Commit Graph

21950 Commits

Author SHA1 Message Date
Michael Tremer
d630cfec5b make.sh: Remove the fragile cleanup code
Since we now mount everything in a new namespace, there is no need to
clean up ourselves. This will be done when the last process leaves the
namespace.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-22 15:21:16 +00:00
Michael Tremer
6dcd193170 make.sh: Launch build and shell commands in a new mount namespace
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-22 15:21:16 +00:00
Michael Tremer
3517868827 make.sh: Remove superfluous image check
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-22 15:21:16 +00:00
Arne Fitzenreiter
6f83ae4c95 core187: exclude squid access.log from update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-07-18 09:12:15 +02:00
Arne Fitzenreiter
97067db786 Revert "squid: Comment out access.log in rootfile"
the file was created to be shipped with permissions
so it is needed in the rootfile.

This reverts commit 516d541c29.
2024-07-18 09:07:08 +02:00
Michael Tremer
5b58a16967 make.sh: Update contributors
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-10 14:29:36 +00:00
Michael Tremer
0fee0acf86 make.sh: Run "make.sh lang"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-10 14:29:21 +00:00
Michael Tremer
bf8abf549e samba: Fix rootfiles
The CGI script, the misc-progs helper and the menu entry were removed.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-10 14:28:48 +00:00
Adolf Belka
516d541c29 squid: Comment out access.log in rootfile
- Everytime an update has been done on squid the access.log file has been replaced with an
   empty file, losing whatever messages have been in the log.
- This has been the case since squid was implemented in IPFire.
- Update of rootfile to comment out var/log/squid/access.log

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-08 15:32:58 +00:00
Matthias Fischer
a96514a265 apache: Update to 2.4.61
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.61

"Changes with Apache 2.4.61

  *) SECURITY: CVE-2024-39884: Apache HTTP Server: source code
     disclosure with handlers configured via AddType (cve.mitre.org)
     A regression in the core of Apache HTTP Server 2.4.60 ignores
     some use of the legacy content-type based configuration of
     handlers.   "AddType" and similar configuration, under some
     circumstances where files are requested indirectly, result in
     source code disclosure of local content. For example, PHP
     scripts may be served instead of interpreted.
     Users are recommended to upgrade to version 2.4.61, which fixes
     this issue."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-08 15:31:17 +00:00
Adolf Belka
b5befbc045 samba: Update to version 4.20.2
- Update from version 4.20.1 to 4.20.2
- Update of rootfile for both x86_64 and aarch64
- After doing a grep into the config directories I realised that the xxxMACHINExxx phrase
   is only added into rootfiles in the main common or package directories and not in the
   x86_64 and aarch64
- In the past I have submitted the samba rootfile with x86_64 replaced by xxxMACHINExxx.
   It seems to have worked, so the replacement probably occurs even in the architecture
   specific directories but it doesn't need to be used there as the directory is clearly
   only for that one architecture.
- Changelog
    4.20.2
	   * BUG 15662: vfs_widelinks with DFS shares breaks case insensitivity.
	   * BUG 13213: Samba build is not reproducible.
	   * BUG 15569: ldb qsort might r/w out of bounds with an intransitive compare
	     function.
	   * BUG 15625: Many qsort() comparison functions are non-transitive, which can
	     lead to out-of-bounds access in some circumstances.
	   * BUG 15638: Need to change gitlab-ci.yml tags in all branches to avoid CI
	     bill.
	   * BUG 15654: We have added new options --vendor-name and --vendor-patch-
	     revision arguments to ./configure to allow distributions and packagers to
	     put their name in the Samba version string so that when debugging Samba the
	     source of the binary is obvious.
	   * BUG 15665: CTDB RADOS mutex helper misses namespace support.
	   * BUG 13019: Dynamic DNS updates with the internal DNS are not working.
	   * BUG 14981: netr_LogonSamLogonEx returns NR_STATUS_ACCESS_DENIED with
	     SysvolReady=0.
	   * BUG 15412: Anonymous smb3 signing/encryption should be allowed (similar to
	     Windows Server 2022).
	   * BUG 15573: Panic in dreplsrv_op_pull_source_apply_changes_trigger.
	   * BUG 15620: s4:nbt_server: does not provide unexpected handling, so winbindd
	     can't use nmb requests instead cldap.
	   * BUG 15642: winbindd, net ads join and other things don't work on an ipv6
	     only host.
	   * BUG 15659: Segmentation fault when deleting files in vfs_recycle.
	   * BUG 15664: Panic in vfs_offload_token_db_fetch_fsp().
	   * BUG 15666: "client use kerberos" and --use-kerberos is ignored for the
	     machine account.
	   * BUG 15435: Regression DFS not working with widelinks = true.
	   * BUG 15633: samba-gpupdate - Invalid NtVer in netlogon_samlogon_response.
	   * BUG 15653: idmap_ad creates an incorrect local krb5.conf in case of trusted
	     domain lookups.
	   * BUG 15660: The images don't build after the git security release and CentOS
	     8 Stream is EOL.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-08 15:31:13 +00:00
Michael Tremer
1e2401a148 ruby: Add rootfile for all architectures
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-04 16:13:42 +00:00
Michael Tremer
86c80346f1 riscv64: Update util-linux rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-04 16:11:56 +00:00
Michael Tremer
3085c95994 vectorscan: Build as a fat library
The build system defaults to building the library for the host system
and therefore uses instructions that might not be available on the
target system.

