cab9ba40f8fd39656074d22b474ed7408e1368e](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Muhammad Moinur Rahman (bofh) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Mark IGNORE_SSL
- Mark to IGNORE with OpenSSL 3.0.0 and later
- Upstream only supports OpensSSL 1.0.X and 1.1.X
Approved by: portmgr (blanket) |
5.6.51 30 Dec 2022 01:47:27
![commit hash: 23448134b7b1a512a137991ad9603fcfcf7e6ef3 commit hash: 23448134b7b1a512a137991ad9603fcfcf7e6ef3](/images/git.png) ![commit hash: 23448134b7b1a512a137991ad9603fcfcf7e6ef3 commit hash: 23448134b7b1a512a137991ad9603fcfcf7e6ef3](/images/codeberg.svg) ![commit hash: 23448134b7b1a512a137991ad9603fcfcf7e6ef3 commit hash: 23448134b7b1a512a137991ad9603fcfcf7e6ef3](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Graham Perrin (grahamperrin) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Makefile: fix typo
February, not Febuary.
Reported by: https://www.reddit.com/user/mirror176
Fixes: ba0cbc09b0ae databases/mysql56-{client, server}: Mark DEPRECATED |
5.6.51 06 Dec 2022 14:09:56
![commit hash: ba0cbc09b0aec8ebbe7ec8e26f70b5fd68d475bf commit hash: ba0cbc09b0aec8ebbe7ec8e26f70b5fd68d475bf](/images/git.png) ![commit hash: ba0cbc09b0aec8ebbe7ec8e26f70b5fd68d475bf commit hash: ba0cbc09b0aec8ebbe7ec8e26f70b5fd68d475bf](/images/codeberg.svg) ![commit hash: ba0cbc09b0aec8ebbe7ec8e26f70b5fd68d475bf commit hash: ba0cbc09b0aec8ebbe7ec8e26f70b5fd68d475bf](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Jochen Neumeister (joneum) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Mark DEPRECATED
MySQL 5.5 has reached it's Extended Support on Febuary 2021. Under
sustaining support there is no New updates, fixes, security alerts,
data fixes, and critical patch updates. Hence we are setting it to EXPIRE
before 2023Q3.
Sponsored by: Netzkommune GmbH |
5.6.51 26 Oct 2022 16:55:27
![commit hash: 92b5359cdf584bbaa3cd4418dc84b00154cd978f commit hash: 92b5359cdf584bbaa3cd4418dc84b00154cd978f](/images/git.png) ![commit hash: 92b5359cdf584bbaa3cd4418dc84b00154cd978f commit hash: 92b5359cdf584bbaa3cd4418dc84b00154cd978f](/images/codeberg.svg) ![commit hash: 92b5359cdf584bbaa3cd4418dc84b00154cd978f commit hash: 92b5359cdf584bbaa3cd4418dc84b00154cd978f](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Dan Langille (dvl) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/and_others: Fix rc.d script comment
I found this typo while researching something else. It seems to have
propgated around the tree.
Approved by: blanket |
07 Sep 2022 21:58:51
![commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4](/images/git.png) ![commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4](/images/codeberg.svg) ![commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Stefan Eßer (se) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
5.6.51 07 Sep 2022 21:10:59
![commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52](/images/git.png) ![commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52](/images/codeberg.svg) ![commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Stefan Eßer (se) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
5.6.51 20 Jul 2022 14:21:07
![commit hash: d076ad94e206dda108061fe99ddb860d93cc6d16 commit hash: d076ad94e206dda108061fe99ddb860d93cc6d16](/images/git.png) ![commit hash: d076ad94e206dda108061fe99ddb860d93cc6d16 commit hash: d076ad94e206dda108061fe99ddb860d93cc6d16](/images/codeberg.svg) ![commit hash: d076ad94e206dda108061fe99ddb860d93cc6d16 commit hash: d076ad94e206dda108061fe99ddb860d93cc6d16](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Tobias C. Berner (tcberner) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* "Choe, Cheng-Dae" whitekid
* "Mahdi Mokhtari <mokhi64@gmail.com>"
* "Meikel Brandmeyer" <ocaml-sqlite3-port@kotka.de>
* <hvo.pm@xs4all.nl>
* <jsmith@resonatingmedia.com>
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Akinori MUSHA aka knu <knu@idaemons.org>
* Alan Snelson <Alan@Wave2.org> (Only the first 15 lines of the commit message are shown above ) |
5.6.51 16 May 2022 06:49:44
![commit hash: 9f0ff92f6deaa2187cdb33a27f5aebbdd2c0d71d commit hash: 9f0ff92f6deaa2187cdb33a27f5aebbdd2c0d71d](/images/git.png) ![commit hash: 9f0ff92f6deaa2187cdb33a27f5aebbdd2c0d71d commit hash: 9f0ff92f6deaa2187cdb33a27f5aebbdd2c0d71d](/images/codeberg.svg) ![commit hash: 9f0ff92f6deaa2187cdb33a27f5aebbdd2c0d71d commit hash: 9f0ff92f6deaa2187cdb33a27f5aebbdd2c0d71d](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Loïc Bartoletti (lbartoletti) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql*: fix pkg-plist use share/man
Approved by: portmgr (blanket) |
5.6.51 25 Apr 2022 14:12:59
