pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/doc doc/pkgsrc.*: regen



details:   https://anonhg.NetBSD.org/pkgsrc/rev/94bfb3e507df
branches:  trunk
changeset: 769154:94bfb3e507df
user:      gutteridge <gutteridge%pkgsrc.org@localhost>
date:      Mon Nov 08 22:26:32 2021 +0000

description:
doc/pkgsrc.*: regen

diffstat:

 doc/pkgsrc.html |  1369 ++++++++++++++++++++++---------------------------
 doc/pkgsrc.txt  |  1504 +++++++++++++++++++++++++++---------------------------
 2 files changed, 1360 insertions(+), 1513 deletions(-)

diffs (truncated from 3665 to 300 lines):

diff -r 2afff7621a74 -r 94bfb3e507df doc/pkgsrc.html
--- a/doc/pkgsrc.html   Mon Nov 08 22:21:33 2021 +0000
+++ b/doc/pkgsrc.html   Mon Nov 08 22:26:32 2021 +0000
@@ -8549,12 +8549,14 @@
     contain a list of scripts, relative to <code class="varname">WRKSRC</code>,
     that you want adjusted. Every occurrence of
     <code class="filename">*/bin/perl</code> in a she-bang line will be
-    replaced with the full path to the perl executable.</p>
-<p>If a particular version of perl is needed, set the
+    replaced with the full path to the Perl executable.</p>
+<p>If a particular version of Perl is needed, set the
     <code class="varname">PERL5_REQD</code> variable to the version number.  The
     default is <span class="quote">&#8220;<span class="quote">5.0</span>&#8221;</span>.</p>
 <p>See <a class="xref" href="#perl-modules" title="21.6.6. Packages installing Perl modules">Section 21.6.6, &#8220;Packages installing Perl modules&#8221;</a> for information
-    about handling perl modules.</p>
+    about handling Perl modules.</p>
+<p>There is also the <code class="varname">REPLACE_PERL6</code> variable
+    for the language now known as Raku.</p>
 </div>
 <div class="sect2">
 <div class="titlepage"><div><div><h3 class="title">
@@ -8574,7 +8576,19 @@
 <div class="sect2">
 <div class="titlepage"><div><div><h3 class="title">
 <a name="other-programming-languages"></a>21.4.6. Other programming languages</h3></div></div></div>
-<p>Currently, there is no special handling for other languages
+<p>There are further similar REPLACE variables available, e.g.,
+    <code class="varname">REPLACE_AWK</code> for packages containing awk scripts,
+    and <code class="varname">REPLACE_R</code> for R. These two, like the others
+    noted above, are defined centrally in
+    <code class="filename">mk/configure/replace-interpreter.mk</code>. Other
+    languages define these variables within their own dedicated part of
+    the tree, e.g., PHP defines <code class="varname">REPLACE_PHP</code> in
+    <code class="filename">lang/php/phpversion.mk</code>, and Python defines
+    <code class="varname">REPLACE_PYTHON</code> in
+    <code class="filename">lang/python/application.mk</code>. For other languages,
+    consult the mk files found within their specific directories (the
+    naming convention varies).</p>
+<p>Currently, special handling for other languages varies
     in pkgsrc.  If a compiler package provides a
     <code class="filename">buildlink3.mk</code> file, include that, otherwise
     just add a (build) dependency on the appropriate compiler
@@ -11023,36 +11037,6 @@
 <code class="varname">PKGSRC_MKPIE</code> was enabled by default after the pkgsrc-2021Q3 branch.
 </p>
 </div>
-<div class="sect3">
-<div class="titlepage"><div><div><h4 class="title">
-<a name="hardening.mechanisms.enabled.relro"></a>B.1.1.4. PKGSRC_USE_RELRO</h4></div></div></div>
-<p>
-This also makes the exploitation of some security vulnerabilities more
-difficult in some cases.
-</p>
-<p>Two different mitigation levels are available:</p>
-<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
-<li class="listitem"><p>
-partial: the ELF sections are reordered so that internal data sections
-precede the program's own data sections, and non-PLT GOT is read-only;
-</p></li>
-<li class="listitem"><p>
-full: in addition to partial RELRO, every relocation is performed immediately
-when starting the program (with a slight performance impact), allowing the
-entire GOT to be read-only.
-</p></li>
-</ul></div>
-<p>
-This is currently supported by GCC. Many software distributions now enable this
-feature by default, at the "partial" level.
-</p>
-<p>
-More details can be found here:
-</p>
-<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
-<a class="ulink" href="https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro"; target="_top">Hardening ELF binaries using Relocation Read-Only (RELRO)</a>
-</p></li></ul></div>
-</div>
 </div>
 <div class="sect2">
 <div class="titlepage"><div><div><h3 class="title">
@@ -11079,7 +11063,38 @@
 </div>
 <div class="sect3">
 <div class="titlepage"><div><div><h4 class="title">
-<a name="hardening.mechanisms.disabled.stackcheck"></a>B.1.2.2. PKGSRC_USE_STACK_CHECK</h4></div></div></div>
+<a name="hardening.mechanisms.enabled.relro"></a>B.1.2.2. PKGSRC_USE_RELRO</h4></div></div></div>
+<p>
+This also makes the exploitation of some security vulnerabilities more
+difficult in some cases.
+</p>
+<p>Two different mitigation levels are available:</p>
+<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
+<li class="listitem"><p>
+partial: the ELF sections are reordered so that internal data sections
+precede the program's own data sections, and non-PLT GOT is read-only;
+</p></li>
+<li class="listitem"><p>
+full: in addition to partial RELRO, every relocation is performed immediately
+when starting the program (with a slight performance impact), allowing the
+entire GOT to be read-only.
+</p></li>
+</ul></div>
+<p>
+This is currently supported by GCC. Many software distributions now enable this
+feature by default, at the "partial" level. However, it cannot yet be enforced
+globally in pkgsrc through cwrappers.
+</p>
+<p>
+More details can be found here:
+</p>
+<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
+<a class="ulink" href="https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro"; target="_top">Hardening ELF binaries using Relocation Read-Only (RELRO)</a>
+</p></li></ul></div>
+</div>
+<div class="sect3">
+<div class="titlepage"><div><div><h4 class="title">
+<a name="hardening.mechanisms.disabled.stackcheck"></a>B.1.2.3. PKGSRC_USE_STACK_CHECK</h4></div></div></div>
 <p>
 This uses <code class="literal">-fstack-check</code> with GCC for
 another stack protection mitigation.
@@ -11725,119 +11740,115 @@
 <td>ALL_ENV</td>
 </tr>
 <tr>
-<td>ALSA_PC</td>
 <td>ALTERNATIVES_SRC</td>
-</tr>
-<tr>
 <td>AMANDA_TMP</td>
+</tr>
+<tr>
 <td>AMANDA_USER</td>
-</tr>
-<tr>
 <td>AMANDA_VAR</td>
+</tr>
+<tr>
 <td>APACHE_GROUP</td>
-</tr>
-<tr>
 <td>APACHE_MODULE_NAME</td>
+</tr>
+<tr>
 <td>APACHE_MODULE_SRC</td>
-</tr>
-<tr>
 <td>APACHE_MODULE_SRCDIR</td>
+</tr>
+<tr>
 <td>APACHE_PKG_PREFIX</td>
-</tr>
-<tr>
 <td>APACHE_SUEXEC_CONFIGURE_ARGS</td>
+</tr>
+<tr>
 <td>APACHE_SUEXEC_DOCROOT</td>
-</tr>
-<tr>
 <td>APACHE_USER</td>
+</tr>
+<tr>
 <td>APPEND_ABI</td>
-</tr>
-<tr>
 <td>APPEND_ELF</td>
+</tr>
+<tr>
 <td>ARLA_CACHE</td>
-</tr>
-<tr>
 <td>AUDIT_PACKAGES_FLAGS</td>
+</tr>
+<tr>
 <td>AUTOCONF_REQD</td>
-</tr>
-<tr>
 <td>AUTOMAKE_OVERRIDE</td>
+</tr>
+<tr>
 <td>AUTOMAKE_REQD</td>
-</tr>
-<tr>
 <td>AUTO_MKDIRS</td>
+</tr>
+<tr>
 <td>BDB185_DEFAULT</td>
-</tr>
-<tr>
 <td>BDBBASE</td>
+</tr>
+<tr>
 <td>BDB_ACCEPTED</td>
-</tr>
-<tr>
 <td>BDB_DEFAULT</td>
+</tr>
+<tr>
 <td>BDB_LIBS</td>
-</tr>
-<tr>
 <td>BDB_TYPE</td>
+</tr>
+<tr>
 <td>BINCIMAP_GROUP</td>
-</tr>
-<tr>
 <td>BINCIMAP_USER</td>
+</tr>
+<tr>
 <td>BIND_DIR</td>
-</tr>
-<tr>
 <td>BIND_GROUP</td>
+</tr>
+<tr>
 <td>BIND_USER</td>
-</tr>
-<tr>
 <td>BINOWN</td>
+</tr>
+<tr>
 <td>BINPKG_SITES</td>
-</tr>
-<tr>
 <td>BIN_INSTALL_FLAGS</td>
+</tr>
+<tr>
 <td>BISON_PKGDATADIR</td>
-</tr>
-<tr>
 <td>BLAS</td>
+</tr>
+<tr>
 <td>BLAS_ACCEPTED</td>
-</tr>
-<tr>
 <td>BLAS_C_INTERFACE</td>
+</tr>
+<tr>
 <td>BLAS_INCLUDES</td>
-</tr>
-<tr>
 <td>BLAS_INDEX64</td>
+</tr>
+<tr>
 <td>BLAS_LIBS</td>
-</tr>
-<tr>
 <td>BLAS_TYPE</td>
+</tr>
+<tr>
 <td>BOOTSTRAP_DEPENDS</td>
-</tr>
-<tr>
 <td>BOOTSTRAP_SETUPTOOLS</td>
+</tr>
+<tr>
 <td>BROKEN</td>
-</tr>
-<tr>
 <td>BROKEN_EXCEPT_ON_PLATFORM</td>
+</tr>
+<tr>
 <td>BROKEN_ON_PLATFORM</td>
-</tr>
-<tr>
 <td>BSDSRCDIR</td>
+</tr>
+<tr>
 <td>BSDXSRCDIR</td>
-</tr>
-<tr>
 <td>BSD_MAKE_ENV</td>
+</tr>
+<tr>
 <td>BUILDLINK_AUTO_DIRS</td>
-</tr>
-<tr>
 <td>BUILDLINK_AUTO_VARS</td>
+</tr>
+<tr>
 <td>BUILDLINK_CFLAGS</td>
-</tr>
-<tr>
 <td>BUILDLINK_CONTENTS_FILTER</td>
+</tr>
+<tr>
 <td>BUILDLINK_CPPFLAGS</td>
-</tr>
-<tr>
-<td>BUILDLINK_DEPMETHOD</td>
 <td>BUILDLINK_FILES</td>
 </tr>
 <tr>
@@ -11929,100 +11940,88 @@
 <td>CDROM_PKG_URL_HOST</td>
 </tr>
 <tr>
-<td>CHECKOUT_DATE</td>
 <td>CHECK_COMPILER</td>
-</tr>



Home | Main Index | Thread Index | Old Index