Commit Graph

18517 Commits

Author SHA1 Message Date
Peter Müller
a6d1108e77 Core Update 167: Fix typo in update.sh
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-23 19:40:01 +00:00
Peter Müller
7e6efc89ea dracut: Fix e2fsck call for filesystem checks
Fixes: #12842

Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-23 14:20:06 +00:00
Peter Müller
ab1bdf3405 ipfirereboot.c: Remove orphaned comment
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-22 19:58:48 +00:00
Arne Fitzenreiter
9fa01e4276 kernel: update to 5.15.35
in kernel 5.15.32 the driver for ATH9K wlan cards is unstable.
This is one of the most used cards so we need this update before
releasing core167 final.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-22 12:48:32 +00:00
Peter Müller
250f6efc38 kernel: Do not enforce "integrity" mode of LSM
LSM was found to render firmware flashing unusable, and patching out LSM
functionality for all features needed (such as /dev/io, direct memory
access and probably raw PCI access for older cards), this would
effectively render much of LSM's functionality useless as well.

For the time being, we do ship LSM, but do not enforce any protection
mode. Users hence can run it in "integrity" or even "confidentiality"
mode by custom commands; hopefully, we will be able to revert this
change at a future point.

Acked-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-21 19:30:42 +00:00
Peter Müller
5bd8fc1273 Revert "linux: Disable LSM for /dev/io port access"
This reverts commit 5b966f1b0a.
2022-04-21 19:29:32 +00:00
Peter Müller
5b966f1b0a linux: Disable LSM for /dev/io port access
flashrom needs access to /dev/io ports for flashing firmware, a
functionality we cannot cease to support. Therefore, LSM constraints are
disabled for ioport.c, hopefully permitting us to keep it enabled.

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-19 13:57:35 +00:00
Arne Fitzenreiter
1a4e1bc320 core167: ship xfsprogs
previous builds of mkfs.xfs links against libinih.so.0

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-19 10:11:44 +02:00
Arne Fitzenreiter
56fb66438d core167: ship pcmciautils
previous build is linked against libsysfs.so.1

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-19 09:11:59 +02:00
Arne Fitzenreiter
31592610cb core167: ship elinks
elinks need to be shipped because previuos builds search the old
libidn.so.11

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-18 10:27:46 +02:00
Peter Müller
9a271cf7a8 cdrom: Symlink /etc/mtab to /proc/self/mounts
See cad2ce78dd for details.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 11:39:31 +00:00
Peter Müller
74fe5c8673 libloc: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 11:32:48 +00:00
Peter Müller
9132bdd748 Core Update 167: Ship collectd initscript
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 09:24:15 +00:00
Peter Müller
c5b091fb10 Silence STDERR when calling 'sensors-detect' in collectd initscript
https://lists.ipfire.org/pipermail/development/2022-April/013189.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 09:22:58 +00:00
Michael Tremer
cad867506d c167: Ship vnstat
vnstat is linked against libgd which has had an SO bump and therefore
needs to be shipped again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-13 08:10:16 +00:00
Peter Müller
cad2ce78dd Core Update 167: Replace /etc/mtab by symlink to /proc/self/mounts
mount, as updated via util-linux, no longer writes /etc/mtab, causing
programs to rely on this file's content (such as the check_disk Nagios
plugin) to stop working.

/proc/self/mounts contains all the necessary information, so it is fine
to replace /etc/mtab by a symlink to it.

Fixes: #12843

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 14:10:08 +00:00
Peter Müller
2506def0a6 Core Update 167: Export the location database again and reload the firewall
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 14:05:04 +00:00
Peter Müller
e0da038fc9 Core Update 167: Ship libloc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 12:53:29 +00:00
Peter Müller
0db4fbe1b5 libloc: Update to 0.9.13
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 12:53:03 +00:00
Peter Müller
423e2e7f92 Core Update 167: Ship accidentally deleted Perl library again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 11:57:07 +00:00
Peter Müller
1e0314afdf Merge branch 'next' of ssh://people.ipfire.org/pub/git/ipfire-2.x into next 2022-04-12 11:56:18 +00:00
Peter Müller
c8d047f562 Core Update 167: Do not delete a file that should not have been deleted
My fault, again.

