1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-25 04:43:33 +00:00
Commit Graph

552082 Commits

Author SHA1 Message Date
Tobias C. Berner
798f299a3f net/smb4k: update to 3.1.0 2021-07-15 07:47:23 +02:00
Tobias C. Berner
78a7ad63e1 devel/qca: update to 2.3.3 2021-07-15 07:18:02 +02:00
Tobias C. Berner
93dc98507f polish/kadu: add missing dependency on testlib
The port was previously getting that dependency transitively.
2021-07-15 07:03:25 +02:00
Santhosh Raju
711845c335 security/wolfssl: Updates to v4.8.0
Changes since v4.7.0:

wolfSSL Release 4.8.0 (July 09, 2021)

Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] OCSP request/response verification issue. In the case that the serial
    number in the OCSP request differs from the serial number in the OCSP
    response the error from the comparison was not resulting in a failed
    verification. We recommend users that have wolfSSL version 4.6.0 and 4.7.0
    with OCSP enabled update their version of wolfSSL. Version 4.5.0 and earlier
    are not affected by this report. Thanks to Rainer, Roee, Barak, Hila and
    Shoshi (from Cymotive and CARIAD) for the report.
  * [Low] CVE-2021-24116: Side-Channel cache look up vulnerability in base64 PEM
    decoding for versions of wolfSSL 4.5.0 and earlier. Versions 4.6.0 and up
    contain a fix and do not need to be updated for this report. If decoding a
    PEM format private key using version 4.5.0 and older of wolfSSL then we
    recommend updating the version of wolfSSL used. Thanks to Florian Sieck, Jan
    Wichelmann, Sebastian Berndt and Thomas Eisenbarth for the report.

New Feature Additions
New Product

  * Added wolfSentry build with --enable-wolfsentry and tie-ins to wolfSSL code
    for use with wolfSentry

Ports

  * QNX CAAM driver added, supporting ECC black keys, CMAC, BLOBs, and TRNG use
  * _WIN32_WCE wolfCrypt port added
  * INTIME_RTOS directory support added
  * Added support for STM32G0
  * Renesas RX: Added intrinsics for rot[rl], revl (thanks @rliebscher)
  * Added support for running wolfcrypt/test/testwolfcrypt on Dolphin emulator
    to test DEVKITPRO port
  * Zephyr project port updated to latest version 2.6.X

ASN1 and PKCS

  * Storing policy constraint extension from certificate added
  * Added support for NID_favouriteDrink pilot
  * Added the API function wc_EncryptPKCS8Key to handle encrypting a DER,
    PKCS#8-formatted key

Compatibility Layer Additions

  * Open Source PORTS Added/Updated
      * OpenVPN
      * OpenLDAP
      * socat-1.7.4.1
      * Updated QT port for 5.15.2
  * Changes to extend set_cipher_list() compatibility layer API to have
    set_ciphersuites compatibility layer API capability
  * Added more support for SHA3 in the EVP layer
  * API Added
     * MD5/MD5_Transform
     * SHA/SHA_Transform/SHA1_Transform
     * SHA224/SHA256_Transform/SHA512_Transform
     * SSL_CTX_get0_param/SSL_CTX_set1_param
     * X509_load_crl_file
     * SSL_CTX_get_min_proto_version
     * EVP_ENCODE_CTX_new
     * EVP_ENCODE_CTX_free
     * EVP_EncodeInit
     * EVP_EncodeUpdate
     * EVP_EncodeFinal
     * EVP_DecodeInit
     * EVP_DecodeUpdate
     * EVP_DecodeFinal
     * EVP_PKEY_print_public
     * BIO_tell
     * THREADID_current
     * THREADID_hash
     * SSL_CTX_set_ecdh_auto
     * RAND_set_rand_method()
     * X509_LOOKUP_ctrl()
     * RSA_bits
     * EC_curve_nist2nid
     * EC_KEY_set_group
     * SSL_SESSION_set_cipher
     * SSL_set_psk_use_session_callback
     * EVP_PKEY_param_check
     * DH_get0_pqg
     * CRYPTO_get_ex_new_index
     * SSL_SESSION_is_resumable
     * SSL_CONF_cmd
     * SSL_CONF_CTX_finish
     * SSL_CTX_keylog_cb_func
     * SSL_CTX_set_keylog_callback
     * SSL_CTX_get_keylog_callback

Misc.

