NEW: x11/qt6/qtgraphs

2024-06-01 Thread Rafael Sadowski
During the porting of pyside6 I realized that we are missing a Qt6
module.


If we can trust archlinux packages (we shouldn't) there should be no
consumers:

https://archlinux.org/packages/extra/x86_64/qt6-graphs/

However, OK to import?

Information for inst:qt6-qtgraphs-6.6.3

Comment:
Qt6 module to visualize data in 2D and 3D graphs

Required by:
debug-qt6-qtgraphs-6.6.3

Description:
The Qt Graphs module enables you to visualize data in 2D and 3D graphs. In the
3D realm there is support for bar, scatter, and surface graphs. It's especially
useful for visualizing depth maps and large quantities of rapidly changing
data, such as data received from multiple sensors. The look and feel of graphs
can be customized by using themes or by adding custom items and labels.

Maintainer: Rafael Sadowski 

WWW: https://www.qt.io/




qtgraphs.tar.gz
Description: application/tar-gz


NEW: x11/kde-plasma/plasma-integration

2024-06-01 Thread Rafael Sadowski
I have found out that "systemsettings" complains with:

kf.kirigami.platform: Failed to find a Kirigami platform plugin for
style ""

That's because it misses x11/kde-plasma/plasma-integration.

OK to import plasma-integration?

Information for inst:plasma-integration-6.0.5

Comment:
Plasma Platform Theme integration plugins

Required by:
debug-plasma-integration-6.0.5

Description:
Qt Platform Theme integration plugins for the Plasma workspaces

Maintainer: Rafael Sadowski 




plasma-integration-6.0.5.tar.gz
Description: application/tar-gz


Re: security/pinentry picks up KF6WindowSystem if present

2024-06-01 Thread Rafael Sadowski
On Fri May 31, 2024 at 08:19:25PM GMT, Stuart Henderson wrote:
> security/pinentry qt6 build picks up KF6WindowSystem if present. There's
> no autoconf cache so if we want to prevent it being picked up we'll need
> to patch configure. Any opinions whether we'd be better off to prevent
> it from being found or whether we should add the dep?
> 
> checking for KF6WindowSystem >= 5.240... yes
> 
> As you'd expect, found by dpb junking:
> 
> main.cpp:76:10: fatal error: 'KWindowSystem' file not found
> #include 
> 
> 

I don't have a strong opinion on this.

I see FreeBSD add devel/kf6/kguiaddons and devel/kf6/kwindowsyste as
dependency:

https://github.com/freebsd/freebsd-ports/blob/main/security/pinentry/Makefile#L129C1-L129C32



aarch64 bulk build report

2024-06-01 Thread phessler
bulk build on arm64.ports.openbsd.org
started on  Wed May 29 03:42:29 MDT 2024
finished at Sat Jun 1 02:53:01 MDT 2024
lasted 2D23h10m
done with kern.version=OpenBSD 7.5-current (GENERIC.MP) #50: Tue May 28 
16:29:12 MDT 2024

built packages:12303
May 29:3586
May 30:681
May 31:4597
Jun 1:3438


critical path missing pkgs:  
http://build-failures.rhaalovely.net/aarch64/2024-05-29/summary.log

build failures: 8
http://build-failures.rhaalovely.net/aarch64/2024-05-29/databases/tdb,.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/devel/kf5/purpose.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/editors/neovim-qt.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/emulators/dolphin,-main.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/lang/algol68g.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/plan9/plan9port.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/textproc/libxml,no_python.log
http://build-failures.rhaalovely.net/aarch64/2024-05-29/x11/kde-plasma/systemsettings.log

recurrent failures
 failures/emulators/dolphin,-main.log
 failures/lang/algol68g.log
 failures/plan9/plan9port.log
new failures
+++ ls-failures Sat Jun  1 02:53:13 2024
+failures/databases/tdb,.log
+failures/devel/kf5/purpose.log
+failures/editors/neovim-qt.log
+failures/textproc/libxml,no_python.log
+failures/x11/kde-plasma/systemsettings.log
resolved failures
--- ../old/aarch64/last//ls-failuresTue May 28 12:16:27 2024
-failures/graphics/gimp/snapshot.log



NEW: security/xhash v3.4.0

2024-06-01 Thread Ricardo Branco
 From 5f5250daf773dbfd94c0d380a04916baa4b7dbf7 Mon Sep 17 00:00:00 2001
From: Ricardo Branco 
Date: Sat, 1 Jun 2024 11:37:05 +0200
Subject: [PATCH] Add security/xhash

---
 security/xhash/Makefile| 23 +
 security/xhash/distinfo| 42 ++
 security/xhash/modules.inc | 12 +++
 security/xhash/pkg/DESCR   |  1 +
 security/xhash/pkg/PLIST   |  1 +
 5 files changed, 79 insertions(+)
 create mode 100644 security/xhash/Makefile
 create mode 100644 security/xhash/distinfo
 create mode 100644 security/xhash/modules.inc
 create mode 100644 security/xhash/pkg/DESCR
 create mode 100644 security/xhash/pkg/PLIST

