Path to this page:
./
www/drupal6,
Open source content management system
Branch: pkgsrc-2008Q4,
Version: 6.9,
Package name: drupal-6.9,
Maintainer: adrianpDrupal is software that allows an individual or a community of users to easily
publish, manage and organize a great variety of content on a website. Tens of
thousands of people and organizations have used Drupal to set up scores of
different kinds of web sites, including
* community web portals and discussion sites
* corporate web sites/intranet portals
* personal web sites
* aficionado sites
* e-commerce applications
* resource directories
Drupal includes features to enable:
* content management systems
* blogs
* collaborative authoring environments
* forums
* newsletters
* picture galleries
* file uploads and download
Required to run:[
lang/perl5] [
lang/php5] [
databases/php-mysql] [
databases/mysql5-client] [
graphics/php-gd] [
textproc/php5-dom] [
www/ap-php]
Required to build:[
www/apache22]
Package options: apache, drupal-xmlservices, mysql
Master sites:
SHA1: d9eb531bcb2a4d500dc9e989b0afe702653d7e84
RMD160: 9e8e181fb406f2ae5d6ce1f62c6ef37ff714598f
Filesize: 1050.35 KB
Version history: (Expand)
- (2009-01-18) Updated to version: drupal-6.9
- (2009-01-06) Package added to pkgsrc.se, version drupal-6.7 (created)
CVS history: (Expand)
2009-01-18 12:43:05 by Tyler R. Retzlaff | Files touched by this commit (2) | |
Log message:
pullup ticket #2637 - requested by martti
drupal6: update package for fixes
revisions pulled up:
pkgsrc/www/drupal6/Makefile 1.11
pkgsrc/www/drupal6/distinfo 1.8
Module Name: pkgsrc
Committed By: adrianp
Date: Thu Jan 15 20:09:44 UTC 2009
Modified Files:
pkgsrc/www/drupal6: Makefile distinfo
Log message:
The following bug has been fixed since the 6.7 release:
* Rolling back #280934. PHP 4 incompatibility.
This release fixes security vulnerabilities. Sites are urged to upgrade
immediately after reading the security announcement:
* SA-CORE-2009-001- Drupal core - Multiple vulnerabilities
In addition to this security vulnerability, the following bugs have been
fixed since the 6.8 release:
* - Patch #331708 by chx: poll_choice_js uses FAPI2.
* - Patch #350708 by dww: t() documentation clean-up.
* #245990 by Dave Reid, chx, dww: Look for the www.example.com page when a
HTTP request seems to fail. Looking for the local page caused problems for
people with interactive authentication, redirects, hosting added JavaScript
code, and so on.
* - Patch #262920 by ainigma32: language selection for domain should look
at HTTP_HOST not SERVER_NAME.
* - Patch #353886 by killes: too many arguments to SQL query in locale import.
* - Rollback of #325908.
* #347228 by kajetan: user was redirected to admin/build/translate instead
of admin/build/translate/import
* #332123 by webchick, lilou, andypost: backport of removal of t() around
schema desciptions
* #257009 by bjaspan, Freso, Darren Oh: check to not create global
constraints twice in PostgreSQL (for example, when the testing framework is
running)
* #169937 by Heine, drumm, alexanderpas, Darren Oh: only regenerate session
if the user is the current global user
* #308526 by chx: Also reset actions_list() cache on actions_synchronize()
* #323474 by gpk, Dave Reid, catch: hook_boot() was not called on
non-cached pages when agreesive caching was on
* #61108 by Uwe Hermann: update LICENSE.txt with latest version of GPL2 text
* #328977 by Dave Reid, hgmichna: comment_controls() form function lacks
first form_state parameter, so passed values are incorrectly used
* #323386 by mariuss: The selection type in profile module expects items
each on their own line and should not break items on commas
* #347485 by cdale: only add upload submit handler if the upload form is added
* #344052 by salvis: remove unused $update_node variable from node module
* #356782 by quicksketch: remove unused unset($edit) from
_form_builder_handle_input_element()
* #124492 by m3avrck, mfer: more accurate checking for valid URLs in valid_url()
* #346285 by grendzy, Damien Tournoud, thekevinday et al: fixed problem
when HTTP_HOST is not transmitted
* #245990 follow up by Damien Tournoud, David_Rothstein, pwolanin: Move
back to an internal URL check for HTTP request checking and make the
request checking less intrusive on what requests can be accomplished
|