Fixes: #12841

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 11:54:27 +00:00
Arne Fitzenreiter
95229400b3 core167: add code needed for kernel update
remove the old kernel and reconfigure bootscripts for arm boards
and run user scripts to switch to a new kernel.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-12 11:35:20 +02:00
Peter Müller
f4dca7f1af Core Update 167: Ship xz
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-11 19:02:43 +00:00
Adolf Belka
bc82eb79b1 xz: Apply patch to solve security fix (ZDI-CAN-16587)
- Malicious filenames can make xzgrep to write to arbitrary files
   or (with a GNU sed extension) lead to arbitrary code execution.
- xzgrep from XZ Utils versions up to and including 5.2.5 are
   affected. 5.3.1alpha and 5.3.2alpha are affected as well.
- This bug was inherited from gzip's zgrep. gzip 1.12 includes
   a fix for zgrep.
- CU167 has gzip-1.12 with the fix already merged.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-11 19:02:31 +00:00
Arne Fitzenreiter
f1b0673572 kernel: arm rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-10 09:42:16 +02:00
Peter Müller
db27cae56e gzip: Symlink /usr/bin/zless to /usr/bin/zmore
gzip 1.12 no longer features zless. For convenience reasons, symlink
/usr/bin/zless to /usr/bin/zmore, so users won't need to relearn any
commands they were previously used to.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-09 10:44:10 +00:00
Peter Müller
4b8ae87258 Tor: glibc needs rseq syscall as well
Fixes: #12807 (finally)

Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-09 08:27:03 +00:00
Peter Müller
83c8662be8 Core Update 167: Ship gzip
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-09 07:39:45 +00:00
Peter Müller
f57a4b483f gzip: Update to 1.12
This fixes CVE-2022-1271.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-09 07:38:59 +00:00
Peter Müller
5a9b650759 Core Update 167: Ship backupiso script
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:05:29 +00:00
Peter Müller
74b372f8da backupiso: Change checksum algorithm to BLAKE2
Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:04:15 +00:00
Peter Müller
f97c896359 installer: Update translation message
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:04:15 +00:00
Peter Müller
b8764ff226 downloadsource.sh: Change checksum algorithm to BLAKE2
Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:04:15 +00:00
Peter Müller
6238a7098d Core Update 167: Apply local SSH changes to configuration file
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:01:03 +00:00
Peter Müller
490e86f403 Core Update 167: Update linker config before calling GPG
This avoids log messages like:
ldconfig: /lib/ld-linux-x86-64.so.2 is not a symbolic link

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 15:59:25 +00:00
Peter Müller
c9b5a4756f Core Update 167: Ship and apply sysctl changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 15:58:41 +00:00
Arne Fitzenreiter
158fc9a9ea gitignore: add *.b2 checksum files
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-08 00:32:40 +02:00
Arne Fitzenreiter
1d563665ed kernel: run make oldconfig
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-08 00:27:47 +02:00
Michael Tremer
855b46da2f core167: Ship coreutils
These have changed since they are now compiled with ACL/XATTR support

