Compare commits

..

17 Commits

Author SHA1 Message Date
47c6aeb262 In the ports 2026-03-11 06:18:41 +01:00
3560db62c2 Commited 2026-03-11 06:17:29 +01:00
4e056bc4d0 Mutch better patch 2026-03-11 05:58:17 +01:00
5e29228dd8 Fix 2026-03-10 08:39:37 +01:00
9ba4be7db6 Fix ? 2026-03-10 07:53:55 +01:00
402ae5a76c Fix patch 2026-03-10 05:04:11 +01:00
5becfb282e Update 2026-03-09 04:17:32 +01:00
7c7a4a2829 Samba from porttree 2026-03-09 04:14:25 +01:00
ee69413b60 Pushed into ports 2026-02-02 08:27:20 +01:00
12dab337fc Fix 2026-02-02 06:28:00 +01:00
ae789646ba Update 2026-02-02 06:24:21 +01:00
9e209cbad4 fix mython 2026-02-02 06:02:49 +01:00
c6d1e6923e Remove install_files.txt 2026-02-02 05:39:57 +01:00
2b6ea51495 Update 2026-02-02 05:36:59 +01:00
d6276edc2d Test 2026-02-02 05:32:37 +01:00
c626083a7c Update 2026-02-02 04:20:36 +01:00
e3375b8f0c Sync with freebsd tree 2026-02-02 04:20:02 +01:00
11 changed files with 0 additions and 466 deletions

View File

@ -1,68 +0,0 @@
PORTNAME= etcd
DISTVERSIONPREFIX= v
DISTVERSION= 3.5.26
CATEGORIES= devel
MASTER_SITES= https://raw.githubusercontent.com/etcd-io/${PORTNAME}/${DISTVERSIONFULL}/:gomod
PKGNAMEPREFIX= coreos-
PKGNAMESUFFIX= 35
DISTFILES= go.mod:gomod \
api/go.mod:gomod \
pkg/go.mod:gomod \
client/pkg/go.mod:gomod \
client/v2/go.mod:gomod \
client/v3/go.mod:gomod \
etcdctl/go.mod:gomod \
etcdutl/go.mod:gomod \
raft/go.mod:gomod \
server/go.mod:gomod \
tests/go.mod:gomod
MAINTAINER= kiwi@FreeBSD.org
COMMENT= Highly-available key value store and service discovery
WWW= https://github.com/coreos/etcd
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE
USES= cpe go:modules
USE_GITHUB= yes
GH_ACCOUNT= etcd-io
GO_MODULE= go.etcd.io/etcd/v3
GO_MOD_DIST= github
GO_TARGET= ./etcdctl ./etcdutl ./server
CONFLICTS_INSTALL= coreos-etcd[0-9][0-9]
PLIST_FILES= bin/etcd \
bin/etcdctl \
bin/etcdutl
# This target is based on the post-extract target from Uses/go.mk
post-extract:
.for gt in ${GO_TARGET:T}
@${ECHO_MSG} "===> Tidying ${GO_MODNAME} dependencies";
@(cd ${GO_WRKSRC}/${gt}; ${SETENVI} ${WRK_ENV} ${MAKE_ENV} ${GO_ENV} GOPROXY=${GO_MODCACHE} ${GO_CMD} mod tidy -e)
@${ECHO_MSG} "===> Vendoring ${GO_MODNAME} dependencies";
@(cd ${GO_WRKSRC}/${gt}; ${SETENVI} ${WRK_ENV} ${MAKE_ENV} ${GO_ENV} GOPROXY=${GO_MODCACHE} ${GO_CMD} mod vendor -e)
.endfor
# This target is based on the do-build target from Uses/go.mk.
do-build:
.for gt in ${GO_TARGET:T}
(cd ${GO_WRKSRC}/${gt}; \
for t in ${gt}; do \
out=$$(${BASENAME} $$(${ECHO_CMD} $${t} | \
${SED} -Ee 's/^[^:]*:([^:]+).*$$/\1/' -e 's/^\.$$/${PORTNAME}/')); \
pkg=$$(${ECHO_CMD} $${t} | \
${SED} -Ee 's/^([^:]*).*$$/\1/' -e 's/^${PORTNAME}$$/./'); \
${ECHO_MSG} "===> Building $${out} from $${pkg}"; \
${SETENVI} ${WRK_ENV} ${MAKE_ENV} ${GO_ENV} GOMAXPROCS=${MAKE_JOBS_NUMBER} GOPROXY=off ${GO_CMD} build ${GO_BUILDFLAGS} \
-o ${GO_WRKDIR_BIN}/$${out} \
.; \
done)
.endfor
post-install:
${MV} ${STAGEDIR}${PREFIX}/bin/server ${STAGEDIR}${PREFIX}/bin/etcd
.include <bsd.port.mk>