  * Added wolfSSL_CTX_get_TicketEncCtx getter function to return the ticket
    encryption ctx value
  * Added wc_AesKeyWrap_ex and wc_AesKeyUnWrap_ex APIs to accept an Aes object
    to use for the AES operations
  * Added implementation of AES-GCM streaming (--enable-aesgcm-stream)
  * Added deterministic generation of k with ECC following RFC6979 when the
    macro WOLFSL_ECDSA_DETERMINISTIC_K is defined and wc_ecc_set_deterministic
    function is called
  * Implemented wc_DsaParamsDecode and wc_DsaKeyToParamsDer
  * Asynchronous support for TLS v1.3 TLSX ECC/DH key generation and key
    agreement
  * Added crypto callback support for Ed/Curve25519 and SHA2-512/384
  * TLS 1.3 OPwolfSSL_key_update_response function added to see if a update
    response is needed

Fixes

  * Fix for detecting extra unused bytes that are in an ASN1 sequence appended
    to the end of a valid ECC signature
  * Fix for keyid with ktri CMS (breaks compatibility with previous keyid ASN1
    syntax)
  * Fix for failed handshake if a client offers more than 150 cipher
    suites. Thanks to Marcel Maehren, Philipp Nieting, Robert Merget from Ruhr
    University Bochum Sven Hebrok, Juraj Somorovsky from Paderborn University
  * Fix for default order of deprecated elliptic curves SECP224R1, SECP192R1,
    SECP160R1. Thanks to Marcel Maehren, Philipp Nieting, Robert Merget from
    Ruhr University Bochum Sven Hebrok, Juraj Somorovsky from Paderborn
    University
  * Fix for corner TLS downgrade case where a TLS 1.3 setup that allows for
    downgrades but has TLS 1.3 set as the minimum version would still downgrade
    to TLS 1.2

PKCS7 (Multiple fixes throughout regarding memory leaks with SMIME and heap
buffer overflows due to streaming functionality)

  * Fix PKCS7 dynamic content save/restore in PKCS7_VerifySignedData
  * Fix for heap buffer overflow on compare with wc_PKCS7_DecryptKtri
  * Fix for heap buffer overflow with wc_PKCS7_VerifySignedData
  * Fix for heap buffer overflow with wc_PKCS7_DecodeEnvelopedData
  * Check size of public key used with certificate passed into
    wc_PKCS7_InitWithCert before XMEMCPY to avoid overflow
  * Fix for heap buffer overflow fix for wolfSSL_SMIME_read_PKCS7
  * Fix to cleanly free memory in error state with wolfSSL_SMIME_read_PKCS7
  * SMIME error checking improvements and canonicalize multi-part messages
    before hashing

DTLS Fixes

  * DTLS fix to correctly move the Tx sequence number forward
  * DTLS fix for sequence and epoch number with secure renegotiation cookie
    exchange
  * Fix for Chacha-Poly AEAD for DTLS 1.2 with secure renegotiation

PORT Fixes

  * Fix AES, aligned key for the HW module with DCP port
  * Fix ATECC608A TNGTLS certificate size issue (thanks @vppillai)
  * Fixes for mingw compile warnings
  * Fixes for NXP LTC ECC/RSA
  * Fix ESP32 RSA hw accelerator initialization issue
  * Fixes for STM32 PKA with ECC
  * Fixes for STM32 AES GCM for HAL's that support byte sized headers
  * Espressif ESP32 SHA_CTX macro conflict resolved

Math Library Fixes

  * For platforms that support limits.h or windows make sure both
    SIZEOF_LONG_LONG and SIZEOF_LONG are set to avoid issues with CTC_SETTINGS
  * SP C 32/64: fix corner cases around subtraction affecting RSA PSS use
  * Fix to return the error code from sp_cond_swap_ct when malloc fails
  * Fix potential memory leak with small stack in the function fp_gcd
  * Static Analysis Fixes
  * Fixes made from Coverity analysis including:
  * Cleanups for some return values,
  * Fix for leak with wolfSSL_a2i_ASN1_INTEGER
  * Sanity check on length in wolfSSL_BN_rand
  * Sanity check size in TLSX_Parse catching a possible integer overflow
  * Fixes found with -fsanitize=undefined testing
  * Fix null dereferences or undefined memcpy calls
  * Fix alignment in myCryptoDevCb
  * Fix default DTLS context assignment
  * Added align configure option to force data alignment

Misc.

