Commit Graph

39 Commits

Author SHA1 Message Date
Matthias Fischer
3e5190f5c7 samba: Update to 4.17.0
For details see:
https://www.samba.org/samba/latest_news.html#4.17.0

This "just came my way" and I found the CVEs listed on
https://www.samba.org/samba/history/security.html which
address "All versions of Samba prior to 4.16.4" or
"All versions of Samba" rather long.

The 'glibc_headers' patch is now included.

Sad to say, due to the lack of hardware I can only include
the rootfile for x86_64.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2022-10-24 09:08:01 +00:00
Peter Müller
21aac1a554 Samba: Update to 4.16.4
This is a security release, please refer to https://www.samba.org/samba/latest_news.html#4.16.4
for the respective advisory.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-29 17:04:06 +00:00
Adolf Belka
e8e8b6ae29 samba: Update to version 4.16.0
- Update from version 4.15.5 to 4.16.0
- Update of rootfile
- perl-JSON now added to samba requirements. Additional patch combined with this on for
   install of perl-JSON
- Changelog
   Release Notes for Samba 4.16.0
     NEW FEATURES/CHANGES
	New samba-dcerpcd binary to provide DCERPC in the member server setup
		In order to make it much easier to break out the DCERPC services
		from smbd, a new samba-dcerpcd binary has been created.
		samba-dcerpcd can be used in two ways. In the normal case without
		startup script modification it is invoked on demand from smbd or
		winbind --np-helper to serve DCERPC over named pipes. Note that
		in order to run in this mode the smb.conf [global] section has
		a new parameter "rpc start on demand helpers = [true|false]".
		This parameter is set to "true" by default, meaning no changes to
		smb.conf files are needed to run samba-dcerpcd on demand as a named
		pipe helper.
		It can also be used in a standalone mode where it is started
		separately from smbd or winbind but this requires changes to system
		startup scripts, and in addition a change to smb.conf, setting the new
		[global] parameter "rpc start on demand helpers = false". If "rpc
		start on demand helpers" is not set to false, samba-dcerpcd will
		refuse to start in standalone mode.
		Note that when Samba is run in the Active Directory Domain Controller
		mode the samba binary that provides the AD code will still provide its
		normal DCERPC services whilst allowing samba-dcerpcd to provide
		services like SRVSVC in the same way that smbd used to in this
		configuration.
		The parameters that allowed some smbd-hosted services to be started
		externally are now gone (detailed below) as this is now the default
		setting.
		samba-dcerpcd can also be useful for use outside of the Samba
		framework, for example, use with the Linux kernel SMB2 server ksmbd or
		possibly other SMB2 server implementations.
	Heimdal-8.0pre used for Samba Internal Kerberos, adds FAST support
		Samba has since Samba 4.0 included a snapshot of the Heimdal Kerberos
		implementation.  This snapshot has now been updated and will closely
		match what will be released as Heimdal 8.0 shortly.
		This is a major update, previously we used a snapshot of Heimdal from
		2011, and brings important new Kerberos security features such as
		Kerberos request armoring, known as FAST.  This tunnels ticket
		requests and replies that might be encrypted with a weak password
		inside a wrapper built with a stronger password, say from a machine
		account.
		In Heimdal and MIT modes Samba's KDC now supports FAST, for the
		support of non-Windows clients.
		Windows clients will not use this feature however, as they do not
		attempt to do so against a server not advertising domain Functional
		Level 2012.  Samba users are of course free to modify how Samba
		advertises itself, but use with Windows clients is not supported "out
		of the box".
		Finally, Samba also uses a per-KDC, not per-realm 'cookie' to secure part of
		the FAST protocol.  A future version will align this more closely with
		Microsoft AD behaviour.
		If FAST needs to be disabled on your Samba KDC, set
		 kdc enable fast = no
		in the smb.conf.
	Certificate Auto Enrollment
		Certificate Auto Enrollment allows devices to enroll for certificates from
		Active Directory Certificate Services. It is enabled by Group Policy.
		To enable Certificate Auto Enrollment, Samba's group policy will need to be
		enabled by setting the smb.conf option `apply group policies` to Yes. Samba
		Certificate Auto Enrollment depends on certmonger, the cepces certmonger
		plugin, and sscep. Samba uses sscep to download the CA root chain, then uses
		certmonger paired with cepces to monitor the host certificate templates.
		Certificates are installed in /var/lib/samba/certs and private keys are
		installed in /var/lib/samba/private/certs.
	Ability to add ports to dns forwarder addresses in internal DNS backend
		The internal DNS server of Samba forwards queries non-AD zones to one or more
		configured forwarders. Up until now it has been assumed that these forwarders
		listen on port 53. Starting with this version it is possible to configure the
		port using host:port notation. See smb.conf for more details. Existing setups
		are not affected, as the default port is 53.
	CTDB changes
		* The "recovery master" role has been renamed "leader"
