]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/log
people/pmueller/ipfire-2.x.git
22 months agocrontab: Add job for periodic ipblocklist updates.
Stefan Schantl [Sun, 10 Apr 2022 09:40:56 +0000 (11:40 +0200)] 
crontab: Add job for periodic ipblocklist updates.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist: Rootfile updates.
Tim FitzGeorge [Tue, 5 Apr 2022 03:34:00 +0000 (05:34 +0200)] 
ipblocklist: Rootfile updates.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoconfigroot: Create ipblocklist related dir and settings file.
Tim FitzGeorge [Tue, 5 Apr 2022 03:32:51 +0000 (05:32 +0200)] 
configroot: Create ipblocklist related dir and settings file.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-sources: New package.
Tim FitzGeorge [Tue, 5 Apr 2022 03:29:03 +0000 (05:29 +0200)] 
ipblocklist-sources: New package.

Placing the ipblocklist sources file as an own package, easily
allows to update this single file during a core update and to
keep the vendor details for the blocklists up-to-date.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agobackup: Add ipblocklist related files.
Tim FitzGeorge [Tue, 5 Apr 2022 03:08:21 +0000 (05:08 +0200)] 
backup: Add ipblocklist related files.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoshowrequestfromblocklist.dat: Fix silly typos.
Stefan Schantl [Tue, 5 Apr 2022 03:02:30 +0000 (05:02 +0200)] 
showrequestfromblocklist.dat: Fix silly typos.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoupdate-ipblocklists: Do not log the pid in syslog.
Stefan Schantl [Tue, 5 Apr 2022 02:57:19 +0000 (04:57 +0200)] 
update-ipblocklists: Do not log the pid in syslog.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agorules.pl: Refactor logic to handle the IP blocklist feature.
Stefan Schantl [Mon, 4 Apr 2022 19:43:49 +0000 (21:43 +0200)] 
rules.pl: Refactor logic to handle the IP blocklist feature.

* Fixes that the same chain would be created each time a firewall
reload is performed.

* Also fixes multiple log and drop rules inside the the BLOCKLIST_DROP
  chains after doing a firewall reload.

* Orphaned BLOCKLIST_DROP chains now will be flushed and removed in case
  the blocklist gets disabled or the entire feature will be swithed off.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agorules.pl: Add function to check if given firewall chain exists.
Stefan Schantl [Mon, 4 Apr 2022 19:43:20 +0000 (21:43 +0200)] 
rules.pl: Add function to check if given firewall chain exists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agorules.pl: Fix typo when creating blocklist drop chains.
Stefan Schantl [Sun, 3 Apr 2022 12:15:48 +0000 (14:15 +0200)] 
rules.pl: Fix typo when creating blocklist drop chains.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agorules.pl: Check if the blocklist is part of the settings hash.
Stefan Schantl [Sun, 3 Apr 2022 12:14:41 +0000 (14:14 +0200)] 
rules.pl: Check if the blocklist is part of the settings hash.

Otherwise there will pop up some ugly notices on the command line and
the logs.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agofirewall: Add ipblocklist related chains.
Tim FitzGeorge [Sun, 3 Apr 2022 11:44:44 +0000 (13:44 +0200)] 
firewall: Add ipblocklist related chains.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoshowrequestfromblocklist.dat: Modify regex for added space in
Rob Brewer [Sat, 5 Mar 2022 21:18:42 +0000 (21:18 +0000)] 
showrequestfromblocklist.dat: Modify regex for added space in
log-prefix.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist.dat: Do not rely on any theme settings.
Rob Brewer [Sun, 3 Apr 2022 08:55:34 +0000 (10:55 +0200)] 
ipblocklist.dat: Do not rely on any theme settings.

The support for themes has been removed since ages, so we
do not need this anymore and may crash the page.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agorules.pl: Add space at the end of the log prefix.
Rob Brewer [Sun, 3 Apr 2022 08:52:56 +0000 (10:52 +0200)] 
rules.pl: Add space at the end of the log prefix.

This improves the readabiliy when digging through the logs.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoupdate-ipblocklist: Add code to reload updated blocklists.
Stefan Schantl [Mon, 7 Mar 2022 18:54:44 +0000 (19:54 +0100)] 
update-ipblocklist: Add code to reload updated blocklists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist.cgi: Mark and display a notice about a required reload of
Stefan Schantl [Sun, 6 Mar 2022 20:16:07 +0000 (21:16 +0100)] 
ipblocklist.cgi: Mark and display a notice about a required reload of
the firewall.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist.cgi: Add better messages in error case.
Stefan Schantl [Sun, 6 Mar 2022 20:15:18 +0000 (21:15 +0100)] 
ipblocklist.cgi: Add better messages in error case.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agologs.cgi/log.dat: Allow to show logged ipblocklist messages.
Tim FitzGeorge [Sun, 6 Mar 2022 20:03:20 +0000 (21:03 +0100)] 
logs.cgi/log.dat: Allow to show logged ipblocklist messages.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoMenu: Add ipblocklist entry to firewall menu.
Tim FitzGeorge [Sun, 6 Mar 2022 20:01:44 +0000 (21:01 +0100)] 
Menu: Add ipblocklist entry to firewall menu.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoMenu: Add ipblocklist entry to log menu.
Tim FitzGeorge [Sun, 6 Mar 2022 19:58:19 +0000 (20:58 +0100)] 
Menu: Add ipblocklist entry to log menu.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklists.dat: Remove uneccessary and broken module includes.
Rob Brewer [Sun, 6 Mar 2022 19:55:25 +0000 (20:55 +0100)] 
ipblocklists.dat: Remove uneccessary and broken module includes.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoLanguage file update for ipblocklist
Tim FitzGeorge [Sun, 6 Mar 2022 19:53:07 +0000 (20:53 +0100)] 
Language file update for ipblocklist