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-07 09:14:08 +00:00
Peter Müller
3f65e4996b kernel: Align rootfile again due to forgotten hardening patch
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 20:18:22 +00:00
Peter Müller
8e1a464d12 Kernel: Enable LSM support and set security level to "integrity"
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-06 20:04:04 +00:00
Peter Müller
afb2d2a23d Core Update 167: Ship getrrdimage.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:59 +00:00
Leo-Andres Hofmann
4c04960ba0 getrrdimage.cgi: Add default values to parameters
Prevents "use of uninitialized value" warnings when the
CGI is called with broken undefined GET parameters.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:33 +00:00
Peter Müller
df76e77cfb Core Update 167: Ship header.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:15 +00:00
Leo-Andres Hofmann
4c19f2158e header.pl: Add translation to DHCP leases table
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:50 +00:00
Peter Müller
af791343c7 Core Update 167: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:02 +00:00
Adolf Belka
e367031b38 sudo: Update to version 1.9.10
- Update from 1.9.9 to 1.9.10
- Update of rootfile not required
- Changelog
    What's new in Sudo 1.9.10
	 * Added new "log_passwords" and "passprompt_regex" sudoers options.
	   If "log_passwords" is disabled, sudo will attempt to prevent passwords
	   from being logged.  If sudo detects any of the regular expressions in
	   the "passprompt_regex" list in the terminal output, sudo will log '*'
	   characters instead of the terminal input until a newline or carriage
	   return is found in the input or an output character is received.
	 * Added new "log_passwords" and "passprompt_regex" settings to
	   sudo_logsrvd that operate like the sudoers options when logging
	   terminal input.
	 * Fixed several few bugs in the cvtsudoers utility when merging
	   multiple sudoers sources.
	 * Fixed a bug in sudo_logsrvd when parsing the sudo_logsrvd.conf
	   file, where the "retry_interval" in the [relay] section was not
	   being recognized.
	 * Restored the pre-1.9.9 behavior of not performing authentication
	   when sudo's -n option is specified.  A new "noninteractive_auth"
	   sudoers option has been added to enable PAM authentication in
	   non-interactive mode.  GitHub issue #131.
	 * On systems with /proc, if the /proc/self/stat (Linux) or
	   /proc/pid/psinfo (other systems) file is missing or invalid,
	   sudo will now check file descriptors 0-2 to determine the user's
	   terminal.  Bug #1020.
	 * Fixed a compilation problem on Debian kFreeBSD.  Bug #1021.
	 * Fixed a crash in sudo_logsrvd when running in relay mode if
	   an alert message is received.
	 * Fixed an issue that resulting in "problem with defaults entries"
	   email to be sent if a user ran sudo when the sudoers entry in
	   the nsswitch.conf file includes "sss" but no sudo provider is
	   configured in /etc/sssd/sssd.conf.  Bug #1022.
	 * Updated the warning displayed when the invoking user is not
	   allowed to run sudo.  If sudo has been configured to send mail
	   on failed attempts (see the mail_* flags in sudoers), it will
	   now print "This incident has been reported to the administrator."
	   If the "mailto" or "mailerpath" sudoers settings are disabled,
	   the message will not be printed and no mail will be sent.
	   GitHub issue #48.
	 * Fixed a bug where the user-specified command timeout was not
	   being honored if the sudoers rule did not also specify a timeout.
	 * Added support for using POSIX extended regular expressions in
	   sudoers rules.  A command and/or arguments in sudoers are treated
	   as a regular expression if they start with a '^' character and
	   end with a '$'.  The command and arguments are matched separately,
