Commit Graph

3364 Commits

Author SHA1 Message Date
Adolf Belka
d17852b25e harfbuzz: Update to version 7.0.1
- Update from version 6.0.0 to 7.0.1
- Update of rootfile
- Changelog
Overview of changes leading to 7.0.1
- Various build and bug fixes.
Overview of changes leading to 7.0.0
- New hb-paint API that is designed mainly to paint “COLRv1” glyphs, but can be
  also used as a unified API to paint any of the glyph representations
  supported by HarfBuzz (B/W outlines, color layers, or color bitmaps).
  (Behdad Esfahbod, Matthias Clasen)
- New hb-cairo API for integrating with cairo graphics library. This is provided
  as a separate harfbuzz-cairo library. (Behdad Esfahbod, Matthias Clasen)
- Support for instancing “CFF2” table. (Behdad Esfahbod)
- Support font emboldening. (Behdad Esfahbod)
- Support feature ranges with AAT shaping. (Behdad Esfahbod)
- Experimental support to cubic curves in “glyf” table, see
  https://github.com/harfbuzz/boring-expansion-spec/blob/main/glyf1-cubicOutlines.md
  for spec. (Behdad Esfahbod)
- Various subsetter improvements. (Garret Rieger, Qunxin Liu, Behdad Esfahbod)
- Various documentation improvements.
  (Behdad Esfahbod, Matthias Clasen, Khaled Hosny)
- Significantly reduced memory use during shaping. (Behdad Esfahbod)
- Greatly reduced memory use during subsetting “CFF” table. (Behdad Esfahbod)
- New command line utility, hb-info, for querying various font information.
  (Behdad Esfahbod, Matthias Clasen)
- New hb-shape/hb-view options: --glyphs, --color-palette, --font-bold,
  --font-grade, and --named-instance. (Behdad Esfahbod)
- Miscellaneous fixes and improvements.
  (Amir Masoud Abdol, Andres Salomon, Behdad Esfahbod, Chun-wei Fan,
  Garret Rieger, Jens Kutilek, Khaled Hosny, Konstantin Käfer, Matthias Clasen,
  Nirbheek Chauhan, Pedro J. Estébanez, Qunxin Liu, Sergei Trofimovich)
- New API:
+HB_FONT_NO_VAR_NAMED_INSTANCE
+HB_PAINT_IMAGE_FORMAT_BGRA
+HB_PAINT_IMAGE_FORMAT_PNG
+HB_PAINT_IMAGE_FORMAT_SVG
+hb_cairo_font_face_create_for_face
+hb_cairo_font_face_create_for_font
+hb_cairo_font_face_get_face
+hb_cairo_font_face_get_font
+hb_cairo_font_face_get_scale_factor
+hb_cairo_font_face_set_font_init_func
+hb_cairo_font_face_set_scale_factor
+hb_cairo_font_init_func_t
+hb_cairo_glyphs_from_buffer
+hb_cairo_scaled_font_get_font
+hb_color_line_get_color_stops
+hb_color_line_get_color_stops_func_t
+hb_color_line_get_extend
+hb_color_line_get_extend_func_t
+hb_color_line_t
+hb_color_stop_t
+hb_draw_funcs_get_empty
+hb_draw_funcs_get_user_data
+hb_draw_funcs_set_user_data
+hb_face_collect_nominal_glyph_mapping
+hb_font_draw_glyph
+hb_font_draw_glyph_func_t
+hb_font_funcs_set_draw_glyph_func
+hb_font_funcs_set_paint_glyph_func
+hb_font_get_synthetic_bold
+hb_font_get_var_named_instance
+hb_font_paint_glyph
+hb_font_paint_glyph_func_t
+hb_font_set_synthetic_bold
+hb_map_keys
+hb_map_next
+hb_map_update
+hb_map_values
+hb_ot_color_glyph_has_paint
+hb_ot_color_has_paint
+hb_ot_layout_script_select_language2
+hb_ot_name_id_predefined_t
+hb_paint_color
+hb_paint_color_func_t
+hb_paint_composite_mode_t
+hb_paint_custom_palette_color
+hb_paint_custom_palette_color_func_t
+hb_paint_extend_t
+hb_paint_funcs_create
+hb_paint_funcs_destroy
+hb_paint_funcs_get_empty
+hb_paint_funcs_get_user_data
+hb_paint_funcs_is_immutable
+hb_paint_funcs_make_immutable
+hb_paint_funcs_reference
+hb_paint_funcs_set_color_func
+hb_paint_funcs_set_custom_palette_color_func
+hb_paint_funcs_set_image_func
+hb_paint_funcs_set_linear_gradient_func
+hb_paint_funcs_set_pop_clip_func
+hb_paint_funcs_set_pop_group_func
+hb_paint_funcs_set_pop_transform_func
+hb_paint_funcs_set_push_clip_glyph_func
+hb_paint_funcs_set_push_clip_rectangle_func
+hb_paint_funcs_set_push_group_func
+hb_paint_funcs_set_push_transform_func
+hb_paint_funcs_set_radial_gradient_func
+hb_paint_funcs_set_sweep_gradient_func
+hb_paint_funcs_set_user_data
+hb_paint_funcs_t
+hb_paint_image
+hb_paint_image_func_t
+hb_paint_linear_gradient
+hb_paint_linear_gradient_func_t
+hb_paint_pop_clip
+hb_paint_pop_clip_func_t
+hb_paint_pop_group
+hb_paint_pop_group_func_t
+hb_paint_pop_transform
+hb_paint_pop_transform_func_t
+hb_paint_push_clip_glyph
+hb_paint_push_clip_glyph_func_t
+hb_paint_push_clip_rectangle
+hb_paint_push_clip_rectangle_func_t
+hb_paint_push_group
+hb_paint_push_group_func_t
+hb_paint_push_transform
+hb_paint_push_transform_func_t
+hb_paint_radial_gradient
+hb_paint_radial_gradient_func_t
+hb_paint_sweep_gradient
+hb_paint_sweep_gradient_func_t
+hb_set_is_inverted
+hb_subset_input_keep_everything
- Deprecated API:
+hb_font_funcs_set_glyph_shape_func
+hb_font_get_glyph_shape_func_t
+hb_font_get_glyph_shape

