Commit Graph

398916 Commits

Author SHA1 Message Date
taca 1a282b9745 doc: Updated security/pear-Crypt_GPG to 1.6.9 2024-03-23 16:10:04 +00:00
taca aa4c158aa6 security/pear-Crypt_GPG: update to 1.6.9
1.6.9 (2024-03-23)

* Fix numerous PHPDoc and code issues found by static code analyzer [alec].
2024-03-23 16:09:47 +00:00
taca c84ac6baab doc: Updated mail/pear-Mail_Mime to 1.10.12 2024-03-23 15:37:13 +00:00
taca b5e20f8041 mail/pear-Mail_Mime: update to 1.0.12
1.0.12 (2024-03-10)

* Prevent from "PHP Deprecated: file_exists(): Passing null to parameter #1
  ($filename) of type string" [alec]

* PHPDoc improvements [alec]
2024-03-23 15:36:59 +00:00
taca e065ac187e doc: Updated lang/pear to 1.10.15 2024-03-23 15:33:58 +00:00
taca 1b744b0ef3 lang/pear: update to 1.10.15
Also update bundled PEAR package Archive_Tar to 1.5.0.

PEAR 1.10.15 (2024-03-09)

* PR #132: cleanup uneeded test
* PR #135: Fix PHP Deprecated: Calling get_class() without arguments

Archive_Tar 1.5.0 (2024-03-16)

* PHP Version: PHP 5.2.0 or newer
* PEAR Package: PEAR Installer 1.9.0 or newer
2024-03-23 15:33:42 +00:00
taca 09eeae41ba doc: add ruby33 for CVE-2024-27281 2024-03-23 15:16:59 +00:00
taca a88510e06c doc: Updated lang/ruby33 to 3.3.0nb1 2024-03-23 15:16:13 +00:00
taca b3b1a9f39d lang/ruby33: fix CVE-2024-27281
Update rdoc to 6.6.3.1 to fix for CVE-2024-27281.

Bump PKGREVISION.
2024-03-23 15:15:51 +00:00
taca b03cf36b28 doc: add ruby32-base for CVE-2024-27281 2024-03-23 14:50:53 +00:00
taca 27d4301091 doc: Updated lang/ruby32-base to 3.2.3nb1 2024-03-23 14:47:33 +00:00
taca 366925c67c lang/ruby32-base: fix CVE-2024-27281
Update rdoc to 6.5.1.1 to fix for CVE-2024-27281.

Bump PKGREVISION.
2024-03-23 14:47:12 +00:00
taca 7548409d7b doc: add ruby31-base for two CVEs. 2024-03-23 14:30:25 +00:00
taca 6c5de76a13 doc: Updated lang/ruby31-base to 3.1.4nb3 2024-03-23 14:29:34 +00:00
taca 7d0329451d lang/ruby31-base: fix CVE-2024-27280 and CVE-2024-27281
Update rdoc to 6.4.1.1 to fix for CVE-2024-27281.
Update stringio to 3.0.1.2 to fix for CVE-2024-27280.

Bump PKGREVISION.
2024-03-23 14:28:48 +00:00
ryoon 058750c1f4 doc: Updated security/keepassxc to 2.7.7nb1 2024-03-23 10:49:10 +00:00
ryoon ab1fefe582 keepassxc: Enable zxcvbn password strength estimation
* Bump PKGREVISION.
2024-03-23 10:49:00 +00:00
tsutsui 9c3a15d3f8 doc: Updated net/mikutter to 5.0.7 2024-03-23 08:42:27 +00:00
tsutsui 14423b6559 mikutter: update to 5.0.7.
Upstream changes:
 https://mikutter.hatenablog.com/entry/2024/03/23/170859

* fix a crash bug of 5.0.6
2024-03-23 08:42:12 +00:00
adam 9a6e1fb86c Updated devel/py-pyelftools, parallel/py-threadpoolctl, devel/py-trio, devel/py-tox 2024-03-23 07:27:31 +00:00
adam 3e5d034d76 py-tox: updated to 4.14.2
Bugfixes - 4.14.2
Add provision arguments to ToxParser to fix crash when provisioning new tox environment without list-dependencies.