This patch changes that we will build the library so that it will choose
the most optimised functions at runtime.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-04 15:39:10 +00:00
Michael Tremer
5b30e88dba core187: Ship the OpenVPN CRL updater
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-04 14:47:07 +00:00
Peter Müller
f1637cdee7 Core Update 187: Rewrite the SSH configuration on update
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-04 14:45:09 +00:00
Michael Tremer
16c1c5c6f8 core187: Ship and restart the firewall
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:32:37 +00:00
Michael Tremer
695c572993 sysctl: Conntrack: Disable picking up loose TCP connections
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:30:28 +00:00
Michael Tremer
175ba983f4 firewall: Implement generating SYNPROXY rules
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:30:28 +00:00
Michael Tremer
ad03130f24 firewall.cgi: Add a checkbox to enable SYN flood protection
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:30:28 +00:00
Michael Tremer
8711955b38 firewall: Enable SYNPROXY for untracked packets
This enables some DoS protection using SYNPROXY which will complete a
SYN handshake with the client before the connection is being forwarded.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:30:28 +00:00
Michael Tremer
be2774c0c6 firewall: Don't filter output INVALID packets
This should never cause any problems, but will cause that certain more
complicated featured like SYNPROXY won't work.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:30:28 +00:00
Michael Tremer
6342bb596b firewall: Split CONNTRACK chain
This is preparation to handle incoming/outgoing packets differently.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:30:28 +00:00
Michael Tremer
513cb428d7 core187: Ship and restart Apache
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:27:00 +00:00
Matthias Fischer
2c23602bc4 apache: Update to 2.4.60
Fixed:
CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474,
CVE-2024-38473, CVE-2024-38472, CVE-2024-36387.

For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.60

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:26:17 +00:00
Michael Tremer
e5d8276638 OpenSSH: Ship the entire suite of helper programs
The SSH daemon has been split into a listener and session daemon to have
a smaller attack vector since the listener does not need to implement
the SSH protocol.

In order to keep SSH working, we need to ship the session daemon, too.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:25:09 +00:00
Michael Tremer
dec2fb4710 core187: Ship and restart OpenSSH
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:24:43 +00:00
Adolf Belka
0a574ab660 openssh: Update to version 9.8p1
- Update from version 9.7p1 to 9.8p1
- Update of rootfile
- Changelog
    9.8p1
	-There is a fix for CVE-2024-6387
	-The number of changes is too large to show all here. As well as the CVE fix and
	 another security related fix there are a log of bug fixes as well. The details can
         seen at https://www.openssh.com/txt/release-9.8

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:19:48 +00:00
Michael Tremer
c47863aca3 core187: Restart Suricata during the update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:19:33 +00:00
Matthias Fischer
4d87fba16c suricata: Update to 7.0.6
Excerpt from changelog:
"7.0.6 -- 2024-06-26

