CVS log for pkgsrc/www/ruby-http-cookie/Makefile
Up to [cvs.NetBSD.org] / pkgsrc / www / ruby-http-cookie
Request diff between arbitrary revisions
Keyword substitution: kv
Default branch: MAIN
Revision 1.7: download - view: text, markup, annotated - select for diffs
Wed Dec 11 14:28:50 2024 UTC (5 months ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2025Q1-base,
pkgsrc-2025Q1,
pkgsrc-2024Q4-base,
pkgsrc-2024Q4,
HEAD
Diff to: previous 1.6: preferred, colored
Changes since revision 1.6: +2 -2
lines
www/ruby-http-cookie: update to 1.0.8
1.0.8 (2024-12-05)
* Cookie#expires= accepts DateTime objects. (#52) @luke-hill @flavorjones
New Contributors
* @luke-hill made their first contribution in #52
Revision 1.6: download - view: text, markup, annotated - select for diffs
Sun Sep 22 08:17:14 2024 UTC (7 months, 3 weeks ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2024Q3-base,
pkgsrc-2024Q3
Diff to: previous 1.5: preferred, colored
Changes since revision 1.5: +2 -2
lines
www/ruby-http-cookie: update to 1.0.7
1.0.7 (2024-06-06)
* Explicitly require "cgi" to avoid NameError in some applications. (#50 by
@flavorjones)
Revision 1.5: download - view: text, markup, annotated - select for diffs
Sun Jun 2 15:23:58 2024 UTC (11 months, 1 week ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2024Q2-base,
pkgsrc-2024Q2
Diff to: previous 1.4: preferred, colored
Changes since revision 1.4: +2 -2
lines
www/ruby-http-cookie: update to 1.0.6
1.0.6 (2024-06-01)
* Fix error formatting bug in HTTP::CookieJar::AbstractStore (#42 by
@andrelaszlo)
* Allow non-RFC 3986-compliant URLs (#45 by @c960657)
* Add coverage for Ruby 3.2 and 3.3 (#46 by @flavorjones)
* Quash ruby 3.4 warnings (#47 by @flavorjones)
Revision 1.4: download - view: text, markup, annotated - select for diffs
Wed Aug 31 14:51:50 2022 UTC (2 years, 8 months ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2024Q1-base,
pkgsrc-2024Q1,
pkgsrc-2023Q4-base,
pkgsrc-2023Q4,
pkgsrc-2023Q3-base,
pkgsrc-2023Q3,
pkgsrc-2023Q2-base,
pkgsrc-2023Q2,
pkgsrc-2023Q1-base,
pkgsrc-2023Q1,
pkgsrc-2022Q4-base,
pkgsrc-2022Q4,
pkgsrc-2022Q3-base,
pkgsrc-2022Q3
Diff to: previous 1.3: preferred, colored
Changes since revision 1.3: +2 -2
lines
www/ruby-http-cookie: update to 1.0.5
1.0.5 (2022-05-25)
* Silence SQLite3 warnings
Revision 1.3: download - view: text, markup, annotated - select for diffs
Mon Jun 14 16:07:35 2021 UTC (3 years, 11 months ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2022Q2-base,
pkgsrc-2022Q2,
pkgsrc-2022Q1-base,
pkgsrc-2022Q1,
pkgsrc-2021Q4-base,
pkgsrc-2021Q4,
pkgsrc-2021Q3-base,
pkgsrc-2021Q3,
pkgsrc-2021Q2-base,
pkgsrc-2021Q2
Diff to: previous 1.2: preferred, colored
Changes since revision 1.2: +5 -3
lines
www/ruby-http-cookie: update to 1.0.4
1.0.4 (2021-06-07)
No change log, please refer
<https://github.com/sparklemotion/http-cookie/compare/v1.0.3...v1.0.4> in
detail.
Revision 1.1.26.1: download - view: text, markup, annotated - select for diffs
Sat Oct 1 13:46:36 2016 UTC (8 years, 7 months ago) by bsiegert
Branches: pkgsrc-2016Q3
Diff to: previous 1.1: preferred, colored; next MAIN 1.2: preferred, colored
Changes since revision 1.1: +1 -1
lines
Pullup ticket #5112 - requested by taca
www/ruby-http-cookie: security fix
Revisions pulled up:
- www/ruby-http-cookie/Makefile 1.2
- www/ruby-http-cookie/distinfo 1.3
---
Module Name: pkgsrc
Committed By: taca
Date: Fri Sep 30 15:36:59 UTC 2016
Modified Files:
pkgsrc/www/ruby-http-cookie: Makefile distinfo
Log Message:
Update ruby-http-cookie to 1.0.3.
