Re: update security/sn0int

2020-03-16 Thread kpcyrd
hey!

thanks for pointing this out. The project does explicitly enable the
`use-pkg-config` feature to enforce dynamic linking, I just forgot to
add it to WANTLIB as well.

I've attached a new patch.

Thanks!

On Mon, Mar 16, 2020 at 11:58:54AM +0100, Sebastien Marie wrote:
> On Mon, Mar 16, 2020 at 03:49:11AM +, kpcyrd wrote:
> > hi!
> > 
> > this patch imports the latest version and drops the patches that have
> > been upstreamed (patch follows).
>  
> I will take a look.
>  
> > Index: Makefile
> > ===
> > RCS file: /cvs/ports/security/sn0int/Makefile,v
> > retrieving revision 1.6
> > diff -u -p -r1.6 Makefile
> > --- Makefile12 Mar 2020 10:30:05 -  1.6
> > +++ Makefile16 Mar 2020 03:41:39 -
> > @@ -7,7 +7,7 @@ COMMENT =   semi-automatic OSINT framework
> >  
> >  GH_ACCOUNT =   kpcyrd
> >  GH_PROJECT =   sn0int
> > -GH_TAGNAME =   v0.11.2
> > +GH_TAGNAME =   v0.18.0
> >  REVISION = 0
> 
> REVISION should be dropped on update.
>   
> >  CATEGORIES =   security
> > @@ -16,7 +16,7 @@ CATEGORIES =  security
> >  PERMIT_PACKAGE =   Yes
> >  
> >  # uses pledge()
> > -LIB_DEPENDS =  databases/sqlite3 ${MODLUA_LIB_DEPENDS}
> > +LIB_DEPENDS =  databases/sqlite3 security/libsodium 
> > ${MODLUA_LIB_DEPENDS}
> >  WANTLIB += c c++abi m pthread sqlite3 ${MODLUA_WANTLIB}
> 
> hum ? adding security/libsodium in LIB_DEPENDS and not in WANTLIB ? it means 
> the
> library is statically linked.
> 
> I just commited support for libsodium-sys crate in devel/cargo module. by
> default, libsodium library will be dynamically linked. could you add sodium to
> WANTLIB ?
> 
> Thanks.
> -- 
> Sebastien Marie
> 
Index: Makefile
===
RCS file: /cvs/ports/security/sn0int/Makefile,v
retrieving revision 1.6
diff -u -p -r1.6 Makefile
--- Makefile	12 Mar 2020 10:30:05 -	1.6
+++ Makefile	16 Mar 2020 13:24:38 -
@@ -7,8 +7,7 @@ COMMENT =	semi-automatic OSINT framework
 
 GH_ACCOUNT =	kpcyrd
 GH_PROJECT =	sn0int
-GH_TAGNAME =	v0.11.2
-REVISION =	0
+GH_TAGNAME =	v0.18.0
 
 CATEGORIES =	security
 
@@ -16,8 +15,8 @@ CATEGORIES =	security
 PERMIT_PACKAGE =	Yes
 
 # uses pledge()
-LIB_DEPENDS =		databases/sqlite3 ${MODLUA_LIB_DEPENDS}
-WANTLIB +=		c c++abi m pthread sqlite3 ${MODLUA_WANTLIB}
+LIB_DEPENDS =		databases/sqlite3 security/libsodium ${MODLUA_LIB_DEPENDS}
+WANTLIB +=		c c++abi m pthread sqlite3 sodium ${MODLUA_WANTLIB}
 
 # as devel/cargo MODULES adds DISTFILES, GH_* didn't
 DISTFILES +=		${DISTNAME}${EXTRACT_SUFX}
@@ -32,102 +31,104 @@ BUILD_DEPENDS =		lang/rust>=1.34 \
 RUN_DEPENDS =		net/libmaxminddb,-asn \
 			net/libmaxminddb,-city
 
