Gentoo Archives: gentoo-commits

From: Matt Thode <prometheanfire@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: app-admin/augeas/files/
Date: Fri, 20 Oct 2017 00:59:50
Message-Id: 1508461167.08b2970ce9b83a6e149bf69ae64c19763e941145.prometheanfire@gentoo
1 commit: 08b2970ce9b83a6e149bf69ae64c19763e941145
2 Author: Matthew Thode <prometheanfire <AT> gentoo <DOT> org>
3 AuthorDate: Fri Oct 20 00:59:27 2017 +0000
4 Commit: Matt Thode <prometheanfire <AT> gentoo <DOT> org>
5 CommitDate: Fri Oct 20 00:59:27 2017 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=08b2970c
7
8 app-admin/augeas: cleaning up unused patches for pr:5967
9
10 Package-Manager: Portage-2.3.8, Repoman-2.3.3
11
12 app-admin/augeas/files/augeas-0.10.0-gets.patch | 15 --
13 .../files/augeas-0.10.0-libxml2-pkgconfig.patch | 24 ----
14 app-admin/augeas/files/augeas-0.10.0-test.patch | 56 --------
15 app-admin/augeas/files/augeas-0.10.0-test2.patch | 49 -------
16 app-admin/augeas/files/cve-2017-7555.patch | 159 ---------------------
17 .../augeas/files/cve-bunch-of-them-symlink.patch | 76 ----------
18 6 files changed, 379 deletions(-)
19
20 diff --git a/app-admin/augeas/files/augeas-0.10.0-gets.patch b/app-admin/augeas/files/augeas-0.10.0-gets.patch
21 deleted file mode 100644
22 index 5f754955be6..00000000000
23 --- a/app-admin/augeas/files/augeas-0.10.0-gets.patch
24 +++ /dev/null
25 @@ -1,15 +0,0 @@
26 - gnulib/lib/stdio.in.h | 1 -
27 - 1 file changed, 1 deletion(-)
28 -
29 -diff --git a/gnulib/lib/stdio.in.h b/gnulib/lib/stdio.in.h
30 -index 9091497..fa7e3fb 100644
31 ---- a/gnulib/lib/stdio.in.h
32 -+++ b/gnulib/lib/stdio.in.h
33 -@@ -162,7 +162,6 @@ _GL_WARN_ON_USE (fflush, "fflush is not always POSIX compliant - "
34 - so any use of gets warrants an unconditional warning. Assume it is
35 - always declared, since it is required by C89. */
36 - #undef gets
37 --_GL_WARN_ON_USE (gets, "gets is a security hole - use fgets instead");
38 -
39 - #if @GNULIB_FOPEN@
40 - # if @REPLACE_FOPEN@
41
42 diff --git a/app-admin/augeas/files/augeas-0.10.0-libxml2-pkgconfig.patch b/app-admin/augeas/files/augeas-0.10.0-libxml2-pkgconfig.patch
43 deleted file mode 100644
44 index aaa41867015..00000000000
45 --- a/app-admin/augeas/files/augeas-0.10.0-libxml2-pkgconfig.patch
46 +++ /dev/null
47 @@ -1,24 +0,0 @@
48 -From b41deef293841da50a236023bad486ea3f57e4dc Mon Sep 17 00:00:00 2001
49 -From: "Richard W.M. Jones" <rjones@××××××.com>
50 -Date: Sat, 3 Dec 2011 14:21:50 +0000
51 -Subject: [PATCH] pkg-config: Augeas requires libxml2.
52 -
53 ----
54 - augeas.pc.in | 2 +-
55 - 1 files changed, 1 insertions(+), 1 deletions(-)
56 -
57 -diff --git a/augeas.pc.in b/augeas.pc.in
58 -index c97847d..9e166db 100644
59 ---- a/augeas.pc.in
60 -+++ b/augeas.pc.in
61 -@@ -6,6 +6,6 @@ includedir=@includedir@
62 - Name: augeas
63 - Version: @VERSION@
64 - Description: Augeas configuration editing library
65 --Requires:
66 -+Requires.private: libxml-2.0
67 - Libs: -L${libdir} -laugeas @LIBS@
68 - Cflags: -I${includedir}
69 ---
70 -1.7.6
71 -
72
73 diff --git a/app-admin/augeas/files/augeas-0.10.0-test.patch b/app-admin/augeas/files/augeas-0.10.0-test.patch
74 deleted file mode 100644
75 index e2630014f29..00000000000
76 --- a/app-admin/augeas/files/augeas-0.10.0-test.patch
77 +++ /dev/null
78 @@ -1,56 +0,0 @@
79 -From 075f8d35497fb36d9193e5364c055049c66fa5eb Mon Sep 17 00:00:00 2001
80 -From: Lubomir Rintel <lubo.rintel@××××××××.com>
81 -Date: Mon, 9 Jan 2012 18:52:11 +0100
82 -Subject: [PATCH 1/2] Allow JSON number literals to be followed by whitespace
83 -
84 -Add a test case.
