From vvelox@vvelox.net  Mon Jun 15 21:03:48 2009
Return-Path: <vvelox@vvelox.net>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id 880B2106568F
	for <FreeBSD-gnats-submit@freebsd.org>; Mon, 15 Jun 2009 21:03:48 +0000 (UTC)
	(envelope-from vvelox@vvelox.net)
Received: from vulpes.vvelox.net (vulpes.vvelox.net [74.200.198.26])
	by mx1.freebsd.org (Postfix) with ESMTP id 696AB8FC24
	for <FreeBSD-gnats-submit@freebsd.org>; Mon, 15 Jun 2009 21:03:48 +0000 (UTC)
	(envelope-from vvelox@vvelox.net)
Received: from vixen42.vulpes (c-68-51-78-189.hsd1.il.comcast.net [68.51.78.189])
	(Authenticated sender: vvelox)
	by vulpes.vvelox.net (Postfix) with ESMTP id A2866B853
	for <FreeBSD-gnats-submit@freebsd.org>; Mon, 15 Jun 2009 16:14:55 -0500 (CDT)
Message-Id: <1245099881.83955@vixen42.vulpes>
Date: Mon, 15 Jun 2009 16:04:41 -0500
From: "Zane C.B." <vvelox@vvelox.net>
To: "FreeBSD gnats submit" <FreeBSD-gnats-submit@freebsd.org>
Subject: update port: security/metasploit     Update to 3.2 and unbreak it.
X-Send-Pr-Version: gtk-send-pr 0.4.9 
X-GNATS-Notify: onatan@gmail.com

>Number:         135607
>Category:       ports
>Synopsis:       update port: security/metasploit     Update to 3.2 and unbreak it.
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    wxs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Jun 15 21:10:06 UTC 2009
>Closed-Date:    Tue Jun 16 14:09:33 UTC 2009
>Last-Modified:  Tue Jun 16 14:09:33 UTC 2009
>Originator:     Zane C.B.
>Release:        FreeBSD 6.4-STABLE i386
>Organization:
>Environment:


System: FreeBSD 6.4-STABLE #3: Sun Mar 29 22:03:29 CDT 2009
    kitsune@vixen42.vulpes:/usr/obj/usr/src/sys/vixen42



>Description:


Unfortunately this port has not been being kept up to date with the ruby port. The  dependency location for 'databases/rubygem-activerecord' is dependent on the current installed ruby version..


>How-To-Repeat:


1: see it is currently marked broken
2:
3: apply patch
4: notice it now builds with out any dependency issues


>Fix:


--- metasploit_Makefile.diff begins here ---
--- Makefile.orig	2009-06-15 15:47:22.000000000 -0500
+++ Makefile	2009-06-15 15:48:13.000000000 -0500
@@ -6,8 +6,7 @@
 #
 
 PORTNAME=	metasploit
-DISTVERSION=	3.0
-PORTREVISION=	2
+DISTVERSION=	3.2
 CATEGORIES=	security
 MASTER_SITES=	#
 DISTNAME=	framework-${DISTVERSION}
@@ -16,15 +15,13 @@
 COMMENT=	Exploit-Framework for Penetration-Testing
 
 RUN_DEPENDS=	${LOCALBASE}/bin/svn:${PORTSDIR}/devel/subversion \
-		${LOCALBASE}/lib/ruby/gems/1.8/specifications/activerecord-1.15.6.gemspec:${PORTSDIR}/databases/rubygem-activerecord
+		${LOCALBASE}/lib/ruby/gems/1.8/specifications/activerecord-1.8.7.gemspec:${PORTSDIR}/databases/rubygem-activerecord
 
 SCRIPTS=	msfcli msfconsole msfd msfencode msflicense msfopcode \
 		msfpayload msfpescan msfweb
 
 RESTRICTED=	May not be re-sold for more than the cost of duplication, nor redistributed after patching
 
-BROKEN=		unsatisfiable dependency
-
 NO_BUILD=	yes
 USE_RUBY=	yes
 
--- metasploit_Makefile.diff ends here ---




--- metasploit_distinfo.diff begins here ---
--- distinfo.orig	2007-07-22 21:07:27.000000000 -0500
+++ distinfo	2009-06-15 15:49:04.000000000 -0500
@@ -1,3 +1,3 @@
-MD5 (framework-3.0.tar.gz) = ab98f0a09b371f9638c7f49f1b83f5c4
-SHA256 (framework-3.0.tar.gz) = cb27df6dafe7b2d1c2d2174000afd07965cdc09e759e8cda5147cfc58e445251
-SIZE (framework-3.0.tar.gz) = 5519218
+MD5 (framework-3.2.tar.gz) = d543bda031b36a247912aa9c6a0f74d9
+SHA256 (framework-3.2.tar.gz) = fc9366a2ab01924e91575352889970e57a551e087c78b5d1dd4287aaf2136a04
+SIZE (framework-3.2.tar.gz) = 13099756
--- metasploit_distinfo.diff ends here ---




>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: edwin 
State-Changed-When: Mon Jun 15 21:11:02 UTC 2009 
State-Changed-Why:  
Awaiting maintainers feedback (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=135607 

From: Edwin Groothuis <edwin@FreeBSD.org>
To: onatan@gmail.com
Cc: bug-followup@FreeBSD.org
Subject: Re: ports/135607: update port: security/metasploit     Update to 3.2 and unbreak it.
Date: Mon, 15 Jun 2009 21:11:00 UT

 Maintainer of security/metasploit,
 
 Please note that PR ports/135607 has just been submitted.
 
 If it contains a patch for an upgrade, an enhancement or a bug fix
 you agree on, reply to this email stating that you approve the patch
 and a committer will take care of it.
 
 The full text of the PR can be found at:
     http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/135607
 
 -- 
 Edwin Groothuis via the GNATS Auto Assign Tool
 edwin@FreeBSD.org
Responsible-Changed-From-To: freebsd-ports-bugs->wxs 
Responsible-Changed-By: wxs 
Responsible-Changed-When: Tue Jun 16 01:07:02 UTC 2009 
Responsible-Changed-Why:  
I'll take it. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=135607 
State-Changed-From-To: feedback->closed 
State-Changed-By: wxs 
State-Changed-When: Tue Jun 16 14:09:32 UTC 2009 
State-Changed-Why:  
Superseded by ports/135457. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=135607 
>Unformatted:
