From patchwork Fri Mar 25 16:41:31 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthias Fischer X-Patchwork-Id: 5403 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4KQ7CS6B45z3wtb for ; Fri, 25 Mar 2022 16:41:40 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4KQ7CR2nwpz14B; Fri, 25 Mar 2022 16:41:39 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4KQ7CR1RKWz2y3W; Fri, 25 Mar 2022 16:41:39 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4KQ7CQ3xnNz2xR5 for ; Fri, 25 Mar 2022 16:41:38 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4KQ7CP4RmWzhl for ; Fri, 25 Mar 2022 16:41:37 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1648226497; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=kaYXzx2HZUyLNhdUGW/OMDfWbe7TWoDCk56tUO03PdM=; b=chK1ePWdUnMmfaSoAjT1gCly4dXbTIekGDa7k8u1PpeGgiocVxmEs2W6l3ZZqV6dQoW2Ap XImIp5RycNWVNpBg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1648226497; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=kaYXzx2HZUyLNhdUGW/OMDfWbe7TWoDCk56tUO03PdM=; b=gpOSWLz4l+gd+4JuABsSIAhVw0Od7gWxyGZ9qmgc3UL9SnW/wYmqullwV4Zv4Whw76ok+Q AlP1g15OsElStJz72gk1eem0sAkxbq4lvHa9Hj2TW+qEjzNC3yD7un/DuPllyKAkpqog/U YMYjyOo4F6ZSIdrYfHDMz9VZ8kfroNEmv3bR6GpcE7oKKDcTsA+cePd9pRiDPlBd65FIcn vZmAa4O1VHWeGrk6Xxi0lRm6TYOf3gpyfURxfLVnV9Hbr2oIYVKMyxTjPq7DNNa+B6huDa CTYtjnp/Na7B59jiDoFxhK/AHKqudK3/DvSTxCMGiplzNpvkUM94ryU9wcJeYg== From: Matthias Fischer To: development@lists.ipfire.org Subject: [PATCH] monit: Update to 5.32.0 Date: Fri, 25 Mar 2022 17:41:31 +0100 Message-Id: <20220325164131.2855-1-matthias.fischer@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" For details see: https://mmonit.com/monit/changes/ "Fixed: Issue #1028: If the Monit statefile was removed, the monit start action for services with onreboot nostart option started the service, but did not enable monitoring of said service. The same problem occurred if a new onreboot nostart service was added, even if the statefile did exist. Fixed: Issue #1029: The generic protocol test truncated received data if the response contained zeros. Fixed: PAM authentication: Users with a valid password for a disabled account could still login to Monit. Thanks to Youssef Rebahi-Gilbert. Fixed: The Monit HTTP interface could be blocked by sending a request with an infinite stream of HTTP headers. Thanks to Youssef Rebahi-Gilbert for report." For more details see: https://bitbucket.org/tildeslash/monit/commits/tag/release-5-32-0 Signed-off-by: Matthias Fischer --- lfs/monit | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/monit b/lfs/monit index 8d4b6ced5..6af036adb 100644 --- a/lfs/monit +++ b/lfs/monit @@ -24,7 +24,7 @@ include Config -VER = 5.31.0 +VER = 5.32.0 SUMMARY = Utility for monitoring services on a Unix system THISAPP = monit-$(VER) @@ -33,7 +33,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = monit -PAK_VER = 18 +PAK_VER = 19 DEPS = @@ -47,7 +47,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = 7f2efa2175841573a96209086e4a5a26 +$(DL_FILE)_MD5 = 4e3e9f9dd4a5094101e1cd24a292a4fb install : $(TARGET)