Commit graph

10553 commits

Author SHA1 Message Date
adam
5d771092e8 py-google-auth: updated to 1.17.1
1.17.1:

Bug Fixes
narrow acceptable RSA versions to maintain Python 2 compatability

1.17.0:

Features
add quota_project_id to service accounts; add with_quota_project methods

1.16.1:

Bug Fixes
fix impersonated cred exception doc
replace environment variable GCE_METADATA_ROOT with GCE_METADATA_HOST

1.16.0:

Features
add helper func to for default encrypted cert

Bug Fixes
fix impersonated cred for gcloud

1.15.0:

Features
encrypted mtls private key support

Bug Fixes
signBytes for impersonated credentials
2020-06-12 05:58:42 +00:00
leot
8efc4baa76 sqlmap: Update to 1.4.6
Unfortunately no changelog is provided by upstream, main changes between 1.4.2
are added support for CrateDB, Cubid, Drizzle, Apache Ignite, Amazon Aurora
forks, InterSystems cache, eXtremeDB.
2020-06-11 20:55:10 +00:00
adam
b46c6b43f2 py-authlib: added version 0.9.1
OAuth often seems complicated and difficult-to-implement. There are several
prominent libraries for handling OAuth requests, but they all suffer from one
or both of the following:

  *  They predate the OAuth 1.0 spec, AKA RFC 5849.
  *  They predate the OAuth 2.0 spec, AKA RFC 6749.
  *  They assume the usage of a specific HTTP request library.

OAuthLib is a generic utility which implements the logic of OAuth without
assuming a specific HTTP request object or web framework. Use it to graft OAuth
client support onto your favorite HTTP library, or provider support onto your
favourite web framework. If you're a maintainer of such a library, write a thin
veneer on top of OAuthLib and get OAuth support for very little effort.
2020-06-11 14:24:49 +00:00
adam
fc0e873211 libgpg-error: updated to 1.38
Noteworthy changes in version 1.38
----------------------------------
 * New option parser features to implement system wide configuration
   files.
 * New functions to build file names.
 * New function to help reallocating arrays.
 * Protect gpgrt_inc_errorcount against counter overflow.
 * Improve cross-building for new platforms.
 * Support 64-bit big-endian MIPS architecture.
 * Support static link for Windows with -lws2_32.
 * Interface changes relative to the 1.37 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 gpgrt_fnameconcat                NEW.
 gpgrt_absfnameconcat             NEW.
 gpgrt_reallocarray               NEW.
 gpgrt_set_confdir                NEW.
 gpgrt_argparser                  NEW.
 ARGPARSE_FLAG_SYS                NEW.
 ARGPARSE_FLAG_USER               NEW.
 ARGPARSE_FLAG_VERBOSE            NEW.
 ARGPARSE_FLAG_USERVERS           NEW.
 ARGPARSE_FLAG_WITHATTR           NEW.
 ARGPARSE_NO_CONFFILE             NEW.
 ARGPARSE_CONFFILE                NEW.
 ARGPARSE_OPT_CONFFILE            NEW.
 ARGPARSE_ATTR_FORCE              NEW.
 ARGPARSE_ATTR_IGNORE             NEW.
 ARGPARSE_TYPE_MASK               NEW.
 ARGPARSE_PERMISSION_ERROR        NEW.
 ARGPARSE_INVALID_META            NEW.
 ARGPARSE_UNKNOWN_META            NEW.
 ARGPARSE_UNEXPECTED_META         NEW.
 ARGPARSE_conffile                NEW.
 ARGPARSE_noconffile              NEW.
 ARGPARSE_verbatim                NEW.
 ARGPARSE_header                  NEW.
 GPGRT_CONFDIR_USER               NEW.
 GPGRT_CONFDIR_SYS                NEW.
2020-06-11 12:14:54 +00:00
nia
e7deb23981 mbedtls: Update patches. Add links to PRs. 2020-06-11 11:43:50 +00:00
fcambus
ae3383cc76 minisign: fix the build by adding missing build dependency on pkg-config.
Pointed out by mef@, thanks!
2020-06-11 11:10:22 +00:00
he
50d492c47b Commit overlooked distinfo update after the previous addition
of patches.
2020-06-11 09:41:56 +00:00
nia
55d87afb0d Back out gnome-online-accounts, already present in net/
I can update that version...
2020-06-10 19:54:41 +00:00
nia
fe8bf09ca0 gnome-online-accounts: remove reference to wip 2020-06-10 19:50:42 +00:00
nia
a49f4cb06d security: Add gnome-online-accounts
Single sign-on framework for GNOME. It aims to provide a way for users to
setup online accounts to be used by the core system and core applications
only. Calendar entries show up in GNOME Shell, e-mail in Evolution, online
storages are exposed as GVolumes, and so on.
2020-06-10 19:48:26 +00:00
taca
b7a5fab816 security/ruby-net-ssh: update to 6.1.0
Update to ruby-net-ssh 6.1.0.


