]> git.ipfire.org Git - people/mfischer/ipfire-2.x.git/log
people/mfischer/ipfire-2.x.git
9 months agocore189: Ship GnuTLS
Michael Tremer [Fri, 23 Aug 2024 09:57:55 +0000 (09:57 +0000)] 
core189: Ship GnuTLS

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agognutls: Update to version 3.8.7
Adolf Belka [Wed, 21 Aug 2024 18:45:13 +0000 (20:45 +0200)] 
gnutls: Update to version 3.8.7

- Update from version 3.8.5 to 3.8.7
- Update of rootfile
- Changelog
    3.8.7
** libgnutls: New configure option to compile out DSA support
   The --disable-dsa configure option has been added to completely disable DSA
   algorithm support.
** libgnutls: Experimental support for X25519Kyber768Draft00 key exchange in TLS
   For testing purposes, the hybrid post-quantum key exchange defined
   in draft-tls-westerbaan-xyber768d00 has been implemented using
   liboqs. Since the algorithm is still not finalized, the support of
   this key exchange is disabled by default and can be enabled with
   the --with-liboqs configure option.
    3.8.6
** libgnutls: PBMAC1 is now supported as a MAC mechanism for PKCS#12
   To be compliant with FIPS 140-3, PKCS#12 files with MAC based on
   PBKDF2 (PBMAC1) is now supported, according to the specification
   proposed in draft-ietf-lamps-pkcs12-pbmac1.
** libgnutls: SHA3 extendable output functions (XOF) are now supported
   SHA3 XOF, SHAKE128 and SHAKE256, are now usable through a new
   public API gnutls_hash_squeeze.
** API and ABI modifications:
gnutls_pkcs12_generate_mac3: New function
gnutls_pkcs12_flags_t: New enum
gnutls_hash_squeeze: New function

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agobinutils: Update to version 2.43
Adolf Belka [Wed, 21 Aug 2024 18:45:12 +0000 (20:45 +0200)] 
binutils: Update to version 2.43

- Update from version 2.42 to 2.43
- Update of rootfile (x86_64 & aarch64)
- Changelog
    2.43
* Update copyright years
* config.sub: recognize nanoMIPS CPUs
* config.guess: recognize ironclad OS
* config.sub: recognize ironclad OS
* config.sub: recognize *-*-uefi
* Recognize the VideoCore 4 processor
* config.guess: detect LLVM-libc via features.h
* config.sub: add LLVM-libc support
* .pre-commit-config.yaml: Bump black hook to 24.3.0
* .pre-commit-config.yaml: New.
* Makefile.def: Add configure-gdbserver and all-gdbserver
  dependencies on all-libiconv.
* Makefile.in: Re-generate.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship the new toolchain
Michael Tremer [Fri, 23 Aug 2024 09:55:56 +0000 (09:55 +0000)] 
core189: Ship the new toolchain

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoStart Core Update 189
Michael Tremer [Fri, 23 Aug 2024 09:53:22 +0000 (09:53 +0000)] 
Start Core Update 189

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoMerge remote-tracking branch 'ms/toolchain-2024-08-02' into next
Michael Tremer [Fri, 23 Aug 2024 09:51:19 +0000 (09:51 +0000)] 
Merge remote-tracking branch 'ms/toolchain-2024-08-02' into next

9 months agomake.sh: Integrate the rootfile consistency check
Michael Tremer [Fri, 23 Aug 2024 09:50:39 +0000 (09:50 +0000)] 
make.sh: Integrate the rootfile consistency check

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Refactor the broken rootfile check
Michael Tremer [Fri, 23 Aug 2024 09:33:31 +0000 (09:33 +0000)] 
make.sh: Refactor the broken rootfile check

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoRun "./make.sh lang"
Michael Tremer [Fri, 23 Aug 2024 09:22:17 +0000 (09:22 +0000)] 
Run "./make.sh lang"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Fix printing the total build time
Michael Tremer [Fri, 23 Aug 2024 09:19:49 +0000 (09:19 +0000)] 
make.sh: Fix printing the total build time

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoRevert "make.sh: Swap mount propagation"
Michael Tremer [Wed, 21 Aug 2024 14:36:11 +0000 (14:36 +0000)] 
Revert "make.sh: Swap mount propagation"

This reverts commit f3c360cd6e8daf0431f684bfad9c55f64bad6c7f.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Remove the brackets from build options
Michael Tremer [Wed, 21 Aug 2024 14:29:58 +0000 (14:29 +0000)] 
make.sh: Remove the brackets from build options

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore188: Ship suricata and arping because of SO bump in libnet
Michael Tremer [Wed, 21 Aug 2024 10:38:24 +0000 (10:38 +0000)] 
core188: Ship suricata and arping because of SO bump in libnet

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore188: Ship lang.pl
Michael Tremer [Wed, 21 Aug 2024 14:17:22 +0000 (16:17 +0200)] 
core188: Ship lang.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoguardian.cgi: Use the new service widget
Michael Tremer [Wed, 21 Aug 2024 14:14:40 +0000 (16:14 +0200)] 
guardian.cgi: Use the new service widget

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoheader.pl: Fix language loading
Michael Tremer [Wed, 21 Aug 2024 14:02:42 +0000 (16:02 +0200)] 
header.pl: Fix language loading

We have been importing the language files many times when they are
actually rather slow. This just tidies this up.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoheader.pl: Remove an unused variable
Michael Tremer [Wed, 21 Aug 2024 14:02:13 +0000 (16:02 +0200)] 
header.pl: Remove an unused variable

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agolang.pl: Fix all sorts of whitespace issues
Michael Tremer [Wed, 21 Aug 2024 14:01:40 +0000 (16:01 +0200)] 
lang.pl: Fix all sorts of whitespace issues

No functional changes.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoindex.cgi: Improve the warning box
Michael Tremer [Wed, 21 Aug 2024 13:47:08 +0000 (15:47 +0200)] 
index.cgi: Improve the warning box

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosamba.cgi: Fix styling of the configuration form
Michael Tremer [Wed, 21 Aug 2024 13:25:13 +0000 (15:25 +0200)] 
samba.cgi: Fix styling of the configuration form

