Adolf Belka b9626030fe tar: Update to version 1.35
- Update from version 1.34 to 1.35
- Update of rootfile not required
- Changelog
    1.35 - Sergey Poznyakoff, 2023-07-18
	* Fail when building GNU tar, if the platform supports 64-bit time_t
	  but the build uses only 32-bit time_t.
	* Leave the devmajor and devminor fields empty (rather than zero) for
	  non-special files, as this is more compatible with traditional tar.
	* Bug fixes
		** Fix interaction of --update with --wildcards.
		** When extracting archives into an empty directory, do not create
		   hard links to files outside that directory.
		** Handle partial reads from regular files.
		** Warn "file changed as we read it" less often.
		   Formerly, tar warned if the file's size or ctime changed.
		   However, this generated a false positive if tar read a file
		   while another process hard-linked to it, changing its ctime.
		   Now, tar warns if the file's size, mtime, user ID, group ID,
		   or mode changes.  Although neither heuristic is perfect,
		   the new one should work better in practice.
		** Fix --ignore-failed-read to ignore file-changed read errors
		   as far as exit status is concerned.  You can now suppress file-changed
		   issues entirely with --ignore-failed-read --warning=no-file-changed.
		** Fix --remove-files to not remove a file that changed while we read it.
		** Fix --atime-preserve=replace to not fail if there was no need to replace,
		   either because we did not read the file, or the atime did not change.
		** Fix race when creating a parent directory while another process is
		   also doing so.
		** Fix handling of prefix keywords not followed by "." in pax headers.
		** Fix handling of out-of-range sparse entries in pax headers.
		** Fix handling of --transform='s/s/@/2'.
		** Fix treatment of options ending in / in files-from list.
		** Fix crash on 'tar --checkpoint-action exec=\"'.
		** Fix low-memory crash when reading incremental dumps.
		** Fix --exclude-vcs-ignores memory allocation misuse.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-07 09:17:38 +00:00
2023-08-02 09:18:34 +00:00
2023-07-26 13:17:49 +00:00
2023-08-02 09:11:58 +00:00
2023-08-07 09:17:38 +00:00
2022-04-08 00:32:40 +02:00
2021-03-10 14:42:37 +00:00
2022-03-21 13:47:58 +00:00

IPFire 2.x - The Open Source Firewall

What is IPFire?

IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. For a full list of features have a look here.

This repository contains the source code of IPFire 2.x which is used to build the whole distribution from scratch, since IPFire is not based on any other distribution.

Where can I get IPFire?

Just head over to https://www.ipfire.org/download

How do I use this software?

We have a long and detailed wiki located here which should answers most of your questions.

But I have some questions left. Where can I get support?

You can ask your question at our community located here. A complete list of our support channels can be found here.

How can I contribute?

We have another document for this. Please look here.

Description
No description provided
Readme 101 MiB
Languages
Perl 70.4%
Shell 23%
C 4%
Python 0.6%
Makefile 0.5%
Other 1.4%