]> git.ipfire.org Git - people/ms/ipfire-2.x.git/log
people/ms/ipfire-2.x.git
12 days agoopenvpnctrl: Remove the stuff we no longer need
Michael Tremer [Thu, 21 Mar 2024 17:08:31 +0000 (18:08 +0100)] 
openvpnctrl: Remove the stuff we no longer need

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoinitscripts: Start the OpenVPN Authenticator, too
Michael Tremer [Thu, 21 Mar 2024 17:05:51 +0000 (18:05 +0100)] 
initscripts: Start the OpenVPN Authenticator, too

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoinitscripts: Add an initscript for OpenVPN RW
Michael Tremer [Thu, 21 Mar 2024 16:58:46 +0000 (17:58 +0100)] 
initscripts: Add an initscript for OpenVPN RW

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agofirewall: Split OpenVPN INPUT chains for RW & N2N
Michael Tremer [Thu, 21 Mar 2024 15:51:39 +0000 (16:51 +0100)] 
firewall: Split OpenVPN INPUT chains for RW & N2N

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove option to enable on ORANGE/BLUE
Michael Tremer [Thu, 21 Mar 2024 15:47:21 +0000 (16:47 +0100)] 
ovpnmain.cgi: Remove option to enable on ORANGE/BLUE

There is no point in not making this service available to any local
networks when it always has to be reachable from the Internet.

This still has to be reflected in the initscripts

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Migrate to subnet topology
Michael Tremer [Wed, 20 Mar 2024 19:38:52 +0000 (20:38 +0100)] 
ovpnmain.cgi: Migrate to subnet topology

For dynamic pools, this change is easy and does not require any extra
steps. For CCD clients however, we need to update the configuration to
replace the server IP address with the subnet mask.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Create functions to read CCD client/server routes
Michael Tremer [Wed, 20 Mar 2024 16:34:00 +0000 (17:34 +0100)] 
ovpnmain.cgi: Create functions to read CCD client/server routes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove comment that a restart is required
Michael Tremer [Wed, 20 Mar 2024 16:33:14 +0000 (17:33 +0100)] 
ovpnmain.cgi: Remove comment that a restart is required

This is incorrect as we can change CCD data without restarting the
server.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Refactor writing CCD files
Michael Tremer [Wed, 20 Mar 2024 16:20:16 +0000 (17:20 +0100)] 
ovpnmain.cgi: Refactor writing CCD files

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Drop validdotmask()
Michael Tremer [Wed, 20 Mar 2024 13:56:20 +0000 (14:56 +0100)] 
ovpnmain.cgi: Drop validdotmask()

This is a totally braindead function that prevented some basic usability
by using the more modern prefix notation. It simply checks if there is a
freaking dot. Great!

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Drop hostsinnet
Michael Tremer [Wed, 20 Mar 2024 13:45:14 +0000 (14:45 +0100)] 
ovpnmain.cgi: Drop hostsinnet

This is no longer needed as we can use the function that lists all
addresses that are in use and count them.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Refactor listing CCD addresses
Michael Tremer [Wed, 20 Mar 2024 13:42:27 +0000 (14:42 +0100)] 
ovpnmain.cgi: Refactor listing CCD addresses

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Refactor ccdmaxclients()
Michael Tremer [Wed, 20 Mar 2024 11:32:22 +0000 (12:32 +0100)] 
ovpnmain.cgi: Refactor ccdmaxclients()

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Refactor modccnet()
Michael Tremer [Wed, 20 Mar 2024 11:25:58 +0000 (12:25 +0100)] 
ovpnmain.cgi: Refactor modccnet()

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Refactor addccdnet()
Michael Tremer [Wed, 20 Mar 2024 11:12:00 +0000 (12:12 +0100)] 
ovpnmain.cgi: Refactor addccdnet()

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Move function to check CCD names here
Michael Tremer [Wed, 20 Mar 2024 10:36:23 +0000 (11:36 +0100)] 
ovpnmain.cgi: Move function to check CCD names here

This was in general-functions.pl for some reason.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Refactor function to remove a static pool
Michael Tremer [Wed, 20 Mar 2024 10:33:16 +0000 (11:33 +0100)] 
ovpnmain.cgi: Refactor function to remove a static pool

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove enabled marker files
Michael Tremer [Wed, 20 Mar 2024 10:21:58 +0000 (11:21 +0100)] 
ovpnmain.cgi: Remove enabled marker files

Nothing is using these any more.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove any left-over traces of DH replacement
Michael Tremer [Wed, 20 Mar 2024 10:15:18 +0000 (11:15 +0100)] 
ovpnmain.cgi: Remove any left-over traces of DH replacement

Since there is no way for the user to manipulate this any more, there is
no point in checking and showing the DH parameters.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove excess whitespace
Michael Tremer [Wed, 20 Mar 2024 10:12:37 +0000 (11:12 +0100)] 
ovpnmain.cgi: Remove excess whitespace

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove more dead code
Michael Tremer [Wed, 20 Mar 2024 10:09:39 +0000 (11:09 +0100)] 
ovpnmain.cgi: Remove more dead code

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Force NCP on clients
Michael Tremer [Tue, 19 Mar 2024 19:44:18 +0000 (20:44 +0100)] 
ovpnmain.cgi: Force NCP on clients

This change requires that all clients support NCP if they are set up
with a new connection. Existing clients remain supported using the
fallback cipher option.

