Commit graph

22 commits

Author SHA1 Message Date
taca
9fc997ae68 www/ruby-rails60: update to 6.0.6
Ruby on Rails 6.0.6 release on 9th September 2022 and
Active Record is only updated.

databases/ruby-activerecord60

* Symbol is allowed by default for YAML columns

  Étienne Barrié
2022-09-10 08:18:59 +00:00
taca
2230a22ae7 www/ruby-rails60: update to 6.0.5.1
Rails 6.0.5.1 (2022-07-12) updates databases/ruby-activerecord60 only.

databases/ruby-activerecord60

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:


	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]


  [CVE-2022-32224]
2022-07-13 14:44:08 +00:00
taca
10f0cf1425 www/ruby-rails60: update to 6.0.5
Ruby on Rails 6.0.5 (2022-05-12)

Active Support

* Fix tag helper regression.

Action Text

* Disentangle Action Text from ApplicationController

  Allow Action Text to be used without having an ApplicationController
  defined.

  This makes sure:

    - Action Text attachments render the correct URL host in mailers.
    - an ActionController::Renderer isn't allocated per request.
    - Sidekiq doesn't hang with the "classic" autoloader.
2022-06-07 14:59:20 +00:00
taca
3ddbb1d23a Update rest of Ruby on Rails 60 components.
No change except version.
2022-05-05 03:24:54 +00:00
taca
13747ca944 www/ruby-rails60: update to 6.0.4.7
Changes are in devel/ruby-activestorage60 only.


## Rails 6.0.4.7 (March 08, 2022) ##

* Added image transformation validation via configurable allow-list.

  Variant now offers a configurable allow-list for
  transformation methods in addition to a configurable deny-list for arguments.

  [CVE-2022-21831]
2022-03-13 15:08:21 +00:00
taca
b85ecf1d31 www/ruby-rails60: update to 6.0.4.6
This update contains security fix for CVE-2022-23633 in ruby-actionpack60.

Active Support 6.0.4.6 (2022-02-11)

* Fix Reloader method signature to work with the new Executor signature.

Action Pack 6.0.4.6

6.0.4.5 (2022-02-11)

* Under certain circumstances, the middleware isn't informed that the
  response body has been fully closed which result in request state
  not being fully reset before the next request.

  [CVE-2022-23633]

Other packages have no change.
2022-02-13 07:31:21 +00:00
taca
ea9904613b mail/ruby-actionmailbox60: update to 6.0.4.4
pkgsrc change: correct dependency.

No change except version.
2021-12-19 05:15:52 +00:00
nia
f413f7fded mail: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

The following distfiles were unfetchable (possibly fetched
conditionally?):

./mail/qmail/distinfo netqmail-1.05-TAI-leapsecs.patch
2021-10-26 10:53:53 +00:00
nia
be020196fe mail: Remove SHA1 hashes for distfiles 2021-10-07 14:25:11 +00:00
taca
3905ab707f www/ruby-rails60: update to 6.0.4.1
Update Ruby on Rails 6.0 pacakges to 6.0.4.1.

Real changes are in Action Pack (www/ruby-actionpack60).

## Rails 6.0.4.1 (August 19, 2021) ##

* [CVE-2021-22942] Fix possible open redirect in Host Authorization middleware.

  Specially crafted "X-Forwarded-Host" headers in combination with certain
  "allowed host" formats can cause the Host Authorization middleware in Action
  Pack to redirect users to a malicious website.
2021-08-22 07:12:49 +00:00
taca
27632d3ccd www/ruby-rails60: update to 6.0.4
Ruby on Rails 6.0.4 (2021-06-15), including security fixes.

Active Support

* Fixed issue in ActiveSupport::Cache::RedisCacheStore not passing
  options to read_multi causing fetch_multi to not work properly.
  (Rajesh Sharma)

* with_options copies its options hash again to avoid leaking mutations.
  Fixes #39343.  (Eugene Kenny)

Active Record

* Only warn about negative enums if a positive form that would cause
  conflicts exists.  Fixes #39065.  (Alex Ghiculescu)

* Allow the inverse of a has_one association that was previously
  autosaved to be loaded.  Fixes #34255.  (Steven Weber)

* Reset statement cache for association if table_name is changed.
  Fixes #36453.  (Ryuta Kamizono)

* Type cast extra select for eager loading.  (Ryuta Kamizono)

* Prevent collection associations from being autosaved multiple times.
  Fixes #39173.  (Eugene Kenny)

* Resolve issue with insert_all unique_by option when used with
  expression index.

