pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/devel/pcre2



Module Name:    pkgsrc
Committed By:   wiz
Date:           Tue Nov 26 10:17:55 UTC 2019

Modified Files:
        pkgsrc/devel/pcre2: Makefile PLIST distinfo
Added Files:
        pkgsrc/devel/pcre2/patches: patch-src_sljit_sljitProtExecAllocator.c
            patch-src_sljit_sljitProtExecAllocator.c.orig

Log Message:
pcre2: update to 10.34.

Version 10.34 21-November-2019
------------------------------

Another release with a few enhancements as well as bugfixes and tidies. The
main new features are:

1. There is now some support for matching in invalid UTF strings.

2. Non-atomic positive lookarounds are implemented in the pcre2_match()
interpreter, but not in JIT.

3. Added two new functions: pcre2_get_match_data_size() and
pcre2_maketables_free().

4. Upgraded to Unicode 12.1.0.


To generate a diff of this commit:
cvs rdiff -u -r1.14 -r1.15 pkgsrc/devel/pcre2/Makefile
cvs rdiff -u -r1.8 -r1.9 pkgsrc/devel/pcre2/PLIST
cvs rdiff -u -r1.10 -r1.11 pkgsrc/devel/pcre2/distinfo
cvs rdiff -u -r0 -r1.1 \
    pkgsrc/devel/pcre2/patches/patch-src_sljit_sljitProtExecAllocator.c \
    pkgsrc/devel/pcre2/patches/patch-src_sljit_sljitProtExecAllocator.c.orig

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/devel/pcre2/Makefile
diff -u pkgsrc/devel/pcre2/Makefile:1.14 pkgsrc/devel/pcre2/Makefile:1.15
--- pkgsrc/devel/pcre2/Makefile:1.14    Tue Sep 17 10:56:03 2019
+++ pkgsrc/devel/pcre2/Makefile Tue Nov 26 10:17:55 2019
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.14 2019/09/17 10:56:03 nros Exp $
+# $NetBSD: Makefile,v 1.15 2019/11/26 10:17:55 wiz Exp $
 
-DISTNAME=      pcre2-10.33
+DISTNAME=      pcre2-10.34
 CATEGORIES=    devel
 MASTER_SITES=  ftp://ftp.pcre.org/pub/pcre/
 MASTER_SITES+= https://ftp.pcre.org/pub/pcre/
@@ -25,10 +25,11 @@ CONFIGURE_ARGS+=    --enable-pcre2-16
 CONFIGURE_ARGS+=       --enable-pcre2-32
 CONFIGURE_ARGS+=       --enable-pcre2grep-libz
 CONFIGURE_ARGS+=       --enable-pcre2grep-libbz2
-
-# On NetBSD, needs:
+# To avoid having to
 # sysctl -w security.pax.mprotect.enabled=0
-# because of its JIT.
+# because of its JIT on NetBSD.
+CONFIGURE_ARGS.NetBSD+=        --enable-jit-sealloc
+
 TEST_TARGET=           check
 
 .include "options.mk"

Index: pkgsrc/devel/pcre2/PLIST
diff -u pkgsrc/devel/pcre2/PLIST:1.8 pkgsrc/devel/pcre2/PLIST:1.9
--- pkgsrc/devel/pcre2/PLIST:1.8        Sat Apr 27 18:33:12 2019
+++ pkgsrc/devel/pcre2/PLIST    Tue Nov 26 10:17:55 2019
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.8 2019/04/27 18:33:12 wiz Exp $
+@comment $NetBSD: PLIST,v 1.9 2019/11/26 10:17:55 wiz Exp $
 bin/pcre2-config
 bin/pcre2grep
 bin/pcre2test
@@ -35,6 +35,7 @@ man/man3/pcre2_general_context_create.3
 man/man3/pcre2_general_context_free.3
 man/man3/pcre2_get_error_message.3
 man/man3/pcre2_get_mark.3
+man/man3/pcre2_get_match_data_size.3
 man/man3/pcre2_get_ovector_count.3
 man/man3/pcre2_get_ovector_pointer.3
 man/man3/pcre2_get_startchar.3
@@ -45,6 +46,7 @@ man/man3/pcre2_jit_stack_assign.3
 man/man3/pcre2_jit_stack_create.3
 man/man3/pcre2_jit_stack_free.3
 man/man3/pcre2_maketables.3
+man/man3/pcre2_maketables_free.3
 man/man3/pcre2_match.3
 man/man3/pcre2_match_context_copy.3
 man/man3/pcre2_match_context_create.3
@@ -134,6 +136,7 @@ share/doc/pcre2/html/pcre2_general_conte
 share/doc/pcre2/html/pcre2_general_context_free.html
 share/doc/pcre2/html/pcre2_get_error_message.html
 share/doc/pcre2/html/pcre2_get_mark.html
+share/doc/pcre2/html/pcre2_get_match_data_size.html
 share/doc/pcre2/html/pcre2_get_ovector_count.html
 share/doc/pcre2/html/pcre2_get_ovector_pointer.html
 share/doc/pcre2/html/pcre2_get_startchar.html
@@ -144,6 +147,7 @@ share/doc/pcre2/html/pcre2_jit_stack_ass
 share/doc/pcre2/html/pcre2_jit_stack_create.html
 share/doc/pcre2/html/pcre2_jit_stack_free.html
 share/doc/pcre2/html/pcre2_maketables.html
+share/doc/pcre2/html/pcre2_maketables_free.html
 share/doc/pcre2/html/pcre2_match.html
 share/doc/pcre2/html/pcre2_match_context_copy.html
 share/doc/pcre2/html/pcre2_match_context_create.html