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosamba.cgi: Use the new service status widget
Michael Tremer [Wed, 21 Aug 2024 13:20:51 +0000 (15:20 +0200)] 
samba.cgi: Use the new service status widget

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agofirewall.cgi: Fix messy table striping
Michael Tremer [Wed, 21 Aug 2024 13:11:59 +0000 (15:11 +0200)] 
firewall.cgi: Fix messy table striping

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoCSS: Make the black less agressive
Michael Tremer [Wed, 21 Aug 2024 10:35:55 +0000 (12:35 +0200)] 
CSS: Make the black less agressive

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoservices.cgi: Search for suricata by its PID
Michael Tremer [Wed, 21 Aug 2024 10:24:24 +0000 (12:24 +0200)] 
services.cgi: Search for suricata by its PID

suricata renames itself and therefore we cannot find the process by its
name.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agovpnmain.cgi: Fix colouring of the connection status when disconnected
Michael Tremer [Wed, 21 Aug 2024 10:22:40 +0000 (12:22 +0200)] 
vpnmain.cgi: Fix colouring of the connection status when disconnected

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agounbound-dhcp-leases-bridge: Watch unbound
Michael Tremer [Wed, 21 Aug 2024 09:10:33 +0000 (10:10 +0100)] 
unbound-dhcp-leases-bridge: Watch unbound

This patch adds a watcher thread which monitors if Unbound is still
alive. If not, it will wait until Unbound comes back, rewrite the leases
file and reload Unbound to get it back into sync.

Afterwards Unbound will receive updates as usual.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Remove all traces of KCFG
Michael Tremer [Tue, 20 Aug 2024 16:08:32 +0000 (16:08 +0000)] 
make.sh: Remove all traces of KCFG

This variable is no longer been used and has been abused way too much in
the past. May it rest in pieces.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agortl8812au: Fix build with updated KVER
Michael Tremer [Tue, 20 Aug 2024 16:08:16 +0000 (16:08 +0000)] 
rtl8812au: Fix build with updated KVER

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoRevert "make.sh: Fix build with kernels < 6.0.0"
Michael Tremer [Tue, 20 Aug 2024 08:39:24 +0000 (08:39 +0000)] 
Revert "make.sh: Fix build with kernels < 6.0.0"

This reverts commit 8ea702f3f853c4c28a2885dafdcae2e737c0a49b.

This commit seems to introduce many more regressions when building
packages which I cannot easily reproduce.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore188: Ship the network AQM script
Michael Tremer [Mon, 19 Aug 2024 18:17:12 +0000 (18:17 +0000)] 
core188: Ship the network AQM script

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoAQM: Revert back to only use fq_codel by default
Michael Tremer [Mon, 19 Aug 2024 18:13:19 +0000 (19:13 +0100)] 
AQM: Revert back to only use fq_codel by default

We have defaulted to CAKE for all devices that quality. That has however
resulted in worse network quality as some devices could not provide the
compute power necessary for CAKE. There are however only very few
benefits to run an unconfigured CAKE.

This patch changes this back to fq_codel which is computationally
cheaper and should deliver 99% of the throughput that CAKE does. This is
presumably the better trade-off.

We don't use fq_codel on wireless devices since the kernel is running
this for each client. It would have been nice to only apply this to
wireless interfaces in AP mode, but I cannot find a way to tell the
difference with asking NETLINK.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore188: Ship backup.pl
Michael Tremer [Mon, 19 Aug 2024 18:11:02 +0000 (18:11 +0000)] 
core188: Ship backup.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agobackup.pl: Use a sane timestamp format
Michael Tremer [Mon, 19 Aug 2024 18:10:12 +0000 (18:10 +0000)] 
backup.pl: Use a sane timestamp format

I don't think it is nice to mix underscare and dash.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agobackup.pl: Fixes bug13734 - tar treats colon in filename as remote location
Adolf Belka [Wed, 7 Aug 2024 14:02:20 +0000 (16:02 +0200)] 
backup.pl: Fixes bug13734 - tar treats colon in filename as remote location

- When a user tries to restore on the console from a backup on IPFire that has a colon in
   the filename the tar treats this as meaning that everything after the colon is
   information about a remote location to do the extraction to. This results in a filename
   that cannot be found, and a remote location that is not correct and the tar operation
   fails.
- This has been confirmed by myself.
- If the user tries a restore from a file downloaded to another computer then for most, if
   not all browsers, the colon will have been replaced by an underscore or other character.
   Firefox, Chromium and Vivaldi do this.
- So any backup file that is selected to be restored using the WUI will no longer have a
   colon in the filename.
- This patch adds --force-local to the tar command, which means that tar will treat the
   colon as a character in the filename. This will ensure that if a user has any backup
   files stored on their IPFire system, with a colon in the filename then doing a restore
   from this file will not cause tar to fail.
- The NOW variable is also changed to replace the colon by a dash and to separate the date
   and time by an underscore. This filename will be accepted by browsers, without doing
   any replacements. Tested out with Firefox, Chromium & Vivaldi.
- The above ensures that both the new and old filename versions will work for doing a
   restore.

Fixes: bug13734
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agolinux: Don't reset CFLAGS/CXXFLAGS
Michael Tremer [Mon, 19 Aug 2024 10:10:48 +0000 (10:10 +0000)] 
linux: Don't reset CFLAGS/CXXFLAGS

The kernel's build system uses its own CFLAGS for building the kernel
but for the tooling we want to use our own CFLAGS.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agolinux: Tidy up the messy KVER variable
Michael Tremer [Mon, 19 Aug 2024 10:10:47 +0000 (10:10 +0000)] 
linux: Tidy up the messy KVER variable

This variable never actually held the kernel version. There were always
suffixes appended and other things changed about it. This makes it a lot
simpler as this variable now holds the actual kernel version.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Fix variable name
Michael Tremer [Mon, 19 Aug 2024 15:44:57 +0000 (15:44 +0000)] 
make.sh: Fix variable name

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Fix build with kernels < 6.0.0
Michael Tremer [Mon, 19 Aug 2024 18:06:23 +0000 (18:06 +0000)] 
make.sh: Fix build with kernels < 6.0.0

unshare(8) seems to fail with kernels older than 6.0.0 when mounting
the /proc filesystem in the inner namespace. This seems to be an bug
where unshare does not even try to mount the /proc filesystem but tries
to make its mount propagation private.