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:12:22 +00:00
Adolf Belka
4e692c42b6 gnutls: Update to version 3.8.0
- Update from version 3.7.7 to 3.8.0
- Update of rootfile
- Changelog
Version 3.8.0 (unreleased 2023-02-09)
-- libgnutls: Fix a Bleichenbacher oracle in the TLS RSA key exchange.
   Reported by Hubert Kario (#1050). Fix developed by Alexander Sosedkin.
   [GNUTLS-SA-2020-07-14, CVSS: medium] [CVE-2023-0361]
-- libgnutls: C++ library is now header only. All definitions from
   gnutlsxx.c have been moved into gnutlsxx.h. Users of the C++
   interface have two options:
   1. include gnutlsxx.h in their application and link against
      the C library. (default)
   2. include gnutlsxx.h in their application, compile with
      GNUTLS_GNUTLSXX_NO_HEADERONLY macro defined and link
      against the C++ library.
-- libgnutls: GNUTLS_NO_STATUS_REQUEST flag and %NO_STATUS_REQUEST
   priority modifier have been added to allow disabling of the
   status_request TLS extension in the client side.
-- libgnutls: TLS heartbeat is disabled by default.
   The heartbeat extension in TLS (RFC 6520) is not widely used given
   other implementations dropped support for it. To enable back
   support for it, supply --enable-heartbeat-support to configure
   script.
-- libgnutls: SRP authentication is now disabled by default.
   It is disabled because the SRP authentication in TLS is not up to
   date with the latest TLS standards and its ciphersuites are based
   on the CBC mode and SHA-1.  To enable it back, supply
   --enable-srp-authentication option to configure script.
-- libgnutls: All code has been indented using "indent -ppi1 -linux".
   CI/CD has been adjusted to catch regressions.  This is implemented
   through devel/indent-gnutls, devel/indent-maybe and .gitlab-ci.yml’s
   commit-check.  You may run devel/indent-gnutls to fix any
   indentation issues if you make code modifications.
-- guile: Guile-bindings removed.
   They have been extracted into a separate project to reduce complexity
   and to simplify maintenance, see <https://gitlab.com/gnutls/guile/>.
-- minitasn1: Upgraded to libtasn1 version 4.19.
-- API and ABI modifications:
GNUTLS_NO_STATUS_REQUEST: New flag
GNUTLS_SRTP_AEAD_AES_128_GCM: New gnutls_srtp_profile_t enum member
GNUTLS_SRTP_AEAD_AES_256_GCM: New gnutls_srtp_profile_t enum member
Version 3.7.8 (released 2022-09-27)
-- libgnutls: In FIPS140 mode, RSA signature verification is an approved
   operation if the key has modulus with known sizes (1024, 1280,
   1536, and 1792 bits), in addition to any modulus sizes larger than
   2048 bits, according to SP800-131A rev2.
-- libgnutls: gnutls_session_channel_binding performs additional checks when
   GNUTLS_CB_TLS_EXPORTER is requested. According to RFC9622 4.2, the
   "tls-exporter" channel binding is only usable when the handshake is
   bound to a unique master secret (i.e., either TLS 1.3 or extended
   master secret extension is negotiated). Otherwise the function now
   returns error.
-- libgnutls: usage of the following functions, which are designed to
   loosen restrictions imposed by allowlisting mode of configuration,
   has been additionally restricted. Invoking them is now only allowed
   if system-wide TLS priority string has not been initialized yet:
gnutls_digest_set_secure
gnutls_sign_set_secure
gnutls_sign_set_secure_for_certs
gnutls_protocol_set_enabled
-- API and ABI modifications:
No changes since last version.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:10:57 +00:00
Adolf Belka
fc6323b894 apr: Update to version 1.7.2
- Update from version 1.7.0 to 1.7.2
- Update of rootfile
- Changelog
Changes for APR 1.7.2
  *) Correct a packaging issue in 1.7.1. The contents of the release were
     correct, but the top level directory was misnamed.
Changes for APR 1.7.1
  *) SECURITY: CVE-2022-24963 (cve.mitre.org)
     Integer Overflow or Wraparound vulnerability in apr_encode functions of
     Apache Portable Runtime (APR) allows an attacker to write beyond bounds
     of a buffer.
  *) SECURITY: CVE-2022-28331 (cve.mitre.org)
     On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond
     the end of a stack based buffer in apr_socket_sendv(). This is a result
     of integer overflow.
  *) SECURITY: CVE-2021-35940 (cve.mitre.org)
     Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
     (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
     later 1.6.x releases, but was missing in 1.7.0.)  [Stefan Sperling]
  *) configure: Fix various build issues for compilers enforcing
     strict C99 compliance.  PR 66396, 66408, 66426.
     [Florian Weimer <fweimer redhat.com>, Sam James <sam gentoo.org>]
  *) apr_atomic_read64(): Fix non-atomic read on 32-bit Windows [Ivan Zhakov]
  *) configure: Prefer posix name-based shared memory over SysV IPC.
     [Jim Jagielski]
  *) configure: Add --disable-sctp argument to forcibly disable SCTP
     support, or --enable-sctp which fails if SCTP support is not
     detected.  [Lubos Uhliarik <luhliari redhat.com>, Joe Orton]
  *) Fix handle leak in the Win32 apr_uid_current implementation.
     PR 61165. [Ivan Zhakov]
  *) Add error handling for lseek() failures in apr_file_write() and
     apr_file_writev().  [Joe Orton]
  *) Don't silently set APR_FOPEN_NOCLEANUP for apr_file_mktemp() created file
     to avoid a fd and inode leak when/if later passed to apr_file_setaside().
     [Yann Ylavic]
  *) APR's configure script uses AC_TRY_RUN to detect whether the return type
     of strerror_r is int. When cross-compiling this defaults to no.
     This commit adds an AC_CACHE_CHECK so users who cross-compile APR may
     influence the outcome with a configure variable. [Sebastian Kemper
     <sebastian_ml gmx net>]
  *) Add a cache check with which users who cross-compile APR
     can influence the outcome of the /dev/zero test by setting the variable
     ac_cv_mmap__dev_zero=yes [Sebastian Kemper <sebastian_ml gmx net>]
  *) Trick autoconf into printing the correct default prefix in the help.
     [Stefan Fritsch]
  *) Don't try to use PROC_PTHREAD by default when cross compiling.
     [Yann Ylavic]
  *) Add the ability to cross compile APR. [Graham Leggett]
  *) While cross-compiling, the tools/gen_test_char could not
     be executed at build time, use AX_PROG_CC_FOR_BUILD to
     build native tools/gen_test_char
     Support explicit libtool by variable assigning before buildcheck.sh,
     it is helpful for cross-compiling (such as libtool=aarch64-linux-libtool)
     [Hongxu Jia <hongxu.jia windriver.com>]
  *) Avoid an overflow on 32 bit platforms. [René Hjortskov Nielsen
     <r... hjortskov.dk>]
  *) Use AC_CHECK_SIZEOF, so as to support cross compiling. PR 56053.
     [Mike Frysinger <vapier gentoo.org>]
  *) Add --tag=CC to libtool invocations. PR 62640. [Michael Osipov]
  *) apr_pools: Fix pool debugging output so that creation events are
     always emitted before allocation events and subpool destruction
     events are emitted on pool clear/destroy for proper accounting.
     [Brane Čibej]
  *) apr_socket_listen: Allow larger listen backlog values on Windows 8+.
     [Evgeny Kotkov <evgeny.kotkov visualsvn.com>]
  *) Fixed: apr_get_oslevel() was returning APR_WIN_XP on Windows 10
  *) Fix attempt to free invalid memory on exit when apr_app is used
     on Windows. [Ivan Zhakov]
  *) Fix double free on exit when apr_app is used on Windows. [Ivan Zhakov]
  *) Fix a regression in apr_stat() for root path on Windows. [Ivan Zhakov]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:08:48 +00:00
Matthias Fischer
6d3e6cfc16 grub: Fix for riscv64 rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-05 15:04:52 +00:00
Matthias Fischer
e0c0e59c43 bind: Update to 9.16.38
For details  see:
https://downloads.isc.org/isc/bind9/9.16.38/doc/arm/html/notes.html#notes-for-bind-9-16-38

