pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/password-store password-store: Update securit...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/c856278b4a99
branches:  trunk
changeset: 381690:c856278b4a99
user:      leot <leot%pkgsrc.org@localhost>
date:      Thu Jun 14 16:08:39 2018 +0000

description:
password-store: Update security/password-store to 1.7.2

pkgsrc changes:
 - Deprecate PKG_OPTIONS.pass in favour of PKG_OPTIONS.password-store
 - Remove patches/patch-tests_t0300-reencryption.sh, fixed similarly upstream

Changes:
1.7.2
-----
Pass 1.7.2 has a number of important changes and bug fixes, including
a fix for CVE-2018-12356. Everybody must update immediately.

diffstat:

 security/password-store/Makefile                                  |   4 +-
 security/password-store/PLIST                                     |   6 +-
 security/password-store/distinfo                                  |  15 ++--
 security/password-store/options.mk                                |  12 ++-
 security/password-store/patches/patch-contrib_dmenu_passmenu      |   4 +-
 security/password-store/patches/patch-src_password-store.sh       |  34 +++++-----
 security/password-store/patches/patch-tests_t0300-reencryption.sh |  15 ----
 7 files changed, 42 insertions(+), 48 deletions(-)

diffs (183 lines):

diff -r f9587965441f -r c856278b4a99 security/password-store/Makefile
--- a/security/password-store/Makefile  Thu Jun 14 15:16:09 2018 +0000
+++ b/security/password-store/Makefile  Thu Jun 14 16:08:39 2018 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.6 2018/05/06 11:56:58 leot Exp $
+# $NetBSD: Makefile,v 1.7 2018/06/14 16:08:39 leot Exp $
 
-DISTNAME=      password-store-1.7.1
+DISTNAME=      password-store-1.7.2
 CATEGORIES=    security
 MASTER_SITES=  http://git.zx2c4.com/password-store/snapshot/
 EXTRACT_SUFX=  .tar.xz
diff -r f9587965441f -r c856278b4a99 security/password-store/PLIST
--- a/security/password-store/PLIST     Thu Jun 14 15:16:09 2018 +0000
+++ b/security/password-store/PLIST     Thu Jun 14 16:08:39 2018 +0000
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.3 2018/05/06 11:56:58 leot Exp $
+@comment $NetBSD: PLIST,v 1.4 2018/06/14 16:08:39 leot Exp $
 bin/pass
 man/man1/pass.1
 share/examples/password-store/completion/pass.bash-completion
@@ -6,6 +6,7 @@
 share/examples/password-store/completion/pass.zsh-completion
 share/examples/password-store/contrib/dmenu/README.md
 share/examples/password-store/contrib/dmenu/passmenu
+share/examples/password-store/contrib/emacs/CHANGELOG.md
 share/examples/password-store/contrib/emacs/Cask
 share/examples/password-store/contrib/emacs/README.md
 share/examples/password-store/contrib/emacs/password-store.el
@@ -24,5 +25,6 @@
 share/examples/password-store/contrib/importers/revelation2pass.py
 share/examples/password-store/contrib/importers/roboform2pass.rb
 share/examples/password-store/contrib/pass.applescript
-share/examples/password-store/contrib/vim/noplaintext.vim
+share/examples/password-store/contrib/vim/redact_pass.txt
+share/examples/password-store/contrib/vim/redact_pass.vim
 share/examples/password-store/example-filter.sh
diff -r f9587965441f -r c856278b4a99 security/password-store/distinfo
--- a/security/password-store/distinfo  Thu Jun 14 15:16:09 2018 +0000
+++ b/security/password-store/distinfo  Thu Jun 14 16:08:39 2018 +0000
@@ -1,9 +1,8 @@
-$NetBSD: distinfo,v 1.4 2018/05/06 11:56:58 leot Exp $
+$NetBSD: distinfo,v 1.5 2018/06/14 16:08:39 leot Exp $
 
