From patchwork Wed Dec 25 13:48:23 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 8367 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4YJCld2qwJz3xDX for ; Wed, 25 Dec 2024 13:48:45 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "E6" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4YJClY4tYDz3rk; Wed, 25 Dec 2024 13:48:41 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4YJClY26bNz34L4; Wed, 25 Dec 2024 13:48:41 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4YJClT4Kw3z2xfY for ; Wed, 25 Dec 2024 13:48:37 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4YJClS5c6xz1FV; Wed, 25 Dec 2024 13:48:36 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1735134516; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Z/vQwKjLbrtaFcZiU/FeUwHHitTBR65Th81JSqqnZvk=; b=k5NPB0HhRGTLYL4f65GEtX7v4chEc6YWoDq2usFGjilHIhjTulSCWgtJLLKpYX13eh7Zyt QhPS0HtIlAojRDDw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1735134516; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Z/vQwKjLbrtaFcZiU/FeUwHHitTBR65Th81JSqqnZvk=; b=mfOB9fkeMnl7rkQSbfkhfqVETNjY3ZQy8xWGov1mLetzgcLfe+G1I9NNkzrKIrtqAwEgs0 WiXYZngmAI9RK4euFBTxUDhzewg9uNLVnKU3H57lqsT2wpx512Tbe1eQaDK3e5YFcFxniZ D7/1B+dDB/e+4IYlS30i43nJyeJJwCT/HCBqVue4/cWQImUS/c0Kz9zCXzCLbnWkkY3fWz QP2t79cRjoKhUIyStopUXQhqjQZwFHmJcW0UWBCb0sj0fn5nBL6R3B91NBo7r/A02PaL6/ KvPI81fJR3qvhyxA2fXaSCEJQAgHQUTEHfjz23qKWp9ojcGG+9l5hln03IXqcw== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH 2/7] collectd: Removal of old patches that are no longer needed Date: Wed, 25 Dec 2024 14:48:23 +0100 Message-ID: <20241225134828.6231-2-adolf.belka@ipfire.org> In-Reply-To: <20241225134828.6231-1-adolf.belka@ipfire.org> References: <20241225134828.6231-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: YHDTDURCJZVNWXYJ3KUGSJMEZTEUF2ZA X-Message-ID-Hash: YHDTDURCJZVNWXYJ3KUGSJMEZTEUF2ZA X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Tested-by: Adolof Belka Signed-off-by: Adolf Belka --- .../0001-src-utils_mount.h-Add-stdio.h.patch | 28 --- ...tinuously-when-MySQL-slave-SQL-threa.patch | 27 --- ...-using-uninitalized-variable-in-erro.patch | 34 ---- .../0004-interface.c-FreeBSD-10-support.patch | 52 ------ ...c-avoid-using-uninitalized-variable-.patch | 40 ----- ...ad_cbs-so-we-initialize-the-right-th.patch | 28 --- ...ll-curl_global_init-from-the-init-fu.patch | 40 ----- ...ment-libgcrypt-initalization-process.patch | 33 ---- ..._init-in-_init-of-plugins-using-curl.patch | 99 ----------- ...o-be-consistent-with-the-rest-of-the.patch | 32 ---- ...n-we-alocate-an-empty-list-we-also-n.patch | 41 ----- ...2-don-t-assume-pkg-config-is-in-PATH.patch | 86 ---------- ...sing-backticks-which-broke-the-build.patch | 40 ----- ...du-struct-allocated-by-snmp_pdu_crea.patch | 29 ---- ...Fixed-tautological-pointer-compariso.patch | 28 --- ...pport-for-OpenVPN-2.3.0-status-files.patch | 160 ------------------ ...on-t-signal-an-error-when-no-clients.patch | 56 ------ ...pn-Remove-boguous-file-handler-check.patch | 26 --- ...re-not-fully-established-connections.patch | 59 ------- ...d-functions-robust-like-in-8516f9abb.patch | 102 ----------- ...021-openvpn-Fix-copy-and-paste-error.patch | 25 --- ...nge-data-type-from-COUNTER-to-DERIVE.patch | 107 ------------ ...d-4.10.9-cpufreq_skip_disabled_cores.patch | 18 -- .../collectd/silence-openvpn-errors.patch | 64 ------- 24 files changed, 1254 deletions(-) delete mode 100644 src/patches/collectd/0001-src-utils_mount.h-Add-stdio.h.patch delete mode 100644 src/patches/collectd/0002-Don-t-notify-continuously-when-MySQL-slave-SQL-threa.patch delete mode 100644 src/patches/collectd/0003-curl_xml.c-avoid-using-uninitalized-variable-in-erro.patch delete mode 100644 src/patches/collectd/0004-interface.c-FreeBSD-10-support.patch delete mode 100644 src/patches/collectd/0005-Revert-curl_xml.c-avoid-using-uninitalized-variable-.patch delete mode 100644 src/patches/collectd/0006-network-set_thread_cbs-so-we-initialize-the-right-th.patch delete mode 100644 src/patches/collectd/0007-apache-plugin-Call-curl_global_init-from-the-init-fu.patch delete mode 100644 src/patches/collectd/0008-network-comment-libgcrypt-initalization-process.patch delete mode 100644 src/patches/collectd/0009-Call-curl_global_init-in-_init-of-plugins-using-curl.patch delete mode 100644 src/patches/collectd/0010-indent-wh_init-to-be-consistent-with-the-rest-of-the.patch delete mode 100644 src/patches/collectd/0011-Configparser-when-we-alocate-an-empty-list-we-also-n.patch delete mode 100644 src/patches/collectd/0012-don-t-assume-pkg-config-is-in-PATH.patch delete mode 100644 src/patches/collectd/0013-add-missing-backticks-which-broke-the-build.patch delete mode 100644 src/patches/collectd/0014-snmp-free-snmp_pdu-struct-allocated-by-snmp_pdu_crea.patch delete mode 100644 src/patches/collectd/0015-curl_xml-plugin-Fixed-tautological-pointer-compariso.patch delete mode 100644 src/patches/collectd/0016-Add-support-for-OpenVPN-2.3.0-status-files.patch delete mode 100644 src/patches/collectd/0017-openvpn-plugin-Don-t-signal-an-error-when-no-clients.patch delete mode 100644 src/patches/collectd/0018-openvpn-Remove-boguous-file-handler-check.patch delete mode 100644 src/patches/collectd/0019-openvpn-Ignore-not-fully-established-connections.patch delete mode 100644 src/patches/collectd/0020-openvpn-Make-read-functions-robust-like-in-8516f9abb.patch delete mode 100644 src/patches/collectd/0021-openvpn-Fix-copy-and-paste-error.patch delete mode 100644 src/patches/collectd/0022-openvpn-Change-data-type-from-COUNTER-to-DERIVE.patch delete mode 100644 src/patches/collectd/collectd-4.10.9-cpufreq_skip_disabled_cores.patch delete mode 100644 src/patches/collectd/silence-openvpn-errors.patch diff --git a/src/patches/collectd/0001-src-utils_mount.h-Add-stdio.h.patch b/src/patches/collectd/0001-src-utils_mount.h-Add-stdio.h.patch deleted file mode 100644 index 7391fbfcb..000000000 --- a/src/patches/collectd/0001-src-utils_mount.h-Add-stdio.h.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 4bbfb2b9f391f273744163cfda7bec96671e9d9c Mon Sep 17 00:00:00 2001 -From: Florian Forster -Date: Thu, 18 Apr 2013 06:25:58 +0200 -Subject: [PATCH 01/22] src/utils_mount.h: Add . - -This is required on Solaris 10. Thanks to dannypoo@ for reporting this -problem. - -Github: #306 ---- - src/utils_mount.h | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/src/utils_mount.h b/src/utils_mount.h -index 1f2403c..83f789b 100644 ---- a/src/utils_mount.h -+++ b/src/utils_mount.h -@@ -26,6 +26,7 @@ - #ifndef COLLECTD_UTILS_MOUNT_H - #define COLLECTD_UTILS_MOUNT_H 1 - -+#include - #if HAVE_FS_INFO_H - # include - #endif --- -1.9.3 - diff --git a/src/patches/collectd/0002-Don-t-notify-continuously-when-MySQL-slave-SQL-threa.patch b/src/patches/collectd/0002-Don-t-notify-continuously-when-MySQL-slave-SQL-threa.patch deleted file mode 100644 index f0beb39a2..000000000 --- a/src/patches/collectd/0002-Don-t-notify-continuously-when-MySQL-slave-SQL-threa.patch +++ /dev/null @@ -1,27 +0,0 @@ -From f2391b9da6127e4acd5b54b7ae6c2d585df0e2a0 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Joaqu=C3=ADn=20Cuenca=20Abela?= -Date: Wed, 29 May 2013 16:22:09 +0200 -Subject: [PATCH 02/22] Don't notify continuously when MySQL slave SQL thread - is running - -Signed-off-by: Florian Forster ---- - src/mysql.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/mysql.c b/src/mysql.c -index 8b3cd21..f93a442 100644 ---- a/src/mysql.c -+++ b/src/mysql.c -@@ -689,7 +689,7 @@ static int mysql_read_slave_stats (mysql_database_t *db, MYSQL *con) - ssnprintf (n.message, sizeof (n.message), - "slave SQL thread started"); - plugin_dispatch_notification (&n); -- db->slave_sql_running = 0; -+ db->slave_sql_running = 1; - } - } - --- -1.9.3 - diff --git a/src/patches/collectd/0003-curl_xml.c-avoid-using-uninitalized-variable-in-erro.patch b/src/patches/collectd/0003-curl_xml.c-avoid-using-uninitalized-variable-in-erro.patch deleted file mode 100644 index 4011dd812..000000000 --- a/src/patches/collectd/0003-curl_xml.c-avoid-using-uninitalized-variable-in-erro.patch +++ /dev/null @@ -1,34 +0,0 @@ -From bbbf37d55a3959951604c4be482e9a705a0f86d9 Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Tue, 7 Jan 2014 11:30:59 +0100 -Subject: [PATCH 03/22] curl_xml.c: avoid using uninitalized variable in error - message - -Thanks to @trtrmitya for reporting this. Fixes GH#507 ---- - src/curl_xml.c | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/src/curl_xml.c b/src/curl_xml.c -index 75f5cc3..77aee60 100644 ---- a/src/curl_xml.c -+++ b/src/curl_xml.c -@@ -551,12 +551,12 @@ static int cx_curl_perform (cx_t *db, CURL *curl) /* {{{ */ - char *ptr; - char *url; - -- db->buffer_fill = 0; -+ db->buffer_fill = 0; - status = curl_easy_perform (curl); - if (status != CURLE_OK) - { -- ERROR ("curl_xml plugin: curl_easy_perform failed with status %i: %s (%s)", -- status, db->curl_errbuf, url); -+ ERROR ("curl_xml plugin: curl_easy_perform failed with status %i: %s", -+ status, db->curl_errbuf); - return (-1); - } - --- -1.9.3 - diff --git a/src/patches/collectd/0004-interface.c-FreeBSD-10-support.patch b/src/patches/collectd/0004-interface.c-FreeBSD-10-support.patch deleted file mode 100644 index cc7067dfd..000000000 --- a/src/patches/collectd/0004-interface.c-FreeBSD-10-support.patch +++ /dev/null @@ -1,52 +0,0 @@ -From 645dadb3fcc466e8880fda4eb23b21ad433631fc Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Tue, 7 Jan 2014 16:06:10 +0100 -Subject: [PATCH 04/22] interface.c: FreeBSD-10 support - -Quoting @trtrmitya in github issue #506 : "[...] it is broken on -FreeBSD-10, in which getifaddrs() returns not only link level stats for -a particular interface, but also entries