Commit Graph

20095 Commits

Author SHA1 Message Date
Peter Müller
34e16b8653 Core Update 170: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:44 +00:00
Adolf Belka
2296698ec4 sudo: Update to version 1.9.11p3
- Update from version 1.9.10 to 1.9.11p3
- Update of rootfile required
- Changelog
    What's new in Sudo 1.9.11p3
	 * Fixed "connection reset" errors on AIX when running shell scripts
	   with the "intercept" or "log_subcmds" sudoers options enabled.
	   Bug #1034.
	 * Fixed very slow execution of shell scripts when the "intercept"
	   or "log_subcmds" sudoers options are set on systems that enable
	   Nagle's algorithm on the loopback device, such as AIX.
	   Bug #1034.
    What's new in Sudo 1.9.11p2
	 * Fixed a compilation error on Linux/x86_64 with the x32 ABI.
	 * Fixed a regression introduced in 1.9.11p1 that caused a warning
	   when logging to sudo_logsrvd if the command returned no output.
    What's new in Sudo 1.9.11p1
	 * Correctly handle EAGAIN in the I/O read/right events.  This fixes
	   a hang seen on some systems when piping a large amount of data
	   through sudo, such as via rsync.  Bug #963.
	 * Changes to avoid implementation or unspecified behavior when
	   bit shifting signed values in the protobuf library.
	 * Fixed a compilation error on Linux/aarch64.
	 * Fixed the configure check for seccomp(2) support on Linux.
	 * Corrected the EBNF specification for tags in the sudoers manual
	   page.  GitHub issue #153.
    What's new in Sudo 1.9.11
	 * Fixed a crash in the Python module with Python 3.9.10 on some
	   systems.  Additionally, "make check" now passes for Python 3.9.10.
	 * Error messages sent via email now include more details, including
	   the file name and the line number and column of the error.
	   Multiple errors are sent in a single message.  Previously, only
	   the first error was included.
	 * Fixed logging of parse errors in JSON format.  Previously,
	   the JSON logger would not write entries unless the command and
	   runuser were set.  These may not be known at the time a parse
	   error is encountered.
	 * Fixed a potential crash parsing sudoers lines larger than twice
	   the value of LINE_MAX on systems that lack the getdelim() function.
	 * The tests run by "make check" now unset the LANGUAGE environment
	   variable.  Otherwise, localization strings will not match if
	   LANGUAGE is set to a non-English locale.  Bug #1025.
	 * The "starttime" test now passed when run under Debian faketime.
	   Bug #1026.
	 * The Kerberos authentication module now honors the custom password
	   prompt if one has been specified.
	 * The embedded copy of zlib has been updated to version 1.2.12.
	 * Updated the version of libtool used by sudo to version 2.4.7.
	 * Sudo now defines _TIME_BITS to 64 on systems that define __TIMESIZE
	   in the header files (currently only GNU libc).  This is required
	   to allow the use of 64-bit time values on some 32-bit systems.
	 * Sudo's "intercept" and "log_subcmds" options no longer force the
	   command to run in its own pseudo-terminal.  It is now also
	   possible to intercept the system(3) function.
	 * Fixed a bug in sudo_logsrvd when run in store-first relay mode
	   where the commit point messages sent by the server were incorrect
	   if the command was suspended or received a window size change
	   event.
	 * Fixed a potential crash in sudo_logsrvd when the "tls_dhparams"
	   configuration setting was used.
	 * The "intercept" and "log_subcmds" functionality can now use
	   ptrace(2) on Linux systems that support seccomp(2) filtering.
	   This has the advantage of working for both static and dynamic
	   binaries and can work with sudo's SELinux RBAC mode.  The following
	   architectures are currently supported: i386, x86_64, aarch64,
	   arm, mips (log_subcmds only), powerpc, riscv, and s390x.  The
	   default is to use ptrace(2) where possible; the new "intercept_type"
	   sudoers setting can be used to explicitly set the type.
	 * New Georgian translation from translationproject.org.
	 * Fixed creating packages on CentOS Stream.
	 * Fixed a bug in the intercept and log_subcmds support where
	   the execve(2) wrapper was using the current environment instead
	   of the passed environment pointer.  Bug #1030.
	 * Added AppArmor integration for Linux.  A sudoers rule can now
	   specify an APPARMOR_PROFILE option to run a command confined by
	   the named AppArmor profile.
	 * Fixed parsing of the "server_log" setting in sudo_logsrvd.conf.
	   Non-paths were being treated as paths and an actual path was
	   treated as an error.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:32 +00:00
Peter Müller
a8344bbac5 Core Update 170: Ship xfsprogs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:14 +00:00
Adolf Belka
ef03abb15d xfsprogs: Update to version 5.18.0