![commit hash: fe14b62930a2984ef3f701b700e7dba68381317f commit hash: fe14b62930a2984ef3f701b700e7dba68381317f](/images/git.png) ![commit hash: fe14b62930a2984ef3f701b700e7dba68381317f commit hash: fe14b62930a2984ef3f701b700e7dba68381317f](/images/codeberg.svg) ![commit hash: fe14b62930a2984ef3f701b700e7dba68381317f commit hash: fe14b62930a2984ef3f701b700e7dba68381317f](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Piotr Kubaj (pkubaj) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: switch back to clang on powerpc64 |
5.6.51 10 Jan 2022 15:15:39
![commit hash: bcaf25a8c8046b094f6b5ab5bc258333bc326ee1 commit hash: bcaf25a8c8046b094f6b5ab5bc258333bc326ee1](/images/git.png) ![commit hash: bcaf25a8c8046b094f6b5ab5bc258333bc326ee1 commit hash: bcaf25a8c8046b094f6b5ab5bc258333bc326ee1](/images/codeberg.svg) ![commit hash: bcaf25a8c8046b094f6b5ab5bc258333bc326ee1 commit hash: bcaf25a8c8046b094f6b5ab5bc258333bc326ee1](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Stefan Eßer (se) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.
This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.
Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port (Only the first 15 lines of the commit message are shown above ) |
5.6.51 25 Nov 2021 21:40:11
![commit hash: 04b9da414081a733478d3def4e1e3777908536c6 commit hash: 04b9da414081a733478d3def4e1e3777908536c6](/images/git.png) ![commit hash: 04b9da414081a733478d3def4e1e3777908536c6 commit hash: 04b9da414081a733478d3def4e1e3777908536c6](/images/codeberg.svg) ![commit hash: 04b9da414081a733478d3def4e1e3777908536c6 commit hash: 04b9da414081a733478d3def4e1e3777908536c6](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Stefan Eßer (se) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
*/*: Remove redundant '-*' from CONFLICTS definitions
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket) |
5.6.51 30 Sep 2021 21:23:30
![commit hash: 620968a43a5f9bb3fa98ab20f257a4c0d864caa7 commit hash: 620968a43a5f9bb3fa98ab20f257a4c0d864caa7](/images/git.png) ![commit hash: 620968a43a5f9bb3fa98ab20f257a4c0d864caa7 commit hash: 620968a43a5f9bb3fa98ab20f257a4c0d864caa7](/images/codeberg.svg) ![commit hash: 620968a43a5f9bb3fa98ab20f257a4c0d864caa7 commit hash: 620968a43a5f9bb3fa98ab20f257a4c0d864caa7](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Rene Ladan (rene) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
cleanup: drop support for EOL FreeBSD 11.X
Search criteria used:
- 11.4
- OSREL*
- OSVER*
- *_FreeBSD_11
Input from:
- adridg: devel/qca-legacy
- jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds
- sunpoet: security/p5-*OpenSSL*
Reviewed by: doceng, kde, multimedia, perl, python, ruby, rust
Differential Revision: https://reviews.freebsd.org/D32008
Test Plan: make index |
5.6.51 10 Sep 2021 21:18:24
![commit hash: 6fc64a5ff96eb0de1e0eab2455095b61f2b628d6 commit hash: 6fc64a5ff96eb0de1e0eab2455095b61f2b628d6](/images/git.png) ![commit hash: 6fc64a5ff96eb0de1e0eab2455095b61f2b628d6 commit hash: 6fc64a5ff96eb0de1e0eab2455095b61f2b628d6](/images/codeberg.svg) ![commit hash: 6fc64a5ff96eb0de1e0eab2455095b61f2b628d6 commit hash: 6fc64a5ff96eb0de1e0eab2455095b61f2b628d6](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Bernhard Froehlich (decke) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix CPE information
Approved by: portmgr (blanket) |
5.6.51 06 Apr 2021 14:31:13
![commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d](/images/git.png) ![commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d](/images/codeberg.svg) ![commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Mathieu Arnold (mat) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
all: Remove all other $FreeBSD keywords. |
5.6.51 06 Apr 2021 14:31:07
![commit hash: 305f148f482daf30dcf728039d03d019f88344eb commit hash: 305f148f482daf30dcf728039d03d019f88344eb](/images/git.png) ![commit hash: 305f148f482daf30dcf728039d03d019f88344eb commit hash: 305f148f482daf30dcf728039d03d019f88344eb](/images/codeberg.svg) ![commit hash: 305f148f482daf30dcf728039d03d019f88344eb commit hash: 305f148f482daf30dcf728039d03d019f88344eb](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Mathieu Arnold (mat) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Remove # $FreeBSD$ from Makefiles. |
5.6.51 03 Feb 2021 01:58:48
![Revision:563857 Revision:563857](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fluffy ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56*: update to 5.6.51
Disable detect of TLSv1.3 functions - it's broken with LibreSSL
Release Notes: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-51.html
Requested by: joneum |
5.6.50 19 Oct 2020 18:44:21
![Revision:552757 Revision:552757](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysq56-{client, server}: Update to latest release 5.6.50
Full Changelog: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-50.html
Sponsored by: Netzkommune GmbH |
5.6.49_1 16 Oct 2020 20:43:58
![Revision:552522 Revision:552522](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Fix pkg-messages
PR: 250340
Submitted by: 0mp
Sponsored by: Netzkommune GmbH |
5.6.49 31 Jul 2020 12:16:52
