./www/drupal7, Open source content management system

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 7.67, Package name: php71-drupal-7.67, Maintainer: pkgsrc-users

Drupal is software that allows an individual or a community of users to easily
publish, manage and organize a great variety of content on a website. Tens of
thousands of people and organizations have used Drupal to set up scores of
different kinds of web sites, including

* community web portals and discussion sites
* corporate web sites/intranet portals
* personal web sites
* aficionado sites
* e-commerce applications
* resource directories

Drupal includes features to enable:

* content management systems
* blogs
* collaborative authoring environments
* forums
* newsletters
* picture galleries
* file uploads and download


Required to run:
[textproc/php-json] [www/ap-php] [graphics/php-gd] [databases/php-pdo_mysql]

Required to build:
[www/apache24] [pkgtools/cwrappers]

Package options: apache, mysql

Master sites:

SHA1: bba9533865eb057627242cf4cdb6cb500ba0effc
RMD160: 37a915dc1b6e84889d8c956b8d3637e001c8db64
Filesize: 3235.121 KB

Version history: (Expand)


CVS history: (Expand)


   2019-05-11 08:48:43 by Takahiro Kambe | Files touched by this commit (3) | Package updated
Log message:
www/drupal7: update to 7.67

Update drupal7 to 7.67.

Drupal 7.67, 2019-05-08
-----------------------
- Fixed security issues:
   - SA-CORE-2019-007
   2019-04-30 06:07:37 by Takahiro Kambe | Files touched by this commit (3) | Package updated
Log message:
www/drupal7: update to 7.66

Update drupal7 to 7.66, security fix.

Drupal 7.66, 2019-04-17
-----------------------
- Fixed security issues:
   - SA-CORE-2019-006
   2019-03-21 12:47:16 by Patrick Welche | Files touched by this commit (2) | Package updated
Log message:
Update drupal7 to 7.65

* Drupal core - Cross-Site Scripting- SA-CORE-2019-004

Under certain circumstances the File module/subsystem allows a
malicious user to upload a file that can trigger a cross-site
scripting (XSS) vulnerability.
   2019-02-09 01:15:53 by Wen Heping | Files touched by this commit (3) | Package updated
Log message:
Update to 7.64

Upstream changes:
Major changes since 7.63:

    Issue #3018637 by emilymoi, das-peter: [regression] Unset the 'host' header \ 
in drupal_http_request() during redirect
    Compatibility fixes for PHP 7.3 (#3020771)
    Compatibility fixes for MySQL 5.7 (#2981248)

All changes since 7.63:

    #1430934 by johnish@gmail.com, DamienMcKenna, Berdir, malcomio, Dane Powell, \ 
zerolab, er.pushpinderrana, akosipax, njbarrett, Fabianx, alesr, \ 
David_Rothstein, littledynamo, das-peter: Notice: Undefined index: display_field \ 
in file_field_widget_value() (line 582 of /module/file/file.field.inc)
    #1470656 by Damien Tournoud, joseph.olstad, Pol, Fabianx, catch: Registry \ 
rebuild should not parse the same file twice in the same request
    #3028364 by Pol, Fabianx: Update function _registry_update() and move \ 
module_implements() and _registry_check_code() calls out of the try/catch
    #3018637 by emilymoi, das-peter: [regression] Unset the 'host' header in \ 
drupal_http_request() during redirect
    #3026529 by alexpott: 7.x does not have Phar protection and Phar tests are \ 
failing on Drupal 7
    #2482549 by Pol, marcelovani, ndf, drupal@guusvandewal.nl, TR, jenlampton, \ 
kaidjohnson, ufku, MiSc, David_Rothstein, RobLoach, pablo.guerino, afoster, \ 
geerlingguy, SebCorbin, joelpittet, JohnAlbin: Fix up commit - convert short \ 
array styles to long.
    #3023066 by Pol, mfb: [PHP 7.3] Fix \ 
BootstrapMiscTestCase::testCheckMemoryLimit() notice
    #2482549 by Pol, marcelovani, ndf, drupal@guusvandewal.nl, jenlampton, ufku, \ 
kaidjohnson, MiSc, David_Rothstein, RobLoach, SebCorbin, geerlingguy, \ 
pablo.guerino, JohnAlbin, joelpittet, afoster: Ignore node_module folder in core \ 
to use Drupal with npm/grunt/nodejs
    #3020771 by Ayesh, Pol, sjerdo: [PHP 7.3] strpos explicit string needle warnings
    #2981248 by mfb, LFP6, msti: MySQL 5.7 incompatibility in system upgrade 7061
   2019-02-01 15:58:19 by Patrick Welche | Files touched by this commit (2) | Package updated
Log message:
Update drupal7 to 7.63

This is a hotfix release for a regression affecting some Drush
installations that was introduced by the fix for SA-CORE-2019-002. No
other fixes are included.
   2019-01-19 08:30:21 by Takahiro Kambe | Files touched by this commit (3) | Package updated
Log message:
www/drupal7: update to 7.62

Drupal 7.62, 2019-01-15
-----------------------
- Fixed security issues:
   - SA-CORE-2019-001
   - SA-CORE-2019-002
   2018-11-15 15:26:45 by Patrick Welche | Files touched by this commit (15) | Package removed
Log message:
Update drupal7 to 7.61

    Full compatibility with PHP 7.2 (#2947772)

Drupal 7.61, 2018-11-07
-----------------------
- File upload validation functions and hook_file_validate() implementations are
  now always passed the correct file URI.
- The default form cache expiration of 6 hours is now configurable (API
  addition: https://www.drupal.org/node/2857751).
- Allowed callers of drupal_http_request() to optionally specify an explicit
  Host header.
- Allowed the + character to appear in usernames.
- PHP 7.2: Fixed Archive_Tar incompatibility.
- PHP 7.2: Removed deprecated function each().
- PHP 7.2: Avoid count() calls on uncountable variables.
- PHP 7.2: Removed deprecated create_function() call.
- PHP 7.2: Make sure variables are arrays in theme_links().
- Fixed theme-settings.php not being loaded on cached forms
- Fixed problem with IE11 & Chrome(PointerEvents enabled) & some Firefox \ 
scroll to the top of the page after dragging the bottom item with jquery 1.5 \ 
<-> 1.11
   2018-10-18 16:32:48 by Takahiro Kambe | Files touched by this commit (2) | Package updated
Log message:
www/drupal7: update to 7.60

Drupal 7.60, 2018-10-18
------------------------
- Fixed security issues. See SA-CORE-2018-006.