This is now solved in that way that we will use unshare on newer kernels
but will fall back on manually mounting the /proc filesystem once we have
entered the chroot environment.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Swap mount propagation
Michael Tremer [Mon, 19 Aug 2024 18:05:16 +0000 (18:05 +0000)] 
make.sh: Swap mount propagation

When we create the outer mount namespace, we still want to receive any
mounts from the host system which is why we set it to slave.

The second mount namespace should be a copy of the outer one but should not
propagate anything back to the outer mount namespace.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agokernel: remove obsolete asix patch
Arne Fitzenreiter [Mon, 19 Aug 2024 15:24:30 +0000 (17:24 +0200)] 
kernel: remove obsolete asix patch

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
9 months agokernel: update to 6.6.47
Arne Fitzenreiter [Mon, 19 Aug 2024 15:24:09 +0000 (17:24 +0200)] 
kernel: update to 6.6.47

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
9 months agoflash-images: Increase the size of the root partition
Michael Tremer [Mon, 19 Aug 2024 13:02:38 +0000 (13:02 +0000)] 
flash-images: Increase the size of the root partition

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agognupg: This package no longer seems to be able to link against LDAP
Michael Tremer [Fri, 16 Aug 2024 15:50:21 +0000 (15:50 +0000)] 
gnupg: This package no longer seems to be able to link against LDAP

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agolcdproc: Fix build with GCC 14
Michael Tremer [Wed, 14 Aug 2024 09:23:59 +0000 (09:23 +0000)] 
lcdproc: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agotelnet: Fix build with GCC 14
Michael Tremer [Wed, 14 Aug 2024 09:22:10 +0000 (09:22 +0000)] 
telnet: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agotftpd: Fix build with GCC 14
Michael Tremer [Wed, 7 Aug 2024 15:00:51 +0000 (15:00 +0000)] 
tftpd: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosyslinux: Fix build with GCC 14
Michael Tremer [Wed, 7 Aug 2024 15:00:33 +0000 (15:00 +0000)] 
syslinux: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocollectd: Ignore compiler errors
Michael Tremer [Wed, 7 Aug 2024 14:40:57 +0000 (14:40 +0000)] 
collectd: Ignore compiler errors

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoghostscript: Fix compilation with GCC 14
Michael Tremer [Tue, 6 Aug 2024 13:57:39 +0000 (13:57 +0000)] 
ghostscript: Fix compilation with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosquidguard: Fix compliation with GCC 14
Michael Tremer [Tue, 6 Aug 2024 13:57:11 +0000 (13:57 +0000)] 
squidguard: Fix compliation with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoberkeley: Fix build with GCC 14
Michael Tremer [Tue, 6 Aug 2024 09:50:49 +0000 (09:50 +0000)] 
berkeley: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoautoconf-archive: New package
Michael Tremer [Tue, 6 Aug 2024 09:49:37 +0000 (09:49 +0000)] 
autoconf-archive: New package

These macros are needed to run autoreconf for db-5.3.28.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosetup: Fix compilation issues with GCC 14
Michael Tremer [Tue, 6 Aug 2024 08:56:43 +0000 (08:56 +0000)] 
setup: Fix compilation issues with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agontp: Fix build with GCC 14
Michael Tremer [Mon, 5 Aug 2024 16:48:10 +0000 (16:48 +0000)] 
ntp: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agowhatmask: Fix build with GCC 14
Michael Tremer [Mon, 5 Aug 2024 16:47:44 +0000 (16:47 +0000)] 
whatmask: Fix build with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomisc-progs: Fix compilation with GCC 14
Michael Tremer [Mon, 5 Aug 2024 16:47:22 +0000 (16:47 +0000)] 
misc-progs: Fix compilation with GCC 14

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoGCC: Update to 14.2.0
Michael Tremer [Fri, 2 Aug 2024 17:04:24 +0000 (17:04 +0000)] 
GCC: Update to 14.2.0

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Bump the toolchain version
Michael Tremer [Fri, 2 Aug 2024 17:01:41 +0000 (17:01 +0000)] 
make.sh: Bump the toolchain version

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoglibc: Update to 2.40
Michael Tremer [Fri, 2 Aug 2024 16:47:15 +0000 (16:47 +0000)] 
glibc: Update to 2.40

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocoreutils: Drop uname patch
Michael Tremer [Fri, 2 Aug 2024 15:27:58 +0000 (15:27 +0000)] 
coreutils: Drop uname patch

This is a patch that has been backported from Gentoo for quite a while
now. However, I did not forget why. And now it won't build with GCC 14,
and since I don't remember why we needed this, I would rather drop it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoexpect: Fix build with GCC 14.2
Michael Tremer [Fri, 2 Aug 2024 10:38:34 +0000 (10:38 +0000)] 
expect: Fix build with GCC 14.2

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agokernel: update to 6.6.46
Arne Fitzenreiter [Sun, 18 Aug 2024 13:40:33 +0000 (15:40 +0200)] 
kernel: update to 6.6.46

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
9 months agocore188: Ship the suricata init script
Michael Tremer [Sun, 18 Aug 2024 12:46:34 +0000 (12:46 +0000)] 
core188: Ship the suricata init script

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosuricata: Use correct red device when using QMI
Stefan Schantl [Sun, 18 Aug 2024 09:15:31 +0000 (11:15 +0200)] 
suricata: Use correct red device when using QMI

When using QMI the dial-in option has to be set to "ppp" during setup.

In this case the initscript of suricata will create all related firewall
rules for the ppp0 interface which is not correct when using QMI where
the RED device is called red0.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agonetatalk: Build without embedded SSL
Michael Tremer [Wed, 14 Aug 2024 17:13:43 +0000 (17:13 +0000)] 
netatalk: Build without embedded SSL

This package seemed to have bunlded WolfSSL which we don't want to use.
Instead we want to use OpenSSL.