Improved Documentation - 4.14.2
Removed unused line from the ‘fresh_subprocess’ documentation.
2024-03-23 07:27:06 +00:00
adam 4b0efb2813 py-trio: updated to 0.25.0
Trio 0.25.0 (2024-03-17)
------------------------

Breaking changes

- The :ref:`strict_exception_groups <strict_exception_groups>` parameter now defaults to `True` in `trio.run` and `trio.lowlevel.start_guest_run`. `trio.open_nursery` still defaults to the same value as was specified in `trio.run`/`trio.lowlevel.start_guest_run`, but if you didn't specify it there then all subsequent calls to `trio.open_nursery` will change.
  This is unfortunately very tricky to change with a deprecation period, as raising a `DeprecationWarning` whenever :ref:`strict_exception_groups <strict_exception_groups>` is not specified would raise a lot of unnecessary warnings.

  Notable side effects of changing code to run with ``strict_exception_groups==True``

  * If an iterator raises `StopAsyncIteration` or `StopIteration` inside a nursery, then python will not recognize wrapped instances of those for stopping iteration.
  * `trio.run_process` is now documented that it can raise an `ExceptionGroup`. It previously could do this in very rare circumstances, but with :ref:`strict_exception_groups <strict_exception_groups>` set to `True` it will now do so whenever exceptions occur in ``deliver_cancel`` or with problems communicating with the subprocess.

    * Errors in opening the process is now done outside the internal nursery, so if code previously ran with ``strict_exception_groups=True`` there are cases now where an `ExceptionGroup` is *no longer* added.
  * `trio.TrioInternalError` ``.__cause__`` might be wrapped in one or more `ExceptionGroups <ExceptionGroup>`


Features

- Add `trio.testing.wait_all_threads_completed`, which blocks until no threads are running tasks. This is intended to be used in the same way as `trio.testing.wait_all_tasks_blocked`.
- :class:`Path` is now a subclass of :class:`pathlib.PurePath`, allowing it to interoperate with other standard
  :mod:`pathlib` types.

  Instantiating :class:`Path` now returns a concrete platform-specific subclass, one of :class:`PosixPath` or
  :class:`WindowsPath`, matching the behavior of :class:`pathlib.Path`.


Bugfixes

- The pthread functions are now correctly found on systems using vanilla versions of musl libc.


Miscellaneous internal changes

- use the regular readme for the PyPI long_description
2024-03-23 07:26:06 +00:00
adam 45c1709f06 py-threadpoolctl: updated to 3.4.0
3.4.0 (2024-03-20)
==================

- Added support for Python interpreters statically linked against libc or linked against
  alternative implementations of libc like musl (on Alpine Linux for instance).
  https://github.com/joblib/threadpoolctl/pull/171

- Added support for Pyodide
  https://github.com/joblib/threadpoolctl/pull/169
2024-03-23 07:22:52 +00:00
adam e2236a278e py-pyelftools: updated to 0.31
+ Starting with version 0.31, please use the GitHub UI
  at https://github.com/eliben/pyelftools/tags
  to compare tags in order to find out what changed.
2024-03-23 07:21:47 +00:00
adam 783dfaad7a Added comms/py-term-background; Updated devel/py-xdis, lang/py-uncompyle6, time/py-time-machine 2024-03-23 07:16:46 +00:00
adam a9210214c1 py-time-machine: updated to 2.14.1
2.14.1 (2024-03-22)

* Fix segmentation fault when the first ``travel()`` call in a process uses a ``timedelta``.
2024-03-23 07:16:23 +00:00
adam f7f754a594 py-uncompyle6: updated to 3.9.1
3.9.1

Lots of changes major changes. track xdis API has changes.

Separate Phases more clearly:

disassembly
tokenization
parsing
abstracting to AST (more is done in newer projects)
printing
Although we do not decompile bytecode greater than 3.8, code supports running from up to 3.12.

Many bugs fixed.

A lot of Linting and coding style modernization.

Work done in preparation for Blackhat Asia 2024
2024-03-23 07:15:01 +00:00
adam c8483e28d5 py-xdis: updated to 6.1.0
6.1.0 2024-03-15
=================

Lots of changes major changes. API has changed.

We now support many disassembly options:
  * classic:  disasm-like output
  * bytes: disasm-like output with bytecode
  * extended: simple interpretation of previous sequence of instructions
  * extended-bytes: same as above, but with "bytes" bytecode ouptut
  * header: show header/metadata information only

This is reflected in the `--format` (`-F`) options on `pydisasm`.
Option `--show-source` (`-S`) gives add the source text line (or part of it) before assembly instructions that implement the line.

Released Python magic numbers have been updated as of this release (up to Python 3.12.2, including PyPy magic numbers.