"Notes for BIND 9.16.38
Bug Fixes

    A constant stream of zone additions and deletions via rndc reconfig
    could cause increased memory consumption due to delayed cleaning of
    view memory. This has been fixed. [GL #3801]

    The speed of the message digest algorithms (MD5, SHA-1, SHA-2), and of
    NSEC3 hashing, has been improved. [GL #3795]

    Building BIND 9 failed when the --enable-dnsrps switch for ./configure
    was used. This has been fixed. [GL #3827]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-05 15:01:58 +00:00
Adolf Belka
ccf8c0580f elinks: Update to version 0.16.0
- Update from version 0.15.1 to 0.16.0
- Update of rootfile
- According to the forked elinks developer if parallel build is required then meson
   should be used for the build. With make they don't believe that it ever ran in
   parallel mode.
- This patch modifies the build from autotools to meson and updates the version.
- Parallel build option added back in to meson/ninja flow.
- The build requires git to be present so git moved to just before elinks in make.sh
- Changelog
ELinks 0.16.0
* detect xterm on my computer
ELinks 0.16.0rc1
* alternative mujs engine for js
* bump mozjs to 102
* experimental XHR implementation
* macros in exmode #196
* removed infinite loop, which occurred under BSD #197
* optional terminal hyperlinks in dumps #198