diff --git a/security/xhash/Makefile b/security/xhash/Makefile
new file mode 100644
index 000..04eecbc90b6
--- /dev/null
+++ b/security/xhash/Makefile
@@ -0,0 +1,23 @@
+COMMENT =	faster hashing using goroutines
+
+V =		3.4.0
+MODGO_MODNAME =	github.com/ricardobranco777/xhash
+MODGO_VERSION =	v0.0.0-20240601062954-9bdefd997316
+DISTNAME =	xhash-${V}
+
+CATEGORIES =	security
+
+HOMEPAGE =	https://github.com/ricardobranco777/xhash
+MAINTAINER =	Ricardo Branco 
+
+# MIT
+PERMIT_PACKAGE =	Yes
+
+WANTLIB += c pthread
+
+MODULES =	lang/go
+NO_TEST =	Yes
+
+.include "modules.inc"
+
+.include 
diff --git a/security/xhash/distinfo b/security/xhash/distinfo
new file mode 100644
index 000..e2ee9373160
--- /dev/null
+++ b/security/xhash/distinfo
@@ -0,0 +1,42 @@
+SHA256 (go_modules/github.com/klauspost/cpuid/v2/@v/v2.0.12.mod) = aad6HA2aaPIerFlR+f5BQTBpl6go38ofHEjJU/0WVuE=
+SHA256 (go_modules/github.com/klauspost/cpuid/v2/@v/v2.0.12.zip) = 1VhNbmOFUTFEAwjnH5HsVNORpQ6WU/bAmjnRVhDg0Lw=
+SHA256 (go_modules/github.com/spf13/pflag/@v/v1.0.5.mod) = FsbfwOtY6zyRE84ZfUYMZyXGR+RoisJtMcjtafHrvGg=
+SHA256 (go_modules/github.com/spf13/pflag/@v/v1.0.5.zip) = /G5wTy9qhN3Nzm3gQE5TQPogyGdhgb9dOBsXiIEHuoQ=
+SHA256 (go_modules/github.com/zeebo/assert/@v/v1.1.0.mod) = y4zqaey8mWkq8h1EkJCD9Nli6V3Lety1/QZ2t3NYfpw=
+SHA256 (go_modules/github.com/zeebo/assert/@v/v1.1.0.zip) = FHldieHZk3urnj1tVN83qHD7cO+3TYvB4avGdt6KMqM=
+SHA256 (go_modules/github.com/zeebo/blake3/@v/v0.2.3.mod) = U4lEqKspe/im9yQErQlPglA7YcJ5DONA+adJDgKpYOM=
+SHA256 (go_modules/github.com/zeebo/blake3/@v/v0.2.3.zip) = FQw0Na+vMmGG1s/dmhHXb0uQLFiHUvH3OTtDZzObjXw=
+SHA256 (go_modules/github.com/zeebo/pcg/@v/v1.0.1.mod) = TVuz/sdIXlTBx9kRkJGq3dBx+fSolptsgqWI9MjggXk=
+SHA256 (go_modules/github.com/zeebo/pcg/@v/v1.0.1.zip) = Of8Gm56x/W+e3ROLEjOKGwp2H0ewVE9BSNPSfddMUsA=
+SHA256 (go_modules/golang.org/x/crypto/@v/v0.23.0.mod) = i77G1cwXKvJKSSTQVmVXoqZctKzKzBGb3r7yti5IGCU=
+SHA256 (go_modules/golang.org/x/crypto/@v/v0.23.0.zip) = ZdIrn1Su9ffwZJANLs+NiyMXKa68RsO3ylb/iX+3C1c=
+SHA256 (go_modules/golang.org/x/net/@v/v0.21.0.mod) = Du8+n+f2aL5bTSTI8SUcbFAtEWiVPICBrJ3D85nGTwY=
+SHA256 (go_modules/golang.org/x/net/@v/v0.21.0.zip) = Tpy0ve0ZV+c/5wl0HCmHnqsFBHYXybFLcjcxT/kCSRM=
+SHA256 (go_modules/golang.org/x/sys/@v/v0.20.0.mod) = 0iezJfYh9OvijTm6dz6pm4cPOTt8CcNFksNlsW3VYN4=
+SHA256 (go_modules/golang.org/x/sys/@v/v0.20.0.zip) = P4JrGR6rHr2pJf61UdM0434bWGXRqnkPreRlmIEaixo=
+SHA256 (go_modules/golang.org/x/term/@v/v0.20.0.mod) = popv0up5oDshapIJPgQ6AnvvRuJ19M4MpNIh3f0kTwE=
+SHA256 (go_modules/golang.org/x/term/@v/v0.20.0.zip) = hA6swP+zBty0sPW/bgcckdLnlX/MYE7sTnPA/CLykgw=
+SHA256 (go_modules/golang.org/x/text/@v/v0.15.0.mod) = lxV58X6avFkmq3YhT1M71RfPSSXIhSQ6xHVaGgp8ae8=
+SHA256 (go_modules/golang.org/x/text/@v/v0.15.0.zip) = E/rufkbIoYyKKPPs7r8V221yS5oQjDwEgqbS5YunOnM=
+SHA256 (xhash-3.4.0.zip) = fS7K/fLSrZI/yeiBVgs83gODPYM6SgWs7n3tT+ITr8w=
+SIZE (go_modules/github.com/klauspost/cpuid/v2/@v/v2.0.12.mod) = 46
+SIZE (go_modules/github.com/klauspost/cpuid/v2/@v/v2.0.12.zip) = 352606
+SIZE (go_modules/github.com/spf13/pflag/@v/v1.0.5.mod) = 39
+SIZE (go_modules/github.com/spf13/pflag/@v/v1.0.5.zip) = 88931
+SIZE (go_modules/github.com/zeebo/assert/@v/v1.1.0.mod) = 40
+SIZE (go_modules/github.com/zeebo/assert/@v/v1.1.0.zip) = 998
+SIZE (go_modules/github.com/zeebo/blake3/@v/v0.2.3.mod) = 153
+SIZE (go_modules/github.com/zeebo/blake3/@v/v0.2.3.zip) = 109300
+SIZE (go_modules/github.com/zeebo/pcg/@v/v1.0.1.mod) = 77
+SIZE (go_modules/github.com/zeebo/pcg/@v/v1.0.1.zip) = 9144
+SIZE (go_modules/golang.org/x/crypto/@v/v0.23.0.mod) = 190
+SIZE (go_modules/golang.org/x/crypto/@v/v0.23.0.zip) = 1803625
+SIZE (go_modules/golang.org/x/net/@v/v0.21.0.mod) = 155
+SIZE (go_modules/golang.org/x/net/@v/v0.21.0.zip) = 1868726
+SIZE (go_modules/golang.org/x/sys/@v/v0.20.0.mod) = 33
+SIZE (go_modules/golang.org/x/sys/@v/v0.20.0.zip) = 1956163
+SIZE (go_modules/golang.org/x/term/@v/v0.20.0.mod) = 68
+SIZE (go_modules/golang.org/x/term/@v/v0.20.0.zip) = 19883
+SIZE (go_modules/golang.org/x/text/@v/v0.15.0.mod) = 197
+SIZE (go_modules/golang.org/x/text/@v/v0.15.0.zip) = 9235248
+SIZE (xhash-3.4.0.zip) = 22654
diff --git a/security/xhash/modules.inc b/security/xhash/modules.inc
new file mode 100644
index 000..fa1db25acdb
--- /dev/

import databases/duckdb

2024-06-01 Thread Sebastien Marie
Hi,

I would like to import duckdb (https://duckdb.org/) port.

DuckDB is a high-performance analytical database system. It is designed to be 
fast, reliable, portable, and easy to use. DuckDB provides a rich SQL dialect, 
with support far beyond basic SQL. DuckDB supports arbitrary and nested 
correlated subqueries, window functions, collations, complex types (arrays, 
structs), and more.

The port installs the CLI with several extensions and the shared lib,
but no bindings for external language.