85 -
86 -Fixes https://fedorahosted.org/augeas/ticket/247
87 ----
88 - AUTHORS | 1 +
89 - lenses/json.aug | 2 +-
90 - lenses/tests/test_json.aug | 3 +++
91 - 3 files changed, 5 insertions(+), 1 deletions(-)
92 -
93 -diff --git a/AUTHORS b/AUTHORS
94 -index df63f95..e7870f2 100644
95 ---- a/AUTHORS
96 -+++ b/AUTHORS
97 -@@ -44,6 +44,7 @@ Contributions by:
98 - Bill Pemberton <wfp5p@××××××××.edu>
99 - Alan Pevec <apevec@××××××.com>
100 - Robin Lee Powell <rlpowell@××××××××××××××.org>
101 -+ Lubomir Rintel <lubo.rintel@××××××××.com>
102 - Roman Rakus <rrakus@××××××.com>
103 - Satoru SATOH <satoru.satoh@×××××.com>
104 - Nicolas Valcárcel Scerpella <nvalcarcel@××××××.com>
105 -diff --git a/lenses/json.aug b/lenses/json.aug
106 -index c22ad90..6ceab09 100644
107 ---- a/lenses/json.aug
108 -+++ b/lenses/json.aug
109 -@@ -29,7 +29,7 @@ let str_store =
110 - let q = del "\"" "\"" in
111 - q . store /[^"]*/ . q . ws (* " Emacs, relax *)
112 -
113 --let number = [ label "number" . store /-?[0-9]+(\.[0-9]+)?([eE][+-]?[0-9]+)?/ ]
114 -+let number = [ label "number" . store /-?[0-9]+(\.[0-9]+)?([eE][+-]?[0-9]+)?/ . ws ]
115 - let str = [ label "string" . str_store ]
116 -
117 - let const (r:regexp) = [ label "const" . store r . ws ]
118 -diff --git a/lenses/tests/test_json.aug b/lenses/tests/test_json.aug
119 -index 0bcd25d..d8b7fa8 100644
120 ---- a/lenses/tests/test_json.aug
121 -+++ b/lenses/tests/test_json.aug
122 -@@ -8,6 +8,9 @@ test lns get "true" = { "const" = "true" }
123 -
124 - test lns get "3.141" = { "number" = "3.141" }
125 -
126 -+test lns get "{ \"key\" : 666 }" =
127 -+ { "dict" { "entry" = "key" { "number" = "666" } } }
128 -+
129 - test lns get "[true, 0, \"yo\"]" =
130 - { "array" { "const" = "true" } { "number" = "0" } { "string" = "yo" } }
131 -
132 ---
133 -1.7.7.5
134 -
135
136 diff --git a/app-admin/augeas/files/augeas-0.10.0-test2.patch b/app-admin/augeas/files/augeas-0.10.0-test2.patch
137 deleted file mode 100644
138 index 743ccfdce1f..00000000000
139 --- a/app-admin/augeas/files/augeas-0.10.0-test2.patch
140 +++ /dev/null
141 @@ -1,49 +0,0 @@
142 -From 100a7b38222a63c6435a72b4974b55f39a28989e Mon Sep 17 00:00:00 2001
143 -From: Lubomir Rintel <lubo.rintel@××××××××.com>
144 -Date: Mon, 9 Jan 2012 19:24:41 +0100
145 -Subject: [PATCH 2/2] Correctly parse empty object and arrays in JSON
146 -
147 -Add a test case.
148 -Fix from David Lutterkort <lutter@××××××.com>.