-# keep libc >=0.2.63 for sparc64 support
-MODCARGO_CRATES_UPDATE +=	libc
-MODCARGO_CRATES +=	libc	0.2.63	# MIT OR Apache-2.0
-
-MODCARGO_CRATES +=	adler32	1.0.3	# BSD-3-Clause AND Zlib
-MODCARGO_CRATES +=	aho-corasick	0.7.3	# Unlicense/MIT
+MODCARGO_CRATES +=	adler32	1.0.4	# Zlib
+MODCARGO_CRATES +=	aho-corasick	0.7.9	# Unlicense/MIT
 MODCARGO_CRATES +=	ansi_term	0.11.0	# MIT
-MODCARGO_CRATES +=	antidote	1.0.0	# MIT/Apache-2.0
-MODCARGO_CRATES +=	approx	0.1.1	# Apache-2.0
-MODCARGO_CRATES +=	argon2rs	0.2.5	# MIT
-MODCARGO_CRATES +=	arrayref	0.3.5	# BSD-2-Clause
-MODCARGO_CRATES +=	arrayvec	0.4.10	# MIT/Apache-2.0
-MODCARGO_CRATES +=	atty	0.2.11	# MIT
-MODCARGO_CRATES +=	autocfg	0.1.2	# Apache-2.0/MIT
-MODCARGO_CRATES +=	backtrace	0.3.15	# MIT/Apache-2.0
-MODCARGO_CRATES +=	backtrace-sys	0.1.28	# MIT/Apache-2.0
-MODCARGO_CRATES +=	base64	0.10.1	# MIT/Apache-2.0
+MODCARGO_CRATES +=	arrayref	0.3.6	# BSD-2-Clause
+MODCARGO_CRATES +=	arrayvec	0.4.12	# MIT/Apache-2.0
+MODCARGO_CRATES +=	arrayvec	0.5.1	# MIT/Apache-2.0
+MODCARGO_CRATES +=	atty	0.2.14	# MIT
+MODCARGO_CRATES +=	autocfg	0.1.7	# Apache-2.0/MIT
+MODCARGO_CRATES +=	autocfg	1.0.0	# Apache-2.0 OR MIT
+MODCARGO_CRATES +=	backtrace	0.3.41	# MIT/Apache-2.0
+MODCARGO_CRATES +=	backtrace-sys	0.1.33	# MIT/Apache-2.0
 MODCARGO_CRATES +=	base64	0.9.3	# MIT/Apache-2.0
-MODCARGO_CRATES +=	bitflags	1.0.4	# MIT/Apache-2.0
-MODCARGO_CRATES +=	blake2	0.8.0	# MIT OR Apache-2.0
-MODCARGO_CRATES +=	blake2-rfc	0.2.18	# MIT OR Apache-2.0
+MODCARGO_CRATES +=	base64	0.10.1	# MIT/Apache-2.0
+MODCARGO_CRATES +=	base64	0.11.0	# MIT/Apache-2.0
+MODCARGO_CRATES +=	bincode	1.2.1	# MIT
+MODCARGO_CRATES +=	bindgen	0.50.1	# BSD-3-Clause
+MODCARGO_CRATES +=	bitflags	1.2.1	# MIT/Apache-2.0
+MODCARGO_CRATES +=	blake2	0.8.1	# MIT OR Apache-2.0
+MODCARGO_CRATES +=	blake2b_simd	0.5.10	# MIT
 MODCARGO_CRATES +=	block-buffer	0.3.3	# MIT/Apache-2.0
 MODCARGO_CRATES +=	block-buffer	0.7.3	# MIT OR Apache-2.0
-MODCARGO_CRATES 

update security/sn0int

2020-03-15 Thread kpcyrd
hi!

this patch imports the latest version and drops the patches that have
been upstreamed (patch follows).

Thanks!


