Commit Graph

12087 Commits

Author SHA1 Message Date
Adolf Belka
d28dbdc0c0 qpdf: Update to version 11.9.0
- Update from version 11.7.0 to 11.9.0
- Update of rootfile
- Changelog
    11.9.0
	* Add ENABLE_COVERAGE cmake option to assist with generating
	  coverage reports.
	* From M. Holger: add QPDFObjectHandle::writeJSON to directly
	  write a JSON representation to a pipeline. This is much faster
	  than writing the serialized result of getJSON.
	* The previous fix to #1056 was incomplete. When setting a check
	  box value, the previous fix allowed any value other than /Off to
	  mean checked. Now we also set the actual value based on the
	  allowable non-/Off value in the normal appearance dictionary.
	  Fixes #1056.
	* Add fuzz testing for JSON.
	* Add JSON::getDictItem (from m-holger)
	* Allow --overlay and --underlay to be repeated. They may appear
	  multiple times on the command-line and will be stacked in the
	  order in which they appear. In QPDFJob JSON, the overlay and
	  underlay keys may contain arrays. For compatibility, they may also
	  contain a single dictionary.
	* Add new command-line arguments --file and --range which can be
	  used within --pages in place of positional arguments. Allow --file
	  to be used inside of --overlay and --underlay as well. These new
	  options can be freely intermixed with positional arguments. Also
	  add file(), range(), and password() to QPDFJob::PagesConfig as an
	  alternative to pageSpec.
    11.8.0
	* Bug fix: treat references to older generations of objects as
	  null.
	* When recovering a file's xref table, attempt to find xref
	  streams if a traditional trailer dictionary is not found. Fixes
	  #1103.
	* Add --set-page-labels command-line argument and supporting API.
	  Fixes #939.
		  - QPDFJob::Config::setPageLabels
		  - pdf_page_label_e enumerated type
		  - QPDFPageLabelDocumentHelper::pageLabelDict
	* Support comma-separated numeric values with --collate to select
	  different group sizes from different files. Fixes #505.
	* Support "x" before a group in a numeric range to exclude a group
	  from the previous group. Details are in the manual. Fixes #564,
	  #790.
	* When flattening annotations, preserve annotations without any
	  appearance information at all, such as types /Link, /Popup, and
	  /Projection. Fixes #1039.
	* Detect overlong UTF-8 in the UTF-8 decoder, and fix detection of
	  8-bit characters in erroneous UTF-8 strings.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:34:48 +00:00
Michael Tremer
9f94857120 core185: Ship pixman
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:34:35 +00:00
Adolf Belka
91aefa33f9 pixman: Update to version 0.43.4
- Update from version 0.43.0 to 0.43.4
- Update of rootfile
- Changelog
    0.43.4
	      Revert the changes to fix the problem in big-endian architectures
	      Allow to build pixman on clang/arm32
	      pixman-arm: Fix build on clang/arm32
	      pixman-x86: Use cpuid.h header
	      pixman-x86: Move #include "cpuid.h" inside conditionals
	      Revert "Allow to build pixman on clang/arm32"
	      pixman-arm: Use unified syntax
    0.43.2
	Note, in the past pixman used a numbering scheme with odd minor number
	numbers for development versions and even minor number for stable
	versions. This is no longer the case, all releases (including this one)
	are stable production versions now.
	      Drop automatic DEBUG define
	      Drop ChangeLog
	      Drop contrib/ci.sh

