pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/sysutils/rsyslog Update sysutils/rsyslog* to 8.31.0



details:   https://anonhg.NetBSD.org/pkgsrc/rev/b7ed7575bf78
branches:  trunk
changeset: 372259:b7ed7575bf78
user:      fhajny <fhajny%pkgsrc.org@localhost>
date:      Thu Nov 30 22:19:36 2017 +0000

description:
Update sysutils/rsyslog* to 8.31.0

- remove systemd embedded code, use libsystemd instead
- mmanon: add support for IPv6 adresses with embedded IPv4 address
- ommongodb: big refactoring, more or less a feature-enhanced rewrite
- rainerscript: add parse_time() function
- omelasticsearch: add pipeline support
- lmsig_ksi_ls12: support asynchronous mode of libksi
- omprog: added error handling and transaction support for external
  plugins
- imzmq3/omzmq3: marked as deprecated, modules will be remove in v8.41
- imzmq3/omzmq3: fixed build issues with gcc-7
- core: emit error message on abnormal input thread termination
- core: refactored locking for json variable access
- core: refactored creation of UDP sockets
- core/dnscache: refactor locking
- rainerscript: use crypto-grade random number generator for random()
  function
- imkafka: improve error reporting and cleanup refactoring
- imkafka bugfix: segfault if "broker" parameter is not specified
- omkafka: improve error reporting
- omkafka: slight speedup do to refactoring of LIST class
- TCP syslog: support SNI when connecting as a client
- msg variable bugfix: potential segfault on variable access
- ratelimiting bugfix: data race in Linux-like ratelimiter
- core/template bugfix: potential NULL pointer access at config load
- core/json var subsystem bugfix: segfault in MsgSetPropsViaJSON
- core/wrkr threads bugfix: race condition
- core/wtp: potential hang during shutdown
- omfwd bugfix: generate error message on connection failure
- imtcp bugfix: "streamdriver.mode" parameter could not be set to 0
- imjournal bugfix: module was defunctional
- imjournal: refactor error handling, fix error messages
 -mmdblookup bugfix: fix potential segfault due to threading issues
- omkafka bugfixes
- kafka bugfix: problem on invalid kafka configuration values
- [io]mgssapi: fix build problems (regression from 8.30.0)
- [io]czmq: fix build problems on some platforms (namely gcc 7, clang
  5)
- tcpsrv bugfix: potential hang during shutdown
- queue bugfix: potential hang during shutdown
- queue bugfix: NULL pointer dereference during config processing
- imczmq bugfix: segfault
- imfile: some small performance enhancements
- omfile: hande file open error via SUSPEND mode
- omfile bugfix: race during directory creation can lead to loop
- imudp: improve error reporting
- omrelp bugfix: incorrect error handling
- [io]mrelp bugfix: segfault on startup if configured cert not
  readable
- mmanon fix: make build under gcc 7
- mmpstrucdata bugfix: formatting error of ']' char
- mmexternalb bugfix: memory leak
- core/stats bugfix: memory leak if sender stats or tracking are
  enabled
- core bugfix: potential segfault during startup
- core bugfix: potential race in variable handling
- core bugfix: potential segfault when shutting down rsyslog
- core/action bugfix: potential misadressing when processing hard
  errors
- template object bugfix: NULL pointer access on invalid parameters
- omjournal bugfix: NULL pointer access on invalid parameters
- omelasticsearch bugfix: configured credentials not used during
  health check
- omelasticsearch bugfix: abort on unavailable ES server
- omelasticsearch: fix memory leak and potential misadressing
- omelasticsearch bugfix: output from libcurl to stdout
- iczmq bugfix: potential memory leak
- imptcp bugfix: potential misadressing
- imptcp: potential buffer overflow
- core/nsd_gtls: fix potential unitialized data access
- stats bugfix: potential program hang
- omfwd bugfix: memory leak if network namespaces are used
- core: potential misadressing when accessing JSON properties
- gcry crypto provider bugfixes: potential misadressing and memory
  leak
- core/file stream object bugfix: memory leak
- imdiag bugfix: double mutex unlock when working with stats
- fixed several minor and cosmetic issues found by Coverty scan
- build: make compile warning-free under gcc 7

