Commit graph

10271 commits

Author SHA1 Message Date
he
562314c87c Disable the configure check for GOST, don't use built-in sqlite3.
RFC 8624 says "MUST NOT" for signing and "MAY" for sig-checking.
The sqlite3 change is related to the OpenDNSSEC v2 change, to be
consistent with the choice there.

PKGREVISION bumped.
2020-01-31 19:13:07 +00:00
he
87b56a8f0b Insist on using pkgsrc sqlite3; I got SEGV's via call of null pointers
with the built-in sqlite3 on NetBSD 8.0.
Bump PKGREVISION.
2020-01-31 16:08:48 +00:00
wiz
b1c8a7f93d tor-browser: mark BROKEN, needs rust fixes or update. 2020-01-31 11:45:03 +00:00
triaxx
0e4df1dec7 sudo: update master site
TW Aren FTP server seems down and the fetching step hangs for hours.
2020-01-30 21:07:59 +00:00
triaxx
bc20954e21 openpam: fix PR pkg/54907
pkgsrc changes:
---------------
  - Add -lcript to pam_unix.so
  - Bump revision
2020-01-30 11:17:05 +00:00
jaapb
5e6d86a9b2 Added conversion to dune to security/ocaml-safepass
Project still uses jbuilder, so just run a dune upgrade before
building. No upstream changes.
2020-01-29 16:33:18 +00:00
markd
bcc5c0aea3 kf5: update to frameworks 5.66
build with qt5 5.14

All frameworks
  Port from QRegExp to QRegularExpression
  Port from qrand to QRandomGenerator
  Fix compilation with Qt 5.15 (e.g. endl is now Qt::endl,
   QHash insertMulti now requires using QMultiHash...)

Attica
  Don't use a verified nullptr as a data source
  Support multiple children elements in comment elements
  Set a proper agent string for Attica requests

Baloo
  Correctly report if baloo_file is unavailable
  Check cursor_open return value
  Initialise QML monitor values
  Move URL parsing methods from kioslave to query object

Breeze Icons
  Change XHTML icon to be a purple HTML icon
  Merge headphones and zigzag in the center
  Add application/x-audacity-project icon
  Add 32px preferences-system
  Add application/vnd.apple.pkpass icon
  icon for ktimetracker using the PNG in the app repo, to be replaced
  with real breeze SVG
  add kipi icon, needs redone as a breeze theme svg [or just kill off kipi]

Extra CMake Modules
  [android] Fix apk install target
  Support PyQt5 compiled with SIP 5

Framework Integration
  Remove ColorSchemeFilter from KStyle

KDE Doxygen Tools
  Display fully qualified class/namespace name as page header

KCalendarCore
  Improve README.md to have an Introduction section
  Make incidence geographic coordinate also accessible as a property
  Fix RRULE generation for timezones

KCMUtils
  Deprecate KCModuleContainer

KCodecs
  Fix invalid cast to enum by changing the type to int rather than enum

KCompletion
  Deprecate KPixmapProvider
  [KHistoryComboBox] Add method to set an icon provider

KConfig
  kconfig EBN transport protocol cleanup
  Expose getter to KConfigWatcher's config
  Fix writeFlags with KConfigCompilerSignallingItem
  Add a comment pointing to the history of Cut and Delete sharing a shortcut

KConfigWidgets
  Rename "Configure Shortcuts" to "Configure Keyboard Shortcuts"

KContacts
  Align ECM and Qt setup with Frameworks conventions
  Specify ECM dependency version as in any other framework

KCoreAddons
  Add KPluginMetaData::supportsMimeType
  [KAutoSaveFile] Use QUrl::path() instead of toLocalFile()
  Unbreak build w/ PROCSTAT: add missing impl. of KProcessList::processInfo
  [KProcessList] Optimize KProcessList::processInfo
  [KAutoSaveFile] Improve the comment in tempFileName()
  Fix KAutoSaveFile broken on long path

KDeclarative
  [KeySequenceHelper] Grab actual window when embedded
  Add optional subtitle to grid delegate
  [QImageItem/QPixmapItem] Don't lose precision during calculation

KFileMetaData
  Partial fix for accentuated characters in file name on Windows
  Remove unrequired private declarations for taglibextractor
  Partial solution to accept accentuated characters on windows
  xattr: fix crash on dangling symlinks

KIconThemes
  Set breeze as default theme when reading from configuration file
  Deprecate the top-level IconSize() function
  Fix centering scaled icons on high dpi pixmaps

KImageFormats
  pic: Fix Invalid-enum-value undefined behaviour

KIO
  [KFilePlacesModel] Fix supported scheme check for devices
  Embed protocol data also for Windows version of trash ioslave
  Adding support for mounting KIOFuse URLs for applications that don't use KIO
  Add truncation support to FileJob
  Deprecate KUrlPixmapProvider
  Deprecate KFileWidget::toolBar
  [KUrlNavigator] Add RPM support to krarc:
  KFilePlaceEditDialog: fix crash when editing the Trash place
  Add button to open the folder in filelight to view more details
  Show more details in warning dialog shown before starting a
  privileged operation
  KDirOperator: Use a fixed line height for scroll speed
  Additional fields such as deletion time and original path are now
  shown in the file properties dialog
  KFilePlacesModel: properly parent tagsLister to avoid memleak.
  HTTP ioslave: call correct base class in virtual_hook(). The
  base of HTTP ioslave is TCPSlaveBase, not SlaveBase
  Ftp ioslave: fix 4 character time interpreted as year
  Re-add KDirOperator::keyPressEvent to preserve BC
  Use QStyle for determining icon sizes

Kirigami
  ActionToolBar: Only show the overflow button if there are visible
  items in the menu
  Don't build and install app templates on android
  Don't hardcode the margin of the CardsListView
  Add support for custom display components to Action
  Let the other components grow if there's more things on the header
  Remove dynamic item creation in DefaultListItemBackground
  reintroduce the collapse button
  Show application window icon on AboutPage

