Commit Graph

10907 Commits

Author SHA1 Message Date
Adolf Belka
d17852b25e harfbuzz: Update to version 7.0.1
- Update from version 6.0.0 to 7.0.1
- Update of rootfile
- Changelog
Overview of changes leading to 7.0.1
- Various build and bug fixes.
Overview of changes leading to 7.0.0
- New hb-paint API that is designed mainly to paint “COLRv1” glyphs, but can be
  also used as a unified API to paint any of the glyph representations
  supported by HarfBuzz (B/W outlines, color layers, or color bitmaps).
  (Behdad Esfahbod, Matthias Clasen)
- New hb-cairo API for integrating with cairo graphics library. This is provided
  as a separate harfbuzz-cairo library. (Behdad Esfahbod, Matthias Clasen)
- Support for instancing “CFF2” table. (Behdad Esfahbod)
- Support font emboldening. (Behdad Esfahbod)
- Support feature ranges with AAT shaping. (Behdad Esfahbod)
- Experimental support to cubic curves in “glyf” table, see
  https://github.com/harfbuzz/boring-expansion-spec/blob/main/glyf1-cubicOutlines.md
  for spec. (Behdad Esfahbod)
- Various subsetter improvements. (Garret Rieger, Qunxin Liu, Behdad Esfahbod)
- Various documentation improvements.
  (Behdad Esfahbod, Matthias Clasen, Khaled Hosny)
- Significantly reduced memory use during shaping. (Behdad Esfahbod)
- Greatly reduced memory use during subsetting “CFF” table. (Behdad Esfahbod)
- New command line utility, hb-info, for querying various font information.
  (Behdad Esfahbod, Matthias Clasen)
- New hb-shape/hb-view options: --glyphs, --color-palette, --font-bold,
  --font-grade, and --named-instance. (Behdad Esfahbod)
- Miscellaneous fixes and improvements.
  (Amir Masoud Abdol, Andres Salomon, Behdad Esfahbod, Chun-wei Fan,
  Garret Rieger, Jens Kutilek, Khaled Hosny, Konstantin Käfer, Matthias Clasen,
  Nirbheek Chauhan, Pedro J. Estébanez, Qunxin Liu, Sergei Trofimovich)
- New API:
+HB_FONT_NO_VAR_NAMED_INSTANCE
+HB_PAINT_IMAGE_FORMAT_BGRA
+HB_PAINT_IMAGE_FORMAT_PNG
+HB_PAINT_IMAGE_FORMAT_SVG
+hb_cairo_font_face_create_for_face
+hb_cairo_font_face_create_for_font
+hb_cairo_font_face_get_face
+hb_cairo_font_face_get_font
+hb_cairo_font_face_get_scale_factor
+hb_cairo_font_face_set_font_init_func
+hb_cairo_font_face_set_scale_factor
+hb_cairo_font_init_func_t
+hb_cairo_glyphs_from_buffer
+hb_cairo_scaled_font_get_font
+hb_color_line_get_color_stops