diffstat:

 sysutils/rsyslog/Makefile.common                           |    4 +-
 sysutils/rsyslog/distinfo                                  |   11 +-
 sysutils/rsyslog/patches/patch-plugins_imgssapi_imgssapi.c |  119 -------------
 3 files changed, 7 insertions(+), 127 deletions(-)

diffs (164 lines):

diff -r 7a2f9a1a794c -r b7ed7575bf78 sysutils/rsyslog/Makefile.common
--- a/sysutils/rsyslog/Makefile.common  Thu Nov 30 20:52:56 2017 +0000
+++ b/sysutils/rsyslog/Makefile.common  Thu Nov 30 22:19:36 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile.common,v 1.32 2017/10/18 11:01:05 fhajny Exp $
+# $NetBSD: Makefile.common,v 1.33 2017/11/30 22:19:36 fhajny Exp $
 # used by sysutils/rsyslog/Makefile
 # used by sysutils/rsyslog-dbi/Makefile
 # used by sysutils/rsyslog-elasticsearch/Makefile
@@ -13,7 +13,7 @@
 
 .include "../../mk/bsd.prefs.mk"
 
-DISTNAME=              rsyslog-8.30.0
+DISTNAME=              rsyslog-8.31.0
 CATEGORIES=            sysutils
 MASTER_SITES=          http://www.rsyslog.com/files/download/rsyslog/
 
diff -r 7a2f9a1a794c -r b7ed7575bf78 sysutils/rsyslog/distinfo
--- a/sysutils/rsyslog/distinfo Thu Nov 30 20:52:56 2017 +0000
+++ b/sysutils/rsyslog/distinfo Thu Nov 30 22:19:36 2017 +0000
@@ -1,14 +1,13 @@
-$NetBSD: distinfo,v 1.30 2017/10/18 11:01:05 fhajny Exp $
+$NetBSD: distinfo,v 1.31 2017/11/30 22:19:36 fhajny Exp $
 