149 -
150 -https://fedorahosted.org/augeas/ticket/248
151 ----
152 - lenses/json.aug | 4 ++--
153 - lenses/tests/test_json.aug | 5 +++++
154 - 2 files changed, 7 insertions(+), 2 deletions(-)
155 -
156 -diff --git a/lenses/json.aug b/lenses/json.aug
157 -index 6ceab09..2645806 100644
158 ---- a/lenses/json.aug
159 -+++ b/lenses/json.aug
160 -@@ -37,9 +37,9 @@ let const (r:regexp) = [ label "const" . store r . ws ]
161 - let value0 = str | number | const /true|false|null/
162 -
163 - let fix_value (value:lens) =
164 -- let array = [ label "array" . lbrack . Build.opt_list value comma . rbrack ] in
165 -+ let array = [ label "array" . lbrack . (Build.opt_list value comma)? . rbrack ] in
166 - let pair = [ label "entry" . str_store . colon . value ] in
167 -- let obj = [ label "dict" . lbrace . Build.opt_list pair comma . rbrace ] in
168 -+ let obj = [ label "dict" . lbrace . (Build.opt_list pair comma)? . rbrace ] in
169 - (str | number | obj | array | const /true|false|null/)
170 -
171 - (* Typecheck finitely deep nesting *)
172 -diff --git a/lenses/tests/test_json.aug b/lenses/tests/test_json.aug
173 -index d8b7fa8..aec7d4c 100644
174 ---- a/lenses/tests/test_json.aug
175 -+++ b/lenses/tests/test_json.aug
176 -@@ -30,6 +30,11 @@ test lns get "{ \"0\": true, \"1\":false }" =
177 - test lns get "{\"menu\": \"entry one\"}" =
178 - { "dict" { "entry" = "menu" { "string" = "entry one" } } }
179 -
180 -+test lns get "[ ]" =
181 -+ { "array" }
182 -+
183 -+test lns get "{}" =
184 -+ { "dict" }
185 -
186 - let s = "{\"menu\": {
187 - \"id\": \"file\",
188 ---
189 -1.7.7.5
190 -
191
192 diff --git a/app-admin/augeas/files/cve-2017-7555.patch b/app-admin/augeas/files/cve-2017-7555.patch
193 deleted file mode 100644
194 index aaacdc2674c..00000000000
195 --- a/app-admin/augeas/files/cve-2017-7555.patch
196 +++ /dev/null
197 @@ -1,159 +0,0 @@
198 -From 4cca923b732990bec0c699b2e69911c2221b2498 Mon Sep 17 00:00:00 2001
199 -From: David Lutterkort <lutter@××××××××.net>
200 -Date: Fri, 4 Aug 2017 17:13:52 -0700
201 -Subject: [PATCH] * src/pathx.c (parse_name): correctly handle trailing
202 - whitespace in names
203 -
204 -When a name ended in whitespace, we incorrectly assumed it was always ok to
205 -trim that whitespace. That is not true if that whitespace is escaped,
206 -i.e. if the path expression is something like '/x\ '. In that case, the
207 -name really needs to be literally 'x ', i.e., we can not trim that
208 -whitespace.
209 -
210 -The incorrect behavior led to turning '/x\ ' first into 'x\' and then,
211 -because we assume that '\' is always followed by a character inside the
212 -string, when we removed the escaping '\', we would read beyond the end of
213 -the intermediate string result; if we were lucky, that would lead to a
214 -crash, otherwise we'd continue with junk.
215 -
216 -We now make sure that escaped whitespace at the end of a string does not
217 -get stripped, avoiding all these headaches.
218 -
219 -Fixes RHBZ https://bugzilla.redhat.com/show_bug.cgi?id=1475621
220 ----
221 - src/pathx.c | 27 +++++++++++++++++++------
222 - tests/test-xpath.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
223 - 2 files changed, 80 insertions(+), 6 deletions(-)
224 -
225 -diff --git a/src/pathx.c b/src/pathx.c
226 -index d292cb30..9a2f9c76 100644
227 ---- a/src/pathx.c
228 -+++ b/src/pathx.c
229 -@@ -1710,6 +1710,16 @@ int pathx_escape_name(const char *in, char **out) {
230 - return 0;
231 - }
232 -
233 -+/* Return true if POS is preceded by an odd number of backslashes, i.e., if
234 -+ * POS is escaped. Stop the search when we get to START */
235 -+static bool backslash_escaped(const char *pos, const char *start) {
236 -+ bool result=false;
237 -+ while (pos-- > start && *pos == '\\') {
238 -+ result = !result;
239 -+ }
240 -+ return result;
241 -+}
242 -+
243 - /*
244 - * NameNoWS ::= [^][|/\= \t\n] | \\.
245 - * NameWS ::= [^][|/\=] | \\.
