www/gitlab-ce: security upgrade to 14.4.1
This version has a problem showing files like .md files (e.g. README.md on the
start page of a project).
But as this bug is already present on version 14.4.0
I will deploy this now, to fix the security problems.
We need to find the source why this happens and fix it later.
Regenerate all distfiles using gitlab as source.
This regeneration is required as the new gitlab version changed
the address and the directory the source files can be downloaded.
This commit also applies some small fixes to make sure all ports using
gitlab are buildable.
Reviewed by: mat
Approved by: portmgr
Differential Revision: https://reviews.freebsd.org/D29628
Security update to gitlab-ce 13.9.2.
This commit also enforces an older version of devel/rubygem-google-protobuf of
This also linked PR.
This ensures that users to not upgrade by accident to a version that is core
So it is wanted that this port is currently not buildable to protect users from
If you want to this upgrade, wait till devel/rubygem-google-protobuf is fixed or
downgrade it to 3.14.0.
Convert all Go ports to USES=go
This allows for port testing with lang/go-devel via GO_PORT, setting
up the Go build environment in a single place, and is step one in
simplifying Go ports that often define too complicated do-build
USES=go gains new arguments 'run' to add lang/go to RUN_DEPENDS and
'no_targets' for ports with composite builds that call 'go' themselves
and do not need the do-build/do-install targets of USES=go.
Submitted by: email@example.com (also D20745)
Reviewed by: mat, tobik
Exp-run by: antoine
Differential Revision: https://reviews.freebsd.org/D20746
www/gitlab-workhorse: Update from 0.7.5 to 0.7.8
- Send artifact zip file entries via the 'senddata' mechanism.
- Add the protocol used (HTTP) to each gitCommand call in order to
check for restricted protocol access on GitLab's side.
- Add the capability to inject `git format-patch` output.
Approved by: swills (mentor)
Number of commits found: 106 (showing only 100 on this page)