pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/sysutils/rsyslog Update sysutils/rsyslog* to 8.31.0
details: https://anonhg.NetBSD.org/pkgsrc/rev/b7ed7575bf78
branches: trunk
changeset: 372259:b7ed7575bf78
user: fhajny <fhajny%pkgsrc.org@localhost>
date: Thu Nov 30 22:19:36 2017 +0000
description:
Update sysutils/rsyslog* to 8.31.0
- remove systemd embedded code, use libsystemd instead
- mmanon: add support for IPv6 adresses with embedded IPv4 address
- ommongodb: big refactoring, more or less a feature-enhanced rewrite
- rainerscript: add parse_time() function
- omelasticsearch: add pipeline support
- lmsig_ksi_ls12: support asynchronous mode of libksi
- omprog: added error handling and transaction support for external
plugins
- imzmq3/omzmq3: marked as deprecated, modules will be remove in v8.41
- imzmq3/omzmq3: fixed build issues with gcc-7
- core: emit error message on abnormal input thread termination
- core: refactored locking for json variable access
- core: refactored creation of UDP sockets
- core/dnscache: refactor locking
- rainerscript: use crypto-grade random number generator for random()
function
- imkafka: improve error reporting and cleanup refactoring
- imkafka bugfix: segfault if "broker" parameter is not specified
- omkafka: improve error reporting
- omkafka: slight speedup do to refactoring of LIST class
- TCP syslog: support SNI when connecting as a client
- msg variable bugfix: potential segfault on variable access
- ratelimiting bugfix: data race in Linux-like ratelimiter
- core/template bugfix: potential NULL pointer access at config load
- core/json var subsystem bugfix: segfault in MsgSetPropsViaJSON
- core/wrkr threads bugfix: race condition
- core/wtp: potential hang during shutdown
- omfwd bugfix: generate error message on connection failure
- imtcp bugfix: "streamdriver.mode" parameter could not be set to 0
- imjournal bugfix: module was defunctional
- imjournal: refactor error handling, fix error messages
-mmdblookup bugfix: fix potential segfault due to threading issues
- omkafka bugfixes
- kafka bugfix: problem on invalid kafka configuration values
- [io]mgssapi: fix build problems (regression from 8.30.0)
- [io]czmq: fix build problems on some platforms (namely gcc 7, clang
5)
- tcpsrv bugfix: potential hang during shutdown
- queue bugfix: potential hang during shutdown
- queue bugfix: NULL pointer dereference during config processing
- imczmq bugfix: segfault
- imfile: some small performance enhancements
- omfile: hande file open error via SUSPEND mode
- omfile bugfix: race during directory creation can lead to loop
- imudp: improve error reporting
- omrelp bugfix: incorrect error handling
- [io]mrelp bugfix: segfault on startup if configured cert not
readable
- mmanon fix: make build under gcc 7
- mmpstrucdata bugfix: formatting error of ']' char
- mmexternalb bugfix: memory leak
- core/stats bugfix: memory leak if sender stats or tracking are
enabled
- core bugfix: potential segfault during startup
- core bugfix: potential race in variable handling
- core bugfix: potential segfault when shutting down rsyslog
- core/action bugfix: potential misadressing when processing hard
errors
- template object bugfix: NULL pointer access on invalid parameters
- omjournal bugfix: NULL pointer access on invalid parameters
- omelasticsearch bugfix: configured credentials not used during
health check
- omelasticsearch bugfix: abort on unavailable ES server
- omelasticsearch: fix memory leak and potential misadressing
- omelasticsearch bugfix: output from libcurl to stdout
- iczmq bugfix: potential memory leak
- imptcp bugfix: potential misadressing
- imptcp: potential buffer overflow
- core/nsd_gtls: fix potential unitialized data access
- stats bugfix: potential program hang
- omfwd bugfix: memory leak if network namespaces are used
- core: potential misadressing when accessing JSON properties
- gcry crypto provider bugfixes: potential misadressing and memory
leak
- core/file stream object bugfix: memory leak
- imdiag bugfix: double mutex unlock when working with stats
- fixed several minor and cosmetic issues found by Coverty scan
- build: make compile warning-free under gcc 7
diffstat:
sysutils/rsyslog/Makefile.common | 4 +-
sysutils/rsyslog/distinfo | 11 +-
sysutils/rsyslog/patches/patch-plugins_imgssapi_imgssapi.c | 119 -------------
3 files changed, 7 insertions(+), 127 deletions(-)
diffs (164 lines):
diff -r 7a2f9a1a794c -r b7ed7575bf78 sysutils/rsyslog/Makefile.common
--- a/sysutils/rsyslog/Makefile.common Thu Nov 30 20:52:56 2017 +0000
+++ b/sysutils/rsyslog/Makefile.common Thu Nov 30 22:19:36 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile.common,v 1.32 2017/10/18 11:01:05 fhajny Exp $
+# $NetBSD: Makefile.common,v 1.33 2017/11/30 22:19:36 fhajny Exp $
# used by sysutils/rsyslog/Makefile
# used by sysutils/rsyslog-dbi/Makefile
# used by sysutils/rsyslog-elasticsearch/Makefile
@@ -13,7 +13,7 @@
.include "../../mk/bsd.prefs.mk"
-DISTNAME= rsyslog-8.30.0
+DISTNAME= rsyslog-8.31.0
CATEGORIES= sysutils
MASTER_SITES= http://www.rsyslog.com/files/download/rsyslog/
diff -r 7a2f9a1a794c -r b7ed7575bf78 sysutils/rsyslog/distinfo
--- a/sysutils/rsyslog/distinfo Thu Nov 30 20:52:56 2017 +0000
+++ b/sysutils/rsyslog/distinfo Thu Nov 30 22:19:36 2017 +0000
@@ -1,14 +1,13 @@
-$NetBSD: distinfo,v 1.30 2017/10/18 11:01:05 fhajny Exp $
+$NetBSD: distinfo,v 1.31 2017/11/30 22:19:36 fhajny Exp $
-SHA1 (rsyslog-8.30.0.tar.gz) = 59248ac00f5dd27a32bcb979cfa2bc6970f3e8aa
-RMD160 (rsyslog-8.30.0.tar.gz) = 5c394a8d5bfbb7d56287c57c0a51bff9972b0b0d
-SHA512 (rsyslog-8.30.0.tar.gz) = 90e172d08ba7548252fc9744f71259dadf5a40afef405516e7b1601620913ca4b2ffc4859b16f369b9c1974ea10f4e41bc2d987e3d6bf9aabeb979f7de6aefe0
-Size (rsyslog-8.30.0.tar.gz) = 2468224 bytes
+SHA1 (rsyslog-8.31.0.tar.gz) = c2bab629fd7ec5b852a42b9ffacc4f1e4dd90f8c
+RMD160 (rsyslog-8.31.0.tar.gz) = 1865f462afbac0b4bc28f116e86f0c64d87ce766
+SHA512 (rsyslog-8.31.0.tar.gz) = aab888dda8df3ad7ff404767a58539cdc0bb92d0e537b703cf5833555688dd6d8223889b8d70bf8c594339a51831b57df7a65b397d8b40cded608dfb007befe7
+Size (rsyslog-8.31.0.tar.gz) = 2498675 bytes
SHA1 (patch-configure) = df356c47b6c19c96b923978a5b194724fc0f10ba
SHA1 (patch-grammar_lexer.l) = 6de5aac9253ebcfae124f8dc3c7178446248f2b4
SHA1 (patch-platform_redhat_rsyslog.conf) = b2fc1dbeb2b679b82d6c1a86ec1e4e72ef460433
SHA1 (patch-plugins_imfile_imfile.c) = 65b56f6799e2b206e1a8c3d055a4e9dc22da88be
-SHA1 (patch-plugins_imgssapi_imgssapi.c) = 24128b085f3eaab99d92e679c3e58d3918f94a91
SHA1 (patch-plugins_impstats_impstats.c) = a4eb7b8b9870271204d856c3a9e05fd24cee702b
SHA1 (patch-plugins_imptcp_imptcp.c) = 47f7184acf0279df4117924108f961529b22a21e
SHA1 (patch-plugins_imuxsock_imuxsock.c) = a3c682d5a2132cd4796893f286193259087223da
diff -r 7a2f9a1a794c -r b7ed7575bf78 sysutils/rsyslog/patches/patch-plugins_imgssapi_imgssapi.c
--- a/sysutils/rsyslog/patches/patch-plugins_imgssapi_imgssapi.c Thu Nov 30 20:52:56 2017 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,119 +0,0 @@
-$NetBSD: patch-plugins_imgssapi_imgssapi.c,v 1.1 2017/10/18 11:01:05 fhajny Exp $
-
-Backport imgssapi fixes from upstream.
-https://github.com/rsyslog/rsyslog/pull/1855
-
---- plugins/imgssapi/imgssapi.c.orig 2017-07-02 11:02:11.000000000 +0000
-+++ plugins/imgssapi/imgssapi.c
-@@ -9,7 +9,7 @@
- * NOTE: read comments in module-template.h to understand how this file
- * works!
- *
-- * Copyright 2007, 2014 Rainer Gerhards and Adiscon GmbH.
-+ * Copyright 2007, 2017 Rainer Gerhards and Adiscon GmbH.
- *
- * This file is part of rsyslog.
- *
-@@ -63,7 +63,6 @@
-
- MODULE_TYPE_INPUT
- MODULE_TYPE_NOKEEP
--MODULE_CNFNAME("imgssapi")
-
- /* defines */
- #define ALLOWEDMETHOD_GSS 2
-@@ -162,7 +161,7 @@ OnSessDestruct(void *ppUsr)
- OM_uint32 maj_stat, min_stat;
- maj_stat = gss_delete_sec_context(&min_stat, &(*ppGSess)->gss_context, GSS_C_NO_BUFFER);
- if (maj_stat != GSS_S_COMPLETE)
-- gssutil.display_status("deleting context", maj_stat, min_stat);
-+ gssutil.display_status((char*)"deleting context", maj_stat, min_stat);
- }
-
- free(*ppGSess);
-@@ -291,7 +290,7 @@ finalize_it:
-
-
- static rsRetVal
--doRcvData(tcps_sess_t *pSess, char *buf, size_t lenBuf, ssize_t *piLenRcvd)
-+doRcvData(tcps_sess_t *pSess, char *buf, size_t lenBuf, ssize_t *piLenRcvd, int *const oserr)
- {
- DEFiRet;
- int allowedMethods;
-@@ -307,7 +306,7 @@ doRcvData(tcps_sess_t *pSess, char *buf,
- CHKiRet(TCPSessGSSRecv(pSess, buf, lenBuf, piLenRcvd));
- } else {
- *piLenRcvd = lenBuf;
-- CHKiRet(netstrm.Rcv(pSess->pStrm, (uchar*) buf, piLenRcvd) != RS_RET_OK);
-+ CHKiRet(netstrm.Rcv(pSess->pStrm, (uchar*) buf, piLenRcvd, oserr));
- }
-
- finalize_it:
-@@ -380,11 +379,11 @@ static int TCPSessGSSInit(void)
- if (gss_server_creds != GSS_C_NO_CREDENTIAL)
- return 0;
-
-- name_buf.value = (gss_listen_service_name == NULL) ? "host" : gss_listen_service_name;
-+ name_buf.value = (gss_listen_service_name == NULL) ? (char*)"host" : gss_listen_service_name;
- name_buf.length = strlen(name_buf.value) + 1;
- maj_stat = gss_import_name(&min_stat, &name_buf, GSS_C_NT_HOSTBASED_SERVICE, &server_name);
- if (maj_stat != GSS_S_COMPLETE) {
-- gssutil.display_status("importing name", maj_stat, min_stat);
-+ gssutil.display_status((char*)"importing name", maj_stat, min_stat);
- return -1;
- }
-
-@@ -392,7 +391,7 @@ static int TCPSessGSSInit(void)
- GSS_C_NULL_OID_SET, GSS_C_ACCEPT,
- &gss_server_creds, NULL, NULL);
- if (maj_stat != GSS_S_COMPLETE) {
-- gssutil.display_status("acquiring credentials", maj_stat, min_stat);
-+ gssutil.display_status((char*)"acquiring credentials", maj_stat, min_stat);
- return -1;
- }
-
-@@ -549,7 +548,7 @@ OnSessAcceptGSS(tcpsrv_t *pThis, tcps_se
- pGSess->allowedMethods = ALLOWEDMETHOD_TCP;
- ABORT_FINALIZE(RS_RET_OK); // TODO: define good error codes
- }
-- gssutil.display_status("accepting context", maj_stat, acc_sec_min_stat);
-+ gssutil.display_status((char*)"accepting context", maj_stat, acc_sec_min_stat);
- ABORT_FINALIZE(RS_RET_ERR); // TODO: define good error codes
- }
- if (send_tok.length != 0) {
-@@ -566,7 +565,7 @@ OnSessAcceptGSS(tcpsrv_t *pThis, tcps_se
-
- maj_stat = gss_display_name(&min_stat, client, &recv_tok, NULL);
- if (maj_stat != GSS_S_COMPLETE) {
-- gssutil.display_status("displaying name", maj_stat, min_stat);
-+ gssutil.display_status((char*)"displaying name", maj_stat, min_stat);
- } else {
- dbgprintf("GSS-API Accepted connection from peer %s: %s\n", (char *)pszPeer, (char*) recv_tok.value);
- }
-@@ -608,7 +607,7 @@ int TCPSessGSSRecv(tcps_sess_t *pSess, v
- maj_stat = gss_unwrap(&min_stat, *context, &xmit_buf, &msg_buf,
- &conf_state, (gss_qop_t *) NULL);
- if(maj_stat != GSS_S_COMPLETE) {
-- gssutil.display_status("unsealing message", maj_stat, min_stat);
-+ gssutil.display_status((char*)"unsealing message", maj_stat, min_stat);
- if(xmit_buf.value) {
- free(xmit_buf.value);
- xmit_buf.value = 0;
-@@ -644,7 +643,7 @@ void TCPSessGSSClose(tcps_sess_t* pSess)
- context = &pGSess->gss_context;
- maj_stat = gss_delete_sec_context(&min_stat, context, GSS_C_NO_BUFFER);
- if (maj_stat != GSS_S_COMPLETE)
-- gssutil.display_status("deleting context", maj_stat, min_stat);
-+ gssutil.display_status((char*)"deleting context", maj_stat, min_stat);
- *context = GSS_C_NO_CONTEXT;
- pGSess->gss_flags = 0;
- pGSess->allowedMethods = 0;
-@@ -665,7 +664,7 @@ TCPSessGSSDeinit(void)
- if (gss_server_creds != GSS_C_NO_CREDENTIAL) {
- maj_stat = gss_release_cred(&min_stat, &gss_server_creds);
- if (maj_stat != GSS_S_COMPLETE)
-- gssutil.display_status("releasing credentials", maj_stat, min_stat);
-+ gssutil.display_status((char*)"releasing credentials", maj_stat, min_stat);
- }
- RETiRet;
- }
Home |
Main Index |
Thread Index |
Old Index