Commit graph

323891 commits

Author SHA1 Message Date
gutteridge
4221beb477 mate*: remove unintentional linkage against pkgsrc gettext-libs
As of 1.24, MATE requires GNU-specific msgfmt features. meta-pkgs/mate/
Makefile.common r. 1.10 expressed this tool dependency using
USE_BUILTIN.gettext=no, but this exposed pkgsrc gettext-libs in the
build environment as well, which some MATE packages then linked
against, but gettext-libs didn't end up being declared as a run-time
dependency, so binary package installations were broken (with the
workaround of manually installing the undeclared gettext-libs
dependency). Express this dependency differently, so GNU msgfmt is
used as a tool without exposing pkgsrc gettext-libs.

(The pkgsrc tooling infrastruture could be altered to provide a
distinct "gmsgfmt" tool, same with "gxgettext", and perhaps others.
Here I'm just immediately concerned with fixing this packaging issue.)

Addresses PR pkg/55503 by Jay Patel.
2020-08-24 04:41:39 +00:00
wiedi
3980a94f48 doc: Updated editors/nano to 5.1 2020-08-23 23:09:49 +00:00
wiedi
d7e425910b nano: update to 5.1
2020.08.12 - GNU nano 5.1 "Cantabria"
• M-Bsp (Alt+Backspace) deletes a word backwards, like in Bash.
• M-[ has become bindable.  (Be careful, though: as it is the
  starting combination of many escape sequences, avoid gluing
  it together with other keystrokes, like in a macro.)
• With --indicator and --softwrap, the first keystroke in an
  empty buffer does not crash.
• Invoking the formatter while text is marked does not crash.
• In UTF-8 locales, an anchor is shown as a diamond.

2020.07.29 - GNU nano 5.0 "Among the fields of barley"
• With --indicator (or -q or 'set indicator') nano will show a kind
  of scrollbar on the righthand side of the screen to indicate where
  in the buffer the viewport is located and how much it covers.
• With <Alt+Insert> any line can be "tagged" with an anchor, and
  <Alt+PageUp> and <Alt+PageDown> will jump to the nearest anchor.
  When using line numbers, an anchor is shown as "+" in the margin.
• The Execute Command prompt is now directly accessible from the
  main menu (with ^T, replacing the Spell Checker).  The Linter,
  Formatter, Spell Checker, Full Justification, Suspension, and
  Cut-Till-End functions are available in this menu too.
• On terminals that support at least 256 colors, nine new color
  names are available: pink, purple, mauve, lagoon, mint, lime,
  peach, orange, and latte.  These do not have lighter versions.
• For the color names red, green, blue, yellow, cyan, magenta,
  white, and black, the prefix 'light' gives a brighter color.
  Prefix 'bright' is deprecated, as it means both bold AND light.
• All color names can be preceded with "bold," and/or "italic,"
  (in that order) to get a bold and/or italic typeface.
• With --bookstyle (or -O or 'set bookstyle') nano considers any
  line that begins with whitespace as the start of a paragraph.
• Refreshing the screen with ^L now works in every menu.
• In the main menu, ^L also centers the line with the cursor.
• Toggling the help lines with M-X now works in all menus except
  in the help viewer and the linter.
• At a filename prompt, the first <Tab> lists the possibilities,
  and these are listed near the bottom instead of near the top.
• Bindable function 'curpos' has been renamed to 'location'.
• Long option --tempfile has been renamed to --saveonexit.
• Short option -S is now a synonym of --softwrap.
• The New Buffer toggle (M-F) has become non-persistent.  Options
  --multibuffer and 'set multibuffer' still make it default to on.
• Backup files will retain their group ownership (when possible).
• Data is synced to disk before "... lines written" is shown.
• The raw escape sequences for F13 to F16 are no longer recognized.
• Distro-specific syntaxes, and syntaxes of less common languages,
  have been moved down to subdirectory syntax/extra/.  The affected
  distros and others may wish to move wanted syntaxes one level up.
• Syntaxes for Markdown, Haskell, and Ada were added.
2020-08-23 23:09:01 +00:00
sjmulder
0de0a42370 doc: Updated sysutils/nnn to 3.4 2020-08-23 22:32:10 +00:00
sjmulder
c4de35e512 sysutils/nnn: Update to 3.4
Changes:
 - icons with icon-specific colors (thanks @KlzXS)
 - enhanced NNN_COLORS with xterm 256 colors support
 - new colorscheme with NNN_FCOLORS (file type specific colors)
 - switch -C to force earlier colorscheme (dirs follow context color)
 - updates for Haiku (thanks @CodeforEvolution)
 - fix XFS navigation issue (thanks @ucs1)
 - optimize archive extension matching on file open
 - show location in context color
 - support host[:dir] format for remote mounts
 - clear selection after copy
 - support traversal on file/dir creation
 - show selection in reverse in status bar
 - show status bar indicator H when hidden files are listed
 - show and confirm archive command output
 - support cd on quit in picker mode
2020-08-23 22:31:29 +00:00
he
7448fa35b7 Make this build on NetBSD/powerpc:
* c++ doesn't predefine __ppc__, only __powerpc__.  Compensate.
 * On NetBSD/powerpc, use libatomic for access to 64-bit atomics.
PKGREVISION not bumped; build fix for NetBSD/powerpc, should not affect others.
2020-08-23 22:29:47 +00:00
sjmulder
3c593622bf doc: Updated math/sc-im to 0.7.0nb16 2020-08-23 22:29:38 +00:00
sjmulder
0de596d55c math/sc-im: Revbump for libxlsxwriter update 2020-08-23 22:29:19 +00:00
sjmulder
7ad7f28fb2 doc: Updated textproc/libxlsxwriter to 0.9.9 2020-08-23 22:28:25 +00:00
sjmulder
aece32b64b textproc/libxlsxwriter: Update to 0.9.9
Changes in 0.9.6:
 - Added support for chart custom data labels.
 - Fix for issue where array formulas weren't included in the output
   file for certain ranges/conditions. Issue #735.