		  Documentation and logs now refer to "leader".
		  The following ctdb tool command names have changed:
		    recmaster -> leader
		    setrecmasterrole -> setleaderrole
		  Command output has changed for the following commands:
		    status
		    getcapabilities
		  The "[legacy] -> recmaster capability" configuration option has been
		  renamed and moved to the cluster section, so this is now:
		    [cluster] -> leader capability
		* The "recovery lock" has been renamed "cluster lock"
		  Documentation and logs now refer to "cluster lock".
		  The "[cluster] -> recovery lock" configuration option has been
		  deprecated and will be removed in a future version.  Please use
		  "[cluster] -> cluster lock" instead.
		  If the cluster lock is enabled then traditional elections are not
		  done and leader elections use a race for the cluster lock.  This
		  avoids various conditions where a node is elected leader but can not
		  take the cluster lock.  Such conditions included:
		  - At startup, a node elects itself leader of its own cluster before
		    connecting to other nodes
		  - Cluster filesystem failover is slow
		  The abbreviation "reclock" is still used in many places, because a
		  better abbreviation eludes us (i.e. "clock" is obvious bad) and
		  changing all instances would require a lot of churn.  If the
		  abbreviation "reclock" for "cluster lock" is confusing, please
		  consider mentally prefixing it with "really excellent".
		* CTDB now uses leader broadcasts and an associated timeout to
		  determine if an election is required
		  The leader broadcast timeout can be configured via new configuration
		  option
		    [cluster] -> leader timeout
		  This specifies the number of seconds without leader broadcasts
		  before a node calls an election.  The default is 5.
     REMOVED FEATURES
	  Older SMB1 protocol SMBCopy command removed
		SMB is a nearly 30-year old protocol, and some protocol commands that
		while supported in all versions, have not seen widespread use.
		One of those is SMBCopy, a feature for a server-side copy of a file.
		This feature has been so unmaintained that Samba has no testsuite for
		it.
		The SMB1 command SMB_COM_COPY (SMB1 command number 0x29) was
		introduced in the LAN Manager 1.0 dialect and it was rendered obsolete
		in the NT LAN Manager dialect.
		Therefore it has been removed from the Samba smbd server.
		We do note that a fully supported and tested server-side copy is
		present in SMB2, and can be accessed with "scopy" subcommand in
		smbclient)
	  SMB1 server-side wildcard expansion removed
		Server-side wildcard expansion is another feature that sounds useful,
		but is also rarely used and has become problematic - imposing extra
		work on the server (both in terms of code and CPU time).
		In actual OS design, wildcard expansion is handled in the local shell,
		not at the remote server using SMB wildcard syntax (which is not shell
		syntax).
		In Samba 4.16 the ability to process file name wildcards in requests
		using the SMB1 commands SMB_COM_RENAME (SMB1 command number 0x7),
		SMB_COM_NT_RENAME (SMB1 command number 0xA5) and SMB_COM_DELETE (SMB1
		command number 0x6) has been removed.
	  SMB1 protocol has been deprecated, particularly older dialects
		We take this opportunity to remind that we have deprecated and
		disabled by default, but not removed, the whole SMB1 protocol since
		Samba 4.11.  If needed for security purposes or code maintenance we
		will continue to remove older protocol commands and dialects that are
		unused or have been replaced in more modern SMB1 versions.
		We specifically deprecate the older dialects older than "NT LM 0.12"
		(also known as "NT LANMAN 1.0" and "NT1").
		Please note that "NT LM 0.12" is the dialect used by software as old
		as Windows 95, Windows NT and Samba 2.0, so this deprecation applies
		to DOS and similar era clients.
		We do reassure that that 'simple' operation of older clients than
		these (eg DOS) will, while untested, continue for the near future, our
		purpose is not to cripple use of Samba in unique situations, but to
		reduce the maintaince burden.
		Eventually SMB1 as a whole will be removed, but no broader change is
		announced for 4.16.
		In the rare case where the above changes cause incompatibilities,
		users requiring support for these features will need to use older
		versions of Samba.
	  No longer using Linux mandatory locks for sharemodes
		smbd mapped sharemodes to Linux mandatory locks. This code in the Linux kernel
		was broken for a long time, and is planned to be removed with Linux 5.15. This
		Samba release removes the usage of mandatory locks for sharemodes and the
		"kernel share modes" config parameter is changed to default to "no". The Samba
		VFS interface is kept, so that file-system specific VFS modules can still use
		private calls for enforcing sharemodes.
	  smb.conf changes
		  Parameter Name                          Description     Default
		  --------------                          -----------     -------
		  kernel share modes                      New default     No
		  dns forwarder                           Changed
		  rpc_daemon                              Removed
		  rpc_server                              Removed
		  rpc start on demand helpers             Added           true