This will result that connections with OpenVPN <= 2.3 cannot be set up
any more which is totally fine since that version is EOL.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoopenvpn: Update to 2.6.9
Michael Tremer [Tue, 19 Mar 2024 19:14:26 +0000 (19:14 +0000)] 
openvpn: Update to 2.6.9

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Completely remove compression for RW clients
Michael Tremer [Tue, 19 Mar 2024 19:11:31 +0000 (20:11 +0100)] 
ovpnmain.cgi: Completely remove compression for RW clients

We will use the "compress migrate" option which disables compression by
default. If a client has been found that wants to use compression, the
server will push "stub-v2" to disable it. If that does not work, the
server might fall back to compression.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Implement cipher negotiation for RW clients
Michael Tremer [Tue, 19 Mar 2024 18:32:50 +0000 (19:32 +0100)] 
ovpnmain.cgi: Implement cipher negotiation for RW clients

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove presetting removed options
Michael Tremer [Tue, 19 Mar 2024 17:38:34 +0000 (18:38 +0100)] 
ovpnmain.cgi: Remove presetting removed options

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove dead code
Michael Tremer [Tue, 19 Mar 2024 17:37:45 +0000 (18:37 +0100)] 
ovpnmain.cgi: Remove dead code

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Use SHA512 for hashing by default
Michael Tremer [Tue, 19 Mar 2024 17:37:24 +0000 (18:37 +0100)] 
ovpnmain.cgi: Use SHA512 for hashing by default

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Keep the fallback cipher disabled by default
Michael Tremer [Tue, 19 Mar 2024 17:36:42 +0000 (18:36 +0100)] 
ovpnmain.cgi: Keep the fallback cipher disabled by default

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Allow to disable the fallback cipher
Michael Tremer [Tue, 19 Mar 2024 17:32:25 +0000 (18:32 +0100)] 
ovpnmain.cgi: Allow to disable the fallback cipher

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Rename cipher selection to fallback cipher
Michael Tremer [Tue, 19 Mar 2024 17:26:27 +0000 (18:26 +0100)] 
ovpnmain.cgi: Rename cipher selection to fallback cipher

This is to keep ancient clients and clients that have NCP disabled
happy.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agolang: Update because of OpenVPN changes
Michael Tremer [Tue, 19 Mar 2024 17:04:20 +0000 (18:04 +0100)] 
lang: Update because of OpenVPN changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoCSS: Make all <select> and <textarea> use all available space
Michael Tremer [Tue, 19 Mar 2024 17:02:17 +0000 (18:02 +0100)] 
CSS: Make all <select> and <textarea> use all available space

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Fix the completely fucked table layout
Michael Tremer [Tue, 19 Mar 2024 16:57:39 +0000 (17:57 +0100)] 
ovpnmain.cgi: Fix the completely fucked table layout

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Move the cryptographic options to the advanced page
Michael Tremer [Tue, 19 Mar 2024 16:49:59 +0000 (17:49 +0100)] 
ovpnmain.cgi: Move the cryptographic options to the advanced page

Since we don't want people play too much with these, we move them to the
advanced settings page.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Fix resetting compression setting
Michael Tremer [Tue, 19 Mar 2024 16:14:03 +0000 (17:14 +0100)] 
ovpnmain.cgi: Fix resetting compression setting

The compression option was reset (disabled) when the Save button on the
main was being clicked.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove crypto error/warning boxes
Michael Tremer [Tue, 19 Mar 2024 16:11:00 +0000 (17:11 +0100)] 
ovpnmain.cgi: Remove crypto error/warning boxes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove authorship comments
Michael Tremer [Tue, 19 Mar 2024 15:58:30 +0000 (16:58 +0100)] 
ovpnmain.cgi: Remove authorship comments

These are not very useful.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Don't mess with the OpenVPN status file
Michael Tremer [Tue, 19 Mar 2024 15:51:29 +0000 (16:51 +0100)] 
ovpnmain.cgi: Don't mess with the OpenVPN status file

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Move things that belong together together
Michael Tremer [Tue, 19 Mar 2024 15:44:02 +0000 (16:44 +0100)] 
ovpnmain.cgi: Move things that belong together together

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Don't create CCD configuration files on every call
Michael Tremer [Tue, 19 Mar 2024 15:41:53 +0000 (16:41 +0100)] 
ovpnmain.cgi: Don't create CCD configuration files on every call

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Reorganise loading external modules
Michael Tremer [Tue, 19 Mar 2024 15:39:21 +0000 (16:39 +0100)] 
ovpnmain.cgi: Reorganise loading external modules