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblacklist: WUI Log details page
Tim FitzGeorge [Mon, 27 Apr 2020 14:06:14 +0000 (15:06 +0100)] 
ipblacklist: WUI Log details page

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist: WUI Log page
Tim FitzGeorge [Mon, 27 Apr 2020 14:05:16 +0000 (15:05 +0100)] 
ipblocklist: WUI Log page

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist.cgi: Adjust CGI to work with backend from ipblocklist-functions.pl
Stefan Schantl [Sun, 6 Mar 2022 19:23:55 +0000 (20:23 +0100)] 
ipblocklist.cgi: Adjust CGI to work with backend from ipblocklist-functions.pl

* Slightly adjust code indention.
* Remove Java Script code for show/hiding.
* Remove unnedded functions.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist: WUI Settings page
Tim FitzGeorge [Mon, 27 Apr 2020 14:04:38 +0000 (15:04 +0100)] 
ipblocklist: WUI Settings page

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
22 months agoipblocklist-update: Introduce script to automatically update blacklists.
Stefan Schantl [Sun, 6 Mar 2022 14:11:48 +0000 (15:11 +0100)] 
ipblocklist-update: Introduce script to automatically update blacklists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Allow export of modified_file and
Stefan Schantl [Sun, 6 Mar 2022 14:09:58 +0000 (15:09 +0100)] 
ipblocklist-functions.pl: Allow export of modified_file and
blocklist_dir values.

They so easily can be accessed by other perl scripts.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Store the local time if no last modified could
Stefan Schantl [Sun, 6 Mar 2022 14:09:18 +0000 (15:09 +0100)] 
ipblocklist-functions.pl: Store the local time if no last modified could
be determined.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Add function to get the holdoff_rate of a
Tim FitzGeorge [Sun, 6 Mar 2022 14:07:17 +0000 (15:07 +0100)] 
ipblocklist-functions.pl: Add function to get the holdoff_rate of a
given list.

The function will return the rate in seconds based on the configured
rate value in the blocklist sources file and the given blocklist.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agorules.pl: Add code to deal with ipblocklists.
Stefan Schantl [Tue, 1 Mar 2022 16:36:51 +0000 (17:36 +0100)] 
rules.pl: Add code to deal with ipblocklists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Abort and return code if a list is empty or
Stefan Schantl [Sat, 5 Mar 2022 09:01:24 +0000 (10:01 +0100)] 
ipblocklist-functions.pl: Abort and return code if a list is empty or
not parse-able.

In case the downloaded list is empty or the parser is not able to parse
it properly, the download_and_create_blocklist() function now exits and
will return "empty_list" as new error code.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Add helper function to proper calculate the
Tim FitzGeorge [Fri, 4 Mar 2022 21:11:48 +0000 (22:11 +0100)] 
ipblocklist-functions.pl: Add helper function to proper calculate the
hashsize.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Add parser of dshield.
Tim FitzGeorge [Fri, 4 Mar 2022 21:10:29 +0000 (22:10 +0100)] 
ipblocklist-functions.pl: Add parser of dshield.

This vendor has a different list format and therefore requires an
own parser.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Add parser to obtain IP or Net addresses from
Tim FitzGeorge [Fri, 4 Mar 2022 21:08:16 +0000 (22:08 +0100)] 
ipblocklist-functions.pl: Add parser to obtain IP or Net addresses from
a blocklist.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Add download_and_create_blocklist function.
Stefan Schantl [Fri, 4 Mar 2022 20:57:03 +0000 (21:57 +0100)] 
ipblocklist-functions.pl: Add download_and_create_blocklist function.

This function is responisible for downloading and converting the
blocklist into an ipset compatible format.

The only required argument is the blocklist (in upper letter format) which should be
performed. It automatically will setup an upstream proxy (if configured)
and grab the file specified in the blocklist vendor configuration hash.

There is a maximum amount of five attempts until the script gives up and
returns a "dl_error". In case the server responses with "Not Modified"
(Code 304) a "not_modified" will be returned.

If the blocklist successfully has been grabbed, the modification date
get stored for further purposes and the list content will be converted
and stored in an ipset compatible format.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Inspired-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
22 months agoipblocklist-functions.pl: Add get_ipset_db_file() function.
Stefan Schantl [Tue, 1 Mar 2022 16:35:20 +0000 (17:35 +0100)] 
ipblocklist-functions.pl: Add get_ipset_db_file() function.

This function is used to generate the filename and full path
for a given blocklist name.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist-functions.pl: Initial commit.
Stefan Schantl [Tue, 1 Mar 2022 14:23:44 +0000 (15:23 +0100)] 
ipblocklist-functions.pl: Initial commit.

This library file will contain a collection of functions, which are
required to deal with the ipblocklist feature.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoipblocklist: Add sources file.
Tim FitzGeorge [Tue, 1 Mar 2022 14:31:58 +0000 (15:31 +0100)] 
ipblocklist: Add sources file.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
22 months agoMerge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next
Stefan Schantl [Thu, 7 Jul 2022 15:17:54 +0000 (17:17 +0200)] 
Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next

22 months agoRevert "Core Update 169: Delete unused initrd on 32-bit ARM to save space in /boot"
Peter Müller [Thu, 7 Jul 2022 13:55:29 +0000 (13:55 +0000)] 
Revert "Core Update 169: Delete unused initrd on 32-bit ARM to save space in /boot"

This reverts commit 5ead33d796b9537bddbc4e2d5d27029de4df001a.