View File

@ -1,25 +0,0 @@
TIMESTAMP = 1767600087
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/go.mod) = 259b5d235087b4b196b8723d6d76f8f235244c513d2eec9160be91273171cc01
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/go.mod) = 4289
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/api/go.mod) = e08d87256f2abaa2488b224f5bd4cb135b5fc368741d9d2df89af61596fcbaa6
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/api/go.mod) = 1073
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/pkg/go.mod) = ec803edc2f0360d7fc57f72a6af2cb59428dc4b706bd81c19f56a47ae188f7c0
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/pkg/go.mod) = 1128
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/client/pkg/go.mod) = b997020331b654c1bd479cc18adf7220b0bbbd6125651c73d90d37caa8ea1c74
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/client/pkg/go.mod) = 439
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/client/v2/go.mod) = 4ad9c8f97a4fc4e0d1e1f16114ecfa88281a00c53444395b24f6c143dfc5b5d2
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/client/v2/go.mod) = 764
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/client/v3/go.mod) = 9c8b1e45fce0f317ff7cabb549e051616e3af954ecfb4b131c78a0d5b3770b20
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/client/v3/go.mod) = 1744
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/etcdctl/go.mod) = d30c9795ca3023869415c9ac05b642d7bdb6754817c9498d373af40773cdd019
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/etcdctl/go.mod) = 3521
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/etcdutl/go.mod) = 5f65ab9720b8661111bad6b807a8b19b5bfe00d3ed8f54f3b9bf6318f7f68481
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/etcdutl/go.mod) = 3184
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/raft/go.mod) = 164968c9894d4e5928e14d6d8a05dd8f5d93be76793d3d094a1df75fdd969849
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/raft/go.mod) = 646
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/server/go.mod) = 9ddc91943a12c72ff38ac8fd13979cf84776856f4ea12beee52c493bab4e76b6
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/server/go.mod) = 3877
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/tests/go.mod) = bf21b04efec206912ab6983c49265c3fca9d9bfd1e7b9148974e13bb65c09ab9
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/tests/go.mod) = 4035
SHA256 (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/etcd-io-etcd-v3.5.26_GH0.tar.gz) = 7e1d05825b52c66cb82b1f42aadb5fda5f11c6628d7411989ab67f0c91ff3935
SIZE (go/devel_etcd35/etcd-io-etcd-v3.5.26_GH0/etcd-io-etcd-v3.5.26_GH0.tar.gz) = 4145585

View File

@ -1,11 +0,0 @@
A highly-available key value store for shared
configuration and service discovery. etcd is
inspired by zookeeper and doozer, with a focus on:
* Simple: curl'able user facing API (HTTP+JSON)
* Secure: optional SSL client cert authentication
* Fast: benchmarked 1000s of writes/s per instance
* Reliable: Properly distributed using Raft
Etcd is written in Go and uses the raft consensus
algorithm to manage a highly-available replicated log.