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:34:21 +00:00
Michael Tremer
bc98c579cb core185: Ship pciutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:34:03 +00:00
Adolf Belka
730be02c8e pciutils: Update to version 3.11.1
- Update from version 3.10.0 to 3.11.1
- Update of rootfile
- Changelog
    3.11.1
	* Fixed wrong API version in lib/pci.h.
	* Updated README.Windows.
	* Fix compilation on Windows.
    3.11.0
	* update-pciids now supports XZ compression. If libpci is configured
	  with support for compression, all downloaded files are recompressed
	  as gzip. Otherwise they are stored as plain text.
	* update-pciids now sends itself as the User-Agent.
	* Added a pcilmr utility for PCIe lane margining. Thanks to Nikita
	  Proshkin for contributing it.
	* Re-factored access to i386 ports on all relevant platforms.
	* Added i386 port access on OpenBSD.
	* Back-ends for Windows received many bug fixes and improvements.
	* ECAM back-end now scans ACPI and BIOS memory faster.
	* Linux systems without pread/pwrite are no longer supported
	  as they are hopefully long gone. This helps avoid the tricky check
	  for presence of pread which was found to fail on musl libc.
	* Improved decoding of PCIe control and status registers.
	* Decoding of CXL capabilities now supports up to CXL 3.0.
	* lspci now displays interrupt message numbers consistently across
	  different capabilities.
	* Cache of IDs resolved via DNS, which was located in ~/.pci-ids
	  by default, is now stored according to the XDG base directory
	  specification in $XDG_CACHE_HOME/pci-ids.
	* All source files now have SPDX license identifiers.
	* Internal: The "aux" fields of structs pci_access and pci_dev
	  reserved for use by back-ends were renamed to backend_data to better
	  reflect their meaning.
	* As usually, various minor bug fixes and updated pci.ids.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:33:49 +00:00
Michael Tremer
97f69f7768 core185: Ship pango
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:33:36 +00:00
Adolf Belka
fc22e74b79 pango: Update to version 1.52.0
- Update from version 1.50.13 to 1.52.0
- Update of rootfile
- Changelog
    1.52.0
	- Add pango_font_map_reload_font
	- Improve formatting of font sizes
    1.51.2
	- Build improvements on Windows
	- Use single fontconfig thread
	- Fix problems with spaces at line ends
	- Allow custom fonts on Windows
	- pango-viewer: Fix hint-metrics options
	- Pangofont: Add properties
    1.51.0
	- itemize: Improve script itemization
	- build: Check for cairo DWrite dependency
	- win32: Fix various issues and crashes
	- layout: Add a missing switch case
    1.50.14
	- Fix underline thickness in scaled contexts

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:32:13 +00:00
Michael Tremer
05512cabe0 core185: Ship expat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:31:59 +00:00
Adolf Belka
60e990fe3d expat: Update to version 2.6.1
- Update from version 6.2.0 to 6.2.1
- Update of rootfile
- Changelog
    2.6.1 Thu February 29 2024
        Bug fixes:
            #817  Make tests independent of CPU speed, and thus more robust
       #828 #836  Expose billion laughs API with XML_DTD defined and
                    XML_GE undefined, regression from 2.6.0
        Other changes:
            #829  Hide test-only code behind new internal macro
            #833  Autotools: Reject expat_config.h.in defining SIZEOF_VOID_P
            #819  Address compiler warnings
       #832 #834  Version info bumped from 10:0:9 (libexpat*.so.1.9.0)
                    to 10:1:9 (libexpat*.so.1.9.1); see https://verbump.de/
                    for what these numbers do
        Infrastructure:
            #818  CI: Adapt to breaking changes in clang-format

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:31:44 +00:00
Michael Tremer
01925627b1 core185: Ship ethtool
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-06 21:31:24 +00:00
Michael Tremer
825871b978 core185: Ship ovpn.cnf
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-04 20:53:51 +00:00
Adolf Belka
16d664b2bd ovpn.cnf: Removal of SKID & AKID from server section - Fixes Bug#13595
- The update to openssl-3.2.x introduced a bug fix which now gives an error if the
   subjectKeyIdentifier (SKID) or authorityKeyIdentifier (AKID) is in the x509 extensions
   for a CSR.
- See the following discssion in the openssl github issues
   https://github.com/openssl/openssl/issues/22966#issuecomment-1858396738
- The SKID & AKID should never have been specified in the CSR but due to a bug they were
   never flagged with an error, just ignored. Since the bug fix for that bug was put into
   OpenSSL-3.2.0 the prescence of the SKID & AKID in the CSR causes an error to be flagged.
- The consequence of this is that in CU183 trying to create a new x509 root/host
   certificate gives an error when the CSR is generated so only the root certificate is
   created and not the host certificate.
- Tested out the removal of the SKID & AKID lines from the [ server ] section of the
   ovpn.cnf file and the root/host certificate set was created without any issue.
- Then tested the creation of a RW client connection and that worked with no problems. Also
   creating a fresh N2N connection worked without any problems.
- Also tested restoring from an earlier backup. The RW and N2N connections worked without
   issues with the AKID and SKID missing from the [ server ] section.
- It would be good if this could be merged into CU184 for final testing.

