[Bug 266977] security/metasploit: Upgrade to 6.2.21

From: <bugzilla-noreply_at_freebsd.org>
Date: Wed, 12 Oct 2022 18:06:13 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266977

--- Comment #2 from Yonas Yanfa <yonas.yanfa@gmail.com> ---
Hi Fernando,

> Could you provide a patch? 

I cannot provide a patch, as I'm not interested in installing the ports
collection.


> Maintainers are notify when a new version of the software is available (unless we tell portscout otherwise) so there is usually no need to open a PR for that

I've found many ports that are not kept up-to-date and that creating a PR is
the best way to get the port updated.

If you're looking for a better solution, the FreeBSD ports infrastructure
should:

1. Automatically upgrade ports to the latest version without manual
intervention
2. Automatically test ports before publishing

#2 would require all port maintainers to create tests as a requirement for
approving new ports and avoiding deprecation of old ports.

Common automated test criteria could include:

1. `service <name> [enable/setup/start/stop]` all work.
2. If `service <name> setup` is required, it must be mentioned in the post
install message.
3. command-line program works - eg. `program --version` outputs a version
string.
4. HTTP REST APIs works, if present.
5. Built-in test suites run successfully.
6. A simple test program works - eg. creating accounts / databases / etc.

With these automated tests, we should be more confident in shipping packages
without the need for manual testing, which currently isn't happening
consistently, and keep up with faster release cycles.

-- 
You are receiving this mail because:
You are the assignee for the bug.