Changes in 0.9.7:
 - Changed #lxw_chart_data_label field from .delete to .hide in order to
   avoid reserved word conflict with C++. Issue #300

Changes in 0.9.8:
 - Added formatting for chart data labels and chart custom data labels.

Changes in 0.9.9:
 - Added support for images in headers and footers. See
   worksheet_set_header_opt().
 - Added worksheet_ignore_errors() function to ignore Excel worksheet
   errors/warnings in user defined ranges.
2020-08-23 22:27:52 +00:00
wiz
218a53bf64 doc: Updated editors/emacs27 to 27.1nb2 2020-08-23 20:12:45 +00:00
wiz
56b272dd8d emacs27: add default-on option for JSON support and add workaround for emacsclient socket issue
Both from iquiw on pkgsrc-users.

Bump PKGREVISION.
2020-08-23 20:12:34 +00:00
kamil
dcba9f9567 doc: Updated audio/ncspot to 0.2.1nb1 2020-08-23 14:58:04 +00:00
kamil
3a110a4c4d ncspot: Call libc::setlocale() to fix printing of non-ASCII characters
Upstream bug report:
https://github.com/hrkfdn/ncspot/issues/221

Analysis done by rvp @ UnitedBSD
https://www.unitedbsd.com/d/233-spotify/54
2020-08-23 14:57:42 +00:00
ryoon
906fab14af doc: Updated security/keepassxc to 2.6.1 2020-08-23 13:32:13 +00:00
ryoon
6b242e747c keepassxc: Update to 2.6.1
* Disable document option, it requires asciidoctor.

Changelog:
## 2.6.1 (2020-08-19)

### Added

- Add menu entries for auto-typing only username or only password [#4891]
- Browser: Add command for retrieving current TOTP [#5278]
- Improve man pages [#5010]
- Linux: Support Xfce screen lock signals [#4971]
- Linux: Add OARS metadata to AppStream markup [#5031]
- SSH Agent: Substitute tilde with %USERPROFILE% on Windows [#5116]

### Changed

- Improve password generator UI and UX [#5129]
- Do not prompt to restart if switching the theme back and forth [#5084]
- Change actions for F1, F2, and F3 keys [#5082]
- Skip referenced passwords in health check report [#5056]
- Check system-wide Qt translations directory for downstream translations packaging [#5064]
- macOS: Change password visibility toggle shortcut to Ctrl+H to avoid conflict with system shortcut [#5114]
- Browser: Only display domain name in browser access confirm dialog to avoid overly wide window sizes [#5214]

### Fixed

- Fix clipboard not being cleared when database is locked while timeout is still active [#5184]
- Fix list of previous databases not being cleared in some cases [#5123]
- Fix saving of non-data changes on database lock [#5210]
- Fix search results banner theming [#5197]
- Don't enforce theme palette in Classic theme mode and add hover effect for buttons [#5122,#5267]
- Fix label clipping in settings on high-DPI screens [#5227]
- Fix excessive memory usage by icons on systems with high-DPI screens [#5266]
- Fix crash if number of TOTP digits exceeds ten [#5106]
- Fix slot detection when first YubiKey is configured on the second slot [#5004]
- Prevent crash if focus widget gets deleted during saving [#5005]
- Always show buttons for opening or saving attachments [#4956]
- Update link to Auto-Type help [#5228]
- Fix build errors with Ninja [#5121]
- CLI: Fix db-info command wrongly labelled as db-show in usage listing [#5140]
- Windows: Use Classic theme by default if high-contrast mode is on [#5191]
- Linux: Add workaround for qt5ct bug, causing icons not to show up [#5011]
- Linux: Correct high-DPI display by not allowing fractional scaling [#5185]
- Browser: Consider subdomain and path when requesting only "best-matching credentials" [#4832]
- SSH Agent: Always forget all keys on lock [#5115]