Fixes: Bug#13595
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-04 20:53:51 +00:00
Adolf Belka
6dac44d40c update.sh: Fixes bug#13548 - make key 41 contain no-pass for N2N connections
- This code ensures that all existing N2N connections have no-pass in key 41 in place
   of disabled for some of them.
- Tested out and confirmed on my vm testbed.

Fixes: Bug#13548
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-03 10:09:14 +00:00
Arne Fitzenreiter
6ea7d8c67e core185: add index.cgi to update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-03-03 09:05:35 +01:00
Michael Tremer
6dd7451f11 core185: Ship initscript functions
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-03-01 16:14:14 +00:00
Robin Roevens
bff53f09ff zabbix_agentd: Add OpenVPN certificates items
- Adds Zabbix Agent userparameters `ipfire.ovpn.clientcert` and `ipfire.ovpn.cacert` for the agent to get details about openvpn client, server and ca certificates.
- Moves all `ipfire.ovpn.*` userparameters to a separate config file `userparameter_ovpn.conf` to enable users to selectively disable openvpn items when not needed
- Includes `ipfire_certificate_detail.sh` script in sudoers for Zabbix Agent as it needs root permission to read openvpn certificate details.
- Adapts lfs install script to install new script and configfile
- Adds new script and configfile to rootfiles
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:26:11 +00:00
Robin Roevens
670e7d6e36 zabbix_agentd: Add helper script to get and verify certificate details
Add script to parse openssl output on certificates and return it as JSON for consumption by the Zabbix agent.
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:26:11 +00:00
Michael Tremer
1c0e8ff9fc core185: Ship shadow
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:24:50 +00:00
Michael Tremer
20e8c4739c core185: Ship libpng
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:24:10 +00:00
Michael Tremer
314315bee3 core185: Ship libgpg-error
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:23:17 +00:00
Adolf Belka
5fafff021f libgpg-error: Update to version 1.48
- Update from version 1.47 to 1.48
- Update of rootfile
- Changelog
    1.48
	 * New configure option --with-libtool-modification.  [T6619]
	 * New option parser flag to detect commands given without a double
	   dash.  There is also the new meta command "command-mode" to set
	   this flag via a config file.  [T6978]
	 * Added an es_fopen mode flag "sequential" with support on Windows.
	   [rE7a42ff0ec9]
	 * Added an es_fopen mode flag "wipe" to cleanup internal buffers at
	   close time.  [T6954]
	 * New function gpgrt_wipememory.  [T6964]
	 * Improvements to setenv on Windows.  [rE89e53ad90f]
	 * Fixed call to estream-printf string filters.  [T6737]
	 * Many improvements to the yat2m tool.
	 * Updates to the build system.
	 * Interface changes relative to the 1.47 release:
		 ARGPARSE_FLAG_COMMAND          NEW.
		 gpgrt_wipememory               NEW.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:22:57 +00:00
Michael Tremer
9b2298d92f core185: Ship libffi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:22:40 +00:00
Adolf Belka
f5a2b26bd1 libffi: Update to version 3.4.6
- Update from version 3.4.4 to 3.4.6
- Update of rootfile
- Changelog
    3.4.6
	Fix long double regression on mips64 and alpha.
    3.4.5
	Add support for wasm32.
	Add support for aarch64 branch target identification (bti).
	Add support for ARCv3: ARC32 & ARC64.
	Add support for HPPA64, and many HPPA fixes.
	Add support for Haikuos on PowerPC.
	Fixes for AIX, loongson, MIPS, power, sparc64, and x86 Darwin.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:22:01 +00:00
Adolf Belka
1087370d52 git: Update to version 2.44.0
- Update from version 2.43.0 to 2.44.0
- Update of rootfile
- Changelog is too large to include here.
   See the files 2.43.1.txt, 2.43.2.txt, 2.43.3.txt & 2.44.0.txt in the source tarball in
    directory Documentation/RelNotes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-29 10:21:40 +00:00
Michael Tremer
bed265cc5a Merge remote-tracking branch 'ms/wsdd' into next 2024-02-28 16:44:06 +00:00
Michael Tremer
3ee04b3b8a core185: Ship backup.pl and ovpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:41:22 +00:00
Adolf Belka
c790899f73 backup.pl: Fixes bug#13404 - Clear out OpenVPN certs before doing restore
- Existing situation is if four new client connections are created and then it is decided
   to restore to an earlier stage the new certficates will be in the certs directory but
   not usable from the WUI page as they are no longer shown in the client connection table
   as that now shows the ones from the restored backup.
- This patch clears the /var/ipfire/ovpn/certs/ directory before restoring the contents
   of the backup so that the certs directory only holds what was in the backup.