KItemModels
  Add KColumnHeadersModel

KJS
  Added tests for Math.exp()
  Added tests for various assignment operators
  Test special cases of multiplicate operators (*, / and %)

KNewStuff
  Ensure the dialog title is correct with an uninitialised engine
  Don't show the info icon on the big preview delegate
  Support archive installs with adoption commands
  Send along the config name with requests

KPeople
  Expose enum to the metaobject compiler

KQuickCharts
  Also correct the shader header files
  Correct license headers for shaders

KService
  Deprecate KServiceTypeProfile

KTextEditor
  Add "line-count" property to the ConfigInterface
  Avoid unwanted horizontal scrolling

KWayland
  [plasmashell] Update docs for panelTakesFocus to make it generic
  [plasmashell] Add signal for panelTakesFocus changing

KXMLGUI
  KActionCollection: provide a changed() signal as a replacement for removed()
  Adjust keyboard shortcut configuration window's title

NetworkManagerQt
  Manager: add support for AddAndActivateConnection2
  cmake: Consider NM headers as system includes
  Sync Utils::securityIsValid with NetworkManager

Plasma Framework
  [ToolTip] Round position
  Enable wheel events on Slider {}
  Sync QWindow flag WindowDoesNotAcceptFocus to wayland plasmashell interface
  [calendar] Check out of bounds array access in QLocale lookup
  [Plasma Dialog] Use QXcbWindowFunctions for setting window types Qt
  WindowFlags doesn't know
  [PC3] Complete plasma progress bar animation
  [PC3] Only show progress bar indicator when the ends won't overlap
  [RFC] Fix Display Configuration icon margins
  [ColorScope] Work with plain QObjects again
  [Breeze Desktop Theme] Add monochrome user-desktop icon
  Remove default width from PlasmaComponents3.Button
  [PC3 ToolButton] Have the label take into account complementary color schemes
  Added background colors to active and inactive icon view

QQC2StyleBridge
  [ToolTip] Round position
  Update size hint when font changes

Solid
  Display first / in mounted storage access description
  Ensure mounted nfs filesystems matches their fstab declared counterpart

Sonnet
  The signal done is deprecated in favour of spellCheckDone, now correctly emitted

Syntax Highlighting
  LaTeX: fix brackets in some commands
  TypeScript: add "bigint" primitive type
  Python: improve numbers, add octals, binaries and "breakpoint" keyword
  SELinux: add "glblub" keyword and update permissions list
  Several enhancements to gitolite syntax definition
2020-01-29 11:49:22 +00:00
triaxx
150c7110ec openssl: fix PR pkg/54890
pkgsrc changes:
---------------
  * Make the BUILDLINK_API_DEPENDS of builtin.mk match the one of
    buildlink3.mk.
2020-01-28 07:34:57 +00:00
pho
6bcf164b69 Add missing dependency on converters/base64 2020-01-27 12:56:38 +00:00
rillig
9637f7852e all: migrate homepages from http to https
pkglint -r --network --only "migrate"

As a side-effect of migrating the homepages, pkglint also fixed a few
indentations in unrelated lines. These and the new homepages have been
checked manually.
2020-01-26 17:30:40 +00:00
adam
e9643d1560 py-google-auth: updated to 1.11.0
1.11.0:
Features
add non-None default timeout to AuthorizedSession.request()
distinguish transport and execution time timeouts
2020-01-25 12:49:12 +00:00
jperkin
982c63fe94 *: Remove obsolete BUILDLINK_API_DEPENDS.openssl. 2020-01-25 10:45:10 +00:00
adam
2021229dac py-google-auth: updated to 1.10.2
1.10.2:
Bug Fixes
make collections import compatible across Python versions
2020-01-22 19:32:43 +00:00
adam
8c4cf510d6 py-trustme: updated to 0.6.0
0.6.0:
Features
Allow specifying organization and organization unit in CA and issued certs.
2020-01-22 19:20:32 +00:00
nia
136703252d libsecret: Update for 0.20.0
Needed for updating epiphany.

0.20.0
 * secret-backend: New interface to represent password storage backend [!34]
 * secret-backend: Add local-storage backend [!6]
 * item: Port to GTask [!43]
 * Build fixes [!34, !37, !38, !40, !41, !42, ...]
 * Updated translations

0.19.1
 * service: Fix secret_service_ensure_session_finish error propagation [!36]

0.19.0
 * secret-password: Add necessary functions to migrate from D-Bus based API [!32]
 * egg: Request that secure memory not be dumped to disk [!30]
 * Add version macros [!29]
 * Add missing GType to flags in .gir [!16, !19]
 * paths: Port from GSimpleAsyncResult to GTask [!26]
 * build: Bump meson_version to 0.50 [!18, !35]
 * Build and test fixes [!15, !20, !21, !23, !33, ...]
2020-01-21 14:04:16 +00:00
jperkin
e0bbb4d5f1 openssl: Explicitly disable afalgeng for now.
This is only supported in certain Linux configurations, so will need proper
PLIST logic if it is to be properly handled as an option.  Fixes EL7.
2020-01-20 17:42:53 +00:00
taca
3bd0c2503e security/Makefile: add and enable ruby-gssapi 2020-01-19 14:23:55 +00:00
taca
e89672a144 security/ruby-gssapi: add version 1.3.0 package
Add ruby-gssapi version 1.3.0 package.


Ruby GSSAPI Library

This is a wrapper around the system GSSAPI library (MIT only at this time).
It exposes the low-level GSSAPI methods like gss_init_sec_context and
gss_wrap and also provides an easier to use wrapper on top of this for
common usage scenarios.
2020-01-19 14:23:13 +00:00
taca
cb59c211d0 security/Makefile: add and enable ruby-ed25519 2020-01-19 14:21:25 +00:00
taca
c10aa30521 security/ruby-ed25519: add version 1.2.4 package
Add ruby-ed25519 version 1.2.4 package.


# ed25519.rb

A Ruby binding to the Ed25519 elliptic curve public-key signature system
described in [RFC 8032].