- Update from version 5.16.0 to 5.18.0
- Update of rootfile not required
- Changelog
    Release v5.18.0
	xfsprogs: more autoconf modernisation
    Release v5.18.0-rc1
	mkfs: Fix memory leak
	xfsprogs: autoconf modernisation
	xfs_io: add a quiet option to bulkstat
	metadump: be careful zeroing corrupt inode forks
	metadump: handle corruption errors without aborting
	xfs_db: take BB cluster offset into account when using 'type' cmd
	xfs_scrub: don't revisit scanned inodes when reprocessing a stale inode
	xfs_scrub: balance inode chunk scan across CPUs
	xfs_scrub: prepare phase3 for per-inogrp worker threads
	xfs_scrub: widen action list length variables
	xfs_scrub: in phase 3, use the opened file descriptor for repair calls
	xfs_scrub: make phase 4 go straight to fstrim if nothing to fix
	xfs_scrub: don't try any file repairs during phase 3 if AG metadata bad
	xfs_scrub: fall back to scrub-by-handle if opening handles fails
	xfs_scrub: in phase 3, use the opened file descriptor for scrub calls
	xfs_scrub: collapse trivial file scrub helpers
	xfs_repair: check the ftype of dot and dotdot directory entries
	xfs_repair: improve error reporting when checking rmap and refcount btrees
	xfs_repair: detect v5 featureset mismatches in secondary supers
	mkfs: don't trample the gid set in the protofile
	mkfs: round log size down if rounding log start up causes overflow
	mkfs: improve log extent validation
	mkfs: don't let internal logs bump the root dir inode chunk to AG 1
	mkfs: reduce internal log size when log stripe units are in play
	mkfs: fix missing validation of -l size against maximum internal log size
	xfs_repair: fix sizing of the incore rt space usage map calculation
	xfs_db: report absolute maxlevels for each btree type
	xfs_db: support computing btheight for all cursor types
	xfs_repair: warn about suspicious btree levels in AG headers
	xfs_db: warn about suspicious finobt trees when metadumping
	xfs: note the removal of XFS_IOC_FSSETDM in the documentation
	xfs_db: fix a complaint about a printf buffer overrun
	xfs_scrub: move to mallinfo2 when available
	debian: support multiarch for libhandle
	debian: bump compat level to 11
	debian: refactor common options
    Release v5.18.0-rc0
	mm/fs: delete PF_SWAPWRITElibxfs-5.18-sync
	xfs: document the XFS_ALLOC_AGFL_RESERVE constant
	xfs: constify xfs_name_dotdot
	xfs: constify the name argument to various directory functions
	xfs: remove the XFS_IOC_{ALLOC,FREE}SP* definitions
	xfs: remove the XFS_IOC_FSSETDM definitions
	xfs: pass the mapping flags to xfs_bmbt_to_iomap
    Release v5.16.0
	libxfs: remove kernel stubs from xfs_shared.h
	debian: Generate .gitcensus instead of .census (Closes: #999743)
    Release v5.16.0-rc0
	xfs: Fix the free logic of state in xfs_attr_node_hasname
	xfs: #ifdef out perag code for userspace
	xfs: use swap() to make dabtree code cleaner
	xfs: remove unused parameter from refcount code
	xfs: reduce the size of struct xfs_extent_free_item
	xfs: rename xfs_bmap_add_free to xfs_free_extent_later
	xfs: create slab caches for frequently-used deferred items
	xfs: compact deferred intent item structures
	xfs: rename _zone variables to _cache
	xfs: remove kmem_zone typedef
	xfs: use separate btree cursor cache for each btree type
	xfs: compute absolute maximum nlevels for each btree type
	xfs: kill XFS_BTREE_MAXLEVELS
	xfs_repair: stop using XFS_BTREE_MAXLEVELS
	xfs_db: stop using XFS_BTREE_MAXLEVELS
	xfs: compute the maximum height of the rmap btree when reflink enabled
	xfs: clean up xfs_btree_{calc_size,compute_maxlevels}
	xfs: compute maximum AG btree height for critical reservation calculation
	xfs: rename m_ag_maxlevels to m_allocbt_maxlevels
	xfs: dynamically allocate cursors based on maxlevels
	xfs: encode the max btree height in the cursor
	xfs: refactor btree cursor allocation function
	xfs: rearrange xfs_btree_cur fields for better packing
	xfs: prepare xfs_btree_cur for dynamic cursor heights
	xfs: reduce the size of nr_ops for refcount btree cursors
	xfs: remove xfs_btree_cur.bc_blocklog
	xfs: fix perag reference leak on iteration race with growfs
	xfs: terminate perag iteration reliably on agcount
	xfs: rename the next_agno perag iteration variable
	xfs: fold perag loop iteration logic into helper function
	xfs: remove the xfs_dqblk_t typedef
	xfs: remove the xfs_dsb_t typedef
	xfs: remove the xfs_dinode_t typedef
	xfs: check that bc_nlevels never overflows
	xfs: remove xfs_btree_cur_t typedef
	xfs: fix maxlevels comparisons in the btree staging code
	xfs: port the defer ops capture and continue to resource capture
	xfs: formalize the process of holding onto resources across a defer roll
	xfs: use kmem_cache_free() for kmem_cache objects
	xfs_repair: fix AG header btree level comparisons
	xfs_db: fix metadump level comparisons