+hb_color_line_get_color_stops_func_t
+hb_color_line_get_extend
+hb_color_line_get_extend_func_t
+hb_color_line_t
+hb_color_stop_t
+hb_draw_funcs_get_empty
+hb_draw_funcs_get_user_data
+hb_draw_funcs_set_user_data
+hb_face_collect_nominal_glyph_mapping
+hb_font_draw_glyph
+hb_font_draw_glyph_func_t
+hb_font_funcs_set_draw_glyph_func
+hb_font_funcs_set_paint_glyph_func
+hb_font_get_synthetic_bold
+hb_font_get_var_named_instance
+hb_font_paint_glyph
+hb_font_paint_glyph_func_t
+hb_font_set_synthetic_bold
+hb_map_keys
+hb_map_next
+hb_map_update
+hb_map_values
+hb_ot_color_glyph_has_paint
+hb_ot_color_has_paint
+hb_ot_layout_script_select_language2
+hb_ot_name_id_predefined_t
+hb_paint_color
+hb_paint_color_func_t
+hb_paint_composite_mode_t
+hb_paint_custom_palette_color
+hb_paint_custom_palette_color_func_t
+hb_paint_extend_t
+hb_paint_funcs_create
+hb_paint_funcs_destroy
+hb_paint_funcs_get_empty
+hb_paint_funcs_get_user_data
+hb_paint_funcs_is_immutable
+hb_paint_funcs_make_immutable
+hb_paint_funcs_reference
+hb_paint_funcs_set_color_func
+hb_paint_funcs_set_custom_palette_color_func
+hb_paint_funcs_set_image_func
+hb_paint_funcs_set_linear_gradient_func
+hb_paint_funcs_set_pop_clip_func
+hb_paint_funcs_set_pop_group_func
+hb_paint_funcs_set_pop_transform_func
+hb_paint_funcs_set_push_clip_glyph_func
+hb_paint_funcs_set_push_clip_rectangle_func
+hb_paint_funcs_set_push_group_func
+hb_paint_funcs_set_push_transform_func
+hb_paint_funcs_set_radial_gradient_func
+hb_paint_funcs_set_sweep_gradient_func
+hb_paint_funcs_set_user_data
+hb_paint_funcs_t
+hb_paint_image
+hb_paint_image_func_t
+hb_paint_linear_gradient
+hb_paint_linear_gradient_func_t
+hb_paint_pop_clip
+hb_paint_pop_clip_func_t
+hb_paint_pop_group
+hb_paint_pop_group_func_t
+hb_paint_pop_transform
+hb_paint_pop_transform_func_t
+hb_paint_push_clip_glyph
+hb_paint_push_clip_glyph_func_t
+hb_paint_push_clip_rectangle
+hb_paint_push_clip_rectangle_func_t
+hb_paint_push_group
+hb_paint_push_group_func_t
+hb_paint_push_transform
+hb_paint_push_transform_func_t
+hb_paint_radial_gradient
+hb_paint_radial_gradient_func_t
+hb_paint_sweep_gradient
+hb_paint_sweep_gradient_func_t
+hb_set_is_inverted
+hb_subset_input_keep_everything
- Deprecated API:
+hb_font_funcs_set_glyph_shape_func
+hb_font_get_glyph_shape_func_t
+hb_font_get_glyph_shape