for each IP configured on that -interface. As a result if_submit() is called several times for each -interface, which results in incorrect data being logged. - -I am attaching a patch which fixes a problem on FreeBSD (9/10), but it -should work for every *BSD because [...] the getifaddrs implementation -first appeared in BSDi BSD/OS." - -Many thanks to @trtrmitya for providing the patch ! ---- - src/interface.c | 11 ++++++----- - 1 file changed, 6 insertions(+), 5 deletions(-) - -diff --git a/src/interface.c b/src/interface.c -index db998a3..9b566ea 100644 ---- a/src/interface.c -+++ b/src/interface.c -@@ -213,18 +213,19 @@ static int interface_read (void) - - for (if_ptr = if_list; if_ptr != NULL; if_ptr = if_ptr->ifa_next) - { -- if ((if_data = (struct IFA_DATA *) if_ptr->ifa_data) == NULL) -- continue; -+ if (if_ptr->ifa_addr != NULL && if_ptr->ifa_addr->sa_family == AF_LINK) { -+ if_data = (struct IFA_DATA *) if_ptr->ifa_data; - -- if_submit (if_ptr->ifa_name, "if_octets", -+ if_submit (if_ptr->ifa_name, "if_octets", - if_data->IFA_RX_BYTES, - if_data->IFA_TX_BYTES); -- if_submit (if_ptr->ifa_name, "if_packets", -+ if_submit (if_ptr->ifa_name, "if_packets", - if_data->IFA_RX_PACKT, - if_data->IFA_TX_PACKT); -- if_submit (if_ptr->ifa_name, "if_errors", -+ if_submit (if_ptr->ifa_name, "if_errors", - if_data->IFA_RX_ERROR, - if_data->IFA_TX_ERROR); -+ } - } - - freeifaddrs (if_list); --- -1.9.3 - diff --git a/src/patches/collectd/0005-Revert-curl_xml.c-avoid-using-uninitalized-variable-.patch b/src/patches/collectd/0005-Revert-curl_xml.c-avoid-using-uninitalized-variable-.patch deleted file mode 100644 index 3534cded3..000000000 --- a/src/patches/collectd/0005-Revert-curl_xml.c-avoid-using-uninitalized-variable-.patch +++ /dev/null @@ -1,40 +0,0 @@ -From cde09b547abbeb7595d91259fcc628504d0f55a9 Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Wed, 8 Jan 2014 18:05:40 +0100 -Subject: [PATCH 05/22] Revert "curl_xml.c: avoid using uninitalized variable - in error message" - -This reverts commit bbbf37d55a3959951604c4be482e9a705a0f86d9. - -A different fix for this problem was commited to the collectd-5.4 branch -(8327ee64) and conflicts with this patch. Also, initializing url the -same way as 8327ee64 does it, to avoid a merge conflict. ---- - src/curl_xml.c | 7 ++++--- - 1 file changed, 4 insertions(+), 3 deletions(-) - -diff --git a/src/curl_xml.c b/src/curl_xml.c -index 77aee60..b941f02 100644 ---- a/src/curl_xml.c -+++ b/src/curl_xml.c -@@ -550,13 +550,14 @@ static int cx_curl_perform (cx_t *db, CURL *curl) /* {{{ */ - long rc; - char *ptr; - char *url; -+ url = db->url; - -- db->buffer_fill = 0; -+ db->buffer_fill = 0; - status = curl_easy_perform (curl); - if (status != CURLE_OK) - { -- ERROR ("curl_xml plugin: curl_easy_perform failed with status %i: %s", -- status, db->curl_errbuf); -+ ERROR ("curl_xml plugin: curl_easy_perform failed with status %i: %s (%s)", -+ status, db->curl_errbuf, url); - return (-1); - } - --- -1.9.3 - diff --git a/src/patches/collectd/0006-network-set_thread_cbs-so-we-initialize-the-right-th.patch b/src/patches/collectd/0006-network-set_thread_cbs-so-we-initialize-the-right-th.patch deleted file mode 100644 index 460f4b542..000000000 --- a/src/patches/collectd/0006-network-set_thread_cbs-so-we-initialize-the-right-th.patch +++ /dev/null @@ -1,28 +0,0 @@ -From ddffda7a150cd3abdb6ec392b514a250e91e0c19 Mon Sep 17 00:00:00 2001 -From: Chris Lundquist -Date: Tue, 14 Jan 2014 18:33:13 -0800 -Subject: [PATCH 06/22] [network] set_thread_cbs so we initialize the right - threading mode in gcry_check_version - -Signed-off-by: Florian Forster ---- - src/network.