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:01 +00:00
Peter Müller
f653df852a Start Core Update 170
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:07:09 +00:00
Peter Müller
617bb64f63 Core Update 169: Ship general-functions.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 09:15:17 +00:00
Adolf Belka
0b4618f9a3 general-functions.pl: Fix for bug #12865 - Static IP address pools - Add network - Name wit>
- The fix for bug #12428 removed spaces from the validhostname subroutine as hostnames are
   not supposed to have spaces
- This resulted in spaces no longer being allowed for the Static IP Address Pools names
- New subroutine created called validccdname. This allows letters, upper and lower case,
   numbers, spaces and dashes

Fixes: Bug #12865
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:14:22 +00:00
Adolf Belka
dcc2f7e0f2 ovpnmain.cgi: Fix for bug #12865 - Static IP address pools - Add network - Name with space
- The fix for bug #12428 removed spaces from the validhostname subroutine as hostnames are
   not supposed to have spaces
- This resulted in spaces no longer being allowed for the Static IP Address Pools names
- New subroutine created called validccdname in general-functions.pl

Fixes: Bug #12865
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:14:22 +00:00
Adolf Belka
de6ef4d40a python3-msgpack: Required for build and execution of borgbackup 1.2.0
- New python module required for borgbackup. In borgbackup version 1.1.18 or 1.1.19
   the old bundled msgpack in borgbackup was removed and a specified version range
   of python3-msgpack required.
- This patch adds the lfs and rootfiles for this module

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Adolf Belka
006309eaaf python3-packaging: Moved to rootfiles/packages/ directory
- Required for borgbackup execution

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Adolf Belka
c9336f7a1f borgbackup: Fix bug #12884 - borgbackup 1.2.0 crashes on running any borg command
- When borgbackup was upgraded from version 1.1.17 to 1.2.0 the build was sucessfully
   completed but there was no testing feedback till after full release. It turned out
   that it did not successfully run.
- python3-packaging which had been installed for the build of borgbackup needed to also
   be available for the execution.
- When borgbackup was upgraded to 1.2.0 it was noticed that the old python3-msgpack was
   no longer needed as borgbackup used its own bundled msgpack since around version 1.1.10
   What was not seen was that in version 1.1.19 or 1.1.18 the bundled version of msgpack
   had been removed and that the newer version of python3-msgpack now needed to be
   installed but the version number has to meet the borgbackup requirements which currently
   require it to be =<1.0.3
- This patch adds the python3-packaging and python3-msgpack modules as dependencies for
   borgbackup
- The egg-info files are uncommented in the rootfile so that the borgbackup metadata can
   be found by python.
- The updated borgbackup build together with the python3-packaging and python3-msgpack
   modules were installed into a vm system using the .ipfire packages.
   Successfully initialised a borgbackup repo and ran two backups to the repo and checked
   the stats for the backup. Everything ran fine.

