Commit Graph

1745 Commits

Author SHA1 Message Date
Adolf Belka
592bb59006 perl-MIME-Base64: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
4880f2edbd perl-JSON: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
6773041e91 perl-File-Tail: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
248a2cfe2c perl-File-ReadBackwards: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
b7602caac3 perl-Date-Manip: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
bf0ec79839 perl-Date-Calc: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
6f5a90c372 perl-Carp-Clan: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
e075fd5dc7 perl-Authen-SASL: Update to perl 5.36.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-01 21:16:49 +00:00
Adolf Belka
ae84a789f8 hplip: Update to version 3.22.6
- Update from version 3.22.4 to 3.22.6
- Update of rootfile
- Changelog
   HPLIP 3.22.6 - This release has the following changes:
     Added support for following new Distro's:
	Mx Linux 21.1
	Ubuntu 22.04
	Fedora 36
     Added support for the following new Printers:
	HP Color LaserJet Managed MFP E785dn
	HP Color LaserJet Managed MFP E78523dn
	HP Color LaserJet Managed MFP E78528dn
	HP Color LaserJet Managed MFP E786dn
	HP Color LaserJet Managed MFP E786 Core Printer
	HP Color LaserJet Managed MFP E78625dn
	HP Color LaserJet Managed FlowMFP E786z
	HP Color LaserJet Managed Flow MFP E78625z
	HP Color LaserJet Managed MFP E78630dn
	HP Color LaserJet Managed Flow MFP E78630z
	HP Color LaserJet Managed MFP E78635dn
	HP Color LaserJet Managed Flow MFP E78635z
	HP LaserJet Managed MFP E731dn
	HP LaserJet Managed MFP E731 Core Printer
	HP LaserJet Managed MFP E73130dn
	HP LaserJet Managed Flow MFP E731z
	HP LaserJet Managed Flow MFP E73130z
	HP LaserJet Managed MFP E73135dn
	HP LaserJet Managed Flow MFP E73135z
	HP LaserJet Managed MFP E73140dn
	HP LaserJet Managed Flow MFP E73140z
	HP Color LaserJet Managed MFP E877dn
	HP Color LaserJet Managed MFP E877 Core Printer
	HP Color LaserJet Managed MFP E87740dn
	HP Color LaserJet Managed Flow MFP E877z
	HP Color LaserJet Managed Flow MFP E87740z
	HP Color LaserJet Managed MFP E87750dn
	HP Color LaserJet Managed Flow MFP E87750z
	HP Color LaserJet Managed MFP E87760dn
	HP Color LaserJet Managed Flow MFP E87760z
	HP Color LaserJet Managed MFP E87770dn
	HP Color LaserJet Managed Flow MFP E87770z
	HP LaserJet Managed MFP E826dn
	HP LaserJet Managed MFP E826 Core Printer
	HP LaserJet Managed MFP E82650dn
	HP LaserJet Managed Flow MFP E826z
	HP LaserJet Managed Flow MFP E82650z
	HP LaserJet Managed MFP E82660dn
	HP LaserJet Managed Flow MFP E82660z
	HP LaserJet Managed MFP E82670dn
	HP LaserJet Managed Flow MFP E82670z
	HP LaserJet Managed MFP E730dn
	HP LaserJet Managed MFP E73025dn
	HP LaserJet Managed MFP E73030dn
	HP LaserJet Pro MFP 3101fdwe
	HP LaserJet Pro MFP 3101fdw
	HP LaserJet Pro MFP 3102fdwe
	HP LaserJet Pro MFP 3102fdw
	HP LaserJet Pro MFP 3103fdw
	HP LaserJet Pro MFP 3104fdw
	HP LaserJet Pro MFP 3101fdne
	HP LaserJet Pro MFP 3101fdn
	HP LaserJet Pro MFP 3102fdne
	HP LaserJet Pro MFP 3102fdn
	HP LaserJet Pro MFP 3103fdn
	HP LaserJet Pro MFP 3104fdn
	HP LaserJet Pro 3001dwe
	HP LaserJet Pro 3001dw
	HP LaserJet Pro 3002dwe
	HP LaserJet Pro 3002dw
	HP LaserJet Pro 3003dw
	HP LaserJet Pro 3004dw
	HP LaserJet Pro 3001dne
	HP LaserJet Pro 3001dn
	HP LaserJet Pro 3002dne
	HP LaserJet Pro 3002dn
	HP LaserJet Pro 3003dn
	HP LaserJet Pro 3004dn