Some support for the [GraalVM](https://www.graalvm.org/python/)
implementation of Python started.

Many bugs fixed.

A lot of Linting and coding style modernization.

typing.NameTuple used for Python versions that support this.
Additional fields "start_offset" and "tos_str" added to instruction.

Elliot Tarbet (2elli) largely provided support for Python 3.11 and 3.12 bytecode
2024-03-23 06:49:52 +00:00
adam 28906e47ce py-term-background: added version 1.0.1
Determine if shell has a light or dark background.

From Python you can call term_background.is_dark_background() which returns a
True if we think the background is dark.

The heuristics used is to try to query the background color using an xterm
control sequence.
2024-03-23 06:48:41 +00:00
iquiw bf7678eb0c doc: Updated sysutils/fzf to 0.48.1 2024-03-23 06:34:34 +00:00
iquiw b522dc28de fzf: update to 0.48.1
0.48.1

* CTRL-T and ALT-C bindings can be disabled by setting FZF_CTRL_T_COMMAND
  and FZF_ALT_C_COMMAND to empty strings respectively when sourcing the
  script

    # bash
    FZF_CTRL_T_COMMAND= FZF_ALT_C_COMMAND= eval "$(fzf --bash)"

    # zsh
    FZF_CTRL_T_COMMAND= FZF_ALT_C_COMMAND= eval "$(fzf --zsh)"

    # fish
    fzf --fish | FZF_CTRL_T_COMMAND= FZF_ALT_C_COMMAND= source

  * Setting the variables after sourcing the script will have no effect
* Bug fixes


0.48.0

* Shell: integration scripts are now embedded in the fzf binary. This
  simplifies the distribution, and the users are less likely to have problems
  caused by using incompatible scripts and binaries.
  * bash

      # Set up fzf key bindings and fuzzy completion
      eval "$(fzf --bash)"

  * zsh

       # Set up fzf key bindings and fuzzy completion
       eval "$(fzf --zsh)"

  * fish

      # Set up fzf key bindings
      fzf --fish | source

* Added options for customizing the behavior of the built-in walker

  Option		Description					 Default
  --walker=OPTS 	Walker options ([file][,dir][,follow][,hidden])  file,follow,hidden
  --walker-root=DIR 	Root directory from which to start walker        .
  --walker-skip=DIRS 	Comma-separated list of directory names to skip  .git,node_modules

  * Examples

      # Built-in walker is only used by standalone fzf when $FZF_DEFAULT_COMMAND is not set
      unset FZF_DEFAULT_COMMAND

      fzf # default: --walker=file,follow,hidden --walker-root=. --walker-skip=.git,node_modules
      fzf --walker=file,dir,hidden,follow --walker-skip=.git,node_modules,target

      # Walker options in $FZF_DEFAULT_OPTS
      export FZF_DEFAULT_OPTS="--walker=file,dir,hidden,follow --walker-skip=.git,node_modules,target"
      fzf

      # Reading from STDIN; --walker is ignored
      seq 100 | fzf --walker=dir

      # Reading from $FZF_DEFAULT_COMMAND; --walker is ignored
      export FZF_DEFAULT_COMMAND='seq 100'
      fzf --walker=dir

* Shell: integration scripts have been updated to use the built-in walker
  with these new options and they are now much faster out of the box.