Two implementations are provided: a MRI C extension which uses the "ref10"
implementation from the SUPERCOP benchmark suite, and a pure Java version
based on [str4d/ed25519-java].

Ed25519 is one of two notable algorithms implemented atop the Curve25519
elliptic curve. The [x25519 gem] is a related project of this one,
and implements the X25519 Diffie-Hellman key exchange algorithm on the
Montgomery form of Curve25519.

[RFC 8032]: https://tools.ietf.org/html/rfc8032
[str4d/ed25519-java]: https://github.com/str4d/ed25519-java
[x25519 gem]: https://github.com/crypto-rb/x25519
2020-01-19 14:20:38 +00:00
pho
87e3139b27 Add hs-hackage-security 2020-01-19 01:55:24 +00:00
pho
3505ea90b1 Import hackage-security-0.6.0.0
The hackage security library provides both server and client utilities
for securing the Hackage package server
(http://hackage.haskell.org/). It is based on The Update Framework
(http://theupdateframework.com/), a set of recommendations developed
by security researchers at various universities in the US as well as
developers on the Tor project (https://www.torproject.org/).

The current implementation supports only index signing, thereby
enabling untrusted mirrors. It does not yet provide facilities for
author package signing.
2020-01-19 01:54:46 +00:00
nia
8ce0bd3041 snow: Update to 20130616
2013-06-16 Matthew Kwan <mkwan@darkside.com.au>
 - compress.c: Fixed some fprintf format warnings.
 - Makefile: Added new compile flags.
2020-01-19 00:26:18 +00:00
rillig
b686dd9180 all: migrate several HOMEPAGEs to https
pkglint --only "https instead of http" -r -F

With manual adjustments afterwards since pkglint 19.4.4 fixed a few
indentations in unrelated lines.

This mainly affects projects hosted at SourceForce, as well as
freedesktop.org, CTAN and GNU.
2020-01-18 23:30:43 +00:00
pho
07901a377b Add hs-ed25519 2020-01-18 23:30:42 +00:00
pho
82d0100c0b Import ed25519-0.0.5.0
This package provides a simple, fast, self-contained copy of the
Ed25519 public-key signature system with a clean interface. It also
includes support for detached signatures, and thorough documentation
on the design and implementation, including usage guidelines.
2020-01-18 23:30:04 +00:00
jperkin
26c1bffc9f *: Recursive revision bump for openssl 1.1.1. 2020-01-18 21:48:19 +00:00
jperkin
b3027144f7 rainbowcrack: Missed last USE_OLD_DES_API removal. 2020-01-18 20:18:16 +00:00
pho
17bff0d900 Add hs-cryptohash-sha256 2020-01-18 15:26:22 +00:00
pho
9630eff194 Import cryptohash-sha256-0.11.101.0
A practical incremental and one-pass, pure API to the SHA-256
cryptographic hash algorithm according to FIPS 180-4 with performance
close to the fastest implementations available in other languages.
2020-01-18 15:25:43 +00:00
pho
1477700997 Add hs-SHA 2020-01-17 15:26:16 +00:00
pho
5e30b4a0d1 Import SHA-1.6.4.4 from wip
This library implements the SHA suite of message digest functions,
according to NIST FIPS 180-2 (with the SHA-224 addendum), as well as
the SHA-based HMAC routines. The functions have been tested against
most of the NIST and RFC test vectors for the various functions. While
some attention has been paid to performance, these do not presently
reach the speed of well-tuned libraries, like OpenSSL.
2020-01-17 15:25:41 +00:00
pho
011350cb52 Add hs-x509-system 2020-01-17 14:41:38 +00:00
pho
1ed3a33443 Import x509-system-1.6.6
System X.509 root CA storage handling
2020-01-17 14:40:51 +00:00
pho
0da19f13ed Add hs-tls 2020-01-17 13:38:35 +00:00
pho
9052765fac Import tls-1.5.3
Native Haskell TLS and SSL protocol implementation for server and
client.

This provides a high-level implementation of a sensitive security
protocol, eliminating a common set of security issues through the use
of the advanced type system, high level constructions and common
Haskell features.

Currently implement the SSL3.0, TLS1.0, TLS1.1, TLS1.2 and TLS 1.3
protocol, and support RSA and Ephemeral (Elliptic curve and regular)
Diffie Hellman key exchanges, and many extensions.
2020-01-17 13:38:00 +00:00
pho
7b1785d533 Add hs-x509-validation 2020-01-17 13:07:15 +00:00
pho
6258b29e5d Import x509-validation-1.6.11
X.509 Certificate checks and validations routines.

Follows RFC5280 / RFC6818.
2020-01-17 13:06:38 +00:00
pho
ebebf5ed99 Add hs-x509-store 2020-01-17 12:41:24 +00:00
pho
4416023a60 Import x509-store-1.6.7
X.509 collection accessing and storing methods for certificate, crl,
exception list.
2020-01-17 12:40:40 +00:00
pho
1f8527d038 Add hs-x509 2020-01-17 00:54:04 +00:00
pho
f9216d86f6 Import x509-1.7.5
Read/Write X509 Certificate, CRL and their signed equivalents.

Follows RFC5280 / RFC6818
2020-01-17 00:53:30 +00:00
pho
072afaf575 Add hs-pem 2020-01-17 00:44:53 +00:00
pho
5f0a05fd07 Import pem-0.2.4
Privacy Enhanced Mail (PEM) format reader and writer.
2020-01-17 00:44:22 +00:00
pho
57225c02cc Add hs-cryptonite 2020-01-17 00:18:07 +00:00
pho
3b796d59b2 Import cryptonite-0.26
A repository of cryptographic primitives.

* Symmetric ciphers: AES, DES, 3DES, CAST5, Blowfish, Twofish,
  Camellia, RC4, Salsa, XSalsa, ChaCha.