  When the :unique_by option of ActiveRecord::Persistence.insert_all
  and ActiveRecord::Persistence.upsert_all was used with the name of
  an expression index, an error was raised.  Adding a guard around the
  formatting behavior for the :unique_by corrects this.

  Usage:

	create_table :books, id: :integer, force: true do |t|
	  t.column :name, :string
	  t.index "lower(name)", unique: true
	end

  	Book.insert_all [{ name: "MyTest" }], unique_by: :index_books_on_lower_name

  Fixes #39516.  (Austen Madden)

* Fix preloading for polymorphic association with custom scope.
  (Ryuta Kamizono)

* Allow relations with different SQL comments in the or method.
  (Takumi Shotoku)

* Resolve conflict between counter cache and optimistic locking.

  Bump an Active Record instance's lock version after updating its
  counter cache.  This avoids raising an unnecessary
  ActiveRecord::StaleObjectError upon subsequent transactions by
  maintaining parity with the corresponding database record's
  lock_version column.  Fixes #16449.  (Aaron Lipman)

* Fix through association with source/through scope which has joins.
  (Ryuta Kamizono)

* Fix through association to respect source scope for includes/preload.
  (Ryuta Kamizono)

* Fix eager load with Arel joins to maintain the original joins order.
  (Ryuta Kamizono)

* Fix group by count with eager loading + order + limit/offset.
  (Ryuta Kamizono)

* Fix left joins order when merging multiple left joins from different
  associations.  (Ryuta Kamizono)

* Fix index creation to preserve index comment in bulk change table on
  MySQL.  (Ryuta Kamizono)

* Change remove_foreign_key to not check :validate option if database
  doesn't support the feature.  (Ryuta Kamizono)

* Fix the result of aggregations to maintain duplicated "group by"
  fields.  (Ryuta Kamizono)

* Do not return duplicated records when using preload.  (Bogdan Gusiev)

Action View

* SanitizeHelper.sanitized_allowed_attributes and
  SanitizeHelper.sanitized_allowed_tags call safe_list_sanitizer's
  class method.  Fixes #39586.  (Taufiq Muhammadi)

Action Pack

* Accept base64_urlsafe CSRF tokens to make forward compatible.

* Base64 strict-encoded CSRF tokens are not inherently websafe, which
  makes them difficult to deal with.  For example, the common practice
  of sending the CSRF token to a browser in a client-readable cookie
  does not work properly out of the box: the value has to be
  url-encoded and decoded to survive transport.

  In Rails 6.1, we generate Base64 urlsafe-encoded CSRF tokens, which
  are inherently safe to transport.  Validation accepts both urlsafe
  tokens, and strict-encoded tokens for backwards compatibility.

  In Rails 5.2.5, the CSRF token format is accidentally changed to
  urlsafe-encoded.  If you upgrade apps from 5.2.5, set the config
  urlsafe_csrf_tokens = true.

	Rails.application.config.action_controller.urlsafe_csrf_tokens = true

  (Scott Blum, Étienne Barrié)

* Signed and encrypted cookies can now store false as their value when
  action_dispatch.use_cookies_with_metadata is enabled.  (Rolandas
  Barysas)

Active Storage

* The Poppler PDF previewer renders a preview image using the original
  document's crop box rather than its media box, hiding print
  margins. This matches the behavior of the MuPDF previewer.  (Vincent
  Robert)

Railties

* Allow relative paths with trailing slashes to be passed to rails
  test.  (Eugene Kenny)

* Return a 405 Method Not Allowed response when a request uses an
  unknown HTTP method.  Fixes #38998.  (Loren Norman)
2021-07-04 06:58:37 +00:00
taca
efabc36003 www/ruby-rails60: update to 6.0.3.7
Real changes are in www/ruby-actionpack60 only.

## Rails 6.0.3.7 (May 05, 2021) ##

*   Prevent catastrophic backtracking during mime parsing
    CVE-2021-22902

*   Prevent regex DoS in HTTP token authentication
    CVE-2021-22904

*   Prevent string polymorphic route arguments.

    `url_for` supports building polymorphic URLs via an array
    of arguments (usually symbols and records). If a developer passes a
    user input array, strings can result in unwanted route helper calls.

    CVE-2021-22885

    *Gannon McGibbon*
2021-05-08 14:02:33 +00:00
taca
d0e1571a56 www/ruby-rails60: update to 6.0.3.6
Real changes are in devel/ruby-activestorage60 only.