Fixes: Bug #12884
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Peter Müller
2a4b5f0ab4 python3-botocore: Bump package version
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 13:27:46 +00:00
Michael Tremer
de9ae56f4b python3-botocore: Ship interface descriptions
botocore parses any interface descriptions and exposes them to Python.
For that to work, we need to ship them.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:27:21 +00:00
Michael Tremer
92d1e94069 python3-botocore: Add httpchecksum module
It looks like this has been commented out by mistake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:27:21 +00:00
Peter Müller
68307a7697 Core Update 169: Ship ruleset-sources
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 13:25:00 +00:00
Stefan Schantl
b77b41a579 ruleset-sources: Update download URL for Talos rulesets.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 13:24:10 +00:00
Adolf Belka
f158e71e20 ovpnmain.cgi: Fix for bug #12883 - separate .p12 file corrupted
- Patch https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=2feacd989823aa1dbd5844c315a9abfd49060487
   from May 2021 put the variable containing the .p12 content into double quotes which
   causes the contents to be treated as text whereas the .p12 file is an application file.
- Most people must be downloading the zip package of .p12, ovpn.conf and ta.key files so
   the problem was not noticed till now and flagged up in the forum.
   https://community.ipfire.org/t/openvpn-p12-password-on-android-problem/8127
- The problem does not occur for the .p12 file in the zip file as the downloading of the
   zip file does not have the variable name in double quotes.
- Putting the zip file variable into double quotes caused the downloaded zip file to be
   corrupt and not able to be opened as an archive.
- Removing the double quotes from the .p12 variable name caused the separate .p12 file
   download to be able to be correctly opened.
- The same quoted variable name is used also for the cacert.pem, cert.pem, servercert.pem
   and ta.key file downloads. To be consistent the same change has been applied to these.

Fixes: Bug #2883
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:24:03 +00:00
Michael Tremer
49471f05d5 misc-progs: Fix passing argument list
The run() function expects all arguments without the basename of the
program.

This regression was introduced in a609195a26.

Fixes: #12886
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 13:21:23 +00:00
Peter Müller
df9ebc6bbe linux: Align kernel configurations on ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 07:42:27 +00:00
Peter Müller
a924020ea8 Core Update 169: Restart ntpd to apply configuration changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 07:27:19 +00:00
Peter Müller
d9aece2af9 linux: Update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 06:44:09 +00:00
Peter Müller
d86d3f2231 OpenSSL: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 06:38:41 +00:00
Stefan Schantl
90efc7a939 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2022-06-23 08:00:41 +02:00
Peter Müller
4b9b85215f Core Update 169: Ship vulnerabilities.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 18:11:56 +00:00
Peter Müller
34798dcd50 vulnerabilities.cgi: Add MMIO Stale Data
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 18:11:11 +00:00
Peter Müller
765da09d41 linux: Update to 5.15.49
Changelog can be retrieved from https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.49 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 15:10:01 +00:00
Peter Müller
e84497de67 Crap, OpenSSL download server returned a corrputed file :-/
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 14:32:39 +00:00
Peter Müller
2f52d27a82 Core Update 169: Ship changed initscripts
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:27:02 +00:00
Peter Müller
54bd60b67b Explicitly harden mount options of sensitive file systems
These were found to got lost after upgrading to Core Update 169, so we
set them explicitly to avoid accidential security downgrades.