* Hash: SHA1, SHA2, SHA3, SHAKE, MD2, MD4, MD5, Keccak, Skein, Ripemd,
  Tiger, Whirlpool, Blake2

* MAC: HMAC, KMAC, Poly1305

* Asymmetric crypto: DSA, RSA, DH, ECDH, ECDSA, ECC, Curve25519,
  Curve448, Ed25519, Ed448

* Key Derivation Function: PBKDF2, Scrypt, HKDF, Argon2, BCrypt,
  BCryptPBKDF

* Cryptographic Random generation: System Entropy, Deterministic
  Random Generator

* Data related: Anti-Forensic Information Splitter (AFIS)

If anything cryptographic related is missing from here, submit a pull
request to have it added. This package strive to be a cryptographic
kitchen sink that provides cryptography for everyone.
2020-01-17 00:17:32 +00:00
wiz
80e3e55259 openssl: rc5 patents expired some years ago
Remove its LICENSE line and enable rc5 option by default.
Bump PKGREVISION.
2020-01-16 22:45:45 +00:00
wiz
f0201250bd openssl: add PLIST.Linux for afalg.so
From Michael Forney in PR 54866
2020-01-16 21:58:50 +00:00
jperkin
f76ab4b2d3 openssl: Reduce buildlink ABI/API requirement.
Requested by wiz for NetBSD using older but compatible 1.1.1 releases.
2020-01-16 16:18:19 +00:00
jperkin
9620f18575 libtcpa: We no longer have openssl < 1.1. 2020-01-16 13:34:48 +00:00
jperkin
510dbe5aae *: Remove USE_OLD_DES_API.
OpenSSL 1.1.1d no longer ships des_old.h, and the time for this being
necessary appears to be behind us.
2020-01-16 13:33:50 +00:00
jperkin
953a453a3c openssl: Missed adding PLIST in previous. 2020-01-16 13:31:15 +00:00
jperkin
6a6a869481 openssl: Update to 1.1.1d.
This is a major upgrade to the current LTS release.  1.0.2 and 1.1.0 are now
out of support and should not be used.

pkgsrc changes include a large cleanup of patches and targets, many of which
were clearly bogus, for example a CONFLICTS entry against a package that has
never existed, and one that was removed in 1999.

Tested on SmartOS, macOS, and NetBSD.  Used for the SmartOS pkgsrc-2019Q4 LTS
release.

There are far too many individual changes to list, so the following text is
instead taken from the 1.1.1 blog announcement:

  --------------------------------------------------------------------------

After two years of work we are excited to be releasing our latest version today
- OpenSSL 1.1.1. This is also our new Long Term Support (LTS) version and so we
are committing to support it for at least five years.

OpenSSL 1.1.1 has been a huge team effort with nearly 5000 commits having been
made from over 200 individual contributors since the release of OpenSSL 1.1.0.
These statistics just illustrate the amazing vitality and diversity of the
OpenSSL community. The contributions didn't just come in the form of commits
though. There has been a great deal of interest in this new version so thanks
needs to be extended to the large number of users who have downloaded the beta
releases to test them out and report bugs.

The headline new feature is TLSv1.3. This new version of the Transport Layer
Security (formerly known as SSL) protocol was published by the IETF just one
month ago as RFC8446. This is a major rewrite of the standard and introduces
significant changes, features and improvements which have been reflected in the
new OpenSSL version.

What's more is that OpenSSL 1.1.1 is API and ABI compliant with OpenSSL 1.1.0
so most applications that work with 1.1.0 can gain many of the benefits of
TLSv1.3 simply by dropping in the new OpenSSL version. Since TLSv1.3 works very
differently to TLSv1.2 though there are a few caveats that may impact a
minority of applications. See the TLSv1.3 page on the OpenSSL wiki for more
details.

Some of the benefits of TLSv1.3 include:

 * Improved connection times due to a reduction in the number of round trips
   required between the client and server

 * The ability, in certain circumstances, for clients to start sending
   encrypted data to the server straight away without any round trips with the
   server required (a feature known as 0-RTT or “early data”).

 * Improved security due to the removal of various obsolete and insecure
   cryptographic algorithms and encryption of more of the connection handshake

Other features in the 1.1.1 release include:

 * Complete rewrite of the OpenSSL random number generator to introduce the
   following capabilities:

   * The default RAND method now utilizes an AES-CTR DRBG according to NIST
     standard SP 800-90Ar1.
   * Support for multiple DRBG instances with seed chaining.
   * There is a public and private DRBG instance.
   * The DRBG instances are fork-safe.
   * Keep all global DRBG instances on the secure heap if it is enabled.
   * The public and private DRBG instance are per thread for lock free
     operation

 * Support for various new cryptographic algorithms including:

   * SHA3
   * SHA512/224 and SHA512/256
   * EdDSA (including Ed25519 and Ed448)
   * X448 (adding to the existing X25519 support in 1.1.0)
   * Multi-prime RSA
   * SM2
   * SM3
   * SM4
   * SipHash
   * ARIA (including TLS support)

 * Signficant Side-Channel attack security improvements

 * Maximum Fragment Length TLS extension support

 * A new STORE module, which implements a uniform and URI based reader of
   stores that can contain keys, certificates, CRLs and numerous other objects.

Since 1.1.1 is our new LTS release we are strongly advising all users to
upgrade as soon as possible. For most applications this should be straight
forward if they are written to work with OpenSSL 1.1.0. Since OpenSSL 1.1.0 is
not an LTS release it will start receiving security fixes only with immediate
affect as per our previous announcement and as published in our release
strategy. It will cease receiving all support in one years time.

Our previous LTS release (OpenSSL 1.0.2) will continue to receive full support
until the end of this year. After that it will receive security fixes only. It
will stop receiving all support at the end of 2019. Users of that release are
strongly advised to upgrade to OpenSSL 1.1.1.
2020-01-16 13:30:29 +00:00
wiz
b081fc7056 pius: remove PYPKGPREFIX from PKGNAME to match directory name
It's an enduser program, so it's not necessary to install
multiple versions. ok schmonz@

While here, simplify github usage.
2020-01-16 12:18:31 +00:00
ryoon
1cce5cc18b acmesh: Update to 2.8.5
Changelog:
2.8.5
    fix auto upgrade error message.