## 1.0.3 (2016-09-30)
- Treat comma as normal character in HTTP::Cookie.cookie_value_to_hash
instead of key-value pair separator. This should fix the problem
described in CVE-2016-7401.
Revision 1.2: download - view: text, markup, annotated - select for diffs
Fri Sep 30 15:36:59 2016 UTC (8 years, 7 months ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2021Q1-base,
pkgsrc-2021Q1,
pkgsrc-2020Q4-base,
pkgsrc-2020Q4,
pkgsrc-2020Q3-base,
pkgsrc-2020Q3,
pkgsrc-2020Q2-base,
pkgsrc-2020Q2,
pkgsrc-2020Q1-base,
pkgsrc-2020Q1,
pkgsrc-2019Q4-base,
pkgsrc-2019Q4,
pkgsrc-2019Q3-base,
pkgsrc-2019Q3,
pkgsrc-2019Q2-base,
pkgsrc-2019Q2,
pkgsrc-2019Q1-base,
pkgsrc-2019Q1,
pkgsrc-2018Q4-base,
pkgsrc-2018Q4,
pkgsrc-2018Q3-base,
pkgsrc-2018Q3,
pkgsrc-2018Q2-base,
pkgsrc-2018Q2,
pkgsrc-2018Q1-base,
pkgsrc-2018Q1,
pkgsrc-2017Q4-base,
pkgsrc-2017Q4,
pkgsrc-2017Q3-base,
pkgsrc-2017Q3,
pkgsrc-2017Q2-base,
pkgsrc-2017Q2,
pkgsrc-2017Q1-base,
pkgsrc-2017Q1,
pkgsrc-2016Q4-base,
pkgsrc-2016Q4
Diff to: previous 1.1: preferred, colored
Changes since revision 1.1: +2 -2
lines
Update ruby-http-cookie to 1.0.3.
## 1.0.3 (2016-09-30)
- Treat comma as normal character in HTTP::Cookie.cookie_value_to_hash
instead of key-value pair separator. This should fix the problem
described in CVE-2016-7401.
Revision 1.1: download - view: text, markup, annotated - select for diffs
Sun Sep 15 17:03:01 2013 UTC (11 years, 8 months ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2016Q3-base,
pkgsrc-2016Q2-base,
pkgsrc-2016Q2,
pkgsrc-2016Q1-base,
pkgsrc-2016Q1,
pkgsrc-2015Q4-base,
pkgsrc-2015Q4,
pkgsrc-2015Q3-base,
pkgsrc-2015Q3,
pkgsrc-2015Q2-base,
pkgsrc-2015Q2,
pkgsrc-2015Q1-base,
pkgsrc-2015Q1,
pkgsrc-2014Q4-base,
pkgsrc-2014Q4,
pkgsrc-2014Q3-base,
pkgsrc-2014Q3,
pkgsrc-2014Q2-base,
pkgsrc-2014Q2,
pkgsrc-2014Q1-base,
pkgsrc-2014Q1,
pkgsrc-2013Q4-base,
pkgsrc-2013Q4,
pkgsrc-2013Q3-base,
pkgsrc-2013Q3
Branch point for: pkgsrc-2016Q3
Add ruby-http-cookie package version 1.0.2.
HTTP::Cookie is a ruby library to handle HTTP cookies in a way both
compliant with RFCs and compatible with today's major browsers.
It was originally a part of the
[Mechanize](https://github.com/sparklemotion/mechanize) library,
separated as an independent library in the hope of serving as a common
component that is reusable from any HTTP related piece of software.
The following is an incomplete list of its features:
* Its behavior is highly compatible with that of today's major web
browsers.
* It is based on and conforms to RFC 6265 (the latest standard for the
HTTP cookie mechanism) to a high extent, with real world conventions
deeply in mind.
* It takes eTLD (effective TLD, also known as "Public Suffix") into
account just as major browsers do, to reject cookies with an eTLD
domain like "org", "co.jp", or "appspot.com". This feature is
brought to you by the domain_name gem.
* The number of cookies and the size are properly capped so that a
cookie store does not get flooded.
* It supports the legacy Netscape cookies.txt format for
serialization, maximizing the interoperability with other
implementations.
* It supports the cookies.sqlite format adopted by Mozilla Firefox for
backend store database which can be shared among multiple program
instances.
* It is relatively easy to add a new serialization format or a backend
store because of its modular API.
CVSweb <webmaster@jp.NetBSD.org>