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-24 14:20:43 +00:00
Michael Tremer
eb41bf304e samba: Fix rootfile on x86_64
The web UI menu entry, samba.cgi and the control binary were lost in
61d7aaa3ef.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:25:19 +00:00
Peter Müller
286098fdfd Revert "python3-cffi: Fix rootfiles on ARM"
This reverts commit 410758e03f.
2022-02-22 20:13:19 +00:00
Peter Müller
410758e03f python3-cffi: Fix rootfiles on ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-22 19:46:53 +00:00
Peter Müller
78366d9641 Samba: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-11 15:04:04 +00:00
Adolf Belka
84530cdc3b samba: Update to python-3.10
- Update of lfs PAK_VER from 82 to 83
- Update of rootfiles for each architecture

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-11 09:18:42 +00:00
Adolf Belka
61d7aaa3ef samba: Update to version 4.15.5
- Update from 4.14.6 to 4.15.5
- Update of rootfile
- Changelog is too long to include everything. Full details can be found in the
   WHATSNEW.txt file in the source tarball. The following highlights those releases
    that were security releases. The other releases had a range of bug fixes.
    4.15.5 is a security release and includes the following CVE fixes
      o CVE-2021-44141: UNIX extensions in SMB1 disclose whether the outside target
                  of a symlink exists.
                  https://www.samba.org/samba/security/CVE-2021-44141.html
      o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
                  https://www.samba.org/samba/security/CVE-2021-44142.html
      o CVE-2022-0336:  Re-adding an SPN skips subsequent SPN conflict checks.
                  https://www.samba.org/samba/security/CVE-2022-0336.html
    4.15.2 was a security release and included the following CVE fixes
      o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html
      o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)
      o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html
      o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html
      o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html
      o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html
      o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html
      o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html
    4.14.12 was a security release and included the following CVE fixes
      o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
                  https://www.samba.org/samba/security/CVE-2021-44142.html
      o CVE-2022-0336:  Re-adding an SPN skips subsequent SPN conflict checks.
                  https://www.samba.org/samba/security/CVE-2022-0336.html
    4.14.10 was a security release and included the following CVE fixes
      o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html
      o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)
      o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html
      o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html
      o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html
      o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html
      o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html
      o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:02:36 +00:00
Arne Fitzenreiter
812faee44d samba: update rootfiles
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-11 08:46:48 +00:00
Arne Fitzenreiter
f56e93b9b4 vdr: update to 2.4.7
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-07-21 21:49:19 +02:00
Adolf Belka
31daeebd00 samba: Update to 4.14.3
- Update from 4.13.7 to 4.14.3
   Change to Samba 4.14 release series
    4.13 is now in maintenance mode
    4.14 is now the current stable release series
- Update of x86_64 rootfile
- Checked library changes with find-dependencies
   No linked programs found
- Changelog
   o  Trever L. Adams <trever.adams@gmail.com>
      * BUG 14671: s3:modules:vfs_virusfilter: Recent New_VFS changes break
        vfs_virusfilter_openat.
   o  Andrew Bartlett <abartlet@samba.org>
      * BUG 14586: build: Notice if flex is missing at configure time.
   o  Ralph Boehme <slow@samba.org>
      * BUG 14672: Fix smbd panic when two clients open same file.