-SHA1 (password-store-1.7.1.tar.xz) = e7982416eaea8773ead0836f0b4c7a475ef33cb3
-RMD160 (password-store-1.7.1.tar.xz) = ebd86a7ae52559eeac5001e9634306dc0b8bdd5f
-SHA512 (password-store-1.7.1.tar.xz) = 2ba2ebc80c90454bbab1da3c43c2cfc87135f838f381e2616eef7c36b0c1de01e491cf587a666bb052d6dfd475fa429bc8fd82b0269325bd2b70afbb897b923e
-Size (password-store-1.7.1.tar.xz) = 62340 bytes
-SHA1 (patch-contrib_dmenu_passmenu) = 025e88b68b68936d80e6eca914e7e6e44d1d887e
-SHA1 (patch-src_password-store.sh) = 21741ae5c3c7f4f1cae713ce8ba2f029c6318625
-SHA1 (patch-tests_t0300-reencryption.sh) = 281b25c8fa46d0412b87725aaa375dc902bf971f
+SHA1 (password-store-1.7.2.tar.xz) = d8027e01634cec0694a5513ab6950e639cf2c69c
+RMD160 (password-store-1.7.2.tar.xz) = 69f8482fa565f3b5990de74cbf4429b20addd577
+SHA512 (password-store-1.7.2.tar.xz) = e6719a7125af6ecd80fdbeb38b4e2e89e7358ff16e18739d68a04b72dfdf860294b54f7ec0ec9676a62d2e270db8f54784a357c82217a478694472f8136e3657
+Size (password-store-1.7.2.tar.xz) = 63620 bytes
+SHA1 (patch-contrib_dmenu_passmenu) = 24458d7100df28232f87ffc414e133d38565ba6f
+SHA1 (patch-src_password-store.sh) = 765a0c6eee25b924d370122426fd7491dd22b2ea
diff -r f9587965441f -r c856278b4a99 security/password-store/options.mk
--- a/security/password-store/options.mk        Thu Jun 14 15:16:09 2018 +0000
+++ b/security/password-store/options.mk        Thu Jun 14 16:08:39 2018 +0000
@@ -1,11 +1,19 @@
-# $NetBSD: options.mk,v 1.2 2018/05/06 11:56:58 leot Exp $
+# $NetBSD: options.mk,v 1.3 2018/06/14 16:08:39 leot Exp $
 
-PKG_OPTIONS_VAR=       PKG_OPTIONS.pass
+PKG_OPTIONS_VAR=       PKG_OPTIONS.password-store
 
 PKG_SUPPORTED_OPTIONS=         git x11
 PKG_SUGGESTED_OPTIONS=         git
 PKG_OPTIONS_LEGACY_OPTS+=      xclip:x11
 
+.include "../../mk/bsd.prefs.mk"
+
+.if defined(PKG_OPTIONS.pass)
+PKG_LEGACY_OPTIONS+=           ${PKG_OPTIONS.pass}
+PKG_OPTIONS_DEPRECATED_WARNINGS+= \
+       "Deprecated variable PKG_OPTIONS.pass used, use ${PKG_OPTIONS_VAR} instead."
+.endif
+
 .include "../../mk/bsd.options.mk"
 
 .if !empty(PKG_OPTIONS:Mx11)
diff -r f9587965441f -r c856278b4a99 security/password-store/patches/patch-contrib_dmenu_passmenu
--- a/security/password-store/patches/patch-contrib_dmenu_passmenu      Thu Jun 14 15:16:09 2018 +0000
+++ b/security/password-store/patches/patch-contrib_dmenu_passmenu      Thu Jun 14 16:08:39 2018 +0000
@@ -1,4 +1,4 @@
-$NetBSD: patch-contrib_dmenu_passmenu,v 1.1 2018/05/06 11:56:58 leot Exp $
+$NetBSD: patch-contrib_dmenu_passmenu,v 1.2 2018/06/14 16:08:39 leot Exp $
 
 Avoid unsupported x11/xdotool (at least version 2.20110530.1) `--file' option.
 Refactor the logic for `passmenu --type' in order to avoid `--file' and directly
@@ -10,7 +10,7 @@
  if [[ $typeit -eq 0 ]]; then
        pass show -c "$password" 2>/dev/null
  else
--      pass show "$password" | { read -r pass; printf %s "$pass"; } |
+-      pass show "$password" | { IFS= read -r pass; printf %s "$pass"; } |
 -              xdotool type --clearmodifiers --file -
 +      { printf "type --clearmodifiers -- ";
 +          pass show "$password" | head -n 1 ; } |
diff -r f9587965441f -r c856278b4a99 security/password-store/patches/patch-src_password-store.sh
--- a/security/password-store/patches/patch-src_password-store.sh       Thu Jun 14 15:16:09 2018 +0000
+++ b/security/password-store/patches/patch-src_password-store.sh       Thu Jun 14 16:08:39 2018 +0000
@@ -1,8 +1,8 @@
-$NetBSD: patch-src_password-store.sh,v 1.2 2018/05/06 11:56:58 leot Exp $
+$NetBSD: patch-src_password-store.sh,v 1.3 2018/06/14 16:08:39 leot Exp $
 
 Avoid non portable mkdir(1) `-v' parameter.
 