The bundled version of WolfSSL did not want to compile with GCC 14.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoepson-inkjet-orinter-escpr: Update to 1.8.5
Michael Tremer [Wed, 7 Aug 2024 14:47:20 +0000 (14:47 +0000)] 
epson-inkjet-orinter-escpr: Update to 1.8.5

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agonagios-plugins: Update to 2.4.11
Michael Tremer [Wed, 7 Aug 2024 14:41:15 +0000 (14:41 +0000)] 
nagios-plugins: Update to 2.4.11

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agorng-tools: Update to 6.17
Michael Tremer [Wed, 7 Aug 2024 09:44:23 +0000 (09:44 +0000)] 
rng-tools: Update to 6.17

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Don't abort the build if the terminal is being resized
Michael Tremer [Fri, 16 Aug 2024 15:57:12 +0000 (15:57 +0000)] 
make.sh: Don't abort the build if the terminal is being resized

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agowlanap.cgi: Always advertise TPC, support UTF-8 SSIDs
Michael Tremer [Fri, 16 Aug 2024 15:18:18 +0000 (15:18 +0000)] 
wlanap.cgi: Always advertise TPC, support UTF-8 SSIDs

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agowlanap.cgi: Refactor the entire thing
Michael Tremer [Fri, 16 Aug 2024 15:10:29 +0000 (15:10 +0000)] 
wlanap.cgi: Refactor the entire thing

This went really bad with the latest CSS changes. So this is a
refactor/rewrite of the CGI without many modifications.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosuricata: Disable logging of App Layer events by default
Michael Tremer [Fri, 16 Aug 2024 13:05:25 +0000 (13:05 +0000)] 
suricata: Disable logging of App Layer events by default

This might only be useful for debugging (and even that is questionable).
So instead of flooding logs, we disable this, but it can be easily
enabled for development again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore188: Ship unbound
Michael Tremer [Fri, 16 Aug 2024 10:00:29 +0000 (10:00 +0000)] 
core188: Ship unbound

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agounbound: Update to 1.21.0
Matthias Fischer [Thu, 15 Aug 2024 20:57:00 +0000 (22:57 +0200)] 
unbound: Update to 1.21.0

For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-21-0

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Forward the proxy configuration to the chroot shell
Michael Tremer [Thu, 15 Aug 2024 15:44:31 +0000 (15:44 +0000)] 
make.sh: Forward the proxy configuration to the chroot shell

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agonetsnmpd: Update to version 5.9.3
Adolf Belka [Thu, 15 Aug 2024 07:48:17 +0000 (09:48 +0200)] 
netsnmpd: Update to version 5.9.3

- Update from version 5.9.1 to 5.9.3
- Version 5.9.4 exists but it is indicated that SNMP over TLS and/or DTLS is not
   functioning properly with various versions of OpenSSL. However I could not find which
   versions mentioned in the News or Changelog. The problem will be fixed in a future
   version. There are no CVE fixes in 5.9.4, only a relatively few bug fixes so I
   decided to wait for the fixed version in case there are users using TLS with SNMP.
- Update of rootfile
- 6 CVE fixes in 5.9.3
- Changelog
    5.9.3
    security:
      - These two CVEs can be exploited by a user with read-only credentials:
          - CVE-2022-24805 A buffer overflow in the handling of the INDEX of
            NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
          - CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable
            can cause a NULL pointer dereference.
      - These CVEs can be exploited by a user with read-write credentials:
          - CVE-2022-24806 Improper Input Validation when SETing malformed
            OIDs in master agent and subagent simultaneously
          - CVE-2022-24807 A malformed OID in a SET request to
            SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an
            out-of-bounds memory access.
          - CVE-2022-24808 A malformed OID in a SET request to
            NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
          - CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable
            can cause a NULL pointer dereference.
      - To avoid these flaws, use strong SNMPv3 credentials and do not share them.
        If you must use SNMPv1 or SNMPv2c, use a complex community string
        and enhance the protection by restricting access to a given IP address
range.
      - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for
        reporting the following CVEs that have been fixed in this release, and
        to Arista Networks for providing fixes.
    misc:
      - Snmp-create-v3-user: Fix the snmpd.conf path   @datadir@ is
expanded in ${datarootdir} so datarootdir must be set before
@datadir@ is used.
    general: Many bug fixes
    5.9.2
    skipped due to a last minute library versioning found bug -- use 5.9.3 instead

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosamba: Update to version 4.20.4
Adolf Belka [Wed, 14 Aug 2024 19:35:09 +0000 (21:35 +0200)] 
samba: Update to version 4.20.4

- Update from version 4.20.2 to 4.20.4
- Successfully built samba on arm builder
- Update of rootfile for x86_64 & aarch64 not required.
- Changelog
    4.20.4
   * BUG 15673: --version-* options are still not ergonomic, and they reject
     tilde characters.
   * BUG 15673: --version-* options are still not ergonomic, and they reject
     tilde characters.
    4.20.3
   * BUG 15683: Running samba-bgqd a a standalone systemd service does not work.
   * BUG 15655: When claims enabled with heimdal kerberos, unable to log on to a
     Windows computer when user account need to change their own password.
   * BUG 15671: Invalid client warning about command line passwords.
   * BUG 15672: Version string is truncated in manpages.
   * BUG 15673: --version-* options are still not ergonomic, and they reject
     tilde characters.
   * BUG 15674: cmdline_burn does not always burn secrets.
   * BUG 15685: Samba does not parse SDDL found in defaultSecurityDescriptor in
     AD_DS_Classes_Windows_Server_v1903.ldf.
   * BUG 15655: When claims enabled with heimdal kerberos, unable to log on to a
     Windows computer when user account need to change their own password.
   * BUG 15660: The images don\'t build after the git security release and
     CentOS 8 Stream is EOL.
   * BUG 15676: Fix clock skew error message and memory cache clock skew
     recovery.
   * BUG 15603: Heimdal ignores _gsskrb5_decapsulate errors in
     init_sec_context/repl_mutual.
   * BUG 15621: s4:ldap_server: does not support tls channel bindings
     for sasl binds.
   * BUG 15678: CTDB socket output queues may suffer unbounded delays under some
     special conditions.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agooci-cli: Update to version 3.45.2
Adolf Belka [Wed, 14 Aug 2024 19:09:53 +0000 (21:09 +0200)] 
oci-cli: Update to version 3.45.2