      * BUG 14675: Fix memory leak in the RPC server.
      * BUG 14679: s3: smbd: fix deferred renames.
   o  Samuel Cabrero <scabrero@samba.org>
      * BUG 14675: s3-iremotewinspool: Set the per-request memory context.
   o  Volker Lendecke <vl@samba.org>
      * BUG 14675: Fix memory leak in the RPC server.
   o  Stefan Metzmacher <metze@samba.org>
      * BUG 11899: third_party: Update socket_wrapper to version 1.3.2.
      * BUG 14640: third_party: Update socket_wrapper to version 1.3.3.
   o  David Mulder <dmulder@suse.com>
      * BUG 14665: samba-gpupdate: Test that sysvol paths download in
        case-insensitive way.
   o  Sachin Prabhu <sprabhu@redhat.com>
      * BUG 14662: smbd: Ensure errno is preserved across fsp destructor.
   o  Christof Schmitt <cs@samba.org>
      * BUG 14663: idmap_rfc2307 and idmap_nss return wrong mapping for uid/gid
        conflict.
   o  Martin Schwenke <martin@meltin.net>
      * BUG 14288: build: Only add -Wl,--as-needed when supported.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:06:43 +00:00
Adolf Belka
da3edeeecf samba: Update to 4.13.7
- Update from 4.13.4 to 4.13.7
- Update of x68_64 rootfile
- Changelog
   Release Notes for Samba 4.13.7 March 24, 2021
    This is a security release in order to address the following defects:
    o  CVE-2020-27840:
       An anonymous attacker can crash the Samba AD DC LDAP server by sending easily
       crafted DNs as part of a bind request. More serious heap corruption is likely
       also possible.
         Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
          * BUG 14595: CVE-2020-27840: Fix unauthenticated remote heap corruption via
            bad DNs.
    o  CVE-2021-20277:
       User-controlled LDAP filter strings against the AD DC LDAP server may crash
       the LDAP server.
         Andrew Bartlett <abartlet@samba.org>
          * BUG 14655: CVE-2021-20277: Fix out of bounds read in ldb_handler_fold.
         Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
          * BUG 14655: CVE-2021-20277: Fix out of bounds read in ldb_handler_fold.
   Release Notes for Samba 4.13.5 March 09, 2021
    This is the latest stable release of the Samba 4.13 release series.
    o  Trever L. Adams <trever.adams@gmail.com>
       * BUG 14634: s3:modules:vfs_virusfilter: Recent talloc changes cause infinite
         start-up failure.
    o  Jeremy Allison <jra@samba.org>
       * BUG 13992: s3: libsmb: Add missing cli_tdis() in error path if encryption
         setup failed on temp proxy connection.
       * BUG 14604: smbd: In conn_force_tdis_done() when forcing a connection closed
         force a full reload of services.
    o  Andrew Bartlett <abartlet@samba.org>
       * BUG 14593: dbcheck: Check Deleted Objects and reduce noise in reports about
         expired tombstones.
    o  Ralph Boehme <slow@samba.org
       * BUG 14503: s3: Fix fcntl waf configure check.
       * BUG 14602: s3/auth: Implement "winbind:ignore domains".
       * BUG 14617: smbd: Use fsp->conn->session_info for the initial
         delete-on-close token.
    o  Peter Eriksson <pen@lysator.liu.se>
       * BUG 14648: s3: VFS: nfs4_acls. Add missing TALLOC_FREE(frame) in error
         path.
    o  Björn Jacke <bj@sernet.de>
       * BUG 14624: classicupgrade: Treat old never expires value right.
    o  Volker Lendecke <vl@samba.org>
       * BUG 14636: g_lock: Fix uninitalized variable reads.
    o  Stefan Metzmacher <metze@samba.org>
       * BUG 13898: s3:pysmbd: Fix fd leak in py_smbd_create_file().
    o  Andreas Schneider <asn@samba.org>
       * BUG 14625: lib:util: Avoid free'ing our own pointer.
    o  Paul Wise <pabs3@bonedaddy.net>
       * BUG 12505: HEIMDAL: krb5_storage_free(NULL) should work.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-01 12:36:01 +00:00
Michael Tremer
e514d67f8e samba: Update to 4.13.4
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-03 22:50:36 +00:00
Michael Tremer
968ad8ba8d samba: Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-29 11:09:34 +00:00
Michael Tremer
37fe3658a0 samba: Add helper script to pipe password
It is complicated to set the password in the C helper binary.