Comments or OK ?
-- 
Sebastien Marie



duckdb.tgz
Description: Binary data


[update] p5-OpenSMTPd-Filter: update to v0.0.3

2024-06-01 Thread Kirill A . Korinsky
ports@,

Here an update of p5-OpenSMTPd-Filter which was released almost a year ago.

diff --git mail/p5-OpenSMTPd-Filter/Makefile mail/p5-OpenSMTPd-Filter/Makefile
index 960bf870d09..7f3d0c047df 100644
--- mail/p5-OpenSMTPd-Filter/Makefile
+++ mail/p5-OpenSMTPd-Filter/Makefile
@@ -1,6 +1,6 @@
 COMMENT =  easier filters for OpenSMTPd in perl
 
-DISTNAME = OpenSMTPd-Filter-v0.0.2
+DISTNAME = OpenSMTPd-Filter-v0.0.3
 PKGNAME =  p5-${DISTNAME:S/-v/-/}
 CPAN_AUTHOR =  ANDREW
 PKG_ARCH = *
diff --git mail/p5-OpenSMTPd-Filter/distinfo mail/p5-OpenSMTPd-Filter/distinfo
index 144d1d6555c..0c2cfa106a9 100644
--- mail/p5-OpenSMTPd-Filter/distinfo
+++ mail/p5-OpenSMTPd-Filter/distinfo
@@ -1,2 +1,2 @@
-SHA256 (OpenSMTPd-Filter-v0.0.2.tar.gz) = 
2dpWz1OtVUJLlKGO++8VeSnk9AoJIm1D/F2wfBwbHvc=
-SIZE (OpenSMTPd-Filter-v0.0.2.tar.gz) = 33783
+SHA256 (OpenSMTPd-Filter-v0.0.3.tar.gz) = 
FuLOtcfCmhBdCO4vRMBLy1UKJ1teqWByoHUtfke0XP8=
+SIZE (OpenSMTPd-Filter-v0.0.3.tar.gz) = 34147
diff --git mail/p5-OpenSMTPd-Filter/pkg/PLIST mail/p5-OpenSMTPd-Filter/pkg/PLIST
index 86a0d493870..9a7f10642cb 100644
--- mail/p5-OpenSMTPd-Filter/pkg/PLIST
+++ mail/p5-OpenSMTPd-Filter/pkg/PLIST
@@ -1,8 +1,3 @@
 ${P5SITE}/OpenSMTPd/
 ${P5SITE}/OpenSMTPd/Filter.pm
-${P5ARCH}/
-${P5ARCH}/auto/
-${P5ARCH}/auto/OpenSMTPd/
-${P5ARCH}/auto/OpenSMTPd/Filter/
-${P5ARCH}/auto/OpenSMTPd/Filter/.packlist
 @man man/man3p/OpenSMTPd::Filter.3p


--
wbr, Kirill



update: xwayland 21.1.0

2024-06-01 Thread Matthieu Herrb
Hi,

The diff below updates Xwayland to 24.1.0.
ok ?

Index: Makefile
===
RCS file: /local/cvs/ports/wayland/xwayland/Makefile,v
diff -u -p -u -r1.11 Makefile
--- Makefile17 Apr 2024 05:53:23 -  1.11
+++ Makefile1 Jun 2024 15:16:19 -
@@ -1,6 +1,6 @@
 COMMENT =  X server running as wayland application
 
-DISTNAME = xwayland-23.2.6
+DISTNAME = xwayland-24.1.0
 
 CATEGORIES =   wayland
 
@@ -19,7 +19,8 @@ EXTRACT_SUFX =.tar.xz
 
 MODULES =  devel/meson
 
-BUILD_DEPENDS =wayland/libinput-openbsd \
+BUILD_DEPENDS =devel/epoll-shim \
+   wayland/libinput-openbsd \
wayland/wayland-protocols
 
 RUN_DEPENDS =  devel/desktop-file-utils
Index: distinfo
===
RCS file: /local/cvs/ports/wayland/xwayland/distinfo,v
diff -u -p -u -r1.5 distinfo
--- distinfo17 Apr 2024 05:53:23 -  1.5
+++ distinfo1 Jun 2024 15:16:19 -
@@ -1,2 +1,2 @@
-SHA256 (xwayland-23.2.6.tar.xz) = HJo2a058ytug+b0xPFnq4S0jvXJUOyKibq+LIINc/G0=
-SIZE (xwayland-23.2.6.tar.xz) = 1300092
+SHA256 (xwayland-24.1.0.tar.xz) = vvIcTxiAek7VccTi32CrY7VGa71QLszrJIW4kqt23MI=
+SIZE (xwayland-24.1.0.tar.xz) = 1301180
Index: patches/patch-meson_build
===
RCS file: patches/patch-meson_build
diff -N patches/patch-meson_build
--- /dev/null   1 Jan 1970 00:00:00 -
+++ patches/patch-meson_build   1 Jun 2024 15:16:19 -
@@ -0,0 +1,16 @@
+Index: meson.build
+--- meson.build.orig
 meson.build
+@@ -177,6 +177,12 @@ endif
+ libxcvt_dep = dependency('libxcvt', fallback: ['libxcvt', 'libxcvt_dep'], 
required: true)
+ build_xwayland = true
+ 
++if host_machine.system() in ['freebsd', 'openbsd']
++   epoll_dep = dependency('epoll-shim')
++else
++   epoll_dep = []
++endif
++
+ xwayland_path = get_option('xwayland-path')
+ if (xwayland_path == '')
+ xwayland_path = join_paths(get_option('prefix'), get_option('bindir'))
Index: patches/patch-os_access_c
===
RCS file: patches/patch-os_access_c
diff -N patches/patch-os_access_c
--- patches/patch-os_access_c   13 Aug 2023 09:05:20 -  1.1.1.1
+++ /dev/null   1 Jan 1970 00:00:00 -
@@ -1,17 +0,0 @@
-struc ucred on OpenBSD
-
-Index: os/access.c
 os/access.c.orig
-+++ os/access.c
-@@ -1175,7 +1175,11 @@ GetLocalClientCreds(ClientPtr client, LocalClientCredR
- ucred_t *peercred = NULL;
- const gid_t *gids;
- #elif defined(SO_PEERCRED)
-+#ifndef __OpenBSD__
- struct ucred peercred;
-+#else
-+struct sockpeercred peercred;
-+#endif
- socklen_t so_len = sizeof(peercred);
- #elif defined(HAVE_GETPEEREID)
- uid_t uid;
Index: patches/patch-present_meson_build
===
RCS file: patches/patch-present_meson_build
diff -N patches/patch-present_meson_build
--- /dev/null   1 Jan 1970 00:00:00 -
+++ patches/patch-present_meson_build   1 Jun 2024 15:16:19 -
@@ -0,0 +1,13 @@
+epoll-shim
+
+Index: present/meson.build
+--- present/meson.build.orig
 present/meson.build
+@@ -21,6 +21,7 @@ libxserver_present = static_library('libxserver_presen
+ include_directories: inc,
+ dependencies: [
+ common_dep,
++  epoll_dep,
+ dependency('presentproto', version: '>= 1.2')
+ ],
+ )

-- 
Matthieu Herrb



Re: [update] p5-OpenSMTPd-Filter: update to v0.0.3

2024-06-01 Thread Andrew Hewus Fresh
I'm sorry! I meant to update the port and apparently forgot. 