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Don't include lang.pl again when its already loaded in header.pl
Michael Tremer [Tue, 19 Mar 2024 15:38:54 +0000 (16:38 +0100)] 
ovpnmain.cgi: Don't include lang.pl again when its already loaded in header.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Don't load colours when they are already loaded in header.pl
Michael Tremer [Tue, 19 Mar 2024 15:38:19 +0000 (16:38 +0100)] 
ovpnmain.cgi: Don't load colours when they are already loaded in header.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove unused variable hack
Michael Tremer [Tue, 19 Mar 2024 15:34:51 +0000 (16:34 +0100)] 
ovpnmain.cgi: Remove unused variable hack

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Drop newcleanssldatabase()
Michael Tremer [Tue, 19 Mar 2024 15:32:33 +0000 (16:32 +0100)] 
ovpnmain.cgi: Drop newcleanssldatabase()

I have no idea why this was added when there is a function that does the
same already. The remove function also had typos in the path which
probably resulted in it not working very well.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Use the formatting function we already have
Michael Tremer [Tue, 19 Mar 2024 15:29:30 +0000 (16:29 +0100)] 
ovpnmain.cgi: Use the formatting function we already have

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Drop unused refresh code
Michael Tremer [Tue, 19 Mar 2024 15:19:37 +0000 (16:19 +0100)] 
ovpnmain.cgi: Drop unused refresh code

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Tidy up starting/restarting the RW server
Michael Tremer [Tue, 19 Mar 2024 15:18:44 +0000 (16:18 +0100)] 
ovpnmain.cgi: Tidy up starting/restarting the RW server

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Use default functions to check what subnets exist
Michael Tremer [Tue, 19 Mar 2024 15:10:40 +0000 (16:10 +0100)] 
ovpnmain.cgi: Use default functions to check what subnets exist

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Remove certificate warnings
Michael Tremer [Tue, 19 Mar 2024 15:02:34 +0000 (16:02 +0100)] 
ovpnmain.cgi: Remove certificate warnings

I believe that these don't really work and are always shown.
Please see #13634.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Fix some whitespace issues
Michael Tremer [Tue, 19 Mar 2024 14:54:07 +0000 (15:54 +0100)] 
ovpnmain.cgi: Fix some whitespace issues

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoovpnmain.cgi: Enable debugging
Michael Tremer [Tue, 19 Mar 2024 14:53:46 +0000 (15:53 +0100)] 
ovpnmain.cgi: Enable debugging

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agocore196: Ship OpenSSL
Michael Tremer [Mon, 2 Jun 2025 18:41:58 +0000 (18:41 +0000)] 
core196: Ship OpenSSL

This is being shipped because it has been rebuilt with GCC 15. There has
been reports on some systems that OpenSSL triggers some compiler bug and
therefore the openssl command tends to segfault a lot.

This is now being resolved with GCC 15.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
12 days agoMerge branch 'master' into next
Michael Tremer [Mon, 2 Jun 2025 16:01:32 +0000 (16:01 +0000)] 
Merge branch 'master' into next

12 days agolinux: Backport support for BIG TCP GSO on WireGuard
Michael Tremer [Sun, 1 Jun 2025 14:58:28 +0000 (14:58 +0000)] 
linux: Backport support for BIG TCP GSO on WireGuard

Advertise GSO_MAX_SIZE as TSO max size in order support BIG TCP for wireguard.
This helps to improve wireguard performance a bit when enabled as it allows
wireguard to aggregate larger skbs in wg_packet_consume_data_done() via
napi_gro_receive(), but also allows the stack to build larger skbs on xmit
where the driver then segments them before encryption inside wg_xmit().
We've seen a 15% improvement in TCP stream performance.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
13 days agocore196: Fix link to intel-microcode rootfile
Michael Tremer [Sun, 1 Jun 2025 14:56:26 +0000 (14:56 +0000)] 
core196: Fix link to intel-microcode rootfile

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoruby: Change archive type from xz to gz
Adolf Belka [Fri, 30 May 2025 21:48:55 +0000 (23:48 +0200)] 
ruby: Change archive type from xz to gz

- The gz archive has an sha256 sum for comparison. Th xz archive has nothing.
- Changed the source location to the one with gz file and sha256sum.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship ruby
Michael Tremer [Fri, 30 May 2025 14:15:13 +0000 (14:15 +0000)] 
core196: Ship ruby

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoruby: Update to version 3.4.4
Adolf Belka [Fri, 30 May 2025 12:38:17 +0000 (14:38 +0200)] 
ruby: Update to version 3.4.4

