From owner-freebsd-ports-bugs@freebsd.org Fri Jan 13 12:14:31 2017 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 34645CACBC9 for ; Fri, 13 Jan 2017 12:14:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 23B261085 for ; Fri, 13 Jan 2017 12:14:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v0DCEVI4019562 for ; Fri, 13 Jan 2017 12:14:31 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 215989] shells/lshell: Update to 0.9.18, take MAINTAINER'ship Date: Fri, 13 Jan 2017 12:14:31 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: easy, patch, security X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: dam@my.gd X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Jan 2017 12:14:31 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D215989 --- Comment #11 from Damien Fleuriot --- Kindly find attached the svn diff to bring lshell up to the latest commit h= ash 279d7ab [1] * The port passes both 'portlint -C' and 'port test'. * The offsets for files/patch-lshell_checkconfig.py have been adjusted to t= his latest commit hash. * The patch files/patch-lshell_shellcmd.py needs to be removed since a lot = of code was refactored in 0.9.17. I am unclear as to whether I should handle the extraneous patch file's dele= tion in post-extract ? Quote [2] : If a file must be deleted, do it in the post-extract target rat= her than as part of the patch. Seeing as we're fetching against a commit hash, I've taken the liberty of setting PORTREVISION to the commit's date. I believe this also elegantly solves the problem of having no 0.9.19 releas= e. I'll gladly heed any advice if you think there is yet room for improvement. Will submit confirmation of poudriere runs as soon as I get a HEAD host up = with the proper jails. The port does pass "manual checks" on 10-STABLE , as in managing to run it = and failing to exploit previous shell escape vulnerabilities. [1] https://github.com/ghantoos/lshell/commit/279d7ab7980ed88c6628e6621918f6299= a2e2e32 [2] https://www.freebsd.org/doc/en/books/porters-handbook/slow-patch.html --=20 You are receiving this mail because: You are the assignee for the bug.=