Gentoo Archives: gentoo-commits

From: Hans de Graaff <graaff@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: profiles/
Date: Sun, 29 Mar 2020 17:37:54
Message-Id: 1585503293.e8aafec1405e01bf54cad2225f7b9ba156413454.graaff@gentoo
1 commit: e8aafec1405e01bf54cad2225f7b9ba156413454
2 Author: Hans de Graaff <graaff <AT> gentoo <DOT> org>
3 AuthorDate: Sun Mar 29 07:48:07 2020 +0000
4 Commit: Hans de Graaff <graaff <AT> gentoo <DOT> org>
5 CommitDate: Sun Mar 29 17:34:53 2020 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e8aafec1
7
8 profiles/package.mask: mask dev-ruby/rails:4.2 for removal
9
10 Signed-off-by: Hans de Graaff <graaff <AT> gentoo.org>
11
12 profiles/package.mask | 49 +++++++++++++++++++++++++++++++++++++++++++++++++
13 1 file changed, 49 insertions(+)
14
15 diff --git a/profiles/package.mask b/profiles/package.mask
16 index e7f74217a76..d747e966717 100644
17 --- a/profiles/package.mask
18 +++ b/profiles/package.mask
19 @@ -32,6 +32,55 @@
20
21 #--- END OF EXAMPLES ---
22
23 +# Hans de Graaff <graaff@g.o> (2020-03-29)
24 +# Old ruby24-only rails version that is no longer supported upstream
25 +# and has known security issues, including dependencies and slots
26 +# specific to Rails 4.2.
27 +# Migrate to Rails 5.2.
28 +# Masked for removal in 30 days.
29 +dev-ruby/rails:4.2
30 +dev-ruby/railties:4.2
31 +dev-ruby/activerecord:4.2
32 +dev-ruby/actionmailer:4.2
33 +dev-ruby/actionpack:4.2
34 +dev-ruby/actionview:4.2
35 +dev-ruby/activejob:4.2
36 +dev-ruby/activemodel:4.2
37 +dev-ruby/activesupport:4.2
38 +dev-ruby/arel:6.0
39 +dev-ruby/actionpack-xml_parser:0
40 +dev-ruby/jquery-rails:3
41 +dev-ruby/postgres_ext
42 +dev-ruby/protected_attributes
43 +dev-ruby/rails-dom-testing:1
44 +dev-ruby/web-console:0
45 +# Metasploit is a reverse dependency on Rails 4.2 Upstream shows no
46 +# sign of moving to a supported Rails version. Metasploit will most
47 +# likely be moved to an overlay.
48 +dev-ruby/metasploit-concern
49 +dev-ruby/metasploit-credential
50 +dev-ruby/metasploit-model
51 +dev-ruby/metasploit_data_models
52 +net-analyzer/metasploit
53 +dev-ruby/rex-arch
54 +dev-ruby/rex-bin_tools
55 +dev-ruby/rex-core
56 +dev-ruby/rex-encoder
57 +dev-ruby/rex-exploitation
58 +dev-ruby/rex-java
59 +dev-ruby/rex-mime
60 +dev-ruby/rex-nop
61 +dev-ruby/rex-ole
62 +dev-ruby/rex-powershell
63 +dev-ruby/rex-random_identifier
64 +dev-ruby/rex-registry
65 +dev-ruby/rex-rop_builder
66 +dev-ruby/rex-socket
67 +dev-ruby/rex-sslscan
68 +dev-ruby/rex-struct2
69 +dev-ruby/rex-text
70 +dev-ruby/rex-zip
71 +
72 # Michał Górny <mgorny@g.o> (2020-03-29)
73 # Unmaintained, seriously outdated, vulnerable. Multiple bugs reported.
74 # Stuck on Python 3.6.