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-01 21:15:18 +00:00
Adolf Belka
cb170abd3b fmt: Convert from build only to run time also for mpd
- libfmt required in run time by mpd
- mpd changelog specifically said fmt was a build only dependency
- Bug#12909 flagged up that fmt was also a run time dependency for mpd

Fixes: Bug#12909
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-11 18:35:03 +00:00
Michael Tremer
f605a2d303 amazon-ssm-agent: Enable build for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-11 18:29:13 +00:00
Michael Tremer
c4fc6eb017 nqptp: New package
This is a PTP clock synchronisation daemon.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-08-10 10:44:31 +00:00
Michael Tremer
200e39b79f libplist: New package
A library to handle Apple Property List format in binary or XML.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-08-10 10:44:31 +00:00
Adolf Belka
30ea66cf4b pyfuse3: Install to provide fuse capability for borgbackup
- v3 version adds specific armv6l based rootfile as xxxMACHINExxx does not get correct
   substitution

Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-07 09:32:40 +00:00
Jon Murphy
645c2eb8dc tftpd: add missing directory
- starting tftpd currently throws "missing directory" error
- this change corrects the issue

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-08-05 09:12:54 +00:00
Adolf Belka
006f9fda6b python3-outcome: Dependency for python3-trio
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:30 +00:00
Adolf Belka
37f8c0617a python3-sortedcontainers: Dependency for python3-trio
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:30 +00:00
Adolf Belka
f1e30a702a python3-sniffio: Dependency for python3-trio
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:30 +00:00
Adolf Belka
fea3c1eaf4 python3-attrs: Dependency for python3-trio
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:30 +00:00
Adolf Belka
d62b0fb202 python3-async_generator: Dependency for python3-trio
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:30 +00:00
Adolf Belka
36fab535bf python3-attr: Dependency for python3-trio
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:30 +00:00
Adolf Belka
0c161e8cfb python3-trio: Dependency for python3-pyfuse3
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:29 +00:00
Adolf Belka
9cb200c4d9 pyfuse3: Install to provide fuse capability for borgbackup
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:29 +00:00
Peter Müller
86077bafc0 qemu: Update to 7.0.0
Please refer to https://wiki.qemu.org/ChangeLog/7.0 for the changelog of
this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-03 10:59:32 +00:00
Peter Müller
21aac1a554 Samba: Update to 4.16.4
This is a security release, please refer to https://www.samba.org/samba/latest_news.html#4.16.4
for the respective advisory.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-29 17:04:06 +00:00
Matthias Fischer
b2ab2f4ccc clamav: Update to 0.105.1
For details see:
https://blog.clamav.net/2022/07/clamav-01037-01041-and-01051-patch.html

"ClamAV 0.105.1 is a critical patch release with the following fixes:

    Upgrade the vendored UnRAR library to version 6.1.7.

    Fix issue building macOS universal binaries in some configurations.

    Silence error message when the logical signature maximum functionality
    level is lower than the current functionality level.

    Fix scan error when scanning files containing malformed images that
    cannot be loaded to calculate an image fuzzy hash.

    Fix logical signature "Intermediates" feature.

    Relax constraints on slightly malformed ZIP archives that contain
    overlapping file entries."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-27 07:11:47 +00:00
Michael Tremer
71aba971c4 cups: Add link at /etc/cups pointing to configuration
This is needed because cups-pdf is looking for its configuration file in
/etc/cups.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-27 07:09:31 +00:00
Michael Tremer
fdf630e8d4 cups-pdf: New package
This package provides a CUPS backend to print into PDF files.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-27 07:09:30 +00:00
Jon Murphy
064a04d943 pcengines-apu-firmware: Update to version 4.17.0.1
- Update from 4.16.0.3 to 4.17.0.1
- Changelog
    v4.17.0.1 - Release date: 2022-06-23
      Rebased with official coreboot repository commit 5eda52a
      updated sortbootorder to v4.6.24
      Added - Support for APU7 (APU3 variant with 2.5GbE i225 NICs)
      See: https://github.com/pcengines/coreboot/compare/v4.16.0.4...v4.17.0.1

    v4.16.0.4 Release date: 2022-05-26
      Rebased with official coreboot repository commit 9686ac2261
      updated sortbootorder to v4.6.23
      updated SeaBIOS to rel-1.16.0.1
      See: https://github.com/pcengines/coreboot/compare/v4.16.0.3...v4.16.0.4