![Revision:543856 Revision:543856](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Mark Broken on armv6: qemu: uncaught target signal 11 (Segmentation fault) -
core dumped
Reported by: fallout
Sponsored by: Netzkommune GmbH |
5.6.49 14 Jul 2020 09:23:24
![Revision:542203 Revision:542203](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysq56-{client, server}: Update to latest release 5.6.49
Full changelog: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-49.html
MFH: 2020Q3
Security: 0ed71663-c369-11ea-b53c-d4c9ef517024
Sponsored by: Netzkommune GmbH |
5.6.48 28 Apr 2020 21:08:35
![Revision:533270 Revision:533270](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Update to latest release 5.6.48
Bugfix:
- InnoDB: A tablespace import operation that failed due to the source and
destination tables being defined with different DATA DIRECTORY clauses reported
an insufficiently descriptive schema mismatch error. Moreover, if a .cfg file
was not present, the same operation would raise an assertion failure. A more
informative error message is now reported in both cases before the import
operation is terminated due to the data directory mismatch.
- InnoDB: Updating certain InnoDB system variables that take string values
raised invalid read errors during Valgrind testing.
- Replication: In the event of an unplanned disconnection of a replication slave
from the master, the reference to the master's dump thread might not be removed
from the list of registered slaves, in which case statements that accessed the
list of slaves would fail. The issue has now been fixed
- Replication: With the settings binlog_format=MIXED,
tx_isolation=READ-COMMITTED, and binlog_row_image=FULL, an INSERT ... SELECT
query involving a transactional storage engine omitted any columns with a null
value from the row image written to the binary log. This happened because when
processing INSERT ... SELECT statements, the columns were marked for inserts
before the binary logging format was selected. The issue has now been fixed.
More Infos: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-48.html
MFH: 2020Q2
Security: 21d59ea3-8559-11ea-a5e2-d4c9ef517024 (MySQL - Server)
Security: 622b5c47-855b-11ea-a5e2-d4c9ef517024 (MySQL - Client)
Sponsored by: Netzkommune GmbH |
5.6.47_1 19 Mar 2020 12:18:34
![Revision:528718 Revision:528718](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
pkubaj ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: fix build on powerpc64 elfv2
This port doesn't build on powerpc64 with clang:
Wrong types for attribute: inalloca nest noalias nocapture nonnull readnone
readonly signext sret zeroext byval dereferenceable(1)
dereferenceable_or_null(1)
%call38 = call signext i32 @my_atomic_cas32(i32* %58, i32* %60, %union.U_32
signext %61)
in function lf_hash_insert
fatal error: error in backend: Broken function found, compilation aborted!
cc: error: clang frontend command failed with exit code 70 (use -v to see
invocation)
FreeBSD clang version 10.0.0 (git@github.com:llvm/llvm-project.git
llvmorg-10.0.0-rc3-1-gc290cb61fdc)
Target: powerpc64-unknown-freebsd13.0
Thread model: posix
InstalledDir: /usr/bin
This issue is already reported upstream, so switch for now to GCC on powerpc64. |
5.6.47_1 12 Mar 2020 07:42:38
![Revision:528272 Revision:528272](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
This fix a Problem, when MySQL build with libressl
/var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:230:25:
error: use of undeclared identifier 'SSL_OP_NO_TLSv1_3'
SSL_OP_NO_TLSv1_3 |
^
/var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:275:12:
warning: implicit declaration of function 'SSL_CTX_set_ciphersuites' is invalid
in C99 [-Wimplicit-function-declaration]
if (0 == SSL_CTX_set_ciphersuites(ssl_fd->ssl_context, ""))
Special thanks for his help to: fluffy
PR: 244320
MFH: 2020Q1
Sponsored by: Netzkommune GmbH |
5.6.47 01 Mar 2020 17:27:31
![Revision:527563 Revision:527563](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Some manpages require groff, for example mysqladmin
Sponsored by: Netzkommune GmbH |
5.6.47 24 Jan 2020 22:01:39
![Revision:523992 Revision:523992](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Take Maintainership
Approved by: mmokhi (maintainer via private Mail) |
5.6.47 17 Jan 2020 14:26:30
![Revision:523297 Revision:523297](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Update to latest release 5.6.47
Bugs Fixed:
- Replication: When GTIDs are enabled on a replication master and slave, and the
slave connects to the master with the MASTER_AUTO_POSITION=1 option set, the
master must send the slave all the transactions that the slave has not already
received, committed, or both. If any of the transactions that should be sent by
the master have been already purged from the master's binary log, the master
sends the error ER_MASTER_HAS_PURGED_REQUIRED_GTIDS (1789) to the slave, and
replication does not start.