- This v2 version keeps the CFLAGS line in place
- Update from version 3.4.1 to 3.4.4
- Update of rootfile
- Changelog
    3.4.4
    YJIT: Split the block on optimized getlocal/setlocal by k0kubun · Pull
Request #13331
    Bug #21257: YJIT can generate infinite loop when OOM - Ruby - Ruby Issue
Tracking System
    Bug #21286: Windows - MSYS2 just updated to GCC 15.1.0, builds failing -
Ruby - Ruby Issue Tracking System
    Bug #21327: Windows builds seem broken after clock_gettime changes? -
Ruby - Ruby Issue Tracking System
    Bug #21331: heap-use-after-free caused by rehash during
transform_values! - Ruby - Ruby Issue Tracking System
    Bug #21289: Fix C level backtraces for USE_ELF - Ruby - Ruby Issue
Tracking System
    3.4.3
    Bug #21145: Prism accepts newlines in-between curly unicode escape -
Ruby - Ruby Issue Tracking System
    Bug #21153: ::Foo ||= p 1 should parse - Ruby - Ruby Issue Tracking System
    Bug #21030: Bug: #step with Range<ActiveSupport::Duration> behavior
broken on Ruby 3.4.1 - Ruby - Ruby Issue Tracking System
    Bug #21131: IO.copy_stream: yielded string changes value when duped -
Ruby - Ruby Issue Tracking System
    Feature #19521: Support for Module#name= and Class#name=. - Ruby - Ruby
Issue Tracking System
    Bug #21159: Module#set_temporary_name should freeze given name - Ruby -
Ruby Issue Tracking System
    Bug #21161: Crash when locale is set to Turkish tr_TR.UTF-8 - Ruby - Ruby
Issue Tracking System
    Bug #21144: Win32: Use Windows time zone ID as the time zone name if TZ
is not set - Ruby - Ruby Issue Tracking System
    Bug #21170: Corrupted Hash (bad VALUE and missing entry) when -1 returned
from .hash - Ruby - Ruby Issue Tracking System
    Bug #21172: Race condition in register_fstring - Ruby - Ruby Issue
Tracking System
    Bug #21163: Inconsistencies in Kernel.Float compared to other number
parsing methods - Ruby - Ruby Issue Tracking System
    Bug #21173: RUBY_FREE_AT_EXIT does not work when error in -r - Ruby -
Ruby Issue Tracking System
    Bug #21179: Introduction Happy Eyeballs Version 2 broke Socket.tcp from
secondary Ractors - Ruby - Ruby Issue Tracking System
    Bug #19841: Marshal.dump stack overflow with recursive Time - Ruby - Ruby
Issue Tracking System
    Bug #21180: SEGV while marking imemo_env->iseq - Ruby - Ruby Issue
Tracking System
    Bug #21186: Inconsistent parsing of ?あand 0 - Ruby - Ruby Issue Tracking
System
    Bug #21094: Module#set_temporary_name does not affect a name of a nested
module - Ruby - Ruby Issue Tracking System
    Bug #21195: Crash when using IO#timeout - Ruby - Ruby Issue Tracking System
    Bug #21196: Ruby 3.4 ignores visibility when passing arguments using ... -
Ruby - Ruby Issue Tracking System
    Bug #21141: Time#utc? does not work with a timezone object - Ruby - Ruby
Issue Tracking System
    Bug #21211: Incomplete Backtrace for Socket Errors in Ruby 3.4+ - Ruby -
Ruby Issue Tracking System
    Bug #21197: Prism does not accept newline after defined? keyword - Ruby -
Ruby Issue Tracking System
    Bug #21183: Ractor error with Prism::VERSION - Ruby - Ruby Issue Tracking
System
    Bug #21217: Integer.sqrt produces wrong results even on input <= 1e18 -
Ruby - Ruby Issue Tracking System
    Bug #21220: Memory corruption in update_line_coverage()
[write at index -1] - Ruby - Ruby Issue Tracking System
    3.4.2
    Bug #21024: Ruby including generates compilation warning with GCC 15,
header is deprecated in C++17,
    Bug #21021: "try to mark T_NONE object" with 3.4.1
    Bug #20997: YJIT panic assertion left == right failed: leave instruction
expects stack size 1, but was: 2
    Bug #20981: rb_undefine_finalizer is missing
    Bug #20989: Segmentation fault in Ripper when lexing /#{"\xcd"}/
    Bug #21003: unexpected warning about ignored block
    Bug #21002: Please include license information of turbo_tests
    Bug #21001: unexpected nil result from proc with ensure and next
    Bug #21010: Endless method definition of []= is SyntaxError in parse.y but
allowed in Prism
    Bug #20992: eval(ascii_encoded_code) raises EncodingError when multibyte
local variable exists
    Bug #21017: --with-parser=parse.y configure option does not work
    Bug #21014: Prism doesn't set node_id on iseqs correctly
    Bug #21027: not() receiver should be nil
    Bug #20995: exception escapes block given to IO.popen("-") in child process
    Bug #21008: Array#sum, Enumerator#sum, Numeric subclass
    Bug #21044: Prism maximum recursion depth is 1_000, parse.y is 10_000
    Bug #21031: Incompatibility with prism and parse.y when eval'ing unnamed
forwarding variables
    Bug #21085: [BUG] Stack consistency error with -ne
    Bug #21048: [Prism] rescue in modifier form with condition behaves
differently
    Bug #21046: Backport: TLS fix for ARM64
    Bug #21012: Compiling a['a','b'],=1 with parse.y fails
    Bug #21038: Preserve errno in rb_fiber_scheduler_unblock
    Bug #21032: Module#autoload? is slow when $LOAD_PATH contains a relative path
    Bug #21092: error building ruby 3.4.1 on cygwin/msys2
    Bug #21095: Prefer uname -n over hostname in tests.
    Bug #21103: Binding problem with delegate methods
    Bug #21088: TCPSocket.new raises Socket::ResolutionError instead of
Errno::ECONNREFUSED for hosts defined in /etc/hosts
    Bug #21112: Typo in error message when an incorrect key is used with
WeakKeyMap
    Bug #21117: Inconsistent behaviour between "_1" and "it" variables
    Bug #21114: Prism hangs up while parsing deeply nested def
    Bug #20984: ENV.inspect is not encoding aware
    Bug #20982: Inconsistency between Hash#inspect and ENV.inspect in Ruby 3.4

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agomanualpages: Fixbug13858 - Add doc link for Network/Aliases
Stephen Cuka [Thu, 29 May 2025 01:31:38 +0000 (19:31 -0600)] 
manualpages: Fixbug13858 - Add doc link for Network/Aliases

- Add missing documentation link for 'Network/Aliases'.