View File

@ -1,60 +0,0 @@
PORTNAME= ca_root_nss
PORTVERSION= ${VERSION_NSS}
PORTREVISION= 4
CATEGORIES= security
MASTER_SITES= MOZILLA/security/nss/releases/${DISTNAME:tu:C/[-.]/_/g}_RTM/src
DISTNAME= nss-${VERSION_NSS}${NSS_SUFFIX}
MAINTAINER= ports-secteam@FreeBSD.org
COMMENT= Root certificate bundle from the Mozilla Project
LICENSE= MPL20
LICENSE_FILE= ${WRKSRC}/COPYING
USES= perl5 ssl:build
USE_PERL5= build
NO_ARCH= yes
WRKSRC_SUBDIR= nss
OPTIONS_DEFINE= ETCSYMLINK
OPTIONS_DEFAULT= ETCSYMLINK
OPTIONS_EXCLUDE_FreeBSD_15= ETCSYMLINK
OPTIONS_EXCLUDE_FreeBSD_16= ETCSYMLINK
OPTIONS_SUB= yes
ETCSYMLINK_DESC= Add symlinks to default bundle locations
ETCSYMLINK_CONFLICTS_INSTALL= ca-roots-[0-9]*
CERTDIR?= share/certs
PLIST_SUB+= CERTDIR=${CERTDIR}
VERSION_NSS= 3.115
CERTDATA_TXT_PATH= lib/ckfw/builtins/certdata.txt
BUNDLE_PROCESSOR= MAca-bundle.pl
CERTCTL_CMD?= /usr/sbin/certctl
SUB_FILES= MAca-bundle.pl pkg-deinstall pkg-install pkg-message
SUB_LIST= CERTCTL_CMD=${CERTCTL_CMD} VERSION_NSS=${VERSION_NSS}
do-build:
@${SETENV} PATH=${LOCALBASE}/bin:$${PATH} \
${PERL} ${WRKDIR}/${BUNDLE_PROCESSOR} \
< ${WRKSRC}/${CERTDATA_TXT_PATH} > \
${WRKDIR}/ca-root-nss.crt
do-install:
${MKDIR} ${STAGEDIR}${PREFIX}/${CERTDIR}
${INSTALL_DATA} ${WRKDIR}/ca-root-nss.crt ${STAGEDIR}${PREFIX}/${CERTDIR}
${MKDIR} ${STAGEDIR}${PREFIX}/etc/ssl
${LN} -sf ../../${CERTDIR}/ca-root-nss.crt ${STAGEDIR}${PREFIX}/etc/ssl/cert.pem.sample
do-install-ETCSYMLINK-on:
${MKDIR} ${STAGEDIR}${PREFIX}/openssl
${LN} -sf ../etc/ssl/cert.pem ${STAGEDIR}${PREFIX}/openssl/cert.pem
${MKDIR} ${STAGEDIR}/etc/ssl
${LN} -sf ../..${PREFIX}/etc/ssl/cert.pem ${STAGEDIR}/etc/ssl/cert.pem
.include <bsd.port.mk>

View File

@ -1,3 +0,0 @@
TIMESTAMP = 1755292668
SHA256 (nss-3.115.tar.gz) = ac2a47fb33bd79320159144e01c0d4af9a937a2d928c7c77ff06f5d9507861ab
SIZE (nss-3.115.tar.gz) = 76656357