22 months agoCore Update 169: Delete unused initrd on 32-bit ARM to save space in /boot
Peter Müller [Thu, 7 Jul 2022 13:52:09 +0000 (13:52 +0000)] 
Core Update 169: Delete unused initrd on 32-bit ARM to save space in /boot

On 64-bit ARM, this is still needed for booting. Since the initrds were
already shipped with the updater, there is no need to regenerate them
locally again.

https://community.ipfire.org/t/again-with-the-file-system-full-core-169/8186

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoCore Update 170: Ship lsof
Peter Müller [Wed, 6 Jul 2022 19:21:32 +0000 (19:21 +0000)] 
Core Update 170: Ship lsof

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agolsof: Update to version 4.95.0
Adolf Belka [Tue, 10 May 2022 10:31:40 +0000 (12:31 +0200)] 
lsof: Update to version 4.95.0

- Update from version 4.91 to 4.95.0
- version 4.91 was the last version provided bia purdue.edu after which they stopped
   maintaining it. It is now taken over ny the lsof-org team at Github.
   https://github.com/lsof-org/lsof
- Update of rootfile not required - only one line in the rootfile
- Changelog
   lsof-4.95.0-linux
[n+obsd] fix syntax error
 Corrected end of comment.
 This change closes #138.
 @albert-github reported this issue in #138,
 and provided the fix in #140
Don't ignore failures in test/Makefile
 Tobias Geerinckx-Rice <me@tobias.gr> provides the fix.
Update perl scripts for the past few decades of progress
 Generally, perl is available on base systems - people who are manually
 installing perl into /usr/local/bin are the exception rather than the
 rule. In addition, Perl 5 was release in 1994, so Perl 4 isn't relevant
 any more. We've also standardized on the .pl extension, rather than
 .perl5 or whatever.
 Provided by @dilinger (Andres Salomon) in #149.
 A commit in the pull request includes work of Nicholas Bamber.
Drop LSOF_CCDATE across all dialects to ensure reproducible builds
 Simplify things for reproducible builds by just getting rid of
 the embedded date/time string. With LSOF_CCDATE gone, keeping
 SOURCE_DATE_EPOCH around doesn't make much sense, so drop that as
 well. Folks doing reproducible builds should still override the
 LSOF_HOST, LSOF_LOGNAME, LSOF_SYSINFO, and LSOF_USER variables (as
 they were previously doing before SOURCE_DATE_EPOCH).
 Provided by @dilinger (Andres Salomon) in #150.
[FreeBSD] get the ISO9660 filesystem working again
 The ISO9660 filesystem broke starting with FreeBSD 7 due to the header
 location changing. Fix the header search path to get it to be detected
 again. Fix the header inclusion order. Also add the new way of finding
 dev_t on more recent FreeBSD versions.
 Provided by Damjan Jovanovic in #151.
[FreeBSD] add support for msdosfs on FreeBSD
 Provided by Damjan Jovanovic in #151.
Fix FD field description.
 In 811dc78 the output format was changed to not printf the `f`
 field by default, however the field description in `lsof_fields.h`,
 as seen in `-F?` output still included the `(always selected)` text.
 Provided by @algorythmic (Grisha Levit) in #158.
Adjust alignment of buffer passed to stat().
 The original code passes char[] buffer to stat(). This can be cause
 a SIGBUS. #160 reported an actual crash on armv7a + glibc-2.33 platform.
 See also https://sourceware.org/bugzilla/show_bug.cgi?id=27993.
 Reported by @10ne1 in #160.
Clean up source code and documentats.
 - remove trailing whitespace,
 - fix some issues in scripts found through shellcheck, and
 - fix spelling
 Provided by @a1346054 in #163.
man page: fix hyphen issues
 Properly use '-' and '\-' in the man page, ensuring that users
 can cut & paste commandline options without issue. Original
 patch from Raoul Gunnar Borenius <borenius@dfn.de>, and
 submitted/expanded by @dilinger (Andres Salomon) in #168.
[FreeBSD] update for FreeBSD 13 & 14, and various internal changes
 submitted by @DmitryAndric & @emaste.
[FreeBSD] remove various old FreeBSD versions from support
 submitted by @emaste
[FreeBSD] configure: suggest variable to set if FreeBSD sys not
 found
 submitted by @emaste
Fix broken LSOF_CFLAGS_OVERRIDE.
 Provided by Fabrice Fontaine in #172.
[linux] Remove sysvlegacy function.
 Provided by Fabrice Fontaine in #195.
[linux] use close_range instead of calling close repeatedly
 At the starting up, lsof closes its file descriptors greater
 than 2 by calling close(2) repeatedly. As reported in #186,
 it can take long time. Linux 5.9 introduced close_range(2).
The new system call can close multiple file descriptors faster.
 @qianzhangyl reported the original issue (#186).
Add -Q option for adjusting exit status when failed to find a
 search item (#129)
In the original code, lsof returned 1 when it failed to find a
 search item. With the new option, lsof returns 0 in the case.
Document -Q option in manpage/00QUICKSTART, and adjust -h
 output by @dilinger (Andres Salomon) in #129.
Improve readability of complex adverbial clause by adding a
 comma.
Provided by Danny Fowler in #156.
   lsof-4.94.0-linux
(All changes in this version are ported from
 lsof-org/lsof-linux repository at GitHub).
Introduced a new test harness. The harness can run
 test cases specific to a dialect. It is designed for
 running test cases on CI environment like Travis-CI.
 However, it is runnable locally with following command
 line:
$ ./check.sh DIALECT
 after making lsof executable.
[linux] Fixed a bug +|-E options output for pipe.
 If two processes use the same fd number for a pipe
 connecting them, the option didn't print the
 information about it.
[linux] Fixed a bug +|-E options output for PTY.
 If two processes use the same fd number for a PTY
 connecting them, the option didn't print the
 information about it.
[linux] Fixed a bug +|-E options output for PTY.
 The code for detecting a slave device was incorrect.
[linux] Fixed a potential bug +|-E options output for
 PTY. A structure field for the feature was not
 initialized.
[linux] Added a code for decoding O_PATH flag in +fg
 option.
[linux] Added a code for decoding O_CLOEXEC flag as CX
 in +fg option.
[linux] Added a code for decoding O_TMPFILE flag as
 TMPF in +fg option.
[linux] Added Linux display of INET socket endpoint
 information with +|-E option. The option handles
 INET sockets using IPC.
[linux] Added support for POSIX MQ of Linux
 implementation.  A POSIX message queue (MQ) is
 represented in a fd on Linux.  lsof reported it as a
 regular file. lsof with this change reports it as a
 file with PSXMQ type if mqueue file system is mounted.
[linux] Added Linux display of POSIX message queue
 endpoint information with +|-E option. mqueue file system
 must be mounted to display the information.
[linux] Added Linux display of INET6 socket endpoint
 information with +|-E option. The option handles
 INET6 sockets using IPC.
[FreeBSD] update to include <sys/_lock.h> on recent -CURRENT
 since it is no longer implicitly included via header pollution.