Signed-off-by: Stephen Cuka <stephen@firemypi.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship vim
Michael Tremer [Thu, 29 May 2025 10:23:33 +0000 (10:23 +0000)] 
core196: Ship vim

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agovim: Update to version 9.1.1406
Adolf Belka [Sat, 24 May 2025 14:36:54 +0000 (16:36 +0200)] 
vim: Update to version 9.1.1406

- Update from version 9.1.1153 to 9.1.1406
- Update of rootfile
- Changelog is not available. Generally each patch version number update is related to
   a commit entry in the git repository. The details for all the commit changes can be
   found at https://github.com/vim/vim/commits/master/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship dracut
Michael Tremer [Wed, 28 May 2025 16:27:10 +0000 (16:27 +0000)] 
core196: Ship dracut

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoipfire.conf: Fixes bug13836 - Change dracut default to no binary strip
Adolf Belka [Wed, 28 May 2025 15:57:40 +0000 (17:57 +0200)] 
ipfire.conf: Fixes bug13836 - Change dracut default to no binary strip

Fixes: #13836
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship backup.pl
Michael Tremer [Wed, 28 May 2025 14:14:54 +0000 (14:14 +0000)] 
core196: Ship backup.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agobackup: Also update MLKEM configuration if a backup is being restored
Michael Tremer [Wed, 28 May 2025 14:14:04 +0000 (14:14 +0000)] 
backup: Also update MLKEM configuration if a backup is being restored

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Don't break IPsec tunnels that use MLKEM
Michael Tremer [Wed, 28 May 2025 14:11:07 +0000 (14:11 +0000)] 
core196: Don't break IPsec tunnels that use MLKEM

The previous patch was changing the string regardless of it having been
changed before. The CGI script also has to be called as nobody.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoCore Update 196: Adjust existing IPsec connections using ML-KEM
Peter Müller [Mon, 26 May 2025 18:28:00 +0000 (18:28 +0000)] 
Core Update 196: Adjust existing IPsec connections using ML-KEM

This causes existing IPsec connections using ML-KEM to always use it in
conjunction with Curve 25519, in line with the changes dfa7cd2bbac3c746569368d70fefaf1ff4e1fed2
implements for newly configured IPsec connections.

Again, we can reasonably assume an IPsec peer supporting ML-KEM also
supports Curve 25519. In case such a peer does not support RFC 9370, and
the IPsec connection was created using our default ciphers, it will fall
back to Curve 448, Curve 25519, or any other traditional algorithm.

This patch will break existing IPsec connections only if they are
exclusively using ML-KEM (which means the IPFire user reconfigured them
manually using the "advanced connection settings" section in the WebUI),
and the IPsec peer is configured in the same manner, and/or is an IPFire
machine not yet updated to Core Update 196. Any other IPFire-to-IPFire
IPsec connection will continue working, potentially falling back to
Curve 448 or 25519 until both peers are updated to Core Update 196,
after which ML-KEM in conjunction with Curve 25519 will be used again.

The second version of this patch modifies IPFire's own configuration
file for IPsec connections, rather than applying these changes directly
to /etc/ipsec.conf, where they would have been overwritten by the next
WebUI change.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agovpnmain.cgi: Use ML-KEM only as a hybrid with Curve 25519
Peter Müller [Mon, 26 May 2025 18:27:00 +0000 (18:27 +0000)] 
vpnmain.cgi: Use ML-KEM only as a hybrid with Curve 25519

In commit 887778e0888d51eb9942ae310a43f6d2813efad3, the post-quantum
key exchange algorithm ML-KEM was introduced, due to its support being
added in strongSwan 6.0. However, using PQC key exchanges is commonly
recommended only in conjunction with a traditional one, to avoid
encrypted traffic becoming subject to trivial decryption in case a PQC
algorithm proves weak, broken, or backdoored. OpenSSH, for instance,
combines ML-KEM 768 with Curve 25519 (mlkem768x25519-sha256), rather
than using ML-KEM alone.

This patch changes the cipher suites offered for IPsec connections to
always use ML-KEM as a hybrid with Curve 25519. This is possible due to
strongSwan 6.0 having added support for IKE intermediary key exchanges
(RFC 9370); see https://docs.strongswan.org/docs/latest/config/proposals.html#_key_exchange_methods
for additional information.