2.8.4
    Avoiding autoupdate by checking master hash value.
    more dns api support'
    adapt recent letsencrypt ca http headers changes.
    bugs fixes.

Recommended to upgrade.
2020-01-15 16:30:56 +00:00
wiz
9e359b02d5 pius: fix installation
Switch from egg.mk to distutils.mk, the latter works.
Add perl dependency for pius-party-worksheet.

Bump PKGREVISION.
2020-01-15 13:07:46 +00:00
adam
053c3a85a0 py-google-auth: updated to 1.10.1
1.10.1:
Bug Fixes
google.auth.compute_engine.metadata: add retry to google.auth.compute_engine._metadata.get()
always pass body of type bytes to google.auth.transport.Request
2020-01-15 09:02:19 +00:00
wiz
ad761281b6 keepassxc: update to 2.5.2.
## 2.5.2 (2020-01-04)

### Added

- Browser: Show UI warning when entering invalid URLs [#3912]
- Browser: Option to use an entry only for HTTP auth [#3927]

### Changed

- Disable the user interface when merging or saving the database [#3991]
- Ability to hide protected attribute after reveal [#3877]
- Remove mention of "snaps" in Windows and macOS [#3879]
- CLI: Merge parameter for source database key file (--key-file-from) [#3961]
- Improve GUI tests reliability on Hi-DPI displays [#4075]
- Disable deprecation warnings to allow building with Qt 5.14+ [#4075]
- OPVault: Use 'otp' attribute for TOTP field imports [#4075]

### Fixed

- Fix crashes when saving a database to cloud storage [#3991]
- Fix crash when pressing enter twice while opening database [#3885]
- Fix handling of HTML when displayed in the entry preview panel [#3910]
- Fix start minimized to tray on Linux [#3899]
- Fix Auto Open with key file only databases [#4075]
- Fix escape key closing the standalone password generator [#3892]
- macOS: Fix monospace font usage in password field and notes [#4075]
- macOS: Fix building on macOS 10.9 to 10.11 [#3946]
- Fix TOTP setup dialog not closing on database lock [#4075]
- Browser: Fix condition where additional URLs are ignored [#4033]
- Browser: Fix subdomain matching to return only relevant site entries [#3854]
- Secret Service: Fix multiple crashes and incompatibilities [#3871, #4009, #4074]
- Secret Service: Fix searching of entries [#4008, #4036]
- Secret Service: Fix behavior when exposed group is recycled [#3914]
- CLI: Release the database instance before exiting interactive mode [#3889]
- Fix (most) memory leaks in tests [#3922]

## 2.5.1 (2019-11-11)

### Added

- Add programmatic use of the EntrySearcher [#3760]
- Explicitly clear database memory upon locking even if the object is not deleted immediately [#3824]
- macOS: Add ability to perform notarization of built package [#3827]

### Changed

- Reduce file hash checking to every 30 seconds to correct performance issues [#3724]
- Correct formatting of notes in entry preview widget [#3727]
- Improve performance and UX of database statistics page [#3780]
- Improve interface for key file selection to discourage use of the database file [#3807]
- Hide Auto-Type sequences column when not needed [#3794]
- macOS: Revert back to using Carbon API for hotkey detection [#3794]
- CLI: Do not show protected fields by default [#3710]

### Fixed

- Secret Service: Correct issues interfacing with various applications [#3761]
- Fix building without additional features [#3693]
- Fix handling TOTP secret keys that require padding [#3764]
- Fix database unlock dialog password field focus [#3764]
- Correctly label open databases as locked on launch [#3764]
- Prevent infinite recursion when two databases AutoOpen each other [#3764]
- Browser: Fix incorrect matching of invalid URLs [#3759]
- Properly stylize the application name on Linux [#3775]
- Show application icon on Plasma Wayland sessions [#3777]
- macOS: Check for Auto-Type permissions on use instead of at launch [#3794]

## 2.5.0 (2019-10-26)

### Added

- Add 'Paper Backup' aka 'Export to HTML file' to the 'Database' menu [#3277]
- Add statistics panel with information about the database (number of entries, number of unique passwords, etc.) to the Database Settings dialog [#2034]
- Add offline user manual accessible via the 'Help' menu [#3274]
- Add support for importing 1Password OpVault files [#2292]
- Implement Freedesktop.org secret storage DBus protocol so that KeePassXC can be used as a vault service by libsecret [#2726]
- Add support for OnlyKey as an alternative to YubiKeys (requires yubikey-personalization >= 1.20.0) [#3352]
- Add group sorting feature [#3282]
- Add feature to download favicons for all entries at once [#3169]
- Add word case option to passphrase generator [#3172]
- Add support for RFC6238-compliant TOTP hashes [#2972]
- Add UNIX man page for main program [#3665]
- Add 'Monospaced font' option to the notes field [#3321]
- Add support for key files in auto open [#3504]
- Add search field for filtering entries in Auto-Type dialog [#2955]
- Complete usernames based on known usernames from other entries [#3300]
- Parse hyperlinks in the notes field of the entry preview pane [#3596]
- Allow abbreviation of field names in entry search [#3440]
- Allow setting group icons recursively [#3273]
- Add copy context menu for username and password in Auto-Type dialog [#3038]
- Drop to background after copying a password to the clipboard [#3253]
- Add 'Lock databases' entry to tray icon menu [#2896]
- Add option to minimize window after unlocking [#3439]
- Add option to minimize window after opening a URL [#3302]
- Request accessibility permissions for Auto-Type on macOS [#3624]
- Browser: Add initial support for multiple URLs [#3558]
- Browser: Add entry-specific browser integration settings [#3444]
- CLI: Add offline HIBP checker (requires a downloaded HIBP dump) [#2707]
- CLI: Add 'flatten' option to the 'ls' command [#3276]
- CLI: Add password generation options to `Add` and `Edit` commands [#3275]
- CLI: Add XML import [#3572]
- CLI: Add CSV export to the 'export' command [#3278]
- CLI: Add `-y --yubikey` option for YubiKey [#3416]
- CLI: Add `--dry-run` option for merging databases [#3254]
- CLI: Add group commands (mv, mkdir and rmdir) [#3313].
- CLI: Add interactive shell mode command `open` [#3224]


