From nobody Sun Feb 5 15:55:43 2023 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4P8vB801Nvz3kTV9; Sun, 5 Feb 2023 15:55:44 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4P8vB73HhNz4HDd; Sun, 5 Feb 2023 15:55:43 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1675612543; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=IKfIbOjsB0nOkxySgsN/Gda7/euc4W6etUIpfSar3eM=; b=B7I/x6GoXVsEwMvueq+CKYft+Wj+Vi9bjIKgQYfbjp9ppU9jik0wPKQGMdI9N5f76SqBU1 J/+mcXbxVJAYOFR/9JCoOqte+YsaBdk90UCp7U+kFKT4rsWXN6a/8D8Z0MIg8YEUHFsA/n V1DzUiKroJFgC0Te3nWjSrF64Kb4ZAnJEI8j2CnJNsHgIFa5kXRQoznPLAeJ8tIy5fj0HH BU0DK8B93O5K4pYyeBysOiRmi/L273CakDsDhTyEoiWfv3AhMdnM3SinPgcN2cq0rUKBjZ 6MzFUmxTUypVOs3/lP+I944QUf1FciGY9tmjxaSvfvy3P4wSwb0Dh6Gv3o2rvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1675612543; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=IKfIbOjsB0nOkxySgsN/Gda7/euc4W6etUIpfSar3eM=; b=QVzMvIlWAkE3GU8JAP/s6Z0GD8rYzpzz/WQ9oUZa2HUE3n4faCu/GS5t5DAaUPmiqzoxRy n2MySa3HaiZRWdWD+syZ41WckLlIWAXoEznSL8PTLHTemx4g9DkPJKh1ykVS4Oppll7NQ/ fEwAphtwChLps10Ow7gwGW0T8gS4NevL05RYBgpZECVTVjuPE+hrQbT9PS5ag7r2Vnk82w /n/0xs46tz1cRPrD1xiBOhZkbQwLXMzwhWJ7PBTk6BZeSQcm35xOYQap2DmtV1+THHH879 apd2kq6H6Ou03KertF/52dCcw0C5yMcvktoA+qTWVORgzQ2+FMs3lbA3Qte8Hw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1675612543; a=rsa-sha256; cv=none; b=Fr0VJ/6v7xIEHZUSdlpvjAge9ktpZG0+RivzyDL5rqWw8Su8IAOlHJvW43mXFsfD9LF42s 8X6xQKXrkrAWNTFtsA/xxulXl1HmM59ARhLzc8ntVRjzP0DuX7cE+WQdMiExI/HSfDakVO aPF36kdBmwOmaPyGMIbvjAbvDxyzMOD3CUYiFX4VLjJgRm6Rl5bGxv+jIymV3pIV3h0Cdb pxc3yBLlz0zozaO74GN5und2M8r+0JllrfNBGLbzrjX6pMd5Q3057++kVh7N9T2+hlOYuW fboRCSeAwuGsIOPNtt4qCF0GcS49nB+Yt2LoIOZaAqZllNE+2XkRiIna1sJG1A== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4P8vB72Kwsz10pS; Sun, 5 Feb 2023 15:55:43 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 315Fthc0031173; Sun, 5 Feb 2023 15:55:43 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 315FthiZ031172; Sun, 5 Feb 2023 15:55:43 GMT (envelope-from git) Date: Sun, 5 Feb 2023 15:55:43 GMT Message-Id: <202302051555.315FthiZ031172@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Po-Chuan Hsieh Subject: git: 17eca2662f5c - main - security/py-sslyze: Update to 5.1.1 List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: sunpoet X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 17eca2662f5c5c132a7071a2651d7676fa8f8a7e Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by sunpoet: URL: https://cgit.FreeBSD.org/ports/commit/?id=17eca2662f5c5c132a7071a2651d7676fa8f8a7e commit 17eca2662f5c5c132a7071a2651d7676fa8f8a7e Author: Po-Chuan Hsieh AuthorDate: 2023-02-05 15:19:25 +0000 Commit: Po-Chuan Hsieh CommitDate: 2023-02-05 15:48:04 +0000 security/py-sslyze: Update to 5.1.1 Changes: https://github.com/nabla-c0d3/sslyze/releases --- security/py-sslyze/Makefile | 2 +- security/py-sslyze/distinfo | 6 +++--- security/py-sslyze/files/patch-openssl | 35 +++++++++++++++++----------------- 3 files changed, 21 insertions(+), 22 deletions(-) diff --git a/security/py-sslyze/Makefile b/security/py-sslyze/Makefile index 7951b7a43d31..d260e4e482ff 100644 --- a/security/py-sslyze/Makefile +++ b/security/py-sslyze/Makefile @@ -1,5 +1,5 @@ PORTNAME= sslyze -PORTVERSION= 5.1.0 +PORTVERSION= 5.1.1 CATEGORIES= security python MASTER_SITES= PYPI PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} diff --git a/security/py-sslyze/distinfo b/security/py-sslyze/distinfo index 8c9aad2f06b9..defc28fdb88c 100644 --- a/security/py-sslyze/distinfo +++ b/security/py-sslyze/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1674590004 -SHA256 (sslyze-5.1.0.tar.gz) = 5b229dc7d72734d14a4e85799a40bf1867b1ad3ea88ad6b1901517974b402b53 -SIZE (sslyze-5.1.0.tar.gz) = 979438 +TIMESTAMP = 1675191087 +SHA256 (sslyze-5.1.1.tar.gz) = 17edf03121904b28be4c75938db192df706e6be1ba172b8741135921cfd661e5 +SIZE (sslyze-5.1.1.tar.gz) = 979387 diff --git a/security/py-sslyze/files/patch-openssl b/security/py-sslyze/files/patch-openssl index 747def93d6e0..3ed62497d78c 100644 --- a/security/py-sslyze/files/patch-openssl +++ b/security/py-sslyze/files/patch-openssl @@ -1,4 +1,4 @@ ---- sslyze/connection_helpers/tls_connection.py.orig 2022-05-14 11:12:33 UTC +--- sslyze/connection_helpers/tls_connection.py.orig 2023-01-16 21:45:34 UTC +++ sslyze/connection_helpers/tls_connection.py @@ -2,8 +2,6 @@ import socket from pathlib import Path @@ -9,7 +9,7 @@ from sslyze.server_setting import ( ServerNetworkLocation, ServerNetworkConfiguration, -@@ -170,7 +168,7 @@ class SslConnection: +@@ -172,7 +170,7 @@ class SslConnection: ): raise ValueError("Cannot use modern OpenSSL with SSL 2.0 or 3.0") @@ -18,7 +18,7 @@ if network_configuration.tls_client_auth_credentials: # A client certificate and private key were provided ---- sslyze/mozilla_tls_profile/mozilla_config_checker.py.orig 2022-05-14 10:32:13 UTC +--- sslyze/mozilla_tls_profile/mozilla_config_checker.py.orig 2023-01-16 21:45:34 UTC +++ sslyze/mozilla_tls_profile/mozilla_config_checker.py @@ -79,10 +79,6 @@ class ServerScanResultIncomplete(Exception): @@ -42,17 +42,16 @@ ("tls_1_2_cipher_suites", "TLSv1.2"), ("tls_1_3_cipher_suites", "TLSv1.3"), ]: ---- sslyze/plugins/compression_plugin.py.orig 2022-05-14 09:12:21 UTC +--- sslyze/plugins/compression_plugin.py.orig 2023-01-18 18:58:11 UTC +++ sslyze/plugins/compression_plugin.py -@@ -1,7 +1,7 @@ +@@ -1,6 +1,6 @@ from dataclasses import dataclass - import pydantic -from nassl.legacy_ssl_client import LegacySslClient +from nassl.ssl_client import SslClient from nassl.ssl_client import ClientCertificateRequested - from sslyze.json.scan_attempt_json import ScanCommandAttemptAsJson + from sslyze.json.pydantic_utils import BaseModelWithOrmModeAndForbid @@ -89,9 +89,9 @@ def _test_compression_support(server_info: ServerConne