We can reasonably assume an IPsec peer supporting ML-KEM will also
support Curve 25519, as this has been around for much longer, and is
used quite commonly. Even if this is not the case, or if the IPsec peer
does not implement RFC 9370, any IPsec connection using our default
cipher selection will fall back to Curve 448, Curve 25519, or other,
hence continue working.

IPsec connections already created will need their ciphers to be changed
once during the Core Update routine where this patch will be
incorporated.

Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship header.pl
Michael Tremer [Wed, 28 May 2025 09:27:44 +0000 (09:27 +0000)] 
core196: Ship header.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoheader.pl: Fixbug13857 - Disable Blue Access submenu if no BLUE network
Stephen Cuka [Wed, 28 May 2025 06:42:23 +0000 (00:42 -0600)] 
header.pl: Fixbug13857 - Disable Blue Access submenu if no BLUE network

- Fix reference to BlueAccess menu item so that it is disabled
   when BLUE network is not in use.

Signed-off-by: Stephen Cuka <stephen@firemypi.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agodnsdist: Update to 1.9.10
Michael Tremer [Fri, 23 May 2025 15:23:25 +0000 (15:23 +0000)] 
dnsdist: Update to 1.9.10

We released PowerDNS DNSdist 1.9.10 today, fixing several bugs including a security issue tracked as CVE-2025-30193 where a remote, unauthenticated attacker can cause a denial of service via a crafted TCP connection. The issue was reported to us via our public IRC channel so once it was clear that the issue had a security impact we prepared to release a new version as soon as possible.

While we advise upgrading to a fixed version, a work-around is to temporarily restrict the number of queries that DNSdist is willing to accept over a single incoming TCP connection, via the setMaxTCPQueriesPerConnection directive. Setting it to 50 is a safe choice that does not impact performance in our tests.

https://www.dnsdist.org/changelog.html#change-1.9.10

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship boost
Michael Tremer [Tue, 27 May 2025 16:42:52 +0000 (16:42 +0000)] 
core196: Ship boost

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoboost: Update to version 1.88.0
Adolf Belka [Tue, 27 May 2025 14:25:10 +0000 (16:25 +0200)] 
boost: Update to version 1.88.0

- Update from version 1.83.0 to 1.88.0
- Update of rootfiles for all architectures
- Changelogs are very large so urls provided for each release changelog
    1.88.0
https://www.boost.org/releases/1.88.0/
    1.87.0
https://www.boost.org/releases/1.87.0/
    1.86.0
https://www.boost.org/releases/1.86.0/
    1.85.0
https://www.boost.org/releases/1.85.0/
    1.84.0
https://www.boost.org/releases/1.84.0/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocollectd: Remove old version patches no longer used
Adolf Belka [Tue, 27 May 2025 08:28:32 +0000 (10:28 +0200)] 
collectd: Remove old version patches no longer used

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoMerge branch 'master' into next
Michael Tremer [Mon, 26 May 2025 10:00:23 +0000 (10:00 +0000)] 
Merge branch 'master' into next

2 weeks agolangs: Update Spanish translation
Roberto Peña [Mon, 26 May 2025 09:56:42 +0000 (09:56 +0000)] 
langs: Update Spanish translation

  https://community.ipfire.org/t/es-pl-updated-with-new-changes-wireguard-and-other/14107

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship index.cgi and WireGuard changes
Michael Tremer [Mon, 26 May 2025 09:47:21 +0000 (11:47 +0200)] 
core196: Ship index.cgi and WireGuard changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Sort filelist alphanumerically
Michael Tremer [Mon, 26 May 2025 09:46:35 +0000 (11:46 +0200)] 
core196: Sort filelist alphanumerically

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoindex.cgi: Use correct string for "WireGuard"
Michael Tremer [Mon, 26 May 2025 09:45:34 +0000 (11:45 +0200)] 
index.cgi: Use correct string for "WireGuard"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoindex.cgi: Translate "Online"
Michael Tremer [Mon, 26 May 2025 09:44:30 +0000 (11:44 +0200)] 
index.cgi: Translate "Online"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoindex.cgi: Show the WireGuard client pool
Michael Tremer [Mon, 26 May 2025 09:39:28 +0000 (11:39 +0200)] 
index.cgi: Show the WireGuard client pool

This is in line with the other Roadwarrior pools.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoindex.cgi: Show WireGuard status using the function library
Michael Tremer [Mon, 26 May 2025 09:38:57 +0000 (11:38 +0200)] 
index.cgi: Show WireGuard status using the function library

The settings file is also loaded all the time and we don't need to load
it again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoindex.cgi: Add wireguard status to home screen
Adolf Belka [Sun, 25 May 2025 11:35:01 +0000 (13:35 +0200)] 
index.cgi: Add wireguard status to home screen

- This fix adds a wireguard line to show when it is enabled.
- This fix does not show a table for any net2net connections that are enabled. I have
   started working on that but as I only have an OpenVPN n2n connection in place, I can't
   test out the copy of the ipsec n2n code section that I have made. I need to get ipsec
   and wireguard n2n connections working first.
- If someone else wants to provide a patch for the wireguard n2n connections tables I have
   no problems with that. If not then I will submit one when I have been able to test it.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agowireguard-functions.pl: Add a simple function to check if enabled
Michael Tremer [Mon, 26 May 2025 09:31:54 +0000 (11:31 +0200)] 
wireguard-functions.pl: Add a simple function to check if enabled