Security #7042: defrag: id reuse can lead to invalid reassembly (7.0.x backport)(CVE 2024-37151)
Security #7105: http2: oom from duplicate headers (7.0.x backport)
Security #7033: http/range: segv when http.memcap is reached (7.0.x backport)
Security #6988: modbus: txs without responses are never freed (7.0.x backport)
Bug #7107: packet: app-layer-events incorrectly used on recycled packets (7.0.x backport)
Bug #7064: util/radix-tree: Possible dereference of nullptr in case of unsuccess allocation of memory for node (7.0.x backport)
Bug #7063: smtp/mime: data command rejected by pipelining server does not reset data mode (7.0.x backport)
Bug #7060: smtp: split name logged as 2 names (7.0.x backport)
Bug #7050: af-packet: failure to start up on many threads plus high load (7.0.x backport)
Bug #7043: Crasher in HTTP chunked / StreamingBuffer (7.0.x backport)
Bug #7038: pcap/log: MacOS rotates file well before limit is reached (7.0.x backport)
Bug #7035: time: in offline mode, time can stay behind at pcap start (7.0.x backport)
Bug #7023: unix-socket: iface-bypassed-stat crash (7.0.x backport)
Bug #7021: unix-socket: hostbit commands don't properly release host (7.0.x backport)
Bug #7015: rust: build with rust 1.78 with slice::from_raw_parts now requiring the pointer to be non-null (7.0.x backport)
Bug #6990: tls.random buffers don't work as expected (7.0.x backport)
Bug #6986: iprep: rule with '=,0' can't match (7.0.x backport)
Bug #6975: detect: log relevant frames app-layer metdata (7.0.x backport)
Bug #6950: decode/ppp: decoder.event.ppp.wrong_type on valid packet (7.0.x backport)
Bug #6897: detect/port: upper boundary ports are not correctly handled (7.0.x backport)
Bug #6895: detect/port: port grouping does not happen correctly if gap between a single and range port (7.0.x backport)
Bug #6862: Lightweight rules profiling: crash when profiling ends (7.0.x backport)
Bug #6848: alerts: wrongly using tx id 0 when there is no tx (7.0.x backport)
Bug #6845: coverity: warning in port grouping code (7.0.x backport)
Bug #6844: detect/port: port ranges are incorrect when a port is single as well as a part of range (7.0.x backport)
Bug #6690: Ethernet src should match src ip (7.0.x backport)
Bug #6520: detect-engine/port: recursive DetectPortInsert calls are expensive (7.0.x backport)
Optimization #6830: detect/port: port grouping is quite slow in worst cases (7.0.x backport)
Optimization #6829: detect/port: PortGroupWhitelist fn takes a lot of processing time (7.0.x backport)
Feature #7010: JA4 support for TLS and QUIC (7.0.x backport)
Feature #6557: Capability to have rules profiling on pcap run (7.0.x backport)
Documentation #6910: userguide: document how to verify tar.gz signature (7.0.x backport)
Documentation #6687: docs: port userguide build instruction changes from master-6.0.x (7.0.x backport)
Documentation #6601: docs: update eBPF installation instructions (7.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:18:57 +00:00
Matthias Fischer
7dbff1f446 nano: Update to 8.0
For details see:
https://www.nano-editor.org/news.php

"2024 May 1 - GNU nano 8.0 "Grus grus"

    By default ^F is bound to starting a forward search, and ^B to
    starting a backward search, while M-F and M-B repeat the search
    in the corresponding direction. (See the documentation if you
    want the old bindings back.)
    Command-line option --modernbindings (-/) makes ^Q quit, ^X cut,
    ^C copy, ^V paste, ^Z undo, ^Y redo, ^O open a file, ^W write a file,
    ^R replace, ^G find again, ^D find again backwards, ^A set the mark,
    ^T jump to a line, ^P show the position, and ^E execute.
    Above modern bindings are activated also when the name of
    nano's executable (or a symlink to it) starts with the letter "e".
    To open a file at a certain line number, one can now use also
    nano filename:number, besides nano +number filename.
    <Alt+Home> and <Alt+End> put the cursor on the first and last
    row in the viewport, while retaining the horizontal position.
    When the three digits in an #RGB color code are all the same,
    the code is mapped to the xterm grey scale, giving access to
    fourteen levels of grey instead of just four.
    For easier access, M-" is bound to placing/removing an anchor,
    and M-' to jumping to the next anchor.
    Whenever an error occurs, the keystroke buffer is cleared, thus
    stopping the execution of a macro or a string bind.
    The mousewheel scrolls the viewport instead of moving the cursor."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:18:51 +00:00
Michael Tremer
28d7a144fd core187: Ship BIND
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:18:37 +00:00
Matthias Fischer
6c269a854b bind: Update to 9.16.50
For details see:
https://downloads.isc.org/isc/bind9/9.16.50/doc/arm/html/notes.html#notes-for-bind-9-16-50

"New Features

Added RESOLVER.ARPA to the built in empty zones."