### Changed

- Redesign database unlock dialog [ #3287]
- Rework the entry preview panel [ #3306]
- Move notes to General tab on Group Preview Panel [#3336]
- Enable entry actions when editing an entry and cleanup entry context menu  [#3641]
- Improve detection of external database changes  [#2389]
- Warn if user is trying to use a KDBX file as a key file [#3625]
- Add option to disable KeePassHTTP settings migrations prompt [#3349, #3344]
- Re-enabled Wayland support (no Auto-Type yet) [#3520, #3341]
- Add icon to 'Toggle Window' action in tray icon menu [#3244]
- Merge custom data between databases only when necessary [#3475]
- Improve various file-handling related issues when picking files using the system's file dialog [#3473]
- Add 'New Entry' context menu when no entries are selected [#3671]
- Reduce default Argon2 settings from 128 MiB and one thread per CPU core to 64 MiB and two threads to account for lower-spec mobile hardware [ #3672]
- Browser: Remove unused 'Remember' checkbox for HTTP Basic Auth [#3371]
- Browser: Show database name when pairing with a new browser [#3638]
- Browser: Show URL in allow access dialog [#3639]
- CLI: The password length option `-l` for the CLI commands `Add` and `Edit` is now `-L` [#3275]
- CLI: The `-u` shorthand for the `--upper` password generation option has been renamed to `-U` [#3275]
- CLI: Rename command `extract` to `export`. [#3277]

### Fixed

- Improve accessibility for assistive technologies [#3409]
- Correctly unlock all databases if `--pw-stdin` is provided [#2916]
- Fix password generator issues with special characters [#3303]
- Fix KeePassXC interrupting shutdown procedure [#3666]
- Fix password visibility toggle button state on unlock dialog [#3312]
- Fix potential data loss if database is reloaded while user is editing an entry [#3656]
- Fix hard-coded background color in search help popup [#3001]
- Fix font choice for password preview [#3425]
- Fix handling of read-only files when autosave is enabled [#3408]
- Handle symlinks correctly when atomic saves are disabled [#3463]
- Enable HighDPI icon scaling on Linux [#3332]
- Make Auto-Type on macOS more robust and remove old Carbon API calls [#3634, [#3347)]
- Hide Share tab if KeePassXC is compiled without KeeShare support and other minor KeeShare improvements [#3654, [#3291, #3029, #3031, #3236]
- Correctly bring window to the front when clicking tray icon on macOS [#3576]
- Correct application shortcut created by MSI Installer on Windows [#3296]
- Fix crash when removing custom data [#3508]
- Fix placeholder resolution in URLs [#3281]
- Fix various inconsistencies and platform-dependent compilation bugs [#3664, #3662, #3660, #3655, #3649, #3417, #3357, #3319, #3318, #3304]
- Browser: Fix potential leaking of entries through the browser integration API if multiple databases are opened [#3480]
- Browser: Fix password entropy calculation [#3107]
- Browser: Fix Windows registry settings for portable installation [#3603]
2020-01-14 22:32:17 +00:00
schmonz
eb677ef5e7 Add missing gnupg{,2} dependencies, and patch some paths. Ride
recent import.
2020-01-13 20:52:04 +00:00
schmonz
816600aad1 Add and enable pius. 2020-01-13 20:40:14 +00:00
schmonz
64438e68d2 Add pius, the PGP Individual User Signer. It helps attendees of PGP
keysigning parties. It allows you to quickly and easily sign each UID on
a set of PGP keys. It is designed to take the pain out of the
sign-all-the-keys part of PGP Keysigning Party while adding security to
the process.
2020-01-13 20:39:29 +00:00
ryoon
eedd1e806f *: Recursive revbump from devel/boost-libs 2020-01-12 20:19:52 +00:00
bsiegert
5220c156ea Revbump Go packages after Go default version bump. 2020-01-10 13:32:09 +00:00
wiz
78444582ff *: py-cachetools only supports python 3.x now, pass down to dependencies 2020-01-09 14:21:06 +00:00
adam
baec18424b py-google-auth: updated to 1.10.0
1.10.0:
Features
send quota project id in x-goog-user-project for OAuth2 credentials

1.9.0:
Features
add timeout parameter to AuthorizedSession.request()
2020-01-08 11:41:50 +00:00
adam
627995668b py-asn1crypto: updated to 1.3.0
1.3.0
- Added `encrypt_key_pref` (`1.2.840.113549.1.9.16.2.11`) to
  `cms.CMSAttributeType()`, along with related structures
- Added Brainpool curves from RFC 5639 to `keys.NamedCurve()`
- Fixed `x509.Certificate().subject_directory_attributes_value`
- Fixed some incorrectly computed minimum elliptic curve primary key
  encoding sizes in `keys.NamedCurve()`
- Fixed a `TypeError` when trying to call `.untag()` or `.copy()` on a
  `core.UTCTime()` or `core.GeneralizedTime()`, or a value containing one,
  when using Python 2
2020-01-08 11:37:49 +00:00
mef
04baf85dbf (security/lua-sec) Updated 0.6 to 0.9
--------------------------------------------------------------------------
LuaSec 0.9
---------------
This version includes:

* Add DNS-based Authentication of Named Entities (DANE) support
* Add __close() metamethod
* Fix deprecation warnings with OpenSSL 1.1
* Fix special case listing of TLS 1.3 EC curves
* Fix general_name leak in cert:extensions()
* Fix unexported 'ssl.config' table
* Replace $(LD) with $(CCLD) variable
* Remove multiple definitions of 'ssl_options' variable
* Use tag in git format: v0.9