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:12:22 +00:00
Peter Müller
65e7e3e26c Core Update 174: Ship gnutls
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:11:30 +00:00
Adolf Belka
4e692c42b6 gnutls: Update to version 3.8.0
- Update from version 3.7.7 to 3.8.0
- Update of rootfile
- Changelog
Version 3.8.0 (unreleased 2023-02-09)
-- libgnutls: Fix a Bleichenbacher oracle in the TLS RSA key exchange.
   Reported by Hubert Kario (#1050). Fix developed by Alexander Sosedkin.
   [GNUTLS-SA-2020-07-14, CVSS: medium] [CVE-2023-0361]
-- libgnutls: C++ library is now header only. All definitions from
   gnutlsxx.c have been moved into gnutlsxx.h. Users of the C++
   interface have two options:
   1. include gnutlsxx.h in their application and link against
      the C library. (default)
   2. include gnutlsxx.h in their application, compile with
      GNUTLS_GNUTLSXX_NO_HEADERONLY macro defined and link
      against the C++ library.
-- libgnutls: GNUTLS_NO_STATUS_REQUEST flag and %NO_STATUS_REQUEST
   priority modifier have been added to allow disabling of the
   status_request TLS extension in the client side.
-- libgnutls: TLS heartbeat is disabled by default.
   The heartbeat extension in TLS (RFC 6520) is not widely used given
   other implementations dropped support for it. To enable back
   support for it, supply --enable-heartbeat-support to configure
   script.
-- libgnutls: SRP authentication is now disabled by default.
   It is disabled because the SRP authentication in TLS is not up to
   date with the latest TLS standards and its ciphersuites are based
   on the CBC mode and SHA-1.  To enable it back, supply
   --enable-srp-authentication option to configure script.
-- libgnutls: All code has been indented using "indent -ppi1 -linux".
   CI/CD has been adjusted to catch regressions.  This is implemented
   through devel/indent-gnutls, devel/indent-maybe and .gitlab-ci.yml’s
   commit-check.  You may run devel/indent-gnutls to fix any
   indentation issues if you make code modifications.
-- guile: Guile-bindings removed.
   They have been extracted into a separate project to reduce complexity
   and to simplify maintenance, see <https://gitlab.com/gnutls/guile/>.
-- minitasn1: Upgraded to libtasn1 version 4.19.
-- API and ABI modifications:
GNUTLS_NO_STATUS_REQUEST: New flag
GNUTLS_SRTP_AEAD_AES_128_GCM: New gnutls_srtp_profile_t enum member
GNUTLS_SRTP_AEAD_AES_256_GCM: New gnutls_srtp_profile_t enum member
Version 3.7.8 (released 2022-09-27)
-- libgnutls: In FIPS140 mode, RSA signature verification is an approved
   operation if the key has modulus with known sizes (1024, 1280,
   1536, and 1792 bits), in addition to any modulus sizes larger than
   2048 bits, according to SP800-131A rev2.
-- libgnutls: gnutls_session_channel_binding performs additional checks when
   GNUTLS_CB_TLS_EXPORTER is requested. According to RFC9622 4.2, the
   "tls-exporter" channel binding is only usable when the handshake is
   bound to a unique master secret (i.e., either TLS 1.3 or extended
   master secret extension is negotiated). Otherwise the function now
   returns error.
-- libgnutls: usage of the following functions, which are designed to
   loosen restrictions imposed by allowlisting mode of configuration,
   has been additionally restricted. Invoking them is now only allowed
   if system-wide TLS priority string has not been initialized yet:
gnutls_digest_set_secure
gnutls_sign_set_secure
gnutls_sign_set_secure_for_certs
gnutls_protocol_set_enabled
-- API and ABI modifications:
No changes since last version.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:10:57 +00:00
Peter Müller
129e68716c Core Update 174: Ship ethtool
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:10:39 +00:00
Peter Müller
ac146a5b65 Core Update 174: Ship e2fsprogs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:10:12 +00:00
Peter Müller
3626475fd9 Core Update 174: Ship curl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:09:40 +00:00
Peter Müller
295d50f120 Core Update 174: Ship apr
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:09:07 +00:00
Adolf Belka
fc6323b894 apr: Update to version 1.7.2
- Update from version 1.7.0 to 1.7.2
- Update of rootfile
- Changelog
Changes for APR 1.7.2
  *) Correct a packaging issue in 1.7.1. The contents of the release were