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 15:00:03 +00:00
Adolf Belka
504756d4f5 intel-microcode: Update to version 20230214
- Update from version 20221108 to 20230214
- Update of rootfile
- Changelog - details can be found in the releasenote.md file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:54:49 +00:00
Adolf Belka
fa4e17db8a freetype: Update to version 2.13.0
- Update from version 2.12.1 to 2.13.0
- Update of rootfile
- Changelog
CHANGES BETWEEN 2.12.1 and 2.13.0 (2023-Feb-09)
  I. IMPORTANT CHANGES
  - The demo program `ftinspect` has  been completely updated and much
    enhanced.  It now  combines the functionality of  almost all other
    graphical FreeType  demo programs into a  single application based
    on the Qt framework.  This was Charlie Jiang's GSoC 2022 project.
  - The 'COLR' v1 API is now considered as stable.
      https://learn.microsoft.com/en-us/typography/opentype/spec/colr
  III. MISCELLANEOUS
  - For  OpenType  Variable Fonts,  `avar`  table  format 2.0  is  now
    supported.  The code was contributed by Behdad Esfahbod.
    Note that this is an extension supported on recent Apple platforms
    and by HarfBuzz, but not yet in the OpenType standard!  See
      https://github.com/harfbuzz/boring-expansion-spec/blob/main/avar2.md
    for the specification.  To deactivate it, define the configuration
    macro 'TT_CONFIG_OPTION_NO_BORING_EXPANSION'.
  - A new API  `FT_GlyphSlot_Slant` to slant a glyph by  a given angle
    has been added.   Note that this function is  part of `ftsynth.h`,
    which is still considered to be in alpha stage.
  - TrueType interpreter version 38  (also known as 'Infinality') that
    was first introduced about 10 years  ago in FreeType 2.4.11 is now
    deprecated and slated to be removed in the next version.  TrueType
    interpreter version 40 has been FreeType's default version for six
    years now and provides an excellent alternative.  This is the last
    FreeType     version     with    TT_INTERPRETER_VERSION_38     and
    TT_INTERPRETER_VERSION_40 treated differently.
  - The  only  referenced  but never  documented  configuration  macro
    `FT_CONFIG_OPTION_NO_GLYPH_NAMES` has been removed.
  - The `ftbench` demo  program got a new command line  option `-e` to
    set a charmap index.
  - Specifying  a point  size is  now optional  for the  demo programs
    `ftgrid`, `ftmulti`,  `ftstring`, and  `ftview`.  If not  given, a
    default size is used.
  - For  `ftgrid`,  `ftstring`, and  `ftview`,  option  `-e` now  also
    accepts a numeric value to set a charmap index.
  - In  `ftstring`, it  is  now  possible to  set  the displayed  text
    interactively by pressing the 'Enter' key.
  - `ftmulti` can now handle up to 16 design axes.
  - To  avoid  reserved identifiers  that  are  globally defined,  the
    auto-hinter  debugging   macros  (which  are  only   available  if
    `FT_DEBUG_AUTOFIT` is defined)
    ```
    _af_debug_disable_horz_hints
    _af_debug_disable_vert_hints
    _af_debug_disable_blue_hints
    _af_debug_hints
    ```
    have been renamed to
    ```
    af_debug_disable_horz_hints_
    af_debug_disable_vert_hints_
    af_debug_disable_blue_hints_
    af_debug_hints_
    ```

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:54:13 +00:00
Matthias Fischer
72df13821d logwatch: Update to 7.8
The developers do not provide a changelog, this time I couldn't
even find a comment.

All I can say:
Running her on Core 172. No seen problems.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-05 14:53:06 +00:00
Michael Tremer
b7fdcbf6ca perl-TimeDate: Move from package into main system
This is now required by ovpnmain.cgi for certificate expiry time
detection.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:50:33 +00:00
Peter Müller
42d4b88140 rust: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:23:20 +00:00
Peter Müller
2223cafa37 linux: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:22:28 +00:00
Adolf Belka
2705a8903e ragel: Update to version 7.0.4
- Update from version 7.0.0.11 to 7.0.4
- Update of rootfile
- Changelog
updated language flags, catch abortcompile throw in non-ragel progs
7.0.3
This version of colm includes a critical fix for big-endian system. Fixes #61.
expect colm version 0.14.6 and version bump ragel to 7.0.3
7.0.2
Latest colm includes bugfixes for refcounting, which fixes a ragel issue with includes #58.
expect colm 0.14.5 and version bump to 7.0.2
7.0.1
removed accidental commit of ragel/.exrc
7.0.0.12
implemented NfaClear in asm codegen

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:15:52 +00:00
Adolf Belka
60cbad9204 colm: Update to version 0.14.7
- Update from version 0.13.0.6 to 0.14.7
- Update of rootfile
- patch from colm commit fc61ecb required to fix bug of make looking for static and
   dynamic libs even if one of them was disabled
- Changelog is not available in source tarball or on website etc. Changes have to be
   reviewed by the commits https://github.com/adrian-thurston/colm/commits/0.14.7

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-05 14:15:52 +00:00
Peter Müller
d51c4e566b linux: Update x86_64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 14:14:31 +00:00
Adolf Belka
cabd9441e8 tzdata: Update to version 2022g
- Update from version 2022e to 2022g
- Update of rootfile
- Changelog is too large to include here. See the NEWS file in the source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-04 14:07:22 +00:00
Arne Fitzenreiter
1b6047b3ee riscv64: enable EFI support and tools for riscv64
grub is still buggy! grub-install fails with an error:
Relocation 0x13 is not implented!

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-03-04 14:01:43 +00:00
Adolf Belka
e2bdd79782 initscripts: Remove rngd from the core package initscripts
- rngd removed from initscripts lfs and rootfiles due to change of rng-tools to addon

Fixes: Bug#12900
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-04 13:55:33 +00:00
Adolf Belka
f4b849cb3f rng-tools: Move from core package to addon - fixes bug 12900
- This patch is to move the rng-tools package from a core package to an addon. With the
   kernel changes from 5.6 rngd is no longer needed to create the required kernel entropy.
- The results from HRNG's via rngd are used with an XOR after the entropy is
   collected by the kernel. So the HWRNG output is used to dilute the kernel random number
   data, which is already merged from several sources.
- Based on the above and @Paul's request in the bug report to have rng-tools kept as an
   addon this patch set is submitted for consideration to keep rng-tools but as an addon.
- move rng-tools rootfile from common to packages
- Modify rng-tools lfs from core package to addon package
- Create rng-tools pak to install and uninstall - creating rc.d links for start & stop.
- Move rngd initscript from system to packages directory.
- Installed into my vm testbed and confirmed that it works. No rngd daemon installed
   from iso install. After addon install rngd is present and running. Added various files
   to be able to test the services wui page. rngd shows up and can be turned off and on