Important:
"This is the last maintenance release of BIND 9.16. This version is now end of life. Please upgrade to
BIND 9.18, the current stable version."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:18:29 +00:00
Michael Tremer
ea8deba74c core187: Ship ipblocklist-sources
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:18:06 +00:00
Adolf Belka
e9e78d2aff ipblocklist-sources: Update to include the Abuse.ch Botnet C2 ip blocklist
- Blocklist addition was discussed and agreed at IPFire dev conf call in June 2024.
- Tested on vm system.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:36 +00:00
Adolf Belka
0346e4fd9d ipblocklist-sources: Update to include the 3CORESec ip blocklists
- The patch for this was created by Stefan Schantl
- Blocklist addition was discussed and agreed at IPFire dev conf call in June 2024.
- Tested on vm system.
- The combined list was removed because it is just the three others which can be selected
   in the WUI to give the equivalent result.

Created-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:35 +00:00
Adolf Belka
5175a5f19e apcupsd: Update email scripts to work with dma
- The standard email scripts supllied with apcupsd are coded on the basis that sendmail
   is being used. The format of the email information in those scripts does not work with
   the dma mail system implemented in IPFire.
- The scripts provided in the config/apcupsd directory have been updated to work with
   dma. The scripts have been confirmed to work with my production system that is using
   a UPS.
- This patch will replace the standard apcupsd scripts with the ones tailored for IPFire.
- If any existing users have modified their scripts to already work with dma then their
   versions will be saved in their backup.
- The apcupsd-3.14.14-2.ipfire package created in the build with the above changes has
   been installed on a vm system and confirmed to provide the IPFire tailored scripts.
- The lfs change is the addition of the copying of the scripts to the /etc/apcupsd
   directory.
- No change to the rootfile as the scripts names are the same.
- The only thing a user will need to do is to ensure the IPFire email system is enabled,
   configure and confirmed working. Then valid FROM and TO email addresses need to be
   added to each script.
- Once this patch submission is accepted then I will do an update to the apcupsd IPFire
   documentation page to describe these scripts and how to update the email addresses.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:20 +00:00
Adolf Belka
5b24b5559a speexdsp: New package required for build of tshark-4.2.5
- tshark in the past had its own version of speexdsp used only for some "arbitrary
   resampling code" used for the build of tshark.
- speexdsp has been removed from tshark so it is now a build requirement.
- It is only used for the build of tshark so the rootfile has all entries commented out.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:00 +00:00
Adolf Belka
da19d30078 asciidoctor: New package required for build of tshark-4.2.5
- Only used for build of tshark so rootfile has all entries commented out.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:00 +00:00
Adolf Belka
d6cb864e1c ruby: New package required for build of asciidoctor required for tshark-4.2.5
- Only used for build of asciidoctor so rootfile has all entries commented out.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:00 +00:00
Adolf Belka
374ba6dafc tshark: Update to version 4.2.5
- Update from version 4.0.8 to 4.2.5
- Update of rootfile
- Version 4.2.5 requires asciidoctor to be built for tshark to build. Despite lots of
   investigation and testing out various commands, tshark will not build if asciidoctor is
   not present, even if the docs are not going to be used. It is only required for the
   build
- To build asciidoctor ruby has to be installed. It is only required for the build of
   asciidoctor
- tshark has previously had its own version of speexdsp built in. It is only used to
   provide some "arbitrary resampling code" during the build and does not end up in the
   running tshark system. Version 4.2.5 has removed the internal speexdsp code but it
   is still a required dependency for building, so speexdsp also need to be installed but
   only for the build stage.
- The associated patches with this one provide the build installation of ruby, asciidoctor
   and speexdsp. With these installed tshark was able to be built.
- version 4.0.8 and 4.2.5 of tshark were tested out on a vm system with the command
   "tshark -c 100 > tshark" and this wrote 100 packets from the vm red0 interface to a
   text file. Both the old and new versions provided the same sort of result. To a first
   level of testing this shows that the 4.2.5 version is functioning as the previous
   version was.