--------------------------------------------------------------------------
LuaSec 0.8.2
---------------
This version includes:

* Fix unexported 'ssl.config' table (backported)

--------------------------------------------------------------------------
LuaSec 0.8.1
---------------
This version includes:

* Fix general_name leak in cert:extensions() (backported)

--------------------------------------------------------------------------
LuaSec 0.8
---------------
This version includes:

* Add support to ALPN
* Add support to TLS 1.3
* Add support to multiple certificates
* Add timeout to https module (https.TIMEOUT)
* Drop support to SSL 3.0
* Drop support to TLS 1.0 from https module
* Fix invalid reference to Lua state
* Fix memory leak when get certficate extensions

--------------------------------------------------------------------------
LuaSec 0.7.2
---------------
This version includes:

* Fix unexported 'ssl.config' table (backported)

--------------------------------------------------------------------------
LuaSec 0.7.1
---------------
This version includes:

* Fix general_name leak in cert:extensions() (backported)

--------------------------------------------------------------------------
LuaSec 0.7
---------------
LuaSec depends  on OpenSSL, and  integrates with LuaSocket to  make it
easy to add secure connections to any Lua applications or scripts.

Documentation: https://github.com/brunoos/luasec/wiki

This version includes:

* Add support to OpenSSL 1.1.0
* Add support to elliptic curves list
* Add ssl.config that exports some OpenSSL information
* Add integration with luaossl
2020-01-06 23:55:47 +00:00
pho
fd37d437dc Fix build on NetBSD 8.1 2020-01-06 12:04:12 +00:00
nia
f3e83a26fc security: Remove seahorse-plugins.
Old GNOME 2 component. This is no longer part of GNOME.
Plugins for GNOME are no longer maintained alongside the seahorse client.
2020-01-04 14:04:29 +00:00
gutteridge
d5099a16be mate-polkit: tweak $DISTNAME
Prepare to bump the default $VERSION in meta-pkg/mate to 1.22.2 (now
the most common version amongst the packages and the effective release
we're at).
2020-01-02 22:47:56 +00:00
sevan
9d1cf377ce Upgrade to OpenSSL 1.0.2u
Major changes between OpenSSL 1.0.2t and OpenSSL 1.0.2u [20 Dec 2019]

Fixed an an overflow bug in the x64_64 Montgomery squaring procedure used
in exponentiation with 512-bit moduli (CVE-2019-1551)
2020-01-02 20:31:05 +00:00
pho
2cffcbc7c7 Add dependency on devel/zlib 2020-01-02 11:40:05 +00:00
leot
249ddc9adf sqlmap: Update to 1.4
Unfortunately no changelog is provided by upstream.
2020-01-01 15:50:30 +00:00
kim
24f7b29a8a Update to sudo 1.8.30
Notable changes:

* The version string no longer has the word "beta" in it.
2020-01-01 01:47:29 +00:00
ng0
60cf554ea9 security/doas: update to version 6.2p4
Changelog picked from https://github.com/slicer69/doas/releases:

6.2p4:
* Keeping environment variables with keepenv
  On some platforms (seemingly Linux and macOS) it is possible for
  repeated calls to getpwuid() can over-write the original struct
  passwd structure. (This behaviour may vary depending on which
  C library is used. This can lead to the original user's
  environment data being overwritten by the target user's, even
  when "keepenv" is specified in the doas.conf file.
  We now do a deep copy of the original and target users' struct
  passwd information to avoid over-writing the original on platforms
  where libc uses a static area for all calls.
2020-01-01 01:30:19 +00:00
wiz
19838d46ba libssh: update to 0.93.
version 0.9.3 (released 2019-12-10)
  * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution
  * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state
  * SSH-01-006 General: Various unchecked Null-derefs cause DOS
  * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys
  * SSH-01-010 SSH: Deprecated hash function in fingerprinting
  * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS
  * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access
  * SSH-01-001 State Machine: Initial machine states should be set explicitly
  * SSH-01-002 Kex: Differently bound macros used to iterate same array
  * SSH-01-005 Code-Quality: Integer sign confusion during assignments
  * SSH-01-008 SCP: Protocol Injection via unescaped File Names
  * SSH-01-009 SSH: Update documentation which RFCs are implemented
  * SSH-01-012 PKI: Information leak via uninitialized stack buffer
2019-12-31 12:27:03 +00:00
rhialto
8fb3b56efe security/sslsplit: update to 0.5.5. 2019-12-30 22:17:29 +00:00
triaxx
ca0d886671 py-certbot-dns-digitalocean: sort PLIST 2019-12-30 20:58:30 +00:00
triaxx
e4a43216e5 security: added py-certbot-dns-digitalocean version 1.0.0 2019-12-30 19:44:33 +00:00
triaxx
c8e5cdb1f8 py-cerbot: add py-certbot-dns-digitalocean in comments 2019-12-30 19:43:56 +00:00
triaxx
75c589223d py-certbot-dns-digitalocean: added version 1.0.0
DigitalOcean DNS Authenticator plugin for Certbot
2019-12-30 19:41:31 +00:00
kim
c90f2a226c Update to sudo 1.8.30beta3
* Portability fixes from pkgsrc have been merged upstream

* Add runas_check_shell flag to require a runas user to have a valid
  shell. Not enabled by default.

* Add a new flag "allow_unknown_runas_id" to control matching of unknown
  IDs. Previous, sudo would always allow unknown user or group IDs if
  the sudoers entry permitted it. This included the "ALL" alias. With
  this change, the admin must explicitly enable support for unknown IDs.

* Transparently handle the "sudo sudoedit" problem. Some admin are
  confused about how to give users sudoedit permission and many users
  try to run sudoedit via sudo instead of directly. If the user runs
  "sudo sudoedit" sudo will now treat it as plain "sudoedit" after
  issuing a warning. If the admin has specified a fully-qualified path
  for sudoedit in sudoers, sudo will treat it as just "sudoedit" and
  match accordingly. In visudo (but not sudo), a fully-qualified path
  for sudoedit is now treated as an error.