  * Fix for wolfSSL_ASN1_TIME_adj set length
  * Fix for freeing structure on error case in the function AddTrustedPeer
  * Return value of SSL_read when called after bidirectional shutdown
  * Fix for build options ./configure --enable-dtls --disable-asn
  * FIx for detection of a salt length from an RSA PSS signature
  * Fix to free up globalRNGMutex mutex when cleaning up global RNG
  * Fix leak when multiple hardware names are in SAN
  * Fix nonblocking ret value from CRL I/O callbacks
  * Fix wolfSSL_BIO_free_all return type to better match for compatibility layer
  * Fix for make distcheck, maintainer-clean, to allow distribution builds
  * Fix for async with fragmented packets
  * Fix for the build or RSA verify or public only
  * Fix for return value of wolfSSL_BIO_set_ssl to better match expected
    compatibility layer return value
  * Fix for sanity checks on size of issuer hash and key along with better
    freeing on error cases with DecodeBasicOcspResponse
  * Fix for potential memory leak with wolfSSL_OCSP_cert_to_id

Improvements/Optimizations
DTLS/TLS Code Base

  * Improved TLS v1.3 time rollover support
  * TLS 1.3 PSK: use the hash algorithm to choose cipher suite
  * TLS Extended Master Secret ext: TLS13 - send in second Client Hello if in
    first
  * TLS Encrypt then MAC: check all padding bytes are the same value
  * wolfSSL_GetMaxRecordSize updated to now take additional cipher data into
    account
  * Updated session export/import with DTLS to handle a new internal options
    flag
  * Refactored dtls_expected_peer_handshake_number handling
  * Added wolfSSL_CTX_get_ephemeral_key and wolfSSL_get_ephemeral_key for
    loading a constant key in place of an ephemeral one
  * Improved checking of XSNPRINTF return value in DecodePolicyOID

Build Options and Warnings

  * Added wolfSSL_CTX_set_verify to the ABI list
  * Adjusted FP_ECC build to not allow SECP160R1, SECP160R2, SECP160K1 and
    SECP224K1. FP_ECC does not work with scalars that are the length of the
    order when the order is longer than the prime.
  * Added CMake support for CURVE25519, ED25519, CURVE448, and ED448
  * cmake addition to test paths when building
  * Added support for session tickets in CMake
  * Added support for reproducible builds with CMake
  * Turn on reproducible-build by default when enable-distro
  * Windows Project: Include the X448 and Ed448 files
  * GCC-11 compile time warning fixes
  * Fix for compiling build of ./configure '--disable-tlsv12'
    '-enable-pkcallbacks'
  * Added build error for insecure build combination of secure renegotiation
    enabled with extended master secret disabled when session resumption is
    enabled
  * Updated building and running with Apple M1
  * Apache httpd build without TLS 1.3 macro guard added
  * Enable SHA3 and SHAKE256 requirements automatically when ED448 is enabled
  * Added option for AES CBC cipher routines to return BAD_LENGTH_E when called
    with an input buffer length not a multiple of AES_BLOCK_SIZE
  * Macro WOLFSSL_SP_INT_DIGIT_ALIGN added for alignment on buffers with SP
    build. This was needed for compiler building on a Renesas board.
  * Build support with no hashes enabled an no RNG compiled in
  * Allow use of FREESCALE hardware RNG without a specific port
  * Resolved some warnings with Windows builds and PBKDF disabled
  * Updated the version of autoconf and automake along with fixes for some new
    GCC-10 warnings

Math Libraries

  * SP: Thumb implementation that works with clang
  * SP math all: sp_cmp handling of negative values
  * SP C ECC: mont sub - always normalize after sub before check for add
  * TFM math library prime checking, added more error checks with small stack
    build
  * Sanity checks on 0 value with GCD math function
  * fp_exptmod_ct error checking and small stack variable free on error
  * Sanity check on supported digit size when calling mp_add_d in non fastmath
    builds
  * Support for mp_dump with SP Math ALL
  * WOLFSSL_SP_NO_MALLOC for both the normal SP build and small SP build now
  * WOLFSSL_SP_NO_DYN_STACK added for SP small code that is not small stack
    build to avoid dynamic stack

PKCS 7/8

  * wc_PKCS7_DecodeCompressedData to optionally handle a packet without content
    wrapping
  * Added setting of content type parsed with PKCS7
    wc_PKCS7_DecodeAuthEnvelopedData and wc_PKCS7_DecodeEnvelopedData
  * PKCS8 code improvements and refactoring

Misc.

