1 |
commit: 08b2970ce9b83a6e149bf69ae64c19763e941145 |
2 |
Author: Matthew Thode <prometheanfire <AT> gentoo <DOT> org> |
3 |
AuthorDate: Fri Oct 20 00:59:27 2017 +0000 |
4 |
Commit: Matt Thode <prometheanfire <AT> gentoo <DOT> org> |
5 |
CommitDate: Fri Oct 20 00:59:27 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=08b2970c |
7 |
|
8 |
app-admin/augeas: cleaning up unused patches for pr:5967 |
9 |
|
10 |
Package-Manager: Portage-2.3.8, Repoman-2.3.3 |
11 |
|
12 |
app-admin/augeas/files/augeas-0.10.0-gets.patch | 15 -- |
13 |
.../files/augeas-0.10.0-libxml2-pkgconfig.patch | 24 ---- |
14 |
app-admin/augeas/files/augeas-0.10.0-test.patch | 56 -------- |
15 |
app-admin/augeas/files/augeas-0.10.0-test2.patch | 49 ------- |
16 |
app-admin/augeas/files/cve-2017-7555.patch | 159 --------------------- |
17 |
.../augeas/files/cve-bunch-of-them-symlink.patch | 76 ---------- |
18 |
6 files changed, 379 deletions(-) |
19 |
|
20 |
diff --git a/app-admin/augeas/files/augeas-0.10.0-gets.patch b/app-admin/augeas/files/augeas-0.10.0-gets.patch |
21 |
deleted file mode 100644 |
22 |
index 5f754955be6..00000000000 |
23 |
--- a/app-admin/augeas/files/augeas-0.10.0-gets.patch |
24 |
+++ /dev/null |
25 |
@@ -1,15 +0,0 @@ |
26 |
- gnulib/lib/stdio.in.h | 1 - |
27 |
- 1 file changed, 1 deletion(-) |
28 |
- |
29 |
-diff --git a/gnulib/lib/stdio.in.h b/gnulib/lib/stdio.in.h |
30 |
-index 9091497..fa7e3fb 100644 |
31 |
---- a/gnulib/lib/stdio.in.h |
32 |
-+++ b/gnulib/lib/stdio.in.h |
33 |
-@@ -162,7 +162,6 @@ _GL_WARN_ON_USE (fflush, "fflush is not always POSIX compliant - " |
34 |
- so any use of gets warrants an unconditional warning. Assume it is |
35 |
- always declared, since it is required by C89. */ |
36 |
- #undef gets |
37 |
--_GL_WARN_ON_USE (gets, "gets is a security hole - use fgets instead"); |
38 |
- |
39 |
- #if @GNULIB_FOPEN@ |
40 |
- # if @REPLACE_FOPEN@ |
41 |
|
42 |
diff --git a/app-admin/augeas/files/augeas-0.10.0-libxml2-pkgconfig.patch b/app-admin/augeas/files/augeas-0.10.0-libxml2-pkgconfig.patch |
43 |
deleted file mode 100644 |
44 |
index aaa41867015..00000000000 |
45 |
--- a/app-admin/augeas/files/augeas-0.10.0-libxml2-pkgconfig.patch |
46 |
+++ /dev/null |
47 |
@@ -1,24 +0,0 @@ |
48 |
-From b41deef293841da50a236023bad486ea3f57e4dc Mon Sep 17 00:00:00 2001 |
49 |
-From: "Richard W.M. Jones" <rjones@××××××.com> |
50 |
-Date: Sat, 3 Dec 2011 14:21:50 +0000 |
51 |
-Subject: [PATCH] pkg-config: Augeas requires libxml2. |
52 |
- |
53 |
---- |
54 |
- augeas.pc.in | 2 +- |
55 |
- 1 files changed, 1 insertions(+), 1 deletions(-) |
56 |
- |
57 |
-diff --git a/augeas.pc.in b/augeas.pc.in |
58 |
-index c97847d..9e166db 100644 |
59 |
---- a/augeas.pc.in |
60 |
-+++ b/augeas.pc.in |
61 |
-@@ -6,6 +6,6 @@ includedir=@includedir@ |
62 |
- Name: augeas |
63 |
- Version: @VERSION@ |
64 |
- Description: Augeas configuration editing library |
65 |
--Requires: |
66 |
-+Requires.private: libxml-2.0 |
67 |
- Libs: -L${libdir} -laugeas @LIBS@ |
68 |
- Cflags: -I${includedir} |
69 |
--- |
70 |
-1.7.6 |
71 |
- |
72 |
|