View File

@ -1,250 +0,0 @@
##
## MAca-bundle.pl -- Regenerate ca-root-nss.crt from the Mozilla certdata.txt
##
## Rewritten in September 2011 by Matthias Andree to heed untrust
##
## Copyright (c) 2011, 2013 Matthias Andree <mandree@FreeBSD.org>
## All rights reserved.
##
## Redistribution and use in source and binary forms, with or without
## modification, are permitted provided that the following conditions are
## met:
##
## * Redistributions of source code must retain the above copyright
## notice, this list of conditions and the following disclaimer.
##
## * Redistributions in binary form must reproduce the above copyright
## notice, this list of conditions and the following disclaimer in the
## documentation and/or other materials provided with the distribution.
##
## THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
## "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
## LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
## FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
## COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
## INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
## BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
## LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
## CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
## LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
## ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
## POSSIBILITY OF SUCH DAMAGE.
use strict;
use Carp;
use MIME::Base64;
# configuration
print <<EOH;
##
## ca-root-nss.crt -- Bundle of CA Root Certificates
##
## This is a bundle of X.509 certificates of public Certificate
## Authorities (CA). These were automatically extracted from Mozilla's
## root CA list (the file `certdata.txt').
##
## It contains certificates trusted for server authentication.
##
## Extracted from nss-%%VERSION_NSS%%
##
EOH
my $debug = 0;
$debug++
if defined $ENV{'WITH_DEBUG'}
and $ENV{'WITH_DEBUG'} !~ m/(?i)^(no|0|false|)$/;
my %certs;
my %trusts;
# returns a string like YYMMDDhhmmssZ of current time in GMT zone
sub timenow()
{
my ($sec,$min,$hour,$mday,$mon,$year,undef,undef,undef) = gmtime(time);
return sprintf "%02d%02d%02d%02d%02d%02dZ", $year-100, $mon+1, $mday, $hour, $min, $sec;
}
sub printcert_plain($$)
{
my ($label, $certdata) = @_;
print "=== $label ===\n" if $label;
print
"-----BEGIN CERTIFICATE-----\n",
MIME::Base64::encode_base64($certdata),
"-----END CERTIFICATE-----\n\n";
}
sub printcert_info($$)
{
my (undef, $certdata) = @_;
return unless $certdata;
open(OUT, "|openssl x509 -text -inform DER -fingerprint")
|| die "could not pipe to openssl x509";
print OUT $certdata;
close(OUT) or die "openssl x509 failed with exit code $?";
}
sub printcert($$) {
my ($a, $b) = @_;
printcert_info($a, $b);
}
# converts a datastream that is to be \177-style octal constants
# from <> to a (binary) string and returns it
sub graboct()
{
my $data;
while (<>) {
last if /^END/;
my (undef,@oct) = split /\\/;
my @bin = map(chr(oct), @oct);
$data .= join('', @bin);
}
return $data;
}
sub grabcert()
{
my $certdata;
my $cka_label = '';
my $serial = 0;
my $distrust = 0;
while (<>) {
chomp;
last if ($_ eq '');
if (/^CKA_LABEL UTF8 "([^"]+)"/) {
$cka_label = $1;
}
if (/^CKA_VALUE MULTILINE_OCTAL/) {
$certdata = graboct();
}
if (/^CKA_SERIAL_NUMBER MULTILINE_OCTAL/) {
$serial = graboct();
}
if (/^CKA_NSS_SERVER_DISTRUST_AFTER MULTILINE_OCTAL/)
{
my $distrust_after = graboct();
my $time_now = timenow();
if ($time_now >= $distrust_after) { $distrust = 1; }
if ($debug) {
printf STDERR "line $.: $cka_label ser #%d: distrust after %s, now: %s -> distrust $distrust\n", $serial, $distrust_after, timenow();
}
if ($distrust) {
return undef;
}
}
}
return ($serial, $cka_label, $certdata);
}
sub grabtrust() {
my $cka_label;
my $serial;
my $maytrust = 0;
my $distrust = 0;
while (<>) {
chomp;
last if ($_ eq '');
if (/^CKA_LABEL UTF8 "([^"]+)"/) {
$cka_label = $1;
}
if (/^CKA_SERIAL_NUMBER MULTILINE_OCTAL/) {
$serial = graboct();
}
if (/^CKA_TRUST_SERVER_AUTH CK_TRUST (\S+)$/)
{
if ($1 eq 'CKT_NSS_NOT_TRUSTED') {
$distrust = 1;
} elsif ($1 eq 'CKT_NSS_TRUSTED_DELEGATOR') {
$maytrust = 1;
} elsif ($1 ne 'CKT_NSS_MUST_VERIFY_TRUST') {
confess "Unknown trust setting on line $.:\n"
. "$_\n"
. "Script must be updated:";
}
}
}
if (!$maytrust && !$distrust && $debug) {
print STDERR "line $.: no explicit trust/distrust found for $cka_label\n";
}
my $trust = ($maytrust and not $distrust);
return ($serial, $cka_label, $trust);
}
my $untrusted = 0;
while (<>) {
if (/^CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE/) {
my ($serial, $label, $certdata) = grabcert();
if (defined $certs{$label."\0".$serial}) {
warn "Certificate $label duplicated!\n";
}
if (defined $certdata) {
$certs{$label."\0".$serial} = $certdata;
} else { # $certdata undefined? distrust_after in effect
$untrusted ++;
}
} elsif (/^CKA_CLASS CK_OBJECT_CLASS CKO_NSS_TRUST/) {
my ($serial, $label, $trust) = grabtrust();
if (defined $trusts{$label."\0".$serial}) {
warn "Trust for $label duplicated!\n";
}
$trusts{$label."\0".$serial} = $trust;
} elsif (/^CVS_ID.*Revision: ([^ ]*).*/) {
print "## Source: \"certdata.txt\" CVS revision $1\n##\n\n";
}
}
sub printlabel(@) {
my @res = @_;
map { s/\0.*//; s/[^[:print:]]/_/g; "\"$_\""; } @res;
return wantarray ? @res : $res[0];
}
# weed out untrusted certificates
foreach my $it (keys %trusts) {
if (!$trusts{$it}) {
if (!exists($certs{$it})) {
warn "Found trust for nonexistent certificate ".printlabel($it)."\n" if $debug;
} else {
delete $certs{$it};
warn "Skipping untrusted ".printlabel($it)."\n" if $debug;
$untrusted++;
}
}
}
print "## Untrusted certificates omitted from this bundle: $untrusted\n\n";
print STDERR "## Untrusted certificates omitted from this bundle: $untrusted\n";
my $certcount = 0;
foreach my $it (sort {uc($a) cmp uc($b)} keys %certs) {
if (!exists($trusts{$it})) {
die "Found certificate without trust block,\naborting";
}
printcert("", $certs{$it});
print "\n\n\n";
$certcount++;
print STDERR "Trusting $certcount: ".printlabel($it)."\n" if $debug;
}
if ($certcount < 25) {
die "Certificate count of $certcount is implausibly low.\nAbort";
}
print "## Number of certificates: $certcount\n";
print STDERR "## Number of certificates: $certcount\n";
print "## End of file.\n";