---- src/password-store.sh.orig 2017-04-13 10:11:14.000000000 +0000
+--- src/password-store.sh.orig 2018-06-14 14:58:28.000000000 +0000
 +++ src/password-store.sh
 @@ -323,7 +323,7 @@ cmd_init() {
                fi
@@ -13,34 +13,34 @@
                printf "%s\n" "$@" > "$gpg_id"
                local id_print="$(printf "%s, " "$@")"
                echo "Password store initialized for ${id_print%, }${id_path:+ ($id_path)}"
-@@ -430,7 +430,7 @@ cmd_insert() {
+@@ -432,7 +432,7 @@ cmd_insert() {
  
        [[ $force -eq 0 && -e $passfile ]] && yesno "An entry already exists for $path. Overwrite it?"
  
--      mkdir -p -v "$PREFIX/$(dirname "$path")"
-+      mkdir -p "$PREFIX/$(dirname "$path")"
-       set_gpg_recipients "$(dirname "$path")"
+-      mkdir -p -v "$PREFIX/$(dirname -- "$path")"
++      mkdir -p "$PREFIX/$(dirname -- "$path")"
+       set_gpg_recipients "$(dirname -- "$path")"
  
        if [[ $multiline -eq 1 ]]; then
-@@ -464,7 +464,7 @@ cmd_edit() {
+@@ -466,7 +466,7 @@ cmd_edit() {
  
        local path="${1%/}"
        check_sneaky_paths "$path"
--      mkdir -p -v "$PREFIX/$(dirname "$path")"
-+      mkdir -p "$PREFIX/$(dirname "$path")"
-       set_gpg_recipients "$(dirname "$path")"
+-      mkdir -p -v "$PREFIX/$(dirname -- "$path")"
++      mkdir -p "$PREFIX/$(dirname -- "$path")"
+       set_gpg_recipients "$(dirname -- "$path")"
        local passfile="$PREFIX/$path.gpg"
        set_git "$passfile"
-@@ -506,7 +506,7 @@ cmd_generate() {
-       local length="${2:-$GENERATED_LENGTH}"
+@@ -509,7 +509,7 @@ cmd_generate() {
        check_sneaky_paths "$path"
-       [[ ! $length =~ ^[0-9]+$ ]] && die "Error: pass-length \"$length\" must be a number."
--      mkdir -p -v "$PREFIX/$(dirname "$path")"
-+      mkdir -p "$PREFIX/$(dirname "$path")"
-       set_gpg_recipients "$(dirname "$path")"
+       [[ $length =~ ^[0-9]+$ ]] || die "Error: pass-length \"$length\" must be a number."
+       [[ $length -gt 0 ]] || die "Error: pass-length must be greater than zero."
+-      mkdir -p -v "$PREFIX/$(dirname -- "$path")"
++      mkdir -p "$PREFIX/$(dirname -- "$path")"
+       set_gpg_recipients "$(dirname -- "$path")"
        local passfile="$PREFIX/$path.gpg"
        set_git "$passfile"
-@@ -595,7 +595,7 @@ cmd_copy_move() {
+@@ -598,7 +598,7 @@ cmd_copy_move() {
        echo "$old_path"
        [[ -e $old_path ]] || die "Error: $1 is not in the password store."
  
diff -r f9587965441f -r c856278b4a99 security/password-store/patches/patch-tests_t0300-reencryption.sh
--- a/security/password-store/patches/patch-tests_t0300-reencryption.sh Thu Jun 14 15:16:09 2018 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,15 +0,0 @@
-$NetBSD: patch-tests_t0300-reencryption.sh,v 1.1 2018/05/06 11:56:58 leot Exp $
-
-Adjust output for gnupg2>=2.2.5.
-
---- tests/t0300-reencryption.sh.orig   2017-04-13 10:11:14.000000000 +0000
-+++ tests/t0300-reencryption.sh
-@@ -10,7 +10,7 @@ canonicalize_gpg_keys() {
-       $GPG --list-keys --with-colons "$@" | sed -n 's/sub:[^:]*:[^:]*:[^:]*:\([^:]*\):[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[a-zA-Z]*e[a-zA-Z]*:.*/\1/p' | LC_ALL=C sort -u
- }
- gpg_keys_from_encrypted_file() {
--      $GPG -v --no-secmem-warning --no-permission-warning --decrypt --list-only --keyid-format long "$1" 2>&1 | cut -d ' ' -f 5 | LC_ALL=C sort -u
-+      $GPG -v --no-secmem-warning --no-permission-warning --decrypt --list-only --keyid-format long "$1" 2>&1 | sed -n '/public key/p' | cut -d ' ' -f 5 | LC_ALL=C sort -u
- }
- gpg_keys_from_group() {
-       local output="$($GPG --list-config --with-colons | sed -n "s/^cfg:group:$1:\\(.*\\)/\\1/p" | head -n 1)"



Home | Main Index | Thread Index | Old Index