Fixes: Bug#12900
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-04 13:55:31 +00:00
Matthias Fischer
4b8fef1371 rust: Update to 1.67.0
For details see:
https://github.com/rust-lang/rust/blob/stable/RELEASES.md#version-1670-2023-01-26

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-03-04 13:54:40 +00:00
Arne Fitzenreiter
216def69c1 rootfile: add more riscv64 rootfiles
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:44 +00:00
Arne Fitzenreiter
f5ee536b72 rootfile: add many rootfiles for riscv64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:39 +00:00
Arne Fitzenreiter
54364fac8c kernel: update riscv64 config and rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:36 +00:00
Arne Fitzenreiter
b2af45b218 gcc: build libatomic before zstd of riscv64
of riscv64 zstd need this lib to compile.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-21 10:15:33 +00:00
Arne Fitzenreiter
8e28bbc067 xradio: remove driver and firmware
this module was build only for arm 32bit arch.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-13 09:41:05 +00:00
Michael Tremer
a6c331a8d6 glibc: Update to 2.37
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-10 09:40:05 +00:00
Michael Tremer
444a0f893f boost: Update to 1.81.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-10 09:28:01 +00:00
Michael Tremer
32bbae10a0 gcc: Update to 12.2.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-10 09:27:56 +00:00
Michael Tremer
63addba3d2 binutils: Update to 2.40
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-10 09:27:45 +00:00
Michael Tremer
39f94ee8eb Drop support for armv6l (and armv7hl)
This removes support for building IPFire for 32 bit ARM architectures.

This has been decided in August 2022 with six months notice as there are
not very many users and hardware is generally not available any more.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-10 09:26:37 +00:00
Peter Müller
1c3b87d412 linux: Fix 32-bit ARM rootfile again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-02-07 22:41:21 +00:00
Michael Tremer
ec83fe38a3 Rootfile update for ARM
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-02-07 11:30:08 +00:00
Adolf Belka
024220e4df libtirpc: Convert from an addon to a core program - fixes Bug 13015
- libtirpc is required for lsof to work from CU172 onwards. rpc.h is no longer available
   from glibc. This would normally cause the lsof build to fail but libtirpc as an addon
   is built before lsof and so is present in the build and lsof is linked to it.
   When running lsof it fails as the linked libtirpc library is not present unless it has
   been installed as an addon.
- This patch converts the libtirpc lfs from an addon to a core program and moves the
   rootfile from the packages directory to the common directory.
- Tested out on my vm testbed. With CU172 lsof fails to run due to the missing libtirpc
   With the build based on this patch installed lsof works normally again.
- Disabled the static library build in the configure options and updated the rootfile

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Fixes: Bug#13015
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-02-03 16:02:12 +00:00
Matthias Fischer
c29109f859 grub 2.06: Fix for rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-30 17:00:23 +00:00
Matthias Fischer
36397fdc96 pango 1.50.6: Fix for rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-30 17:00:05 +00:00
Peter Müller
57372934d4 Revert "ragel: Update to version 7.0.4"
This reverts commit fcc21cadf3.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-27 00:12:47 +00:00
Peter Müller
d95e4d0dd5 Revert "colm: Update to version 0.14.7"
This reverts commit 59408f2cbf.

https://lists.ipfire.org/pipermail/development/2023-January/015316.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-27 00:09:21 +00:00
Adolf Belka
d295a5a363 pixman: Update to version 0.42.2
- Update from version 0.40.0 to 0.42.2
- Update of rootfile
- Build converted to meson
- Changelog is empty in the source tarball as is the NEWS file. There is no change log
   info on the webpage. The only source of change info are the commits from the git repo
   https://cgit.freedesktop.org/pixman/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 23:19:16 +00:00
Adolf Belka
e44d567877 cairo: Update to version 1.17.6
- Update from version 1.16.0 to 1.17.6
- Update of rootfile
- Next version will only build with meson and as there were some bugs with the autoconf
   tools build which required a hack to overcome, this version was changed to run with
   meson. beos and os2 backends are no longer supported and windows only builds if the
   platform being used for the build is windows based. Therefore those options are no
   longer needed. meson uses shared libraries only by default.
- The cairo-1.16.0-binutils-2.34 patch is no longer needed as the changes have been
   included in the source tarball.
- tarball had to be changed to .bz2 as xz is no longer provided.
- Changelog
Release 1.17.6 (2022-03-18 Emmanuele Bassi <ebassi@gnome.org>)
	I spy with my little eye… a Cairo snapshot!
	First of all, many, many thanks to everyone who contributed to Cairo
	during this development cycle. A special thank you goes to:
		- Adrian Johnson
		- Uli Schlachter
		for their tireless efforts in ensuring that the lights are still on
		in the Cairo project.
	This snapshot sees the removal of the following backends and platform
	support:
		- Qt4
		- BeOS
		- OS/2
		- DirectFB
		- DRM
		- Cogl
		- OpenVG
	Thanks to all past contributors for their work on them. If you were using
	any of these backends then you will need to stick to Cairo 1.16.
	To offset the removal of the backends above, Adrian Johnson landed the
	DWrite font rendering backend on Windows.
	There have been multiple improvements in the Quartz backend, courtesy of
	John Ralls.
	Tim-Philipp Müller has kept the Meson build in top shape.
	This snapshot is going to be the **last** release of Cairo with the
	Autotools build system. The Meson build has seen many improvements and
	it is considerably easier to maintain and faster to build.
Release 1.17.4 (2020-11-27 Bryce Harrington <bryce@bryceharrington.org>)
	Thank you to the many people who have contributed the large number of
	bug fixes and refinements since 1.17.2.
	A particularly noteworthy improvement in this release is the addition of
	the meson build system as an alternative to autotools.  Autotools is
	still used for producing the releases, so will be the default in the
	tarball and presumably will still be preferred by distro packagers of
	Cairo.  It should be possible to build the release tarball using meson,
	but as this is new functionality consider it still a work in progress.
	The meson configuration has striven to track the autotools
	implementation but be aware there may still be some differences between
	the two.
	Continuous Integration configurations have been added that enable
	testing on a variety of platforms including Fedora, Windows MSVC, etc.
	This work has helped in identifying updates and fixes including
	adjusting to changes in API calls in dependencies like rsvg and
	fontconfig, and to fix platform-specific build issues.
	The cogl Cairo backend underwent significant development this cycle.
	Cogl provides GPU accelerated drawing support.  The development work
	includes implementation of core functionality, performance
	optimizations, and stabilization.
	Subpixel positioning support allows improved glyph outlines with the
	Freetype font backend.
	For a complete log of changes, please see
	    https://cairographics.org/releases/ChangeLog.1.17.4
	[On a personal note, this will be my last release for Cairo.  My Cairo
	time availability has been non-existent (particularly this crazy past
	year).  The release process is well documented and hopefully will help
	whomever picks up the baton from here.]
Release 1.17.2 (2019-01-31 Bryce Harrington <bryce@bryceharrington.org>)
	This snapshot provides the new support for writing floating point
	formats as 16 bpc PNGs, with support for RGBA128F and RGB96F formats.
	This new feature increases Cairo's pixman version requirement to 0.36.0.
	Beyond this are a range of bugfixes and some work on establishing CI for
	Cairo.
	For a complete log of changes, please see
	    https://cairographics.org/releases/ChangeLog.1.17.2
	API Changes
		None
	Dependency Changes
		pixman 0.36.0

