Commit graph

608 commits

Author SHA1 Message Date
taca
d18efcb7f8 lang/ruby: start update of Ruby on Rails 7.0.1 2022-01-16 14:02:54 +00:00
taca
1b77abc391 lang/ruby/Makefile.common: update "# used by" lines 2022-01-16 14:01:32 +00:00
taca
a0072d670c lang/ruby: add support for Ruby 3.1 2022-01-16 13:56:43 +00:00
taca
49d43a0340 lang/ruby: clean up some macro handling
1. Move some variables from gem-vars.mk to rubyversion.mk:

	GEM_EXTSBASE
	GEM_PATH
	GEM_PLUGINSDIR
	RUBYGEM
	RUBY_GEM_ARCH

2. Drop unused GEM_EXTSDIR_NEEDS_SUBDIR (it is always true).

3. Define bundled module's version as "MODULE_VER".

4. Generate PLIST_SUBST and PRINT_PLIST_AWK from bundled module's name
   if corresponding MODULE_VER is defined.

5. Do not run ${RUBYGEM} for RUYB_GEM_ARCH and RUBY_GEM_VER.

NFCI.
2022-01-14 15:42:08 +00:00
taca
05659d2f53 lang/ruby/rails.mk: add support for Ruby no Rails 7.0 2021-12-19 05:42:50 +00:00
taca
42fc7ae4f7 lang/ruby: start update of Ruby on Rails 6.1 to 6.1.4.4 2021-12-19 05:22:30 +00:00
taca
53c56bf991 lang/ruby: start update of Ruby on Rails 6.0 to 6.0.44 2021-12-19 05:07:05 +00:00
taca
0f8155171c lang/ruby30-base: update to 3.0.3
Ruby 3.0.3 Released
Posted by nagachika on 24 Nov 2021

Ruby 3.0.3 has been released.

This release includes security fixes.  Please check the topics below for
details.

* CVE-2021-41817: Regular Expression Denial of Service Vulnerability of Date
  Parsing Methods

* CVE-2021-41816: Buffer Overrun in CGI.escape_html

* CVE-2021-41819: Cookie Prefix Spoofing in CGI::Cookie.parse

See the commit logs for details.
2021-11-25 16:35:52 +00:00
taca
90c34e1fe0 lang/ruby27-base: update to 2.7.5
Ruby 2.7.5 Released
Posted by usa on 24 Nov 2021

Ruby 2.7.5 has been released.

This release includes security fixes.  Please check the topics below for
details.

* CVE-2021-41817: Regular Expression Denial of Service Vulnerability of Date
  Parsing Methods

* CVE-2021-41816: Buffer Overrun in CGI.escape_html

* CVE-2021-41819: Cookie Prefix Spoofing in CGI::Cookie.parse

See the commit logs for details.
2021-11-25 16:01:18 +00:00
taca
adda322ec0 lang/ruby26-base: update to 2.6.9
Ruby 2.6.9 Released
Posted by usa on 24 Nov 2021

Ruby 2.6.9 has been released.

This release includes security fixes.  Please check the topics below for
details.

* CVE-2021-41817: Regular Expression Denial of Service Vulnerability of Date
  Parsing Methods

* CVE-2021-41819: Cookie Prefix Spoofing in CGI::Cookie.parse See the commit
  logs for details.

Ruby 2.6 is now under the state of the security maintenance phase, until the
end of March of 2022.  After that date, maintenance of Ruby 2.6 will be
ended.  We recommend you start planning the migration to newer versions of
Ruby, such as 3.0 or 2.7.
2021-11-25 15:51:08 +00:00
dholland
dc908fc8c5 typo in error message 2021-09-25 00:47:26 +00:00
markd
31a0faf13b ruby: make sure there isn't already a ruby in buildlink before linking 2021-08-31 11:37:18 +00:00
taca
6823199ea3 www/ruby-rails61: update to 6.1.4.1
Update Ruby on Rails 6.1 pacakges to 6.1.4.1.

Real changes are in Action Pack (www/ruby-actionpack61).


## Rails 6.1.4.1 (August 19, 2021) ##

*   [CVE-2021-22942] Fix possible open redirect in Host Authorization middleware.

    Specially crafted "X-Forwarded-Host" headers in combination with certain
    "allowed host" formats can cause the Host Authorization middleware in Action
    Pack to redirect users to a malicious website.
2021-08-22 07:16:46 +00:00
taca
3905ab707f www/ruby-rails60: update to 6.0.4.1
Update Ruby on Rails 6.0 pacakges to 6.0.4.1.