ssl_connection = server_info.get_preconfigured_tls_connection( @@ -65,16 +64,16 @@ raise RuntimeError("Should never happen") # Make sure OpenSSL was built with support for compression to avoid false negatives ---- sslyze/plugins/fallback_scsv_plugin.py.orig 2022-05-14 09:12:21 UTC +--- sslyze/plugins/fallback_scsv_plugin.py.orig 2023-01-18 18:58:11 UTC +++ sslyze/plugins/fallback_scsv_plugin.py -@@ -3,7 +3,6 @@ from typing import List, Optional +@@ -2,7 +2,6 @@ from dataclasses import dataclass + from typing import List, Optional - import pydantic from nassl import _nassl -from nassl.legacy_ssl_client import LegacySslClient + from sslyze.json.pydantic_utils import BaseModelWithOrmModeAndForbid from sslyze.json.scan_attempt_json import ScanCommandAttemptAsJson - from sslyze.plugins.plugin_base import ( --- sslyze/plugins/openssl_cipher_suites/_test_cipher_suite.py.orig 2022-05-14 09:12:21 UTC +++ sslyze/plugins/openssl_cipher_suites/_test_cipher_suite.py @@ -2,7 +2,6 @@ from dataclasses import dataclass @@ -111,7 +110,7 @@ ) _set_cipher_suite_string(tls_version, cipher_suite.openssl_name, ssl_connection.ssl_client) ---- sslyze/plugins/openssl_cipher_suites/cipher_suites.py.orig 2022-06-25 23:42:22 UTC +--- sslyze/plugins/openssl_cipher_suites/cipher_suites.py.orig 2022-05-14 09:12:21 UTC +++ sslyze/plugins/openssl_cipher_suites/cipher_suites.py @@ -3,7 +3,6 @@ from typing import Dict, Set @@ -193,18 +192,18 @@ ScanCommand.TLS_1_2_CIPHER_SUITES: Tlsv12ScanImplementation, ScanCommand.TLS_1_3_CIPHER_SUITES: Tlsv13ScanImplementation, ScanCommand.TLS_COMPRESSION: CompressionImplementation, ---- sslyze/plugins/session_renegotiation_plugin.py.orig 2022-05-14 09:12:21 UTC +--- sslyze/plugins/session_renegotiation_plugin.py.orig 2023-01-18 18:58:11 UTC +++ sslyze/plugins/session_renegotiation_plugin.py -@@ -5,7 +5,7 @@ from typing import List, Optional, Tuple +@@ -4,7 +4,7 @@ from enum import Enum + from typing import List, Optional, Tuple - import pydantic from nassl._nassl import OpenSSLError -from nassl.legacy_ssl_client import LegacySslClient +from nassl.ssl_client import SslClient + from sslyze.json.pydantic_utils import BaseModelWithOrmModeAndForbid from sslyze.json.scan_attempt_json import ScanCommandAttemptAsJson - from sslyze.errors import ServerRejectedTlsHandshake -@@ -124,9 +124,9 @@ def _test_secure_renegotiation(server_info: ServerConn +@@ -125,9 +125,9 @@ def _test_secure_renegotiation(server_info: ServerConn ssl_connection = server_info.get_preconfigured_tls_connection( override_tls_version=tls_version_to_use, @@ -216,7 +215,7 @@ raise RuntimeError("Should never happen") try: -@@ -159,9 +159,9 @@ def _test_client_renegotiation(server_info: ServerConn +@@ -160,9 +160,9 @@ def _test_client_renegotiation(server_info: ServerConn ssl_connection = server_info.get_preconfigured_tls_connection( override_tls_version=tls_version_to_use,