- This version had an sobump so find-dependencies was run. All files linked to the three
   libraries in tshark are all also in tshark. No other package is linked to.
- Changelog
   There are 13 releases between 4.0.8 and 4.2.5 so the changelist is too large to
    include here. Details can be found in the release notes for each version at
    https://www.wireshark.org/docs/relnotes/
   21 CVE vulnerabilities have been fixed that were identified in 7 of the 13 versions.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:17:00 +00:00
Michael Tremer
e90243981d core187: Ship zstd
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:16:40 +00:00
Adolf Belka
464ae625df zstd: Update to version 1.5.6
- Update from version 1.5.5 to 1.5.6
- Update of rootfile
- Changelog
    1.5.6 (Mar 2024)
	api: Promote `ZSTD_c_targetCBlockSize` to Stable API by @felixhandte
	api: new `ZSTD_d_maxBlockSize` experimental parameter, to reduce streaming decompression memory, by @terrelln
	perf: improve performance of param `ZSTD_c_targetCBlockSize`, by @Cyan4973
	perf: improved compression of arrays of integers at high compression, by @Cyan4973
	lib: reduce binary size with selective built-time exclusion, by @felixhandte
	lib: improved huffman speed on small data and linux kernel, by @terrelln
	lib: accept dictionaries with partial literal tables, by @terrelln
	lib: fix CCtx size estimation with external sequence producer, by @embg
	lib: fix corner case decoder behaviors, by @Cyan4973 and @aimuz
	lib: fix zdict prototype mismatch in static_only mode, by @ldv-alt
	lib: fix several bugs in magicless-format decoding, by @embg
	cli: add common compressed file types to `--exclude-compressed`` by @daniellerozenblit
	cli: fix mixing `-c` and `-o` commands with `--rm`, by @Cyan4973
	cli: fix erroneous exclusion of hidden files with `--output-dir-mirror` by @felixhandte
	cli: improved time accuracy on BSD, by @felixhandte
	cli: better errors on argument parsing, by @KapJI
	tests: better compatibility with older versions of `grep`, by @Cyan4973
	tests: lorem ipsum generator as default backup content, by @Cyan4973
	build: cmake improvements by @terrelln, @sighingnow, @gjasny, @JohanMabille, @Saverio976, @gruenich, @teo-tsirpanis
	build: bazel support, by @jondo2010
	build: fix cross-compiling for AArch64 with lld by @jcelerier
	build: fix Apple platform compatibility, by @nidhijaju
	build: fix Visual 2012 and lower compatibility, by @Cyan4973
	build: improve win32 support, by @DimitriPapadopoulos
	build: better C90 compliance for zlibWrapper, by @emaste
	port: make: fat binaries on macos, by @mredig
	port: ARM64EC compatibility for Windows, by @dunhor
	port: QNX support by @klausholstjacobsen
	port: MSYS2 and Cygwin makefile installation and test support, by @QBos07
	port: risc-v support validation in CI, by @Cyan4973
	port: sparc64 support validation in CI, by @Cyan4973
	port: AIX compatibility, by @likema
	port: HP-UX compatibility, by @likema
	doc: Improved specification accuracy, by @elasota
	bug: Fix and deprecate ZSTD_generateSequences (#3981)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:16:27 +00:00
Michael Tremer
1402b77aeb core187: Ship xfsprogs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:16:11 +00:00
Adolf Belka
5c232ac6b0 xfsprogs: Update to version 6.8.0
- Update from version 6.5.0 to 6.8.0
- Update of rootfile
- Changelog
   There is no changelog for this package. Change details can be found from the git commit
    log https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:15:58 +00:00
Adolf Belka
c3ed8a7ba6 traceroute: Update to version 2.1.5
- Update from version 2.1.2 to 2.1.5
- Update of rootfile not required
- Update of traceroute patch as the source tarball has version number specified in its
   directory structure.
- Changelog
    2.1.5
	*  Fix rfc5837 parsing (Francois Rigault)
    2.1.4
	*  Parse interface information (rfc5837) for ICMP extensions
	*  Add `fastopen' tcp module option (cookie negotiation only)
	*  Complete tcp module option `mss' to discover possible mss clamping
	   along the path being traced (idea and testing from Francois Rigault).
	   The argument is optional now.
	   Changed mss is printed once in a form of `M=NUM' at the first probe
	   it was detected on. (Actually, the mss clamping performed by
	   some previous hop).
	   Note, some routers may return too short original fragment
	   in the time exceeded message, making the check impossible.
	   Besides that the responses may come in a different order.
	   All this can lead to a later place of the report
	   (using -N 1 can help for the order).
	*  Complete tcp module option `info' to print returned tcp header options too
	   (all those that can be set or altered by `-O' for tcp module).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:15:48 +00:00
Adolf Belka
f69ba0ff18 tmux: Update to version 3.4
- Update from version 3.3a to 3.4