## 2.6.0 (2020-07-06)

### Added

- Custom Light and Dark themes [#4110, #4769, #4791, #4892, #4915]
- Compact mode to use classic Group and Entry line height [#4910]
- New monochrome tray icons [#4796, #4803]
- View menu to quickly switch themes, compact mode, and toggle UI elements [#4910]
- Search for groups and scope search to matched groups [#4705]
- Save Database Backup feature [#4550]
- Sort entries by "natural order" and move lines up/down [#4357]
- Option to launch KeePassXC on system startup/login [#4675]
- Caps Lock warning on password input fields [#3646]
- Add "Size" column to entry view [#4588]
- Browser-like tab experience using Ctrl+[Num] (Alt+[Num] on Linux) [#4063, #4305]
- Password Generator: Define additional characters to choose from [#3876]
- Reports: Database password health check (offline) [#3993]
- Reports: HIBP online service to check for breached passwords [#4438]
- Auto-Type: DateTime placeholders [#4409]
- Browser: Show group name in results sent to browser extension [#4111]
- Browser: Ability to define a custom browser location (macOS and Linux only) [#4148]
- Browser: Ability to change root group UUID and inline edit connection ID [#4315, #4591]
- CLI: `db-info` command [#4231]
- CLI: Use wl-clipboard if xclip is not available (Linux) [#4323]
- CLI: Incorporate xclip into snap builds [#4697]
- SSH Agent: Key file path env substitution, SSH_AUTH_SOCK override, and connection test [#3769, #3801, #4545]
- SSH Agent: Context menu actions to add/remove keys [#4290]

### Changed

- Complete replacement of default database icons [#4699]
- Complete replacement of application icons [#4066, #4161, #4203, #4411]
- Complete rewrite of documentation and manpages using Asciidoctor [#4937]
- Complete refactor of config files; separate between local and roaming [#4665]
- Complete refactor of browser integration and proxy code [#4680]
- Complete refactor of hardware key integration (YubiKey and OnlyKey) [#4584, #4843]
- Significantly improve performance when saving and opening databases [#4309, #4833]
- Remove read-only detection for database files [#4508]
- Overhaul of password fields and password generator [#4367]
- Replace instances of "Master Key" with "Database Credentials" [#4929]
- Change settings checkboxes to positive phrasing for consistency [#4715]
- Improve UX of using entry actions (focus fix) [#3893]
- Set expiration time to Now when enabling entry expiration [#4406]
- Always show "New Entry" in context menu [#4617]
- Issue warning before adding large attachments [#4651]
- Improve importing OPVault [#4630]
- Improve AutoOpen capability [#3901, #4752]
- Check for updates every 7 days even while still running [#4752]
- Improve Windows installer UI/UX [#4675]
- Improve config file handling of portable distribution [#4131, #4752]
- macOS: Hide dock icon when application is hidden to tray [#4782]
- Browser: Use unlock dialog to improve UX of opening a locked database [#3698]
- Browser: Improve database and entry settings experience [#4392, #4591]
- Browser: Improve confirm access dialog [#2143, #4660]
- KeeShare: Improve monitoring file changes of shares [#4720]
- CLI: Rename `create` command to `db-create` [#4231]
- CLI: Cleanup `db-create` options (`--set-key-file` and `--set-password`) [#4313]
- CLI: Use stderr for help text and password prompts [#4086, #4623]
- FdoSecrets: Display existing secret service process [#4128]