Real changes are in Action Pack (www/ruby-actionpack60).

## Rails 6.0.4.1 (August 19, 2021) ##

* [CVE-2021-22942] Fix possible open redirect in Host Authorization middleware.

  Specially crafted "X-Forwarded-Host" headers in combination with certain
  "allowed host" formats can cause the Host Authorization middleware in Action
  Pack to redirect users to a malicious website.
2021-08-22 07:12:49 +00:00
taca
91ec05d305 lang/ruby: switch defult Ruby's version to 2.7
Switch default Ruby's version from 2.6 to 2.7.
2021-07-21 14:39:05 +00:00
markd
8ac639b067 ruby: fix substution on rails ALTERNATIVES files 2021-07-13 11:53:25 +00:00
taca
e9b092a808 lang/ruby: make sure to update ruby30's version 2021-07-07 16:11:57 +00:00
taca
3fd502aa40 lang/ruby30-base: update to 3.0.2
Ruby 3.0.2 has been released.

This release includes security fixes.  Please check the topics below
for details.

* CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP
* CVE-2021-32066: A StartTLS stripping vulnerability in Net::IMAP
* CVE-2021-31799: A command injection vulnerability in RDoc

See the commit logs for details:
<https://github.com/ruby/ruby/compare/v3_0_1...v3_0_2>.
2021-07-07 16:10:01 +00:00
taca
1d61cfcd7e lang/ruby27-base: update to 2.7.4
Ruby 2.7.4 has been released.

This release includes security fixes.  Please check the topics below
for details.

* CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP
* CVE-2021-32066: A StartTLS stripping vulnerability in Net::IMAP
* CVE-2021-31799: A command injection vulnerability in RDoc

See the commit logs for details:
<https://github.com/ruby/ruby/compare/v2_7_3...v2_7_4>.
2021-07-07 15:23:07 +00:00
taca
eac32e5ec3 lang/ruby26-base: update to 2.6.8
Ruby 2.6.8 has been released.

This release includes security fixes.  Please check the topics below
for details.

* CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP
* CVE-2021-32066: A StartTLS stripping vulnerability in Net::IMAP
* CVE-2021-31799: A command injection vulnerability in RDoc

We ordinally do not fix Ruby 2.6 except security fixes, but this
release also includes some regressed bugs and build problem fixes.
See the commit logs for details.

Ruby 2.6 is now under the state of the security maintenance phase,
until the end of March of 2022.  After that date, maintenance of Ruby
2.6 will be ended.  We recommend you start planning the migration to
newer versions of Ruby, such as 3.0 or 2.7.
2021-07-07 15:15:19 +00:00
taca
93bd9ddf3b lang/ruby: start update of Ruby on Rails 61 to 6.1.4 2021-07-04 07:55:12 +00:00
taca
27632d3ccd www/ruby-rails60: update to 6.0.4
Ruby on Rails 6.0.4 (2021-06-15), including security fixes.

Active Support

* Fixed issue in ActiveSupport::Cache::RedisCacheStore not passing
  options to read_multi causing fetch_multi to not work properly.
  (Rajesh Sharma)

* with_options copies its options hash again to avoid leaking mutations.
  Fixes #39343.  (Eugene Kenny)

Active Record

* Only warn about negative enums if a positive form that would cause
  conflicts exists.  Fixes #39065.  (Alex Ghiculescu)

* Allow the inverse of a has_one association that was previously
  autosaved to be loaded.  Fixes #34255.  (Steven Weber)

* Reset statement cache for association if table_name is changed.
  Fixes #36453.  (Ryuta Kamizono)

* Type cast extra select for eager loading.  (Ryuta Kamizono)

* Prevent collection associations from being autosaved multiple times.
  Fixes #39173.  (Eugene Kenny)

* Resolve issue with insert_all unique_by option when used with
  expression index.

  When the :unique_by option of ActiveRecord::Persistence.insert_all
  and ActiveRecord::Persistence.upsert_all was used with the name of
  an expression index, an error was raised.  Adding a guard around the
  formatting behavior for the :unique_by corrects this.

  Usage:

	create_table :books, id: :integer, force: true do |t|
	  t.column :name, :string
	  t.index "lower(name)", unique: true
	end

  	Book.insert_all [{ name: "MyTest" }], unique_by: :index_books_on_lower_name

  Fixes #39516.  (Austen Madden)

* Fix preloading for polymorphic association with custom scope.
  (Ryuta Kamizono)

* Allow relations with different SQL comments in the or method.
  (Takumi Shotoku)

* Resolve conflict between counter cache and optimistic locking.