- Update from version 3.29.4 to 3.45.2
- Update of rootfile
- Changelog is too large to include here. Details can be found at
   https://github.com/oracle/oci-cli/releases

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoghostscript: Update to version 10.03.1
Adolf Belka [Wed, 14 Aug 2024 19:09:52 +0000 (21:09 +0200)] 
ghostscript: Update to version 10.03.1

- Update from version 10.03.0 to 10.03.1
- Update of rootfile
- Several CVE fixes in this release
- Changelog
    10.03.1
    Fixes for CVE-2024-33869, CVE-2023-52722, CVE-2024-33870, CVE-2024-33871 and
     CVE-2024-29510
    IMPORTANT: For the 10.04.0 release (fall/autumn 2024) we will be adding
     protection for device selection from PostScript input. This will mean that,
     by default, only the device specified on the command line will be permitted.
     Similar to the file permissions, there will be a "--permit-devices="
     allowing a comma separation list of allowed devices. This will also take a
     single wildcard "*" allowing any device.
    Any application which relies on allowing PostScript to change devices during
     a job will have to be aware, and take action to deal with this change.
    The exception is "nulldevice", switching to that requires no special action.
    A vulnerability was identified in the way Ghostscript/GhostPDL called
     tesseract for the OCR devices, which could allow arbitrary code execution.
     As as result, we strongly urge anyone including the OCR devices in their
     build to update as soon as possible.
    As of this release (10.03.1) pdfwrite creates PDF files with XRef streams
     and ObjStm streams. This can result in considerably smaller PDF output
     files. See Vector Devices for more details.
    Ghostscript/pdfwrite now supports passing through PDF "Optional Content".
    Our efforts in code hygiene and maintainability continue.
    The usual round of bug fixes, compatibility changes, and incremental
     improvements.
    (9.53.0) We have added the capability to build with the Tesseract OCR
     engine. In such a build, new devices are available
     (pdfocr8/pdfocr24/pdfocr32) which render the output file to an image, OCR
     that image, and output the image "wrapped" up as a PDF file, with the OCR
     generated text information included as "invisible" text (in PDF terms, text
     rendering mode 3).
    Mainly due to time constraints, we only support including Tesseract from
     source included in our release packages, and not linking to
     Tesseract/Leptonica shared libraries. Whether we add this capability will
     be largely dependent on community demand for the feature.
    See Enabling OCR for more details.
Incompatible changes
    (10.03.1) Almost all the "internal" PostScript procedures defined during the
     interpreter startup are now "executeonly", further reducing the attack
     surface of the interpreter.
     The nature of these procedures means there should be no impact for
     legitimate usage, but it is possible it will impact uses which abuse the
     previous accessibility (even for legitimate reasons). Such cases may now
     require "DELAYBIND", See DELAYBIND
    (10.03.1) The "makeimagedevice" non-standard operator has been removed. It
     allowed low level access to the graphics library in a way that was,
     essentially impossible to secure.
    (10.03.1) The "putdeviceprops", "getdeviceprops", "finddevice",
     "copydevice", "findprotodevice" non-standard operators have all been
     removed. They provided functionality that is either accessible through
     standard operators, or should not be used by user PostScript.
    (10.03.1) The process of "tidying" the PostScript namespace should have
     removed only non-standard and undocumented operators. Nevertheless, it is
     possible that any integrations or utilities that rely on those non-standard
     and undocumented operators may stop working or may change behaviour.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agofmt: Update to version 11.0.2
Adolf Belka [Wed, 14 Aug 2024 19:09:51 +0000 (21:09 +0200)] 
fmt: Update to version 11.0.2

- Update from version 11.0.1 to 11.0.2
- Update of rootfile
- Changelog
    11.0.2
- Fixed compatibility with non-POSIX systems
  (https://github.com/fmtlib/fmt/issues/4054,
  https://github.com/fmtlib/fmt/issues/4060).
- Fixed performance regressions when using `std::back_insert_iterator` with
  `fmt::format_to` (https://github.com/fmtlib/fmt/issues/4070).
- Fixed handling of `std::generator` and move-only iterators
  (https://github.com/fmtlib/fmt/issues/4053,
  https://github.com/fmtlib/fmt/pull/4057). Thanks @Arghnews.
- Made `formatter<std::string_view>::parse` work with types convertible to
  `std::string_view` (https://github.com/fmtlib/fmt/issues/4036,
  https://github.com/fmtlib/fmt/pull/4055). Thanks @Arghnews.
- Made `volatile void*` formattable
  (https://github.com/fmtlib/fmt/issues/4049,
  https://github.com/fmtlib/fmt/pull/4056). Thanks @Arghnews.
- Made `Glib::ustring` not be confused with `std::string`
  (https://github.com/fmtlib/fmt/issues/4052).
- Made `fmt::context` iterator compatible with STL algorithms that rely on
  iterator category (https://github.com/fmtlib/fmt/issues/4079).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoddrescue: Update to version 1.28
Adolf Belka [Wed, 14 Aug 2024 19:09:50 +0000 (21:09 +0200)] 
ddrescue: Update to version 1.28

- Update from version 1.26 to 1.28
- Update of rootfile not required
- Changelog
    1.28
The option '--verify-on-error' has been renamed to '--check-on-error'.
The option '--verify-input-size' has been renamed to '--check-input-size'.
The option synonym '--exit-on-error' has been removed and is no longer
 recognized.
In fill and rescue modes, ddrescue now makes a final fsync call on outfile
 to prevent an early exit if the kernel caches all the writes.
Option '-t, --show-status' of ddrescuelog now shows the mapfile names at
 verbosity level 0 if more than one mapfile is specified.
The variable MAKEINFO has been added to configure and Makefile.in.
    1.27
A deadlock in command mode when stdout is fully buffered has been fixed by
 flushing stdout after executing each command. (Reported by Jeffrey Bosboom).
The new option '-W, --compare-before-write' has been added. It omits
 superfluous writes in rescue mode.
 (Suggested by Kajetan Harald Hinner and Petr Slansky).
Diagnostics caused by invalid arguments to command line options now show the
 argument and the name of the option.
The option synonym '--direct' has been removed and is no longer recognized.
'long long' is now used instead of 'long' for time variables.
A missing '#include <cstdlib>' has been added.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agocore188: Ship SQLite
Michael Tremer [Wed, 14 Aug 2024 16:57:44 +0000 (16:57 +0000)] 
core188: Ship SQLite