### Fixed

- Fix changing focus around the main window using tab key [#4641]
- Fix search field clearing while still using the application [#4368]
- Improve search help widget displaying on macOS and Linux [#4236]
- Return keyboard focus after editing an entry [#4287]
- Reset database path after failed "Save As" [#4526]
- Make builds reproducible [#4411]
- Improve handling of ccache when building [#4104, #4335]
- Windows: Use correct UI font and size [#4769]
- macOS: Properly re-hide application window after browser integration and Auto-Type usage [#4909]
- Linux: Fix version number not embedded in AppImage [#4842]
- Auto-Type: Fix crash when performing on new entry [#4132]
- Browser: Send legacy HTTP settings to recycle bin [#4589]
- Browser: Fix merging browser keys [#4685]
- CLI: Fix encoding when exporting database [#3921]
- SSH Agent: Improve reliability and underlying code [#3833, #4256, #4549, #4595]
- FdoSecrets: Fix crash when editing settings before service is enabled [#4332]
2020-08-23 13:31:45 +00:00
taca
34eb9356e4 doc: Updated net/bind916 to 9.16.6 2020-08-23 10:03:38 +00:00
taca
ba2f90cc74 net/bind916: update to 9.16.5
Update bind916 to 9.16.5 (BIND 9.16.5).


	--- 9.16.5 released ---

5458.	[bug]		Prevent a theoretically possible NULL dereference caused
			by a data race between zone_maintenance() and
			dns_zone_setview_helper(). [GL #1627]

5455.	[bug]		named could crash when cleaning dead nodes in
			lib/dns/rbtdb.c that were being reused. [GL #1968]

5454.	[bug]		Address a startup crash that occurred when the server
			was under load and the root zone had not yet been
			loaded. [GL #1862]

5453.	[bug]		named crashed on shutdown when a new rndc connection was
			received during shutdown. [GL #1747]

5452.	[bug]		The "blackhole" ACL was accidentally disabled for client
			queries. [GL #1936]

5451.	[func]		Add 'rndc dnssec -status' command. [GL #1612]

5449.	[bug]		Fix a socket shutdown race in netmgr udp. [GL #1938]

5448.	[bug]		Fix a race condition in isc__nm_tcpdns_send().
			[GL #1937]

5447.	[bug]		IPv6 addresses ending in "::" could break YAML
			parsing. A "0" is now appended to such addresses
			in YAML output from dig, mdig, delv, and dnstap-read.
			[GL #1952]

5446.	[bug]		The validator could fail to accept a properly signed
			RRset if an unsupported algorithm appeared earlier in
			the DNSKEY RRset than a supported algorithm. It could
			also stop if it detected a malformed public key.
			[GL #1689]

5444.	[bug]		'rndc dnstap -roll <value>' did not limit the number of
			saved files to <value>. [GL !3728]

5443.	[bug]		The "primary" and "secondary" keywords, when used
			as parameters for "check-names", were not
			processed correctly and were being ignored. [GL #1949]

5441.	[bug]		${LMDB_CFLAGS} was missing from make/includes.in.
			[GL #1955]

5440.	[test]		Properly handle missing kyua. [GL #1950]

5439.	[bug]		The DS RRset returned by dns_keynode_dsset() was used in
			a non-thread-safe manner. [GL #1926]
2020-08-23 10:03:00 +00:00
wiz
ba86acc911 doc/TODO: add some
+ bison-3.7.1, enchant2-2.2.9, gdbm-1.18.1, ocaml-4.11.0,
  py-setuptools-50.0.0 [drops python-2.x support].
2020-08-23 09:53:53 +00:00
taca
79dc660799 doc: Updated www/squid4 to 4.13 2020-08-23 09:52:28 +00:00
taca
7bfda7c216 www/squid4: update to 4.13
Update squid4 to 4.13 (Squid 4.13).

Here is release announce:

The Squid HTTP Proxy team is very pleased to announce the availability
of the Squid-4.13 release!


This release is a security release resolving several issues found in
the prior Squid releases.


The major changes to be aware of:

 * SQUID-2020:8 HTTP(S) Request Splitting
   (CVE-2020-15811)

This problem is serious because it allows any client, including
browser scripts, to bypass local security and poison the browser
cache and any downstream caches with content from an arbitrary
source.

See the advisory for patches:
 <https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv>


 * SQUID-2020:9 Denial of Service processing Cache Digest Response
   (CVE pending allocation)

This problem allows a trusted peer to deliver to perform Denial
of Service by consuming all available CPU cycles on the machine
running Squid when handling a crafted Cache Digest response
message.

This attack is limited to Squid using cache_peer with cache
digests feature.

See the advisory for patches:
 <https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg>


 * SQUID-2020:10 HTTP(S) Request Smuggling
   (CVE-2020-15810)

This problem is serious because it allows any client, including
browser scripts, to bypass local security and poison the proxy
cache and any downstream caches with content from an arbitrary
source.


See the advisory for patches:
 <https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m>


 * Bug 5051: Some collapsed revalidation responses never expire

This bug appears as a 4xx or 5xx status response becoming the only
response delivered by Squid to a URL when Collapsed Forwarding
feature is used.