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoMerge branch 'master' into next
Michael Tremer [Mon, 26 May 2025 09:19:54 +0000 (09:19 +0000)] 
Merge branch 'master' into next

2 weeks agocore195: Ship manual pages for the web UI
Michael Tremer [Mon, 26 May 2025 09:12:52 +0000 (09:12 +0000)] 
core195: Ship manual pages for the web UI

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agomanualpages: Fixes bug13849 - adds manual link to wireguard page
Adolf Belka [Sat, 17 May 2025 12:12:17 +0000 (14:12 +0200)] 
manualpages: Fixes bug13849 - adds manual link to wireguard page

Fixes: bug13849
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship texinfo
Michael Tremer [Mon, 26 May 2025 09:10:34 +0000 (09:10 +0000)] 
core196: Ship texinfo

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agotexinfo: Update to version 7.2
Adolf Belka [Sat, 24 May 2025 14:36:53 +0000 (16:36 +0200)] 
texinfo: Update to version 7.2

- Update from version 7.1.1 to 7.2
- Update of rootfile
- Changelog
    7.2
* Build
  . "make install" installs files for texi2any under $datadir/texi2any, not
    $datadir/texinfo.
* texinfo.tex
  . use @ as the escape character in all index files.  this requires
    new enough texi2dvi (Texinfo 6.7, 2019) for index files to be
    properly processed.
  . a bug has been fixed where a mangled PDF outline could be produced for
    a document using @unnumberedsec
  . you can call @unmacro with an undefined macro name, matching the
    behavior of texi2any
* texi2any
  . set CHECK_NORMAL_MENU_STRUCTURE by default.  this means texi2any
    again checks menu structure by default (changed in 6.8 release, 2021).
  . only allow @definfoenclose to be used to redefine highlighting commands
  . sorting of indices is now independent of the input or output encodings
  . new customization variable COLLATION_LANGUAGE to allow linguistic
    tailoring of index sorting
  . new variable DOCUMENTLANGUAGE_COLLATION to use @documentlanguage for
    linguistic tailoring of index sorting
  . new variable USE_UNICODE_COLLATION to allow turning off the slower
    use of Unicode collation when sorting indices
  . rename BODYTEXT customization variable to BODY_ELEMENT_ATTRIBUTES
  . rename COMPLEX_FORMAT_IN_TABLE customization variable to
    INDENTED_BLOCK_COMMANDS_IN_TABLE
  . remove the following variables: AVOID_MENU_REDUNDANCY, FRAMES,
    FRAMESET_DOCTYPE, NO_USE_SETFILENAME, SILENT, USE_UP_NODE_FOR_ELEMENT_UP
  . remove SIMPLE_MENU variable and tree transformation
  . the use of the directories ~/.texinfo and ~/.texi2any for configuration
    files is deprecated, and should be replaced by texinfo or texi2any
    directories under XDG_CONFIG_HOME (usually ~/.config/).  the new
    locations are compatible with the XDG Base Directory Specification.
    in future versions, the ~/.texinfo and ~/.texi2any directories will
    not be in search paths.
  . do not try the us-ascii encoding anymore as a locale for translated
    document strings.
  . some unused translation files have been removed for the
    `texinfo_document' domain
  . Info output:
      . output Info-documentlanguage in Local Variables section of output
        file if @documentlanguage is given
  . HTML, Texinfo and raw text output:
      . an implementation of the conversion in C has been included, which
        is much faster than the code in Perl. set the `TEXINFO_XS_CONVERT'
        environment variable to 1 to use.
  . HTML output:
      . CHECK_HTMLXREF set by default for warnings about links to unknown
        external manuals
      . you can use the MATHJAX_CONFIGURATION customization variable to add
        data to the MathJax configuration object
      . warn if there is a .inf or .info suffix for cross-reference manual
      . use <pre> instead of <div><em> for output of @displaymath
      . remove border, cellpadding, cellspacing and align attributes.  add
        classes and use CSS when needed.
  . EPUB output:
      . stricter conformance for conformance checkers
* info
  . check for init file under XDG_CONFIG_HOME/texinfo/infokey after
    checking ~/.infokey, in accordance with the XDG Base Directory
    Specification
* Distribution
  . automake 1.17, autoconf 2.72, gettext 0.22.5, libtool 2.5.3

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship gperf
Michael Tremer [Mon, 26 May 2025 09:09:54 +0000 (09:09 +0000)] 
core196: Ship gperf

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agogperf: Update to version 3.3
Adolf Belka [Sat, 24 May 2025 14:36:48 +0000 (16:36 +0200)] 
gperf: Update to version 3.3