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agosqlite: Update to version 3460100
Adolf Belka [Wed, 14 Aug 2024 16:22:44 +0000 (18:22 +0200)] 
sqlite: Update to version 3460100

- Update from version 3460000 to 3460100
- Update of rootfile not required
- Changelog
    3460100
Improved robustness while parsing the tokenize= arguments in FTS5. Forum post
 171bcc2bcd.
Enhancements to covering index prediction in the query planner. Add early
 detection of over-prediction of covering indexes so that sqlite3_prepare() will
 return an error rather than just generate bad bytecode. Forum post
 e60e4c295d22f8ce.
Do not let the number of terms on a VALUES clause be limited by
 SQLITE_LIMIT_COMPOUND_SELECT, even if the VALUES clause contains elements that
 appear to be variables due to double-quoted string literals.
Fix the window function version of group_concat() so that it returns an empty
 string if it has one or more empty string inputs.
In FTS5 secure-delete mode, fix false-positive integrity-check reports about
 corrupt indexes.
Syntax errors in ALTER TABLE should always return SQLITE_ERROR. In some cases,
 they were formerly returning SQLITE_INTERNAL.
JavaScript/WASM:
    Fix a corruption-causing bug in the JavaScript "opfs" VFS.
    Work around a couple of browser-specific OPFS quirks.
Other minor fixes.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agocore188: Ship intel-microcode
Michael Tremer [Wed, 14 Aug 2024 16:57:13 +0000 (16:57 +0000)] 
core188: Ship intel-microcode

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agointel-microcode: Update to version 20240813
Adolf Belka [Wed, 14 Aug 2024 16:22:43 +0000 (18:22 +0200)] 
intel-microcode: Update to version 20240813

- Update from version 20240531 to 20240813
- Update of rootfile not required
- Changelog
    20240813
    Security updates for INTEL-SA-01083
    Security updates for INTEL-SA-01118
    Security updates for INTEL-SA-01100
    Security updates for INTEL-SA-01038
    Security updates for INTEL-SA-01046
    Update for functional issues. Refer to Intel® Core™ Ultra Processor for details.
    Update for functional issues. Refer to 3rd Generation Intel® Xeon® Processor Scalable Family Specification Update for details.
    Update for functional issues. Refer to 3rd Generation Intel® Xeon® Scalable Processors Specification Update for details.
    Update for functional issues. Refer to 2nd Generation Intel® Xeon® Processor Scalable Family Specification Update for details
    Update for functional issues. Refer to Intel® Xeon® D-2700 Processor Specification Update for details.
    Update for functional issues. Refer to Intel® Xeon® E-2300 Processor Specification Update for details.
    Update for functional issues. Refer to 13th Generation Intel® Core™ Processor Specification Update for details.
    Update for functional issues. Refer to 12th Generation Intel® Core™ Processor Family for details.
    Update for functional issues. Refer to 11th Gen Intel® Core™ Processor Specification Update for details.
    Update for functional issues. Refer to 10th Gen Intel® Core™ Processor Families Specification Update for details.
    Update for functional issues. Refer to 10th Generation Intel® Core™ Processor Specification Update for details.
    Update for functional issues. Refer to 8th and 9th Generation Intel® Core™ Processor Family Spec Update for details.
    Update for functional issues. Refer to 8th Generation Intel® Core™ Processor Families Specification Update for details.
    Update for functional issues. Refer to 7th and 8th Generation Intel® Core™ Processor Specification Update for details.
    Update for functional issues. Refer to Intel® Processors and Intel® Core™ i3 N-Series for details.
    Update for functional issues. Refer to Intel® Atom® x6000E Series, and Intel® Pentium® and Celeron® N and J Series Processors for Internet of Things (IoT) Applications for details.
    For Updated Platforms see the changelog
     https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoCSS: Decrease the size of h6 headlines
Michael Tremer [Wed, 14 Aug 2024 16:17:36 +0000 (18:17 +0200)] 
CSS: Decrease the size of h6 headlines

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoCSS: Make form input elements use the entire width again
Michael Tremer [Wed, 14 Aug 2024 16:10:09 +0000 (18:10 +0200)] 
CSS: Make form input elements use the entire width again

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoCSS: Add class to automatically style forms
Michael Tremer [Wed, 14 Aug 2024 16:06:38 +0000 (18:06 +0200)] 
CSS: Add class to automatically style forms

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoovpnmain.cgi: Unify the error message box
Michael Tremer [Wed, 10 Apr 2024 12:26:43 +0000 (14:26 +0200)] 
ovpnmain.cgi: Unify the error message box

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoncdu: Update to version 1.20
Adolf Belka [Tue, 13 Aug 2024 16:25:57 +0000 (18:25 +0200)] 
ncdu: Update to version 1.20

- Update from version 1.18.1 to 1.20
- Update of rootfile not required
- Changelog
    1.20
- Revert default color scheme back to 'off'
- Rewrite man page in mdoc, drop pod2man dependency
    1.19
- Fix typo in --exclude-from argument
- Add --(enable|disable)-natsort options
- Add indicator to apparent size/disk usage selection in the footer

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agostrace: Update to version 6.10
Adolf Belka [Tue, 13 Aug 2024 16:19:48 +0000 (18:19 +0200)] 
strace: Update to version 6.10