It primarily affects Squid which are caching the 4xx/5xx status
object since Bug 5030 fix in Squid-4.11. But may have been
occurring for short times on any proxy with Collapsed Forwarding.



 * SSL-Bump: Support parsing GREASEd (and future) TLS handshakes

Chrome Browser intentionally sends random garbage values in the
TLS handshake to force TLS implementations to cope with future TLS
extensions cleanly. The changes in Squid-4.12 to disable TLS/1.3
caused our parser to be extra strict and reject this TLS garbage.

This release adds explicit support for Chrome, or any other TLS
agent performing these "GREASE" behaviours.


 * Honor on_unsupported_protocol for intercepted https_port

This behaviour was one of the intended use-cases for unsupported
protocol handling, but somehow was not enabled earlier.

Squid should now be able to perform the on_unsupported_protocol
selected action for any traffic handled by SSL-Bump.


  All users of Squid are urged to upgrade as soon as possible.


See the ChangeLog for the full list of changes in this and earlier
releases.

Please refer to the release notes at
http://www.squid-cache.org/Versions/v4/RELEASENOTES.html
when you are ready to make the switch to Squid-4
2020-08-23 09:51:35 +00:00
ryoon
ce3de05e30 doc: Updated devel/nss to 3.56 2020-08-23 08:31:57 +00:00
ryoon
6971b19d8a nss: Update to 3.56
CHangelog:
Notable Changes in NSS 3.56

* The known issue where Makefile builds failed to locate seccomon.h was fixed
in Bug 1653975.
* NSPR dependency updated to 4.28.

Bugs fixed in NSS 3.56

* Bug 1650702 - Support SHA-1 HW acceleration on ARMv8
* Bug 1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* Bug 1654142 - Add CPU feature detection for Intel SHA extension.
* Bug 1648822 - Add stricter validation of DH keys in FIPS mode.
* Bug 1656986 - Properly detect arm64 during GYP build architecture detection.
* Bug 1652729 - Add build flag to disable RC2 and relocate to
lib/freebl/deprecated.
* Bug 1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* Bug 1588941 - Send empty certificate message when scheme selection fails.
* Bug 1652032 - Fix failure to build in Windows arm64 makefile
cross-compilation.
* Bug 1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* Bug 1653975 - Fix 3.53 regression by setting "all" as the default makefile
target.
* Bug 1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* Bug 1659814 - Fix interop.sh failures with newer tls-interop commit and
dependencies.
* Bug 1656519 - Update NSPR dependency to 4.28.
2020-08-23 08:31:27 +00:00
ryoon
2c38648843 doc: Updated devel/nspr to 4.28 2020-08-23 08:26:07 +00:00
ryoon
af52ca7c17 nspr: Update to 4.28
Changelog:
NSPR 4.28 contains the following changes:
- Fix a compiler warning
- Add rule for cross-compiling with cygwin
2020-08-23 08:25:27 +00:00
ryoon
d50da50214 fcitx: Fix build, devel/libuuid is explicitly required 2020-08-23 08:15:48 +00:00
wiz
6c2ff5bf8a thunderbird: fix build with latest rust using patch from firefox68 2020-08-22 23:12:51 +00:00
wiz
d4558ff200 tor-browser: fix build with latest rust using patch from firefox68 2020-08-22 23:12:34 +00:00
wiz
16cdd6f71b doc: Updated mail/neomutt to 20200821nb1 2020-08-22 20:49:08 +00:00
wiz
735d4fc74b neomutt: depend on mime-types, like mutt does.
Bump PKGREVISION.
2020-08-22 20:48:59 +00:00
schmonz
ec09fd9841 doc: Updated devel/p5-Test-BDD-Cucumber to 0.72 2020-08-22 19:31:12 +00:00
schmonz
7584e868f4 Update to 0.72. From the changelog:
[Fixed]
- Shebang of 'pherkin' script not replaced on 'make install' (gh #166)
- Step dispatch handles data attribute incorrectly (gh #167)
- Update copyright years
2020-08-22 19:30:59 +00:00
wiz
ce87078921 python27: bump PKGREVISION for previous 2020-08-22 15:05:53 +00:00
schmonz
4126aac5c3 We only know the build version better than python does if we're building
'Python". For all other distributions built with distutils, we sure
don't (and, mind you, it's very unlikely to be the exact same version as
Python itself). This should fix a whole bunch of py27-* packages broken
with the previous commit. Thanks wiz@ for the heads up.
2020-08-22 13:01:42 +00:00
gson
853f54dd4c Updated misc/py-anita to 2.5 2020-08-22 11:25:04 +00:00
gson
5e9dd85eb5 misc/py-anita: update to 2.5
Changes from 2.4:

Reset the test timeout once per test case, not just once per test
program, and reduce the default timeout to 1 hour.
2020-08-22 11:24:04 +00:00
bsiegert
fd3f3f2b0c doc: Updated net/gh to 0.11.1 2020-08-22 10:21:31 +00:00
bsiegert
66aad2e304 Update gh (github cli) to 0.11.1.
NOTE: This is also an example how you replace a non-working version of a
module dependency with a working one, see the patch to go.mod.

v0.11.1

  * Enable custom color themes with the GLAMOUR_STYLE environment variable #
    1411
  * Fix printing network error in case for failed HTTP requests #1382
  * Fix creating gists from stdin with argument #1383
  * Correctly report HTTP and Markdown errors in repo view #1403
  * Automatically adapt Markdown rendering for light terminal backgrounds #1402
  * Enable adding to GO_LDFLAGS without having to replace them all #1379
  * gh pr command scriptability improvements #1373
  * gh repo command scriptability improvements #1388
  * Misc. scriptability improvements #1387

v0.11.0

  * Add support for ?shell? aliases #1191
  * Add --milestone and --mention filters to gh issue list #644
  * Add --web flag to gh issue/pr list #1282
  * Add gh api --silent flag to avoid printing HTTP response #1283
  * Print issue/PR title in confirmation messages from gh issue close/reopen
    and gh pr close/reopen #1337
  * Scriptability improvements for gh issue list/view/create commands #1343

  * gh pr checkout now prevents flag injection to git checkout via maliciously
    crafted head branch name #1365
  * gh pr checkout OWNER:BRANCH now avoids clashes with the default branch of a
    repository #1365
  * gh pr merge now gracefully handles when the merged branch is auto-deleted
    on the server per repository settings #1279
  * Avoid crash in gh issue close/reopen when issue number is invalid #1328
  * Support hosts.yml existing while config.yml does not #1304
  * Raise more informative filesystem path error after failing to read or
    create the config file #1295
  * Avoid warning about missing read:org OAuth scope if the authenticating
    token has admin:org #1359
  * Improve support for legacy issue and pull request template names #1366

  * Document supported environment variables #1370
  * Remove the -R, --repo flag mention from commands where it's not applicable
    #1253
  * Add VS Code example to gh config set documentation #1301
2020-08-22 10:21:14 +00:00
fox
a709954999 doc: Updated security/wolfssl to 4.5.0 2020-08-22 01:28:14 +00:00
fox
b3a9ef8418 security/wolfssl: Updates to v4.5.0
Changes since v4.4.0:

wolfSSL Release 4.5.0 (August 19, 2020)

If you have questions about this release, feel free to contact us on our
info@ address.

Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* Added Xilinx Vitis 2019.2 example and README updates
* TLS v1.3 is now enabled by default
* Building FIPS 140-2 code and test on Solaris
* Secure renegotiation with DTLS 1.2
* Update RSA calls for hardware acceleration with Xilsecure
* Additional OpenSSL compatibility layer functions added
* Cypress PSoC6 wolfCrypt driver added
* Added STM32CubeIDE support
* Added certificate parsing and inspection to C# wrapper layer
* TLS v1.3 sniffer support added
* TSIP v1.09 for target board GR-ROSE support added
* Added support for the "X72N Envision Kit" evaluation board
* Support for ECC nonblocking using the configure options
  "--enable-ecc=nonblock --enable-sp=yes,nonblock CFLAGS=-DWOLFSSL_PUBLIC_MP"
* Added wc_curve25519_make_pub function to generate a public key given the
  private one

Fixes

* PIC32MZ hardware cache and large hashes fix
* AES-GCM use with EVP layer in compatibility layer code
* Fix for RSA_LOW_MEM with ARM build of SP code
* Sanity check on tag length with AES-CCM to conform with RFC 3610
* Fixes for 32 and 64 bit software implementations of SP code when
  WOLFSSL_SP_CACHE_RESISTANT is defined
* GCC warning fixes for GCC 9 and later
* Sanity check on HKDF expand length to conform with RFC 5869
* Fixes for STM32 CubeMX HAL with AES-GCM
* Fixed point cache look up table (LUT) implementation fixes
* Fix for ARM 32bit SP code when calling div word
* Fix for potential out of bounds read when parsing CRLs
* Fix for potential out of bounds read with RSA unpadding
* AES-CCM optimized counter fix
* Updates to Xcode projects for new files and features
* Fix for adding CRL’s to a WOLFSSL_X509_STORE structure
* FIPSv2 build with opensslall build fixes
* Fixes for CryptoCell use with ECC and signature wrappers
* Fix for mod calculation with SP code dealing with 3072 bit keys
* Fix for handling certificates with multiple OU’s in name
* Fix for SP math implementation of sp_add_d and add a sanity check on
  rshb range
* Fix for sanity check on padding with DES3 conversion of PEM to DER
* Sanity check for potential out of bounds read with fp_read_radix_16
* Additional checking of ECC scalars.
* Fixing the FIPS Ready build w.r.t. ecc.c.
* When processing certificate names with OpenSSL compatibility layer
  enabled, unknown name item types were getting handled as having NID 0,
  and failing. Added a couple more items to what is handled correctly,
  and ignoring anything that is an unknown type.