The message provided for the error ER_MASTER_HAS_PURGED_REQUIRED_GTIDS has
been changed to provide advice on the correct action in this situation, which is
for the slave to replicate the missing transactions from another source, or for
the slave to be replaced by a new slave created from a more recent backup. The
message advises that the master's binary log expiration period can be revised to
avoid the situation in future. In addition, the master now identifies the GTIDs
of the purged transactions and supplies them in its error log in the warning
message ER_FOUND_MISSING_GTIDS (11809), so that you do not need to calculate the
missing GTIDs manually.
- With multiple sessions executing concurrent INSERT ... ON DUPLICATE KEY UPDATE
statements into a table with an AUTO_INCREMENT column but not specifying the
AUTO_INCREMENT value, inserts could fail with a unique index violation.
- A SELECT using a WHERE condition of the form A AND (B OR C [OR ...]) resulting
in an impossible range led to an unplanned exit of the server.
- An incomplete connection packet could cause clients not to properly initialize
the authentication plugin name.
Approved by: mmokhi (maintainer, implicit)
MFH: 2020Q1
Security: a6cf65ad-37d2-11ea-a1c7-b499baebfeaf
Sponsored by: Netzkommune GmbH |
5.6.46 02 Jan 2020 20:00:50
![Revision:521874 Revision:521874](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
joneum ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Update to latest release 5.6.46
Bugfix:
- Improper locking during storage engine initialization could cause a server
exit.
- A query with a WHERE clause whose predicate contained a numeric value in
scientific notation was not handled correctly.
- VS2019 produced compilation errors with debug compilation selected due to use
of the /ZI flag. Now /Z7 is used instead.
- For MySQL Community Edition, the cipher order specified by the client was
used in preference to the order on the server side, unless the server was confi
- Password masking was incomplete for SHOW PROCESSLIST and some
INFORMATION_SCHEMA and Performance Schema tables.
- The -DWITH_EXAMPLE_STORAGE_ENGINE=1 CMake option was ignored but should not
have been. If -DWITH_EXAMPLE_STORAGE_ENGINE=0 is given, the EXAMPLE storage e
More Info: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-46.html
Approved by: mmokhi (maintainer, implicit)
MFH: 2020Q1
Security: fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf
Sponsored by: Netzkommune GmbH |
5.6.45 09 Oct 2019 10:34:57
![Revision:514130 Revision:514130](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
bapt ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Drop the ipv6 virtual category for d* category as it is not relevant anymore |
5.6.45 13 Aug 2019 16:01:59
![Revision:508835 Revision:508835](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mat ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Convert to UCL & cleanup pkg-message (categories d) |
5.6.45 05 Aug 2019 23:21:26
![Revision:508218 Revision:508218](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysq56-{client, server}: Update to 5.6.45
This update includes security fixes which are
mentioned on upstream critical patch report.
Further info:
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html#AppendixMSQL
PR: 239571
Reported by: serg@tmn.ru
Sponsored by: Platform.sh |
5.6.44_2 02 Aug 2019 13:30:40
![Revision:507877 Revision:507877](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
jbeich ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
devel/libevent2: update to 2.1.11
Changes: https://github.com/libevent/libevent/releases/tag/release-2.1.11-stable
ABI: https://abi-laboratory.pro/tracker/timeline/libevent/
PR: 239599
Reported by: GitHub (watch releases)
Approved by: zeising (maintainer)
MFH: 2019Q3 (maybe security, partially restores 2.1.8 ABI)
Differential Revision: https://reviews.freebsd.org/D21133 |
5.6.44_1 26 Jul 2019 20:46:57
![Revision:507372 Revision:507372](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
gerald ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Bump PORTREVISION for ports depending on the canonical version of GCC
as defined in Mk/bsd.default-versions.mk which has moved from GCC 8.3
to GCC 9.1 under most circumstances now after revision 507371.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, everything INDEX-11 shows with a dependency on lang/gcc9 now.
PR: 238330 |
5.6.44 28 Apr 2019 21:24:35
![Revision:500372 Revision:500372](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Update to latest release 5.6.44
This update includes
Bugfix:
- InnoDB: The INDEX_LENGTH value in INFORMATION_SCHEMA.TABLES
was not updated when adding an index
- MySQL 5.6 did not build with maintainer mode enabled with GCC 7
- A damaged mysql.user table could cause a server exit
- mysqladmin shutdown did not wait for mysqld to shut down
More info: https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-44.html
Security Fix:
CVE-2019-1559, CVE-2018-3123 and other fixes.
