From owner-svn-ports-all@freebsd.org Wed Feb 3 17:34:10 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8827DA97070; Wed, 3 Feb 2016 17:34:10 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3E38F1247; Wed, 3 Feb 2016 17:34:10 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u13HY9Sq027597; Wed, 3 Feb 2016 17:34:09 GMT (envelope-from feld@FreeBSD.org) Received: (from feld@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u13HY9Is027595; Wed, 3 Feb 2016 17:34:09 GMT (envelope-from feld@FreeBSD.org) Message-Id: <201602031734.u13HY9Is027595@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: feld set sender to feld@FreeBSD.org using -f From: Mark Felder Date: Wed, 3 Feb 2016 17:34:09 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r407964 - in head/sysutils/py-salt: . files X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 03 Feb 2016 17:34:10 -0000 Author: feld Date: Wed Feb 3 17:34:08 2016 New Revision: 407964 URL: https://svnweb.freebsd.org/changeset/ports/407964 Log: sysutils/py-salt: Patch to fix major regression There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: https://github.com/saltstack/salt/issues/30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat) MFH: 2016Q1 Added: head/sysutils/py-salt/files/patch-salt_state.py (contents, props changed) Modified: head/sysutils/py-salt/Makefile Modified: head/sysutils/py-salt/Makefile ============================================================================== --- head/sysutils/py-salt/Makefile Wed Feb 3 17:16:57 2016 (r407963) +++ head/sysutils/py-salt/Makefile Wed Feb 3 17:34:08 2016 (r407964) @@ -3,6 +3,7 @@ PORTNAME= salt PORTVERSION= 2015.8.4 +PORTREVISION= 1 CATEGORIES= sysutils python MASTER_SITES= CHEESESHOP PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} Added: head/sysutils/py-salt/files/patch-salt_state.py ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/sysutils/py-salt/files/patch-salt_state.py Wed Feb 3 17:34:08 2016 (r407964) @@ -0,0 +1,11 @@ +--- salt/state.py.orig 2016-02-03 17:25:12 UTC ++++ salt/state.py +@@ -190,7 +190,7 @@ def find_name(name, state, high): + if len(arg) != 1: + continue + if arg[next(iter(arg))] == name: +- ext_id.append((name, state)) ++ ext_id.append((nid, state)) + return ext_id + +