[linux] Added Linux display of eventfd endpoint information
 with +|-E option. The option handles eventfd using IPC.
[FreeBSD] include <stdbool.h> for recent change requiring
 refcount(9).
Enhanced -r option. With `c<N>' specifier, lsof can stop itself
 when the number of iterations reaches at <N>.
[linux] Fixed accessing an uninitialized local variable.
 Detected by valgrind.
[linux] fix a crash when printing the endpoint for unaccepted
 unix socket with +E option.
 This closes the github issue #74 reported by @jolmg.
[linux] abort execution when failing in memory allocation for
 socket private data.
[linux] decode the name of DCCP socket type.
[linux] decode more netlink protocol numbers (RDMA, CRYPTO, and
 SMC).
[linux] print the connection state of unix domain socket
 Lsof can print the state of TCP socket like:
 nc      22247 yamato    3u  IPv4 471409      0t0        TCP localhost:38802->localhost:9999 (ESTABLISHED)
 This change exnteds this feature to support unix domain sockets.
 LISTEN, UNCONNECTED, CONNECTING, CONNECTED, DISCONNECTING,
 and UNKNOWN can be taken as a state.
 An example of output:
 evince    17333  yamato    1u  unix 0x0000000054183795      0t0  89141 type=STREAM (CONNECTED)
 This feature is enabled by default.
 To turn off printing state information, use -T option.
 Don't display command usage even when a file (or directory) listed
 in command line doesn't exist.
 This closes the github issue #90 reported by @rowlap.
[FreeBSD] merge all the FreeBSD specific fixes from the FreeBSD sysutils/lsof port
[linux] allow reproducible builds
 In a reproducible build all varied information is removed.  This
 change does so, by checking if the standard SOURCE_DATE_EPOCH
 variable is set.  If it is, we are attempting a reproducible build
 and will strip varying information.
 About the standard, see https://reproducible-builds.org/specs/source-date-epoch/
 Provided in github pull request #93 by @T4cC0re.
[freebsd] update for r363214
 - no user visible changes
Added the way to include (or exclude) all numbered file descriptors
 in -d option. "fd" is a pseudo file descriptor name for the purpose.
 See the following output on Linux; lsof doesn't print cwd, rtd, txt,
 and mem files.
  # ./lsof -p $$ -a -d fd
  COMMAND    PID USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
  bash    866421 root    0u   CHR  136,1      0t0    4 /dev/pts/1
  bash    866421 root    1u   CHR  136,1      0t0    4 /dev/pts/1
  bash    866421 root    2u   CHR  136,1      0t0    4 /dev/pts/1
  bash    866421 root  255u   CHR  136,1      0t0    4 /dev/pts/1
docs: fixed minor grammatical error in instructions in Customize file
 The change is provided by @hardikpnsp.
man page: improve phrasing and add examples
 The change is provided by Martin D Kealey.
man page: improve explanation of -t implying -w
 The change is provided by Martin D Kealey.
test cases, [linux]: fix tests for large inode-numbers (i >= 2^32)
 The change is provided by Henry Peteet.
[linux] handle ffff:ffff in ipv6 addr correctly
 The listen address and port of an AF_INET6 socket were not display if
 the socket listened at an ipv6 address including ffff:ffff.
 Here is a command session demonstrating the bug:
    # ip -6 addr add abcd:ef10:ffff:ffff:ffff:ffff:ffff:ff62 dev lo
    # nc -6      -l  abcd:ef10:ffff:ffff:ffff:ffff:ffff:ff62 8888 &
    [1] 6762
    # ./lsof -p 6762 -a -d fd -P -n
    COMMAND  PID   USER   FD   TYPE DEVICE SIZE/OFF    NODE NAME
    nc      6762 yamato    0u   CHR  136,6      0t0       9 /dev/pts/6
    nc      6762 yamato    1u   CHR  136,6      0t0       9 /dev/pts/6
    nc      6762 yamato    2u   CHR  136,6      0t0       9 /dev/pts/6
    nc      6762 yamato    3u  sock    0,9      0t0 5833594 protocol: TCPv6
 The last line should be:
    nc      6762 yamato    3u  IPv6 5833594      0t0  TCP [abcd:ef10:ffff:ffff:ffff:ffff:ffff:ff62]:8888 (LISTEN)
 The original code decoding an ipv6 address uses UINT32_MAX constant
 incorrect way.
 @zhrf2020 reported this bug in #102.
 @zhrf2020 provided the initial version of fix, #109.
man page,[linux]: enumerate abbreviated flags printed with '+f g' option
Make -Fo option work
 -Fo option is for printing file offset. For regular files,
 the option didn't work.
 Here is a command session demonstrating the fix:
    # ./lsof -Fo -o0| grep ^o | sort | uniq -c
    90586 o0t0
       87 o0t101
       84 o0t103
 ...
 @JustAnotherArchivist reported this bug in #118.
 man page: fix definition of the `o` field on programmatic output
 The change is provided by @JustAnotherArchivist who reported
 the original issue in #118.
[linux]: show the pid monitored by a pidfd
 With this change, lsof prints pidfd in the following form:
    [pidfd:%d]
 where %d represents the pid monitored by the pidfd.
 Example output:
    # ./lsof -p 12573 -p 12710 | grep pidfd
    dbus-brok 12573  jet   11u  a_inode               0,13         0     13312 [pidfd:12575]
    dbus-brok 12710  jet   10u  a_inode               0,13         0     13312 [pidfd:12711]
 fd 11 of pid 12573 monitors pid 12575.
 fd 10 of pid 12710 monitors pid 12711.
 This change closed #116.
 Don't select the file descriptor field by default.
 The version 4.88 introduced the change for selecting the file
 descriptor field by default. However, the change is not
 suitable for users who wants to print only PID field.
 @po5857 suggests the use case and the way to improve the man page.
[linux]: enumerate fds monitored by an eventpoll fd
 With this change, lsof prints an eventpoll fd in the following form:
    [eventpoll:<fd0>,<fd1>,...,<fdn>...]
 Here fdX is a file descriptor monitored by the eventpoll fd.
 If an eventpoll fd monitors too many file descriptors, lsof
 truncates the list of fds. "..." at the end of list implies
 the truncation.
 Example output:
# sudo ./lsof -p 1 -a -d 10,11,12
COMMAND PID USER   FD      TYPE DEVICE SIZE/OFF  NODE NAME
systemd   1 root   10u  a_inode   0,13        0 11624 [eventpoll:11,12]
systemd   1 root   11r      REG    0,4        0 17680 /proc/1/mountinfo
systemd   1 root   12r  a_inode   0,13        0 11624 inotify
 systemd monitors fd 11 and fd 12 via eventpoll fd 10.
[linux]: implement "make check"
 The target runs check.bash.
   4.93.2 May 8, 2019
        Update the version number embedded in lsof executable.
   lsof-4.93.1
     4.93.0 May 7, 2019
[freebsd] Made FreeBSD 13 adjustment.
[darwin] Fix a typo causing a build error.
 Fix a potential memory leak.
[linux] use tirpc for rpc if libc doesn't provide rpc.h.
 Fix a typo in man page.
[linux] fix memory leaks detected by valgrind about unix
 endpoint information.
Update the description about -fg and -fG options on linux.
     4.93.1 May 7, 2019
Fix a broken symbolic link.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoRun ./make.sh update-contributors
Peter Müller [Wed, 6 Jul 2022 12:37:29 +0000 (12:37 +0000)] 
Run ./make.sh update-contributors