     correct, but the top level directory was misnamed.
Changes for APR 1.7.1
  *) SECURITY: CVE-2022-24963 (cve.mitre.org)
     Integer Overflow or Wraparound vulnerability in apr_encode functions of
     Apache Portable Runtime (APR) allows an attacker to write beyond bounds
     of a buffer.
  *) SECURITY: CVE-2022-28331 (cve.mitre.org)
     On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond
     the end of a stack based buffer in apr_socket_sendv(). This is a result
     of integer overflow.
  *) SECURITY: CVE-2021-35940 (cve.mitre.org)
     Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
     (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
     later 1.6.x releases, but was missing in 1.7.0.)  [Stefan Sperling]
  *) configure: Fix various build issues for compilers enforcing
     strict C99 compliance.  PR 66396, 66408, 66426.
     [Florian Weimer <fweimer redhat.com>, Sam James <sam gentoo.org>]
  *) apr_atomic_read64(): Fix non-atomic read on 32-bit Windows [Ivan Zhakov]
  *) configure: Prefer posix name-based shared memory over SysV IPC.
     [Jim Jagielski]
  *) configure: Add --disable-sctp argument to forcibly disable SCTP
     support, or --enable-sctp which fails if SCTP support is not
     detected.  [Lubos Uhliarik <luhliari redhat.com>, Joe Orton]
  *) Fix handle leak in the Win32 apr_uid_current implementation.
     PR 61165. [Ivan Zhakov]
  *) Add error handling for lseek() failures in apr_file_write() and
     apr_file_writev().  [Joe Orton]
  *) Don't silently set APR_FOPEN_NOCLEANUP for apr_file_mktemp() created file
     to avoid a fd and inode leak when/if later passed to apr_file_setaside().
     [Yann Ylavic]
  *) APR's configure script uses AC_TRY_RUN to detect whether the return type
     of strerror_r is int. When cross-compiling this defaults to no.
     This commit adds an AC_CACHE_CHECK so users who cross-compile APR may
     influence the outcome with a configure variable. [Sebastian Kemper
     <sebastian_ml gmx net>]
  *) Add a cache check with which users who cross-compile APR
     can influence the outcome of the /dev/zero test by setting the variable
     ac_cv_mmap__dev_zero=yes [Sebastian Kemper <sebastian_ml gmx net>]
  *) Trick autoconf into printing the correct default prefix in the help.
     [Stefan Fritsch]
  *) Don't try to use PROC_PTHREAD by default when cross compiling.
     [Yann Ylavic]
  *) Add the ability to cross compile APR. [Graham Leggett]
  *) While cross-compiling, the tools/gen_test_char could not
     be executed at build time, use AX_PROG_CC_FOR_BUILD to
     build native tools/gen_test_char
     Support explicit libtool by variable assigning before buildcheck.sh,
     it is helpful for cross-compiling (such as libtool=aarch64-linux-libtool)
     [Hongxu Jia <hongxu.jia windriver.com>]
  *) Avoid an overflow on 32 bit platforms. [René Hjortskov Nielsen
     <r... hjortskov.dk>]
  *) Use AC_CHECK_SIZEOF, so as to support cross compiling. PR 56053.
     [Mike Frysinger <vapier gentoo.org>]
  *) Add --tag=CC to libtool invocations. PR 62640. [Michael Osipov]
  *) apr_pools: Fix pool debugging output so that creation events are
     always emitted before allocation events and subpool destruction
     events are emitted on pool clear/destroy for proper accounting.
     [Brane Čibej]
  *) apr_socket_listen: Allow larger listen backlog values on Windows 8+.
     [Evgeny Kotkov <evgeny.kotkov visualsvn.com>]
  *) Fixed: apr_get_oslevel() was returning APR_WIN_XP on Windows 10
  *) Fix attempt to free invalid memory on exit when apr_app is used
     on Windows. [Ivan Zhakov]
  *) Fix double free on exit when apr_app is used on Windows. [Ivan Zhakov]
  *) Fix a regression in apr_stat() for root path on Windows. [Ivan Zhakov]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:08:48 +00:00
Matthias Fischer
6d3e6cfc16 grub: Fix for riscv64 rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-05 15:04:52 +00:00
Peter Müller
5490e9654a Core Update 174: Ship updatexlrator.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:04:20 +00:00
Peter Müller
949b658916 Core Update 174: Ship bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:03:04 +00:00
Matthias Fischer
e0c0e59c43 bind: Update to 9.16.38
For details  see:
https://downloads.isc.org/isc/bind9/9.16.38/doc/arm/html/notes.html#notes-for-bind-9-16-38