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Bernhard Bitsch <bbitsch@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-20 10:21:16 +00:00
Adolf Belka
da92346e42 gutenprint: Update to version 5.3.4
- Update frpm version 5.2.9 (2012) to 5.3.4
- Update of rootfile
- find-dependencies run on sobumped libs. No dependencies found on old sobumped versions
   only on the new versions.
- Changelog is too large to include here (approx 1700 lines). For details of changes see
   the ChangeLog file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-09 09:08:22 +00:00
Robin Roevens
50fdf0ee9c zabbix_agentd: Add IPFire specific userparameters
Provide IPFire specific items for the Zabbix server to monitor:
- ipfire.net.gateway.pingtime: Internet Line Quality
- ipfire.net.gateway.ping: Internet connection
- ipfire.net.fw.hits.raw: JSON formatted list of Firewall hits/chain
- ipfire.dhcpd.clients: Number of active DHCP leases
- ipfire.captive.clients: Number of Captive Portal clients

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
092330b128 zabbix_agentd: Sudoers file reorganization
- Remove sudoers file 'zabbix' in favour of new IPFire managed
  'zabbix_agentd' and user managed 'zabbix_agentd_user' which is
  included in the backup
- Provide migration of old sudoers file 'zabbix' or 'zabbix.user' to
  new zabbix_agentd_user sudoers file if it was modified by user.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
e2d54d57d4 zabbix_agentd: Configfile reorganization
- Restrict default main config to only the bare minimum options
  and add upstream provided config as example file.
- Remove /etc/zabbix_agentd from backup and instead add only
  zabbix_agentd.conf and subdirs 'scripts' and 'zabbix_agentd.d' to
  the backup.
- Move ipfire managed userparameter_pakfire.conf from
  user managed dir /etc/zabbix_agentd/zabbix_agent.d to
  ipfire managed dir /var/ipfire/zabbix_agentd/userparameters
- Add Include line to existing zabbix_agentd.conf to include
  the new ipfire managed config dir /var/ipfire/zabbix_agentd/...
- Add and include mandatory IPFire specific agent configuration
  which should never be changed by the user.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
1d00837e7e zabbix_agentd: Fix agent modules dir and few minor bugs
- Add agent modules-dir to backup
- Remove original, not used agent modules dir from rootfile
- Create modules-dir during install if it not already exists
- bugfix: Add existence check before creating log-dir, avoiding error
             messages if it already exists from a previous install
- bugfix: add extract_backup_includes to update.sh script to make
              sure backup includes exist when backup is taken.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Peter Müller
5503a18d71 Merge branch 'next' into temp-c170-development
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-27 13:29:18 +00:00
Peter Müller
f5117ab51d python3-msgpack: Add rootfile for 32-bit ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-27 11:02:32 +00:00
Adolf Belka
643871d4a7 python3-cryptography: Update to version 36.0.2
- Update from version 3.4.7 to 36.0.2
   After version 3.4.8 the numbering scheme changed to 35.0.0 in Sept 2021
   See Chanelog section 35.0.0 below
- New release requires a lot of rust packages - see Changelog sections 35.0.0 & 36.0.0
   below. The required rust packages are installed in separate patches in this series
- Update of rootfile
- Changelog
	36.0.2 - 2022-03-15¶
	    Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.
	36.0.1 - 2021-12-14¶
	    Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.
	36.0.0 - 2021-11-21¶
	    FINAL DEPRECATION Support for verifier and signer on our asymmetric key
             classes was deprecated in version 2.0. These functions had an extended
             deprecation due to usage, however the next version of cryptography will drop
             support. Users should migrate to sign and verify.
	    The entire X.509 layer is now written in Rust. This allows alternate
             asymmetric key implementations that can support cloud key management
             services or hardware security modules provided they implement the necessary
             interface (for example: EllipticCurvePrivateKey).
	    Deprecated the backend argument for all functions.
	    Added support for AESOCB3.
	    Added support for iterating over arbitrary request attributes.
	    Deprecated the get_attribute_for_oid method on CertificateSigningRequest in
             favor of get_attribute_for_oid() on the new Attributes object.
	    Fixed handling of PEM files to allow loading when certificate and key are in
             the same file.
	    Fixed parsing of CertificatePolicies extensions containing legacy BMPString
             values in their explicitText.
	    Allow parsing of negative serial numbers in certificates. Negative serial
