Next | Query returned 19 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2023-09-03 17:29:50 by Takahiro Kambe | Files touched by this commit (46) | Package removed
Log message:
Remove Ruby on Rails 5.2 packages.

Ruby on Rails 5.2 reached EOL.
   2023-02-20 14:30:43 by Takahiro Kambe | Files touched by this commit (4)
Log message:
devel/ruby-activesupport*: more strict dependency to ruby-concurrent-ruby

Restrict dependency for ruby-concurrent-ruby to below 1.2.

Reflects a report from wiz@, thanks much.
   2023-02-11 14:18:51 by Takahiro Kambe | Files touched by this commit (7)
Log message:
Bump PKGREVISION reflects ruby-concurrent-ruby's downgrade.
   2022-07-13 16:41:09 by Takahiro Kambe | Files touched by this commit (13) | Package updated
Log message:
www/ruby-rails52: update to 5.2.8.1

Rails 5.2.8.1 (2022-07-12) updates databases/ruby-activerecord52 only.

databases/ruby-activerecord52

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:

	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]

  [CVE-2022-32224]
   2022-06-07 16:48:13 by Takahiro Kambe | Files touched by this commit (13) | Package updated
Log message:
www/ruby-rails52: update to 5.2.8

Ruby on Rails 5.2.8 (2022-05-12)

Active Support

* Fix tag helper regression.

Action View

* Make `LoadInterlockAwareMonitor` work in Ruby 2.7.
* Retain Ruby 2.2 compatibility.
   2022-05-05 05:03:50 by Takahiro Kambe | Files touched by this commit (1) | Package updated
Log message:
devel/ruby-activesupport52: update to 5.2.7.1

## Rails 5.2.7.1 (April 26, 2022) ##

*   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

    Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
    in names of tags and names of attributes, following the specification of XML.

    *Álvaro Martín Fraguas*

## Rails 5.2.7 (March 10, 2022) ##

*   Restore support to Ruby 2.2.

    *ojab*
   2022-03-27 08:31:56 by Thomas Klausner | Files touched by this commit (4)
Log message:
*: fix typo in comment
   2022-03-13 16:04:27 by Takahiro Kambe | Files touched by this commit (12) | Package updated
Log message:
www/ruby-rails52: update to 5.2.6.3

Ruby on Rails 5.2.6.3 is not latest version but it should be easy to pull-up
to pkgsrc-2021Q4.

Changes are in devel/ruby-activestorage52 only.

Rails 5.2.6.3 (March 08, 2022)

* Added image transformation validation via configurable allow-list.

  Variant now offers a configurable allow-list for
  transformation methods in addition to a configurable deny-list for arguments.

  [CVE-2022-21831]
   2022-02-13 08:26:07 by Takahiro Kambe | Files touched by this commit (12) | Package updated
Log message:
www/ruby-rails52: update to 5.2.6.2

This update contains security fix for CVE-2022-23633 in

Active Support 5.2.6.2 (2022-02-11)

* Fix Reloader method signature to work with the new Executor signature.

Action Pack 5.2.6.2 (2022-02-11)

* Under certain circumstances, the middleware isn't informed that the
  response body has been fully closed which result in request state
  not being fully reset before the next request.

  [CVE-2022-23633]
   2021-10-26 12:20:11 by Nia Alarie | Files touched by this commit (3016)
Log message:
archivers: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Could not be committed due to merge conflict:
devel/py-traitlets/distinfo

The following distfiles were unfetchable (note: some may be only fetched
conditionally):

./devel/pvs/distinfo pvs-3.2-solaris.tgz
./devel/eclipse/distinfo eclipse-sourceBuild-srcIncluded-3.0.1.zip

Next | Query returned 19 messages, browsing 1 to 10 | Previous