Date: Sun, 9 Dec 2012 22:49:45 GMT From: Jeff Burchell <toxic@doobie.com> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/174306: [maintainer] news/nzbget: update to 9.0 Message-ID: <201212092249.qB9MnjMH076354@red.freebsd.org> Resent-Message-ID: <201212092250.qB9Mo0ui009945@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 174306 >Category: ports >Synopsis: [maintainer] news/nzbget: update to 9.0 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Sun Dec 09 22:50:00 UTC 2012 >Closed-Date: >Last-Modified: >Originator: Jeff Burchell >Release: 9.1-PRERELEASE >Organization: >Environment: FreeBSD canasta 9.1-PRERELEASE FreeBSD 9.1-PRERELEASE #7 r243704: Fri Nov 30 02:02:07 PST 2012 root@canasta:/usr/obj/usr/src/sys/GENERIC amd64 >Description: Update to nzbget 9.0, released on December 9th. Please note that the patches previously contained in files/patch-TLS.cpp have been incorporated upstream, so this file should be removed. >How-To-Repeat: >Fix: Apply Patch. Remove files/patch-TLS.cpp Patch attached with submission follows: Index: Makefile =================================================================== --- Makefile (revision 308573) +++ Makefile (working copy) @@ -6,7 +6,7 @@ # PORTNAME= nzbget -PORTVERSION= 0.8.0 +PORTVERSION= 9.0 CATEGORIES= news MASTER_SITES= SF/${PORTNAME}/${PORTNAME}-stable/${PORTVERSION} @@ -16,7 +16,7 @@ LICENSE= GPLv2 LICENSE_FILE= ${WRKSRC}/COPYING -LIB_DEPENDS= xml2.5:${PORTSDIR}/textproc/libxml2 \ +LIB_DEPENDS= xml2:${PORTSDIR}/textproc/libxml2 \ sigc-2:${PORTSDIR}/devel/libsigc++20 GNU_CONFIGURE= yes Index: distinfo =================================================================== --- distinfo (revision 308573) +++ distinfo (working copy) @@ -1,2 +1,2 @@ -SHA256 (nzbget-0.8.0.tar.gz) = 646939596097fafdeb0b4064b433463419e7d0d9af7fe32f6689d6b95ad77d95 -SIZE (nzbget-0.8.0.tar.gz) = 321351 +SHA256 (nzbget-9.0.tar.gz) = 40f9baefcd090f81a000149a79358a2639c5154579c026dba4317c566dd19ee4 +SIZE (nzbget-9.0.tar.gz) = 656166 Index: files/patch-TLS.cpp =================================================================== --- files/patch-TLS.cpp (revision 308573) +++ files/patch-TLS.cpp (working copy) @@ -1,32 +0,0 @@ ---- TLS.cpp.orig 2011-06-14 23:47:22.000000000 +0200 -+++ TLS.cpp 2012-08-31 09:27:41.000000000 +0200 -@@ -908,7 +908,7 @@ - char *buf; - int bufsize; - /* needed to get the DNS subjectAltNames: */ -- STACK *subj_alt_names; -+ STACK_OF(GENERAL_NAME) *subj_alt_names; - int subj_alt_names_count; - GENERAL_NAME *subj_alt_name; - /* did we find a name matching hostname? */ -@@ -960,7 +960,7 @@ - /* Try the DNS subjectAltNames. */ - match_found = 0; - if ((subj_alt_names = -- (STACK*)X509_get_ext_d2i(x509cert, NID_subject_alt_name, NULL, NULL))) -+ (STACK_OF(GENERAL_NAME) *)X509_get_ext_d2i(x509cert, NID_subject_alt_name, NULL, NULL))) - { - subj_alt_names_count = sk_GENERAL_NAME_num(subj_alt_names); - for (i = 0; i < subj_alt_names_count; i++) -@@ -1105,7 +1105,11 @@ - - #ifdef HAVE_OPENSSL - -+ #if OPENSSL_VERSION_NUMBER >= 0x10000000L -+ const SSL_METHOD *ssl_method = NULL; -+ #else - SSL_METHOD *ssl_method = NULL; -+ #endif - - ssl_method = force_sslv3 ? SSLv3_client_method() : SSLv23_client_method(); - if (!ssl_method) >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201212092249.qB9MnjMH076354>