  * Sanity checks on null inputs to the functions wolfSSL_X509_get_serialNumber
    and wolfSSL_X509_NAME_print_ex
  * Added ARM CryptoCell support for importing public key with
    wc_ecc_import_x963_ex()
  * Improved checking for possible use of key->dp == NULL cases with ECC
    functions
  * Updated SHAKE256 to compile with NIST FIPS 202 standard and added support
    for OID values (thanks to strongX509)
  * Improved ECC operations when using WOLFSSL_NO_MALLOC
  * Added WOLFSSL_SNIFFER_FATAL_ERROR for an return value when sniffer is in a
    fatal state
  * Allow parsing spaces in Base64_SkipNewline
  * Issue callback when exceeding depth limit rather than error out with
    OPENSSL_EXTRA build
  * Added NXP LTC RSA key generation acceleration

For additional vulnerability information visit the vulnerability page at
https://www.wolfssl.com/docs/security-vulnerabilities/

See INSTALL file for build instructions.
More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html
2021-07-15 10:10:40 +05:30
Jan Beich
e6ad409116 graphics/mesa-devel: update to 21.2.b.24
Changes:	24d2459b02...f144d91496
2021-07-15 00:43:23 +00:00
Jan Beich
f4a92fd475 x11-wm/river: update to s20210714
Changes:	7b18b49...3c951fe
2021-07-15 00:39:25 +00:00
Jan Beich
46434e2a1c emulators/yuzu: update to s20210713
Changes:	776f391ff...f2599534f
2021-07-15 00:39:24 +00:00
Jan Beich
6da3a726ac emulators/citra: update to s20210711
Changes:	afed4953b...62236b725
2021-07-15 00:39:24 +00:00
Jan Beich
ac5be9c59f emulators/rpcs3: update to 0.0.17.12457
Changes:	6a7324ab3...15ae06a7c
2021-07-15 00:39:24 +00:00
Lewis Cook
01e55cce1e
devel/revive: Update to 1.0.9
Changes:	https://github.com/mgechev/revive/releases/tag/v1.0.9
2021-07-15 01:30:19 +01:00
Lewis Cook
a10410d030
sysutils/dua-cli: Update to 2.14.2
Changes:	https://github.com/Byron/dua-cli/blob/v2.14.2/CHANGELOG.md
2021-07-15 00:01:12 +01:00
Romain Tartière
844ff65d25 sysutils/rubygem-r10k: Unbreak
The update of rubygem-cri in d4de7a6440
make the dependency unmet, leading to execution error.

With hat:	puppet
2021-07-14 11:42:05 -10:00
Jan Beich
623b1d058a x11/swayr: update to 0.6.0
Changes:	https://git.sr.ht/~tsdh/swayr/log/v0.6.0
Reported by:	/r/swaywm
2021-07-14 21:12:08 +00:00
Jan Beich
aca5d3ec9b graphics/vapoursynth-fmtconv: update to r23
Changes:	https://github.com/EleonoreMizo/fmtconv/releases/tag/r23
Reported by:	GitHub (watch releases)
2021-07-14 21:12:07 +00:00
Dmitry Marakasov
2d2c2821bc lang/python{38,39,310}: mark DEBUG option BROKEN (incorrect plist)
PR:		256558
Approved by:	portmgr blanket
2021-07-14 23:28:01 +03:00
Eric Turgeon
cdc4c22dfc editors/sublime-text4: fix distname for aarch64 2021-07-14 17:19:47 -03:00
Dmitry Marakasov
930c931292 lang/python310: add python 3.10.0.beta4
PR:		256150
Approved by:	maintainer timeout (python@, 1 month)
Differential Revision:	https://reviews.freebsd.org/D30475
2021-07-14 23:14:55 +03:00
Bryan Drewery
d75b45371e ports-mgmt/poudriere-devel: Update to 3.3.0-744-g0bf7bd31e
Changes:
 - PACKAGE_FETCH: Don't fetch packages that are not queued.
 - bulk: Store (pkg note) and show top level ports git info as well
 - image: various fixes
2021-07-14 13:10:03 -07:00
Eric Turgeon
afaa609e41 editors/sublime-text4: update arm64 and sum for arm64 2021-07-14 17:04:49 -03:00
Emmanuel Vadot
a92d150593 u-boot-*: Remove U_BOOT_SLAVE_PORTREVISION_2021.04
This is not needed anymore as we have 2921.07 now.
2021-07-14 21:24:43 +02:00
Emmanuel Vadot
6192585487 sysutils/u-boot-rpi2: Add CONFIG_EFI_GRUB_ARM32_WORKAROUND
We need this config to flush the caches, it was added to the generic
FreeBSD_Fragment but this ports uses a dedicated fragment to add it
there too.
While here remove CONFIG_API and CONFIG_CMD_CACHE as those aren't usefull
for EFI boot flow.
2021-07-14 21:24:42 +02:00
Dmitry Marakasov
7f1bab7e19 lang/python*: sort pkg-plists
Sort pkg-plists to reduce diff between existing and future versions
of python.