Index: Makefile
===
RCS file: /cvs/ports/security/sn0int/Makefile,v
retrieving revision 1.6
diff -u -p -r1.6 Makefile
--- Makefile12 Mar 2020 10:30:05 -  1.6
+++ Makefile16 Mar 2020 03:41:39 -
@@ -7,7 +7,7 @@ COMMENT =   semi-automatic OSINT framework
 
 GH_ACCOUNT =   kpcyrd
 GH_PROJECT =   sn0int
-GH_TAGNAME =   v0.11.2
+GH_TAGNAME =   v0.18.0
 REVISION = 0
 
 CATEGORIES =   security
@@ -16,7 +16,7 @@ CATEGORIES =  security
 PERMIT_PACKAGE =   Yes
 
 # uses pledge()
-LIB_DEPENDS =  databases/sqlite3 ${MODLUA_LIB_DEPENDS}
+LIB_DEPENDS =  databases/sqlite3 security/libsodium 
${MODLUA_LIB_DEPENDS}
 WANTLIB += c c++abi m pthread sqlite3 ${MODLUA_WANTLIB}
 
 # as devel/cargo MODULES adds DISTFILES, GH_* didn't
@@ -32,102 +32,104 @@ BUILD_DEPENDS =   lang/rust>=1.34 \
 RUN_DEPENDS =  net/libmaxminddb,-asn \
net/libmaxminddb,-city
 
-# keep libc >=0.2.63 for sparc64 support
-MODCARGO_CRATES_UPDATE +=  libc
-MODCARGO_CRATES += libc0.2.63  # MIT OR Apache-2.0
-
-MODCARGO_CRATES += adler32 1.0.3   # BSD-3-Clause AND Zlib
-MODCARGO_CRATES += aho-corasick0.7.3   # Unlicense/MIT
+MODCARGO_CRATES += adler32 1.0.4   # Zlib
+MODCARGO_CRATES += aho-corasick0.7.9   # Unlicense/MIT
 MODCARGO_CRATES += ansi_term   0.11.0  # MIT
-MODCARGO_CRATES += antidote1.0.0   # MIT/Apache-2.0
-MODCARGO_CRATES += approx  0.1.1   # Apache-2.0
-MODCARGO_CRATES += argon2rs0.2.5   # MIT
-MODCARGO_CRATES += arrayref0.3.5   # BSD-2-Clause
-MODCARGO_CRATES += arrayvec0.4.10  # MIT/Apache-2.0
-MODCARGO_CRATES += atty0.2.11  # MIT
-MODCARGO_CRATES += autocfg 0.1.2   # Apache-2.0/MIT
-MODCARGO_CRATES += backtrace   0.3.15  # MIT/Apache-2.0
-MODCARGO_CRATES += backtrace-sys   0.1.28  # MIT/Apache-2.0
-MODCARGO_CRATES += base64  0.10.1  # MIT/Apache-2.0
+MODCARGO_CRATES += arrayref0.3.6   # BSD-2-Clause
+MODCARGO_CRATES += arrayvec0.4.12  # MIT/Apache-2.0
+MODCARGO_CRATES += arrayvec0.5.1   # MIT/Apache-2.0
+MODCARGO_CRATES += atty0.2.14  # MIT
+MODCARGO_CRATES += autocfg 0.1.7   # Apache-2.0/MIT
+MODCARGO_CRATES += autocfg 1.0.0   # Apache-2.0 OR MIT
+MODCARGO_CRATES += backtrace   0.3.41  # MIT/Apache-2.0
+MODCARGO_CRATES += backtrace-sys   0.1.33  # MIT/Apache-2.0
 MODCARGO_CRATES += base64  0.9.3   # MIT/Apache-2.0
-MODCARGO_CRATES += bitflags1.0.4   # MIT/Apache-2.0
-MODCARGO_CRATES += blake2  0.8.0   # MIT OR Apache-2.0
-MODCARGO_CRATES += blake2-rfc  0.2.18  # MIT OR Apache-2.0
+MODCARGO_CRATES += base64  0.10.1  # MIT/Apache-2.0
+MODCARGO_CRATES += base64  0.11.0  # MIT/Apache-2.0
+MODCARGO_CRATES += bincode 1.2.1   # MIT
+MODCARGO_CRATES += bindgen 0.50.1  # BSD-3-Clause
+MODCARGO_CRATES += bitflags1.2.1   # MIT/Apache-2.0
+MODCARGO_CRATES += blake2  0.8.1   # MIT OR Apache-2.0
+MODCARGO_CRATES += blake2b_simd0.5.10  # MIT
 MODCARGO_CRATES += block-buffer0.3.3   # MIT/Apache-2.0
 MODCARGO_CRATES += block-buffer0.7.3   # MIT OR Apache-2.0
-MODCARGO_CRATES += block-padding   0.1.4   # MIT OR Apache-2.0
-MODCARGO_CRATES += boxxy   0.10.0  # LGPL-3.0
-MODCARGO_CRATES += bs580.2.2   # MIT/Apache-2.0
+MODCARGO_CRATES += block-padding   0.1.5   # MIT OR Apache-2.0
+MODCARGO_CRATES += boxxy   0.11.0  # LGPL-3.0
+MODCARGO_CRATES += bs580.3.0   # MIT/Apache-2.0
 MODCARGO_CRATES += bufstream   0.1.4   # MIT/Apache-2.0
-MODCARGO_CRATES += build_const 0.2.1   # MIT
+MODCARGO_CRATES += bumpalo 3.2.0   # MIT/Apache-2.0
 MODCARGO_CRATES += byte-tools  0.2.0   # MIT/Apache-2.0
 MODCARGO_CRATES += byte-tools  0.3.1   # MIT OR Apache-2.0
-MODCARGO_CRATES += byteorder   1.3.1   # Unlicense OR MIT
+MODCARGO_CRATES += bytemuck1.2.0   # Zlib
+MODCARGO_CRATES += byteorder   1.3.4   # Unlicense OR MIT
 MODCARGO_CRATES += bytes   0.4.12  # MIT
-MODCARGO_CRATES += caps0.3.0   # MIT/Apache-2.0
-MODCARGO_CRATES += cc  1.0.36  # MIT/Apache-2.0
-MODCARGO_CRATES += cfg-if  0.1.7   # MIT/Apache-2.0
-MODCARGO_CRATES += cgmath  0.16.1  # Apache-2.0
-MODCARGO_CRATES += chrono  0.4.6   # MIT/Apache-2.0
-MODCARGO_CRATES += chrootable-https0.10.0  # LGPL-3.0
+MODCARGO_CRATES += bytes   0.5.4   # MIT
+MODCARGO_CRATES += bytesize1.0.0   # Apache-2.0
+MODCARGO_CRATES += c2-chacha   0.2.3   # MIT/Apache-2.0
+MODCARGO_CRATES += caps0.3.4   # MIT/Apache-2.0
+MODCARGO_CRATES += cc  1.0.50  # MIT/Apache-2.0
+MODCARGO_CRATES += cexpr   0.3.6   # Apa