-SHA1 (rsyslog-8.30.0.tar.gz) = 59248ac00f5dd27a32bcb979cfa2bc6970f3e8aa
-RMD160 (rsyslog-8.30.0.tar.gz) = 5c394a8d5bfbb7d56287c57c0a51bff9972b0b0d
-SHA512 (rsyslog-8.30.0.tar.gz) = 90e172d08ba7548252fc9744f71259dadf5a40afef405516e7b1601620913ca4b2ffc4859b16f369b9c1974ea10f4e41bc2d987e3d6bf9aabeb979f7de6aefe0
-Size (rsyslog-8.30.0.tar.gz) = 2468224 bytes
+SHA1 (rsyslog-8.31.0.tar.gz) = c2bab629fd7ec5b852a42b9ffacc4f1e4dd90f8c
+RMD160 (rsyslog-8.31.0.tar.gz) = 1865f462afbac0b4bc28f116e86f0c64d87ce766
+SHA512 (rsyslog-8.31.0.tar.gz) = aab888dda8df3ad7ff404767a58539cdc0bb92d0e537b703cf5833555688dd6d8223889b8d70bf8c594339a51831b57df7a65b397d8b40cded608dfb007befe7
+Size (rsyslog-8.31.0.tar.gz) = 2498675 bytes
 SHA1 (patch-configure) = df356c47b6c19c96b923978a5b194724fc0f10ba
 SHA1 (patch-grammar_lexer.l) = 6de5aac9253ebcfae124f8dc3c7178446248f2b4
 SHA1 (patch-platform_redhat_rsyslog.conf) = b2fc1dbeb2b679b82d6c1a86ec1e4e72ef460433
 SHA1 (patch-plugins_imfile_imfile.c) = 65b56f6799e2b206e1a8c3d055a4e9dc22da88be
-SHA1 (patch-plugins_imgssapi_imgssapi.c) = 24128b085f3eaab99d92e679c3e58d3918f94a91
 SHA1 (patch-plugins_impstats_impstats.c) = a4eb7b8b9870271204d856c3a9e05fd24cee702b
 SHA1 (patch-plugins_imptcp_imptcp.c) = 47f7184acf0279df4117924108f961529b22a21e
 SHA1 (patch-plugins_imuxsock_imuxsock.c) = a3c682d5a2132cd4796893f286193259087223da
diff -r 7a2f9a1a794c -r b7ed7575bf78 sysutils/rsyslog/patches/patch-plugins_imgssapi_imgssapi.c
--- a/sysutils/rsyslog/patches/patch-plugins_imgssapi_imgssapi.c        Thu Nov 30 20:52:56 2017 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,119 +0,0 @@
-$NetBSD: patch-plugins_imgssapi_imgssapi.c,v 1.1 2017/10/18 11:01:05 fhajny Exp $
-
-Backport imgssapi fixes from upstream.
-https://github.com/rsyslog/rsyslog/pull/1855
-
---- plugins/imgssapi/imgssapi.c.orig   2017-07-02 11:02:11.000000000 +0000
-+++ plugins/imgssapi/imgssapi.c
-@@ -9,7 +9,7 @@
-  * NOTE: read comments in module-template.h to understand how this file
-  *       works!
-  *
-- * Copyright 2007, 2014 Rainer Gerhards and Adiscon GmbH.
-+ * Copyright 2007, 2017 Rainer Gerhards and Adiscon GmbH.
-  *
-  * This file is part of rsyslog.
-  *
-@@ -63,7 +63,6 @@
- 
- MODULE_TYPE_INPUT
- MODULE_TYPE_NOKEEP
--MODULE_CNFNAME("imgssapi")
- 
- /* defines */
- #define ALLOWEDMETHOD_GSS 2
-@@ -162,7 +161,7 @@ OnSessDestruct(void *ppUsr)
-               OM_uint32 maj_stat, min_stat;
-               maj_stat = gss_delete_sec_context(&min_stat, &(*ppGSess)->gss_context, GSS_C_NO_BUFFER);
-               if (maj_stat != GSS_S_COMPLETE)
--                      gssutil.display_status("deleting context", maj_stat, min_stat);
-+                      gssutil.display_status((char*)"deleting context", maj_stat, min_stat);
-       }
- 
-       free(*ppGSess);
-@@ -291,7 +290,7 @@ finalize_it:
- 
- 
- static rsRetVal
--doRcvData(tcps_sess_t *pSess, char *buf, size_t lenBuf, ssize_t *piLenRcvd)
-+doRcvData(tcps_sess_t *pSess, char *buf, size_t lenBuf, ssize_t *piLenRcvd, int *const oserr)
- {
-       DEFiRet;
-       int allowedMethods;
-@@ -307,7 +306,7 @@ doRcvData(tcps_sess_t *pSess, char *buf,
-               CHKiRet(TCPSessGSSRecv(pSess, buf, lenBuf, piLenRcvd));
-       } else {
-               *piLenRcvd = lenBuf;
--              CHKiRet(netstrm.Rcv(pSess->pStrm, (uchar*) buf, piLenRcvd) != RS_RET_OK);
-+              CHKiRet(netstrm.Rcv(pSess->pStrm, (uchar*) buf, piLenRcvd, oserr));
-       }
- 
- finalize_it:
-@@ -380,11 +379,11 @@ static int TCPSessGSSInit(void)
-       if (gss_server_creds != GSS_C_NO_CREDENTIAL)
-               return 0;
- 
--      name_buf.value = (gss_listen_service_name == NULL) ? "host" : gss_listen_service_name;