	   either one (or both) may be a regular expression.
	   Bug #578, GitHub issue #15.
	 * A user may now only run "sudo -U otheruser -l" if they have a
	   "sudo ALL" privilege where the RunAs user contains either "root"
	   or "otheruser".  Previously, having "sudo ALL" was sufficient,
	   regardless of the RunAs user.  GitHub issue #134.
	 * The sudo lecture is now displayed immediately before the password
	   prompt.  As a result, sudo will no longer display the lecture
	   unless the user needs to enter a password.  Authentication methods
	   that don't interact with the user via a terminal do not trigger
	   the lecture.
	 * Sudo now uses its own closefrom() emulation on Linux systems.
	   The glibc version may not work in a chroot jail where /proc is
	   not available.  If close_range(2) is present, it will be used
	   in preference to /proc/self/fd.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:14:55 +00:00
Peter Müller
e831404295 Core Update 167: Ship curl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:14:14 +00:00
Adolf Belka
ae4451a4c8 curl: Update to version 7.82.0
- Update from 7.81.0 to 7.82.0
- Update of rootfile not required
- Changelog
    Versionl 7.82.0
      This release includes the following changes:
	 o curl: add --json [67]
	 o mesalink: remove support [23]
      This release includes the following bugfixes:
	 o appveyor: update images from VS 2019 to 2022
	 o appveyor: use VS 2017 image for the autotools builds
	 o azure-pipelines: add a build on Windows with libssh [154]
	 o bearssl: fix connect error on expired cert and no verify [132]
	 o bearssl: fix EXC_BAD_ACCESS on incomplete CA cert [131]
	 o bearssl: fix session resumption (session id) [133]
	 o build: enable -Warith-conversion
	 o build: fix -Wenum-conversion handling
	 o build: fix ngtcp2 crypto library detection [63]
	 o checkprefix: remove strlen calls [128]
	 o checksrc: fix typo in comment [34]
	 o CI: move 'distcheck' job from zuul to azure pipelines [60]
	 o CI: move scan-build job from Zuul to Azure Pipelines [59]
	 o CI: move the NSS job from zuul to GHA [84]
	 o ci: move the OpenSSL + c-ares job from Zuul to Circle CI [75]
	 o CI: move the rustls CI job to GHA from Zuul [8]
	 o CI: move two jobs from Zuul to Circle CI [73]
	 o CI: test building wolfssl with --enable-opensslextra [42]
	 o CI: workflows/wolfssl: install impacket [47]
	 o circleci: add a job using libssh [121]
	 o cirlceci: also run a c-ares job on arm with debug enabled [74]
	 o cmake: fix iOS CMake project generation error [13]
	 o cmdline-opts/gen.pl: fix option matching to improve references [50]
	 o config.d: Clarify _curlrc filename is still valid on Windows [95]
	 o configure.ac: use user-specified gssapi dir when using pkg-config [136]
	 o configure: change output for cross-compiled alt-svc support [140]
	 o configure: fix '--enable-code-coverage' typo [110]
	 o configure: remove support for "embedded ares" [82]
	 o configure: requires --with-nss-deprecated to build with NSS [114]
	 o configure: set CURL_LIBRARY_PATH for nghttp2 [58]
	 o configure: support specification of a nghttp2 library path [101]
	 o configure: use correct CFLAGS for threaded resolver with xlC on AIX [54]
	 o curl tool: erase some more sensitive command line arguments [22]
	 o curl-functions.m4: fix LIBRARY_PATH adjustment to avoid eval [5]
	 o curl-functions.m4: revert DYLD_LIBRARY_PATH tricks in CURL_RUN_IFELSE [9]
	 o curl-openssl: fix SRP check for OpenSSL 3.0 [86]
	 o curl-openssl: remove the OpenSSL headers and library versions check [35]
	 o curl.h: fix typo [129]
	 o curl: remove "separators" (when using globbed URLs) [32]
	 o curl_getdate.3: remove pointless .PP line [68]
	 o curl_multi_socket.3: remove callback and typical usage descriptions [7]
	 o curl_url_set.3: mention when CURLU_ALLOW_SPACE was added