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 23:19:05 +00:00
Adolf Belka
804e7a2b77 xz: Update to version 5.4.1
- Update from version 5.4.0 to 5.4.1
- Update of rootfile
- Changelog
5.4.1 (2023-01-11)
    * liblzma:
        - Fixed the return value of lzma_microlzma_encoder() if the
          LZMA options lc/lp/pb are invalid. Invalid lc/lp/pb options
          made the function return LZMA_STREAM_END without encoding
          anything instead of returning LZMA_OPTIONS_ERROR.
        - Windows / Visual Studio: Workaround a possible compiler bug
          when targeting 32-bit x86 and compiling the CLMUL version of
          the CRC64 code. The CLMUL code isn't enabled by the Windows
          project files but it is in the CMake-based builds.
    * Build systems:
        - Windows-specific CMake changes:
            * Don't try to enable CLMUL CRC64 code if _mm_set_epi64x()
              isn't available. This fixes CMake-based build with Visual
              Studio 2013.
            * Created a workaround for a build failure with windres
              from GNU binutils. It is used only when the C compiler
              is GCC (not Clang). The workaround is incompatible
              with llvm-windres, resulting in "XZx20Utils" instead
              of "XZ Utils" in the resource file, but without the
              workaround llvm-windres works correctly. See the
              comment in CMakeLists.txt for details.
            * Included the resource files in the xz and xzdec build
              rules. Building the command line tools is still
              experimental but possible with MinGW-w64.
        - Visual Studio: Added stream_decoder_mt.c to the project
          files. Now the threaded decompressor lzma_stream_decoder_mt()
          gets built. CMake-based build wasn't affected.
        - Updated windows/INSTALL-MSVC.txt to mention that CMake-based
          build is now the preferred method with Visual Studio. The
          project files will probably be removed after 5.4.x releases.
        - Changes to #defines in config.h:
            * HAVE_DECL_CLOCK_MONOTONIC was replaced by
              HAVE_CLOCK_MONOTONIC. The old macro was always defined
              in configure-generated config.h to either 0 or 1. The
              new macro is defined (to 1) only if the declaration of
              CLOCK_MONOTONIC is available. This matches the way most
              other config.h macros work and makes things simpler with
              other build systems.
            * HAVE_DECL_PROGRAM_INVOCATION_NAME was replaced by
              HAVE_PROGRAM_INVOCATION_NAME for the same reason.
    * Tests:
        - Fixed test script compatibility with ancient /bin/sh
          versions. Now the five test_compress_* tests should
          no longer fail on Solaris 10.
        - Added and refactored a few tests.
    * Translations:
        - Updated the Catalan and Esperanto translations.
        - Added Korean and Ukrainian man page translations.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 23:18:47 +00:00
Adolf Belka
a72263c6c5 lz4: Update to version 1.9.4
- Update from version 1.9.3 to 1.9.4
- Update of rootfile
- Changelog
v1.9.4
perf : faster decoding speed (~+20%) on aarch64 platforms
perf : faster decoding speed (~+70%) for -BD4 setting in CLI
api  : new function `LZ4_decompress_safe_partial_usingDict()` by @yawqi
api  : lz4frame: ability to provide custom allocators at state creation
api  : can skip checksum validation for improved decoding speed
api  : new experimental unit `lz4file` for file i/o API, by @anjiahao1
api  : new experimental function `LZ4F_uncompressedUpdate()`, by @alexmohr
cli  : `--list` works on `stdin` input, by @Low-power
cli  : `--no-crc` does not produce (compression) nor check (decompression) checksums
cli  : fix: `--test` and `--list` produce an error code when parsing invalid input
cli  : fix: support skippable frames when passed via `stdin`, reported by @davidmankin
build: fix: Makefile respects CFLAGS directives passed via environment variable
build: `LZ4_FREESTANDING`, new build macro for freestanding environments, by @t-mat
build: `make` and `make test` are compatible with `-j` parallel run
build: AS/400 compatibility, by @jonrumsey
build: Solaris 10 compatibility, by @pekdon
build: MSVC 2022 support, by @t-mat
build: improved meson script, by @eli-schwartz
doc  : Updated LZ4 block format, provide an "implementation notes" section