https://lists.ipfire.org/pipermail/development/2022-June/013714.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:23:10 +00:00
Peter Müller
29cf82e6fc Core Update 169: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:17:48 +00:00
Peter Müller
70c969e941 OpenSSL: Update to 1.1.1p
Please refer to https://www.openssl.org/news/openssl-1.1.1-notes.html
for the release notes regarding this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:16:37 +00:00
Peter Müller
2bebb556dc Update French translation
Signed-off-by: Stéphane Pautrel <stephane.pautrel@acb78.com>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:12:52 +00:00
Stefan Schantl
0e683e6506 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2022-06-21 09:41:04 +02:00
Peter Müller
95530b3edb Core Update 169: Ship NTP configuration changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 20:44:58 +00:00
Jon Murphy
2234e8aaca Ship NTP changes
- Device time more accurate.  (e.g., +/- 10 seconds per day to < 100 ms on some devices)
   ( I know we don't need the perfect time server )
 - NTP and time will be accurate in manual mode (setting on Time Server > NTP Configuration WebGUI)
 - Change NTP "prefer" server:
    - The current preferred NTP server in an Undisciplined Local Clock.
    - This is intended when no outside source of synchronized time is available.
    - Change the "prefer" server from 127.127.1.0 to the Primary NTP server specified on
      the Time Server > NTP Configuration WebGUI page.
 - Change allows the drift file (located at /etc/ntp/drift) to be populated by ntpd.
    - The drift file is updated about once per hour which helps correct the device time.

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
2022-06-20 20:43:34 +00:00
Peter Müller
f62b488f82 sysctl: Actually arm YAMA
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 20:10:47 +00:00
Peter Müller
2c38893da4 Core Update 169: Ship keyutils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 19:50:16 +00:00
Peter Müller
2bbfa1b72c Core Update 169: Ship poppler
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 19:48:55 +00:00
Peter Müller
1452738c2e Tor: Update to 0.4.7.8
Changes in version 0.4.7.8 - 2022-06-17
  This version fixes several bugfixes including a High severity security issue
  categorized as a Denial of Service. Everyone running an earlier version
  should upgrade to this version.

  o Major bugfixes (congestion control, TROVE-2022-001):
    - Fix a scenario where RTT estimation can become wedged, seriously
      degrading congestion control performance on all circuits. This
      impacts clients, onion services, and relays, and can be triggered
      remotely by a malicious endpoint. Tracked as CVE-2022-33903. Fixes
      bug 40626; bugfix on 0.4.7.5-alpha.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on June 17, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/06/17.

  o Minor bugfixes (linux seccomp2 sandbox):
    - Allow the rseq system call in the sandbox. This solves a crash
      issue with glibc 2.35 on Linux. Patch from pmu-ipf. Fixes bug
      40601; bugfix on 0.3.5.11.

  o Minor bugfixes (logging):
    - Demote a harmless warn log message about finding a second hop to
      from warn level to info level, if we do not have enough
      descriptors yet. Leave it at notice level for other cases. Fixes
      bug 40603; bugfix on 0.4.7.1-alpha.
    - Demote a notice log message about "Unexpected path length" to info
      level. These cases seem to happen arbitrarily, and we likely will
      never find all of them before the switch to arti. Fixes bug 40612;
      bugfix on 0.4.7.5-alpha.

  o Minor bugfixes (relay, logging):
    - Demote a harmless XOFF log message to from notice level to info
      level. Fixes bug 40620; bugfix on 0.4.7.5-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-19 12:18:17 +00:00
Peter Müller
43b9482a26 Postfix: Update to 3.7.2
Please refer to https://www.postfix.org/announcements/postfix-3.7.2.html
for this versions' release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-19 12:18:13 +00:00
Peter Müller
480202725b u-boot: Sigh, fix another .xz != .gz
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-18 14:42:10 +00:00
Peter Müller
9f94dc123a Update rootfiles to reflect OpenVPN 2FA changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-18 14:40:29 +00:00
Peter Müller
01b3a62a35 u-boot: .xz != .gz
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-18 10:38:40 +00:00
Peter Müller
be5703ef78 u-boot: Clarify source URLs and add missing rk3399 firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-18 08:16:03 +00:00
Peter Müller
39c9a69406 Run ./make.sh update-contributors
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:49:57 +00:00
Peter Müller
531f57d71c Zut alors, uniq 'files' as well
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:48:44 +00:00
Peter Müller
609f41867d Sort 'files'
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:48:13 +00:00
Peter Müller
3cf7a3b153 Core Update 169: Ship OpenVPN 2FA changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:47:44 +00:00
Peter Müller
75c49d6bec Merge branch 'temp-ms-ovpn-2fa' into next 2022-06-17 16:39:40 +00:00
Peter Müller
29df9f89c9 Core Update 169: Ship libtiff and krb5
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:39:12 +00:00