More info:
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL<Paste>
PR: 237399
Reported by: Brent Busby <brent@jfi.uchicago.edu>
Sponsored by: The FreeBSD Foundation |
5.6.43 21 Jan 2019 20:28:04
![Revision:490894 Revision:490894](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Update to latest release 5.6.43
This update (released on Jan 21st) includes:
Bugfix:
-Correct the handling of quotes for identifiers in
ROLLBACK TO SAVEPOINT statements.
-Don't permit creation of dbs with same name as redo log file
(Bug #28867993).
-Use strncmp() instead of memcmp() for comparing logfile names
(prevent the uninitialized memory as result).
More info from upstream:
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-43.html
Sponsored by: The FreeBSD Foundation |
5.6.42_2 25 Dec 2018 20:25:40
![Revision:488341 Revision:488341](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
tcberner ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Change cmake default behaviour to outsource.
Ports that build out of source now simply can use "USES=cmake"
instead of "USES=cmake:outsource". Ports that fail to build
out of source now need to specify "USES=cmake:insource".
I tried to only set insource where explictely needed.
PR: 232038
Exp-run by: antoine |
5.6.42_2 22 Dec 2018 09:30:16
![Revision:488082 Revision:488082](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
amdmi3 ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
- Update WWW
Approved by: portmgr blanket |
5.6.42_2 12 Dec 2018 01:35:36
![Revision:487272 Revision:487272](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
gerald ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Bump PORTREVISION for ports depending on the canonical version of GCC
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.
PR: 231590 |
5.6.42_1 25 Nov 2018 16:27:55
![Revision:485867 Revision:485867](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Fix inconsistencies on texinfo and man files
After `usr/info` moved to `usr/share/info` and now that texinfo is not
in base on any of the supported version of FreeBSD, This makes the port
consistent.
Reported by: ohauer
Sponsored by: The FreeBSD Foundation |
5.6.42 28 Oct 2018 21:26:19
![Revision:483357 Revision:483357](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Upgrade to new release 5.6.42
Upstream Bug #27788907, Bug #90264 fixed
Bug Fixes:
Raised assertion during an OPTIMIZE TABLE operation for InnoDB: Bug
#27753193
For MEMORY tables, memory overflow errors could occur: Bug #27799513
Incorrectly handled very long table keys on replication slaves: Bug
#27930505
More info on update:
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-42.html
Sponsored by: The FreeBSD Foundation |
5.6.41_2 11 Oct 2018 19:50:57
![Revision:481848 Revision:481848](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix build with libressl after r481608
PR: 228899
Submitted by: Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Reported by: brnrd
Sponsored by: The FreeBSD Foundation |
5.6.41_1 09 Oct 2018 07:49:28
![Revision:481608 Revision:481608](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Fix build with OpenSSL1.1.x
This is the backport of fix on mysql57
PR: 225888
Reported by: brnrd
Reviewed by: antoine
Sponsored by: The FreeBSD Foundation |
5.6.41 10 Aug 2018 22:05:23
![Revision:476853 Revision:476853](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
mysql56-{client, server}: Update ports to 5.6.41
This update includes Oracle Critical Patch Advisory published on July 2018
More info:
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixMSQL
Sponsored by: The FreeBSD Foundation |
5.6.40_1 29 Jul 2018 22:18:46
![Revision:475857 Revision:475857](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
gerald ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Bump PORTREVISION for ports depending on the canonical version of GCC
in the ports tree (via Mk/bsd.default-versions.mk and lang/gcc) which
has now moved from GCC 6 to GCC 7 by default.
This includes ports
- featuring USE_GCC=yes or USE_GCC=any,
- featuring USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and those
- with USES=compiler specifying one of openmp, nestedfct, c11, c++0x,
c++11-lib, c++11-lang, c++14-lang, c++17-lang, or gcc-c++11-lib.
PR: 222542 |
5.6.40 07 May 2018 19:09:02
![Revision:469311 Revision:469311](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
brnrd ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix build with LibreSSL
PR: 227178
Approved by: mmokhi (maintainer) |
5.6.40 20 Apr 2018 10:41:38
![Revision:467818 Revision:467818](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Add missed distinfo for r467817 |
5.6.40 20 Apr 2018 10:36:36
![Revision:467817 Revision:467817](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
mysql56-{client, server}: Update port to 5.6.40
This update includes fixes for multiple CVEs including:
CVE-2018-2755 in replication component, MySQL protocol
CVE-2018-2805 in GIS extention
CVE-2018-2782 in InnoDB
and more info on
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html#AppendixMSQL |
5.6.39_3 11 Apr 2018 14:37:41
![Revision:467049 Revision:467049](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix ${name}_limits regression on 11-STABLE
The commit adding the ${name}_limits to 11 is reverted in r332363
Change the Makefile conditions/vars so that
new ${name}_limits mechanism is only present on 12-CURRENT (>=1200057)
PR: 227435
Reported by: 0mp |
5.6.39_2 04 Apr 2018 20:49:54
![Revision:466506 Revision:466506](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix (revert) the small change mistakenly went into the
commit r466505 |
5.6.39_2 04 Apr 2018 20:45:14
![Revision:466505 Revision:466505](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Adapt ${name}_limits to the new mechanism
Regarding to the changes to rc.subr(8) it is no longer necessary to
define a resource limiting logic in service scripts.
limits(1) is now run by default and its configuration is handled
via the "${name}_limits" variable.