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 23:17:50 +00:00
Matthias Fischer
249819695d bind: Update to 9.16.37
For details for 9.16.36 and 9.16.37 see:
https://downloads.isc.org/isc/bind9/9.16.37/doc/arm/html/notes.html#notes-for-bind-9-16-37

"Notes for BIND 9.16.37
Security Fixes

    An UPDATE message flood could cause named to exhaust all available
    memory. This flaw was addressed by adding a new update-quota option
    that controls the maximum number of outstanding DNS UPDATE messages
    that named can hold in a queue at any given time (default: 100).
    (CVE-2022-3094)

    ISC would like to thank Rob Schulhof from Infoblox for bringing this
    vulnerability to our attention. [GL #3523]

    named could crash with an assertion failure when an RRSIG query was
    received and stale-answer-client-timeout was set to a non-zero value.
    This has been fixed. (CVE-2022-3736)

    ISC would like to thank Borja Marcos from Sarenet (with assistance by
    Iratxe Niño from Fundación Sarenet) for bringing this vulnerability to
    our attention. [GL #3622]

    named running as a resolver with the stale-answer-client-timeout option
    set to any value greater than 0 could crash with an assertion failure,
    when the recursive-clients soft quota was reached. This has been fixed.
    (CVE-2022-3924)

    ISC would like to thank Maksym Odinintsev from AWS for bringing this
    vulnerability to our attention. [GL #3619]

New Features

    The new update-quota option can be used to control the number of
    simultaneous DNS UPDATE messages that can be processed to update an
    authoritative zone on a primary server, or forwarded to the primary
    server by a secondary server. The default is 100. A new statistics
    counter has also been added to record events when this quota is
    exceeded, and the version numbers for the XML and JSON statistics
    schemas have been updated. [GL #3523]

Feature Changes

    The Differentiated Services Code Point (DSCP) feature in BIND has been
    deprecated. Configuring DSCP values in named.conf now causes a warning
    to be logged. Note that this feature has only been partly operational
    since the new Network Manager was introduced in BIND 9.16.0. [GL #3773]

    The catalog zone implementation has been optimized to work with
    hundreds of thousands of member zones. [GL #3744]

Bug Fixes

    In certain query resolution scenarios (e.g. when following CNAME
    records), named configured to answer from stale cache could return a
    SERVFAIL response despite a usable, non-stale answer being present in
    the cache. This has been fixed. [GL #3678]

...

Notes for BIND 9.16.36
Feature Changes

    The auto-dnssec option has been deprecated and will be removed in a
    future BIND 9.19.x release. Please migrate to dnssec-policy. [GL #3667]

Bug Fixes

    When a catalog zone was removed from the configuration, in some cases a
    dangling pointer could cause the named process to crash. This has been
    fixed. [GL #3683]

    When a zone was deleted from a server, a key management object related
    to that zone was inadvertently kept in memory and only released upon
    shutdown. This could lead to constantly increasing memory use on
    servers with a high rate of changes affecting the set of zones being
    served. This has been fixed. [GL #3727]

    In certain cases, named waited for the resolution of outstanding
    recursive queries to finish before shutting down. This was unintended
    and has been fixed. [GL #3183]

    The zone <name>/<class>: final reference detached log message was moved
    from the INFO log level to the DEBUG(1) log level to prevent the
    named-checkzone tool from superfluously logging this message in
    non-debug mode. [GL #3707]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-01-26 23:14:56 +00:00
Adolf Belka
37f48533d7 help2man: Install new package required for updated libtool
- package only needed for build of libtool so rootfile is all commented out.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 23:11:22 +00:00
Adolf Belka
31c0c32779 libtool: Update to version 2.4.7
- Update from version 2.4.6 (Feb 2015) to 2.4.7 (Mar 2022)
- Update of rootfile
- The shebang in the libtoolize script has changed from ! /bin/sh to ! /usr/bin/env sh
   because apparently the previous version presented challenges for containerised
   environments. For IPFire build it meant that using libtoolize in the build of libxcrypt
   failed because it could not deal with the changed shebang.
- Patch created to change the shebang for libtoolize.in back to the version in 2.4.6 and
   earlier.
- The change of libtoolize.in then caused the libtool build to try and rebuild the man
   page for it but this fails as help2man is required for this. There is no option in the
   configure to not build the docs so hence there is an associated patch with this one
   that build help2man but the rootfile is completely commented out as it is only
   required for the build
- Added --disable-static to the configure options
- Changelog
    Noteworthy changes in release 2.4.7 (2022-03-16) [stable]
	New features:
	  - Libtool script now supports (configure-time and runtime) ARFLAGS
	    variable, which obsoletes AR_FLAGS.  This is due to naming conventions
	    among other *FLAGS and to be consistent with Automake's ARFLAGS.
	  - Gnulib testsuite is enabled and run during 'make check'.
	  - Support the Windows version of the Intel C Compiler (icl) in
	    libtool script.
	  - Pass '-fsanitize=*' flags for GCC and LLVM, and '-specs=*' for GCC
	    to linker.
	  - Pass '-Xassembler=*' and '-Wa,*' flag to compilers and linkers.
	  - The variable 'FILECMD' with default value of '/usr/bin/file' was used to
	    replace existing hard coded references to '/usr/bin/file'.
	  - Add MidnightBSD support.
	Important incompatible changes:
	  - Libtool changed ARFLAGS/AR_FLAGS default from 'cru' to 'cr'.
	  - Do not pass '-pthread' to Solaris linker.
	  - 'libtool' and 'libtoolize' scripts now use '#! /usr/bin/env sh' shebang.
	    Previously '#! /bin/sh' was used, which presents challenges for
	    containerized environments.
	Bug fixes:
	  - Fix significant slowdown of libtoolize for certain projects (regression
	    introduced in 2.4.3 release) caused by infinite m4 macro recursion.
	  - Mitigate the slowdown of libtool script (introduced in v2.4.3) caused by
	    increased number of calls to '$SED $sed_quote_subst' (bug#20006).
	  - Properly parse and export TLS symbols on AIX.
	  - Various bug fixes surrounding use of 'sed'.
	  - Darwin systems set proper "allow undefined" flag on OSX 11, and
	    PowerPC 10.5.
	  - Removed some deprecated tests related to 'Makefile.inc' files.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 23:11:22 +00:00
Matthias Fischer
68e2844141 rust: Update to 1.65
For details see:
https://github.com/rust-lang/rust/blob/stable/RELEASES.md#version-1650-2022-11-03

