1 |
commit: acb3484ecb0666df97cbe6c0f35c3f260cbeb738 |
2 |
Author: Hans de Graaff <graaff <AT> gentoo <DOT> org> |
3 |
AuthorDate: Tue May 5 08:04:59 2020 +0000 |
4 |
Commit: Hans de Graaff <graaff <AT> gentoo <DOT> org> |
5 |
CommitDate: Tue May 5 08:05:53 2020 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=acb3484e |
7 |
|
8 |
profiles/package.mask: remove obsolete mask |
9 |
|
10 |
All masked packages and slots have been removed. |
11 |
|
12 |
Signed-off-by: Hans de Graaff <graaff <AT> gentoo.org> |
13 |
|
14 |
profiles/package.mask | 51 --------------------------------------------------- |
15 |
1 file changed, 51 deletions(-) |
16 |
|
17 |
diff --git a/profiles/package.mask b/profiles/package.mask |
18 |
index dd489cb26ea..9cf7b3b3f99 100644 |
19 |
--- a/profiles/package.mask |
20 |
+++ b/profiles/package.mask |
21 |
@@ -738,57 +738,6 @@ app-antivirus/clamav-unofficial-sigs |
22 |
# Masked for removal in 30 days, bug #715226 |
23 |
media-fonts/symbola |
24 |
|
25 |
-# Hans de Graaff <graaff@g.o> (2020-03-29) |
26 |
-# Old ruby24-only rails version that is no longer supported upstream |
27 |
-# and has known security issues, including dependencies and slots |
28 |
-# specific to Rails 4.2. |
29 |
-# Migrate to Rails 5.2. |
30 |
-# Masked for removal in 30 days. |
31 |
-dev-ruby/rails:4.2 |
32 |
-dev-ruby/railties:4.2 |
33 |
-dev-ruby/activerecord:4.2 |
34 |
-dev-ruby/actionmailer:4.2 |
35 |
-dev-ruby/actionpack:4.2 |
36 |
-dev-ruby/actionview:4.2 |
37 |
-dev-ruby/activejob:4.2 |
38 |
-dev-ruby/activemodel:4.2 |
39 |
-dev-ruby/activesupport:4.2 |
40 |
-dev-ruby/arel:6.0 |
41 |
-dev-ruby/actionpack-xml_parser:0 |
42 |
-dev-ruby/jquery-rails:3 |
43 |
-dev-ruby/postgres_ext |
44 |
-dev-ruby/protected_attributes |
45 |
-dev-ruby/rails-dom-testing:1 |
46 |
-dev-ruby/web-console:0 |
47 |
-# Metasploit is a reverse dependency on Rails 4.2 Upstream shows no |
48 |
-# sign of moving to a supported Rails version. Metasploit will most |
49 |
-# likely be moved to an overlay. |
50 |
-dev-ruby/metasploit-concern |
51 |
-dev-ruby/metasploit-credential |
52 |
-dev-ruby/metasploit-payloads |
53 |
-dev-ruby/metasploit_payloads-mettle |
54 |
-dev-ruby/metasploit-model |
55 |
-dev-ruby/metasploit_data_models |
56 |
-net-analyzer/metasploit |
57 |
-dev-ruby/rex-arch |
58 |
-dev-ruby/rex-bin_tools |
59 |
-dev-ruby/rex-core |
60 |
-dev-ruby/rex-encoder |
61 |
-dev-ruby/rex-exploitation |
62 |
-dev-ruby/rex-java |
63 |
-dev-ruby/rex-mime |
64 |
-dev-ruby/rex-nop |
65 |
-dev-ruby/rex-ole |
66 |
-dev-ruby/rex-powershell |
67 |
-dev-ruby/rex-random_identifier |
68 |
-dev-ruby/rex-registry |
69 |
-dev-ruby/rex-rop_builder |
70 |
-dev-ruby/rex-socket |
71 |
-dev-ruby/rex-sslscan |
72 |
-dev-ruby/rex-struct2 |
73 |
-dev-ruby/rex-text |
74 |
-dev-ruby/rex-zip |
75 |
- |
76 |
# Michał Górny <mgorny@g.o> (2020-03-29) |
77 |
# Unmaintained, seriously outdated, vulnerable. Multiple bugs reported. |
78 |
# Stuck on Python 3.6. |