OK afresh1@ (from BSDCan)

On June 1, 2024 11:05:52 AM EDT, "Kirill A. Korinsky"  wrote:
>ports@,
>
>Here an update of p5-OpenSMTPd-Filter which was released almost a year ago.
>
>diff --git mail/p5-OpenSMTPd-Filter/Makefile mail/p5-OpenSMTPd-Filter/Makefile
>index 960bf870d09..7f3d0c047df 100644
>--- mail/p5-OpenSMTPd-Filter/Makefile
>+++ mail/p5-OpenSMTPd-Filter/Makefile
>@@ -1,6 +1,6 @@
> COMMENT = easier filters for OpenSMTPd in perl
> 
>-DISTNAME =OpenSMTPd-Filter-v0.0.2
>+DISTNAME =OpenSMTPd-Filter-v0.0.3
> PKGNAME = p5-${DISTNAME:S/-v/-/}
> CPAN_AUTHOR = ANDREW
> PKG_ARCH =*
>diff --git mail/p5-OpenSMTPd-Filter/distinfo mail/p5-OpenSMTPd-Filter/distinfo
>index 144d1d6555c..0c2cfa106a9 100644
>--- mail/p5-OpenSMTPd-Filter/distinfo
>+++ mail/p5-OpenSMTPd-Filter/distinfo
>@@ -1,2 +1,2 @@
>-SHA256 (OpenSMTPd-Filter-v0.0.2.tar.gz) = 
>2dpWz1OtVUJLlKGO++8VeSnk9AoJIm1D/F2wfBwbHvc=
>-SIZE (OpenSMTPd-Filter-v0.0.2.tar.gz) = 33783
>+SHA256 (OpenSMTPd-Filter-v0.0.3.tar.gz) = 
>FuLOtcfCmhBdCO4vRMBLy1UKJ1teqWByoHUtfke0XP8=
>+SIZE (OpenSMTPd-Filter-v0.0.3.tar.gz) = 34147
>diff --git mail/p5-OpenSMTPd-Filter/pkg/PLIST 
>mail/p5-OpenSMTPd-Filter/pkg/PLIST
>index 86a0d493870..9a7f10642cb 100644
>--- mail/p5-OpenSMTPd-Filter/pkg/PLIST
>+++ mail/p5-OpenSMTPd-Filter/pkg/PLIST
>@@ -1,8 +1,3 @@
> ${P5SITE}/OpenSMTPd/
> ${P5SITE}/OpenSMTPd/Filter.pm
>-${P5ARCH}/
>-${P5ARCH}/auto/
>-${P5ARCH}/auto/OpenSMTPd/
>-${P5ARCH}/auto/OpenSMTPd/Filter/
>-${P5ARCH}/auto/OpenSMTPd/Filter/.packlist
> @man man/man3p/OpenSMTPd::Filter.3p
>
>
>--
>wbr, Kirill
>


Re: import databases/duckdb

2024-06-01 Thread Stuart Henderson
On 2024/06/01 17:02, Sebastien Marie wrote:
> Hi,
> 
> I would like to import duckdb (https://duckdb.org/) port.
> 
> DuckDB is a high-performance analytical database system. It is designed to be 
> fast, reliable, portable, and easy to use. DuckDB provides a rich SQL 
> dialect, 
> with support far beyond basic SQL. DuckDB supports arbitrary and nested 
> correlated subqueries, window functions, collations, complex types (arrays, 
> structs), and more.
> 
> The port installs the CLI with several extensions and the shared lib,
> but no bindings for external language.
> 
> Comments or OK ?
> -- 
> Sebastien Marie
> 

It would be nice to have duckdb in the tree. I think it's not quite as
fast as clickhouse-local but seems more straightforward. A few comments:

- No need to set DISTNAME, that is the default.

- Personally I would use GH_* rather than DIST_TUPLE, there's not really
an advantage to DIST_TUPLE here, and it has the downside that it doesn't
work with portroach.

- I'm a bit unsure about packaging the extensions as .a files, do they
do anything useful? I would have expected to see the shared objects
(see WRKBUILD/extension/*/*.duckdb_extension after build) instead.



[patch] lang/njs update

2024-06-01 Thread Sergey A. Osokin
Hi,

here's the patch to update lang/njs to the latest version, 0.8.4.

Please note that the following patches can be safely removed
from the port:
- patch-auto_make   
  
- patch-external_njs_xml_module_c

Thank you.

-- 
Sergey A. Osokin
Index: Makefile
===
RCS file: /cvs/ports/lang/njs/Makefile,v
diff -u -p -r1.7 Makefile
--- Makefile	26 Oct 2023 14:36:45 -	1.7
+++ Makefile	1 Jun 2024 15:43:19 -
@@ -2,8 +2,7 @@ COMMENT=	NGINX JavaScript command line u
 
 GH_ACCOUNT=	nginx
 GH_PROJECT=	njs
-GH_TAGNAME=	0.8.2
-REVISION=	0
+GH_TAGNAME=	0.8.4
 
 CATEGORIES=	lang www
 
Index: distinfo
===
RCS file: /cvs/ports/lang/njs/distinfo,v
diff -u -p -r1.4 distinfo
--- distinfo	26 Oct 2023 13:51:06 -	1.4
+++ distinfo	1 Jun 2024 15:43:19 -
@@ -1,2 +1,2 @@
-SHA256 (njs-0.8.2.tar.gz) = bxc4fbjfkLbjOC0oBFWWL/hforGjLZHCzh/Rr1qFTXI=
-SIZE (njs-0.8.2.tar.gz) = 733916
+SHA256 (njs-0.8.4.tar.gz) = /hl+JUIEwV6fHfCs83Wt1XvjQWkB7I17hzGdzLSQ+Q0=
+SIZE (njs-0.8.4.tar.gz) = 743910
Index: pkg/PLIST
===
RCS file: /cvs/ports/lang/njs/pkg/PLIST,v
diff -u -p -r1.2 PLIST
--- pkg/PLIST	18 Sep 2023 13:08:53 -	1.2
+++ pkg/PLIST	1 Jun 2024 15:43:19 -
@@ -19,7 +19,6 @@ include/njs_dtoa_fixed.h
 include/njs_encoding.h
 include/njs_error.h
 include/njs_event.h
-include/njs_file.h
 include/njs_flathsh.h
 include/njs_function.h
 include/njs_generator.h
@@ -31,7 +30,6 @@ include/njs_lvlhsh.h
 include/njs_main.h
 include/njs_malloc.h
 include/njs_math.h
-include/njs_md5.h
 include/njs_module.h
 include/njs_mp.h
 include/njs_murmur_hash.h
@@ -48,15 +46,11 @@ include/njs_regex.h
 include/njs_regexp.h
 include/njs_regexp_pattern.h
 include/njs_scope.h
-include/njs_sha1.h
-include/njs_sha2.h
 include/njs_sprintf.h
 include/njs_str.h
 include/njs_string.h
 include/njs_strtod.h
 include/njs_symbol.h
-include/njs_time.h
-include/njs_timer.h
 include/njs_trace.h
 include/njs_typed_array.h
 include/njs_types.h


[patch] www/unit update

2024-06-01 Thread Sergey A. Osokin
Hi,

here's the patch to update www/unit to the recent version, 1.32.1.

There're two small patches to fix build with the recent version of
njs are included.

Thank you.

-- 
Sergey A. Osokin
Index: Makefile.inc
===
RCS file: /cvs/ports/www/unit/Makefile.inc,v
diff -u -p -r1.11 Makefile.inc
--- Makefile.inc	27 Sep 2023 19:13:06 -	1.11
+++ Makefile.inc	1 Jun 2024 15:52:58 -
@@ -1,4 +1,4 @@
-VERSION?=	1.31.0
+VERSION?=	1.32.1
 DISTNAME=	unit-${VERSION}
 
 CATEGORIES=	www
Index: unit/Makefile
===
RCS file: /cvs/ports/www/unit/unit/Makefile,v
diff -u -p -r1.7 Makefile
--- unit/Makefile	8 Sep 2023 05:40:28 -	1.7
+++ unit/Makefile	1 Jun 2024 15:52:58 -
@@ -1,7 +1,5 @@
 COMMENT=	dynamic web application server
 
-REVISION=	0
-
 WANTLIB=	c crypto m pcre2-8 pthread ssl xml2 z
 
 LIB_DEPENDS=	devel/pcre2
Index: unit/distinfo
===
RCS file: /cvs/ports/www/unit/unit/distinfo,v
diff -u -p -r1.7 distinfo
--- unit/distinfo	5 Sep 2023 11:31:17 -	1.7
+++ unit/distinfo	1 Jun 2024 15:52:58 -
@@ -1,2 +1,2 @@
-SHA256 (unit-1.31.0.tar.gz) = JosYALxOAwZn5nln0FKBdDff8D94CsCphZCaoiXeYe0=
-SIZE (unit-1.31.0.tar.gz) = 905152
+SHA256 (unit-1.32.1.tar.gz) = DkQO9jo635QA25eKZPyE4euIh/YaBMz/KEw/aC+4PqI=
+SIZE (unit-1.32.1.tar.gz) = 937669
Index: unit-perl/distinfo
===
RCS file: /cvs/ports/www/unit/unit-perl/distinfo,v
diff -u -p -r1.7 distinfo
--- unit-perl/distinfo	5 Sep 2023 11:31:17 -	1.7
+++ unit-perl/distinfo	1 Jun 2024 15:52:58 -
@@ -1,2 +1,2 @@
-SHA256 (unit-1.31.0.tar.gz) = JosYALxOAwZn5nln0FKBdDff8D94CsCphZCaoiXeYe0=
-SIZE (unit-1.31.0.tar.gz) = 905152
+SHA256 (unit-1.32.1.tar.gz) = DkQO9jo635QA25eKZPyE4euIh/YaBMz/KEw/aC+4PqI=
+SIZE (unit-1.32.1.tar.gz) = 937669
Index: unit-php/distinfo
===
RCS file: /cvs/ports/www/unit/unit-php/distinfo,v
diff -u -p -r1.7 distinfo
--- unit-php/distinfo	5 Sep 2023 11:31:17 -	1.7
+++ unit-php/distinfo	1 Jun 2024 15:52:58 -
@@ -1,2 +1,2 @@
-SHA256 (unit-1.31.0.tar.gz) = JosYALxOAwZn5nln0FKBdDff8D94CsCphZCaoiXeYe0=
-SIZE (unit-1.31.0.tar.gz) = 905152
+SHA256 (unit-1.32.1.tar.gz) = DkQO9jo635QA25eKZPyE4euIh/YaBMz/KEw/aC+4PqI=
+SIZE (unit-1.32.1.tar.gz) = 937669
Index: unit-python/distinfo
===
RCS file: /cvs/ports/www/unit/unit-python/distinfo,v
diff -u -p -r1.7 distinfo
--- unit-python/distinfo	5 Sep 2023 11:31:17 -	1.7
+++ unit-python/distinfo	1 Jun 2024 15:52:58 -
@@ -1,2 +1,2 @@
-SHA256 (unit-1.31.0.tar.gz) = JosYALxOAwZn5nln0FKBdDff8D94CsCphZCaoiXeYe0=
-SIZE (unit-1.31.0.tar.gz) = 905152
+SHA256 (unit-1.32.1.tar.gz) = DkQO9jo635QA25eKZPyE4euIh/YaBMz/KEw/aC+4PqI=
+SIZE (unit-1.32.1.tar.gz) = 937669
Index: unit-ruby/distinfo
===
RCS file: /cvs/ports/www/unit/unit-ruby/distinfo,v
diff -u -p -r1.7 distinfo
--- unit-ruby/distinfo	5 Sep 2023 11:31:17 -	1.7
+++ unit-ruby/distinfo	1 Jun 2024 15:52:58 -
@@ -1,2 +1,2 @@
-SHA256 (unit-1.31.0.tar.gz) = JosYALxOAwZn5nln0FKBdDff8D94CsCphZCaoiXeYe0=
-SIZE (unit-1.31.0.tar.gz) = 905152
+SHA256 (unit-1.32.1.tar.gz) = DkQO9jo635QA25eKZPyE4euIh/YaBMz/KEw/aC+4PqI=
+SIZE (unit-1.32.1.tar.gz) = 937669
--- /dev/null	Sat Jun  1 11:55:05 2024
+++ unit/patches/patch-src_nxt__js.c	Sat Jun  1 11:47:20 2024
@@ -0,0 +1,50 @@
+Fix build with nginx javascript library, version 0.8.4
+
+--- src/nxt_js.c.orig	2023-10-17 14:15:38 UTC
 src/nxt_js.c
+@@ -69,14 +69,6 @@ nxt_js_module_loader(njs_vm_t *vm, njs_external_ptr_t 
+ }
+ 
+ 
+-static njs_vm_ops_t  nxt_js_ops = {
+-NULL,
+-NULL,
+-nxt_js_module_loader,
+-NULL,
+-};
+-
+-
+ njs_int_t  nxt_js_proto_id;
+ 
+ 
+@@ -127,6 +119,7 @@ nxt_js_vm_create(nxt_js_conf_t *jcf)
+ {
+ u_char   *p;
+ size_t   size;
++njs_vm_t *vm;
+ nxt_uint_t   i;
+ njs_vm_opt_t opts;
+ nxt_js_module_t  *module, *mod;
+@@ -146,7 +139,6 @@ nxt_js_vm_create(nxt_js_conf_t *jcf)
+ goto done;
+ }
+ 
+-opts.ops = &nxt_js_ops;
+ opts.external = jcf;
+ 
+ size = 0;
+@@ -203,7 +195,13 @@ nxt_js_vm_create(nxt_js_conf_t *jcf)
+ 
+ done:
+ 
+-return njs_vm_create(&opts);
++vm = njs_vm_create(&opts);
++
++if (nxt_fast_path(vm != NULL)) {
++njs_vm_set_module_loader(vm, nxt_js_module_loader, jcf);
++}
++
++return vm;
+ }
+ 
+ 
--- /dev/null	Sat Jun  1 11:55:14 2024
+++ unit/patches/patch-src_nxt__script.c	Sat Jun  1 11:47:46 2024
@@ -0,0 +1,28 @@
+Fix build with nginx javascript library, version 0.8.4
+
+--- src/nxt_script.c.orig	2023-10-17 14:15:38 UTC
 src/nxt_script.c
+@@ -37,14 +37,6 @@ static void nxt_script_buf_completion(nxt_task_t *task
+ sta

