Next | Query returned 54 messages, browsing 11 to 20 | Previous

History of commit frequency

CVS Commit History:


   2022-06-30 13:19:02 by Nia Alarie | Files touched by this commit (524)
Log message:
*: Revbump packages that use Python at runtime without a PKGNAME prefix
   2022-06-18 22:40:17 by Leonardo Taccari | Files touched by this commit (3)
Log message:
mitmproxy: Update to 8.1.0

pkgsrc changes:
 - Now needs Python>=3.9 per upstream
 - Further relax py-cryptography needs (seems to runs fine also with older
   py-cryptography) because in pkgsrc we do not have yet cryptography>=36.

Changes:
## 15 May 2022: mitmproxy 8.1.0

* Mostly a Bug fix release
* DNS support
* Mitmproxy now requires Python 3.9 or above.

## 19 March 2022: mitmproxy 8.0.0
### Major Changes

* Major improvements to the web interface
* Event hooks can now be async
* New `tls_{established,failed}_{client,server}` event hooks to record
  negotiation success/failure

### Security Fixes

* CVE-2022-24766: Fix request smuggling vulnerability reported by @zeyu2001
   2022-01-10 23:43:41 by Thomas Klausner | Files touched by this commit (2)
Log message:
mitmproxy: convert to egg.mk
   2021-12-30 14:05:42 by Adam Ciarcinski | Files touched by this commit (125)
Log message:
Forget about Python 3.6
   2021-10-26 13:07:15 by Nia Alarie | Files touched by this commit (958)
Log message:
net: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts...):

net/radsecproxy/distinfo

The following distfiles could not be fetched (fetched conditionally?):

./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
   2021-10-07 16:43:07 by Nia Alarie | Files touched by this commit (962)
Log message:
net: Remove SHA1 hashes for distfiles
   2021-09-16 13:52:19 by Leonardo Taccari | Files touched by this commit (2)
Log message:
mitmproxy: Update to 7.0.3

Changes:
7.0.3
-----
* CVE-2021-39214: Fix request smuggling vulnerabilities reported by @chinchila
* Expose TLS 1.0 as possible minimum version on older pyOpenSSL releases
* Fix compatibility with Python 3.10

7.0.2
-----
* Fix a WebSocket crash introduced in 7.0.1

7.0.1
-----
* Performance: Re-use OpenSSL contexts to enable TLS session resumption
* Disable HTTP/2 CONNECT for Secure Web Proxies to fix compatibility with
  Firefox
* Use local IP address as certificate subject if no other info is available
* Make it possible to return multiple chunks for HTTP stream modification
* Don't send WebSocket CONTINUATION frames when the peer does not send any
* Fix HTTP stream modify example.
* Fix a crash caused by no-op assignments to `Server.address`
* Fix a crash when encountering invalid certificates
* Fix a crash when pressing the Home/End keys in some screens
* Fix a crash when reading corrupted flow dumps
* Fix multiple crashes on flow export
* Fix a bug where ASGI apps did not see the request body
* Minor documentation improvements
   2021-07-17 16:14:47 by Leonardo Taccari | Files touched by this commit (3)
Log message:
mitmproxy: Update to 7.0.0

Changes:
## 16 July 2021: mitmproxy 7.0.0

### New Proxy Core (@mhils, [blog \ 
post](https://www.mitmproxy.org/posts/releases/mitmproxy7/))

Mitmproxy has a completely new proxy core, fixing many longstanding issues:

* **Secure Web Proxy:** Mitmproxy now supports TLS-over-TLS to already
  encrypt the connection to the proxy.
* **Server-Side Greetings:** Mitmproxy now supports proxying raw TCP
  connections, including ones that start with a server-side greeting (e.g. SMTP).
* **HTTP/1 – HTTP/2 Interoperability:** mitmproxy can now accept an
  HTTP/2 connection from the client, and forward it to an HTTP/1 server.
* **HTTP/2 Redirects:** The request destination can now be changed on
  HTTP/2 flows.
* **Connection Strategy:** Users can now specify if they want mitmproxy
  to eagerly connect upstream or wait as long as possible. Eager
  connections are required to detect protocols with server-side
  greetings, lazy connections enable the replay of responses without
  connecting to an upstream server.
* **Timeout Handling:** Mitmproxy will now clean up idle connections
  and also abort requests if the client disconnects in the meantime.
* **Host Header-based Proxying:** If the request destination is
  unknown, mitmproxy now falls back to proxying based on the Host
  header. This means that requests can often be redirected to mitmproxy
  using DNS spoofing only.
* **Internals:** All protocol logic is now separated from I/O
  (["sans-io"](https://sans-io.readthedocs.io/)).
  This greatly improves testing capabilities, prevents a wide array of
  race conditions, and increases proper isolation between layers.

