svn commit: r327290 - in head/security/ruby-tcpwrap: . files
Sunpoet Po-Chuan Hsieh
sunpoet at FreeBSD.org
Sat Sep 14 14:40:34 UTC 2013
Author: sunpoet
Date: Sat Sep 14 14:40:33 2013
New Revision: 327290
URL: http://svnweb.freebsd.org/changeset/ports/327290
Log:
- Fix build with ruby19 [1]
- Remove DEPRECATED and EXPIRATION_DATE
- Convert to new LIB_DEPENDS format
- Convert to new options framework
- Simplify DOC_EN and DOC_JA installation
Obtained from: NetBSD [1]
Added:
head/security/ruby-tcpwrap/files/
head/security/ruby-tcpwrap/files/patch-tcpwrap.c (contents, props changed)
Modified:
head/security/ruby-tcpwrap/Makefile
Modified: head/security/ruby-tcpwrap/Makefile
==============================================================================
--- head/security/ruby-tcpwrap/Makefile Sat Sep 14 14:34:49 2013 (r327289)
+++ head/security/ruby-tcpwrap/Makefile Sat Sep 14 14:40:33 2013 (r327290)
@@ -13,16 +13,15 @@ DIST_SUBDIR= ruby
MAINTAINER= ruby at FreeBSD.org
COMMENT= TCP wrappers library for Ruby
-DEPRECATED= Does not work with Ruby 1.9
-EXPIRATION_DATE= 2013-05-02
+LIB_DEPENDS= libident.so:${PORTSDIR}/security/libident
-LIB_DEPENDS= ident.0:${PORTSDIR}/security/libident
+OPTIONS_DEFINE= DOCS
USE_RUBY= yes
USE_RUBY_EXTCONF= yes
WRKSRC= ${WRKDIR}/ruby-${PORTNAME}
-CONFIGURE_ARGS= --with-libwrap-dir="/usr" \
+CONFIGURE_ARGS= --with-libwrap-dir=/usr \
--with-ident-dir="${LOCALBASE}"
INSTALL_TARGET= site-install
@@ -30,21 +29,15 @@ INSTALL_TARGET= site-install
DOCS_EN= README.en doc/tcpwrap.html.en
DOCS_JA= README.ja doc/tcpwrap.html.ja
+.include <bsd.port.options.mk>
+
post-install:
-.if !defined(NOPORTDOCS)
+.if ${PORT_OPTIONS:MDOCS}
${MKDIR} ${RUBY_MODEXAMPLESDIR}
${INSTALL_DATA} ${WRKSRC}/sample/echod.rb ${RUBY_MODEXAMPLESDIR}/
${MKDIR} ${RUBY_MODDOCDIR}/ja
-.for f in ${DOCS_EN}
- ${INSTALL_DATA} ${WRKSRC}/${f} ${RUBY_MODDOCDIR}/
-.endfor
-.for f in ${DOCS_JA}
- ${INSTALL_DATA} ${WRKSRC}/${f} ${RUBY_MODDOCDIR}/ja/
-.endfor
+ cd ${WRKSRC}/ && ${INSTALL_DATA} ${DOCS_EN} ${RUBY_MODDOCDIR}/
+ cd ${WRKSRC}/ && ${INSTALL_DATA} ${DOCS_JA} ${RUBY_MODDOCDIR}/ja/
.endif
-.include <bsd.port.pre.mk>
-.if ${RUBY_VER} == 1.9
-BROKEN= does not build with ruby 1.9
-.endif
-.include <bsd.port.post.mk>
+.include <bsd.port.mk>
Added: head/security/ruby-tcpwrap/files/patch-tcpwrap.c
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/security/ruby-tcpwrap/files/patch-tcpwrap.c Sat Sep 14 14:40:33 2013 (r327290)
@@ -0,0 +1,73 @@
+--- tcpwrap.c.orig 2003-08-20 03:30:10.000000000 +0000
++++ tcpwrap.c
+@@ -25,7 +25,12 @@
+ */
+
+ #include "ruby.h"
++#ifdef HAVE_RUBY_IO_H /* Ruby 1.9 and later */
++#include "ruby/io.h"
++#else /* Ruby 1.8.x */
+ #include "rubyio.h"
++#define rb_io_stdio_file(iot) ((iot)->f)
++#endif
+ #include <sys/types.h>
+ #include <sys/socket.h>
+ #include <netinet/in.h>
+@@ -101,7 +106,7 @@ static VALUE tcpd_accept(VALUE self)
+ tcp_wrapper_t *tcpd;
+ VALUE sock;
+ int sockfd;
+- OpenFile *fptr;
++ rb_io_t *fptr;
+ struct sockaddr_storage addr;
+ char client_name[NI_MAXHOST] = STRING_UNKNOWN;
+ char client_addr[NI_MAXHOST] = STRING_UNKNOWN;
+@@ -113,7 +118,7 @@ static VALUE tcpd_accept(VALUE self)
+ again:
+ sock = rb_funcall(tcpd->server, rb_intern("accept"), 0);
+ GetOpenFile(sock, fptr);
+- sockfd = fileno(fptr->f);
++ sockfd = fileno(rb_io_stdio_file(fptr));
+ if (getpeername(sockfd, (struct sockaddr*) &addr, &len) < 0)
+ rb_sys_fail("getpeername(2)");
+ error = getnameinfo((struct sockaddr*) &addr, len,
+@@ -132,7 +137,7 @@ static VALUE tcpd_accept(VALUE self)
+ if (tcpd->ident_lookup)
+ client_user = ident_id(sockfd, tcpd->ident_timeout);
+ #endif
+- if (!hosts_ctl(RSTRING(tcpd->daemon)->ptr,
++ if (!hosts_ctl(RSTRING_PTR(tcpd->daemon),
+ client_name,
+ client_addr,
+ (client_user == NULL) ? STRING_UNKNOWN : client_user)) {
+@@ -156,8 +161,8 @@ tcpd_s_set_hosts_allow(VALUE self, VALUE
+ {
+ static char hosts_allow[MAXPATHLEN];
+
+- Check_SafeStr(s);
+- snprintf(hosts_allow, sizeof(hosts_allow), "%s", RSTRING(s)->ptr);
++ SafeStringValue(s);
++ snprintf(hosts_allow, sizeof(hosts_allow), "%s", RSTRING_PTR(s));
+ if(access(hosts_allow, R_OK) < 0)
+ rb_warning("cannot read %s", hosts_allow);
+ hosts_allow_table = hosts_allow;
+@@ -176,8 +181,8 @@ tcpd_s_set_hosts_deny(VALUE self, VALUE
+ {
+ static char hosts_deny[MAXPATHLEN];
+
+- Check_SafeStr(s);
+- snprintf(hosts_deny, sizeof(hosts_deny), "%s", RSTRING(s)->ptr);
++ SafeStringValue(s);
++ snprintf(hosts_deny, sizeof(hosts_deny), "%s", RSTRING_PTR(s));
+ if(access(hosts_deny, R_OK) < 0)
+ rb_warning("cannot read %s", hosts_deny);
+ hosts_deny_table = hosts_deny;
+@@ -196,7 +201,7 @@ str_to_ctlstr(VALUE s)
+ {
+ if(NIL_P(s)) return STRING_UNKNOWN;
+ Check_Type(s, T_STRING);
+- return RSTRING(s)->ptr;
++ return RSTRING_PTR(s);
+ }
+
+ static VALUE
More information about the svn-ports-head
mailing list