Approved by:	portmgr blanket (cosmetic change)
2021-07-14 21:56:31 +03:00
Charlie Li
2cecad791c
sysutils/azure-agent: reroll distfile
Upstream re-tagged the release to include a merge commit [0] that
fixes merge conflicts. No file or functionality change.

[0] 4d10db6979

Approved by: tcberner (mentor), whu (maintainer, implicit)
Differential Revision: https://reviews.freebsd.org/D31173
2021-07-14 14:36:43 -04:00
Tobias C. Berner
865054bda6 databases/libiodbc: update to 3.52.15
*  Added support for macOS Big Sur (11.x) on Apple Silicon using a universal build
  *  Fixed title to show CPU architecture used
  *  Fixed length of error message buffer
  *  Removed support for Mac OS X Snow Leopard (10.6) and older
  *  Removed deprecated iODBCcfmbridge for PPC
  *  Upgraded iODBC build to use recent versions of Xcode
      *  Minimum Xcode version is set to Xcode 8.0
      *  Minimum macOS deployment target is OS X Mavericks (10.9)
      *  Migrated dialogs and plist files
      *  Migrated translation support
2021-07-14 20:18:13 +02:00
Bryan Drewery
481cf80cb4 Mk/bsd.ccache.mk: Fix Poudriere CCACHE_STATIC_PREFIX feature.
Poudriere's CCACHE_STATIC_PREFIX feature (not Mk/) avoids installing
ccache for each port using the native jail ABI and instead copies in a
host static binary.  It uses NO_CCACHE_DEPEND to avoid installing
ccache.  For example, this is used for ccache-memcached where the
dependency chain would make using ccache unfeasible.

Poudriere sets CCACHE_WRAPPER_PATH, rather than the new CCACHE_PKG_PREFIX.
Because CCACHE_BIN is now computed from CCACHE_PKG_PREFIX rather than
CCACHE_WRAPPER_PATH, CCACHE_BIN was incorrect.  Now compute
CCACHE_PKG_PREFIX from CCACHE_WRAPPER_PATH if it is set, otherwise
fallback to using LOCALBASE and computing CCACHE_BIN and
CCACHE_WRAPPER_PATH from there.

PR	257151
Fixes:	6b641f4eb4 ("Mk: Document and simply user-modifiable ...")
2021-07-14 11:09:37 -07:00
Bryan Drewery
9984bd302c Mk/bsd.ccache.mk: Add more documentation.
PR:	242944
2021-07-14 11:09:37 -07:00
Tobias C. Berner
8df180da33 devel/libphonenumber: update to 8.12.27 2021-07-14 20:05:25 +02:00
Dmitry Marakasov
f27b55311a security/u2f-devd: add USB ID for HyperFIDO Pro Mini
PR:		256845
Submitted by:	zarychtam@plan-b.pwste.edu.pl
2021-07-14 20:37:31 +03:00
Dmitry Marakasov
b864f8b8ca devel/py-types-protobuf: update to 3.17.1, add missing dependency 2021-07-14 20:37:31 +03:00
Dmitry Marakasov
9ace518d53 devel/py-types-futures: add port
This is an auto-generated PEP 561 type stub package for futures
package. It can be used by type-checking tools like mypy, PyCharm,
pytype etc. to check code that uses futures.