"Notes for BIND 9.16.38
Bug Fixes

    A constant stream of zone additions and deletions via rndc reconfig
    could cause increased memory consumption due to delayed cleaning of
    view memory. This has been fixed. [GL #3801]

    The speed of the message digest algorithms (MD5, SHA-1, SHA-2), and of
    NSEC3 hashing, has been improved. [GL #3795]

    Building BIND 9 failed when the --enable-dnsrps switch for ./configure
    was used. This has been fixed. [GL #3827]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-05 15:01:58 +00:00
Jon Murphy
3ad00458a5 pcengines-apu-firmware: Update to version 4.19.0.1
- Update from 4.17.0.3 to 4.19.0.1
- Changelog
    v4.19.0.1 - Release date: 2023-02-02
	Rebased with official coreboot repository commit 2ccbcc5
	Removed configuration and mainboard files for apu1 due to the board being dropped from upstream coreboot
	See: https://github.com/pcengines/coreboot/compare/v4.17.0.3...v4.19.0.1

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
2023-03-05 15:01:09 +00:00
Peter Müller
7c343ef358 Core Update 174: Ship elinks
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:00:48 +00:00
Adolf Belka
ccf8c0580f elinks: Update to version 0.16.0
- Update from version 0.15.1 to 0.16.0
- Update of rootfile
- According to the forked elinks developer if parallel build is required then meson
   should be used for the build. With make they don't believe that it ever ran in
   parallel mode.
- This patch modifies the build from autotools to meson and updates the version.
- Parallel build option added back in to meson/ninja flow.
- The build requires git to be present so git moved to just before elinks in make.sh
- Changelog
ELinks 0.16.0
* detect xterm on my computer
ELinks 0.16.0rc1
* alternative mujs engine for js
* bump mozjs to 102
* experimental XHR implementation
* macros in exmode #196
* removed infinite loop, which occurred under BSD #197
* optional terminal hyperlinks in dumps #198

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:00:03 +00:00
Peter Müller
f418988e24 Core Update 174: Remove orphaned Pakfire metadata for perl-TimeDate
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:59:19 +00:00
Peter Müller
c14d53e979 Core Update 174: Ship intel-microcode and rebuild initrds
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:56:54 +00:00
Adolf Belka
504756d4f5 intel-microcode: Update to version 20230214
- Update from version 20221108 to 20230214
- Update of rootfile
- Changelog - details can be found in the releasenote.md file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:54:49 +00:00
Peter Müller
628a05122d Core Update 174: Ship freetype
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:54:23 +00:00
Adolf Belka
fa4e17db8a freetype: Update to version 2.13.0
- Update from version 2.12.1 to 2.13.0
- Update of rootfile
- Changelog
CHANGES BETWEEN 2.12.1 and 2.13.0 (2023-Feb-09)
  I. IMPORTANT CHANGES
  - The demo program `ftinspect` has  been completely updated and much
    enhanced.  It now  combines the functionality of  almost all other
    graphical FreeType  demo programs into a  single application based
    on the Qt framework.  This was Charlie Jiang's GSoC 2022 project.
  - The 'COLR' v1 API is now considered as stable.
      https://learn.microsoft.com/en-us/typography/opentype/spec/colr
  III. MISCELLANEOUS
  - For  OpenType  Variable Fonts,  `avar`  table  format 2.0  is  now
    supported.  The code was contributed by Behdad Esfahbod.
    Note that this is an extension supported on recent Apple platforms
    and by HarfBuzz, but not yet in the OpenType standard!  See
      https://github.com/harfbuzz/boring-expansion-spec/blob/main/avar2.md
    for the specification.  To deactivate it, define the configuration
    macro 'TT_CONFIG_OPTION_NO_BORING_EXPANSION'.
  - A new API  `FT_GlyphSlot_Slant` to slant a glyph by  a given angle
    has been added.   Note that this function is  part of `ftsynth.h`,
    which is still considered to be in alpha stage.
  - TrueType interpreter version 38  (also known as 'Infinality') that
    was first introduced about 10 years  ago in FreeType 2.4.11 is now
    deprecated and slated to be removed in the next version.  TrueType
    interpreter version 40 has been FreeType's default version for six
    years now and provides an excellent alternative.  This is the last
    FreeType     version     with    TT_INTERPRETER_VERSION_38     and
    TT_INTERPRETER_VERSION_40 treated differently.
  - The  only  referenced  but never  documented  configuration  macro
    `FT_CONFIG_OPTION_NO_GLYPH_NAMES` has been removed.
  - The `ftbench` demo  program got a new command line  option `-e` to
    set a charmap index.
  - Specifying  a point  size is  now optional  for the  demo programs
    `ftgrid`, `ftmulti`,  `ftstring`, and  `ftview`.  If not  given, a
    default size is used.
  - For  `ftgrid`,  `ftstring`, and  `ftview`,  option  `-e` now  also
    accepts a numeric value to set a charmap index.
  - In  `ftstring`, it  is  now  possible to  set  the displayed  text
    interactively by pressing the 'Enter' key.
  - `ftmulti` can now handle up to 16 design axes.
  - To  avoid  reserved identifiers  that  are  globally defined,  the
    auto-hinter  debugging   macros  (which  are  only   available  if
    `FT_DEBUG_AUTOFIT` is defined)
    ```
    _af_debug_disable_horz_hints
    _af_debug_disable_vert_hints
    _af_debug_disable_blue_hints
    _af_debug_hints
    ```
    have been renamed to
    ```
    af_debug_disable_horz_hints_
    af_debug_disable_vert_hints_
    af_debug_disable_blue_hints_
    af_debug_hints_
    ```