246 -@@ -1719,11 +1729,14 @@ static char *parse_name(struct state *state) {
247 - const char *s = state->pos;
248 - char *result;
249 -
250 -+ /* Advance state->pos until it points to the first character that is
251 -+ * not part of a name. */
252 - while (*state->pos != '\0' && strchr(name_follow, *state->pos) == NULL) {
253 -- /* This is a hack: since we allow spaces in names, we need to avoid
254 -- * gobbling up stuff that is in follow(Name), e.g. 'or' so that
255 -- * things like [name1 or name2] still work.
256 -- */
257 -+ /* Since we allow spaces in names, we need to avoid gobbling up
258 -+ * stuff that is in follow(Name), e.g. 'or' so that things like
259 -+ * [name1 or name2] still work. In other words, we'll parse 'x frob
260 -+ * y' as one name, but for 'x or y', we consider 'x' a name in its
261 -+ * own right. */
262 - if (STREQLEN(state->pos, " or ", strlen(" or ")) ||
263 - STREQLEN(state->pos, " and ", strlen(" and ")))
264 - break;
265 -@@ -1738,10 +1751,12 @@ static char *parse_name(struct state *state) {
266 - state->pos += 1;
267 - }
268 -
269 -- /* Strip trailing white space */
270 -+ /* Strip trailing white space. Make sure we respect escaped whitespace
271 -+ * and don't strip it as in "x\\ " */
272 - if (state->pos > s) {
273 - state->pos -= 1;
274 -- while (isspace(*state->pos) && state->pos >= s)
275 -+ while (isspace(*state->pos) && state->pos > s
276 -+ && !backslash_escaped(state->pos, s))
277 - state->pos -= 1;
278 - state->pos += 1;
279 - }
280 -diff --git a/tests/test-xpath.c b/tests/test-xpath.c
281 -index 3e418e5f..82986474 100644
282 ---- a/tests/test-xpath.c
283 -+++ b/tests/test-xpath.c
284 -@@ -355,6 +355,62 @@ static int test_wrong_regexp_flag(struct augeas *aug) {
285 - return -1;
286 - }
287 -
288 -+static int test_trailing_ws_in_name(struct augeas *aug) {
289 -+ int r;
290 -+
291 -+ printf("%-30s ... ", "trailing_ws_in_name");
292 -+
293 -+ /* We used to incorrectly lop escaped whitespace off the end of a
294 -+ * name. Make sure that we really create a tree node with label 'x '
295 -+ * with the below set, and look for it in a number of ways to ensure we
296 -+ * are not lopping off trailing whitespace. */
297 -+ r = aug_set(aug, "/ws\\ ", "1");
298 -+ if (r < 0) {
299 -+ fprintf(stderr, "failed to set '/ws ': %d\n", r);
300 -+ goto fail;
301 -+ }
302 -+ /* We did not create a node with label 'ws' */
303 -+ r = aug_get(aug, "/ws", NULL);
304 -+ if (r != 0) {
305 -+ fprintf(stderr, "created '/ws' instead: %d\n", r);
306 -+ goto fail;
307 -+ }
308 -+
309 -+ /* We did not create a node with label 'ws\t' (this also checks that we
310 -+ * don't create something like 'ws\\' by dropping the last whitespace
311 -+ * character. */
312 -+ r = aug_get(aug, "/ws\\\t", NULL);
313 -+ if (r != 0) {
314 -+ fprintf(stderr, "found '/ws\\t': %d\n", r);
315 -+ goto fail;
316 -+ }
317 -+
318 -+ /* But we did create 'ws ' */
319 -+ r = aug_get(aug, "/ws\\ ", NULL);
320 -+ if (r != 1) {
321 -+ fprintf(stderr, "could not find '/ws ': %d\n", r);
322 -+ goto fail;
323 -+ }
324 -+
325 -+ /* If the whitespace is preceded by an even number of '\\' chars,
326 -+ * whitespace must be stripped */
327 -+ r = aug_set(aug, "/nows\\\\ ", "1");
328 -+ if (r < 0) {
329 -+ fprintf(stderr, "set of '/nows' failed: %d\n", r);
330 -+ goto fail;
331 -+ }
332 -+ r = aug_get(aug, "/nows\\\\", NULL);
333 -+ if (r != 1) {
334 -+ fprintf(stderr, "could not get '/nows\\'\n");
335 -+ goto fail;
336 -+ }
337 -+ printf("PASS\n");