=== 6.1.0

  * adapt to ssh's default bahaviors when no username is provided.
    When Net::SSH.start user is nil and config has no entry
    we default to Etc.getpwuid.name() instead of Etc.getlogin(). [#749]

=== 6.1.0.rc1

  * Make sha2-{256,512}-etm@openssh.com MAC default again [#761]
  * Support algorithm subtraction syntax from ssh_config [#751]
2020-06-10 14:51:07 +00:00
taca
71572d1bda security/Makefile: ad and enable ruby-openssl-cmac 2020-06-10 14:33:17 +00:00
taca
821ccba918 security/ruby-openssl-cmac: add package version 2.0.1
Add openssl-cmac package version 2.0.1.


Ruby Gem for
* RFC 4493 - The AES-CMAC Algorithm (http://tools.ietf.org/html/rfc4493)
* RFC 4494 - The AES-CMAC-96 Algorithm and Its Use with IPsec
  (http://tools.ietf.org/html/rfc4494)

* RFC 4615 - The Advanced Encryption Standard-Cipher-based Message
  Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128)
  Algorithm for the Internet Key Exchange Protocol (IKE)
  (http://tools.ietf.org/html/rfc4615)
2020-06-10 14:32:26 +00:00
markd
0a2ab79e7d gpgme: dont accidentally try to build python language bindings 2020-06-10 11:32:06 +00:00
mef
129c0ac7ab (security/py-certbot-*) regen distinfo 2020-06-09 12:47:36 +00:00
markd
29920a1c12 kde: update kde release service to 20.04.1
changes unknown
2020-06-09 11:56:05 +00:00
nia
f332e11838 gnutls: fix detection of build options 2020-06-09 09:53:11 +00:00
leot
9cad236547 gnutls: Update to 3.6.14
Changes:
3.6.14
------
 * libgnutls: Fixed insecure session ticket key construction, since 3.6.4.
   The TLS server would not bind the session ticket encryption key with a
   value supplied by the application until the initial key rotation, allowing
   attacker to bypass authentication in TLS 1.3 and recover previous
   conversations in TLS 1.2 (#1011).
   [GNUTLS-SA-2020-06-03, CVSS: high]

 * libgnutls: Fixed handling of certificate chain with cross-signed
   intermediate CA certificates (#1008).

 * libgnutls: Fixed reception of empty session ticket under TLS 1.2 (#997).

 * libgnutls: gnutls_x509_crt_print() is enhanced to recognizes commonName
   (2.5.4.3), decodes certificate policy OIDs (!1245), and prints Authority
   Key Identifier (AKI) properly (#989, #991).

 * certtool: PKCS #7 attributes are now printed with symbolic names (!1246).

 * libgnutls: Added several improvements on Windows Vista and later releases
   (!1257, !1254, !1256). Most notably the system random number generator now
   uses Windows BCrypt* API if available (!1255).

 * libgnutls: Use accelerated AES-XTS implementation if possible (!1244).
   Also both accelerated and non-accelerated implementations check key block
   according to FIPS-140-2 IG A.9 (!1233).

 * libgnutls: Added support for AES-SIV ciphers (#463).

 * libgnutls: Added support for 192-bit AES-GCM cipher (!1267).

 * libgnutls: No longer use internal symbols exported from Nettle (!1235)

 * API and ABI modifications:
     GNUTLS_CIPHER_AES_128_SIV: Added
     GNUTLS_CIPHER_AES_256_SIV: Added
     GNUTLS_CIPHER_AES_192_GCM: Added
     gnutls_pkcs7_print_signature_info: Added
2020-06-08 19:48:14 +00:00
adam
74259e9567 py-acme py-certbot: updated to 1.5.0
Certbot 1.5.0

Added
Require explicit confirmation of snap plugin permissions before connecting.

Changed
Improved error message in apache installer when mod_ssl is not available.

Fixed
Add support for OCSP responses which use a public key hash ResponderID, fixing
interoperability with Sectigo CAs.
Fix TLS-ALPN test that fails when run with newer versions of OpenSSL.
More details about these changes can be found on our GitHub repo.
2020-06-08 15:53:29 +00:00
he
24357b67bc Add an m4 + configure patch so that -lcrypto is searched for
EVP_sha1 and EVP_sha256.  Without this, opendnssec would build
but would not recognize any of those algorithms for tsig, and
therefore be pretty useless.  I'll admit that I'm not entirely
certain why this is now suddenly required; those functions are
in the same library in 9.0 as in 8.0.