             numbers are prohibited by RFC 5280 so a deprecation warning will be raised
             whenever they are encountered. A future version of cryptography will drop
             support for parsing them.
	    Added support for parsing PKCS12 files with friendly names for all
             certificates with load_pkcs12(), which will return an object of type
             PKCS12KeyAndCertificates.
	    rfc4514_string() and related methods now have an optional attr_name_overrides
             parameter to supply custom OID to name mappings, which can be used to match
             vendor-specific extensions.
	    BACKWARDS INCOMPATIBLE: Reverted the nonstandard formatting of email address
             fields as E in rfc4514_string() methods from version 35.0.
	    The previous behavior can be restored with:
             name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})
	    Allow X25519PublicKey and X448PublicKey to be used as public keys when
             parsing certificates or creating them with CertificateBuilder. These key
             types must be signed with a different signing algorithm as X25519 and X448
             do not support signing.
	    Extension values can now be serialized to a DER byte string by calling
             public_bytes().
	    Added experimental support for compiling against BoringSSL. As BoringSSL
             does not commit to a stable API, cryptography tests against the latest
             commit only. Please note that several features are not available when
             building against BoringSSL.
	    Parsing CertificateSigningRequest from DER and PEM now, for a limited time
             period, allows the Extension critical field to be incorrectly encoded. See
             the issue for complete details. This will be reverted in a future
             cryptography release.
	    When OCSPNonce are parsed and generated their value is now correctly wrapped
             in an ASN.1 OCTET STRING. This conforms to RFC 6960 but conflicts with the
             original behavior specified in RFC 2560. For a temporary period for
             backwards compatibility, we will also parse values that are encoded as
             specified in RFC 2560 but this behavior will be removed in a future release.
	35.0.0 - 2021-09-29¶
	    Changed the version scheme. This will result in us incrementing the major
             version more frequently, but does not change our existing backwards
             compatibility policy.
	    BACKWARDS INCOMPATIBLE: The X.509 PEM parsers now require that the PEM
             string passed have PEM delimiters of the correct type. For example, parsing
             a private key PEM concatenated with a certificate PEM will no longer be
             accepted by the PEM certificate parser.
	    BACKWARDS INCOMPATIBLE: The X.509 certificate parser no longer allows
             negative serial numbers. RFC 5280 has always prohibited these.
	    BACKWARDS INCOMPATIBLE: Additional forms of invalid ASN.1 found during X.509
             parsing will raise an error on initial parse rather than when the malformed
             field is accessed.
	    Rust is now required for building cryptography, the
             CRYPTOGRAPHY_DONT_BUILD_RUST environment variable is no longer respected.
	    Parsers for X.509 no longer use OpenSSL and have been rewritten in Rust.
             This should be backwards compatible (modulo the items listed above) and
             improve both security and performance.
	    Added support for OpenSSL 3.0.0 as a compilation target.
	    Added support for SM3 and SM4, when using OpenSSL 1.1.1. These algorithms
             are provided for compatibility in regions where they may be required, and
             are not generally recommended.
	    We now ship manylinux_2_24 and musllinux_1_1 wheels, in addition to our
             manylinux2010 and manylinux2014 wheels. Users on distributions like Alpine
             Linux should ensure they upgrade to the latest pip to correctly receive
             wheels.
	    Added rfc4514_attribute_name attribute to x509.NameAttribute.
	    Added KBKDFCMAC.
	3.4.8 - 2021-08-24¶
	    Updated Windows, macOS, and manylinux wheels to be compiled with
             OpenSSL 1.1.1l.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
de6ef4d40a python3-msgpack: Required for build and execution of borgbackup 1.2.0
- New python module required for borgbackup. In borgbackup version 1.1.18 or 1.1.19
   the old bundled msgpack in borgbackup was removed and a specified version range
   of python3-msgpack required.
- This patch adds the lfs and rootfiles for this module

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Adolf Belka
006309eaaf python3-packaging: Moved to rootfiles/packages/ directory
- Required for borgbackup execution