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoCore Update 170: Ship files affected by "aliases" changes
Peter Müller [Wed, 6 Jul 2022 10:03:16 +0000 (10:03 +0000)] 
Core Update 170: Ship files affected by "aliases" changes

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoaliases: Don't call arpping to announce new IP addresses
Michael Tremer [Wed, 29 Jun 2022 18:27:24 +0000 (18:27 +0000)] 
aliases: Don't call arpping to announce new IP addresses

I am not sure what the rationale is here, but we should probably not do
this. Other hosts on the network will be able to update their ARP caches
properly.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoaliases: Add support to assign aliases to multiple RED interfaces
Michael Tremer [Wed, 29 Jun 2022 18:27:23 +0000 (18:27 +0000)] 
aliases: Add support to assign aliases to multiple RED interfaces

This is a little patch which will extend the aliases page to offer an
interface selection if there are more than one RED interfaces.

This is a little hack to make configuration easier for users who have
manually set up more than one RED interface (e.g. for load balancing or
fail-over) and want to use the UI to configure firewall rules.

As a little benefit on the side, I had to rewrite setaliases.c to use
ip(8) instead of ifconfig(8).

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
22 months agodnsdist: Bump package version
Peter Müller [Wed, 6 Jul 2022 10:00:57 +0000 (10:00 +0000)] 
dnsdist: Bump package version

https://lists.ipfire.org/pipermail/development/2022-July/013794.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agozabbix_agentd: Add IPFire specific userparameters
Robin Roevens [Thu, 30 Jun 2022 10:15:55 +0000 (12:15 +0200)] 
zabbix_agentd: Add IPFire specific userparameters

Provide IPFire specific items for the Zabbix server to monitor:
- ipfire.net.gateway.pingtime: Internet Line Quality
- ipfire.net.gateway.ping: Internet connection
- ipfire.net.fw.hits.raw: JSON formatted list of Firewall hits/chain
- ipfire.dhcpd.clients: Number of active DHCP leases
- ipfire.captive.clients: Number of Captive Portal clients

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
22 months agozabbix_agentd: By default only listen on GREEN ip
Robin Roevens [Thu, 30 Jun 2022 10:15:54 +0000 (12:15 +0200)] 
zabbix_agentd: By default only listen on GREEN ip

- Change zabbix_agentd.conf during install to only listen on the
  GREEN ip by default.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
22 months agozabbix_agentd: Sudoers file reorganization
Robin Roevens [Thu, 30 Jun 2022 10:15:53 +0000 (12:15 +0200)] 
zabbix_agentd: Sudoers file reorganization

- Remove sudoers file 'zabbix' in favour of new IPFire managed
  'zabbix_agentd' and user managed 'zabbix_agentd_user' which is
  included in the backup
- Provide migration of old sudoers file 'zabbix' or 'zabbix.user' to
  new zabbix_agentd_user sudoers file if it was modified by user.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
22 months agozabbix_agentd: Configfile reorganization
Robin Roevens [Thu, 30 Jun 2022 10:15:52 +0000 (12:15 +0200)] 
zabbix_agentd: Configfile reorganization