Re: update security/sn0int

2019-09-09 Thread kpcyrd
I've tried to track down these issues (unfortunatly I only have an amd64
testsystem right now):

## i386

It seems the issue was in typenum and also showed up in librsvg in
debian[1], where it was fixed by cherry-picking a patch[2] from
upstream. This commit was part of the typenum 1.11.0 release, so this
issue should be resolved by bumping this port.

[1]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926840
[2]: 
https://github.com/paholg/typenum/commit/14a3322d1081fd63d5eb44bf8ab8f90676208228

## sparc64

This one is more difficult, it includes the info which crate is actually
failing (which is super useful), but the error message is very generic
and I'm having trouble pin-pointing this bug without a sparc64 system or
a backtrace with RUST_BACKTRACE=1 set.

The ring dependency was updated from 0.14.6 to 0.16.7, so there's a
chance this was resolved upstream.

> First, a general remark: I strongly want that such Rust port to have a
> maintainer. Else, it means I will have to do it, and I have no time for
> such port that only work on few platforms, and where nobody care if it
> breaks. Currently, it is marked BROKEN on i386 and sparc64.

Both of these problems are most likely resolved with this port update
(and the patch that bumps libc), I don't have a good way to test this
though besides removing both BROKEN lines and checking if the build
passes. Ideas very welcome.

I'm happy to look into issues when somebody pings me. There's probably
some overlap anyway since I'm both the upstream and also one of the
debian rust maintainers, but I should also point out that I'm still very
new to the openbsd ports system (and I had to look up how to generate a
diff with cvs when I sent this patch).

