From owner-svn-ports-all@freebsd.org Thu Apr 30 08:17:35 2020 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E90492B4C22; Thu, 30 Apr 2020 08:17:35 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 49CSt75sGWz4Rk3; Thu, 30 Apr 2020 08:17:35 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BFFBE1BDE3; Thu, 30 Apr 2020 08:17:35 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 03U8HZGx011202; Thu, 30 Apr 2020 08:17:35 GMT (envelope-from joneum@FreeBSD.org) Received: (from joneum@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 03U8HYbj011198; Thu, 30 Apr 2020 08:17:34 GMT (envelope-from joneum@FreeBSD.org) Message-Id: <202004300817.03U8HYbj011198@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: joneum set sender to joneum@FreeBSD.org using -f From: Jochen Neumeister Date: Thu, 30 Apr 2020 08:17:34 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r533417 - in branches/2020Q2/databases: mysql57-client/files mysql57-server mysql57-server/files X-SVN-Group: ports-branches X-SVN-Commit-Author: joneum X-SVN-Commit-Paths: in branches/2020Q2/databases: mysql57-client/files mysql57-server mysql57-server/files X-SVN-Commit-Revision: 533417 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Apr 2020 08:17:36 -0000 Author: joneum Date: Thu Apr 30 08:17:34 2020 New Revision: 533417 URL: https://svnweb.freebsd.org/changeset/ports/533417 Log: MFH: r533416 databases/mysq56-{client, server}: Update to latest release 5.7.30 Bugs Fixed: - InnoDB: The row_upd_clust_rec_by_insert function, which marks a clustered index record as deleted and inserts an updated version of the record into the clustered index, passed an incorrect n_ext value (the total number of external fields) to lower level functions, causing an assertion failure. - InnoDB: An operation performed with the innodb_buffer_pool_evict debug variable set to uncompressed caused an assertion failure. - InnoDB: An add column operation caused an assertion failure. The failure was due to a dangling pointer. - nnoDB: Updating certain InnoDB system variables that take string values raised invalid read errors during Valgrind testing. - InnoDB: An insert statement on a table with a spatial index raised a record type mismatch assertion due to a tuple corruption. - InnoDB: A function that calculates undo log record size could calculate an incorrect length value in the case of a corrupted undo log record, resulting in a malloc failure. Assertion code was added to detect incorrect calculations. - Replication: While an SQL statement was in the process of being rewritten for the binary log so that sensitive information did not appear in plain text, if a SHOW PROCESSLIST statement was used to inspect the query, the query could become corrupted when it was written to the binary log, causing replication to stop. The process of rewriting the query is now kept private, and the query thread is updated only when rewriting is complete. - Replication: When a GRANT or REVOKE statement is only partially executed, an incident event is logged in the binary log, which makes the replication slave's applier thread stop so that the slave can be reconciled manually with the master. Previously, if a failed GRANT or REVOKE statement was the first statement executed in the session, no GTID was applied to the incident event (because the cache manager did not yet exist for the session), causing an error on the replication slave. Also, no incident event was logged in the situation where a GRANT statement created a user but then failed because the privileges had been specified incorrectly, again causing an error on the replication slave. Both these issues have now been fixed. - Replication: When a replication slave has a generated column that the master does not have in that table, with a secondary index on the generated column, the generated expression should be evaluated and the value stored by the storage engine in the secondary index. When row-based binary logging is in use, the replication slave assigns default values to any fields that are not in the master's definition of the table. In the case of a generated column, which does not have a default value, the slave was previously assigning a null or a zero value to the column. This value was then stored by the storage engine in the secondary index, causing both the table and the index to become corrupted. To fix this issue, generated columns in a table on a replication slave are now re-evaluated before the values are sent to the storage engine. - Replication: In the event of an unplanned disconnection of a replication slave from the master, the reference to the master's dump thread might not be removed from the list of registered slaves, in which case statements that accessed the list of slaves would fail. The issue has now been fixed. - Replication: With the