- Restrict default main config to only the bare minimum options
  and add upstream provided config as example file.
- Remove /etc/zabbix_agentd from backup and instead add only
  zabbix_agentd.conf and subdirs 'scripts' and 'zabbix_agentd.d' to
  the backup.
- Move ipfire managed userparameter_pakfire.conf from
  user managed dir /etc/zabbix_agentd/zabbix_agent.d to
  ipfire managed dir /var/ipfire/zabbix_agentd/userparameters
- Add Include line to existing zabbix_agentd.conf to include
  the new ipfire managed config dir /var/ipfire/zabbix_agentd/...
- Add and include mandatory IPFire specific agent configuration
  which should never be changed by the user.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
22 months agozabbix_agentd: Fix agent modules dir and few minor bugs
Robin Roevens [Thu, 30 Jun 2022 10:15:51 +0000 (12:15 +0200)] 
zabbix_agentd: Fix agent modules dir and few minor bugs

- Add agent modules-dir to backup
- Remove original, not used agent modules dir from rootfile
- Create modules-dir during install if it not already exists
- bugfix: Add existence check before creating log-dir, avoiding error
             messages if it already exists from a previous install
- bugfix: add extract_backup_includes to update.sh script to make
              sure backup includes exist when backup is taken.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
22 months agozabbix_agentd: Update to v6.0.6 (LTS)
Robin Roevens [Thu, 30 Jun 2022 10:15:50 +0000 (12:15 +0200)] 
zabbix_agentd: Update to v6.0.6 (LTS)

- Update from 4.2.6 to latest LTS version 6.0.6
  See release notes: https://www.zabbix.com/rn/rn6.0.6

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
22 months agostripper: Strip any PIE executables
Michael Tremer [Thu, 30 Jun 2022 13:21:15 +0000 (13:21 +0000)] 
stripper: Strip any PIE executables

Fixes: #12894
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoCore Update 170: Ship ca-certificates
Peter Müller [Wed, 6 Jul 2022 06:30:09 +0000 (06:30 +0000)] 
Core Update 170: Ship ca-certificates

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoca-certificates: Update root CA certificates bundle
Peter Müller [Sat, 25 Jun 2022 22:30:23 +0000 (22:30 +0000)] 
ca-certificates: Update root CA certificates bundle

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoMerge branch 'next' into temp-c170-development
Peter Müller [Wed, 6 Jul 2022 06:14:54 +0000 (06:14 +0000)] 
Merge branch 'next' into temp-c170-development

22 months agoCore Update 169: Drop entropy.cgi
Peter Müller [Wed, 29 Jun 2022 20:28:38 +0000 (20:28 +0000)] 
Core Update 169: Drop entropy.cgi

Since the kernel now always reports 256 bits of entropy to be available,
this CGI does not show any useful information anymore. To avoid
confusions, it will hereby be removed entirely.

Fixes: #12893
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoCore Update 169: Delete "random" initscript
Peter Müller [Wed, 29 Jun 2022 20:13:11 +0000 (20:13 +0000)] 
Core Update 169: Delete "random" initscript

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agorandom: Drop busy-loop script
Michael Tremer [Wed, 29 Jun 2022 18:32:17 +0000 (18:32 +0000)] 
random: Drop busy-loop script

This is no longer required because the kernel will now try to
generate some randomness in an easier way when needed.

This has been added in: b923dd3de0acbf415cee193191250347b733fab8

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
22 months agosysctl: Permit ptrace usage for processes with CAP_SYS_PTRACE
Peter Müller [Wed, 29 Jun 2022 19:43:08 +0000 (19:43 +0000)] 
sysctl: Permit ptrace usage for processes with CAP_SYS_PTRACE

https://lists.ipfire.org/pipermail/development/2022-June/013763.html

Reported-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agocore169: Add initramdisks for armv6l, too
Michael Tremer [Wed, 29 Jun 2022 18:34:01 +0000 (18:34 +0000)] 
core169: Add initramdisks for armv6l, too

Looks like I have been ahead of time.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
22 months agocore169: Ship initramdisks
Michael Tremer [Wed, 29 Jun 2022 18:11:26 +0000 (18:11 +0000)] 
core169: Ship initramdisks

Those were not part of the update which renders any machine that
installs it unbootable.

Fixes: #12892
Reported-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
22 months agolinux: Update rootfiles to reflect /dev mount option change
Peter Müller [Mon, 27 Jun 2022 17:30:47 +0000 (17:30 +0000)] 
linux: Update rootfiles to reflect /dev mount option change

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoMerge branch 'next' into temp-c170-development temp-c170-development
Peter Müller [Mon, 27 Jun 2022 13:29:18 +0000 (13:29 +0000)] 
Merge branch 'next' into temp-c170-development

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agopython3-msgpack: Add rootfile for 32-bit ARM
Peter Müller [Mon, 27 Jun 2022 11:02:32 +0000 (11:02 +0000)] 
python3-msgpack: Add rootfile for 32-bit ARM

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoRevert "U-Boot: Update to 2022.04"
Peter Müller [Mon, 27 Jun 2022 07:34:16 +0000 (07:34 +0000)] 
Revert "U-Boot: Update to 2022.04"

Arne reported that this introduced regressions on some NanoPi models.

This reverts commit b8a9c9e70a0ff84401e53f1481f3c1eafab76a29.

22 months agoRevert "Core Update 169: Ship U-Boot"
Peter Müller [Mon, 27 Jun 2022 07:34:10 +0000 (07:34 +0000)] 
Revert "Core Update 169: Ship U-Boot"

This reverts commit 65264b3ba6358d78d70c2cc7b9e1c883b0b4af4a.