Bump PKGREVISION.
2020-06-08 15:07:42 +00:00
wiz
b8c2eb4d28 p5-GnuPG-Interface: update to 1.00.
1.0 - 2020-05-13
 - Limit support to GnuPG 2.2+ and 1.4
 - Additional information from keys when using GnuPG 2.2 or higher
 - Add support for use of agent/pinentry
 - Updated options to add ignore_mdc_error and logging
 - Improvements to tests
 - Update pubkey_data documentation
 - Special thanks to dkg on Github for a large PR with updates for GnuPG 2
 - Thanks also to ntyni on Github for a pointer to test updates also dealing
   with version changes
2020-06-08 14:18:15 +00:00
wiz
39fc72eb30 HElib: add upstream bug report URL 2020-06-08 13:47:43 +00:00
wiz
a1c7850506 HElib: update to 1.0.1.
Use github tarball instead of snapshot.
Fix HOMEPAGE

7 years of changes; I didn't find a concise changelog.
2020-06-08 13:45:35 +00:00
kim
bed248a516 Upgrade to 20200601
* Update Mozilla certificate authority bundle to version 2.40.
* Add distrusted Symantec CA list to blacklist for explicit removal.
* Blacklist expired root certificate, "AddTrust External Root".

The following certificate authorities were added (+):
+ "Certigna Root CA"
+ "emSign ECC Root CA - C3"
+ "emSign ECC Root CA - G3"
+ "emSign Root CA - C1"
+ "emSign Root CA - G1"
+ "Entrust Root Certification Authority - G4"
+ "GTS Root R1"
+ "GTS Root R2"
+ "GTS Root R3"
+ "GTS Root R4"
+ "Hongkong Post Root CA 3"
+ "UCA Extended Validation Root"
+ "UCA Global G2 Root"

The following certificate authorities were removed (-):
- "AddTrust External Root"
- "Certinomis - Root CA"
- "Certplus Class 2 Primary CA"
- "Deutsche Telekom Root CA 2"
- "GeoTrust Global CA"
- "GeoTrust Primary Certification Authority"
- "GeoTrust Primary Certification Authority - G2"
- "GeoTrust Primary Certification Authority - G3"
- "GeoTrust Universal CA"
- "thawte Primary Root CA"
- "thawte Primary Root CA - G2"
- "thawte Primary Root CA - G3"
- "VeriSign Class 3 Public Primary Certification Authority - G4"
- "VeriSign Class 3 Public Primary Certification Authority - G5"
- "VeriSign Universal Root Certification Authority"

Changes for pkgsrc packaging:
* Add README.pkgsrc, replacing MESSAGE.
* Improve DESCR to better describe the functionality of the package.
* Install changelog and README.source from the distribution package.
2020-06-08 09:55:36 +00:00
taca
7c6475c8dc security/ruby-rex-text: update to 0.2.26
Update ruby-rex-text to 0.2.26.


No release note nore changes is available.
2020-06-07 14:54:53 +00:00
taca
5d16517f92 security/ruby-rex-exploitation: update to 0.1.24
Update ruby-rex-exploitation to 0.1.24.


No release note nore changes is available.
2020-06-07 14:51:17 +00:00
taca
2e0e579716 security/ruby-net-ssh: update to 6.0.2
Update ruby-net-ssh to 6.0.2.


=== 6.0.2

  * Fix corrupted hmac issue in etm hmac [#759]

=== 6.0.1

  * Make sha2-{256,512}-etm@openssh.com MAC opt-in as they seems to have issues [#757]

=== 6.0.0

  * Support empty lines and comments in known_hosts [donoghuc, #742]
  * Add sha2-{256,512}-etm@openssh.com MAC algorithms [graaff, #714]

=== 6.0.0 beta2

  * Support :certkeys and CertificateFile configuration option  [Anders Carling, #722]

=== 6.0.0 beta1

  * curve25519sha256 support [Florian Wininger ,#690]
  * disabled insecure algs [Florian Wininger , #709]
2020-06-07 14:44:52 +00:00
taca
b7b22b9d18 security/ruby-net-scp: update to 3.0.0
Update ruby-net-scp to 3.0.0.


=== 3.0.0

* Net::SSH 6.* support
2020-06-07 14:42:47 +00:00
wiz
686679291e tor-browser: update to 9.5.
This release includes important security updates to Firefox.

This new Tor Browser release is focused on helping users understand
onion services.

Tor's onion routing remains the best way to achieve end-to-end
anonymous communication on the Internet. With onion services (.onion
addresses), website administrators can provide their users with
anonymous connections that are metadata-free or that hide metadata
from any third party. Onion services are also one of the few
censorship circumvention technologies that allow users to route
around censorship while simultaneously protecting their privacy
and identity.