This however causes collision of variable names and also is not
compatible with the old mechanism.
This fixes the rc-script of mysql56 for the bases with both
old and new mechanism.
PR: 227229
Submitted by: 0mp
Reported by: 0mp
Sponsored by: Netzkommune GmbH |
5.6.39_1 08 Feb 2018 12:42:42
![Revision:461217 Revision:461217](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix rc-script ${name}_limits conflict for post r328331
After r328331 changes in head/etc/rc.subr, having "NO" in mysql_limits
goes into "limits" command params as is.
So this patch substitutes the "NO" appropriately when needed.
PR: 225657
Reported by: robbak@gmail.com
Reviewed by: Rainer Hurling <rhurlin@gwdg.de>
Sponsored by: Netzkommune GmbH |
5.6.39 06 Feb 2018 13:09:41
![Revision:461040 Revision:461040](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix misleading part of pkg-message.
Part of the pkg-message points about .mysql_secret file which
isn't case about new mysql56 release anymore.
Delete no-more-valid part.
(The case still is a thing for 57 and 80)
PR: 225696
Reported by: knezour@weboutsourcing.cz
Sponsored by: Netzkommune GmbH |
5.6.39 17 Jan 2018 22:35:49
![Revision:459293 Revision:459293](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{client, server}: Update to 5.6.39
This update fixes bugs like CVE-2018-2696, CVE-2018-2562,
and CVE-2018-2583 in MySQL protocol by upstream
PR: 225240
Sponsored by: Netzkommune GmbH |
5.6.38_1 05 Jan 2018 10:54:41
![Revision:458124 Revision:458124](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
jbeich ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: unbreak build with Clang 6 (C++14 by default)
sql-common/client_authentication.cc:87:56: error: comparison between pointer and
integer ('char *' and 'int')
mysql->options.extension->server_public_key_path != '\0')
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ ~~~~
sql/sql_trigger.cc:195:5: error:
non-constant-expression cannot be narrowed from type 'int' to 'size_t'
(aka 'unsigned long') in
initializer list [-Wc++11-narrowing]
static_cast<int>(my_offsetof(class Table_triggers_list, definitions_list)),
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Reported by: antoine (via bug 224669) |
5.6.38 19 Oct 2017 14:08:07
![Revision:452423 Revision:452423](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.38 release. |
5.6.37_1 10 Oct 2017 21:31:30
![Revision:451721 Revision:451721](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
linimon ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
For ports that are explicitly enabled on armv6, also enable them
on armv7. This has not been tested with an -exp run but should
"do no harm".
PR: 221894 (partial) |
5.6.37_1 10 Sep 2017 20:55:39
![Revision:449591 Revision:449591](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
gerald ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Bump PORTREVISION for ports depending on the canonical version of GCC
(via Mk/bsd.default-versions.mk and lang/gcc) which has moved from
GCC 5.4 to GCC 6.4 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c++11-lib, c++11-lang,
c++14-lang, c++0x, c11, or gcc-c++11-lib.
PR: 219275 |
5.6.37 14 Aug 2017 05:37:21
![Revision:447926 Revision:447926](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
vd ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
MySQL ports: Extend CONFLICTS_INSTALL in conflicting ports.
databases/mysqlwsrep56-server has been present for some time and
databases/mysqlwsrep57-server has been added recently. Both ports
conflict with other MySQL server ports and this has been reflected
in databases/mysqlwsrep5[67]-server/Makefile but must also be
reflected in all conflicting ports' Makefiles as well.
The conflicting ports are:
databases/mariadb100-server
databases/mariadb101-server
databases/mariadb102-server
databases/mariadb55-server
databases/mysql55-server
databases/mysql56-server (Only the first 15 lines of the commit message are shown above ) |
5.6.37 18 Jul 2017 16:59:30
![Revision:446148 Revision:446148](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{server client}: Update to latest 5.6.37
This release contains
features:
* The mysql client now supports a --binary-as-hex option for
binary data (Bug #25340722, Bug #84391)
* mysqlaccess now looks for its configuration file only in the
SYSCONFDIR directory and /etc. (Bug #25043674)
And bugfixes:
* mysqld: failed to start the server if the --datadir option was specified
with a relative path name. (Bug #25364806)
* InnoDB: The server allocated memory unnecessarily for an operation that
rebuilt the table. (Bug #25573565, Bug #85043)
* mysqldump: could write database names in USE statements
incorrectly. (Bug #25998635)
Reviewed by: mat (mentor)
Approved by: mat (mentor)
Sponsored by: Netzkommune GmbH
Differential Revision: https://reviews.freebsd.org/D11638 |
5.6.36 25 Jun 2017 21:07:58
![Revision:444324 Revision:444324](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
tcberner ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Make ninja opt-out in cmake.mk
Using ninja instead of make (1) can lead to significant speed ups while
building.