- Update from version 6.6 to 6.10
- Update of rootfile not required
- Changelog
    6.10
* Improvements
  * Implemented --decode-fds=eventfd option to retrieve eventfd object details
    associated with eventfd file descriptors.
  * Implemented decoding of NETLINK_GENERIC nlctrl protocol.
  * Implemented decoding of F_DUPFD_QUERY fcntl.
  * Implemented decoding of mseal syscall.
  * Updated decoding of statx and prctl syscalls.
  * Updated decoding of BPF_RAW_TRACEPOINT_OPEN bpf command.
  * Updated lists of BPF_*, IORING_*, KEXEC_*, KEY_*, LANDLOCK_*, PR_*, STATX_*,
    TCP_*, TEE_*, V4L2_*, and *_MAGIC constants.
  * Updated lists of ioctl commands from Linux 6.10.
* Bug fixes
  * Worked around a bug introduced in Linux 6.5 that affected system call
    tampering on riscv64.
    6.9
* Improvements
  * Implemented --always-show-pid option.
  * The --user|-u option has learned to recognize numeric UID:GID pair, allowing
    e.g. statically-built strace to be used without invoking nss plugins.
  * Implemented decoding of IORING_REGISTER_SYNC_CANCEL,
    IORING_REGISTER_FILE_ALLOC_RANGE, IORING_REGISTER_PBUF_STATUS,
    IORING_REGISTER_NAPI, and IORING_UNREGISTER_NAPI opcodes of
    io_uring_register syscall.
  * Implemented decoding of BPF_TOKEN_CREATE bpf syscall command.
  * Updated decoding of io_uring_register and pidfd_send_signal syscalls.
  * Updated lists of BPF_*, CAN_*, IORING_*, KEY_*, LSM_*, MPOL_*, NT_*, RWF_*,
    PIDFD_*, PTP_*, TCP_*, and *_MAGIC constants.
  * Updated lists of ioctl commands from Linux 6.9.
    6.8
* Improvements
  * Renamed --stack-traces to --stack-trace for consistency.
    Old option is retained for backwards compatibility.
  * Implemented --stack-trace-frame-limit=N option for configuring the limit
    of the number of printed backtrace frames.
  * Implemented decoding of statmount, listmount, lsm_get_self_attr,
    lsm_set_self_attr, and lsm_list_modules syscalls.
  * Implemented decoding of setsockopt(TCP_AO_ADD_KEY).
  * Updated decoding of landlock_create_ruleset and landlock_add_rule syscalls.
  * Updated decoding of SMC_DIAG_DMBINFO netlink attribute.
  * Updated decoding of UBI_IOCATT ioctl command.
  * Enhanced decoding of mount attributes of fsmount and mount_setattr syscalls.
  * Updated lists of BPF_*, KEXEC_*, KVM_*, PERF_*, SOL_*, STATX_*, UFFD_*,
    and V4L2_* constants.
  * Updated lists of ioctl commands from Linux 6.8.
    6.7
* Improvements
  * Implemented -kk/--stack-traces=source option for libdw-based stack tracing.
  * Implemented decoding of futex_wake, futex_wait, and sys_futex_requeue
    syscalls.
  * Updated lists of BPF_*, BTRFS_*, IORING_*, KVM_*, LANDLOCK_*, PR_*,
    and TCP_* constants.
  * Updated lists of ioctl commands from Linux 6.7.
* Bug fixes
  * Fix strace -r during the first second after booting to show correct relative
    timestamps.
  * Fix strace -f entering deadlock on exit if there are tracee processes
    spawned using vfork semantics.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agosdl2: Update to version 2.30.6
Adolf Belka [Tue, 13 Aug 2024 16:19:47 +0000 (18:19 +0200)] 
sdl2: Update to version 2.30.6

- Update from version 2.30.1 to 2.30.6
- Update of rootfile
- Changelog
    2.30.6
    Improved detection of Nintendo Switch Pro controller report mode
    Fixed a rare crash when a controller is disconnected
    Fixed creating a framebuffer with KMSDRM on some systems
    2.30.5
    Respect SDL_HINT_RENDER_DRIVER when creating an accelerated window surface
    Clean up any accelerated renderer in SDL_DestroyWindowSurface()
    Disable low level USB controller support on Android by default (can be
     enabled by setting "SDL_ENV.SDL_JOYSTICK_HIDAPI" metadata to "1" in
     AndroidManifest.xml)
    Fixed USB permissions dialog on Android 14
    Fixed controller mapping matching when one entry has a CRC specified and
     another doesn't
    Enable joystick support on FreeBSD when building using CMake
    Reduced input latency when using an fcitx IME on Linux
    Fixed graphical corruption on Raspberry Pi
    Fixed crash when using an unstable sort function in SDL_qsort (you shouldn't
     do this, but at least it won't crash)
    2.30.4
    Android rotation will respect user rotation lock preferences
    Fixed spurious Left-Ctrl key input when the Right Alt key (AltGr) is pressed
     on Windows
    Added support for the Saitek Cyborg V.3 Rumble Pad in PS3 mode
    Added support for the Razer Kitsune in PS5 mode
    Added Linux bindings for the Qanba Drone 2 Arcade Joystick
    Leave Nintendo Online controllers in simple report mode so they work with
     DirectInput games
    Enable using libusb for GameCube controllers when available
    2.30.3
    Fixed Win+V handling (pasting from clipboard history) on Windows
    Fixed Caps Lock and Backspace key mapping for the Colemak keyboard layout on
     Windows
    Fixed mouse warp on XWayland
    Reduced startup time when scanning for game controllers on Linux
    Fixed building with C89 compilers
    Fixed building with the GDK SDK on Windows
    2.30.2
    Fixed performance regression initializing controllers on Linux
    Added support for the 6-button SEGA Mega Drive Control Pad for Nintendo Online
    Added support for the MadCatz Saitek Side Panel Control Deck
    Added support for the Hori Fighting Stick EX2
    Added support for the Yawman Arrow flightstick
    Added a gamepad mapping for the Defender Joystick Cobra R4
    Fixed the gamepad mapping for the Sanwa Supply JY-P76USV controller
    Poll for the initial controller state when using DirectInput
    Allow using SDL_RWFromFile() with named pipes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agocore188: Ship readline
Michael Tremer [Wed, 14 Aug 2024 09:11:05 +0000 (09:11 +0000)] 
core188: Ship readline