73 |
diff --git a/app-admin/augeas/files/augeas-0.10.0-test.patch b/app-admin/augeas/files/augeas-0.10.0-test.patch |
74 |
deleted file mode 100644 |
75 |
index e2630014f29..00000000000 |
76 |
--- a/app-admin/augeas/files/augeas-0.10.0-test.patch |
77 |
+++ /dev/null |
78 |
@@ -1,56 +0,0 @@ |
79 |
-From 075f8d35497fb36d9193e5364c055049c66fa5eb Mon Sep 17 00:00:00 2001 |
80 |
-From: Lubomir Rintel <lubo.rintel@××××××××.com> |
81 |
-Date: Mon, 9 Jan 2012 18:52:11 +0100 |
82 |
-Subject: [PATCH 1/2] Allow JSON number literals to be followed by whitespace |
83 |
- |
84 |
-Add a test case. |
85 |
- |
86 |
-Fixes https://fedorahosted.org/augeas/ticket/247 |
87 |
---- |
88 |
- AUTHORS | 1 + |
89 |
- lenses/json.aug | 2 +- |
90 |
- lenses/tests/test_json.aug | 3 +++ |
91 |
- 3 files changed, 5 insertions(+), 1 deletions(-) |
92 |
- |
93 |
-diff --git a/AUTHORS b/AUTHORS |
94 |
-index df63f95..e7870f2 100644 |
95 |
---- a/AUTHORS |
96 |
-+++ b/AUTHORS |
97 |
-@@ -44,6 +44,7 @@ Contributions by: |
98 |
- Bill Pemberton <wfp5p@××××××××.edu> |
99 |
- Alan Pevec <apevec@××××××.com> |
100 |
- Robin Lee Powell <rlpowell@××××××××××××××.org> |
101 |
-+ Lubomir Rintel <lubo.rintel@××××××××.com> |
102 |
- Roman Rakus <rrakus@××××××.com> |
103 |
- Satoru SATOH <satoru.satoh@×××××.com> |
104 |
- Nicolas Valcárcel Scerpella <nvalcarcel@××××××.com> |
105 |
-diff --git a/lenses/json.aug b/lenses/json.aug |
106 |
-index c22ad90..6ceab09 100644 |
107 |
---- a/lenses/json.aug |
108 |
-+++ b/lenses/json.aug |
109 |
-@@ -29,7 +29,7 @@ let str_store = |
110 |
- let q = del "\"" "\"" in |
111 |
- q . store /[^"]*/ . q . ws (* " Emacs, relax *) |
112 |
- |
113 |
--let number = [ label "number" . store /-?[0-9]+(\.[0-9]+)?([eE][+-]?[0-9]+)?/ ] |
114 |
-+let number = [ label "number" . store /-?[0-9]+(\.[0-9]+)?([eE][+-]?[0-9]+)?/ . ws ] |
115 |
- let str = [ label "string" . str_store ] |
116 |
- |
117 |
- let const (r:regexp) = [ label "const" . store r . ws ] |
118 |
-diff --git a/lenses/tests/test_json.aug b/lenses/tests/test_json.aug |
119 |
-index 0bcd25d..d8b7fa8 100644 |
120 |
---- a/lenses/tests/test_json.aug |
121 |
-+++ b/lenses/tests/test_json.aug |
122 |
-@@ -8,6 +8,9 @@ test lns get "true" = { "const" = "true" } |
123 |
- |
124 |
- test lns get "3.141" = { "number" = "3.141" } |
125 |
- |
126 |
-+test lns get "{ \"key\" : 666 }" = |
127 |
-+ { "dict" { "entry" = "key" { "number" = "666" } } } |
128 |
-+ |
129 |
- test lns get "[true, 0, \"yo\"]" = |
130 |
- { "array" { "const" = "true" } { "number" = "0" } { "string" = "yo" } } |
131 |
- |
132 |
--- |
133 |
-1.7.7.5 |
134 |
- |
135 |
|
136 |
diff --git a/app-admin/augeas/files/augeas-0.10.0-test2.patch b/app-admin/augeas/files/augeas-0.10.0-test2.patch |
137 |
deleted file mode 100644 |
138 |
index 743ccfdce1f..00000000000 |
139 |
--- a/app-admin/augeas/files/augeas-0.10.0-test2.patch |
140 |
+++ /dev/null |
141 |
@@ -1,49 +0,0 @@ |
142 |
-From 100a7b38222a63c6435a72b4974b55f39a28989e Mon Sep 17 00:00:00 2001 |
143 |
-From: Lubomir Rintel <lubo.rintel@××××××××.com> |
144 |