* When restoring old resource limits, try to recover if we receive
  EINVAL. On NetBSD, setrlimit(2) can return EINVAL if the new soft
  limit is lower than the current resource usage. This can be a problem
  when restoring the old stack limit if sudo has raised it.

* Restore resource limits before executing the askpass program. Linux
  with docker seems to have issues executing a program when the stack
  size is unlimited. Bug #908

* macOS does not allow rlim_cur to be set to RLIM_INFINITY for
  RLIMIT_NOFILE. We need to use OPEN_MAX instead as per the macOS
  setrlimit manual. Bug #904

* Use 64-bit resource limits on AIX.
2019-12-28 20:43:56 +00:00
wiz
b2f69cab7d racoon2: update to 20180701nb3.
Install config files in examples directory.
Fixes installation which did not use DESTDIR.
2019-12-28 12:50:19 +00:00
markd
8058f44cf9 botan-devel: don't accidentally detect and use sphinx 2019-12-22 22:33:15 +00:00
joerg
7475eb7fea Use -fopenmp instead of hard-coding libgomp. 2019-12-22 22:29:39 +00:00
joerg
7c1201663f sodium no longer provides crypto_uint*, so provide ones local. 2019-12-22 22:28:54 +00:00
gutteridge
e74d5a65d8 libprelude: fix build with GNU awk >= 5.0
Rename the awk variable "namespace" to "name_space", since the former
is now a reserved word with GNU awk 5.0, and was causing parsing
errors.
2019-12-20 22:11:02 +00:00
joerg
fb38e15089 Deal with bind vs std::bind conflict. 2019-12-19 22:23:19 +00:00
joerg
d92def3ecd Add missing dependency for lrelease. 2019-12-19 22:22:50 +00:00
joerg
1b26e77727 Avoid using a non-literal string as format string. 2019-12-19 22:22:33 +00:00
kim
061cab795f Don't touch RLIMIT_STACK for now, see https://gnats.netbsd.org/51158 2019-12-19 16:59:44 +00:00
kim
4f18f8f89c Fix setrlimit(3): Invalid argument
The new code that unlimits many resources appears to have been problematic
on a number of fronts. Fetched the current version of src/limits.c from
the sudo hg repo. RLIMIT_STACK (i.e. "3") is no longer set to RLIM_INFINITY.

Added code to output the name of the limit instead of its number.
2019-12-18 15:56:10 +00:00
joerg
ec8ee45ae1 Fix build with libc++ having less namespace pollution. 2019-12-18 12:40:22 +00:00
taca
8cb487404d Drop php71 support
Drop php71 support mechanically.
2019-12-16 16:30:13 +00:00
taca
52d74d7170 security/php-pecl-mcrypt: update to 1.0.3
Update php-pecl-mcrypt to 1.0.3.

o pkgsr change: allow build on php74.

1.0.3 (2019-09-17)

* Addressed Windows build issues
2019-12-16 00:10:37 +00:00
adam
4dbbbd83f6 sudo: updated to 1.8.29
Major changes between version 1.8.29 and 1.8.28p1:

The cvtsudoers command will now reject non-LDIF input when converting from LDIF format to sudoers or JSON formats.
The new log_allowed and log_denied sudoers settings make it possible to disable logging and auditing of allowed and/or denied commands.
The umask is now handled differently on systems with PAM or login.conf. If the umask is explicitly set in sudoers, that value is used regardless of what PAM or login.conf may specify. However, if the umask is not explicitly set in sudoers, PAM or login.conf may now override the default sudoers umask.
For make install, the sudoers file is no longer checked for syntax errors when DESTDIR is set. The default sudoers file includes the contents of /etc/sudoers.d which may not be readable as non-root.
Sudo now sets most resource limits to their maximum value to avoid problems caused by insufficient resources, such as an inability to allocate memory or open files and pipes.
Fixed a regression introduced in sudo 1.8.28 where sudo would refuse to run if the parent process was not associated with a session. This was due to sudo passing a session ID of -1 to the plugin.
2019-12-15 18:42:09 +00:00
taca
9cbfc66951 security/php-sodium: allow build on php74
Allow build on php74.
2019-12-15 18:02:30 +00:00
adam
03a6dbb3f1 py-pydeep: updated to 0.4
0.4:
Unknown changes
2019-12-15 11:24:52 +00:00
adam
f0e7f75464 py-google-auth: updated to 1.8.2
1.8.2:
Bug Fixes
revert "feat: send quota project id in x-goog-user-project header for OAuth2 credentials"

1.8.1:
Bug Fixes
revert "feat: add timeout to AuthorizedSession.request()

1.8.0:
Features
add to_json method to google.oauth2.credentials.Credentials
add timeout to AuthorizedSession.request()
send quota project id in x-goog-user-project header for OAuth2 credentials
2019-12-15 11:22:34 +00:00
adam
d721e9ae15 py-acme/py-cerbot-*: updated to 1.0.0
Certbot 1.0.0

Removed:
* The docs extras for the certbot-apache and certbot-nginx packages
  have been removed.

Changed:
* certbot-auto has deprecated support for systems using OpenSSL 1.0.1 that are
  not running on x86-64. This primarily affects RHEL 6 based systems.
* Certbot's config_changes subcommand has been removed
* certbot.plugins.common.TLSSNI01 has been removed.
* Deprecated attributes related to the TLS-SNI-01 challenge in
  acme.challenges and acme.standalone
  have been removed.
* The functions certbot.client.view_config_changes,
  certbot.main.config_changes,
  certbot.plugins.common.Installer.view_config_changes,
  certbot.reverter.Reverter.view_config_changes, and
  certbot.util.get_systemd_os_info have been removed
* Certbot's register --update-registration subcommand has been removed
* When possible, default to automatically configuring the webserver so all requests
  redirect to secure HTTPS access. This is mostly relevant when running Certbot
  in non-interactive mode. Previously, the default was to not redirect all requests.
2019-12-15 09:48:37 +00:00