For the first time, Tor Browser users on desktop will be able to
opt-in for using onion sites automatically whenever the website
makes them available. For years, some websites have invisibly used
onion services with alternative services (alt-svc), and this
continues to be an excellent choice. Now, there is also an opt-in
mechanism available for websites that want their users to know
about their onion service that invites them to upgrade their
connection via the .onion address.
2020-06-07 13:06:00 +00:00
markd
60764ae593 kwallet: update to 5.70.0
5.67
  Revert readEntryList() to use QRegExp::Wildcard
  Fix QRegularExpression::wildcardToRegularExpression() usage
2020-06-07 11:47:04 +00:00
markd
8159036a89 kdesu: update to 5.70.0
changes unknown
2020-06-07 11:45:40 +00:00
markd
760dc78c57 kauth: update to 5.70.0
5.68
  [KAuth] Add support for action details in Polkit1 backend
  [policy-gen] Fix the code to actually use the correct capture group
  Drop Policykit backend
  [polkit-1] Simplify Polkit1Backend action exists lookup
  [polkit-1] Return an error status in actionStatus if there is an error
  Calculate KAuthAction::isValid on demand
5.69
  Fix type namespace requirement
2020-06-07 11:44:25 +00:00
fcambus
72f21f19ef minisign: update to 0.9.
ChangeLog:

- New option: -R to recover the public key from a secret key.
- minisign can now be compiled to WebAssembly.
- Error messages have been improved.
- Key derivation is now possible on devices with limited memory.
- Compilation on OpenWRT is now possible using cmake.
- A Docker image is now available.
- 64-bit Windows binaries have been added, and macOS binaries are notarized.
2020-06-07 11:04:43 +00:00
rillig
4398f03a5b security/openssh: remove unknown configure option 2020-06-07 06:27:52 +00:00
wiz
dc50fcfd67 tor-browser-https-everywhere: update to 2020.5.20.
2020.5.20
not documented

2020.5.19
* Reverting Onboarding page for the time being
* Patch for whitelisting rules and EASE mode issue
* Double rule load patch in update channels
* Fix minor JS and UX issues
2020-06-06 20:56:31 +00:00
wiz
da94431e6d tor-browser-noscript: update to 11.0.30.
v 11.0.30
============================================================
x Discoverable option to force site-leaking UI in
  PBM/Incognito
x [L10n] Updated he
x Easier keyboard navigation of preset configuration
x Yellow-less UI palette
2020-06-06 20:55:14 +00:00
jperkin
38fe454b9c *: Apply revbump for graphics/giflib API change. 2020-06-05 12:48:58 +00:00
jperkin
cbc223af86 mozilla-rootcerts: Ensure script uses correct SH. 2020-06-02 22:32:02 +00:00
nia
1739d0bfad mbedtls: attempt to fix build on SunOS 2020-06-02 15:07:59 +00:00
pin
a835ed63b4 security/lxqt-sudo: Follow github hosted package nomenclature
as suggested by @leot
2020-06-02 09:18:13 +00:00
pin
64c81822e9 security/lxqt-openssh-askpass: Follow github hosted package nomenclature
as suggested by @leot
2020-06-02 09:16:45 +00:00
pin
c9e97ce5b7 security/lxqt-policykit: Follow github hosted package nomenclature
as suggested by @leot
2020-06-02 09:15:07 +00:00
adam
6bd0c30da6 Revbump for icu 2020-06-02 08:22:31 +00:00
rillig
b28272ad4d security/libprelude-python: suppress USE_TOOLS+=perl warning 2020-06-01 20:04:40 +00:00
rillig
88a6582ad4 security/libprelude-lua: suppress USE_TOOLS+=perl warning 2020-06-01 20:03:56 +00:00
pin
86b52c33f3 security/lxqt-openssh-askpass: update to 0.15.0
lxqt-openssh-askpass-0.15.0 / 2020-04-23
========================================
  * Bumped version to 0.15.0.
  * Removed (duplicated) string casts definitions.
2020-06-01 12:15:15 +00:00
pin
a733345bea security/lxqt-sudo: Remove patch merged upstream 2020-06-01 11:53:18 +00:00
pin
d0c454626c security/lxqt-sudo: update to 0.15.0
lxqt-sudo-0.15.0 / 2020-04-23
=============================
  * sudo: Fix (re)setting HOME with sudo backend.
  * sudo: Add TERM to allowed/preserved env vars.
  * Build on NetBSD.
2020-06-01 11:51:24 +00:00
pin
641938be09 security/lxqt-policykit: update to 0.15.0
lxqt-policykit-0.15.0 / 2020-04-22
==================================
  * Bumped version to 0.15.0.
  * Delete Password from line-edit.
  * Made the infobox non-modal.
  * Removed (duplicated) string casts definitions.
2020-06-01 11:48:49 +00:00
tnn
8464923791 hitch: drop unused build dependency for py-docutils 2020-05-31 16:26:36 +00:00