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoreadline: Update patches to include 11 - 13
Adolf Belka [Tue, 13 Aug 2024 16:19:46 +0000 (18:19 +0200)] 
readline: Update patches to include 11 - 13

- Update patches from 1 - 10 to 1 - 13
- Update of rootfile not required
- Changelog of patches
    11 Some systems (e.g., macOS) send signals early on in interactive initialization,
so readline should retry a failed open of the init file.
    12 If a user happens to bind do-lowercase-version to something that isn't a
capital letter, so _rl_to_lower doesn't change anything and the result is
still bound to do-lowercase-version, readline can recurse infinitely.
    13 When readline is accumulating bytes until it reads a complete multibyte
character, reading a byte that makes the multibyte character invalid can
result in discarding the bytes in the partial character.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agocore188: Ship lz4
Michael Tremer [Wed, 14 Aug 2024 09:10:37 +0000 (09:10 +0000)] 
core188: Ship lz4

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agolz4: Update to version 1.10.0
Adolf Belka [Tue, 13 Aug 2024 16:19:44 +0000 (18:19 +0200)] 
lz4: Update to version 1.10.0

- Update from version 1.9.4 to 1.10.0
- Update of rootfile
- Changelog
    1.10.0
cli  : multithreading compression support: improves speed by X times threads allocated
cli  : overlap decompression with i/o, improving speed by ~+60%
cli  : support environment variables LZ4_CLEVEL and LZ4_NBWORKERS
cli  : license of CLI more clearly labelled GPL-2.0-or-later
cli  : fix: refuse to compress directories
cli  : fix dictionary compression benchmark on multiple files
cli  : change: no more implicit `stdout` (except when input is `stdin`)
lib  : new level 2, offering mid-way performance (speed and compression)
lib  : Improved lz4frame compression speed for small data (up to +160% at 1KB)
lib  : Slightly faster (+5%) HC compression speed (levels 3-9), by @JunHe77
lib  : dictionary compression support now in stable status
lib  : lz4frame states can be safely reset and reused after a processing error (described by @QrczakMK)
lib  : `lz4file` API improvements, by @vsolontsov-volant and @t-mat
lib  : new experimental symbol `LZ4_compress_destSize_extState()`
build: cmake minimum version raised to 3.5
build: cmake improvements, by @foxeng, @Ohjurot, @LocalSpook, @teo-tsirpanis, @ur4t and @t-mat
build: meson scripts are now hosted into `build/` directory, by @eli-schwartz
build: meson improvements, by @tristan957
build: Visual Studio solutions generated by `cmake` via scripts
port : support for loongArch, risc-v, m68k, mips and sparc architectures
port : improved Visual Studio compatibility, by @t-mat
port : freestanding support improvements, by @t-mat

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agocore188: Ship knot
Michael Tremer [Wed, 14 Aug 2024 09:10:03 +0000 (09:10 +0000)] 
core188: Ship knot

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoknot: Update to version 3.3.8
Adolf Belka [Tue, 13 Aug 2024 16:19:43 +0000 (18:19 +0200)] 
knot: Update to version 3.3.8

- Update from version 3.3.5 to 3.3.8
- Update of rootfile not required
- Changelog
    3.3.8
Features:
 - libzscanner,libknot: added support for 'dohpath' and 'ohttp' SVCB parameters
 - libzscanner,libknot: added support for WALLET rrtype
 - keymgr: new commands for keystore testing (see 'keystore-test' and 'keystore-bench')
 - knotd: new configuration option for setting default TTL (see 'zone.default-ttl')
Improvements:
 - libknot: added error codes to better describe some failures
Bugfixes:
 - knotd: DNSSEC signing doesn't remove NSEC records for non-authoritative nodes
 - knotd: DNSSEC signing not scheduled on secondary if nothing to be reloaded
 - libknot: TCP over XDP doesn't ignore SYN+ACK packets on the server side
    3.3.7
Improvements:
 - libs: upgraded embedded libngtcp2 to 1.6.0
Bugfixes:
 - knotd: insufficient metadata check can cause journal corruption
 - knotd: missing zone timers initialization upon purge
 - knotd: missing RCU lock in zone flush and refresh
 - knotd: defective assert in zone refresh
    3.3.6
Features:
 - knotd: configurable control socket backlog size (see 'control.backlog')
 - knotd: optional configuration of congruency of generated keytags (see 'policy.keytag-modulo')
 - knotc: support for exporting configuration schema in JSON (see 'conf-export') #912
 - mod-dnstap: configuration of sink allows TCP address specification
Improvements:
 - knotd: last-signed serial is stored to KASP even if not a secondary zone
 - knotd: allowed catalog role member in a catalog template configuration
 - knotd: some references in a zone configuration can be set empty to override a template
 - knotd: allowed zone backup during a zone transaction
 - knotd: add remote TSIG key name to outgoing event logs
 - knotc: zone backup with '+keysonly' silently uses all defaults as 'off'
 - kxdpgun: host name can be used for target specification
 - libs: upgraded embedded libngtcp2 to 1.5.0
 - doc: various fixes and updates
Bugfixes:
 - knotd: reset TCP connection not removed from a connection pool
 - knotd: server wrongly tries to remove removed ZONEMD
 - knotd: failed to parse empty list from a textual configuration
 - knotd: blocking zone signing in combination with an open transaction causes a deadlock
 - knotd: missing RCU lock when sending NOTIFY
 - kdig: QNAME letter case isn't preserved if IDN is enabled
 - kdig: failed to parse empty QNAME (do not fill question section)
 - kxdpgun: floating point exception on SIGUSR1 #927
 - libknot: incorrect handling of regular QUIC tokens in incoming initials
 - python: failed to set an empty configuration value

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agocore188: Ship iproute2
Michael Tremer [Wed, 14 Aug 2024 09:09:43 +0000 (09:09 +0000)] 
core188: Ship iproute2

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
10 months agoiproute2: Update to version 6.10.0
Adolf Belka [Tue, 13 Aug 2024 16:19:42 +0000 (18:19 +0200)] 
iproute2: Update to version 6.10.0

- Update from version 6.8.0 to 6.10.0
- Update of rootfile not required
- Changelog is the commits list in the git repo
   https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>