-Date: Mon, 9 Jan 2012 19:24:41 +0100 |
145 |
-Subject: [PATCH 2/2] Correctly parse empty object and arrays in JSON |
146 |
- |
147 |
-Add a test case. |
148 |
-Fix from David Lutterkort <lutter@××××××.com>. |
149 |
- |
150 |
-https://fedorahosted.org/augeas/ticket/248 |
151 |
---- |
152 |
- lenses/json.aug | 4 ++-- |
153 |
- lenses/tests/test_json.aug | 5 +++++ |
154 |
- 2 files changed, 7 insertions(+), 2 deletions(-) |
155 |
- |
156 |
-diff --git a/lenses/json.aug b/lenses/json.aug |
157 |
-index 6ceab09..2645806 100644 |
158 |
---- a/lenses/json.aug |
159 |
-+++ b/lenses/json.aug |
160 |
-@@ -37,9 +37,9 @@ let const (r:regexp) = [ label "const" . store r . ws ] |
161 |
- let value0 = str | number | const /true|false|null/ |
162 |
- |
163 |
- let fix_value (value:lens) = |
164 |
-- let array = [ label "array" . lbrack . Build.opt_list value comma . rbrack ] in |
165 |
-+ let array = [ label "array" . lbrack . (Build.opt_list value comma)? . rbrack ] in |
166 |
- let pair = [ label "entry" . str_store . colon . value ] in |
167 |
-- let obj = [ label "dict" . lbrace . Build.opt_list pair comma . rbrace ] in |
168 |
-+ let obj = [ label "dict" . lbrace . (Build.opt_list pair comma)? . rbrace ] in |
169 |
- (str | number | obj | array | const /true|false|null/) |
170 |
- |
171 |
- (* Typecheck finitely deep nesting *) |
172 |
-diff --git a/lenses/tests/test_json.aug b/lenses/tests/test_json.aug |
173 |
-index d8b7fa8..aec7d4c 100644 |
174 |
---- a/lenses/tests/test_json.aug |
175 |
-+++ b/lenses/tests/test_json.aug |
176 |
-@@ -30,6 +30,11 @@ test lns get "{ \"0\": true, \"1\":false }" = |
177 |
- test lns get "{\"menu\": \"entry one\"}" = |
178 |
- { "dict" { "entry" = "menu" { "string" = "entry one" } } } |
179 |
- |
180 |
-+test lns get "[ ]" = |
181 |
-+ { "array" } |
182 |
-+ |
183 |
-+test lns get "{}" = |
184 |
-+ { "dict" } |
185 |
- |
186 |
- let s = "{\"menu\": { |
187 |
- \"id\": \"file\", |
188 |
--- |
189 |
-1.7.7.5 |
190 |
- |
191 |
|
192 |
diff --git a/app-admin/augeas/files/cve-2017-7555.patch b/app-admin/augeas/files/cve-2017-7555.patch |
193 |
deleted file mode 100644 |
194 |
index aaacdc2674c..00000000000 |
195 |
--- a/app-admin/augeas/files/cve-2017-7555.patch |
196 |
+++ /dev/null |
197 |
@@ -1,159 +0,0 @@ |
198 |
-From 4cca923b732990bec0c699b2e69911c2221b2498 Mon Sep 17 00:00:00 2001 |
199 |
-From: David Lutterkort <lutter@××××××××.net> |
200 |
-Date: Fri, 4 Aug 2017 17:13:52 -0700 |
201 |
-Subject: [PATCH] * src/pathx.c (parse_name): correctly handle trailing |
202 |
- whitespace in names |
203 |
- |
204 |
-When a name ended in whitespace, we incorrectly assumed it was always ok to |
205 |
-trim that whitespace. That is not true if that whitespace is escaped, |
206 |
-i.e. if the path expression is something like '/x\ '. In that case, the |
207 |
-name really needs to be literally 'x ', i.e., we can not trim that |
208 |
-whitespace. |
209 |
- |
210 |
-The incorrect behavior led to turning '/x\ ' first into 'x\' and then, |
211 |
-because we assume that '\' is always followed by a character inside the |