settings binlog_format=MIXED, tx_isolation=READ-COMMITTED, and binlog_row_image=FULL, an INSERT ... SELECT query involving a transactional storage engine omitted any columns with a null value from the row image written to the binary log. This happened because when processing INSERT ... SELECT statements, the columns were marked for inserts before the binary logging format was selected. The issue has now been fixed. Full Changelog: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-30.html Security: 21d59ea3-8559-11ea-a5e2-d4c9ef517024 (MySQL - Server) Security: 622b5c47-855b-11ea-a5e2-d4c9ef517024 (MySQL - Client) Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Deleted: branches/2020Q2/databases/mysql57-client/files/patch-cmd-line-utils_libedit_chartype.h branches/2020Q2/databases/mysql57-client/files/patch-cmd-line-utils_libedit_vi.c branches/2020Q2/databases/mysql57-server/files/patch-cmd-line-utils_libedit_chartype.h branches/2020Q2/databases/mysql57-server/files/patch-cmd-line-utils_libedit_vi.c Modified: branches/2020Q2/databases/mysql57-client/files/patch-cmake_ssl.cmake branches/2020Q2/databases/mysql57-server/Makefile branches/2020Q2/databases/mysql57-server/distinfo branches/2020Q2/databases/mysql57-server/files/patch-cmake_ssl.cmake Directory Properties: branches/2020Q2/ (props changed) Modified: branches/2020Q2/databases/mysql57-client/files/patch-cmake_ssl.cmake ============================================================================== --- branches/2020Q2/databases/mysql57-client/files/patch-cmake_ssl.cmake Thu Apr 30 08:15:11 2020 (r533416) +++ branches/2020Q2/databases/mysql57-client/files/patch-cmake_ssl.cmake Thu Apr 30 08:17:34 2020 (r533417) @@ -1,16 +1,16 @@ --- cmake/ssl.cmake.orig 2019-12-06 10:41:47 UTC +++ cmake/ssl.cmake -@@ -189,7 +189,8 @@ MACRO (MYSQL_CHECK_SSL) - OPENSSL_FIX_VERSION "${OPENSSL_VERSION_NUMBER}" - ) - ENDIF() -- IF("${OPENSSL_MAJOR_VERSION}.${OPENSSL_MINOR_VERSION}.${OPENSSL_FIX_VERSION}" VERSION_GREATER "1.1.0") +@@ -193,7 +193,8 @@ MACRO (MYSQL_CHECK_SSL) + ) + SET(OPENSSL_VERSION ${OPENSSL_VERSION} CACHE INTERNAL "") + +- IF("${OPENSSL_VERSION}" VERSION_GREATER "1.1.0") + CHECK_SYMBOL_EXISTS(TLS1_3_VERSION "openssl/tls1.h" HAVE_TLS1_3_VERSION) + IF(HAVE_TLS1_3_VERSION) ADD_DEFINITIONS(-DHAVE_TLSv13) SET(HAVE_TLSv13 1) IF(SOLARIS) -@@ -199,7 +200,13 @@ MACRO (MYSQL_CHECK_SSL) +@@ -203,7 +204,13 @@ MACRO (MYSQL_CHECK_SSL) IF(OPENSSL_INCLUDE_DIR AND OPENSSL_LIBRARY AND CRYPTO_LIBRARY AND Modified: branches/2020Q2/databases/mysql57-server/Makefile ============================================================================== --- branches/2020Q2/databases/mysql57-server/Makefile Thu Apr 30 08:15:11 2020 (r533416) +++ branches/2020Q2/databases/mysql57-server/Makefile Thu Apr 30 08:17:34 2020 (r533417) @@ -2,8 +2,8 @@ # $FreeBSD$ PORTNAME?= mysql -PORTVERSION= 5.7.29 -PORTREVISION= 1 +PORTVERSION= 5.7.30 +PORTREVISION= 0 CATEGORIES= databases MASTER_SITES= MYSQL/MySQL-5.7 PKGNAMESUFFIX?= 57-server Modified: branches/2020Q2/databases/mysql57-server/distinfo ============================================================================== --- branches/2020Q2/databases/mysql57-server/distinfo Thu Apr 30 08:15:11 2020 (r533416) +++ branches/2020Q2/databases/mysql57-server/distinfo Thu Apr 30 08:17:34 2020 (r533417) @@ -1,3 +1,3 @@ -TIMESTAMP = 1579122971 -SHA256 (mysql-boost-5.7.29.tar.gz) = 00f514124de2bad1ba7b380cbbd46e316cae7fc7bc3a5621456cabf352f27978 -SIZE (mysql-boost-5.7.29.tar.gz) = 51417554 +TIMESTAMP = 1588150116 +SHA256 (mysql-boost-5.7.30.tar.gz) = 211fbbb359da651197e1cc419e215f1f3caee8c1adf7491f5f7ed3e8dbcdb8af +SIZE (mysql-boost-5.7.30.tar.gz) = 51363998 Modified: branches/2020Q2/databases/mysql57-server/files/patch-cmake_ssl.cmake ============================================================================== --- branches/2020Q2/databases/mysql57-server/files/patch-cmake_ssl.cmake Thu Apr 30 08:15:11 2020 (r533416) +++ branches/2020Q2/databases/mysql57-server/files/patch-cmake_ssl.cmake Thu Apr 30 08:17:34 2020 (r533417) @@ -1,16 +1,16 @@ --- cmake/ssl.cmake.orig 2019-12-06 10:41:47 UTC +++ cmake/ssl.cmake -@@ -189,7 +189,8 @@ MACRO (MYSQL_CHECK_SSL) - OPENSSL_FIX_VERSION "${OPENSSL_VERSION_NUMBER}" - ) - ENDIF() -- IF("${OPENSSL_MAJOR_VERSION}.${OPENSSL_MINOR_VERSION}.${OPENSSL_FIX_VERSION}" VERSION_GREATER "1.1.0") +@@ -193,7 +193,8 @@ MACRO (MYSQL_CHECK_SSL) + ) + SET(OPENSSL_VERSION ${OPENSSL_VERSION} CACHE INTERNAL "") + +- IF("${OPENSSL_VERSION}" VERSION_GREATER "1.1.0") + CHECK_SYMBOL_EXISTS(TLS1_3_VERSION "openssl/tls1.h" HAVE_TLS1_3_VERSION) + IF(HAVE_TLS1_3_VERSION) ADD_DEFINITIONS(-DHAVE_TLSv13) SET(HAVE_TLSv13 1) IF(SOLARIS) -@@ -199,7 +200,13 @@ MACRO (MYSQL_CHECK_SSL) +@@ -203,7 +204,13 @@ MACRO (MYSQL_CHECK_SSL) IF(OPENSSL_INCLUDE_DIR AND OPENSSL_LIBRARY AND CRYPTO_LIBRARY AND