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:54:13 +00:00
Adolf Belka
3791abd6eb dbus: Update to version 1.14.6
- Update from version 1.14.4 to 1.14.6
- Update of rootfile
- The Denial of service issue mentioned first in the changelog is not applicable to IPFire
   as the build is done without asserts enabled.
- Changelog
dbus 1.14.6 (2023-02-08)
	Denial of service fixes:
	• Fix an incorrect assertion that could be used to crash dbus-daemon or
	  other users of DBusServer prior to authentication, if libdbus was compiled
	  with assertions enabled.
	  We recommend that production builds of dbus, for example in OS distributions,
	  should be compiled with checks but without assertions.
	  (dbus#421, Ralf Habacker; thanks to Evgeny Vereshchagin)
	Other fixes:
	• When connected to a dbus-broker, stop dbus-monitor from incorrectly
	  replying to Peer method calls that were sent to the dbus-broker with
	  a NULL destination (dbus#301, Kai A. Hiller)
	• Fix out-of-bounds varargs read in the dbus-daemon's config-parser.
	  This is not attacker-triggerable and appears to be harmless in practice,
	  but is technically undefined behaviour and is detected as such by
	  AddressSanitizer. (dbus!357, Evgeny Vereshchagin)
	• Avoid a data race in multi-threaded use of DBusCounter
	  (dbus#426, Ralf Habacker)
	• Fix a crash with some glibc versions when non-auditable SELinux events
	  are logged (dbus!386, Jeremi Piotrowski)
	• If dbus_message_demarshal() runs out of memory while validating a message,
	  report it as NoMemory rather than InvalidArgs (dbus#420, Simon McVittie)
	• Use C11 _Alignof if available, for better standards-compliance
	  (dbus!389, Khem Raj)
	• Stop including an outdated copy of pkg.m4 in the git tree
	  (dbus!365, Simon McVittie)
	• Documentation:
	  · Consistently use Gitlab bug reporting URL (dbus!372, Marco Trevisan)
	• Tests fixes:
	  · Fix the test-apparmor-activation test after dbus#416
	    (dbus!380, Dave Jones)
	Internal changes:
	• Fix CI builds with recent git versions (dbus#447, Simon McVittie)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:53:53 +00:00
Peter Müller
f502e53c83 Core Update 174: Ship logwatch
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:53:20 +00:00
Matthias Fischer
72df13821d logwatch: Update to 7.8
The developers do not provide a changelog, this time I couldn't
even find a comment.