212 |
-string, when we removed the escaping '\', we would read beyond the end of |
213 |
-the intermediate string result; if we were lucky, that would lead to a |
214 |
-crash, otherwise we'd continue with junk. |
215 |
- |
216 |
-We now make sure that escaped whitespace at the end of a string does not |
217 |
-get stripped, avoiding all these headaches. |
218 |
- |
219 |
-Fixes RHBZ https://bugzilla.redhat.com/show_bug.cgi?id=1475621 |
220 |
---- |
221 |
- src/pathx.c | 27 +++++++++++++++++++------ |
222 |
- tests/test-xpath.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ |
223 |
- 2 files changed, 80 insertions(+), 6 deletions(-) |
224 |
- |
225 |
-diff --git a/src/pathx.c b/src/pathx.c |
226 |
-index d292cb30..9a2f9c76 100644 |
227 |
---- a/src/pathx.c |
228 |
-+++ b/src/pathx.c |
229 |
-@@ -1710,6 +1710,16 @@ int pathx_escape_name(const char *in, char **out) { |
230 |
- return 0; |
231 |
- } |
232 |
- |
233 |
-+/* Return true if POS is preceded by an odd number of backslashes, i.e., if |
234 |
-+ * POS is escaped. Stop the search when we get to START */ |
235 |
-+static bool backslash_escaped(const char *pos, const char *start) { |
236 |
-+ bool result=false; |
237 |
-+ while (pos-- > start && *pos == '\\') { |
238 |
-+ result = !result; |
239 |
-+ } |
240 |
-+ return result; |
241 |
-+} |
242 |
-+ |
243 |
- /* |
244 |
- * NameNoWS ::= [^][|/\= \t\n] | \\. |
245 |
- * NameWS ::= [^][|/\=] | \\. |
246 |
-@@ -1719,11 +1729,14 @@ static char *parse_name(struct state *state) { |
247 |
- const char *s = state->pos; |
248 |
- char *result; |
249 |
- |
250 |
-+ /* Advance state->pos until it points to the first character that is |
251 |
-+ * not part of a name. */ |
252 |
- while (*state->pos != '\0' && strchr(name_follow, *state->pos) == NULL) { |
253 |
-- /* This is a hack: since we allow spaces in names, we need to avoid |
254 |
-- * gobbling up stuff that is in follow(Name), e.g. 'or' so that |
255 |
-- * things like [name1 or name2] still work. |
256 |
-- */ |
257 |
-+ /* Since we allow spaces in names, we need to avoid gobbling up |
258 |
-+ * stuff that is in follow(Name), e.g. 'or' so that things like |
259 |
-+ * [name1 or name2] still work. In other words, we'll parse 'x frob |
260 |
-+ * y' as one name, but for 'x or y', we consider 'x' a name in its |
261 |
-+ * own right. */ |
262 |
- if (STREQLEN(state->pos, " or ", strlen(" or ")) || |
263 |
- STREQLEN(state->pos, " and ", strlen(" and "))) |
264 |
- break; |
265 |
-@@ -1738,10 +1751,12 @@ static char *parse_name(struct state *state) { |
266 |
- state->pos += 1; |
267 |
- } |
268 |
- |
269 |
-- /* Strip trailing white space */ |
270 |
-+ /* Strip trailing white space. Make sure we respect escaped whitespace |
271 |
-+ * and don't strip it as in "x\\ " */ |
272 |
- if (state->pos > s) { |
273 |
- state->pos -= 1; |
274 |
-- while (isspace(*state->pos) && state->pos >= s) |
275 |
-+ while (isspace(*state->pos) && state->pos > s |
276 |
-+ && !backslash_escaped(state->pos, s)) |
277 |
- state->pos -= 1; |
278 |