If that's sufficient to become the maintainer I would be happy to do so.

Thanks!



update security/sn0int

2019-09-08 Thread kpcyrd
Hi,

this patch imports the latest version and drops the patches that have
been upstreamed in the meantime.

(long diff follows)

Thanks!


Index: Makefile
===
RCS file: /cvs/ports/security/sn0int/Makefile,v
retrieving revision 1.4
diff -u -p -r1.4 Makefile
--- Makefile30 Aug 2019 12:24:00 -  1.4
+++ Makefile9 Sep 2019 02:57:17 -
@@ -7,7 +7,7 @@ COMMENT =   semi-automatic OSINT framework
 
 GH_ACCOUNT =   kpcyrd
 GH_PROJECT =   sn0int
-GH_TAGNAME =   v0.11.2
+GH_TAGNAME =   v0.13.0
 
 CATEGORIES =   security
 
@@ -30,70 +30,68 @@ RUN_DEPENDS =   net/libmaxminddb,-asn \
 MODCARGO_CRATES_UPDATE +=  libc
 
 MODCARGO_CRATES += adler32 1.0.3   # BSD-3-Clause AND Zlib
-MODCARGO_CRATES += aho-corasick0.7.3   # Unlicense/MIT
+MODCARGO_CRATES += aho-corasick0.7.6   # Unlicense/MIT
 MODCARGO_CRATES += ansi_term   0.11.0  # MIT
-MODCARGO_CRATES += antidote1.0.0   # MIT/Apache-2.0
 MODCARGO_CRATES += approx  0.1.1   # Apache-2.0
-MODCARGO_CRATES += argon2rs0.2.5   # MIT
 MODCARGO_CRATES += arrayref0.3.5   # BSD-2-Clause
-MODCARGO_CRATES += arrayvec0.4.10  # MIT/Apache-2.0
-MODCARGO_CRATES += atty0.2.11  # MIT
-MODCARGO_CRATES += autocfg 0.1.2   # Apache-2.0/MIT
-MODCARGO_CRATES += backtrace   0.3.15  # MIT/Apache-2.0
-MODCARGO_CRATES += backtrace-sys   0.1.28  # MIT/Apache-2.0
+MODCARGO_CRATES += arrayvec0.4.11  # MIT/Apache-2.0
+MODCARGO_CRATES += atty0.2.13  # MIT
+MODCARGO_CRATES += autocfg 0.1.6   # Apache-2.0/MIT
+MODCARGO_CRATES += backtrace   0.3.35  # MIT/Apache-2.0
+MODCARGO_CRATES += backtrace-sys   0.1.31  # MIT/Apache-2.0
 MODCARGO_CRATES += base64  0.10.1  # MIT/Apache-2.0
 MODCARGO_CRATES += base64  0.9.3   # MIT/Apache-2.0
-MODCARGO_CRATES += bitflags1.0.4   # MIT/Apache-2.0
-MODCARGO_CRATES += blake2  0.8.0   # MIT OR Apache-2.0
-MODCARGO_CRATES += blake2-rfc  0.2.18  # MIT OR Apache-2.0
+MODCARGO_CRATES += bitflags1.1.0   # MIT/Apache-2.0
+MODCARGO_CRATES += blake2  0.8.1   # MIT OR Apache-2.0
+MODCARGO_CRATES += blake2b_simd0.5.7   # MIT
 MODCARGO_CRATES += block-buffer0.3.3   # MIT/Apache-2.0
 MODCARGO_CRATES += block-buffer0.7.3   # MIT OR Apache-2.0
 MODCARGO_CRATES += block-padding   0.1.4   # MIT OR Apache-2.0
-MODCARGO_CRATES += boxxy   0.10.0  # LGPL-3.0
-MODCARGO_CRATES += bs580.2.2   # MIT/Apache-2.0
+MODCARGO_CRATES += boxxy   0.11.0  # LGPL-3.0
+MODCARGO_CRATES += bs580.2.4   # MIT/Apache-2.0
 MODCARGO_CRATES += bufstream   0.1.4   # MIT/Apache-2.0
-MODCARGO_CRATES += build_const 0.2.1   # MIT