	 o CURLMOPT_TIMERFUNCTION/DATA.3: fix the examples [27]
	 o CURLOPT_PROGRESSFUNCTION.3: fix example struct assignment [147]
	 o CURLOPT_RESOLVE.3: change example port to 443
	 o CURLOPT_XFERINFOFUNCTION.3: fix example struct assignment [153]
	 o CURLOPT_XFERINFOFUNCTION.3: fix typo in example [81]
	 o CURLSHOPT_LOCKFUNC.3: fix typo "relased" -> "released" [71]
	 o des: fix compile break for OpenSSL without DES [141]
	 o docs/cmdline-opts: add "mutexed" options for more http versions [25]
	 o docs/DEPRECATE: remove NPN support in August 2022 [64]
	 o docs: capitalize the name 'Netscape' [77]
	 o docs: document HTTP/2 not insisting on TLS 1.2 [49]
	 o docs: fix mandoc -T lint formatting complaints [2]
	 o docs: update IETF links to use datatracker [41]
	 o examples/curlx: support building with OpenSSL 1.1.0+ [148]
	 o examples/multi-app.c: call curl_multi_remove_handle as well [19]
	 o formdata: avoid size_t => long typecast overflows [37]
	 o ftp: provide error message for control bytes in path [66]
	 o gen.pl: terminate "example" sections better [4]
	 o gha: add a macOS CI job with libssh [142]
	 o gskit: Convert to using Curl_poll [111]
	 o gskit: Fix errors from Curl_strerror refactor [113]
	 o gskit: Fix initialization of Curl_ssl_gskit struct [112]
	 o h2/h3: allow CURLOPT_HTTPHEADER change ":scheme" [88]
	 o hostcheck: fixed to not touch used input strings [38]
	 o hostcheck: reduce strlen calls on chained certificates [92]
	 o hostip: avoid unused parameter error in Curl_resolv_check [144]
	 o http2: move two infof calls to debug-h2-only [145]
	 o http: make Curl_compareheader() take string length arguments too [87]
	 o if2ip: make Curl_ipv6_scope a blank macro when IPv6-disabled [104]
	 o KNOWN_BUGS: fix typo "libpsl"
	 o ldap: return CURLE_URL_MALFORMAT for bad URL [24]
	 o lib: remove support for CURL_DOES_CONVERSIONS [96]
	 o libssh2: don't typecast socket to int for libssh2_session_handshake [151]
	 o libssh: fix include files and defines use for Windows builds [156]
	 o Makefile.am: Generate VS 2022 projects
	 o maketgz: return error if 'make dist' fails [79]
	 o mbedtls: enable use of mbedtls without CRL support [57]
	 o mbedtls: enable use of mbedtls without filesystem functions support [100]
	 o mbedtls: fix CURLOPT_SSLCERT_BLOB (again)
	 o mbedtls: fix ssl_init error with mbedTLS 3.1.0+ [12]
	 o mbedtls: remove #include <mbedtls/certs.h> [56]
	 o mbedtls: return CURLcode result instead of a mbedtls error code [1]
	 o md5: check md5_init_func return value
	 o mime: use a define instead of the magic number 24 [89]
	 o misc: allow curl to build with wolfssl --enable-opensslextra [43]
	 o misc: remove BeOS code and references [30]
	 o misc: remove the final watcom references [29]
	 o misc: remove unused data when IPv6 is not supported [80]
	 o mqtt: free 'sendleftovers' in disconnect [115]
	 o mqtt: free any send leftover data when done [36]
	 o multi: allow user callbacks to call curl_multi_assign [126]
	 o multi: grammar fix in comment [69]
	 o multi: remember connection_id before returning connection to pool [76]
	 o multi: set in_callback for multi interface callbacks [28]
	 o netware: remove support [72]
	 o next.d. remove .fi/.nf as they are handled by gen.pl [3]
	 o ngtcp2: adapt to changed end of headers callback proto [39]
	 o ngtcp2: fix declaration of ‘result’ shadows a previous local [14]
	 o ngtcp2: Reset dynbuf when it is fully drained [143]
	 o nss: handshake callback during shutdown has no conn->bundle [55]
	 o ntlm: remove unused feature defines [117]
	 o openldap: fix compiler warning when built without SSL support [70]
	 o openldap: implement SASL authentication [16]
	 o openldap: pass string length arguments to client_write() [116]
	 o openssl.h: avoid including OpenSSL headers here [15]