- state->pos += 1; |
279 |
- } |
280 |
-diff --git a/tests/test-xpath.c b/tests/test-xpath.c |
281 |
-index 3e418e5f..82986474 100644 |
282 |
---- a/tests/test-xpath.c |
283 |
-+++ b/tests/test-xpath.c |
284 |
-@@ -355,6 +355,62 @@ static int test_wrong_regexp_flag(struct augeas *aug) { |
285 |
- return -1; |
286 |
- } |
287 |
- |
288 |
-+static int test_trailing_ws_in_name(struct augeas *aug) { |
289 |
-+ int r; |
290 |
-+ |
291 |
-+ printf("%-30s ... ", "trailing_ws_in_name"); |
292 |
-+ |
293 |
-+ /* We used to incorrectly lop escaped whitespace off the end of a |
294 |
-+ * name. Make sure that we really create a tree node with label 'x ' |
295 |
-+ * with the below set, and look for it in a number of ways to ensure we |
296 |
-+ * are not lopping off trailing whitespace. */ |
297 |
-+ r = aug_set(aug, "/ws\\ ", "1"); |
298 |
-+ if (r < 0) { |
299 |
-+ fprintf(stderr, "failed to set '/ws ': %d\n", r); |
300 |
-+ goto fail; |
301 |
-+ } |
302 |
-+ /* We did not create a node with label 'ws' */ |
303 |
-+ r = aug_get(aug, "/ws", NULL); |
304 |
-+ if (r != 0) { |
305 |
-+ fprintf(stderr, "created '/ws' instead: %d\n", r); |
306 |
-+ goto fail; |
307 |
-+ } |
308 |
-+ |
309 |
-+ /* We did not create a node with label 'ws\t' (this also checks that we |
310 |
-+ * don't create something like 'ws\\' by dropping the last whitespace |
311 |
-+ * character. */ |
312 |
-+ r = aug_get(aug, "/ws\\\t", NULL); |
313 |
-+ if (r != 0) { |
314 |
-+ fprintf(stderr, "found '/ws\\t': %d\n", r); |
315 |
-+ goto fail; |
316 |
-+ } |
317 |
-+ |
318 |
-+ /* But we did create 'ws ' */ |
319 |
-+ r = aug_get(aug, "/ws\\ ", NULL); |
320 |
-+ if (r != 1) { |
321 |
-+ fprintf(stderr, "could not find '/ws ': %d\n", r); |
322 |
-+ goto fail; |
323 |
-+ } |
324 |
-+ |
325 |
-+ /* If the whitespace is preceded by an even number of '\\' chars, |
326 |
-+ * whitespace must be stripped */ |
327 |
-+ r = aug_set(aug, "/nows\\\\ ", "1"); |
328 |
-+ if (r < 0) { |
329 |
-+ fprintf(stderr, "set of '/nows' failed: %d\n", r); |
330 |
-+ goto fail; |
331 |
-+ } |
332 |
-+ r = aug_get(aug, "/nows\\\\", NULL); |
333 |
-+ if (r != 1) { |
334 |
-+ fprintf(stderr, "could not get '/nows\\'\n"); |
335 |
-+ goto fail; |
336 |
-+ } |
337 |
-+ printf("PASS\n"); |
338 |
-+ return 0; |
339 |
-+ fail: |
340 |
-+ printf("FAIL\n"); |
341 |
-+ return -1; |
342 |
-+} |
343 |
-+ |
344 |
- static int run_tests(struct test *tests, int argc, char **argv) { |
345 |
- char *lensdir; |
346 |
- struct augeas *aug = NULL; |
347 |
-@@ -398,6 +454,9 @@ static int run_tests(struct test *tests, int argc, char **argv) { |
348 |
- |
349 |
- if (test_wrong_regexp_flag(aug) < 0) |
350 |
- result = EXIT_FAILURE; |
351 |
-+ |
352 |
-+ if (test_trailing_ws_in_name(aug) < 0) |
353 |
-+ result = EXIT_FAILURE; |
354 |
- } |
355 |
- aug_close(aug); |
356 |
- free(lensdir); |
357 |
|
358 |
diff --git a/app-admin/augeas/files/cve-bunch-of-them-symlink.patch b/app-admin/augeas/files/cve-bunch-of-them-symlink.patch |
359 |
deleted file mode 100644 |
360 |
index 3bd1d95ae42..00000000000 |
361 |