Therefore it is being set by a helper script.

This is still not an optimal solution since the password might be
exposed to the shell environment, but has the advantage that shell
command injection is no longer possible.

Fixes: #12562
Reported-by: Albert Schwarzkopf <ipfire@quitesimple.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-27 21:06:57 +00:00
Arne Fitzenreiter
8372d89000 vdr: version 2.4.4 still use plugin API 2.4.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-05 10:09:03 +00:00
Arne Fitzenreiter
27023de931 vdr-dvbapi: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-11-24 08:18:09 +01:00
Michael Tremer
6cab8977e0 amazon-ssm-agent: Package /usr/bin/ssm-agent-worker
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-19 18:35:36 +00:00
Michael Tremer
64c8811dee samba: Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-14 09:53:30 +00:00
Michael Tremer
7dea42ae84 samba: Drop PDC default configuration
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-13 17:06:17 +01:00
Michael Tremer
be1554336d samba: Export all printers from CUPS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-13 17:06:16 +01:00
Michael Tremer
97722ab69d samba: Remove printer management
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-13 17:06:16 +01:00
Michael Tremer
a88ea3463c samba: Remove help popup
This is outdated and should be put into the wiki.

It is also some very ugly JS.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-13 17:06:16 +01:00
Michael Tremer
5aa5f6777a samba: Remove reset options
This only requires that we have to change multiple files with
the same settings.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-13 17:06:16 +01:00
Michael Tremer
13e455aec7 samba: Log to syslog
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-13 17:06:16 +01:00
Michael Tremer
ffd8eafa52 libtalloc: Move to /usr and drop Python module
We do not use the Python module and can therefore
only have one rootfile for all architectures.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-06 16:35:26 +00:00
Arne Fitzenreiter
42fca29033 libtalloc: add new package because samba4 not provide this anymore
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-06 12:20:09 +00:00
Arne Fitzenreiter
1dd31d858e samba: update to 4.13.0
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-06 12:19:04 +00:00
Arne Fitzenreiter
eb7066388b vdr: update to 2.4.1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-02-16 11:48:22 +01:00
Michael Tremer
7a68b87789 Drop DirectFB
This package is not very useful on its own and nobody
seems to pull this as dependency any more.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-02-15 16:55:24 +00:00
Michael Tremer
44cc9a3d57 amazon-ssm-agent: New package
AWS Systems Manager Agent (SSM Agent) is Amazon software that can be
installed and configured on an Amazon EC2 instance, an on-premises
server, or a virtual machine (VM). SSM Agent makes it possible for
Systems Manager to update, manage, and configure these resources. The
agent processes requests from the Systems Manager service in the AWS
Cloud, and then runs them as specified in the request. SSM Agent then
sends status and execution information back to the Systems Manager
service by using the Amazon Message Delivery Service.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-01-11 20:33:36 +00:00
Arne Fitzenreiter
6ede197501 pathon: update to 3.8 and move pyhton to core
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-01-11 14:35:11 +01:00
Jonatan Schlag
34297a18a4 python3-libvirt: drop this package
Since it is some work to update this package accordingly to the libvirt
version  and facing the fact that I know nobody who using this I suggest to drop this. If we
need this later we can just revert the commit.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-01-24 16:12:49 +00:00
Michael Tremer
d1e67bcaff Rootfile update for directfb (x86_64)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-25 20:17:02 +01:00
Jonatan Schlag
fd15f250e8 Add package python3-libvirt
This new package provides the python3 bindings for libvirt.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-17 12:35:00 +01:00
Jonatan Schlag
ae3b38d473 Update python3 to 3.6.1
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-16 17:57:00 +01:00
Michael Tremer
408330e46e Make Python 3 an add-on package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-01-26 20:33:27 +00:00
Michael Tremer
4ff2679978 x86_64: Add more architecture-dependent rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-11 15:37:20 +02:00