  Bump an Active Record instance's lock version after updating its
  counter cache.  This avoids raising an unnecessary
  ActiveRecord::StaleObjectError upon subsequent transactions by
  maintaining parity with the corresponding database record's
  lock_version column.  Fixes #16449.  (Aaron Lipman)

* Fix through association with source/through scope which has joins.
  (Ryuta Kamizono)

* Fix through association to respect source scope for includes/preload.
  (Ryuta Kamizono)

* Fix eager load with Arel joins to maintain the original joins order.
  (Ryuta Kamizono)

* Fix group by count with eager loading + order + limit/offset.
  (Ryuta Kamizono)

* Fix left joins order when merging multiple left joins from different
  associations.  (Ryuta Kamizono)

* Fix index creation to preserve index comment in bulk change table on
  MySQL.  (Ryuta Kamizono)

* Change remove_foreign_key to not check :validate option if database
  doesn't support the feature.  (Ryuta Kamizono)

* Fix the result of aggregations to maintain duplicated "group by"
  fields.  (Ryuta Kamizono)

* Do not return duplicated records when using preload.  (Bogdan Gusiev)

Action View

* SanitizeHelper.sanitized_allowed_attributes and
  SanitizeHelper.sanitized_allowed_tags call safe_list_sanitizer's
  class method.  Fixes #39586.  (Taufiq Muhammadi)

Action Pack

* Accept base64_urlsafe CSRF tokens to make forward compatible.

* Base64 strict-encoded CSRF tokens are not inherently websafe, which
  makes them difficult to deal with.  For example, the common practice
  of sending the CSRF token to a browser in a client-readable cookie
  does not work properly out of the box: the value has to be
  url-encoded and decoded to survive transport.

  In Rails 6.1, we generate Base64 urlsafe-encoded CSRF tokens, which
  are inherently safe to transport.  Validation accepts both urlsafe
  tokens, and strict-encoded tokens for backwards compatibility.

  In Rails 5.2.5, the CSRF token format is accidentally changed to
  urlsafe-encoded.  If you upgrade apps from 5.2.5, set the config
  urlsafe_csrf_tokens = true.

	Rails.application.config.action_controller.urlsafe_csrf_tokens = true

  (Scott Blum, Étienne Barrié)

* Signed and encrypted cookies can now store false as their value when
  action_dispatch.use_cookies_with_metadata is enabled.  (Rolandas
  Barysas)

Active Storage

* The Poppler PDF previewer renders a preview image using the original
  document's crop box rather than its media box, hiding print
  margins. This matches the behavior of the MuPDF previewer.  (Vincent
  Robert)

Railties

* Allow relative paths with trailing slashes to be passed to rails
  test.  (Eugene Kenny)

* Return a 405 Method Not Allowed response when a request uses an
  unknown HTTP method.  Fixes #38998.  (Loren Norman)
2021-07-04 06:58:37 +00:00
taca
7150d31f24 www/ruby-rails52: update to 5.2.6
Ruby on Rails 5.2.6 (2021-05-05)

There are changes in www/ruby-actionpack52 only, including security fix.

Action Pack

* Accept base64_urlsafe CSRF tokens to make forward compatible.

  Base64 strict-encoded CSRF tokens are not inherently websafe, which
  makes them difficult to deal with.  For example, the common practice
  of sending the CSRF token to a browser in a client-readable cookie
  does not work properly out of the box: the value has to be
  url-encoded and decoded to survive transport.

  In this version, we generate Base64 urlsafe-encoded CSRF tokens,
  which are inherently safe to transport.  Validation accepts both
  urlsafe tokens, and strict-encoded tokens for backwards
  compatibility.

  How the tokes are encoded is controllr by the
  action_controller.urlsafe_csrf_tokens config.

  In Rails 5.2.5, the CSRF token format was accidentally changed to
  urlsafe-encoded.

  Atention: If you already upgraded your application to 5.2.5, set the
  config urlsafe_csrf_tokens to true, otherwise your form submission
  will start to fail during the deploy of this new version.

	Rails.application.config.action_controller.urlsafe_csrf_tokens = true

  If you are upgrading from 5.2.4.x, you don't need to change this
  configuration.

  Scott Blum, Étienne Barrié
2021-07-04 06:24:45 +00:00
taca
ab97c3b62b www/ruby-rails61: update to 6.1.3.2
Real changes are in www/ruby-actionpack61 only.