Fixes: Bug#13404
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:40:53 +00:00
Michael Tremer
033252e043 core185: Ship dhcp.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:29:51 +00:00
Michael Tremer
bf93033801 core185: Ship dns.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:11:04 +00:00
Adolf Belka
84c599f55f Core Update 185: Ship elfutils
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:10:22 +00:00
Arne Fitzenreiter
e3a8147c67 libmpdclient: update to 2.22
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 02:03:24 +01:00
Arne Fitzenreiter
3de42257d0 mpd: move scripts and config from mpfire to mpd
this allows to use mpd without mpfire installed.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-24 16:39:59 +01:00
Arne Fitzenreiter
db4977b30a core185: fix rpi4 firmare names
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-19 19:58:51 +01:00
Michael Tremer
1dbea7df56 core185: Ship ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:17:13 +00:00
Peter Müller
7e79a6c92e ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:17:13 +00:00
Arne Fitzenreiter
06a6788e51 core184: fix rtl8812au module compression
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-18 07:59:18 +01:00
Peter Müller
0b29422c93 Core Update 185: Remove orphaned uncritical non-library files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:45:41 +00:00
Peter Müller
d6511c820d Core Update 185: Delete orphaned linux-firmware files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:42:28 +00:00
Peter Müller
6336428ef8 Core Update 185: Ensure correct permissions of /etc/sudoers.d/
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:40:39 +00:00
Peter Müller
2038b640e6 Core Update 185: Ship forgotten linux-firmware files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:39:41 +00:00
Peter Müller
b8f2d9da4c Core Update 185: Restart ntp
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:37:04 +00:00
Peter Müller
ef2846e46d Core Update 185: Ship libcap and all packages dependant on it
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:35:02 +00:00
Adolf Belka
90e40b1948 ruleset-sources: removal of PT Attack & Secureworks + addition of ThreatFox
- The PT Attack ruleset has not been updated since 2021 and made read-only in 2022
   The PT Attack website no longer has any reference to Suricata Rulesets. The PT Attack
   ruleset is being removed.
- The Secureworks three rulesets are no longer available. The website path gives a 404
   error. No mention of Suricata rulesets in the Secureworks website. The Secureworks three
   rulesets are being removed.
- ThreatFox ruleset has been added to the list. Both a plain and archive version of the
   rules are available but the plain version is being regularly updated while the archive
   version was last updated 5 days ago. So this patch has implemented the plain version.
- All above was discussed in the January Developers Conference call.
- Tested out on my vm testbed. I had PT Attack selected as one of the providers. As
   mentioned by Stefan removing PT Attack means it is not available in the list of
   providers but the provider stays in the providers table but with the line shown in red.
   I will update the wiki to mention the red highlight and what it means.

Suggested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-16 12:29:15 +00:00
Michael Tremer
c73a75cb70 Merge remote-tracking branch 'origin/next' into next 2024-02-14 19:07:30 +00:00
Michael Tremer
5db2b07c89 Merge branch 'master' into next 2024-02-14 19:06:35 +00:00
Adolf Belka
dd24668627 files: Ship collectd.conf for bug#12981
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:06:20 +00:00
Michael Tremer
c5b441a4e6 core185: Ship unbound and BIND again
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:04:48 +00:00
Michael Tremer
64300f2212 Merge branch 'master' into next 2024-02-14 19:03:52 +00:00
Adolf Belka
2071b2964f graphs.pl: Fixes graph failure when the DROP_HOSTILE directory is missing
- If a fresh install is done then only the DROP_HOSTILE_IN & DROP_HOSTILE_OUT
   rrd directories are created.
- With the DROP_HOSTILE directory missing then when the fwhits graph is updated an error
   message is caused by the inability to open the required files.
- This patch adds an if/else loop into the fwhits graph code to deal with the two cases
   of the DROP_HOSTILE being present or not depending on the history and if a backup with
   logs has been restored from when DROP_HOSTILE was in use.
- Tested on vm testbed and created a historical line for the hostile data when it was not
   split
- There might be a simpler or better approach than this but it was the only option I
   could identify. I couldn't find anything about being able to use if loops within the
   RRD::Graph loop

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:01:44 +00:00
Michael Tremer
f3d7ce3b5d core184: Ship unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:01:25 +00:00