All I can say:
Running her on Core 172. No seen problems.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-05 14:53:06 +00:00
Peter Müller
0695b748d4 Core Update 174: Ship changes related to bug #11742
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:52:01 +00:00
Michael Tremer
b7fdcbf6ca perl-TimeDate: Move from package into main system
This is now required by ovpnmain.cgi for certificate expiry time
detection.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:50:33 +00:00
Peter Müller
42d4b88140 rust: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:23:20 +00:00
Peter Müller
2223cafa37 linux: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:22:28 +00:00
Adolf Belka
2705a8903e ragel: Update to version 7.0.4
- Update from version 7.0.0.11 to 7.0.4
- Update of rootfile
- Changelog
updated language flags, catch abortcompile throw in non-ragel progs
7.0.3
This version of colm includes a critical fix for big-endian system. Fixes #61.
expect colm version 0.14.6 and version bump ragel to 7.0.3
7.0.2
Latest colm includes bugfixes for refcounting, which fixes a ragel issue with includes #58.
expect colm 0.14.5 and version bump to 7.0.2
7.0.1
removed accidental commit of ragel/.exrc
7.0.0.12
implemented NfaClear in asm codegen

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:15:52 +00:00
Adolf Belka
60cbad9204 colm: Update to version 0.14.7
- Update from version 0.13.0.6 to 0.14.7
- Update of rootfile
- patch from colm commit fc61ecb required to fix bug of make looking for static and
   dynamic libs even if one of them was disabled
- Changelog is not available in source tarball or on website etc. Changes have to be
   reviewed by the commits https://github.com/adrian-thurston/colm/commits/0.14.7

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:15:52 +00:00
Peter Müller
d51c4e566b linux: Update x86_64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:14:31 +00:00
Adolf Belka
3fca7d6c76 epson-inkjet-printer-escpr: Update to version 1.7.23
- Update from version 1.6.12 to 1.7.23
- Update of rootfile
- Changelog
  Most changes are related to additional printers except for
1.7.10
* Fixed the problem that epson-escpr-wrapper filter would crash
  when cupsRasterReadHeader failed.
1.7.7.2
* Supported new model.
* Fixed an issue of filter crash when FIFO I/O was closed.
1.7.0
* Supported new models.
* Applied Privacy Statement.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-04 14:08:08 +00:00
Peter Müller
7902b83cca Core Update 174: Ship tzdata
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 14:07:29 +00:00
Adolf Belka
cabd9441e8 tzdata: Update to version 2022g
- Update from version 2022e to 2022g
- Update of rootfile
- Changelog is too large to include here. See the NEWS file in the source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-04 14:07:22 +00:00
Peter Müller
9a86a1b89e Core Update 174: Ship mail.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 14:06:14 +00:00
Peter Müller
8818834d0f Core Update 174: Ship log.dat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 14:04:05 +00:00
Peter Müller
3ceda453ca Core Update 174: Ship efivar
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 14:03:06 +00:00
Arne Fitzenreiter
1b6047b3ee riscv64: enable EFI support and tools for riscv64
grub is still buggy! grub-install fails with an error:
Relocation 0x13 is not implented!

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-03-04 14:01:43 +00:00
Adolf Belka
e2bdd79782 initscripts: Remove rngd from the core package initscripts
- rngd removed from initscripts lfs and rootfiles due to change of rng-tools to addon

Fixes: Bug#12900
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-04 13:55:33 +00:00
Adolf Belka
f4b849cb3f rng-tools: Move from core package to addon - fixes bug 12900
- This patch is to move the rng-tools package from a core package to an addon. With the
   kernel changes from 5.6 rngd is no longer needed to create the required kernel entropy.
- The results from HRNG's via rngd are used with an XOR after the entropy is
   collected by the kernel. So the HWRNG output is used to dilute the kernel random number
   data, which is already merged from several sources.
- Based on the above and @Paul's request in the bug report to have rng-tools kept as an
   addon this patch set is submitted for consideration to keep rng-tools but as an addon.
- move rng-tools rootfile from common to packages
- Modify rng-tools lfs from core package to addon package
- Create rng-tools pak to install and uninstall - creating rc.d links for start & stop.
- Move rngd initscript from system to packages directory.
- Installed into my vm testbed and confirmed that it works. No rngd daemon installed
   from iso install. After addon install rngd is present and running. Added various files
   to be able to test the services wui page. rngd shows up and can be turned off and on

Fixes: Bug#12900
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-04 13:55:31 +00:00
Matthias Fischer
4b8fef1371 rust: Update to 1.67.0
For details see:
https://github.com/rust-lang/rust/blob/stable/RELEASES.md#version-1670-2023-01-26

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-04 13:54:40 +00:00
Peter Müller
5a58f29fe9 Core Update 174: Ship lsof
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 13:54:15 +00:00
Peter Müller
b5185d54fd Core Update 174: Ship all changes related to bug #10629
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 13:43:19 +00:00
Adolf Belka
b52a84ddc7 dhcp.cgi: Fix bug#10629 - Highlight fixed IP's in dynamic range in red
- This v2 patch has moved the extraHead variable into header.pl
- This patch marks all IP's that are in the Fixed list but are also in the dynamic range
   that has been defined, in red.
- Additional function created to check if an ip address is in a defined range.
- Added an additional key item under the Fixed Leases table for Fixed IP in dynamic range
- Added line to English Language file for this key item.
- ./make lang run before commit.
- Tested in vm testbed and confirmed that any ip address in the Fixed Leases table that
   is in the defined dynamic range is highlighted in red
- This uses the css background-color appoach from the first patch in this set.
- This patch only highlights those IP's that overlap in red but does nothing more. So a
   user can still create new ones if they want but they will all show up in red.
- This patch flags up if people are doing things that they shouldn't be doing but allows
   them to continue doing so without changing anything if they don't want to and so will
   not break existing setups.

Fixes: Bug#10629
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-04 13:41:21 +00:00
Adolf Belka
de4dea96aa dhcp.cgi: Fix for bug#10629 - update bgcolor to css
- This v2 version moves the extraHead variable to header.pl as many of the css values
   will be used in many other WUI cgi pages so makes sense to not define anew in every
   location using the bgcolor or other colour variables.
- I will submit patches to follow the same approach in all other WUI cgi pages once this
   has been submitted into next
- bgcolor was deprecated in HTML 4.01 and is not supported by HTML 5
- The orange colour for IP's that are outside the IPFire green and blue subnets does not
   work on any browser I am using.
- I used the CSS approach that @Leo used in the Zone Configuration cgi page
- This patch changes all existing bgcolor entries to the css based background-color
- Tested on my vm testbed and confirmed to work. The Orange colour for IP's outside of
   the subnet now shows up.

Fixes: Bug#10629
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-04 13:41:21 +00:00
Peter Müller
fb7fed2a6d Core Update 174: Ship and restart Squid
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-04 13:40:45 +00:00
Peter Müller
313403043c Merge branch 'master' into next 2023-02-23 16:58:40 +00:00
Michael Tremer
bf9d6ad62a core173: Ensure that the OpenVPN authenticator definitely does not run any more
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-22 15:24:36 +00:00
Arne Fitzenreiter
216def69c1 rootfile: add more riscv64 rootfiles
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:44 +00:00
Arne Fitzenreiter
f5ee536b72 rootfile: add many rootfiles for riscv64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:39 +00:00
Arne Fitzenreiter
54364fac8c kernel: update riscv64 config and rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:36 +00:00