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Adolf Belka
c9336f7a1f borgbackup: Fix bug #12884 - borgbackup 1.2.0 crashes on running any borg command
- When borgbackup was upgraded from version 1.1.17 to 1.2.0 the build was sucessfully
   completed but there was no testing feedback till after full release. It turned out
   that it did not successfully run.
- python3-packaging which had been installed for the build of borgbackup needed to also
   be available for the execution.
- When borgbackup was upgraded to 1.2.0 it was noticed that the old python3-msgpack was
   no longer needed as borgbackup used its own bundled msgpack since around version 1.1.10
   What was not seen was that in version 1.1.19 or 1.1.18 the bundled version of msgpack
   had been removed and that the newer version of python3-msgpack now needed to be
   installed but the version number has to meet the borgbackup requirements which currently
   require it to be =<1.0.3
- This patch adds the python3-packaging and python3-msgpack modules as dependencies for
   borgbackup
- The egg-info files are uncommented in the rootfile so that the borgbackup metadata can
   be found by python.
- The updated borgbackup build together with the python3-packaging and python3-msgpack
   modules were installed into a vm system using the .ipfire packages.
   Successfully initialised a borgbackup repo and ran two backups to the repo and checked
   the stats for the backup. Everything ran fine.

Fixes: Bug #12884
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Michael Tremer
de9ae56f4b python3-botocore: Ship interface descriptions
botocore parses any interface descriptions and exposes them to Python.
For that to work, we need to ship them.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:27:21 +00:00
Michael Tremer
92d1e94069 python3-botocore: Add httpchecksum module
It looks like this has been commented out by mistake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:27:21 +00:00
Stefan Schantl
9aa2c4cc29 libtiff: Move into core system.
pango and the PDF tools as core parts are linked against
libtiff, therefore this library has to become a part of the
core distribution too.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-06-17 16:28:05 +00:00
Stefan Schantl
4fdd355880 krb5: Move package into core system.
On one hand, the key.dns_resolver binary is linked against libkrb5, so this
library at least is required by the base system.

On the other hand this easily allows different services on the firewall
to use kerberos for authentication (ssh etc).