0.47.0

* Replaced "the default find command" with a built-in directory walker to
  simplify the code and to achieve better performance and consistent behavior
  across platforms. This doesn't affect you if you have $FZF_DEFAULT_COMMAND
  set.
  * Breaking changes:
    * Unlike the previous "find" command, the new traversal code will list
      hidden files, but hidden directories will still be ignored
    * No filtering of devtmpfs or proc types
    * Traversal is parallelized, so the order of the entries will be
      different each time
  * You may wonder why fzf implements directory walker anyway when it's a
    filter program following the Unix philosophy. But fzf has had the walker
    code for years to tackle the performance problem on Windows. And I
    decided to use the same approach on different platforms as well for the
    benefits listed above.
  * Built-in: walker is using the excellent charlievieth/fastwalk library,
    which easily outperforms its competitors and supports safely following
    symlinks.
* Added $FZF_DEFAULT_OPTS_FILE to allow managing default options in a file
  * Option precedence from lower to higher
    a. Options read from $FZF_DEFAULT_OPTS_FILE
    b. Options from $FZF_DEFAULT_OPTS
    c. Options from command-line arguments
* Bug fixes and improvements
2024-03-23 06:34:00 +00:00
iquiw 74ffcbb650 doc: Updated security/cfssl to 1.6.5 2024-03-23 06:22:36 +00:00
iquiw 1bd853c433 cfssl: update to 1.6.5
* Add DER support for gernerating and parsing CSR
* Add support for generating ed25519 keys and certs (#1061)
* Add unit test for custom extension supt
* Build images on base image for target platform
* Respect custom x509 ext in selfsign
* add workflow to run goreleaser snapshot
* also output sha256 digest when generating certificate
* build pacakges with latest go
* build(deps): bump actions/checkout from 3 to 4
* build(deps): bump actions/setup-go from 4 to 5
* build(deps): bump actions/upload-artifact from 3 to 4
* build(deps): bump codecov/codecov-action from 3 to 4
* build(deps): bump docker/build-push-action from 3 to 4
* build(deps): bump docker/build-push-action from 4 to 5
* build(deps): bump docker/login-action from 2 to 3
* build(deps): bump docker/metadata-action from 4 to 5
* build(deps): bump docker/setup-buildx-action from 2 to 3
* build(deps): bump docker/setup-qemu-action from 2 to 3
* build(deps): bump github.com/go-sql-driver/mysql from 1.6.0 to 1.7.1
* build(deps): bump github.com/google/certificate-transparency-go
* build(deps): bump github.com/google/certificate-transparency-go
* build(deps): bump github.com/jmoiron/sqlx from 1.3.3 to 1.3.5
* build(deps): bump github.com/lib/pq from 1.10.1 to 1.10.9
* build(deps): bump github.com/mattn/go-sqlite3 from 1.14.16 to 1.14.17
* build(deps): bump github.com/mattn/go-sqlite3 from 1.14.17 to 1.14.18
* build(deps): bump github.com/mattn/go-sqlite3 from 1.14.18 to 1.14.19
* build(deps): bump github.com/mattn/go-sqlite3 from 1.14.19 to 1.14.20
* build(deps): bump github.com/mattn/go-sqlite3 from 1.14.20 to 1.14.22
* build(deps): bump github.com/prometheus/client_golang
* build(deps): bump github.com/prometheus/client_golang
* build(deps): bump github.com/prometheus/client_golang
* build(deps): bump github.com/prometheus/client_golang
* build(deps): bump github.com/prometheus/client_golang
* build(deps): bump github.com/stretchr/testify from 1.8.0 to 1.8.2
* build(deps): bump github.com/stretchr/testify from 1.8.2 to 1.8.3
* build(deps): bump github.com/stretchr/testify from 1.8.3 to 1.8.4
* build(deps): bump github.com/zmap/zlint/v3 from 3.4.1 to 3.5.0
* build(deps): bump golang.org/x/crypto from 0.10.0 to 0.12.0
* build(deps): bump golang.org/x/crypto from 0.12.0 to 0.13.0
* build(deps): bump golang.org/x/crypto from 0.13.0 to 0.14.0
* build(deps): bump golang.org/x/crypto from 0.14.0 to 0.15.0
* build(deps): bump golang.org/x/crypto from 0.15.0 to 0.17.0
* build(deps): bump golang.org/x/crypto from 0.17.0 to 0.18.0
* build(deps): bump golang.org/x/crypto from 0.18.0 to 0.19.0
* build(deps): bump golang.org/x/crypto from 0.8.0 to 0.9.0
* build(deps): bump golang.org/x/crypto from 0.9.0 to 0.10.0
* build(deps): bump golang.org/x/net from 0.10.0 to 0.17.0
* build(deps): bump golangci/golangci-lint-action from 3 to 4
* bump github.com/zmap/zlint/v3 from 3.1.0 to 3.4.1
* certdb/sql: remove uses of github.com/stretchr/testify/require
* code optimization
* configure dependabot
* fix architecture for docker builds
* go.yml: update actions/checkout to v3, actions/setup-go to v4
* goreleaser: Add ARMv7 binaries
* reenable vcs stamping with docker image that supports it
* snapshot.yml: update actions/checkout to v3
* update documentation with sha256 hashes
* update lint test for bumped zlint
2024-03-23 06:21:57 +00:00
fox e1d6710f9c doc: Updated audio/fasttracker2 to 1.79.2 2024-03-23 00:40:14 +00:00
fox 7ef7619e0f audio/fasttracker2: Update to 1.79.2
Changes since v1.79

v1.79.2 - 18.03.2024
- Fix mouse issues.
2024-03-23 00:39:40 +00:00
fox f8693bf975 doc: Updated security/wolfssl to 5.7.0 2024-03-23 00:24:58 +00:00
fox 88def2ac1c security/wolfssl: Update to 5.7.0
Changes since 5.6.6:

wolfSSL Release 5.7.0 (Mar 20, 2024)

NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024

NOTE: In future releases, --enable-des3 (which is disabled by default) will
be insufficient in itself to enable DES3 in TLS cipher suites. A new option,
--enable-des3-tls-suites, will need to be supplied in addition. This option
should only be used in backward compatibility scenarios, as it is inherently
insecure.

NOTE: This release switches the default ASN.1 parser to the new ASN template
code. If the original ASN.1 code is preferred define WOLFSSL_ASN_ORIGINAL to
use it. See PR #7199.

Vulnerabilities

  * [High] CVE-2024-0901 Potential denial of service and out of bounds read.
    Affects TLS 1.3 on the server side when accepting a connection from a
    malicious TLS 1.3 client. If using TLS 1.3 on the server side it is
    recommended to update the version of wolfSSL used. Fixed in this GitHub
    pull request #7099

  * [Med] CVE-2024-1545 Fault Injection vulnerability in
    RsaPrivateDecryption function that potentially allows an attacker thathas
    access to the same system with a victims process to perform aRowhammer
    fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang,Qingni Shen
    for the report (Peking University, The University of WesternAustralia)."
    Fixed in this GitHub pull request #7167

  * [Med] Fault injection attack with EdDSA signature operations. This
    affects ed25519 sign operations where the system could be susceptible to
    Rowhammer attacks. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni
    Shen for the report (Peking University, The University of Western
    Australia). Fixed in this GitHub pull request #7212

New Feature Additions

  * Added --enable-experimental configure flag to gate out features that are
    currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs
    require the --enable-experimental flag.

POST QUANTUM SUPPORT ADDITIONS

  * Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
  * Experimental framework for using wolfSSL’s LMS implementation (PR 7283)
  * Experimental wolfSSL Kyber implementation and assembly optimizations,
    enabled with --enable-experimental --enable-kyber (PR 7318)
  * Experimental support for post quantum dual key/signature certificates. A
    few known issues and sanitizer checks are in progress with this feature.
    Enabled with the configure flags --enable-experimental
    --enable-dual-alg-certs (PR 7112)
  * CryptoCb support for PQC algorithms (PR 7110)

OTHER FEATURE ADDITIONS

  * The Linux kernel module now supports registration of AES-GCM, AES-XTS,
    AES-CBC, and AES-CFB with the kernel cryptosystem through the new
    --enable-linuxkm-lkcapi-register option, enabling automatic use of
    wolfCrypt implementations by the dm-crypt/luks and ESP subsystems. In
    particular, wolfCrypt AES-XTS with –enable-aesni is faster than the
    native kernel implementation.
  * CryptoCb hook to one-shot CMAC functions (PR 7059)
  * BER content streaming support for PKCS7_VerifySignedData and sign/
    encrypt operations (PR 6961 & 7184)
  * IoT-Safe SHA-384 and SHA-512 support (PR 7176)
  * I/O callbacks for content and output with PKCS7 bundle sign/encrypt to
    reduce peak memory usage (PR 7272)
  * Microchip PIC24 support and example project (PR 7151)
  * AutoSAR shim layer for RNG, SHA256, and AES (PR 7296)
  * wolfSSL_CertManagerUnloadIntermediateCerts API to clear intermediate
    certs added to certificate store (PR 7245)
  * Implement SSL_get_peer_signature_nid and SSL_get_peer_signature_type_nid
    (PR 7236)