## Rails 6.1.3.2 (May 05, 2021) ##

*   Prevent open redirects by correctly escaping the host allow list
    CVE-2021-22903

*   Prevent catastrophic backtracking during mime parsing
    CVE-2021-22902

*   Prevent regex DoS in HTTP token authentication
    CVE-2021-22904

*   Prevent string polymorphic route arguments.

    `url_for` supports building polymorphic URLs via an array
    of arguments (usually symbols and records). If a developer passes a
    user input array, strings can result in unwanted route helper calls.

    CVE-2021-22885

    *Gannon McGibbon*
2021-05-08 14:08:55 +00:00
taca
efabc36003 www/ruby-rails60: update to 6.0.3.7
Real changes are in www/ruby-actionpack60 only.

## Rails 6.0.3.7 (May 05, 2021) ##

*   Prevent catastrophic backtracking during mime parsing
    CVE-2021-22902

*   Prevent regex DoS in HTTP token authentication
    CVE-2021-22904

*   Prevent string polymorphic route arguments.

    `url_for` supports building polymorphic URLs via an array
    of arguments (usually symbols and records). If a developer passes a
    user input array, strings can result in unwanted route helper calls.

    CVE-2021-22885

    *Gannon McGibbon*
2021-05-08 14:02:33 +00:00
taca
2cb5da1ade lang/ruby/rubyversion.mk: require quote
Require proper quote for previous addition to MAKEFLAGS.
2021-04-12 14:39:28 +00:00
taca
09f2b2267c www/ruby-rails61: update to 6.1.3.1
Real changes are in devel/devel/ruby-activestorage61 only.

## Rails 6.1.3.1 (March 26, 2021) ##

*  Marcel is upgraded to version 1.0.0 to avoid a dependency on GPL-licensed
   mime types data.

   *George Claghorn*
2021-04-11 13:28:01 +00:00
taca
d0e1571a56 www/ruby-rails60: update to 6.0.3.6
Real changes are in devel/ruby-activestorage60 only.

## Rails 6.0.3.6 (March 26, 2021) ##

*   Marcel is upgraded to version 1.0.0 to avoid a dependency on GPL-licensed
    mime types data.

    *George Claghorn*
2021-04-11 13:24:56 +00:00
taca
4023873efe www/ruby-rails52: update to 5.2.5
Real changes are in devel/ruby-activestorage52 only.


## Rails 5.2.5 (March 26, 2021) ##

*   Marcel is upgraded to version 1.0.0 to avoid a dependency on GPL-licensed
    mime types data.

    *George Claghorn*

*   The Poppler PDF previewer renders a preview image using the original
    document's crop box rather than its media box, hiding print margins. This
    matches the behavior of the MuPDF previewer.

    *Vincent Robert*
2021-04-11 13:20:08 +00:00
taca
c2eeeac6fc lang/ruby: reset PKGREVISION
Reset PKGREVISION with updates of all ruby{26,27,30}.
2021-04-11 12:43:17 +00:00
taca
6f417d4fcf lang/ruby30-base: update to 3.0.1
Ruby 3.0.1 Released (2021-04-05)

Ruby 3.0.1 has been released.

This release includes security fixes.  Please check the topics below
for details.

* CVE-2021-28965: XML round-trip vulnerability in REXML
* CVE-2021-28966: Path traversal in Tempfile on Windows

See the commit logs for details.
2021-04-11 12:36:28 +00:00
taca
3c42dac9f0 lang/ruby27-base: update to 2.7.3
Ruby 2.7.3 Released (2021-04-05)

This release includes security fixes.  Please check the topics below for
details.

* CVE-2021-28965: XML round-trip vulnerability in REXML
* CVE-2021-28966: Path traversal in Tempfile on Windows

See the commit logs for details.
2021-04-11 12:32:03 +00:00
taca
21df79f038 lang/ruby26-base: update to 2.6.7
Ruby 2.6.7 Released (2021-04-05)

This release includes security fixes.  Please check the topics below for
details.

* CVE-2020-25613: Potential HTTP Request Smuggling Vulnerability in
  WEBrick
* CVE-2021-28965: XML round-trip vulnerability in REXML

See the commit logs for details.