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-06-17 16:28:05 +00:00
Adolf Belka
1e09fe9b2d libvorbis: Update to version 1.3.7
- Update from version 1.3.6 to 1.3.7
- Update of rootfile
- Changelog
   libvorbis 1.3.7 (2020-07-04)
	* Fix CVE-2018-10393 - out-of-bounds read encoding very low sample rates.
	* Fix CVE-2017-14160 - out-of-bounds read encoding very low sample rates.
	* Fix handling invalid bytes per sample arguments.
	* Fix handling invalid channel count arguments.
	* Fix invalid free on seek failure.
	* Fix negative shift reading blocksize.
	* Fix accepting unreasonable float32 values.
	* Fix tag comparison depending on locale.
	* Fix unnecessarily linking libm.
	* Fix memory leak in test_sharedbook.
	* Update Visual Studio projects for ogg library filename change.
	* Distribute CMake build files with the source package.
	* Remove unnecessary configure --target switch.
	* Add gitlab CI support.
	* Add OSS-Fuzz support.
	* Build system and integration updates.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-05-30 19:45:10 +00:00
Michael Tremer
7154d8bfa6 aws-cli: Update to 1.23.12
This package and python3-botocore have to match exactly. Amazon does not
seem to care too much about compatibility between different versions
which is why we need to keep both in sync.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-05-30 19:21:59 +00:00
Michael Tremer
15194dcc39 python3-botocore: Update to 1.25.12
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-05-30 19:21:59 +00:00
Matthias Fischer
6bea701c49 clamav: Update to 0.105.0
For details see:
https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2022-05-30 19:18:01 +00:00
Peter Müller
3b92642427 Update rootfiles
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-05-08 14:16:10 +00:00
Adolf Belka
b2f707cb02 nut: Update to version 2.8.0
- Update from version 2.7.4 to 2.8.0
- 2.7.4 was released in 2016 and since then not a lot of progress was made with it but
   since the start of 2022 new work on nut has ocurred culminating in this release
- Update of rootfile
- Ran find-dependencies on the old libraries due to the sobump to confirm that nothing
   else than nut used them, which was the case.
- Changelog
	After a long and windy trip since the last official release v2.7.4 half a dozen
         years ago, we the community, contributors and maintainers are proud to announce
         at last the general availability of NUT v2.8.0!
	As always, the new release includes numerous new drivers, sub-drivers, protocols
         and bug-fixes, with many companies and individuals chipping in with contributions
         of code.Thanks to everyone involved in making this happen, inspiring the changes,
         and providing the open-source friendly infrastructure.
	This release also culminates a significant effort in improvements of NUT QA and
         CI, and as a result -- in codebase quality and portability across a decade or
         two of recent platforms, third-party tools and other dependencies. As a side
         effect, public API (in headers and libraries) has changed a bit, hence a new
         semantic "minor" number is claimed for this major body of work.
	During this time, the https://networkupstools.org/ web site has changed to a
         rolling-release model to serve current information to match the evolving
         codebase. There are now special Sub-sites for historic releases to keep
         documentation snapshots relevant for users of packages which are typically based
         on official NUT releases.
	We recognize that NUT is an important piece of infrastructure which gets built
         into all sorts of devices, projects and operating systems -- some of which the
         team never heard of until they pop up in a question, and others we haven't heard
         of for years -- so we take a seriously omnivorous stance towards covering many
         versions and implementations of compiler suites, C/C++ revisions, make programs,
         shell and other scripted language interpreters, OSes and CPUs, and other similar
         variables tamed with our new NUT CI farm test matrix dynamically driven by
         currently registered build agents and their declared capabilities.
	Sections in the NEWS and UPGRADING files about changes since last release are
         several pages long, so would not all be repeated here. A few important
         highlights for distribution packagers and custom builders follow, however:
	    NUT now supports more i2c and modbus devices, as well as libusb-1.0 support
             as an alternative to earlier libusb-0.1 (so new dependency-based categories
             of packages for drivers may be due);
	    NUT Python modules and scripts (e.g. NUT-Monitor variants) should work with
             python-2.7 and with python-3.x, so covering historic distro releases as
             well as new ones (and so your distro can deliver one or both, probably in
             several packages with different dependencies in the latter case);
	    NUT provides revised reference systemd and SMF service unit definitions,
             including support of drivers wrapped into individual service instances with
             varying dependencies based on different media required (networked stack, USB
             stack, etc.), and many daemons include -F option for running "in foreground"
             to avoid extra forking after one already done by a service framework - you
             may want to use those in your packaged deliverables;
	    NUT newly provides the "nut-driver-enumerator" script and service, which
             allows it to follow edition of ups.conf and dynamically define+(re)start and
             stop+undefine service instances for drivers - there are several ways it can
             be integrated for different use-cases;
	    There are several new configuration keywords and CLI options - so while new
             NUT builds should work with old configs and scripts, the opposite is not
             necessarily true (old binaries may reject configurations taking advantage
             of new features);
	    There are several new protocol keywords - but old and new NUT daemons (data
             server and clients) should be able to communicate both ways;
	    It is assumed that API/ABI changes may require third-party NUT clients
             (library consumers of libnutclient, libupsclient, libnutscan... -- their
             version info was bumped accordingly) to get rebuilt, in order to work with
             the new NUT release in a stable fashion;
	    The dummy-ups driver used in automated testing now processes *.dev filename
             patterns once and does not loop, like it still does for *.seq and other
             files (by default);
	    USB code is now more strict about logical minimum/maximum ranges for data
             reported from devices, and some devices were already found to make mistakes
             - so there is also a mechanism for turning a blind eye to known issues and
             fix-up such report descriptors to produce intended sane values;
	    New documentation page docs/config-prereqs.txt highlights packaged
             dependencies installable on a large range of platforms to build as much of
             NUT as possible (incidentally, ones NUT CI farm uses to test every iteration);
	    Finally, we hope that NUT codebase might be able to cater for everyone "out
             of the box" (it also simplifies local builds from GitHub sources on any
             systems, for troubleshooting and checking pre-release enhancements): if you
             as a packager have to apply patches for your distribution, give it a thought
             -- whether they address a common issue best solved upstream once and behave
             similarly for everyone (and conversely, if your platform can do with
             existing solutions already tracked in the NUT version du-jour). PRs welcome!
             Or at least Wiki entries to list all the distro efforts for cross-pollination

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-05-05 16:44:38 +00:00