Enhancements and Optimizations

  * Remove obsolete user-crypto functionality and Intel IPP support (PR 7097)
  * Support for RSA-PSS signatures with CRL use (PR 7119)
  * Enhancement for AES-GCM use with Xilsecure on Microblaze (PR 7051)
  * Support for crypto cb only build with ECC and NXP CAAM (PR 7269)
  * Improve liboqs integration adding locking and init/cleanup functions (PR
    7026)
  * Prevent memory access before clientSession->serverRow and
    clientSession->serverIdx are sanitized (PR 7096)
  * Enhancements to reproducible build (PR 7267)
  * Update Arduino example TLS Client/Server and improve support for ESP32
    (PR 7304 & 7177)
  * XC32 compiler version 4.x compatibility (PR 7128)
  * Porting for build on PlayStation 3 and 4 (PR 7072)
  * Improvements for Espressif use; SHA HW/SW selection and use on ESP32-C2/
    ESP8684, wolfSSL_NewThread() type, component cmake fix, and update TLS
    client example for ESP8266 (PR 7081, 7173, 7077, 7148, 7240)
  * Allow crypto callbacks with SHA-1 HW (PR 7087)
  * Update OpenSSH port to version 9.6p1(PR 7203)
  * ARM Thumb2 enhancements, AES-GCM support for GCM_SMALL, alignment fix on
    key, fix for ASM clobber list (PR 7291,7301,7221)
  * Expand heap hint support for static memory build with more x509 functions
    (PR 7136)
  * Improving ARMv8 ChaCha20 ASM (alignment) (PR 7182)
  * Unknown extension callback wolfSSL_CertManagerSetUnknownExtCallback added
    to CertManager (PR 7194)
  *  Implement wc_rng_new_ex for use with devID’s with crypto callback (PR
    7271)
  * Allow reading 0-RTT data after writing 0.5-RTT data (PR 7102)
  * Send alert on bad PSK binder error (PR 7235)
  * Enhancements to CMake build files for use with cross compiling (PR 7188)

Fixes

  * Fix for checking result of MAC verify when no AAD is used with AES-GCM
    and Xilinx Xilsecure (PR 7051)
  * Fix for Aria sign use (PR 7082)
  * Fix for invalid dh_ffdhe_test test case using Intel QuickAssist (PR 7085)
  * Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES
    GCM and CCM support with TLS (PR 7018)
  * Fixes for STM32 PKA use with ECC (PR 7098)
  * Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation
    (PR 7070)
  * Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
  * Siphash x64 asm fix for use with older compilers (PR 7299)
  * Fix for SGX build with SP (PR 7308)
  * Fix to Make it mandatory that the cookie is sent back in new ClientHello
    when seen in a HelloRetryRequest with (PR 7190)
  * Fix for wrap around behavior with BIO pairs (PR 7169)
  * OCSP fixes for parsing of response correctly when there was a revocation
    reason and returning correct error value with date checks (PR 7241 & 7255)
  * Fix build with NO_STDIO_FILESYSTEM and improve checks for XGETENV (PR
    7150)
  * Fix for DTLS sequence number and cookie when downgrading DTLS version (PR
    7214)
  * Fix for write_dup use with chacha-poly cipher suites (PR 7206)
  * Fix for multiple handshake messages in one record failing with
    OUT_OF_ORDER_E when downgrading from TLS 1.3 to TLS 1.2 (PR 7141)
  * Fix for AES ECB build with Thumb and alignment (PR 7094)
  * Fix for negotiate handshake until the end in wolfSSL_read/wolfSSL_write
    if hitting an edge case with want read/write (PR 7237)
2024-03-23 00:24:29 +00:00
gutteridge fecb6a682c bootstrap: add some comments about Linux specifics 2024-03-22 23:34:00 +00:00
nia 1da87242a5 quakespasm: Fix building on Darwin 2024-03-22 23:05:42 +00:00
schmonz f4c7d3e2a1 doc: Updated www/snac to 2.50 2024-03-22 22:52:41 +00:00
schmonz 6823698ea2 snac: update to 2.50. Changes:
Incoming posts can now be filtered out by content using regular
expressions on a server level (these regexes are written in the
`filter_reject.txt` file at the server base directory; see `snac(5)` and
`snac(8)`).

Improved page position after hitting the `Hide` or `MUTE` buttons (for
most cases).

Use a shorter maximum conversation thread level (also, this maximum
value is now configurable at compilation level with the
`MAX_CONVERSATION_LEVELS` define).

Fixed a bug where editing a post made the attached media or video
to be lost.

The way of refreshing remote actor data has been improved.

Posting from the command-line now allows attachments.
2024-03-22 22:52:36 +00:00
pin bc30ce5c43 doc: Updated sysutils/lsd to 1.1.0 2024-03-22 22:08:39 +00:00
pin 1de7896766 sysutils/lsd: update to 1.1.0
This is an important release for Windows users and LoongArch users!

We refactor the permissions in Windows and make some performance improvements,
This is also the first release that supports the LoongArch!