I started updating rust to 1.65 mainly because 'clamav 0.105.1-3' and the
shortly thereafter released version 'clamav 1.0.0' need at least 'rust 1.56':
"Building ClamAV requires, at a minimum, Rust compiler version 1.56, as it
relies on features introduced in the Rust 2021 Edition."

At this point we were still on 'nightly 2022-01-27'. Ok then...

But it was a bit more tricky than I thought, because this update wouldn't build without
patching most of the existing rust-crate-lfs files in a way I didn't expect.
Please note the patch series following this update...

Nevertheless, the update to 1.65 and ALL testbuilds completed without any errors.

Unfortunately, I can only provide the rootfile for x86_64 - I don't have the appropriate hardware
for anything else.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-01-26 23:02:46 +00:00
Adolf Belka
fcc21cadf3 ragel: Update to version 7.0.4
- Update from version 7.0.0.11 to 7.0.4
- Update of rootfile
- Changelog
updated language flags, catch abortcompile throw in non-ragel progs
7.0.3
This version of colm includes a critical fix for big-endian system. Fixes #61.
expect colm version 0.14.6 and version bump ragel to 7.0.3
7.0.2
Latest colm includes bugfixes for refcounting, which fixes a ragel issue with includes #58.
expect colm 0.14.5 and version bump to 7.0.2
7.0.1
removed accidental commit of ragel/.exrc
7.0.0.12
implemented NfaClear in asm codegen

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 22:47:11 +00:00
Adolf Belka
59408f2cbf colm: Update to version 0.14.7
- Update from version 0.13.0.6 to 0.14.7
- Update of rootfile
- patch from colm commit fc61ecb required to fix bug of make looking for static and
   dynamic libs even if one of them was disabled
- Changelog is not available in source tarball or on website etc. Changes have to be
   reviewed by the commits https://github.com/adrian-thurston/colm/commits/0.14.7

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 22:46:19 +00:00
Adolf Belka
c4597ec47e fontconfig: Update to version 2.14.1
- Update from version 2.13.1 (2018) to 2.14.1 (Oct 2022) - 8 versions
- Update of rootfile
- Changelog is the gitlab repository commits
   https://gitlab.freedesktop.org/fontconfig/fontconfig/-/commits/main/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-26 22:43:43 +00:00
Matthias Fischer
ca92e035a7 apache: Update to 2.4.55
Again: huge changelog, for details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.55

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-23 15:21:08 +00:00
Adolf Belka
cdb528e22f fuse: Update to version 3.13.0
- Update from version 3.11.0 to 3.13.0
- Update of rootfile
- Changelog
libfuse 3.13.0 (2023-01-13)
- There is a new low-level API function `fuse_session_custom_io` that allows to implement
  a daemon with a custom io. This can be used to create a daemon that can process incoming
  FUSE requests to other destinations than `/dev/fuse`.
- A segfault when loading custom FUSE modules has been fixed.
- There is a new `fuse_notify_expire_entry` function.
- A deadlock when resolving paths in the high-level API has been fixed.
- libfuse can now be build explicitly for C libraries without symbol versioning support.
libfuse 3.12.0 (2022-09-08)
- There is a new build parameter to specify where the SysV init script should be
  installed.
- The *max_idle_threads* parameter has been deprecated in favor of the new max_threads*
  parameter (which avoids the excessive overhead of creating and destructing threads).
  Using max_threads == 1 and calling fuse_session_loop_mt() will run single threaded
  similar to fuse_session_loop().
The following changes apply when using the most recent API (-DFUSE_USE_VERSION=312,
see `example/passthrough_hp.cc` for an example for how to usse the new API):
- `struct fuse_loop_config` is now private and has to be constructed using
  - fuse_loop_cfg_create()* and detroyed with *fuse_loop_cfg_destroy()*.  Parameters can be
- changed using `fuse_loop_cfg_set_*()` functions.
  - fuse_session_loop_mt()* now accepts `struct fuse_loop_config *` as NULL pointer.
  - fuse_parse_cmdline()* now accepts a *max_threads* option.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-23 15:20:05 +00:00