22 months agoRevert "u-boot: Clarify source URLs and add missing rk3399 firmware"
Peter Müller [Mon, 27 Jun 2022 07:33:59 +0000 (07:33 +0000)] 
Revert "u-boot: Clarify source URLs and add missing rk3399 firmware"

This reverts commit be5703ef78b6244dcf06b72e6f34ab72b2e7fc55.

22 months agoRevert "u-boot: .xz != .gz"
Peter Müller [Mon, 27 Jun 2022 07:33:48 +0000 (07:33 +0000)] 
Revert "u-boot: .xz != .gz"

This reverts commit 01b3a62a35a38db9d67121e66f983c0e0a38ca46.

22 months agoRevert "u-boot: Sigh, fix another .xz != .gz"
Peter Müller [Mon, 27 Jun 2022 07:33:40 +0000 (07:33 +0000)] 
Revert "u-boot: Sigh, fix another .xz != .gz"

This reverts commit 480202725b872018667ce0cdc337c25c94cef72b.

22 months agolinux: Amend upstream patch to harden mount points of /dev
Peter Müller [Sat, 25 Jun 2022 22:20:48 +0000 (22:20 +0000)] 
linux: Amend upstream patch to harden mount points of /dev

This patch, which has been merged into the mainline Linux kernel, but
not yet backported to the 5.15.x tree, precisely addresses our
situation: IPFire does not use systemd, but CONFIG_DEVTMPFS_MOUNT.

The only explanation I have for bug #12889 arising _now_ is that some
component (dracut, maybe) changed its behaviour regarding remounting of
already mounted special file systems. As current dracut won't (re)mount
any file system already found to be mounted, this means that the mount
options decided by the kernel remained untouched for /dev, hence being
weak in terms of options hardening possible.

As CONFIG_DEVTMPFS_SAFE would not show up in "make menuconfig", changes
to kernel configurations have been simulated.

Fixes: #12889
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agoCore Update 170: Ship Pakfire functions.pl
Peter Müller [Sat, 25 Jun 2022 11:15:43 +0000 (11:15 +0000)] 
Core Update 170: Ship Pakfire functions.pl

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
22 months agopakfire: Better errorhandling on downloads
Robin Roevens [Wed, 23 Feb 2022 20:21:30 +0000 (21:21 +0100)] 
pakfire: Better errorhandling on downloads

- Add true/false return codes to fetchfile, getmetafile and getmirrors
  indicating succes or failure.
- Check on those return codes and fail gracefully with clean
  error message(s) when downloads fail.
- Replace duplicate meta-file fetching code in dbgetlist with
  getmetafile function (fixing possibly missed cariage return
  conversion in meta-files).
- Remove pointless 5 retries to download server-list.db in
  selectmirror as fetchfile already retries 5 times.

22 months agorust-time: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:43 +0000 (11:42 +0200)] 
rust-time: Required for update of python3-cryptography

- lfs and rootfile created
- Patch created to remove requirement for winapi and related windows dependencies

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-stable_deref_trait: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:42 +0000 (11:42 +0200)] 
rust-stable_deref_trait: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-proc-macro-error-attr: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:41 +0000 (11:42 +0200)] 
rust-proc-macro-error-attr: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-proc-macro-error: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:40 +0000 (11:42 +0200)] 
rust-proc-macro-error: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-pem: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:39 +0000 (11:42 +0200)] 
rust-pem: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-paste-0.1.18: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:38 +0000 (11:42 +0200)] 
rust-paste-0.1.18: Required for update of python3-cryptography

- lfs and rootfile created
- python3-cryptography build requires older version than was already installed.
   Therefore named version 0.1.18 created, leaving original rust-paste in place

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-ouroboros_macro: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:37 +0000 (11:42 +0200)] 
rust-ouroboros_macro: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-ouroboros: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:36 +0000 (11:42 +0200)] 
rust-ouroboros: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-num_threads: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:35 +0000 (11:42 +0200)] 
rust-num_threads: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-num-traits: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:34 +0000 (11:42 +0200)] 
rust-num-traits: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-num-integer: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:33 +0000 (11:42 +0200)] 
rust-num-integer: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-indoc-0.3.6: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:32 +0000 (11:42 +0200)] 
rust-indoc-0.3.6: Required for update of python3-cryptography

- lfs and rootfile created
- python3-cryptography build requires older version than was already installed.
   Therefore named version 0.3.6 created, leaving original rust-indoc in place

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-chrono: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:31 +0000 (11:42 +0200)] 
rust-chrono: Required for update of python3-cryptography

- lfs and rootfile created
- Patch created to remove requirement for winapi and related windows dependencies

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-base64: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:30 +0000 (11:42 +0200)] 
rust-base64: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-asn1_derive: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:29 +0000 (11:42 +0200)] 
rust-asn1_derive: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-asn1: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:28 +0000 (11:42 +0200)] 
rust-asn1: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-aliasable: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:27 +0000 (11:42 +0200)] 
rust-aliasable: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-Inflector: Required for update of python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:26 +0000 (11:42 +0200)] 
rust-Inflector: Required for update of python3-cryptography

- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-pyo3-macros-backend: Update to version 0.15.1 - required for python3-cryptograph...
Adolf Belka [Fri, 17 Jun 2022 09:42:25 +0000 (11:42 +0200)] 
rust-pyo3-macros-backend: Update to version 0.15.1 - required for python3-cryptography update

- Update from version 0.13.1 to 0.15.1
   Required to be at same version as rust-pyo3
- Update of rootfile
- Changelog not available

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-pyo3-macros: Update to version 0.15.1 - required for python3-cryptography update
Adolf Belka [Fri, 17 Jun 2022 09:42:24 +0000 (11:42 +0200)] 
rust-pyo3-macros: Update to version 0.15.1 - required for python3-cryptography update

- Update from version 0.13.1 to 0.15.1
   Required to be at same version as rust-pyo3
- Update of rootfile
- Changelog not available