By this release, we end the normal maintenance phase of Ruby 2.6, and Ruby
2.6 enters the security maintenance phase.  This means that we will no
longer backport any bug fixes to Ruby 2.6 except security fixes.  The term
of the security maintenance phase is scheduled for a year.  Ruby 2.6 reaches
EOL and its official support ends by the end of the security maintenance
phase.  Therefore, we recommend that you start to plan upgrade to Ruby 2.7
or 3.0.
2021-04-11 12:28:37 +00:00
taca
c423347089 lang/ruby/rubyversion.mk: pass RUBY_RAILS_ACCEPTED
Pass RUBY_RAILS_ACCEPTED to MAKEFLAGS unless it isn't empty.
2021-04-11 12:16:20 +00:00
taca
41ef9d6004 lang/ruby: remove Ruby 2.5 support 2021-04-01 14:12:18 +00:00
taca
d25ba3ba8e lang/ruby: remove Ruby 2.5 support 2021-04-01 14:07:52 +00:00
taca
b153cdc97f lang/ruby: PRINT_PLIST_AWK improvement
* Move PRINT_PLIST_AWK for ${RUBY_SUFFIX} from gem.mk to rubyversion.mk.
  It was previously committed in gem.mk.

* Add support ${RUBY_SUFFIX} to online manual.
2021-03-21 12:39:52 +00:00
taca
a97c1772e2 lang/ruby/gem.mk: support ${RUBY_SUFFIX} in print-PLIST
Add limited support for replacing ${RUBY_SUFFIX} in ${PREFIX}/bin
directory.  Notifed by tsutsui@.
2021-03-20 06:01:53 +00:00
taca
b1afb3f660 lang/ruby: update rails61 to 6.1.3
Oops, really update Ruby on Rails packages to 6.1.3.
2021-02-28 16:58:05 +00:00
taca
ad455d30b9 lang/ruby: update "used by" lines 2021-02-14 14:44:14 +00:00
taca
a61d2961be lang/ruby: add support for ruby 3.0 2021-02-14 14:41:18 +00:00
taca
2471253076 lang/ruby: add support for Ruby 3.0 2021-02-14 14:30:07 +00:00
taca
127502ff29 lang/ruby: add Ruby on Rails 6.1 support 2021-02-14 13:49:40 +00:00
taca
a9f7375312 www/ruby-rails60: update to 6.0.3.5
databases/ruby-activerecord60:

## Rails 6.0.3.5 (February 10, 2021) ##

*   Fix possible DoS vector in PostgreSQL money type

    Carefully crafted input can cause a DoS via the regular expressions used
    for validating the money format in the PostgreSQL adapter.  This patch
    fixes the regexp.

    Thanks to @dee-see from Hackerone for this patch!

    [CVE-2021-22880]

    *Aaron Patterson*

www/ruby-actionpack60

## Rails 6.0.3.5 (February 10, 2021) ##

*   Prevent open redirect when allowed host starts with a dot

    [CVE-2021-22881]

    Thanks to @tktech (https://hackerone.com/tktech) for reporting this
    issue and the patch!

    *Aaron Patterson*
2021-02-11 14:30:06 +00:00
taca
9b89b9d325 www/rails52: update to 5.2.4.5
## Rails 5.2.4.5 (February 10, 2021) ##

*   Fix possible DoS vector in PostgreSQL money type

    Carefully crafted input can cause a DoS via the regular expressions used
    for validating the money format in the PostgreSQL adapter.  This patch
    fixes the regexp.

    Thanks to @dee-see from Hackerone for this patch!

    [CVE-2021-22880]

    *Aaron Patterson*
2021-02-11 14:23:41 +00:00
taca
88b1349f6d lang/ruby: add GEM_PLUGINSDIR support
* Add GEM_PLUGINSDIR support required by rubygems 3.2 and later.
* GEM_EXTSDIR is required unconditonally.
2021-01-11 11:21:31 +00:00
taca
f23f4cc5b4 lang/ruby: add RUBYGEM_VERBOSE
Add RUBYGEM_VERBOSE user-settable variable.  It is useful for developers.


RUBYGEM_VERBOSE
	Execute gem with verbose option.
		Possible values: Yes No
		Default: No
2021-01-11 06:51:27 +00:00
taca
ce30d80d81 lang/ruby: correct list of commands
Correctly update list of commands.

Bump PKGREVISION.
2020-12-30 14:15:02 +00:00
taca
d249cb68d0 lang/ruby: try removing extra directory
Try removing extra directory and make "make print-PLIST" happy a little.
2020-12-19 14:41:16 +00:00
taca
93a077a553 www/ruby-rails60: update to 6.0.3.4
Update Ruby on Rails 6.0 related packages to 6.0.3.4.
This is security fix for ruby-actionpack60.

## Rails 6.0.3.4 (October 07, 2020) ##

*   [CVE-2020-8264] Prevent XSS in Actionable Exceptions
2020-10-19 14:50:30 +00:00