+MODCARGO_CRATES += bumpalo 2.6.0   # MIT/Apache-2.0
 MODCARGO_CRATES += byte-tools  0.2.0   # MIT/Apache-2.0
 MODCARGO_CRATES += byte-tools  0.3.1   # MIT OR Apache-2.0
-MODCARGO_CRATES += byteorder   1.3.1   # Unlicense OR MIT
+MODCARGO_CRATES += byteorder   1.3.2   # Unlicense OR MIT
 MODCARGO_CRATES += bytes   0.4.12  # MIT
-MODCARGO_CRATES += caps0.3.0   # MIT/Apache-2.0
-MODCARGO_CRATES += cc  1.0.36  # MIT/Apache-2.0
-MODCARGO_CRATES += cfg-if  0.1.7   # MIT/Apache-2.0
+MODCARGO_CRATES += bytesize1.0.0   # Apache-2.0
+MODCARGO_CRATES += c2-chacha   0.2.2   # MIT/Apache-2.0
+MODCARGO_CRATES += caps0.3.3   # MIT/Apache-2.0
+MODCARGO_CRATES += cc  1.0.40  # MIT/Apache-2.0
+MODCARGO_CRATES += cfg-if  0.1.9   # MIT/Apache-2.0
 MODCARGO_CRATES += cgmath  0.16.1  # Apache-2.0
-MODCARGO_CRATES += chrono  0.4.6   # MIT/Apache-2.0
-MODCARGO_CRATES += chrootable-https0.10.0  # LGPL-3.0
+MODCARGO_CRATES += chrono  0.4.7   # MIT/Apache-2.0
+MODCARGO_CRATES += chrootable-https0.11.0  # LGPL-3.0
 MODCARGO_CRATES += clap2.33.0  # MIT
 MODCARGO_CRATES += cloudabi0.0.3   # BSD-2-Clause
 MODCARGO_CRATES += color_quant 1.0.1   # MIT
 MODCARGO_CRATES += colored 1.8.0   # MPL-2.0
-MODCARGO_CRATES += constant_time_eq0.1.3   # CC0-1.0
+MODCARGO_CRATES += constant_time_eq0.1.4   # CC0-1.0
 MODCARGO_CRATES += cookie  0.11.1  # MIT/Apache-2.0
-MODCARGO_CRATES += cookie_store0.5.1   # MIT/Apache-2.0
+MODCARGO_CRATES += cookie  0.12.0  # MIT/Apache-2.0
+MODCARGO_CRATES += cookie_store0.7.0   # MIT/Apache-2.0
 MODCARGO_CRATES += core-foundation 0.6.4   # MIT / Apache-2.0
 MODCARGO_CRATES += core-foundation-sys 0.6.2   # MIT / Apache-2.0
-MODCARGO_CRATES += crc 1.8.1   # MIT OR Apache-2.0
 MODCARGO_CRATES += crc32fast   1.2.0   # MIT OR Apache-2.0
-MODCARGO_CRATES += crossbeam-channel   0.3.8   # MIT/Apache-2.0
-MODCARGO_CRATES += crossbeam-deque 0.2.0   # MIT/Apache-2.0
+MODCARGO_CRATES += crossbeam-channel

Re: NEW: security/sn0int

2019-06-21 Thread kpcyrd
On Tue, May 14, 2019 at 03:45:45AM +, kpcyrd wrote:
> Thanks for pointing this out, I've looked into this bug and released a
> bugfix release, the updated port is attached to this email.
> 
> The in-depth analysis of this bug is that I've been using
> std::env::current_exe() which has a special catch on openbsd if the
> binary location has been resolved with $PATH instead of a relative or
> absolute path. In that specific case it fails to spawn a child process
> that is used as a sandbox to run the script.
> 
> This has been resolved in 0.11.2.

Anything else I can do to move this forward?

Thanks!