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agorust-pyo3: Update to version 0.15.1 - required for python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:23 +0000 (11:42 +0200)] 
rust-pyo3: Update to version 0.15.1 - required for python3-cryptography

- Update from version 0.13.1 to 0.15.1
- Update of rootfile
- Changelog is too long to include here. For details see CHANGELOG.md file in source
   tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agomake.sh: New rust dependencies for python3-cryptography
Adolf Belka [Fri, 17 Jun 2022 09:42:22 +0000 (11:42 +0200)] 
make.sh: New rust dependencies for python3-cryptography

- New rust dependencies added for python3-cryptography

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
22 months agopython3-cryptography: Update to version 36.0.2
Adolf Belka [Fri, 17 Jun 2022 09:42:21 +0000 (11:42 +0200)] 
python3-cryptography: Update to version 36.0.2

- Update from version 3.4.7 to 36.0.2
   After version 3.4.8 the numbering scheme changed to 35.0.0 in Sept 2021
   See Chanelog section 35.0.0 below
- New release requires a lot of rust packages - see Changelog sections 35.0.0 & 36.0.0
   below. The required rust packages are installed in separate patches in this series
- Update of rootfile
- Changelog
36.0.2 - 2022-03-15¶
    Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.
36.0.1 - 2021-12-14¶
    Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.
36.0.0 - 2021-11-21¶
    FINAL DEPRECATION Support for verifier and signer on our asymmetric key
             classes was deprecated in version 2.0. These functions had an extended
             deprecation due to usage, however the next version of cryptography will drop
             support. Users should migrate to sign and verify.
    The entire X.509 layer is now written in Rust. This allows alternate
             asymmetric key implementations that can support cloud key management
             services or hardware security modules provided they implement the necessary
             interface (for example: EllipticCurvePrivateKey).
    Deprecated the backend argument for all functions.
    Added support for AESOCB3.
    Added support for iterating over arbitrary request attributes.
    Deprecated the get_attribute_for_oid method on CertificateSigningRequest in
             favor of get_attribute_for_oid() on the new Attributes object.
    Fixed handling of PEM files to allow loading when certificate and key are in
             the same file.
    Fixed parsing of CertificatePolicies extensions containing legacy BMPString
             values in their explicitText.
    Allow parsing of negative serial numbers in certificates. Negative serial
             numbers are prohibited by RFC 5280 so a deprecation warning will be raised
             whenever they are encountered. A future version of cryptography will drop
             support for parsing them.
    Added support for parsing PKCS12 files with friendly names for all
             certificates with load_pkcs12(), which will return an object of type
             PKCS12KeyAndCertificates.
    rfc4514_string() and related methods now have an optional attr_name_overrides
             parameter to supply custom OID to name mappings, which can be used to match
             vendor-specific extensions.
    BACKWARDS INCOMPATIBLE: Reverted the nonstandard formatting of email address
             fields as E in rfc4514_string() methods from version 35.0.
    The previous behavior can be restored with:
             name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})
    Allow X25519PublicKey and X448PublicKey to be used as public keys when
             parsing certificates or creating them with CertificateBuilder. These key
             types must be signed with a different signing algorithm as X25519 and X448
             do not support signing.
    Extension values can now be serialized to a DER byte string by calling
             public_bytes().
    Added experimental support for compiling against BoringSSL. As BoringSSL
             does not commit to a stable API, cryptography tests against the latest
             commit only. Please note that several features are not available when
             building against BoringSSL.
    Parsing CertificateSigningRequest from DER and PEM now, for a limited time
             period, allows the Extension critical field to be incorrectly encoded. See
             the issue for complete details. This will be reverted in a future
             cryptography release.
    When OCSPNonce are parsed and generated their value is now correctly wrapped
             in an ASN.1 OCTET STRING. This conforms to RFC 6960 but conflicts with the
             original behavior specified in RFC 2560. For a temporary period for
             backwards compatibility, we will also parse values that are encoded as
             specified in RFC 2560 but this behavior will be removed in a future release.
35.0.0 - 2021-09-29¶
    Changed the version scheme. This will result in us incrementing the major
             version more frequently, but does not change our existing backwards
             compatibility policy.
    BACKWARDS INCOMPATIBLE: The X.509 PEM parsers now require that the PEM
             string passed have PEM delimiters of the correct type. For example, parsing
             a private key PEM concatenated with a certificate PEM will no longer be
             accepted by the PEM certificate parser.
    BACKWARDS INCOMPATIBLE: The X.509 certificate parser no longer allows
             negative serial numbers. RFC 5280 has always prohibited these.
    BACKWARDS INCOMPATIBLE: Additional forms of invalid ASN.1 found during X.509
             parsing will raise an error on initial parse rather than when the malformed
             field is accessed.
    Rust is now required for building cryptography, the
             CRYPTOGRAPHY_DONT_BUILD_RUST environment variable is no longer respected.
    Parsers for X.509 no longer use OpenSSL and have been rewritten in Rust.
             This should be backwards compatible (modulo the items listed above) and
             improve both security and performance.
    Added support for OpenSSL 3.0.0 as a compilation target.
    Added support for SM3 and SM4, when using OpenSSL 1.1.1. These algorithms
             are provided for compatibility in regions where they may be required, and
             are not generally recommended.
    We now ship manylinux_2_24 and musllinux_1_1 wheels, in addition to our
             manylinux2010 and manylinux2014 wheels. Users on distributions like Alpine
             Linux should ensure they upgrade to the latest pip to correctly receive
             wheels.
    Added rfc4514_attribute_name attribute to x509.NameAttribute.
    Added KBKDFCMAC.
3.4.8 - 2021-08-24¶
    Updated Windows, macOS, and manylinux wheels to be compiled with
             OpenSSL 1.1.1l.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>