Added
    Parse hex colors in themes (#647) by @zappolowski in #889
    Add configuration and CLI options: truncate owner by @bbc2 in #905
    Add support for --literal flag and literal entry in config by @PanGan21 in #900
     add disable option for permission by @zwpaper in #882
    RPM spec file for lsd by @daniejstriata in #901
    ci: Release PowerShell completion script by @YDX-2147483647 in #953
    🛤️  ci: package deb without zst by @zwpaper in #970
    feat: Windows safe default permissions (fixes ACL errors/performance) by @domsleee in #911
    🛤️ : add loongarch ci and releases by @zwpaper in #990

Changed
    upgrade xattr to version 1 by @alexanderkjall in #912
    upgrade dirs to version 5 by @alexanderkjall in #913
    upgrade lscolors to 0.14.0 by @alexanderkjall in #914
    ⬇️ change dirs to 4 by @zwpaper in #916
    Bump rustix from 0.36.7 to 0.36.16 by @dependabot in #937
    ⬆️ bump lscolors to v0.15.0 and msrv to 1.69.0 by @zwpaper in #944
    update various dependencies by @decathorpe in #938
    Bump libgit2-sys from 0.16.1+1.7.1 to 0.16.2+1.7.2 by @dependabot in #987
    update various dependencies by @decathorpe in #984
    🔨 🎨 put fish auto comp under vendor dir by @zwpaper in #983
    Add support for tilde (~) expansion on windows by @zwpaper and @ofersadan85 in #999

Fixed
    Fix literal flag not being recognized from config file by @Akmadan23 in #935

Icons
    add obj directory icon by @TruncatedDinoSour in #909
    add and improve icons by @TruncatedDinoSour in #942
    Adding some more icons for filenames and extensions by @Babkock in #929
    Add PRQL by @vanillajonathan in #945
    Update icon.rs by @vanillajonathan in #946
    Nim lang support by @atamakahere-git in #979
    change neovim to proper icon by @zachcoyle in #993
    Add fennel support by @tranzystorekk in #992
    Add icons for .apng and .avif by @nix6839 in #1007

Docs
    Update README for installation on OpenBSD by @lcheylus in #884
    Update repository names in README.md by @hezhizhen in #892
    Fix a broken parenthesis (typo) in CHANGELOG by @YDX-2147483647 in #888
    Add changelog deprecation notice by @shilangyu in #907
    ❤️ update funding to Wei by @zwpaper in #915
    ❤️ add sponsor from warp.dev by @zwpaper in #927
    fix typo in link color table by @dcechano in #932
    Update README: Icon Theme config does not require build from source by @chaopeng in #957
    installation: windows (winget) (README) by @kdpuvvadi in #920
    📝 docs: add notice for the readme is for dev by @zwpaper in #960
    Updated README.md to contain clear instructions for color scheming in Windows by @Inventhrice in #961
    📝 🔨 emphasis on the dev docs notice by @zwpaper in #969
    📝 document --date=locale by @zica87 in #985
2024-03-22 22:08:12 +00:00
wiz f79b1ad1a1 doc: add a gnutls vuln 2024-03-22 20:14:03 +00:00
wiz 4e1565b997 doc/TODO: + tor-browser-13.0.13. 2024-03-22 20:13:33 +00:00
schmonz ff8dc746a8 macOS: avoid install popups for missing m4 or yacc.
NFCI on non-macOS or macOS with working /usr/bin/{m4,yacc}.

FCI on macOS with Command Line Tools 15.3.0.0.1.1708646388: packages
that don't properly declare m4 or yacc in USE_TOOLS will now silently
invoke no-op versions of those tools, rather than popping up the useless
CLT install dialog.

Post-freeze, we can consider switching to TOOLS_FAIL and/or generalizing
an optional mode in which invoking any undeclared tool on any platform
breaks the build.
2024-03-22 18:59:04 +00:00
adam 51efb08e35 Updated www/py-djangorestframework, www/py-asgiref 2024-03-22 18:48:49 +00:00
adam 751e584bcc py-asgiref: updated to 3.8.1
3.8.1 (2024-03-22)
------------------

* Fixes a regression in 3.8.0 affecting nested task cancellation inside
  sync_to_async.

3.8.0 (2024-03-20)
------------------

* Adds support for Python 3.12.

* Drops support for (end-of-life) Python 3.7.

* Fixes task cancellation propagation to subtasks when using synchronous Django
  middleware.