Re: NEW: security/xhash v3.4.0

2024-06-01 Thread Stuart Henderson
On 2024/06/01 11:41, Ricardo Branco wrote:
>  security/xhash/Makefile| 23 +
>  security/xhash/distinfo| 42 ++
>  security/xhash/modules.inc | 12 +++
>  security/xhash/pkg/DESCR   |  1 +
>  security/xhash/pkg/PLIST   |  1 +
>  5 files changed, 79 insertions(+)
>  create mode 100644 security/xhash/Makefile
>  create mode 100644 security/xhash/distinfo
>  create mode 100644 security/xhash/modules.inc
>  create mode 100644 security/xhash/pkg/DESCR
>  create mode 100644 security/xhash/pkg/PLIST

Please send tars rather than diffs for new ports.

> +V =  3.4.0
> +MODGO_MODNAME =  github.com/ricardobranco777/xhash
> +MODGO_VERSION =  v0.0.0-20240601062954-9bdefd997316
> +DISTNAME =   xhash-${V}

I don't understand what's needed to make the go proxy stuff pick things
up, but it would be nice if this could use the tags rather than a
date+hash version.

> +++ b/security/xhash/pkg/DESCR
> @@ -0,0 +1 @@
> +This Go program uses goroutines to calculate multiple hashes on strings, 
> files and directories.  By default it reads from standard input.  It can be 
> used as a drop-in replacement for the GNU **coreutils** when hard-linked as 
> **md5sum**, etc. and it actually supports the `--zero` option with `--check`. 
>  The output format is fully configurable.

DESCR should be wrapped at <80 columns and plaintext not markdown.

Might be nice to outline which actual hashes are supported - doesn't
need to be in full detail, but something like "Supports a range of SHA
and BLAKE algorithms and can use HMACs" would give a better idea of what
it can do.



Re: [patch] lang/njs update

2024-06-01 Thread Stuart Henderson
On 2024/06/01 16:02, Sergey A. Osokin wrote:
> here's the patch to update lang/njs to the latest version, 0.8.4.

will check and commit.

> Please note that the following patches can be safely removed
> from the port:
> - patch-auto_make
> - patch-external_njs_xml_module_c

you can use "cvs rm" and "cvs diff -uNp" to include the removals in your
diff.

> +++ unit/patches/patch-src_nxt__js.c  Sat Jun  1 11:47:20 2024
> +++ unit/patches/patch-src_nxt__script.c  Sat Jun  1 11:47:46 2024

these should be generated with "make update-patches" which generates
diffs for files in the work directory where the original has been copied
with an ".orig.port" extension, and uses a standardized patch format and
filename.

there was also REVISION=0 to remove in unit-python.



Re: [patch] lang/njs update

2024-06-01 Thread Sergey A. Osokin
On Sat, Jun 01, 2024 at 05:14:59PM +0100, Stuart Henderson wrote:
> On 2024/06/01 16:02, Sergey A. Osokin wrote:
> > here's the patch to update lang/njs to the latest version, 0.8.4.
> 
> will check and commit.
> 
> > Please note that the following patches can be safely removed
> > from the port:
> > - patch-auto_make
> > - patch-external_njs_xml_module_c
> 
> you can use "cvs rm" and "cvs diff -uNp" to include the removals in your
> diff.
> 
> > +++ unit/patches/patch-src_nxt__js.cSat Jun  1 11:47:20 2024
> > +++ unit/patches/patch-src_nxt__script.cSat Jun  1 11:47:46 2024
> 
> these should be generated with "make update-patches" which generates
> diffs for files in the work directory where the original has been copied
> with an ".orig.port" extension, and uses a standardized patch format and
> filename.
> 
> there was also REVISION=0 to remove in unit-python.

Thank you for the points, Stuart. Will use these tips for my
future work with OpenBSD ports.

Thank you.

-- 
Sergey A. Osokin



Re: NEW: security/xhash v3.4.0

2024-06-01 Thread Ricardo Branco


On 6/1/24 6:06 PM, Stuart Henderson wrote:

I don't understand what's needed to make the go proxy stuff pick things
up, but it would be nice if this could use the tags rather than a
date+hash version.

This is not possible with current implementation of the 
modgo-gen-modules make target.


as it offloads the version handling to Golang which uses module 
versioning which is


different from tags used in VCS.

+++ b/security/xhash/pkg/DESCR

@@ -0,0 +1 @@
+This Go program uses goroutines to calculate multiple hashes on strings, files 
and directories.  By default it reads from standard input.  It can be used as a 
drop-in replacement for the GNU **coreutils** when hard-linked as **md5sum**, 
etc. and it actually supports the `--zero` option with `--check`.  The output 
format is fully configurable.

DESCR should be wrapped at <80 columns and plaintext not markdown.

Might be nice to outline which actual hashes are supported - doesn't
need to be in full detail, but something like "Supports a range of SHA
and BLAKE algorithms and can use HMACs" would give a better idea of what
it can do.



Will take the time to fix this and include the latest version with some 
fixes.



Thanks,

Ricardo.


[patch] www/nginx: update third-party modules

2024-06-01 Thread Sergey A. Osokin
Hi,

here's the patch to update www/nginx third-party modules to their
recent versions.

Thank you.

-- 
Sergey A. Osokin
Index: Makefile
===
RCS file: /cvs/ports/www/nginx/Makefile,v
diff -u -p -r1.179 Makefile
--- Makefile	30 May 2024 12:41:00 -	1.179
+++ Makefile	1 Jun 2024 18:27:07 -
@@ -22,8 +22,8 @@ VERSION=	1.26.1
 DISTNAME=	nginx-${VERSION}
 CATEGORIES=	www
 
-VERSION-njs=	0.8.2
-VERSION-rtmp=	1.2.1
+VERSION-njs=	0.8.4
+VERSION-rtmp=	1.2.2
 
 PKGNAME-main=		${DISTNAME}
 PKGNAME-image_filter=	nginx-image_filter-${VERSION}
@@ -41,6 +41,8 @@ PKGNAME-passenger=	nginx-passenger-${VER
 PKGNAME-rtmp=		nginx-rtmp-${VERSION}
 PKGNAME-securelink=	nginx-securelink-${VERSION}
 
