aboutsummaryrefslogtreecommitdiff
path: root/security/linux-f10-libgcrypt
Commit message (Collapse)AuthorAgeFilesLines
* Put back empty dirs in plistAntoine Brodin2014-12-211-1/+2
| | | | Notes: svn path=/head/; revision=375174
* cleanup plistBaptiste Daroussin2014-12-201-1/+0
| | | | Notes: svn path=/head/; revision=375111
* Cleanup plistAntoine Brodin2014-11-131-1/+1
| | | | Notes: svn path=/head/; revision=372533
* Update CentOS base to 6.5, add userland portsJohannes Jost Meixner2014-09-221-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The Fedora 10 infrastructure ports have been in use since June 2009 and, while having served a great deed, have become unsupported upstream and hence affected by unfixed security vulnerabilities. In addition to that, many recent Linux binaries need newer libc / stdlibc++ versions. This commit adds the linux-c6- userland as drop-in replacement for the -f10 infrastructure, as well as upgrading the linux_base-c6 port to CentOS 6.5. If you want to switch to linux-c6 ports, please define at /etc/make.conf: OVERRIDE_LINUX_BASE_PORT=c6 OVERRIDE_LINUX_NONBASE_PORTS=c6 Additionally, please add the following line to /etc/sysctl.conf: compat.linux.osrelease=2.6.18 Upgrading procedures are shown in /usr/ports/UPDATING. This work has been inspired by Artyom Mirgorodskiy's post to emulation@ in November 2013, using and extending mav@'s work. It has been tested extensively and most reported issues were already fixed. Please report any additional bug or "features" to the emulation mailing list. Many thanks to: mav@, rene@, allanjude@, netchild@, antoine@, everyone who's filed Issues and Pull requests on GitHub, PR: 186820 Differential Revision: https://reviews.freebsd.org/D793 Reviewed by: allanjude, antoine, bapt, rene Approved by: portmgr (antoine, bapt) Approved by: koobs (mentor) Sponsored by: Perceivon Hosting Inc. Notes: svn path=/head/; revision=368845
* Remove FORBIDDEN that references vuxml. We already have vuxml, portauditBryan Drewery2014-09-201-2/+0
| | | | | | | | | | | | | | | and pkg audit to handle this. The user can make their own decision as to whether or not they want to use vulnerable ports or packages. Using FORBIDDEN like this is not proper. It should only be used in extreme cases. In the meantime, the new Linux ports are being tested and should arrive soon. With hat: portmgr Notes: svn path=/head/; revision=368642
* Mark vulnerable linux-f10 ports as forbidden (category s*)Rene Ladan2014-07-201-0/+2
| | | | | | | Approved by: portmgr (bapt) Notes: svn path=/head/; revision=362314
* Add staging support for linux-f10-* ports maintained by emulation@Rene Ladan2013-10-061-2/+1
| | | | | | | (category security). Notes: svn path=/head/; revision=329579
* Add NO_STAGE all over the place in preparation for the staging support (cat: ↵Baptiste Daroussin2013-09-201-4/+2
| | | | | | | security) Notes: svn path=/head/; revision=327769
* Add linux-f10-libgcrypt 1.4.4, general purpose crypto library based onBoris Samorodov2011-09-232-0/+32
code used in GnuPG. Changes over original shar file at the PR: . change the maintainer to emulation@ (since it's an infrastructure linux port); . use the latest version of the package (1.4.4-1.fc10); . use PLIST_FILES, PLIST_DIRSTRY and post-install target instead of pkg-plist. Notes: the port uses ${PREFIX}/etc/gcrypt directory for configuration files (i.e. /compat/linux/etc/gcrypt). We usually try to use FreeBSD directories. But there is no [/usr/local/]/etc/gcrypt directory. I'm open to ideas on what to do here. PR: ports/159007 Submitted by: Stas Timokhin <devel@stasyan.com> Notes: svn path=/head/; revision=282246