	 o openssl: check if sessionid flag is enabled before retrieving session [125]
	 o openssl: check SSL_get_ex_data to prevent potential NULL dereference [40]
	 o openssl: check the return value of BIO_new_mem_buf() [18]
	 o openssl: fix `ctx_option_t` for OpenSSL v3+
	 o openssl: fix build for version < 1.1.0 [134]
	 o openssl: return error if TLS 1.3 is requested when not supported [45]
	 o os400: Add function wrapper for system command [138]
	 o os400: Add link to QADRT devkit to README.OS400 [137]
	 o os400: Default build to target current release [139]
	 o OS400: fix typos in rpg include file [149]
	 o projects: add support for Visual Studio 17 (2022) [124]
	 o projects: fix Visual Studio wolfSSL configurations
	 o projects: remove support for MSVC before VC10 (Visual Studio 2010) [123]
	 o quiche: after leaving h3_recving state, poll again [108]
	 o quiche: change qlog file extension to `.sqlog` [44]
	 o quiche: fix upload for bigger content-length [146]
	 o quiche: handle stream reset [83]
	 o quiche: remove two leftover debug infof() outputs
	 o quiche: verify the server cert on connect [33]
	 o quiche: when *recv_body() returns data, drain it before polling again [109]
	 o README.md: fix links [118]
	 o remote-header-name.d: clarify [10]
	 o runtests.pl: disable debuginfod [51]
	 o runtests.pl: properly print the test if it contains binary zeros
	 o runtests.pl: support the nonewline attribute for the data part [21]
	 o runtests.pl: tolerate test directories without Makefile.inc [98]
	 o runtests: allow client/file to specify multiple directories
	 o runtests: make 'rustls' a testable feature
	 o runtests: make 'wolfssl' a testable feature [6]
	 o runtests: set 'oldlibssh' for libssh versions before 0.9.5 [122]
	 o rustls: add CURLOPT_CAINFO_BLOB support [26]
	 o schannel: move the algIds array out of schannel.h [135]
	 o scripts/cijobs.pl: output data about all currect CI jobs [78]
	 o scripts/completion.pl: improve zsh completion [46]
	 o scripts/copyright.pl: support many provided file names on the cmdline
	 o scripts/delta: check the file delta for current branch
	 o sectransp: mark a 3DES cipher as weak [130]
	 o setopt: do bounds-check before strdup [99]
	 o setopt: fix the TLSAUTH #ifdefs for proxy-disabled builds [53]
	 o sha256: Fix minimum OpenSSL version [102]
	 o smb: pass socket for writing and reading data instead of FIRSTSOCKET [90]
	 o ssl: reduce allocated space for ssl backend when FTP is disabled [127]
	 o test3021: disable all msys2 path transformation
	 o test374: gif data without new line at the end [20]
	 o tests/disable-scan.pl: properly detect multiple symbols per line [94]
	 o tests/unit/Makefile.am: add NSS_LIBS to build with NSS fine [85]
	 o tool_findfile: check ~/.config/curlrc too [17]
	 o tool_getparam: DNS options that need c-ares now fail without it [31]
	 o TPF: drop support [97]
	 o unit1610: init SSL library before calling SHA256 functions [152]
	 o url: exclude zonefrom_url when no ipv6 is available [103]
	 o url: given a user in the URL, find pwd for that user in netrc [11]
	 o url: keep trailing dot in host name [62]
	 o url: make Curl_disconnect return void [48]
	 o urlapi: handle "redirects" smarter [119]
	 o urldata: CONN_IS_PROXIED replaces bits.proxy when proxy can be disabled [52]
	 o urldata: remove conn->bits.user_passwd [105]
	 o version_win32: fix warning for `CURL_WINDOWS_APP` [93]
	 o vtls: fix socket check conditions [150]
	 o vtls: pass on the right SNI name [61]
	 o vxworks: drop support [65]
	 o winbuild: add parameter WITH_SSH [120]
	 o wolfssl: return CURLE_AGAIN for the SSL_ERROR_NONE case [106]
	 o wolfssl: when SSL_read() returns zero, check the error [107]
	 o write-out.d: Fix num_headers formatting
	 o x509asn1: toggle off functions not needed for diff tls backends [91]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:14:06 +00:00