+REVISION-main=	0
+
 ONLY_FOR_ARCHS-passenger= aarch64 amd64 arm i386
 
 SITES=	https://nginx.org/download/
@@ -55,8 +57,8 @@ _GH_MODS=	\
 	kvspb		nginx-auth-ldap			83c059b73566c2ee9cbda920d91b66657cf120b7 \
 	arut		nginx-rtmp-module		v${VERSION-rtmp} \
 	nginx		njs${VERSION-njs} \
-	simpl		ngx_devel_kit			v0.3.0 \
-	leev		ngx_http_geoip2_module		3.3 \
+	vision5		ngx_devel_kit			v0.3.3 \
+	leev		ngx_http_geoip2_module		3.4 \
 	nginx-modules	ngx_http_hmac_secure_link_module 48c4625fbbf51ed5a95bfec23fa444f6c3702e50
 
 .for _a _p _c in ${_GH_MODS}
Index: distinfo
===
RCS file: /cvs/ports/www/nginx/distinfo,v
diff -u -p -r1.85 distinfo
--- distinfo	30 May 2024 12:41:00 -	1.85
+++ distinfo	1 Jun 2024 18:27:07 -
@@ -4,19 +4,19 @@ SHA256 (naxsi-d714f1636ea49a9a9f4f06dba1
 SHA256 (nginx-1.20.1-chroot.patch) = SS1TB0j8N4/dn5pUTGT6WvkN3aAUuKz5+R0Nt+MG0gk=
 SHA256 (nginx-1.26.1.tar.gz) = +Rh0aP8usVkmC/1Thnwl/44zRyYjes8ie56HDlPT42s=
 SHA256 (nginx-auth-ldap-83c059b73566c2ee9cbda920d91b66657cf120b7.tar.gz) = aQxOW9sq4ZsP7nXNNW0YATRo20cmFrYJeloLvjRshGQ=
-SHA256 (nginx-rtmp-module-v1.2.1.tar.gz) = h6pZdACwtaBSdO4tI9jLgiThJoYiegq+MdeDs6ZF6jc=
-SHA256 (ngx_devel_kit-v0.3.0.tar.gz) = iOBamainQZBm9a51lm+x78QJutRSLRSYbaB0VUrmFhk=
-SHA256 (ngx_http_geoip2_module-3.3.tar.gz) = QTeEOMgz4xOhiGnQxKcnBLSDXDCsr3/WgBOrZzL/eKc=
+SHA256 (nginx-rtmp-module-v1.2.2.tar.gz) = B/Gbe//sXjV7uIIMY+UoHevUX1oubUaxY22SAsPgnXg=
+SHA256 (ngx_devel_kit-v0.3.3.tar.gz) = +qL81RaLEHZNNQgTVlEdX4TbXFJqGqS2rdLblLaFOys=
+SHA256 (ngx_http_geoip2_module-3.4.tar.gz) = rXL8IzSNcVozCZSYRTH6ubNgbhYEgyNnN/mkppV9lFI=
 SHA256 (ngx_http_hmac_secure_link_module-48c4625fbbf51ed5a95bfec23fa444f6c3702e50.tar.gz) = ZXpA2rODS1enIREzlD1OqWwpWcv3NOUXH4eUOgOAmqg=
-SHA256 (njs-0.8.2.tar.gz) = bxc4fbjfkLbjOC0oBFWWL/hforGjLZHCzh/Rr1qFTXI=
+SHA256 (njs-0.8.4.tar.gz) = /hl+JUIEwV6fHfCs83Wt1XvjQWkB7I17hzGdzLSQ+Q0=
 SIZE (headers-more-nginx-module-v0.34.tar.gz) = 28827
 SIZE (lua-nginx-module-v0.10.11.tar.gz) = 616653
 SIZE (naxsi-d714f1636ea49a9a9f4f06dba14aee003e970834.tar.gz) = 237272
 SIZE (nginx-1.20.1-chroot.patch) = 8783
 SIZE (nginx-1.26.1.tar.gz) = 1244738
 SIZE (nginx-auth-ldap-83c059b73566c2ee9cbda920d91b66657cf120b7.tar.gz) = 18542
-SIZE (nginx-rtmp-module-v1.2.1.tar.gz) = 519919
-SIZE (ngx_devel_kit-v0.3.0.tar.gz) = 66455
-SIZE (ngx_http_geoip2_module-3.3.tar.gz) = 8509
+SIZE (nginx-rtmp-module-v1.2.2.tar.gz) = 519934
+SIZE (ngx_devel_kit-v0.3.3.tar.gz) = 66561
+SIZE (ngx_http_geoip2_module-3.4.tar.gz) = 8877
 SIZE (ngx_http_hmac_secure_link_module-48c4625fbbf51ed5a95bfec23fa444f6c3702e50.tar.gz) = 6159
-SIZE (njs-0.8.2.tar.gz) = 733916
+SIZE (njs-0.8.4.tar.gz) = 743910


[NEW] mail/s-dkim-sign: postfix-only DKIM sign-only milter

2024-06-01 Thread Steffen Nurpmeso
Hello.

Now with this "--client IP/CIDR" works as desired.
I also cleaned up the makefile, it had cruft from s-postgray.
Works nicely, configuration is different to other well-known DKIM
implementations, though.

Index: Makefile
===
RCS file: Makefile
diff -N Makefile
--- /dev/null   1 Jan 1970 00:00:00 -
+++ Makefile1 Jun 2024 19:37:14 -
@@ -0,0 +1,28 @@
+COMMENT=   postfix(1)-only DKIM sign-only milter
+
+DISTNAME=  s-dkim-sign-0.6.2
+CATEGORIES=mail
+HOMEPAGE=  https://www.sdaoden.eu/code.html\#s-dkim-sign
+
+SITES= https://ftp.sdaoden.eu/
+
+MAINTAINER=Steffen Nurpmeso 
+
+# ISC
+PERMIT_PACKAGE=Yes
+
+COMPILER=  base-clang ports-gcc
+COMPILER_LANGS=c
+
+WANTLIB+=  c crypto
+
+MAKE_FILE= makefile
+MAKE_FLAGS=MANDIR="${DESTDIR}${PREFIX}"/man/man8
+
+# get rid of hardcoded -O2
+MAKE_FLAGS+=   SUFOPT=" "
+
+do-test:
+   cd ${WRKBUILD} && ./s-dkim-sign-test.sh
+
+.include 
Index: distinfo
===
RCS file: distinfo
diff -N distinfo
--- /dev/null   1 Jan 1970 00:00:00 -
+++ distinfo1 Jun 2024 19:37:14 -
@@ -0,0 +1,2 @@
+SHA256 (s-dkim-sign-0.6.2.tar.gz) = 
gX00ujXUa6B2P1XaW+TbRp6lXBa7kUSA6J1RaYHl/9o=
+SIZE (s-dkim-sign-0.6.2.tar.gz) = 187389
Index: pkg/DESCR
===
RCS file: pkg/DESCR
diff -N pkg/DESCR
--- /dev/null   1 Jan 1970 00:00:00 -
+++ pkg/DESCR   1 Jun 2024 19:37:14 -
@@ -0,0 +1,6 @@
+A postfix(1)-only RFC 6376/[8301]/8463 D(omain)K(eys) I(dentified)
+M(ail) sign-only milter.
+The program is intended to be started via the postfix(1) spawn(8)
+daemon, which takes care of the correct user and group credentials,
+timeouts and stale server garbage collection etc.
+Just see the manual page.
Index: pkg/PLIST
===
RCS file: pkg/PLIST
diff -N pkg/PLIST
--- /dev/null   1 Jan 1970 00:00:00 -
+++ pkg/PLIST   1 Jun 2024 19:37:14 -
@@ -0,0 +1,4 @@
+@bin libexec/s-dkim-sign
+@man man/man8/s-dkim-sign-key-create.8
+@man man/man8/s-dkim-sign.8
+sbin/s-dkim-sign-key-create

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)



UPDATE: libvpx 1.14.1

2024-06-01 Thread Brad Smith
Here is an update to libvpx 1.14.1.