Therefore switch from having the ninja generator opt-in to having it opt-out.
Previously cmake-ports that wanted to use ninja could set
CMAKE_NINJA=yes
now, ports that do not work with ninja can set
cmake:<existing args>,noninja
Note, that needing this should be an exception and most often points to a broken
cmake of the port.
The ports using cmake were modified
* removed USES=gmake, if ninja is used
* removed MAKE_ARGS, if ninja is used
* added the cmake-argument noninja if necessary
PR: 219629
PR: 213331
Exp-run by: antoine
Reviewed by: rakuco
Differential Revision: https://reviews.freebsd.org/D10748 |
5.6.36 17 Apr 2017 14:54:57
![Revision:438698 Revision:438698](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-{server client}: Update to latest 5.6.36
Also Delete patches that merged/fixed by upstream.
And fix some no-longer-valid (but needed) patches.
Reviewed by: feld, mat (mentors)
Approved by: feld (mentor)
Differential Revision: https://reviews.freebsd.org/D10392 |
5.6.35_7 01 Apr 2017 15:23:32
![Revision:437439 Revision:437439](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
gerald ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Bump PORTREVISIONs for ports depending on the canonical version of GCC and
lang/gcc which have moved from GCC 4.9.4 to GCC 5.4 (at least under some
circumstances such as versions of FreeBSD or platforms).
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using using Mk/bsd.octave.mk which in turn has USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c++11-lib, c++14-lang,
c++11-lang, c++0x, c11, or gcc-c++11-lib.
PR: 216707 |
5.6.35_6 01 Apr 2017 15:11:15
![Revision:437438 Revision:437438](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
bapt ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update libedit to 20170329 |
5.6.35_6 22 Feb 2017 17:25:22
![Revision:434623 Revision:434623](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql{56 57 80}:
Improve ${mysql_optfile} default usage in rc script.
Improve pkg-message.
Reviewed by: feld, mat
Approved by: feld, mat (mentors)
Differential Revision: https://reviews.freebsd.org/D9646 |
5.6.35_5 20 Feb 2017 02:57:04
![Revision:434427 Revision:434427](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
jbeich ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
devel/libevent2: drop historical suffix after r362796
PR: 216777
Approved by: mm (maintainer) |
5.6.35_4 11 Feb 2017 04:44:44
![Revision:433834 Revision:433834](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mmokhi ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Updating the ports I maintain to my FreeBSD.org address.
Submitted by: mmokhi
Reviewed by: feld, mat
Approved by: feld, mat (mentors)
Differential Revision: https://reviews.freebsd.org/D9498 |
5.6.35_4 04 Feb 2017 07:56:59
![Revision:433286 Revision:433286](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
jbeich ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
devel/libevent2: update to 2.1.8 and cleanup
- DEFAULT_VERSIONS += ssl=openssl-devel is now supported
- devel/py-event and devel/p5-Event-Lib are marked BROKEN
Changes: https://github.com/libevent/libevent/raw/release-2.1.8-stable/whatsnew-2.1.txt
Changes: https://github.com/libevent/libevent/raw/release-2.1.8-stable/ChangeLog
PR: 216527
Exp-run by: antoine
Approved by: mm (maintainer) |
5.6.35_3 25 Jan 2017 19:07:08
![Revision:432458 Revision:432458](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
brnrd ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix OpenSSL linking
- Force dynamic linking with OpenSSL
MFH: 2017Q1 |
5.6.35_2 21 Jan 2017 17:40:07
![Revision:432066 Revision:432066](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
antoine ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Revert r432035 part 2, it breaks build with openssl from base
With hat: portmgr |
5.6.35_2 21 Jan 2017 13:22:51
![Revision:432035 Revision:432035](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
brnrd ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Fix build with LibreSSL
- Fix CMake SSL detection
- Always set WITH_SSL=${OPENSSLBASE}
PR: 216311
Approved by: Mahdi Moktari <mokhi64@gmail.com> (maintainer)
Differential Revision: D9272 |
5.6.35_2 20 Jan 2017 18:21:49
![Revision:431975 Revision:431975](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
feld ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Do not install my.cnf sample
An issue was discovered where users of mysql did not have a my.cnf and
the recent update was causing mysqld to find a sample my.cnf and load
its parameters. This was causing errors on startup for users of innodb
as the parameters used to init the database did not match the ones in
the sample config file it was now reading. |
5.6.35_1 20 Jan 2017 16:02:30
![Revision:431968 Revision:431968](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
feld ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56-server: Rollback rc script changes |
5.6.35 19 Jan 2017 22:29:04
![Revision:431919 Revision:431919](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
feld ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql56: Update to 5.6.35
- Port improvements from MySQL 5.7 port
- Use system libs instead of bundled
- Fix many open PRs
- Change MAINTAINER
PR: 216244 192657 198812 199751 205093
PR: 209618 211248 205983 209338 |
5.6.34 21 Oct 2016 09:03:08
![Revision:424398 Revision:424398](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.34 release. |
5.6.33 16 Sep 2016 07:38:10
![Revision:422245 Revision:422245](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.33 release. |
5.6.32 31 Aug 2016 10:56:09
![Revision:421148 Revision:421148](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.32 release. |
5.6.30 21 Apr 2016 16:43:15
![Revision:413746 Revision:413746](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
swills ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
many ports: mark broken on powerpc64 |
5.6.30 19 Apr 2016 15:45:07
![Revision:413653 Revision:413653](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.30 release. |
5.6.27 18 Nov 2015 17:00:17
![Revision:401883 Revision:401883](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.27 release. |
5.6.26 08 Oct 2015 15:11:28
![Revision:398832 Revision:398832](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
olgeni ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Remove trailing whitespace from Makefiles, A-L. |
5.6.26 07 Sep 2015 11:16:17
![Revision:396260 Revision:396260](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
rakuco ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Switch to USES=libedit.