--- a/app-admin/augeas/files/cve-bunch-of-them-symlink.patch |
362 |
+++ /dev/null |
363 |
@@ -1,76 +0,0 @@ |
364 |
-From 051c73a9a7ffe9e525f6f0a1b8f5198ff8cc6752 Mon Sep 17 00:00:00 2001 |
365 |
-From: Dominic Cleal <dcleal@××××××.com> |
366 |
-Date: Sat, 11 Aug 2012 20:39:14 +0100 |
367 |
-Subject: [PATCH] Fix regression in permissions of created files |
368 |
- |
369 |
-Commit 16387744 changed temporary file creation to use mkstemp, resulting in |
370 |
-new files being created with 0600 permissions. For brand new files created |
371 |
-through Augeas, their permissions stayed at 0600 rather than being set by the |
372 |
-umask as before. |
373 |
- |
374 |
- * src/transform.c (transform_save): chmod after creating new files to |
375 |
- permissions implied by the umask |
376 |
---- |
377 |
- src/transform.c | 10 ++++++++++ |
378 |
- tests/test-preserve.sh | 15 ++++++++++++++- |
379 |
- 2 files changed, 24 insertions(+), 1 deletion(-) |
380 |
- |
381 |
-diff --git a/src/transform.c b/src/transform.c |
382 |
-index a3acd10..1ca3d5f 100644 |
383 |
---- a/src/transform.c |
384 |
-+++ b/src/transform.c |
385 |
-@@ -1096,6 +1096,16 @@ int transform_save(struct augeas *aug, struct tree *xfm, |
386 |
- err_status = "xfer_attrs"; |
387 |
- goto done; |
388 |
- } |
389 |
-+ } else { |
390 |
-+ /* Since mkstemp is used, the temp file will have secure permissions |
391 |
-+ * instead of those implied by umask, so change them for new files */ |
392 |
-+ mode_t curumsk = umask(022); |
393 |
-+ umask(curumsk); |
394 |
-+ |
395 |
-+ if (fchmod(fileno(fp), 0666 - curumsk) < 0) { |
396 |
-+ err_status = "create_chmod"; |
397 |
-+ return -1; |
398 |
-+ } |
399 |
- } |
400 |
- |
401 |
- if (tree != NULL) |
402 |
-diff --git a/tests/test-preserve.sh b/tests/test-preserve.sh |
403 |
-index 042dab9..9719ac6 100755 |
404 |
---- a/tests/test-preserve.sh |
405 |
-+++ b/tests/test-preserve.sh |
406 |
-@@ -59,9 +59,12 @@ if [ $selinux = yes -a xetc_t != "x$act_con" ] ; then |
407 |
- exit 1 |
408 |
- fi |
409 |
- |
410 |
--# Check that we create new files without error |
411 |
-+# Check that we create new files without error and with permissions implied |
412 |
-+# from the umask |
413 |
- init_dirs |
414 |
- |
415 |
-+oldumask=$(umask) |
416 |
-+umask 0002 |
417 |
- $AUGTOOL > /dev/null <<EOF |
418 |
- set /files/etc/hosts/1/ipaddr 127.0.0.1 |
419 |
- set /files/etc/hosts/1/canonical host.example.com |
420 |
-@@ -71,6 +74,16 @@ if [ $? != 0 ] ; then |
421 |
- echo "augtool failed on new file" |
422 |
- exit 1 |
423 |
- fi |
424 |
-+if [ ! -e $hosts ]; then |
425 |
-+ echo "augtool didn't create new /etc/hosts file" |
426 |
-+ exit 1 |
427 |
-+fi |
428 |
-+act_mode=$(ls -l $hosts | cut -b 1-10) |
429 |
-+if [ x-rw-rw-r-- != "x$act_mode" ] ; then |
430 |
-+ echo "Expected mode 0664 due to $(umask) umask but got $act_mode" |
431 |
-+ exit 1 |
432 |
-+fi |
433 |
-+umask $oldumask |
434 |
- |
435 |
- # Check that we create new files without error when backups are requested |
436 |
- init_dirs |
437 |
--- |
438 |
-1.8.5.1 |
439 |
- |