Path to this page:
NOTICE: This package has been removed from pkgsrc./
databases/ruby-activerecord52,
Object-relational mapper framework (part of Rails 5.2)
Branch: CURRENT,
Version: 5.2.8.1,
Package name: ruby31-activerecord52-5.2.8.1,
Maintainer: pkgsrc-users= Active Record -- Object-relational mapping put on rails
Active Record connects classes to relational database tables to establish an
almost zero-configuration persistence layer for applications. The library
provides a base class that, when subclassed, sets up a mapping between the new
class and an existing table in the database. In context of an application,
these classes are commonly referred to as *models*. Models can also be
connected to other models; this is done by defining *associations*.
This is for Ruby on Rails 5.2.
Required to run:[
databases/ruby-arel] [
devel/ruby-activemodel52] [
devel/ruby-activesupport52] [
lang/ruby31-base]
Master sites:
Filesize: 351 KB
Version history: (Expand)
- (2023-09-04) Package deleted from pkgsrc
- (2023-02-09) Updated to version: ruby31-activerecord52-5.2.8.1
- (2022-07-13) Updated to version: ruby27-activerecord52-5.2.8.1
- (2022-06-07) Updated to version: ruby27-activerecord52-5.2.8
- (2022-05-05) Updated to version: ruby27-activerecord52-5.2.7.1
- (2022-03-13) Updated to version: ruby27-activerecord52-5.2.6.3
CVS history: (Expand)
2023-09-03 17:29:50 by Takahiro Kambe | Files touched by this commit (46) | |
Log message:
Remove Ruby on Rails 5.2 packages.
Ruby on Rails 5.2 reached EOL.
|
2022-07-13 16:41:09 by Takahiro Kambe | Files touched by this commit (13) | |
Log message:
www/ruby-rails52: update to 5.2.8.1
Rails 5.2.8.1 (2022-07-12) updates databases/ruby-activerecord52 only.
databases/ruby-activerecord52
* Change ActiveRecord::Coders::YAMLColumn default to safe_load
This adds two new configuration options The configuration options are as
follows:
o config.active_storage.use_yaml_unsafe_load
When set to true, this configuration option tells Rails to use the old
"unsafe" YAML loading strategy, maintaining the existing behavior but
leaving the possible escalation vulnerability in place. Setting this
option to true is *not* recommended, but can aid in upgrading.
o config.active_record.yaml_column_permitted_classes
The "safe YAML" loading method does not allow all classes to be
deserialized by default. This option allows you to specify classes deemed
"safe" in your application. For example, if your application uses Symbol
and Time in serialized data, you can add Symbol and Time to the allowed
list as follows:
config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]
[CVE-2022-32224]
|
2022-06-07 16:48:13 by Takahiro Kambe | Files touched by this commit (13) | |
Log message:
www/ruby-rails52: update to 5.2.8
Ruby on Rails 5.2.8 (2022-05-12)
Active Support
* Fix tag helper regression.
Action View
* Make `LoadInterlockAwareMonitor` work in Ruby 2.7.
* Retain Ruby 2.2 compatibility.
|
2022-05-05 05:08:16 by Takahiro Kambe | Files touched by this commit (7) |
Log message:
Update rest of Ruby on Rails 52 components.
No change except version.
|
2022-03-13 16:04:27 by Takahiro Kambe | Files touched by this commit (12) | |
Log message:
www/ruby-rails52: update to 5.2.6.3
Ruby on Rails 5.2.6.3 is not latest version but it should be easy to pull-up
to pkgsrc-2021Q4.
Changes are in devel/ruby-activestorage52 only.
Rails 5.2.6.3 (March 08, 2022)
* Added image transformation validation via configurable allow-list.
Variant now offers a configurable allow-list for
transformation methods in addition to a configurable deny-list for arguments.
[CVE-2022-21831]
|
2022-02-13 08:26:07 by Takahiro Kambe | Files touched by this commit (12) | |
Log message:
www/ruby-rails52: update to 5.2.6.2
This update contains security fix for CVE-2022-23633 in
Active Support 5.2.6.2 (2022-02-11)
* Fix Reloader method signature to work with the new Executor signature.
Action Pack 5.2.6.2 (2022-02-11)
* Under certain circumstances, the middleware isn't informed that the
response body has been fully closed which result in request state
not being fully reset before the next request.
[CVE-2022-23633]
|
2021-10-26 12:10:08 by Nia Alarie | Files touched by this commit (417) |
Log message:
databases: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
The following distfiles could not be fetched (some may be only fetched
conditionally):
./databases/cstore/distinfo D6.data.ros.gz
./databases/cstore/distinfo cstore0.2.tar.gz
./databases/cstore/distinfo data4.tar.gz
|
2021-10-07 15:35:53 by Nia Alarie | Files touched by this commit (417) |
Log message:
databases: Remove SHA1 distfile hashes
|