From owner-freebsd-ports-bugs@FreeBSD.ORG Mon Jun 13 23:40:08 2011 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4A51E1065670 for ; Mon, 13 Jun 2011 23:40:08 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 220238FC19 for ; Mon, 13 Jun 2011 23:40:08 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id p5DNe7tF092972 for ; Mon, 13 Jun 2011 23:40:07 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id p5DNe7kD092971; Mon, 13 Jun 2011 23:40:07 GMT (envelope-from gnats) Resent-Date: Mon, 13 Jun 2011 23:40:07 GMT Resent-Message-Id: <201106132340.p5DNe7kD092971@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Ryan Steinmetz Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A84261065670 for ; Mon, 13 Jun 2011 23:32:10 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from red.freebsd.org (red.freebsd.org [IPv6:2001:4f8:fff6::22]) by mx1.freebsd.org (Postfix) with ESMTP id 985AA8FC0A for ; Mon, 13 Jun 2011 23:32:10 +0000 (UTC) Received: from red.freebsd.org (localhost [127.0.0.1]) by red.freebsd.org (8.14.4/8.14.4) with ESMTP id p5DNWAfZ021536 for ; Mon, 13 Jun 2011 23:32:10 GMT (envelope-from nobody@red.freebsd.org) Received: (from nobody@localhost) by red.freebsd.org (8.14.4/8.14.4/Submit) id p5DNWADS021535; Mon, 13 Jun 2011 23:32:10 GMT (envelope-from nobody) Message-Id: <201106132332.p5DNWADS021535@red.freebsd.org> Date: Mon, 13 Jun 2011 23:32:10 GMT From: Ryan Steinmetz To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.1 Cc: Subject: ports/157853: [update] security/stunnel to 4.36 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 13 Jun 2011 23:40:08 -0000 >Number: 157853 >Category: ports >Synopsis: [update] security/stunnel to 4.36 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Mon Jun 13 23:40:07 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Ryan Steinmetz >Release: 8.2-RELEASE >Organization: Rochester Institute of Technology >Environment: >Description: -Update to 4.36 -Use USERS/GROUPS -Make portlint(1) happy -Remove pkg-install -Rename files/patch-src::common.h to files/patch-src_common.h =================================== Version 4.36, 2011.05.03, urgency: LOW: * New features - Updated Win32 DLLs for OpenSSL 1.0.0d. - Dynamic memory management for strings manipulation: no more static STRLEN limit, lower stack footprint. - Strict public key comparison added for "verify = 3" certificate checking mode (thx to Philipp Hartwig). - Backlog parameter of listen(2) changed from 5 to SOMAXCONN: improved behavior on heavy load. - Example tools/stunnel.service file added for systemd service manager. * Bugfixes - Missing pthread_attr_destroy() added to fix memory leak (thx to Paul Allex and Peter Pentchev). - Fixed the incorrect way of setting FD_CLOEXEC flag. - Fixed --enable-libwrap option of ./configure script. - /opt/local added to OpenSSL search path for MacPorts compatibility. - Workaround implemented for signal handling on MacOS X. - A trivial bug fixed in the stunnel.init script. - Retry implemented on EAI_AGAIN error returned by resolver calls. >How-To-Repeat: >Fix: Patch attached with submission follows: Index: Makefile =================================================================== RCS file: /home/ncvs/ports/security/stunnel/Makefile,v retrieving revision 1.102 diff -u -r1.102 Makefile --- Makefile 10 Feb 2011 09:34:59 -0000 1.102 +++ Makefile 13 Jun 2011 23:27:43 -0000 @@ -6,7 +6,7 @@ # PORTNAME= stunnel -PORTVERSION= 4.35 +PORTVERSION= 4.36 CATEGORIES= security MASTER_SITES= ftp://ftp.stunnel.org/stunnel/%SUBDIR%/ \ http://mirrors.zerg.biz/stunnel/%SUBDIR%/ \ @@ -21,12 +21,16 @@ MAINTAINER= roam@FreeBSD.org COMMENT= SSL encryption wrapper for standard network daemons +USERS= ${PORTNAME} +GROUPS= ${USERS} + # FIXME: IMHO, there really ought to be a GPL-2+ option or some such. LICENSE= GPLv2 GPLv3 LICENSE_COMB= dual USE_AUTOTOOLS= libtool USE_RC_SUBR= stunnel +USE_LDCONFIG= yes GNU_CONFIGURE= yes CONFIGURE_ARGS= --localstatedir=/var/tmp \ @@ -74,12 +78,12 @@ .if defined(WITH_UCONTEXT) CONFIGURE_ARGS+=--with-threads=ucontext -CONFIGURE_ENV= CPPFLAGS="${CPPFLAGS} ${PTHREAD_CFLAGS}" LDFLAGS="${LDFLAGS} ${PTHREAD_LIBS}" +CONFIGURE_ENV= CPPFLAGS+="${CPPFLAGS} ${PTHREAD_CFLAGS}" LDFLAGS="${LDFLAGS} ${PTHREAD_LIBS}" .elif defined(WITH_FORK) CONFIGURE_ARGS+=--with-threads=fork -.else +.elif defined(WITH_PTHREAD) CONFIGURE_ARGS+=--with-threads=pthread -CONFIGURE_ENV= CPPFLAGS="${CPPFLAGS} ${PTHREAD_CFLAGS}" LDFLAGS="${LDFLAGS} ${PTHREAD_LIBS}" +CONFIGURE_ENV= CPPFLAGS+="${CPPFLAGS} ${PTHREAD_CFLAGS}" LDFLAGS="${LDFLAGS} ${PTHREAD_LIBS}" .endif post-patch: @@ -99,8 +103,6 @@ .endif post-install: - @${SETENV} PKG_PREFIX=${PREFIX} ${SH} \ - ${PKGINSTALL} ${PKGNAME} POST-INSTALL @${ECHO} "" @${ECHO} "**************************************************************************" @${ECHO} "To create and install a new certificate, type \"make cert\"" Index: distinfo =================================================================== RCS file: /home/ncvs/ports/security/stunnel/distinfo,v retrieving revision 1.57 diff -u -r1.57 distinfo --- distinfo 10 Feb 2011 09:34:59 -0000 1.57 +++ distinfo 13 Jun 2011 23:27:43 -0000 @@ -1,2 +1,2 @@ -SHA256 (stunnel-4.35.tar.gz) = a810e220498239483e14fae24eeb2a188a6167e9118958b903f8793768c4460f -SIZE (stunnel-4.35.tar.gz) = 541012 +SHA256 (stunnel-4.36.tar.gz) = 3483fc2011e8a9d2614a93a9dbf7eabf405044df3566f29144fe2d1dd37a35f5 +SIZE (stunnel-4.36.tar.gz) = 544614 Index: pkg-plist =================================================================== RCS file: /home/ncvs/ports/security/stunnel/pkg-plist,v retrieving revision 1.15 diff -u -r1.15 pkg-plist --- pkg-plist 26 Jan 2008 14:13:43 -0000 1.15 +++ pkg-plist 13 Jun 2011 23:27:43 -0000 @@ -14,6 +14,7 @@ %%PORTDOCS%%%%DOCSDIR%%/examples/script.sh %%PORTDOCS%%%%DOCSDIR%%/examples/stunnel.spec %%PORTDOCS%%%%DOCSDIR%%/examples/stunnel.init +%%PORTDOCS%%%%DOCSDIR%%/examples/stunnel.service %%PORTDOCS%%%%DOCSDIR%%/AUTHORS %%PORTDOCS%%%%DOCSDIR%%/BUGS %%PORTDOCS%%%%DOCSDIR%%/ChangeLog @@ -30,4 +31,5 @@ %%PORTDOCS%%@dirrm %%DOCSDIR%%/examples %%PORTDOCS%%@dirrm %%DOCSDIR%% @dirrm lib/stunnel -@unexec rmdir %D/etc/stunnel 2>/dev/null || echo "If you are permanently removing this port, you should do a ``rm -rf ${PKG_PREFIX}/etc/stunnel`` to remove any configuration files left." | fmt +@dirrmtry %%ETCDIR%% +@unexec if [ -d %D/%%ETCDIR%% ]; then echo "==> If you are permanently removing this port, you should do a ``rm -rf ${PKG_PREFIX}/etc/stunnel`` to remove any configuration files left."; fi >Release-Note: >Audit-Trail: >Unformatted: