Re: UPDATE: www/kibana + NEW: www/kibana-oss

2018-08-23 Thread Jasper Lievisse Adriaanse
On 2018-08-23 23:53, Stuart Henderson wrote: On 2018/08/23 01:01, Pavel Korovin wrote: On 08/20, Stuart Henderson wrote: > You could do this via quirks with naming like *-oss and *-nonfree > and have a "rename elastic -> elastic-oss" quirk, but I think (even if > we aren't providing ftp packages

arm bulk build report

2018-08-23 Thread phessler
bulk build on armv7-0.ports.openbsd.org started on Sun Aug 12 08:36:23 MDT 2018 finished at Fri Aug 24 00:31:49 MDT 2018 lasted 12D08h55m done with kern.version=OpenBSD 6.4-beta (GENERIC) #33: Sat Aug 11 10:34:48 MDT 2018 built packages:8347 Aug 12:244 Aug 13:198 Aug 14:307 Aug 15:143 Aug 16:286

Re: [UPDATE] x11/py-qtpy 1.2.1 -> 1.4.2

2018-08-23 Thread Elias M. Mariani
Maybe the REVISION bump is not needed. Given that It doesn't affect the package. Cheers. Elias. 2018-08-24 2:11 GMT-03:00 Elias M. Mariani : > I was running the test from the ${WRKSRC} directory, that seemed to be > the problem. > Attached a REVISION. > With test, using TEST_IS_INTERACTIVE = X11.

Re: [UPDATE] x11/py-qtpy 1.2.1 -> 1.4.2

2018-08-23 Thread Elias M. Mariani
I was running the test from the ${WRKSRC} directory, that seemed to be the problem. Attached a REVISION. With test, using TEST_IS_INTERACTIVE = X11. Cheers. Elias. 2018-08-23 18:26 GMT-03:00 Stuart Henderson : > On 2018/08/23 17:48, Elias M. Mariani wrote: >> Thanks Stuart. >> How did you run the

Re: UPDATE: www/kibana + NEW: www/kibana-oss

2018-08-23 Thread Stuart Henderson
On 2018/08/23 01:01, Pavel Korovin wrote: > On 08/20, Stuart Henderson wrote: > > You could do this via quirks with naming like *-oss and *-nonfree > > and have a "rename elastic -> elastic-oss" quirk, but I think (even if > > we aren't providing ftp packages) that it can't be done while keeping >

Re: [UPDATE] x11/py-qtpy 1.2.1 -> 1.4.2

2018-08-23 Thread Stuart Henderson
On 2018/08/23 17:48, Elias M. Mariani wrote: > Thanks Stuart. > How did you run the tests? > I tried and got errors using py-test-cov and runtests.py or "Ran 0 > tests" using the default. Installed py-qt5 and did this: $ cd qtpy/tests $ py.test tes

Re: UPDATE: sysutils/krename (Replacement for sysutils/krename-kde4)

2018-08-23 Thread Stuart Henderson
On 2018/08/23 15:30, Rafael Sadowski wrote: > Hi All, > > really simple replacement for a KDE4 port. Works fine on amd64 and all > the test is green. > > ok to replace and adjust meta/kde4? OK, note that sysutils/krename existed previously so if you use 'cvs import' you will need to merge.

Re: [UPDATE] x11/py-qtpy 1.2.1 -> 1.4.2

2018-08-23 Thread Elias M. Mariani
Thanks Stuart. How did you run the tests? I tried and got errors using py-test-cov and runtests.py or "Ran 0 tests" using the default. Cheers. 2018-08-23 17:28 GMT-03:00 Stuart Henderson : > On 2018/08/23 17:09, Elias M. Mariani wrote: >> - Changelog: >> https://github.com/spyder-ide/qtpy/blob/ma

Re: [UPDATE] x11/py-qtpy 1.2.1 -> 1.4.2

2018-08-23 Thread Stuart Henderson
On 2018/08/23 17:09, Elias M. Mariani wrote: > - Changelog: > https://github.com/spyder-ide/qtpy/blob/master/CHANGELOG.md > > - Mainly additions and bug fixes, fixes many issues experienced with > porting devel/spyder. > - Only consumer: x11/py-qtawesome with no consumers. (Until > devel/spyder ge

[UPDATE] x11/py-qtpy 1.2.1 -> 1.4.2

2018-08-23 Thread Elias M. Mariani
- Changelog: https://github.com/spyder-ide/qtpy/blob/master/CHANGELOG.md - Mainly additions and bug fixes, fixes many issues experienced with porting devel/spyder. - Only consumer: x11/py-qtawesome with no consumers. (Until devel/spyder gets committed) - Taking maintainership. (already talked with

UPDATE: sysutils/krename (Replacement for sysutils/krename-kde4)

2018-08-23 Thread Rafael Sadowski
Hi All, really simple replacement for a KDE4 port. Works fine on amd64 and all the test is green. ok to replace and adjust meta/kde4? krename-5.0.0.tar.gz Description: Binary data

lang/rust-<1.22: CVE-2018-1000657

2018-08-23 Thread Sebastien Marie
Hi, The Rust standard library has a vulnerability (Buffer Overflow) which has corrected in 1.22.0. OpenBSD 6.2 ships a vulnerable version (1.20.0). Others OpenBSD versions are fine (6.3: 1.24.0 / -current: 1.28.0). https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000657 https://github.c