- Update from version 3.1 to 3.3
- Update of rootfile not required
- Changelog
    3.3
* Speedup: gperf is now between 2x and 2.5x faster.
    3.2.1
* The generated code avoids -Wundef warnings in C++ mode.
    3.2
* The input file may now use Windows line terminators (CR/LF) instead of
  Unix line terminators (LF).
  Note: This is an incompatible change. If you want to use a keyword that
  ends in a CR byte, such as xyz<CR>, write it as "xyz\r".
* The generated code avoids several types of warnings:
  - "implicit fallthrough" warnings in 'switch' statements.
  - "unused parameter" warnings regarding 'str' or 'len'.
  - "missing initializer for field ..." warnings.
  - "zero as null pointer constant" warnings.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship elfutils
Michael Tremer [Mon, 26 May 2025 09:09:26 +0000 (09:09 +0000)] 
core196: Ship elfutils

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoelfutils: Update to version 0.193
Adolf Belka [Sat, 24 May 2025 14:36:47 +0000 (16:36 +0200)] 
elfutils: Update to version 0.193

- Update from version 0.192 to 0.193
- Update of rootfile
- Changelog
    0.193
debuginfod: Add CORS (webapp access) support to webapi and --cors option.
    Add --listen-address option for binding the HTTP listen socket
     to a specific IPv4 or IPv6 address.
    debuginfod client now caches x-debuginfod-* HTTP headers
     alongside downloaded files.
libdw: Add dwarf_language and dwarf_language_lower_bound functions.
       Improved support for DWARF6 language metadata as well as DWARF
        language constants for Nim, Dylan, Algol68, V and Mojo.
       dwarf_srclang is now forward-compatible with DWARF6 language
        constants.
libdwfl_stacktrace: Experimental new library interface for unwinding
    stack samples into call chains, and tracking and
    caching Elf data for multiple processes, building
    on libdwfl.  Initially supports perf_events stack
    sample data.
libelf: elf_scnshndx has been rewritten to be more robust, particularily
        for ELF files with more than 64K sections.
readelf: Improved handling of corrupt ELF data.
 --section-headers output now includes a "Key to Flags" explaining
 section flag meanings.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoRevert "libgcrypt: Update to version 1.11.1"
Michael Tremer [Mon, 26 May 2025 09:07:14 +0000 (09:07 +0000)] 
Revert "libgcrypt: Update to version 1.11.1"

This reverts commit 9b163cfe595d0215957e6ef06ea34780c207d1a6.

This package FTBFS on riscv64. A header file with special SIMD functions
has not been shipped with the release tarball. This has been fixed
upstream, but a new tarball has not been released. yet:

  https://github.com/gpg/libgcrypt/commit/b100dd25eb6821d58851c2b802bfe9ef2f441228

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agoscreen: Update to version 5.0.1
Adolf Belka [Fri, 23 May 2025 16:03:44 +0000 (18:03 +0200)] 
screen: Update to version 5.0.1

- This v2 version is with the correct tarball, without the binary object files.
- Update from version 5.0.0 to 5.0.1
- Update of rootfile
- 5 CVE fixes included in this version
- Changelog
    5.0.1
Security fix
    CVE-2025-46805: do NOT send signals with root privileges
    CVE-2025-46804: avoid file existence test information leaks
    CVE-2025-46803: apply safe PTY default mode of 0620
    CVE-2025-46802: prevent temporary 0666 mode on PTYs in attacher
    CVE-2025-23395: reintroduce lf_secreopen() for logfile
    buffer overflow due bad strncpy()
    uninitialized variables warnings
    typos
    combining char handling that could lead to a segfault

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship whois
Michael Tremer [Sun, 25 May 2025 11:54:54 +0000 (11:54 +0000)] 
core196: Ship whois

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agowhois: Update to version 5.6.1
Adolf Belka [Sat, 24 May 2025 14:36:55 +0000 (16:36 +0200)] 
whois: Update to version 5.6.1

- Update from version 5.5.23 to 5.6.1
- Update of rootfile not required
- Changelog
    5.6.1
  * Added the .pg TLD server.
  * Updated the .gov, .mu, .中国 (.xn--fiqs8s) and .中國 (.xn--fiqz9s)
    TLD servers.
  * Removed the .jobs TLD server.
  * Added the encodings for whois.afrinic.net and whois.apnic.net.
  * Enabled the UTF-8 encoding for whois.ripe.net.
  * Use the last ReferralServer returned by the ARIN server instead of
    the first, because we want to follow the referral for the most
    specific record returned.
  * Make sure to avoid trivial referral loops.
    5.6.0
  * Fixed the mangling of RADB queries with commands.
  * Implemented the parsing of more variants of ARIN's ReferralServer
    field.
  * Implemented following the APNIC pseudo-referrals.
  * Added the .ad and .za TLD servers.
  * Updated the .ao, .bz, .gi, .gq, .gr, .gw, .lc, .md, .pn, .pr, .uy, .vc,
    .info, .mobi, .ελ (.xn--qxam, Greece) and .გე (.xn--node, Georgia) TLD
    servers.
  * Added 2410::/12.
  * Removed 7 new gTLDs which are no longer active.
  * Cleaned up the markup of the man pages, courtesy of Bjarni Ingi
    Gislason. (Closes: #1036826, #1094208)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agocore196: Ship meson
Michael Tremer [Sun, 25 May 2025 11:54:36 +0000 (11:54 +0000)] 
core196: Ship meson

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>