Re: NEW: security/sn0int

2019-05-13 Thread kpcyrd
On Fri, May 03, 2019 at 12:27:28PM +0200, Gonzalo L. Rodriguez wrote:
> I have tried a bit the port, I am not a rust expert but so far looks good and
> portcheck is happy with it, once installed:
> 
> [+] Connecting to database
> [+] Loaded 27 modules
> [sn0int][default] > use ctlogs
> [sn0int][default][kpcyrd/ctlogs] > run
> [-] Failed "foobar.org": Failed to find current executable
> [+] Finished kpcyrd/ctlogs (1 errors)
> [sn0int][default][kpcyrd/ctlogs] >
> 
> Do I am missing something here?

Thanks for pointing this out, I've looked into this bug and released a
bugfix release, the updated port is attached to this email.

The in-depth analysis of this bug is that I've been using
std::env::current_exe() which has a special catch on openbsd if the
binary location has been resolved with $PATH instead of a relative or
absolute path. In that specific case it fails to spawn a child process
that is used as a sandbox to run the script.

This has been resolved in 0.11.2.


sn0int-0.11.2.tar.gz
Description: application/gzip


Re: NEW: security/sn0int

2019-05-03 Thread kpcyrd
On Fri, Apr 26, 2019 at 03:38:36PM +, kpcyrd wrote:
> Hello,
> 
> I've attached a port of sn0int, a rust OSINT framework that's extensible
> with scripts that are executed in a sandbox. OpenBSD is one of the
> officially supported platforms, both pledge and unveil are used.
> 
> This is my first port submission, please let me know if I missed
> anything.
> 
> ---
> 
> $ pkg_info sn0int
> Information for inst:sn0int-0.11.1
> 
> Comment:
> semi-automatic OSINT framework and package manager
> 
> Description:
> sn0int is a semi-automatic OSINT framework and package manager. It was built
> for IT security professionals and bug hunters to gather intelligence about a
> given target or about yourself. sn0int is enumerating attack surface by
> semi-automatically processing public information and mapping the results in a
> unified format for followup investigations.
> 
> Maintainer: The OpenBSD ports mailing-list 
> 
> WWW: https://github.com/kpcyrd/sn0int
> 

Hello!

Is there anything missing that I need to take care of?

Thanks!



NEW: security/sn0int

2019-04-26 Thread kpcyrd
Hello,

I've attached a port of sn0int, a rust OSINT framework that's extensible
with scripts that are executed in a sandbox. OpenBSD is one of the
officially supported platforms, both pledge and unveil are used.

This is my first port submission, please let me know if I missed
anything.

---

$ pkg_info sn0int
Information for inst:sn0int-0.11.1

Comment:
semi-automatic OSINT framework and package manager

Description:
sn0int is a semi-automatic OSINT framework and package manager. It was built
for IT security professionals and bug hunters to gather intelligence about a
given target or about yourself. sn0int is enumerating attack surface by
semi-automatically processing public information and mapping the results in a
unified format for followup investigations.

Maintainer: The OpenBSD ports mailing-list 

WWW: https://github.com/kpcyrd/sn0int



sn0int-0.11.1.tar.gz
Description: application/gzip


Bug: modcargo licenses

2018-02-04 Thread kpcyrd
hello,

this is my first post, I hope this is the correct list. I spotted an
edgecase in modcargo, the ports-module for rust projects:

Given a project that depends on typenum, the output between
modcargo-gen-crates and modcargo-gen-crates-licenses varies, on the
former, every dependency is detected correctly, on the later typenum is
missing:

make modcargo-gen-crates | grep typenum
make modcargo-gen-crates-licenses | grep typenum

I've noticed that typenum uses unusual-but-valid indent of two spaces in
its Cargo.toml, so the line with the license looks like
this: `  license = "MIT/Apache-2.0"`.

The target for modcargo-gen-crates-licenses uses a regex to parse the
toml file, specifically this line in
/usr/ports/devel/cargo/cargo.port.mk:

-exec grep -H '^license' {} \; \

I think this needs to be `^\s*license`. Technically this can still cause
issues for license keys in different sections or keys like
`license-foo`, but would resolve the specific issue I ran into.

I didn't run into any other problems and I've successfully built a
package for my toy project that covers a fair number of edgecases. I
hope this helps to improve it further!

Thanks.