- Update of rootfile not required
- Changelog
    3.4
	* Add options keep-last and keep-group to destroy-unattached to keep the last
	  session whether in a group.
	* Don't allow paste-buffer into dead panes.
	* Add -t to source-file.
	* Rewrite combined character handling to be more consistent and to support
	  newer Unicode combined characters.
	* Add basic support for SIXEL if built with --enable-sixel.
	* Add a session, pane and user mouse range types for the status line and add
	  format variables for mouse_status_line and mouse_status_range so they can be
	  associated with different commands in the key bindings.
	* Add flag (-o) to next-prompt/previous-prompt to go to OSC 133 command output.
	* Add options and flags for menu styles (menu-style, menu-border-style) similar
	  to those existing for popups.
	* Add support for marking lines with a shell prompt based on the OSC 133 extension.
	* Check for libterminfo for NetBSD.
	* Add "us" to styles for underscore colour.
	* Add flags (-c and -y) to change the confirm key and default behaviour of
	  confirm-before.
	* Use ncurses' new tparm_s function (added in 6.4-20230424) instead of tparm so
	  it does not object to string arguments in c apabilities it doesn't already
	  know. Also ignore errors from tparm if using previous ncurses versions.
	* Set default lock command to vlock on Linux if present at build time.
	* Discard mouse sequences that have the right form but actually are invalid.
	* Add support for spawning panes in separate cgroups with systemd and a
	  configure flag (--disable-cgroups) to turn off.
	* Add a format (pane_unseen_changes) to show if there are unseen changes while
	  in a mode.
	* Remove old buffer when renaming rather than complaining.
	* Add an L modifier like P, W, S to loop over clients.
	* Add -f to list-clients like the other list commands.
	* Extend display-message to work for control clients.
	* Add a flag to display-menu to select the manu item selected when the menu is
	  open.
	* Have tmux recognise pasted text wrapped in bracket paste sequences, rather
	  than only forwarding them to the program inside.
	* Have client return 1 if process is interrupted to an input pane.
	* Query the client terminal for foreground and background colours and if OSC 10
	  or 11 is received but no colour has been set inside tmux, return the colour
	  from the first attached client.
	* Add send-keys -K to handle keys directly as if typed (so look up in key
	  table).
	* Process escape sequences in show-buffer.
	* Add a -l flag to display-message to disable format expansion.
	* Add paste-buffer-deleted notification and fix name of paste-buffer-changed.
	* Do not attempt to connect to the socket as a client if systemd is active.
	* Add scroll-top and scroll-bottom commands to scroll so cursor is at top or
	  bottom.
	* Add a -T flag to capture-pane to stop at the last used cell instead of the
	  full width. Restore the previous behaviour by making it default to off unless
	  -J is used.
	* Add message-line option to control where message and prompt go.
	* Notification when a when a paste buffer is deleted.
	* Add a Nobr terminfo(5) capability to tell tmux the terminal does not use bright
	  colours for bold.
	* Change g and G to go to top and bottom in menus.
	* Add a third state "all" to allow-passthrough to work even in invisible panes.
	* Add support for OSC 8 hyperlinks.
	* Store the time lines are scrolled into history and display in copy mode.
	* Add a %config-error reply to control mode for configuration file errors since
	  reporting them in view mode is useless.
	* A new feature flag (ignorefkeys) to ignore terminfo(5) function key
	  definitions for rxvt.
	* Pass through first argument to OSC 52 (which clipboards to set) if the
	  application provides it.
	* Expand arguments to send-keys, capture-pane, split-window, join-pane where it
	  makes sense to do so.
	* Ignore named buffers when choosing a buffer if one is not specified by the user.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:15:40 +00:00
Michael Tremer
c68d342fc8 core187: Ship iw
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:14:29 +00:00
Adolf Belka
f6a5b57cfa iw: Update to version 6.9
- Update from version 5.19 to 6.9
- Update of rootfile not required
- Changelog
    There is no changelog available for this package. Details of changes can be found in
     the git commit log https://git.kernel.org/pub/scm/linux/kernel/git/jberg/iw.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:14:20 +00:00
Adolf Belka
5e19137801 utfcpp: Required for build of latest version of taglib
- lfs copies the required headers to the /usr/include directory.
- rootfile has all entries commented out as utfcpp is only required for the build.
- Added utfcpp into make.sh prior to taglib.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-02 09:14:10 +00:00