Improvements/Optimizations

* TLS 1.3 certificate verify update to handle 8192 bit RSA keys
* wpa_supplicant support with reduced code size option
* TLS 1.3 alerts encrypted when possible
* Many minor coverity fixes added
* Error checking when parsing PKCS12 DER
* IAR warning in test.c resolved
* ATECC608A improvements for use with Harmony 3 and PIC32 MZ
* Support for AES-GCM and wc_SignatureVerifyHash with static memory and no
  malloc’s
* Enable SNI by default with JNI/JSSE builds
* NetBSD GCC compiler warnings resolved
* Additional test cases and code coverage added including curve25519 and
  curve448 tests
* Option for user defined mutexes with WOLFSSL_USER_MUTEX
* Sniffer API’s for loading buffer directly
* Fixes and improvements from going through the DO-178 process were added
* Doxygen updates and fixes for auto documentation generation
* Changed the configure option for FIPS Ready builds to be
  `--enable-fips=ready`.

This release of wolfSSL includes fixes for 6 security vulnerabilities.

wolfSSL version 4.5.0 contains 6 vulnerability fixes: 2 fixes for TLS 1.3,
2 side channel attack mitigations, 1 fix for a potential private key leak
in a specific use case, 1 fix for DTLS.

* In earlier versions of wolfSSL there exists a potential man in the middle
  attack on TLS 1.3 clients. Malicious attackers with a privileged network
  position can impersonate TLS 1.3 servers and bypass authentication. Users
  that have applications with client side code and have TLS 1.3 turned on,
  should update to the latest version of wolfSSL. Users that do not have
  TLS 1.3 turned on, or that are server side only, are NOT affected by this
  report. Thanks to Gerald Doussot from NCC group for the report.
* Denial of service attack on TLS 1.3 servers from repetitively sending
  ChangeCipherSpecs messages. This denial of service results from the
  relatively low effort of sending a ChangeCipherSpecs message versus the
  effort of the server to process that message. Users with TLS 1.3 servers are
  recommended to update to the most recent version of wolfSSL which limits the
  number of TLS 1.3 ChangeCipherSpecs that can be received in order to avoid
  this DoS attack. CVE-2020-12457 was reserved for the report. Thanks to
  Lenny Wang of Tencent Security Xuanwu LAB.
* Potential cache timing attacks on public key operations in builds that are
  not using SP (single precision). Users that have a system where malicious
  agents could execute code on the system, are not using the SP build with
  wolfSSL, and are doing private key operations on the system (such as signing
  with a private key) are recommended to regenerate private keys and update to
  the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
  issue. Thanks to Ida Bruhns from Universität zu Lübeck for the report.
* When using SGX with EC scalar multiplication the possibility of side-channel
  attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
  single precision EC operations should be used instead. Release 4.5.0 turns
  this on be default now with SGX builds and in previous versions of wolfSSL
  this can be turned on by using the WOLFSSL_SP macros. Thank you to
  Alejandro Cabrera Aldaya, Cesar Pereida García and Billy Bob Brumley from
  the Network and Information Security Group (NISEC) at Tampere University for
  the report.
* Leak of private key in the case that PEM format private keys are bundled in
  with PEM certificates into a single file. This is due to the
  misclassification of certificate type versus private key type when parsing
  through the PEM file. To be affected, wolfSSL would need to have been built
  with OPENSSL_EXTRA (--enable-opensslextra). Some build variants such as
  --enable-all and --enable-opensslall also turn on this code path, checking
  wolfssl/options.h for OPENSSL_EXTRA will show if the macro was used with the
  build. If having built with the opensslextra enable option and having placed
  PEM certificates with PEM private keys in the same file when loading up the
  certificate file, then we recommend updating wolfSSL for this use case and
  also recommend regenerating any private keys in the file.
* During the handshake, clear application_data messages in epoch 0 are
  processed and returned to the application. Fixed by dropping received
  application_data messages in epoch 0. Thank you to Paul Fiterau of Uppsala
  University and Robert Merget of Ruhr-University Bochum for the report.