## Rails 6.0.3.6 (March 26, 2021) ##

*   Marcel is upgraded to version 1.0.0 to avoid a dependency on GPL-licensed
    mime types data.

    *George Claghorn*
2021-04-11 13:24:56 +00:00
taca
a9f7375312 www/ruby-rails60: update to 6.0.3.5
databases/ruby-activerecord60:

## Rails 6.0.3.5 (February 10, 2021) ##

*   Fix possible DoS vector in PostgreSQL money type

    Carefully crafted input can cause a DoS via the regular expressions used
    for validating the money format in the PostgreSQL adapter.  This patch
    fixes the regexp.

    Thanks to @dee-see from Hackerone for this patch!

    [CVE-2021-22880]

    *Aaron Patterson*

www/ruby-actionpack60

## Rails 6.0.3.5 (February 10, 2021) ##

*   Prevent open redirect when allowed host starts with a dot

    [CVE-2021-22881]

    Thanks to @tktech (https://hackerone.com/tktech) for reporting this
    issue and the patch!

    *Aaron Patterson*
2021-02-11 14:30:06 +00:00
taca
93a077a553 www/ruby-rails60: update to 6.0.3.4
Update Ruby on Rails 6.0 related packages to 6.0.3.4.
This is security fix for ruby-actionpack60.

## Rails 6.0.3.4 (October 07, 2020) ##

*   [CVE-2020-8264] Prevent XSS in Actionable Exceptions
2020-10-19 14:50:30 +00:00
taca
1c2bcba9e4 www/ruby-rails60: update to 6.0.3.3
Update Ruby on Rails 60 to 6.0.3.3.

Security fix in ruby-actionview60.


## Rails 6.0.3.3 (September 09, 2020) ##

*   [CVE-2020-8185] Fix potential XSS vulnerability in the `translate`/`t` helper.

    *Jonathan Hefner*
2020-09-10 14:30:02 +00:00
taca
6e31dc6e10 lang/rails60: update to 6.0.3.2
Update Ruby on Rails to 6.0.3.2.

www/ruby-actionpack60 is the really updated package and other packages
have no change except version.

CHANGELOG of www/ruby-actionpack60 is here:

## Rails 6.0.3.2 (June 17, 2020) ##

* [CVE-2020-8185] Only allow ActionableErrors if
  show_detailed_exceptions is enabled
2020-06-18 13:38:45 +00:00
taca
70e54393f8 Remove RUBY_VERSIONS_INCOMPATIBLE for ruby24. 2020-05-21 16:04:21 +00:00
taca
e84ef99d3b mail/ruby-actionmailbox60: update to 6.0.3.1
Update ruby-actionmailbox60 to 6.0.3.1.


## Rails 6.0.3.1 (May 18, 2020) ##

*   No changes.
2020-05-19 17:14:41 +00:00
taca
41303364be mail/ruby-actionmailbox60: update to 6.0.3
Update ruby-actionmailbox60 to 6.0.3.


## Rails 6.0.3 (May 06, 2020) ##

*   Update Mandrill inbound email route to respond appropriately to HEAD requests for URL health checks from Mandrill.

    *Bill Cromie*
2020-05-16 14:20:46 +00:00
joerg
f598f4e1f6 Restrict some more rails packages to Ruby 2.5+ 2020-03-21 23:51:40 +00:00
taca
fa484ec6c7 mail/ruby-actionmailbox60: add package version 6.0.2.2
Add ruby-actionmailbox60 package version 6.0.2.2.


Action Mailbox

Action Mailbox routes incoming emails to controller-like mailboxes for
processing in Rails.  It ships with ingresses for Mailgun, Mandrill, Postmark,
and SendGrid.  You can also handle inbound mails directly via the built-in
Exim, Postfix, and Qmail ingresses.

The inbound emails are turned into `InboundEmail` records using Active Record
and feature lifecycle tracking, storage of the original email on cloud storage
via Active Storage, and responsible data handling with on-by-default
incineration.

These inbound emails are routed asynchronously using Active Job to one or
several dedicated mailboxes, which are capable of interacting directly with
the rest of your domain model.

You can read more about Action Mailbox in the [Action Mailbox
Basics](https://edgeguides.rubyonrails.org/action_mailbox_basics.html) guide.

This is for Ruby on Rails 6.0.
2020-03-20 16:58:34 +00:00