### Additional Changes

* mitmproxy's command line interface now supports Windows (@mhils)

* The `clientconnect`, `clientdisconnect`, `serverconnect`,
  `serverdisconnect`, and `log` events have been replaced with new
  events, see addon documentation for details (@mhils)

* Contentviews now implement `render_priority` instead of
  `should_render`, allowing more specialization (@mhils)
* Addition of block_list option to block requests with a set status
  code (@ericbeland)
* Make mitmweb columns configurable and customizable (@gorogoroumaru)
* Automatic JSON view mode when `+json` suffix in content type (@kam800)
* Use pyca/cryptography to generate certificates, not pyOpenSSL (@mhils)
* Remove the legacy protocol stack (@Kriechi)
* Remove all deprecated pathod and pathoc tools and modules (@Kriechi)
* In reverse proxy mode, mitmproxy now does not assume TLS if no scheme
  is given but a custom port is provided (@mhils)
* Remove the following options: `http2_priority`,
  `relax_http_form_validation`, `upstream_bind_address`,
  `spoof_source_address`, and `stream_websockets`. If you depended on
  one of them please let us know.  mitmproxy never phones home, which
  means we don't know how prominently these options were used. (@mhils)
* Fix IDNA host 'Bad HTTP request line' error (@grahamrobbins)
* Pressing `?` now exits console help view (@abitrolly)
* `--modify-headers` now works correctly when modifying a header that
  is also part of the filter expression (@Prinzhorn)
* Fix SNI-related reproducibility issues when exporting to curl/httpie
  commands. (@dkasak)
* Add option `export_preserve_original_ip` to force exported command to
  connect to IP from original request.
  Only supports curl at the moment. (@dkasak)
* Major proxy protocol testing (@r00t-)
* Switch Docker image release to be based on Debian (@PeterDaveHello)
* Multiple Browsers: The `browser.start` command may be executed more
  than once to start additional browser sessions. (@rbdixon)
* Improve readability of SHA256 fingerprint. (@wrekone)
* Metadata and Replay Flow Filters: Flows may be filtered based on
  metadata and replay status. (@rbdixon)
* Flow control: don't read connection data faster than it can be
  forwarded. (@hazcod)
* Docker images for ARM64 architecture (@hazcod, @mhils)
* Fix parsing of certificate issuer/subject with escaped special
  characters (@Prinzhorn)
* Customize markers with emoji, and filters: The `flow.mark` command
  may be used to mark a flow with either the default "red ball" marker,
  a single character, or an emoji like `:grapes:`.  Use the `~marker`
  filter to filter on marker characters. (@rbdixon)
* New `flow.comment` command to add a comment to the flow. Add
  `~comment <regex>` filter syntax to search flow comments. (@rbdixon)
* Fix multipart forms losing `boundary` values on edit. (@roytu)
* `Transfer-Encoding: chunked` HTTP message bodies are now retained if
  they are below the stream_large_bodies limit. (@mhils)
* `json()` method for HTTP Request and Response instances will return
  decoded JSON body. (@rbdixon)
* Support for HTTP/2 Push Promises has been dropped. (@mhils)
* Make it possible to set sequence options from the command line. (@Yopi)
   2021-02-26 09:47:03 by Leonardo Taccari | Files touched by this commit (1)
Log message:
mitmproxy: Add missing dependency to py-sqlite3

Reported by Austin Wise via <https://github.com/NetBSD/pkgsrc/pull/84>, thanks!

PKGREVISION++
   2020-12-19 12:54:42 by Leonardo Taccari | Files touched by this commit (3) | Package updated
Log message:
mitmproxy: Update to 6.0.2

Changes:
15 December 2020: mitmproxy 6.0.2
=================================
* Fix reading of saved flows in mitmweb.

13 December 2020: mitmproxy 6.0.1
=================================
* Fix flow serialization in mitmweb.

13 December 2020: mitmproxy 6.0
===============================
* Mitmproxy now requires Python 3.8 or above.
* Deprecation of pathod and pathoc tools and modules. Future releases will not \ 
contain them! (@Kriechi)
* SSLKEYLOGFILE now supports TLS 1.3 secrets (@mhils)
* Fix query parameters in asgiapp addon (@jpstotz)
* Fix command history failing on file I/O errors (@Kriechi)
* Add example addon to suppress unwanted error messages sent by mitmproxy. \ 
(@anneborcherding)
* Updated imports and styles for web scanner helper addons. (@anneborcherding)
* Inform when underscore-formatted options are used in client arg. (@jrblixt)
* ASGIApp now ignores loaded HTTP flows from somewhere. (@linw1995)
* Binaries are now built with Python 3.9 (@mhils)
* Fixed the web UI showing blank page on clicking details tab when server \ 
address is missing (@samhita-sopho)
* Tests: Replace asynctest with stdlib mock (@felixonmars)
* MapLocal now keeps its configuration when other options are set. (@mhils)
* Host headers with non-standard ports are now properly updated in reverse proxy \ 
mode. (@mhils)
* Fix missing host header when replaying HTTP/2 flows (@Granitosaurus)

Next | Query returned 54 messages, browsing 11 to 20 | Previous