WWW: https://pypi.org/project/types-futures/
2021-07-14 20:37:30 +03:00
Bernard Spil
16c495c503 www/nextcloud-calendar: Update to 2.3.1 2021-07-14 17:38:22 +00:00
Po-Chuan Hsieh
3c0ce2a8ee
Mk/bsd.ruby.mk: Clean up undefined/unused DEPEND_RUBY_RDOC 2021-07-15 01:29:34 +08:00
Po-Chuan Hsieh
facecb6d3a
security/rubygem-omniauth1: Add rubygem-omniauth1 1.9.1 (copied from rubygem-omniauth)
- Add PORTSCOUT
2021-07-15 01:28:41 +08:00
Po-Chuan Hsieh
743e73b183
security/vuxml: Document ruby vulnerability 2021-07-15 01:26:34 +08:00
Olivier Duchateau
b15e82614d x11-toolkits/granite: Update to 6.1.0
PR:		257186
2021-07-14 19:19:19 +02:00
Olivier Duchateau
c7cc060b5d sysutils/contractor: update to 0.3.5
- Update to 0.3.5
- Take maintainership
- Add patch to avoid warning during build stage

PR:		257185
2021-07-14 19:19:18 +02:00
Po-Chuan Hsieh
57fa369f77
security/ca_root_nss: Update distinfo
I erroneously got the tarball packaed by jbeich@ for nss.

Reported by:	tcberner
Reference:	https://cgit.freebsd.org/ports/commit/?id=0743b1f6b868fb0926d053469250d9479c86ba4e
2021-07-15 01:15:44 +08:00
Dan Langille
bb1a9d70e5 net-mgmt/icingaweb2-module-x509: New port: Automates certificate monitoring
The certificate monitoring module for Icinga keeps track of
certificates as they are deployed in a network environment. It does
this by scanning networks for TLS services and collects whatever
certificates it finds along the way. The certificates are verified using
its own trust store.
PR:		257163
Reported by:	gettoknowmi <gettoknowmi@yahoo.com>
2021-07-14 16:39:47 +00:00
Tobias C. Berner
e43f383e1f deskutils/syncthingtray: add missing build dependency on testlib
The dependency was previously pulled in transitively.

PR:	257100
2021-07-14 18:36:40 +02:00
Po-Chuan Hsieh
fcb34faf70
Mk/Scripts/smart_makepatch.sh: Force diff to produce the patch file instead of "Binary files ... differ" message
It helps avoid generating wrong patches, e.g. patch-grpc.gemspec in r567838 [1].

from diff manpage:
    -a --text
        Treat all files as ASCII text.  Normally diff will simply print
	"Binary files ... differ" if files contain binary characters.
        Use of this option forces diff to produce a diff.

[1] https://cgit.FreeBSD.org/ports/diff/net/rubygem-grpc130/files/patch-grpc.gemspec?id=073c1c710a0c7254820adab9920c1903ace83fae

PR:		257027
Approved by:	mat (portmgr)
2021-07-15 00:15:03 +08:00
Po-Chuan Hsieh
edc51a75bf
x11-toolkits/gtk40: Fix PLIST
===> Checking for items in STAGEDIR missing from pkg-plist
Error: Orphaned: @dir lib/gtk-4.0/%%GTK4_VERSION%%/engines
Error: Orphaned: @dir lib/gtk-4.0/%%GTK4_VERSION%%/loaders
Error: Orphaned: @dir lib/gtk-4.0/%%GTK4_VERSION%%/modules
===> Checking for items in pkg-plist which are not in STAGEDIR
===> Error: Plist issues found.
*** Error code 1

Approved by:	portmgr (blanket)
2021-07-15 00:11:05 +08:00
Po-Chuan Hsieh
a9d6d97a7f
textproc/py-python-augeas: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:05 +08:00
Po-Chuan Hsieh
37d860268d
textproc/py-et_xmlfile: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:04 +08:00
Po-Chuan Hsieh
4a1d4df6e2
devel/py-repoze.sphinx.autointerface: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:04 +08:00
Po-Chuan Hsieh
5f65031c4b
devel/py-parsedatetime: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:03 +08:00
Po-Chuan Hsieh
621c503d2b
devel/autoconf-wrapper: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:03 +08:00
Po-Chuan Hsieh
6f9ae77c1b
devel/autoconf-archive: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:02 +08:00
Po-Chuan Hsieh
7bd202f657
audio/mixxx: Fix build with scons 4.1.0.post1 2021-07-15 00:11:02 +08:00
Po-Chuan Hsieh
73cafe12f8
astro/py-astropy-helpers: Add NO_ARCH
Approved by:	portmgr (blanket)
2021-07-15 00:11:01 +08:00
Po-Chuan Hsieh
2f755c7a5e
www/gitlab-ce: Change RUN_DEPENDS from rubygem-omniauth to rubygem-omniauth1
- Bump PORTREVISION for dependency change
2021-07-15 00:11:01 +08:00