2024-05-21 v1.14.1 "Venetian Duck"
  This release includes enhancements and bug fixes.

  - Upgrading:
This release is ABI compatible with the previous release.

  - Enhancement:
Improved the detection of compiler support for AArch64 extensions,
particularly SVE.

Added vpx_codec_get_global_headers() support for VP9.

  - Bug fixes:
Added buffer bounds checks to vpx_writer and vpx_write_bit_buffer.
Fix to GetSegmentationData() crash in aq_mode=0 for RTC rate control.
Fix to alloc for row_base_thresh_freq_fac.
Free row mt memory before freeing cpi->tile_data.
Fix to buffer alloc for vp9_bitstream_worker_data.
Fix to VP8 race issue for multi-thread with pnsr_calc.
Fix to uv width/height in vp9_scale_and_extend_frame_ssse3.
Fix to integer division by zero and overflow in calc_pframe_target_size().
Fix to integer overflow in vpx_img_alloc() & vpx_img_wrap()(CVE-2024-5197).
Fix to UBSan error in vp9_rc_update_framerate().
Fix to UBSan errors in vp8_new_framerate().
Fix to integer overflow in vp8 encodeframe.c.
Handle EINTR from sem_wait().


Index: Makefile
===
RCS file: /cvs/ports/multimedia/libvpx/Makefile,v
retrieving revision 1.58
diff -u -p -u -p -r1.58 Makefile
--- Makefile28 May 2024 11:26:44 -  1.58
+++ Makefile2 Jun 2024 04:28:52 -
@@ -2,8 +2,7 @@ COMMENT=Google VP8/VP9 video codec
 
 GH_ACCOUNT=webmproject
 GH_PROJECT=libvpx
-GH_TAGNAME=v1.14.0
-REVISION=  0
+GH_TAGNAME=v1.14.1
 EPOCH= 0
 CATEGORIES=multimedia
 
Index: distinfo
===
RCS file: /cvs/ports/multimedia/libvpx/distinfo,v
retrieving revision 1.24
diff -u -p -u -p -r1.24 distinfo
--- distinfo29 Feb 2024 09:43:31 -  1.24
+++ distinfo2 Jun 2024 04:28:52 -
@@ -1,2 +1,2 @@
-SHA256 (libvpx-1.14.0.tar.gz) = XyHS2ycHHIpG8XJZKKECJ65Fxc0crTcn5Kr75HbjIfo=
-SIZE (libvpx-1.14.0.tar.gz) = 5606471
+SHA256 (libvpx-1.14.1.tar.gz) = kBdHJU2Ap5N8kz0DvXxdQejmyIPgZl+tyxclQhZ8eXc=
+SIZE (libvpx-1.14.1.tar.gz) = 5614104
Index: patches/patch-build_make_configure_sh
===
RCS file: /cvs/ports/multimedia/libvpx/patches/patch-build_make_configure_sh,v
retrieving revision 1.11
diff -u -p -u -p -r1.11 patch-build_make_configure_sh
--- patches/patch-build_make_configure_sh   29 Feb 2024 09:43:31 -  
1.11
+++ patches/patch-build_make_configure_sh   2 Jun 2024 04:28:52 -
@@ -1,7 +1,7 @@
 Index: build/make/configure.sh
 --- build/make/configure.sh.orig
 +++ build/make/configure.sh
-@@ -701,8 +701,8 @@ post_process_cmdline() {
+@@ -735,8 +735,8 @@ post_process_cmdline() {
  }
  
  setup_gnu_toolchain() {
@@ -12,7 +12,7 @@ Index: build/make/configure.sh
AR=${AR:-${CROSS}ar}
LD=${LD:-${CROSS}${link_with_cc:-ld}}
AS=${AS:-${CROSS}as}
-@@ -746,7 +746,7 @@ check_xcode_minimum_version() {
+@@ -780,7 +780,7 @@ check_xcode_minimum_version() {
  
  process_common_toolchain() {
if [ -z "$toolchain" ]; then
@@ -21,8 +21,8 @@ Index: build/make/configure.sh
  # detect tgt_isa
  case "$gcctarget" in
aarch64*)
-@@ -1012,7 +1012,7 @@ EOF
- 
+@@ -1028,7 +1028,7 @@ EOF
+   asm_conversion_cmd="cat"
case ${tgt_cc} in
  gcc)
 -  link_with_cc=gcc
@@ -30,8 +30,8 @@ Index: build/make/configure.sh
setup_gnu_toolchain
arch_int=${tgt_isa##armv}
arch_int=${arch_int%%te}
-@@ -1230,7 +1230,7 @@ EOF
-   esac
+@@ -1275,7 +1275,7 @@ EOF
+ 
;;
  mips*)
 -  link_with_cc=gcc
@@ -39,7 +39,7 @@ Index: build/make/configure.sh
setup_gnu_toolchain
tune_cflags="-mtune="
if enabled dspr2; then
-@@ -1281,7 +1281,7 @@ EOF
+@@ -1326,7 +1326,7 @@ EOF
check_add_asflags -KPIC
;;
  ppc64le*)
@@ -48,7 +48,7 @@ Index: build/make/configure.sh
setup_gnu_toolchain
# Do not enable vsx by default.
# https://bugs.chromium.org/p/webm/issues/detail?id=1522
-@@ -1338,7 +1338,7 @@ EOF
+@@ -1383,7 +1383,7 @@ EOF
esac
;;
  gcc*)
@@ -57,7 +57,7 @@ Index: build/make/configure.sh
tune_cflags="-march="
setup_gnu_toolchain
#for 32 bit x86 builds, -O3 did not turn on this flag
-@@ -1469,7 +1469,7 @@ EOF
+@@ -1514,7 +1514,7 @@ EOF
esac
;;
  loongarch*)
@@ -66,7 +66,7 @@ Index: build/make/configure.sh
setup_gnu_toolchain
  
enabled lsx && check_inline_asm lsx '"vadd.b $vr0, $vr1, $vr1"'
-@@ -1478,7 +1478,7 @@ EOF
+@@ -1523,7 +1523,7 @@ EOF
enabled lasx && soft_enable runtime_cpu_detect
;;
  *-gcc|generic-gnu)