svn commit: r414499 - in head/security/py-kerberos: . files
Dan Langille
dvl at FreeBSD.org
Tue May 3 00:46:44 UTC 2016
Author: dvl
Date: Tue May 3 00:46:42 2016
New Revision: 414499
URL: https://svnweb.freebsd.org/changeset/ports/414499
Log:
Upgrade to 1.2.4
Fixed bug noticed by John W. O'Brien <john at saltant.com>
PR: 204185
Submitted by: David Shane Holden <dpejesh at yahoo.com>
Modified:
head/security/py-kerberos/Makefile
head/security/py-kerberos/distinfo
head/security/py-kerberos/files/extra-patch-src_kerberosgss.c
Modified: head/security/py-kerberos/Makefile
==============================================================================
--- head/security/py-kerberos/Makefile Tue May 3 00:40:04 2016 (r414498)
+++ head/security/py-kerberos/Makefile Tue May 3 00:46:42 2016 (r414499)
@@ -2,8 +2,7 @@
# $FreeBSD$
PORTNAME= kerberos
-PORTVERSION= 1.1.1
-PORTREVISION= 2
+PORTVERSION= 1.2.4
CATEGORIES= security python
MASTER_SITES= CHEESESHOP
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
@@ -32,7 +31,7 @@ GSSAPI_BASE_EXTRA_PATCHES= ${PATCHDIR}/e
GSSAPI_HEIMDAL_EXTRA_PATCHES= ${GSSAPI_BASE_EXTRA_PATCHES}
post-patch:
- @${REINPLACE_CMD} -e 's|commands.getoutput("krb5-config|commands.getoutput("${GSSAPIBASEDIR}/bin/krb5-config|g' ${WRKSRC}/setup.py
+ @${REINPLACE_CMD} -e 's|getoutput("krb5-config|getoutput("${GSSAPIBASEDIR}/bin/krb5-config|g' ${WRKSRC}/setup.py
post-install:
${STRIP_CMD} ${STAGEDIR}${PYTHONPREFIX_SITELIBDIR}/kerberos.so
Modified: head/security/py-kerberos/distinfo
==============================================================================
--- head/security/py-kerberos/distinfo Tue May 3 00:40:04 2016 (r414498)
+++ head/security/py-kerberos/distinfo Tue May 3 00:46:42 2016 (r414499)
@@ -1,2 +1,2 @@
-SHA256 (kerberos-1.1.1.tar.gz) = 09132e3b2027854e8714894546aff11f31e6051eb75513e774948e10a5dde6f5
-SIZE (kerberos-1.1.1.tar.gz) = 15343
+SHA256 (kerberos-1.2.4.tar.gz) = d6f49923bbcf4ebc47ae47b7ceac7866543200669e1dfb24821221da3e940987
+SIZE (kerberos-1.2.4.tar.gz) = 19615
Modified: head/security/py-kerberos/files/extra-patch-src_kerberosgss.c
==============================================================================
--- head/security/py-kerberos/files/extra-patch-src_kerberosgss.c Tue May 3 00:40:04 2016 (r414498)
+++ head/security/py-kerberos/files/extra-patch-src_kerberosgss.c Tue May 3 00:46:42 2016 (r414499)
@@ -1,6 +1,6 @@
---- src/kerberosgss.c.orig 2015-03-29 03:40:20 UTC
+--- src/kerberosgss.c.orig 2016-01-25 17:51:33 UTC
+++ src/kerberosgss.c
-@@ -38,7 +38,7 @@ char* server_principal_details(const cha
+@@ -43,7 +43,7 @@ char* server_principal_details(const cha
int code;
krb5_context kcontext;
krb5_keytab kt = NULL;
@@ -9,9 +9,9 @@
krb5_keytab_entry entry;
char* pname = NULL;
-@@ -81,13 +81,13 @@ char* server_principal_details(const cha
- {
- result = malloc(strlen(pname) + 1);
+@@ -98,13 +98,13 @@ char* server_principal_details(const cha
+ goto end;
+ }
strcpy(result, pname);
- krb5_free_unparsed_name(kcontext, pname);
- krb5_free_keytab_entry_contents(kcontext, &entry);
@@ -26,14 +26,15 @@
+ krb5_kt_free_entry(kcontext, &entry);
}
- if (result == NULL)
-@@ -97,8 +97,7 @@ char* server_principal_details(const cha
+ if (result == NULL) {
+@@ -115,9 +115,7 @@ char* server_principal_details(const cha
}
end:
-- if (cursor)
+- if (cursor) {
- krb5_kt_end_seq_get(kcontext, kt, &cursor);
+- }
+ krb5_kt_end_seq_get(kcontext, kt, &cursor);
- if (kt)
+ if (kt) {
krb5_kt_close(kcontext, kt);
- krb5_free_context(kcontext);
+ }
More information about the svn-ports-head
mailing list