View File

@ -1,6 +0,0 @@
#!/bin/sh
if [ "$2" = POST-DEINSTALL ]; then
CERTCTL_ARGS="-D ${PKG_ROOTDIR}"
%%CERTCTL_CMD%% ${CERTCTL_ARGS} rehash
fi

View File

@ -1,12 +0,0 @@
#!/bin/sh
if [ "$2" = POST-INSTALL ]; then
CERTCTL_ARGS="-D ${PKG_ROOTDIR}"
if [ -n "${PKG_METALOG}" ]; then
CERTCTL_ARGS="${CERTCTL_ARGS} -U -M ${PKG_METALOG}"
fi
%%CERTCTL_CMD%% ${CERTCTL_ARGS} rehash
[ ! -e %%LOCALBASE%%/bin/cert-sync ] || \
%%LOCALBASE%%/bin/cert-sync --quiet %%PREFIX%%/share/certs/ca-root-nss.crt
fi

View File

@ -1,23 +0,0 @@
[
{ type: install
message: <<EOM
FreeBSD does not, and can not warrant that the certification authorities
whose certificates are included in this package have in any way been
audited for trustworthiness or RFC 3647 compliance.
Assessment and verification of trust is the complete responsibility of
the system administrator.
This package installs symlinks to support root certificate discovery
for software that either uses other cryptographic libraries than
OpenSSL, or use OpenSSL but do not follow recommended practice.
If you prefer to do this manually, replace the following symlinks with
either an empty file or your site-local certificate bundle.
* /etc/ssl/cert.pem
* %%PREFIX%%/etc/ssl/cert.pem
* %%PREFIX%%/openssl/cert.pem
EOM
}
]

View File

@ -1,4 +0,0 @@
Root certificates from certificate authorities included in the Mozilla
NSS library and thus in Firefox and Thunderbird.
This port directly tracks the version of NSS in the security/nss port.

View File

@ -1,4 +0,0 @@
%%CERTDIR%%/ca-root-nss.crt
@sample etc/ssl/cert.pem.sample
%%ETCSYMLINK%%openssl/cert.pem
%%ETCSYMLINK%%/etc/ssl/cert.pem