Instead of manually adding both a build- and a run-time dependency on
libedit from ports, use USES=libedit instead. Not only does it take care of
adding the proper dependency, but it also sets CMAKE_PREFIX_PATH to
${LOCALBASE} to make sure that the version in ports is preferred instead of
the one in base.
This is a dependency for moving to CMake 3.3.x, as starting with 3.3.0 calls
to find_library() will also look in the $PATH environment variable and end
up finding libedit from base by default (see bug 202516).
PR: 202618
Approved by: maintainer timeout (ale, 14 days) |
5.6.26 15 Aug 2015 08:17:44
![Revision:394287 Revision:394287](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.26 release. |
5.6.25 15 Jul 2015 13:49:05
![Revision:392140 Revision:392140](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.25 release. |
5.6.24 14 Jun 2015 21:33:02
![Revision:389659 Revision:389659](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
antoine ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Unbreak on head: instead of using headers from base libedit and
linking against readline, use libedit from ports
Note: this may need a bit more patching during next libedit port update
Reported by: pkg-fallout |
5.6.24 14 May 2015 10:15:09
![Revision:386312 Revision:386312](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mat ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.
While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.
Also, replace some EXTRACT_SUFX occurences with USES=tar:*.
Checked by: make fetch-urlall-list
With hat: portmgr
Sponsored by: Absolight |
5.6.24 26 Apr 2015 13:36:55
![Revision:384793 Revision:384793](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.24 release. |
5.6.23 04 Feb 2015 13:42:50
![Revision:378399 Revision:378399](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.23 release. |
5.6.22 01 Jan 2015 22:41:57
![Revision:376033 Revision:376033](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
sbruno ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
For ARMv6, declare FPSETMASK 0 and FEDISABLEEXCEPT 1. This allows mysql server
to
build on ARMv6.
No need to bump portrevision for everyone else here as this only affects ARM
users.
PR: 195750
Submitted by: mikael.urankar@gmail.com
Approved by: mentor (implicit) |
5.6.22 03 Dec 2014 09:40:03
![Revision:373805 Revision:373805](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.22 release. |
5.6.21 06 Nov 2014 11:05:27
![Revision:372220 Revision:372220](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update CONFLICTS.
PR: 194819
Submitted by: spil.oss@gmail.com |
5.6.21 24 Sep 2014 10:48:01
![Revision:369168 Revision:369168](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.21 release. |
5.6.20 04 Aug 2014 14:21:41
![Revision:364012 Revision:364012](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.20 release. |
5.6.19 01 Jul 2014 12:42:05
![Revision:359988 Revision:359988](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
bapt ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Revert accidental removal of USES=perl5 |
5.6.19 01 Jul 2014 12:22:06
![Revision:359981 Revision:359981](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
bapt ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Fix build with readline from ports |
5.6.19 03 Jun 2014 12:53:54
![Revision:356352 Revision:356352](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.19 release. |
5.6.17 31 Mar 2014 12:29:12
![Revision:349741 Revision:349741](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.17 release. |
5.6.16 01 Feb 2014 10:29:56
![Revision:342111 Revision:342111](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.16 release. |
5.6.15 17 Dec 2013 11:25:12
![Revision:336716 Revision:336716](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
ale ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to 5.6.15 release and stagify. |
5.6.14 08 Oct 2013 13:25:00
![Revision:329781 Revision:329781](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
tijl ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Fix mysql51/55/56 build with clang on i386.
The included yassl library contains inline asm (only for i386) using
intel syntax which clang does not support. For now, just disable the
inline asm when clang is used and use the standard C implementation like
on every other architecture.
Approved by: ale (maintainer) |
5.6.14 06 Oct 2013 10:25:41
![Revision:329549 Revision:329549](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
marino ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
databases/mysql5{5,6}-server: set shebangfix for perl
PR: ports/182071
Approved by: maintainer timeout |