From nobody Mon May 29 23:26:01 2023 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QVWqZ023Wz4XMQg; Mon, 29 May 2023 23:26:02 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QVWqY2tzxz3lL2; Mon, 29 May 2023 23:26:01 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685402761; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=CZ/0+tGNuR5+aqFeg0EpU9HgIrgsnPnZ+EK/Up7PtB4=; b=Wer9oMMIed1ksA/yuFO/z8CefRxp44WEqK5M6ysEhh//PLuZucLjv5Yb+V54oIf18hWvex A8AA1eGVQsqFotzdIRWcZH/+e0xUuknUO6Xu2Ux+lujUi/+hUj6y6M3ilVNcYHiY6hWzj9 Cn1b4+WjBNCvZzmtZVVw9jyv9BgZ2kdUyivCyEOjGFTCnEKGEOvDP3nj6HTO1SWfy/E//5 v0JXtJsDi90DykrJzqfGIvBYYZ3Hvb+TUFhJGP2B9os+XVdYAMs1nJaO7uijxpLiKqApc9 Kg3cMYYVfNYpjP8bDreWOrk0Ie1nDyAlJEtzbojjTTmYVPI/2emjvCSthKc/jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685402761; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=CZ/0+tGNuR5+aqFeg0EpU9HgIrgsnPnZ+EK/Up7PtB4=; b=Z+kBLZ3JQ6REdyb3GcQd1kLcxtzCipttWnD9v8pqD19HygdfT32SIzXdBuNcAI77j1PUe8 vlLvBNitzA2bibUPeoJnH4Y2A9yZDlgaC62etehquGkKdgGXFO7swOoBq8eo/cSWi+dRlE qHa6D/ijT/YLllW2b3N3yDcvVWF2t51uxwDDOBhoyJhPTyu+IZSYR1zJTwGB1MzAz8xv8B yuE5ItYCJYPK9D3sdg40zjd0VlxOiPqY1i5RfeiBE+P5YbpUCPkGZmkimllYx3eGezjDzE ahlqaatYwq4gxdFySA3k2YyHmb2uwzyErHFguLD3dFM5xHldDf7kYf4faMapzQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1685402761; a=rsa-sha256; cv=none; b=PcFclq5ts5/yP6HLpKmYFE9F2C66sFkwm/p7XQReffbLAlhy8bS4wc2kq94a1zA9udcjfU 7h8KdXXnLLQbvzFncaw+C+wMTyYwxVDFOlfFn/tJNQBNRGw+5US4h79TrJgcZG8CMHWVqQ 5d3ut33UTeHW/JxWZGIzkSSGHpiAbyhG3Q5EvMprdYZkc6dKfy5Qn8SYfPWzyDV5e1NpEX w1bXqY4zzMKapyTcKsO5tdnqG9zEdUroICOIf05riM7dspP1JBI0FVeHDm6h5TI6zCh8v3 +oBmEbGLpHodLrk8/rAuHlgkN74fObpb3rlK/IWblpjAnFmlbdWelbDEw5yRlA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QVWqY20zwzVwK; Mon, 29 May 2023 23:26:01 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 34TNQ1aA064104; Mon, 29 May 2023 23:26:01 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 34TNQ104064103; Mon, 29 May 2023 23:26:01 GMT (envelope-from git) Date: Mon, 29 May 2023 23:26:01 GMT Message-Id: <202305292326.34TNQ104064103@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Robert Clausecker Subject: git: 36fcf661ba23 - main - devel/blame: update to 1.3.1-20221108 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fuz X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 36fcf661ba23c96004395f6ee52cf2e6133b31f0 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by fuz: URL: https://cgit.FreeBSD.org/ports/commit/?id=36fcf661ba23c96004395f6ee52cf2e6133b31f0 commit 36fcf661ba23c96004395f6ee52cf2e6133b31f0 Author: Robert Clausecker AuthorDate: 2023-05-25 16:52:21 +0000 Commit: Robert Clausecker CommitDate: 2023-05-29 23:24:06 +0000 devel/blame: update to 1.3.1-20221108 Fix build on armv7 by importing a gnulib patch. Take maintainership. Changelog: https://invisible-island.net/rcs-blame/ChangeLog.html Approved by: jhein@symmetricom.com (maintainer) PR: 271643 --- devel/blame/Makefile | 15 +++---- devel/blame/distinfo | 5 ++- devel/blame/files/patch-Makefile.in | 17 ++++++++ devel/blame/files/patch-lib_mktime.c | 77 ++++++++++++++++++++++++++++++++++++ 4 files changed, 105 insertions(+), 9 deletions(-) diff --git a/devel/blame/Makefile b/devel/blame/Makefile index cc7e4178fe2f..ef6c6dfba12f 100644 --- a/devel/blame/Makefile +++ b/devel/blame/Makefile @@ -1,18 +1,19 @@ PORTNAME= blame -PORTVERSION= 1.3.1 +DISTVERSION= 1.3.1-20221108 CATEGORIES= devel -MASTER_SITES= ftp://ftp.invisible-island.net/rcs-blame/ +MASTER_SITES= https://invisible-island.net/archives/rcs-blame/ -MAINTAINER= jhein@symmetricom.com +MAINTAINER= fuz@FreeBSD.org COMMENT= Display last modification for each line in an RCS file WWW= https://invisible-island.net/rcs-blame/ -USE_CSTD= gnu89 +LICENSE= GPLv2 +LICENSE_FILE= ${WRKSRC}/COPYING + +USES= tar:tgz GNU_CONFIGURE= yes +TEST_TARGET= check PLIST_FILES= bin/blame \ man/man1/blame.1.gz -# Fix build with clang11 -CFLAGS+= -fcommon - .include diff --git a/devel/blame/distinfo b/devel/blame/distinfo index 5b12ae93ff86..9e4d05968daf 100644 --- a/devel/blame/distinfo +++ b/devel/blame/distinfo @@ -1,2 +1,3 @@ -SHA256 (blame-1.3.1.tar.gz) = 1943b145c0d69d1b3390e9417b76822af0b1bbe53cdaddf76e8497f2e79d58ca -SIZE (blame-1.3.1.tar.gz) = 483406 +TIMESTAMP = 1685013421 +SHA256 (blame-1.3.1-20221108.tgz) = ef8e3ec762550d997b2a0f4b8b518fe4d5e2ea3840d743d6c85d4980048e8413 +SIZE (blame-1.3.1-20221108.tgz) = 455636 diff --git a/devel/blame/files/patch-Makefile.in b/devel/blame/files/patch-Makefile.in new file mode 100644 index 000000000000..68fb52914d7d --- /dev/null +++ b/devel/blame/files/patch-Makefile.in @@ -0,0 +1,17 @@ +--- Makefile.in.orig 2023-05-25 11:18:07 UTC ++++ Makefile.in +@@ -14,10 +14,10 @@ clean \ + distclean \ + install \ + uninstall :: +- cd doc && $(MAKE) $@ +- cd lib && $(MAKE) $@ +- cd src && $(MAKE) $@ +- cd tests && $(MAKE) $@ ++ $(MAKE) -C doc $@ ++ $(MAKE) -C lib $@ ++ $(MAKE) -C src $@ ++ $(MAKE) -C tests $@ + + distclean :: + -rm -f blame.spec diff --git a/devel/blame/files/patch-lib_mktime.c b/devel/blame/files/patch-lib_mktime.c new file mode 100644 index 000000000000..48c7148461eb --- /dev/null +++ b/devel/blame/files/patch-lib_mktime.c @@ -0,0 +1,77 @@ +From: Paul Eggert +Date: Fri, 28 Jan 2011 21:02:31 -0800 +Subject: [PATCH] mktime: avoid problems on NetBSD 5 / i386 + +* lib/mktime.c (long_int): New type. This works around a problem +on NetBSD 5 / i386, where 'long int' and 'int' are both 32 bits +but time_t is 64 bits, and where I expect the existing code is +wrong in some cases. +(leapyear, ydhms_diff, guess_time_tm, __mktime_internal): Use it. +(ydhms_diff): Bring back the compile-time check for wide-enough +year and yday. + +--- lib/mktime.c.orig 2006-11-18 10:07:43 UTC ++++ lib/mktime.c +@@ -115,9 +115,15 @@ verify (twos_complement_arithmetic, TYPE_TWOS_COMPLEME + #define TM_YEAR_BASE 1900 + verify (base_year_is_a_multiple_of_100, TM_YEAR_BASE % 100 == 0); + ++#if INT_MAX <= LONG_MAX / 2 ++typedef long int long_int; ++#else ++typedef long long int long_int; ++#endif ++ + /* Return 1 if YEAR + TM_YEAR_BASE is a leap year. */ + static inline int +-leapyear (long int year) ++leapyear (long_int year) + { + /* Don't add YEAR to TM_YEAR_BASE, as that might overflow. + Also, work even if YEAR is negative. */ +@@ -163,12 +169,12 @@ const unsigned short int __mon_yday[2][13] = + detect overflow. */ + + static inline time_t +-ydhms_diff (long int year1, long int yday1, int hour1, int min1, int sec1, ++ydhms_diff (long_int year1, long_int yday1, int hour1, int min1, int sec1, + int year0, int yday0, int hour0, int min0, int sec0) + { + verify (C99_integer_division, -1 / 2 == 0); + verify (long_int_year_and_yday_are_wide_enough, +- INT_MAX <= LONG_MAX / 2 || TIME_T_MAX <= UINT_MAX); ++ INT_MAX == INT_MAX * (long_int) 2 / 2); + + /* Compute intervening leap days correctly even if year is negative. + Take care to avoid integer overflow here. */ +@@ -199,7 +205,7 @@ ydhms_diff (long int year1, long int yday1, int hour1, + If overflow occurs, yield the minimal or maximal value, except do not + yield a value equal to *T. */ + static time_t +-guess_time_tm (long int year, long int yday, int hour, int min, int sec, ++guess_time_tm (long_int year, long_int yday, int hour, int min, int sec, + const time_t *t, const struct tm *tp) + { + if (tp) +@@ -301,8 +307,8 @@ __mktime_internal (struct tm *tp, + int mon_remainder = mon % 12; + int negative_mon_remainder = mon_remainder < 0; + int mon_years = mon / 12 - negative_mon_remainder; +- long int lyear_requested = year_requested; +- long int year = lyear_requested + mon_years; ++ long_int lyear_requested = year_requested; ++ long_int year = lyear_requested + mon_years; + + /* The other values need not be in range: + the remaining code handles minor overflows correctly, +@@ -314,8 +320,8 @@ __mktime_internal (struct tm *tp, + int mon_yday = ((__mon_yday[leapyear (year)] + [mon_remainder + 12 * negative_mon_remainder]) + - 1); +- long int lmday = mday; +- long int yday = mon_yday + lmday; ++ long_int lmday = mday; ++ long_int yday = mon_yday + lmday; + + time_t guessed_offset = *offset; +