Index: pkgsrc/devel/pcre2/distinfo
diff -u pkgsrc/devel/pcre2/distinfo:1.10 pkgsrc/devel/pcre2/distinfo:1.11
--- pkgsrc/devel/pcre2/distinfo:1.10    Sat Apr 27 18:33:12 2019
+++ pkgsrc/devel/pcre2/distinfo Tue Nov 26 10:17:55 2019
@@ -1,6 +1,7 @@
-$NetBSD: distinfo,v 1.10 2019/04/27 18:33:12 wiz Exp $
+$NetBSD: distinfo,v 1.11 2019/11/26 10:17:55 wiz Exp $
 
-SHA1 (pcre2-10.33.tar.bz2) = 2cc3ed45936f5684b3189c132a68952c42cf65d0
-RMD160 (pcre2-10.33.tar.bz2) = 5ef46f9e0f5a4d2ee710d4ec0616a83f00b680eb
-SHA512 (pcre2-10.33.tar.bz2) = c6aa52cdbb0c906b02e9a9f255697a1b9b99d9c7dccdaa484ffdb04fe3582d232ba3cb3c421d6df589a387b415dedb0817f58ec5391488b25b4e7bd9da6bab8f
-Size (pcre2-10.33.tar.bz2) = 1690739 bytes
+SHA1 (pcre2-10.34.tar.bz2) = ffd8da87b958c44dd9b927e7b39934e2af5fef8b
+RMD160 (pcre2-10.34.tar.bz2) = bf224aeb1d9d1c8a4f28ff4c6b4148d2b3c6c1c6
+SHA512 (pcre2-10.34.tar.bz2) = 77ad75f8b0b8bbfc2f57932596151bca25b06bd621e0f047e476f38cd127f43e2052460b95c281a7e874aad2b7fd86c8f3413f4a323abb74b9440a42d0ee9524
+Size (pcre2-10.34.tar.bz2) = 1714731 bytes
+SHA1 (patch-src_sljit_sljitProtExecAllocator.c) = 91d334417791d4e8628a01a2dee763830b0bd6d7

Added files:

Index: pkgsrc/devel/pcre2/patches/patch-src_sljit_sljitProtExecAllocator.c
diff -u /dev/null pkgsrc/devel/pcre2/patches/patch-src_sljit_sljitProtExecAllocator.c:1.1
--- /dev/null   Tue Nov 26 10:17:55 2019
+++ pkgsrc/devel/pcre2/patches/patch-src_sljit_sljitProtExecAllocator.c Tue Nov 26 10:17:55 2019
@@ -0,0 +1,28 @@
+$NetBSD: patch-src_sljit_sljitProtExecAllocator.c,v 1.1 2019/11/26 10:17:55 wiz Exp $
+
+NetBSD does not have secure_getenv.
+
+--- src/sljit/sljitProtExecAllocator.c.orig    2017-02-15 17:24:58.000000000 +0000
++++ src/sljit/sljitProtExecAllocator.c
+@@ -97,7 +97,9 @@ struct chunk_header {
+ #endif
+ 
+ int mkostemp(char *template, int flags);
++#if HAVE_SECURE_GETENV
+ char *secure_getenv(const char *name);
++#endif
+ 
+ static SLJIT_INLINE int create_tempfile(void)
+ {
+@@ -124,7 +126,11 @@ static SLJIT_INLINE int create_tempfile(
+       tmp_name_len = 4;
+ #endif
+ 
++#if HAVE_SECURE_GETENV
+       dir = secure_getenv("TMPDIR");
++#else
++      dir = getenv("TMPDIR");
++#endif
+       if (dir) {
+               len = strlen(dir);
+               if (len > 0 && len < sizeof(tmp_name)) {



Home | Main Index | Thread Index | Old Index