-+      name_buf.value = (gss_listen_service_name == NULL) ? (char*)"host" : gss_listen_service_name;
-       name_buf.length = strlen(name_buf.value) + 1;
-       maj_stat = gss_import_name(&min_stat, &name_buf, GSS_C_NT_HOSTBASED_SERVICE, &server_name);
-       if (maj_stat != GSS_S_COMPLETE) {
--              gssutil.display_status("importing name", maj_stat, min_stat);
-+              gssutil.display_status((char*)"importing name", maj_stat, min_stat);
-               return -1;
-       }
- 
-@@ -392,7 +391,7 @@ static int TCPSessGSSInit(void)
-                                   GSS_C_NULL_OID_SET, GSS_C_ACCEPT,
-                                   &gss_server_creds, NULL, NULL);
-       if (maj_stat != GSS_S_COMPLETE) {
--              gssutil.display_status("acquiring credentials", maj_stat, min_stat);
-+              gssutil.display_status((char*)"acquiring credentials", maj_stat, min_stat);
-               return -1;
-       }
- 
-@@ -549,7 +548,7 @@ OnSessAcceptGSS(tcpsrv_t *pThis, tcps_se
-                                       pGSess->allowedMethods = ALLOWEDMETHOD_TCP;
-                                       ABORT_FINALIZE(RS_RET_OK); // TODO: define good error codes
-                               }
--                              gssutil.display_status("accepting context", maj_stat, acc_sec_min_stat);
-+                              gssutil.display_status((char*)"accepting context", maj_stat, acc_sec_min_stat);
-                               ABORT_FINALIZE(RS_RET_ERR); // TODO: define good error codes
-                       }
-                       if (send_tok.length != 0) {
-@@ -566,7 +565,7 @@ OnSessAcceptGSS(tcpsrv_t *pThis, tcps_se
- 
-               maj_stat = gss_display_name(&min_stat, client, &recv_tok, NULL);
-               if (maj_stat != GSS_S_COMPLETE) {
--                      gssutil.display_status("displaying name", maj_stat, min_stat);
-+                      gssutil.display_status((char*)"displaying name", maj_stat, min_stat);
-                 } else {
-                       dbgprintf("GSS-API Accepted connection from peer %s: %s\n", (char *)pszPeer, (char*) recv_tok.value);
-                 }
-@@ -608,7 +607,7 @@ int TCPSessGSSRecv(tcps_sess_t *pSess, v
-       maj_stat = gss_unwrap(&min_stat, *context, &xmit_buf, &msg_buf,
-                             &conf_state, (gss_qop_t *) NULL);
-       if(maj_stat != GSS_S_COMPLETE) {
--              gssutil.display_status("unsealing message", maj_stat, min_stat);
-+              gssutil.display_status((char*)"unsealing message", maj_stat, min_stat);
-               if(xmit_buf.value) {
-                       free(xmit_buf.value);
-                       xmit_buf.value = 0;
-@@ -644,7 +643,7 @@ void TCPSessGSSClose(tcps_sess_t* pSess)
-       context = &pGSess->gss_context;
-       maj_stat = gss_delete_sec_context(&min_stat, context, GSS_C_NO_BUFFER);
-       if (maj_stat != GSS_S_COMPLETE)
--              gssutil.display_status("deleting context", maj_stat, min_stat);
-+              gssutil.display_status((char*)"deleting context", maj_stat, min_stat);
-       *context = GSS_C_NO_CONTEXT;
-       pGSess->gss_flags = 0;
-       pGSess->allowedMethods = 0;
-@@ -665,7 +664,7 @@ TCPSessGSSDeinit(void)
-       if (gss_server_creds != GSS_C_NO_CREDENTIAL) {
-               maj_stat = gss_release_cred(&min_stat, &gss_server_creds);
-               if (maj_stat != GSS_S_COMPLETE)
--                      gssutil.display_status("releasing credentials", maj_stat, min_stat);
-+                      gssutil.display_status((char*)"releasing credentials", maj_stat, min_stat);
-       }
-       RETiRet;
- }



Home | Main Index | Thread Index | Old Index