338 -+ return 0;
339 -+ fail:
340 -+ printf("FAIL\n");
341 -+ return -1;
342 -+}
343 -+
344 - static int run_tests(struct test *tests, int argc, char **argv) {
345 - char *lensdir;
346 - struct augeas *aug = NULL;
347 -@@ -398,6 +454,9 @@ static int run_tests(struct test *tests, int argc, char **argv) {
348 -
349 - if (test_wrong_regexp_flag(aug) < 0)
350 - result = EXIT_FAILURE;
351 -+
352 -+ if (test_trailing_ws_in_name(aug) < 0)
353 -+ result = EXIT_FAILURE;
354 - }
355 - aug_close(aug);
356 - free(lensdir);
357
358 diff --git a/app-admin/augeas/files/cve-bunch-of-them-symlink.patch b/app-admin/augeas/files/cve-bunch-of-them-symlink.patch
359 deleted file mode 100644
360 index 3bd1d95ae42..00000000000
361 --- a/app-admin/augeas/files/cve-bunch-of-them-symlink.patch
362 +++ /dev/null
363 @@ -1,76 +0,0 @@
364 -From 051c73a9a7ffe9e525f6f0a1b8f5198ff8cc6752 Mon Sep 17 00:00:00 2001
365 -From: Dominic Cleal <dcleal@××××××.com>
366 -Date: Sat, 11 Aug 2012 20:39:14 +0100
367 -Subject: [PATCH] Fix regression in permissions of created files
368 -
369 -Commit 16387744 changed temporary file creation to use mkstemp, resulting in
370 -new files being created with 0600 permissions. For brand new files created
371 -through Augeas, their permissions stayed at 0600 rather than being set by the
372 -umask as before.
373 -
374 - * src/transform.c (transform_save): chmod after creating new files to
375 - permissions implied by the umask
376 ----
377 - src/transform.c | 10 ++++++++++
378 - tests/test-preserve.sh | 15 ++++++++++++++-
379 - 2 files changed, 24 insertions(+), 1 deletion(-)
380 -
381 -diff --git a/src/transform.c b/src/transform.c
382 -index a3acd10..1ca3d5f 100644
383 ---- a/src/transform.c
384 -+++ b/src/transform.c
385 -@@ -1096,6 +1096,16 @@ int transform_save(struct augeas *aug, struct tree *xfm,
386 - err_status = "xfer_attrs";
387 - goto done;
388 - }
389 -+ } else {
390 -+ /* Since mkstemp is used, the temp file will have secure permissions
391 -+ * instead of those implied by umask, so change them for new files */
392 -+ mode_t curumsk = umask(022);
393 -+ umask(curumsk);
394 -+
395 -+ if (fchmod(fileno(fp), 0666 - curumsk) < 0) {
396 -+ err_status = "create_chmod";
397 -+ return -1;
398 -+ }
399 - }
400 -
401 - if (tree != NULL)
402 -diff --git a/tests/test-preserve.sh b/tests/test-preserve.sh
403 -index 042dab9..9719ac6 100755
404 ---- a/tests/test-preserve.sh
405 -+++ b/tests/test-preserve.sh
406 -@@ -59,9 +59,12 @@ if [ $selinux = yes -a xetc_t != "x$act_con" ] ; then
407 - exit 1
408 - fi
409 -
410 --# Check that we create new files without error
411 -+# Check that we create new files without error and with permissions implied
412 -+# from the umask
413 - init_dirs
414 -
415 -+oldumask=$(umask)
416 -+umask 0002
417 - $AUGTOOL > /dev/null <<EOF
418 - set /files/etc/hosts/1/ipaddr 127.0.0.1
419 - set /files/etc/hosts/1/canonical host.example.com
420 -@@ -71,6 +74,16 @@ if [ $? != 0 ] ; then
421 - echo "augtool failed on new file"
422 - exit 1
423 - fi
424 -+if [ ! -e $hosts ]; then
425 -+ echo "augtool didn't create new /etc/hosts file"
426 -+ exit 1
427 -+fi
428 -+act_mode=$(ls -l $hosts | cut -b 1-10)
429 -+if [ x-rw-rw-r-- != "x$act_mode" ] ; then
430 -+ echo "Expected mode 0664 due to $(umask) umask but got $act_mode"
431 -+ exit 1
432 -+fi
433 -+umask $oldumask
434 -
435 - # Check that we create new files without error when backups are requested
436 - init_dirs
437 ---
438 -1.8.5.1
439 -