non port: japanese/bugzilla44/Makefile |
Number of commits found: 17 |
Wednesday, 7 Sep 2022
|
21:10 Stefan Eßer (se)
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
This commit implements such a proposal and moves one of the WWW: entries
of each pkg-descr file into the respective port's Makefile. A heuristic
attempts to identify the most relevant URL in case there is more than
one WWW: entry in some pkg-descr file. URLs that are not moved into the
Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr
files in order to preserve them.
There are 1256 ports that had no WWW: entries in pkg-descr files. These
ports will not be touched in this commit.
The portlint port has been adjusted to expect a WWW entry in each port
Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as
deprecated.
Approved by: portmgr (tcberner)
b7f0544 |
Wednesday, 20 Oct 2021
|
16:13 Stefan Eßer (se)
japanese/bugzilla44: Add CPE information
Approved by: portmgr (blanket)
2b09178 |
Wednesday, 7 Apr 2021
|
08:09 Mathieu Arnold (mat)
One more small cleanup, forgotten yesterday.
Reported by: lwhsu
cf118cc |
Tuesday, 6 Apr 2021
|
14:31 Mathieu Arnold (mat)
Remove # $FreeBSD$ from Makefiles.
305f148 |
Friday, 1 Apr 2016
|
14:08 mat
Remove ${PORTSDIR}/ from dependencies, categories h, i, j, k, and l.
With hat: portmgr
Sponsored by: Absolight
|
Thursday, 5 Nov 2015
|
12:36 mat
Fix ports that confused the meaning of WRKDIR and WRKSRC.
PR: 204056
Submitted by: mat
Reviewed by: bapt
Sponsored by: Absolight
Differential Revision: https://reviews.freebsd.org/D2735
|
Sunday, 31 May 2015
|
16:12 ohauer
- update to 4.4.9
|
Thursday, 14 May 2015
|
10:15 mat
MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.
While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.
Also, replace some EXTRACT_SUFX occurences with USES=tar:*.
Checked by: make fetch-urlall-list
With hat: portmgr
Sponsored by: Absolight
|
Tuesday, 14 Oct 2014
|
20:47 ohauer
- update to version 4.4.6
- adopt new pkg-plist style
Submitted by: tota
MFH: 2014Q3
|
Friday, 5 Sep 2014
|
23:09 flo
Change MAINTAINER to bz-ports@ as discussed with bugzilla@ (now bz-ports@)
and bugmeister@. bugzilla@ will be used by bugmeister@ from now on.
Submitted by: bugzilla (ohauer)
Approved by: bugzilla (ohauer)
Hat: postmaster
|
Sunday, 31 Aug 2014
|
13:12 ohauer
- update to 4.4.5
|
Monday, 21 Apr 2014
|
18:31 ohauer
- update japanese bugzilla language templates
MFH: 2014Q2
|
Wednesday, 30 Oct 2013
|
12:38 tota
- Update to 4.4.1
- Update WWW line in pkg-descr
|
Thursday, 17 Oct 2013
|
19:35 ohauer
- update to latest release [1]
- use PKGNAMESUFFIX instead LATEST_LINK
- whitespace cleanup
- svn mv */bugzilla to */bugzilla40
- add vuxml entry
4.4.1, 4.2.7, and 4.0.11 Security Advisory
Wednesday Oct 16th, 2013
Summary
=======
Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issues have been discovered
in Bugzilla:
* A CSRF vulnerability in process_bug.cgi affecting Bugzilla 4.4 only
can lead to a bug being edited without the user consent.
* A CSRF vulnerability in attachment.cgi can lead to an attachment
being edited without the user consent.
* Several unfiltered parameters when editing flagtypes can lead to XSS.
* Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered
field values in tabular reports can lead to XSS.
All affected installations are encouraged to upgrade as soon as
possible.
[1] even bugzilla40 gets upstream fixes an upgrade to bugzilla42/44 is
recommend
Security: vid e135f0c9-375f-11e3-80b7-20cf30e32f6d
CVE-2013-1733
CVE-2013-1734
CVE-2013-1742
CVE-2013-1743
|
Thursday, 26 Sep 2013
|
19:00 ohauer
- add STAGE support to bugzilla ports
- remove bugzilla3 CONFLICTS
|
Friday, 20 Sep 2013
|
18:47 bapt
Add NO_STAGE all over the place in preparation for the staging support (cat:
japanese)
|
Thursday, 20 Jun 2013
|
22:21 ohauer
New ports for bugzilla44
- devel/bugzilla44
- japanese/bugzilla44
- german/bugzilla44
Release Notes:
http://www.bugzilla.org/releases/4.4/release-notes.html
|
Number of commits found: 17 |