For additional vulnerability information visit the vulnerability page at
https://www.wolfssl.com/docs/security-vulnerabilities/

See INSTALL file for build instructions.
More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html
2020-08-22 01:27:48 +00:00
gutteridge
f06ae9bc89 mate-sensors-applet: fix (some) builds
Expect basic headers to be available universally. The configure script
doesn't actually check for or define HAVE_LOCALE_H, which can cause
breakages when locale.h isn't pulled in through other means already.
Simplify the source file in question, rather than making configure more
complicated. (There are other source files in this package that
unconditionally expect stdio.h to be present, which seems reasonable.)
2020-08-22 00:46:49 +00:00
joerg
6594c2dd27 Progress for the SmartOS build. 2020-08-22 00:28:29 +00:00
adam
5592c037c0 Updated devel/py-test-cov, devel/py-pylint 2020-08-21 21:56:03 +00:00
adam
4ad898c6f9 py-pylint: updated to 2.6.0
What's New in Pylint 2.6.0?
===========================

* Fix various scope-related bugs in ``undefined-variable`` checker

* bad-continuation and bad-whitespace have been removed, black or another formatter can help you with this better than Pylint

* The no-space-check option has been removed. It's no longer possible to consider empty line like a `trailing-whitespace` by using clever options

* ``missing-kwoa`` is no longer emitted when dealing with overload functions

* mixed-indentation has been removed, it is no longer useful since TabError is included directly in python3

* Add `super-with-arguments` check for flagging instances of Python 2 style super calls.

* Add an faq detailing which messages to disable to avoid duplicates w/ other popular linters

* Fix superfluous-parens false-positive for the walrus operator

* Fix `fail-under` not accepting floats

* Fix a bug with `ignore-docstrings` ignoring all lines in a module

* Fix `pre-commit` config that could lead to undetected duplicate lines of code

* Fix a crash in parallel mode when the module's filepath is not set

* Add `raise-missing-from` check for exceptions that should have a cause.

* Support both isort 4 and isort 5. If you have pinned isort 4 in your projet requirements, nothing changes. If you use isort 5, though, note that the `known-standard-library` option is not interpreted the same in isort 4 and isort 5 (see the migration guide in isort documentation for further details). For compatibility's sake for most pylint users, the `known-standard-library` option in pylint now maps to `extra-standard-library` in isort 5. If you really want what `known-standard-library` now means in isort 5, you must disable the `wrong-import-order` check in pylint and run isort manually with a proper isort configuration file.
2020-08-21 21:55:41 +00:00
adam
e62d98e5cf py-test-cov: updated to 2.10.1
2.10.1
* Support for ``pytest-xdist`` 2.0, which breaks compatibility with ``pytest-xdist`` before 1.22.3 (from 2017).
* Fixed the ``LocalPath has no attribute startswith`` failure that occurred when using the ``pytester`` plugin
  in inline mode.
2020-08-21 21:54:10 +00:00
sjmulder
55958d5bab mk/platform: Update Darwin version list 2020-08-21 21:29:16 +00:00
adam
0db6c35d2c atari800: fix building on Darwin 2020-08-21 21:17:04 +00:00
joerg
3bdd960f29 Regenerate 2020-08-21 21:13:56 +00:00
schmonz
6ef4c71f0d doc: Updated textproc/xapian-omega to 1.4.17 2020-08-21 20:46:21 +00:00
schmonz
3147c82d42 Update to 1.4.17. From the changelog:
documentation:

* Document comment format supported by scriptindex index scripts.  We've
  supported comments on a line by themselves and introduced with a # since
  scriptindex was first added back in 2002, but it seems have never actually
  been documented before now.

omega:

* Check for SERVER_PROTOCOL=INCLUDED before anything which might throw an
  exception so that if it is set we suppress the Content-Type: when reporting
  such exceptions.  Spotted by Gaurav Arora.

* Report get_description() for Xapian::Error exceptions instead of get_msg().
  This means we now report the exception's type, context (useful for network
  errors), and errno information.

* Avoid leaking MyStopper object.  The object essentially has the lifespan of
  omega itself, but becomes unreachable when the QueryParser object is
  destroyed.  To make it easier to use leak-checking tools, hand ownership of
  this object to the QueryParser object.

testsuite:

* omegatest: Tell leak sanitizer not to report leaks for allocations which
  aren't explicitly released on exit - the OS will reclaim all memory from the
  process at this point and explicitly releasing everything just takes time for
  no real benefit.  We will still see leaks of objects which become unreachable
  during a run.
2020-08-21 20:46:05 +00:00