* Allows nesting ``sync_to_async`` via ``asyncio.wait_for``.

* Corrects WSGI adapter handling of root path.

* Handles case where `"client"` is ``None`` in WsgiToAsgi adapter.
2024-03-22 18:48:05 +00:00
adam 5e40c4a378 py-djangorestframework: updated to 3.15.1
3.15.1

Fix SearchFilter handling of quoted and comma separated strings, when .get_search_terms is being called into by a custom class. See
Revert number of 3.15.0 issues which included unintended side-effects. See

3.15.0

Django 5.0 and Python 3.12 support
Use POST method instead of GET to perform logout in browsable API [9208]
Added jQuery 3.7.1 support & dropped previous version
Use str as default path converter
Document support for http.HTTPMethod in the @action decorator added in Python 3.11
Update exceptions.md
Partial serializer should not have required fields
Propagate 'default' from model field to serializer field.
Allow to override child.run_validation call in ListSerializer
Align SearchFilter behaviour to django.contrib.admin search
Class name added to unknown field error
Fix: Pagination response schemas.
Fix choices in ChoiceField to support IntEnum
Fix SearchFilter rendering search field with invalid value
Fix OpenAPI Schema yaml rendering for timedelta
Fix NamespaceVersioning ignoring DEFAULT_VERSION on non-None namespaces
Added Deprecation Warnings for CoreAPI
Removed usage of field.choices that triggered full table load
Permit mixed casing of string values for BooleanField validation
Fixes BrowsableAPIRenderer for usage with ListSerializer.
Change semantic of OR of two permission classes
Remove dependency on pytz
Make set_value a method within Serializer
Fix URLPathVersioning reverse fallback
Warn about Decimal type in min_value and max_value arguments of DecimalField
Fix mapping for choice values
Refactor read function to use context manager for file handling
Fix: fallback on CursorPagination ordering if unset on the view
Replaced OrderedDict with dict
Refactor get_field_info method to include max_digits and decimal_places attributes in SimpleMetadata class
Implement __eq__ for validators
Ensure CursorPagination respects nulls in the ordering field
Use ZoneInfo as primary source of timezone data
Add username search field for TokenAdmin
Handle Nested Relation in SlugRelatedField when many=False
Bump version of jQuery to 3.6.4 & updated ref links
Support UniqueConstraint
Allow Request, Response, Field, and GenericAPIView to be subscriptable. This allows the classes to be made generic for type checking.
Feat: Add some changes to ValidationError to support django style validation errors
Fix Respect can_read_model permission in DjangoModelPermissions
Add SimplePathRouter
Re-prefetch related objects after updating
Fix FilePathField required argument
Raise ImproperlyConfigured exception if basename is not unique
Use PrimaryKeyRelatedField pkfield in openapi
replace partition with split in BasicAuthentication
Fix BooleanField's allow_null behavior
Handle Django's ValidationErrors in ListField
Remove a bit of inline CSS. Add CSP nonce where it might be required and is available
Use autocomplete widget for user selection in Token admin
Make browsable API compatible with strong CSP
Avoid inline script execution for injecting CSRF token
Mitigate global dependency on inflection
Register Django urls
Implemented Verbose Name Translation for TokenProxy
Properly handle OverflowError in DurationField deserialization
Fix OpenAPI operation name plural appropriately
Represent SafeString as plain string on schema rendering
Fix 8771 - Checking for authentication even if _ignore_model_permissions = True
Fix 404 when page query parameter is empty string
Fixes instance check in ListSerializer.to_representation
FloatField will crash if the input is a number that is too big
Add missing DurationField to SimpleMetada label_lookup
Add support for Python 3.11
Make request consistently available in pagination classes
Possibility to remove trailing zeros on DecimalFields representation
Add a method for getting serializer field name (OpenAPI)
Add __eq__ method for OperandHolder class
Avoid importing django.test package when not testing
Preserve exception messages for wrapped Django exceptions
Include examples and format to OpenAPI schema of CursorPagination
Fix infinite recursion with deepcopy on Request
Refactor: Replace try/except with contextlib.suppress()
Minor fix to SerializeMethodField docstring
Minor refactor: Unnecessary use of list() function
Unnecessary list comprehension
Use correct class to indicate present deprecation
2024-03-22 18:45:23 +00:00
hauke d641a76268 doc: Updated devel/py-hg-git to 1.1.1 2024-03-22 18:43:56 +00:00