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/network.c b/src/network.c -index d0ff6bc..be82c6f 100644 ---- a/src/network.c -+++ b/src/network.c -@@ -500,8 +500,8 @@ static void network_init_gcrypt (void) /* {{{ */ - if (gcry_control (GCRYCTL_ANY_INITIALIZATION_P)) - return; - -- gcry_check_version (NULL); /* before calling any other functions */ - gcry_control (GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread); -+ gcry_check_version (NULL); /* before calling *almost* any other functions */ - gcry_control (GCRYCTL_INIT_SECMEM, 32768); - gcry_control (GCRYCTL_INITIALIZATION_FINISHED); - } /* }}} void network_init_gcrypt */ --- -1.9.3 - diff --git a/src/patches/collectd/0007-apache-plugin-Call-curl_global_init-from-the-init-fu.patch b/src/patches/collectd/0007-apache-plugin-Call-curl_global_init-from-the-init-fu.patch deleted file mode 100644 index 8408337e7..000000000 --- a/src/patches/collectd/0007-apache-plugin-Call-curl_global_init-from-the-init-fu.patch +++ /dev/null @@ -1,40 +0,0 @@ -From 5f2f969335757f31f42cd8bb7e38eb8c5fe5e56e Mon Sep 17 00:00:00 2001 -From: Florian Forster -Date: Wed, 15 Jan 2014 23:47:33 +0100 -Subject: [PATCH 07/22] apache plugin: Call curl_global_init() from the init - function. - -This is a shot in the dark in trying to address #513. By calling this -from an init() callback, I hope to be initializing the curl and gcrypt -libraries before collectd becomes multi-threaded, avoiding the problems -described in the issue. ---- - src/apache.c | 9 +++++++++ - 1 file changed, 9 insertions(+) - -diff --git a/src/apache.c b/src/apache.c -index 899c21e..23bba3e 100644 ---- a/src/apache.c -+++ b/src/apache.c -@@ -702,9 +702,18 @@ static int apache_read_host (user_data_t *user_data) /* {{{ */ - return (0); - } /* }}} int apache_read_host */ - -+static int apache_init (void) /* {{{ */ -+{ -+ /* Call this while collectd is still single-threaded to avoid -+ * initialization issues in libgcrypt. */ -+ curl_global_init (CURL_GLOBAL_SSL); -+ return (0); -+} /* }}} int apache_init */ -+ - void module_register (void) - { - plugin_register_complex_config ("apache", config); -+ plugin_register_init ("apache", apache_init); - } /* void module_register */ - - /* vim: set sw=8 noet fdm=marker : */ --- -1.9.3 - diff --git a/src/patches/collectd/0008-network-comment-libgcrypt-initalization-process.patch b/src/patches/collectd/0008-network-comment-libgcrypt-initalization-process.patch deleted file mode 100644 index 9499328a5..000000000 --- a/src/patches/collectd/0008-network-comment-libgcrypt-initalization-process.patch +++ /dev/null @@ -1,33 +0,0 @@ -From 793c2046de1ac04689d541a5e83513fe8e62578c Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Thu, 16 Jan 2014 00:30:42 +0100 -Subject: [PATCH 08/22] network: comment libgcrypt initalization process - ---- - src/network.c | 9 ++++++++- - 1 file changed, 8 insertions(+), 1 deletion(-) - -diff --git a/src/network.c b/src/network.c -index be82c6f..f379a5c 100644 ---- a/src/network.c -+++ b/src/network.c -@@ -500,8 +500,15 @@ static void network_init_gcrypt (void) /* {{{ */ - if (gcry_control (GCRYCTL_ANY_INITIALIZATION_P)) - return; - -+ /* http://www.gnupg.org/documentation/manuals/gcrypt/Multi_002dThreading.html -+ * To ensure thread-safety, it's important to set GCRYCTL_SET_THREAD_CBS -+ * *before* initalizing Libgcrypt with gcry_check_version(), which itself must -+ * be called before any other gcry_* function. GCRYCTL_ANY_INITIALIZATION_P -+ * above doesn't count, as it doesn't implicitly initalize Libgcrypt. -+ * -+ * tl;dr: keep all these gry_* statements in this exact order please. */ - gcry_control (GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread); -- gcry_check_version (NULL); /* before calling *almost* any other functions */ -+ gcry_check_version (NULL); - gcry_control (GCRYCTL_INIT_SECMEM, 32768); - gcry_control (GCRYCTL_INITIALIZATION_FINISHED); - } /* }}} void network_init_gcrypt */ --- -1.9.3 - diff --git a/src/patches/collectd/0009-Call-curl_global_init-in-_init-of-plugins-using-curl.patch b/src/patches/collectd/0009-Call-curl_global_init-in-_init-of-plugins-using-curl.patch deleted file mode 100644 index a2c3ef522..000000000 --- a/src/patches/collectd/0009-Call-curl_global_init-in-_init-of-plugins-using-curl.patch +++ /dev/null @@ -1,99 +0,0 @@ -From 66b400ab01b8133e450bb002e175117a1ab6f9ae Mon Sep 17 00:00:00 2001 -From: Jeremy Katz -Date: Sun, 26 Jan 2014 20:43:19 -0500 -Subject: [PATCH 09/22] Call curl_global_init() in _init of plugins using curl - -Need to call curl_global_init() or curl_easy_init() during init -for plugins when we're still running single threaded. This -updates the remaining ones ---- - src/curl.c | 1 + - src/curl_json.c | 9 +++++++++ - src/curl_xml.c | 9 +++++++++ - src/write_http.c | 9 +++++++++ - 4 files changed, 28 insertions(+) - -diff --git a/src/curl.c b/src/curl.c -index 3899aaa..8d2893f 100644 ---- a/src/curl.c -+++ b/src/curl.c -@@ -566,6 +566,7 @@ static int cc_init (void) /* {{{ */ - INFO ("curl plugin: No pages have been defined."); - return (-1); - } -+ curl_global_init (CURL_GLOBAL_SSL); - return (0); - } /* }}} int cc_init */ - -diff --git a/src/curl_json.c b/src/curl_json.c -index 24e1df1..0948962 100644 ---- a/src/curl_json.c -+++ b/src/curl_json.c -@@ -882,9 +882,18 @@ static int cj_read (user_data_t *ud) /* {{{ */ - return cj_curl_perform (db, db->curl); - } /* }}} int cj_read */ - -+static int cj_init (void) /* {{{ */ -+{ -+ /* Call this while collectd is still single-threaded to avoid -+ * initialization issues in libgcrypt. */ -+ curl_global_init (CURL_GLOBAL_SSL); -+ return (0); -+} /* }}} int cj_init */ -+ - void module_register (void) - { - plugin_register_complex_config ("curl_json", cj_config); -+ plugin_register_init ("curl_json", cj_init); - } /* void module_register */ - - /* vim: set sw=2 sts=2 et fdm=marker : */ -diff --git a/src/curl_xml.c b/src/curl_xml.c -index b941f02..e31e73d 100644 ---- a/src/curl_xml.c -+++ b/src/curl_xml.c -@@ -926,9 +926,18 @@ static int cx_config (oconfig_item_t *ci) /* {{{ */ - return (0); - } /* }}} int cx_config */ - -+static int cx_init (void) /* {{{ */ -+{ -+ /* Call this while collectd is still single-threaded to avoid -+ * initialization issues in libgcrypt. */ -+ curl_global_init (CURL_GLOBAL_SSL); -+ return (0); -+} /* }}} int cx_init */ -+ - void module_register (void) - { - plugin_register_complex_config ("curl_xml", cx_config); -+ plugin_register_init ("curl_xml", cx_init); - } /* void module_register */ - - /* vim: set sw=2 sts=2 et fdm=marker : */ -diff --git a/src/write_http.c b/src/write_http.c -index 62c73b0..04c637b 100644 ---- a/src/write_http.c -+++ b/src/write_http.c -@@ -656,9 +656,18 @@ static int wh_config (oconfig_item_t *ci) /* {{{ */ - return (0); - } /* }}} int wh_config */ - -+static int wh_init (void) /* {{{ */ -+{ -+ /* Call this while collectd is still single-threaded to avoid -+ * initialization issues in libgcrypt. */ -+ curl_global_init (CURL_GLOBAL_SSL); -+ return (0); -+} /* }}} int wh_init */ -+ - void module_register (void) /* {{{ */ - { - plugin_register_complex_config ("write_http", wh_config); -+ plugin_register_init ("write_http", wh_init); - } /* }}} void module_register */ - - /* vim: set fdm=marker sw=8 ts=8 tw=78 et : */ --- -1.9.3 - diff --git a/src/patches/collectd/0010-indent-wh_init-to-be-consistent-with-the-rest-of-the.patch b/src/patches/collectd/0010-indent-wh_init-to-be-consistent-with-the-rest-of-the.patch deleted file mode 100644 index 81f2d8402..000000000 --- a/src/patches/collectd/0010-indent-wh_init-to-be-consistent-with-the-rest-of-the.patch +++ /dev/null @@ -1,32 +0,0 @@ -From 6bd48f2346c5072dc22da58c7b7cd8e8ceb83fc5 Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Sat, 29 Mar 2014 13:37:36 +0100 -Subject: [PATCH 10/22] indent wh_init() to be consistent with the rest of the - file - ---- - src/write_http.c | 8 ++++---- - 1 file changed, 4 insertions(+), 4 deletions(-) - -diff --git a/src/write_http.c b/src/write_http.c -index 04c637b..0a13444 100644 ---- a/src/write_http.c -+++ b/src/write_http.c -@@ -658,10 +658,10 @@ static int wh_config (oconfig_item_t *ci) /* {{{ */ - - static int wh_init (void) /* {{{ */ - { -- /* Call this while collectd is still single-threaded to avoid -- * initialization issues in libgcrypt. */ -- curl_global_init (CURL_GLOBAL_SSL); -- return (0); -+ /* Call this while collectd is still single-threaded to avoid -+ * initialization issues in libgcrypt. */ -+ curl_global_init (CURL_GLOBAL_SSL); -+ return (0); - } /* }}} int wh_init */ - - void module_register (void) /* {{{ */ --- -1.9.3 - diff --git a/src/patches/collectd/0011-Configparser-when-we-alocate-an-empty-list-we-also-n.patch b/src/patches/collectd/0011-Configparser-when-we-alocate-an-empty-list-we-also-n.patch deleted file mode 100644 index b3e6f786e..000000000 --- a/src/patches/collectd/0011-Configparser-when-we-alocate-an-empty-list-we-also-n.patch +++ /dev/null @@ -1,41 +0,0 @@ -From 6207fce91a0933e852ec76fc31ca81ec00ffa04b Mon Sep 17 00:00:00 2001 -From: Wilfried Goesgens -Date: Thu, 5 Jun 2014 20:04:13 +0200 -Subject: [PATCH 11/22] Configparser: when we alocate an empty list, we also - need to reset the counter; else we will trip over this later. This fixes - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750440 - ---- - src/configfile.c | 9 ++++++++- - 1 file changed, 8 insertions(+), 1 deletion(-) - -diff --git a/src/configfile.c b/src/configfile.c -index 0b7786f..983d995 100644 ---- a/src/configfile.c -+++ b/src/configfile.c -@@ -414,6 +414,12 @@ static int cf_ci_replace_child (oconfig_item_t *dst, oconfig_item_t *src, - - /* Resize the memory containing the children to be big enough to hold - * all children. */ -+ if (dst->children_num + src->children_num - 1 == 0) -+ { -+ dst->children_num = 0; -+ return (0); -+ } -+ - temp = (oconfig_item_t *) realloc (dst->children, - sizeof (oconfig_item_t) - * (dst->children_num + src->children_num - 1)); -@@ -514,7 +520,8 @@ static int cf_include_all (oconfig_item_t *root, int depth) - continue; - - /* Now replace the i'th child in `root' with `new'. */ -- cf_ci_replace_child (root, new, i); -+ if (cf_ci_replace_child (root, new, i) < 0) -+ return (-1); - - /* ... and go back to the new i'th child. */ - --i; --- -1.9.3 - diff --git a/src/patches/collectd/0012-don-t-assume-pkg-config-is-in-PATH.patch b/src/patches/collectd/0012-don-t-assume-pkg-config-is-in-PATH.patch deleted file mode 100644 index 5bb5c853f..000000000 --- a/src/patches/collectd/0012-don-t-assume-pkg-config-is-in-PATH.patch +++ /dev/null @@ -1,86 +0,0 @@ -From c2ca2a46e617878dcff69de0b8940ea91d3401cc Mon Sep 17 00:00:00 2001 -From: Lauri Tirkkonen -Date: Thu, 22 May 2014 14:05:40 +0300 -Subject: [PATCH 12/22] don't assume pkg-config is in PATH - ---- - configure.in | 20 ++++++++++---------- - 1 file changed, 10 insertions(+), 10 deletions(-) - -diff --git a/configure.in b/configure.in -index 0b12630..7086800 100644 ---- a/configure.in -+++ b/configure.in -@@ -1136,8 +1136,8 @@ AC_CHECK_LIB(hal,libhal_device_property_exists, - [with_libhal="no"]) - if test "x$with_libhal" = "xyes"; then - if test "x$PKG_CONFIG" != "x"; then -- BUILD_WITH_LIBHAL_CFLAGS="`pkg-config --cflags hal`" -- BUILD_WITH_LIBHAL_LIBS="`pkg-config --libs hal`" -+ BUILD_WITH_LIBHAL_CFLAGS="`$PKG_CONFIG --cflags hal`" -+ BUILD_WITH_LIBHAL_LIBS="`$PKG_CONFIG --libs hal`" - AC_SUBST(BUILD_WITH_LIBHAL_CFLAGS) - AC_SUBST(BUILD_WITH_LIBHAL_LIBS) - fi -@@ -3434,8 +3434,8 @@ then - if $PKG_CONFIG --exists tokyotyrant - then - with_libtokyotyrant_cppflags="$with_libtokyotyrant_cppflags `$PKG_CONFIG --cflags tokyotyrant`" -- with_libtokyotyrant_ldflags="$with_libtokyotyrant_ldflags `pkg-config --libs-only-L tokyotyrant`" -- with_libtokyotyrant_libs="$with_libtokyotyrant_libs `pkg-config --libs-only-l tokyotyrant`" -+ with_libtokyotyrant_ldflags="$with_libtokyotyrant_ldflags `$PKG_CONFIG --libs-only-L tokyotyrant`" -+ with_libtokyotyrant_libs="$with_libtokyotyrant_libs `$PKG_CONFIG --libs-only-l tokyotyrant`" - fi - fi - -@@ -3743,7 +3743,7 @@ with_libvirt_cflags="" - with_libvirt_ldflags="" - if test "x$PKG_CONFIG" != "x" - then -- pkg-config --exists 'libxml-2.0' 2>/dev/null -+ $PKG_CONFIG --exists 'libxml-2.0' 2>/dev/null - if test "$?" = "0" - then - with_libxml2="yes" -@@ -3751,7 +3751,7 @@ then - with_libxml2="no (pkg-config doesn't know library)" - fi - -- pkg-config --exists libvirt 2>/dev/null -+ $PKG_CONFIG --exists libvirt 2>/dev/null - if test "$?" = "0" - then - with_libvirt="yes" -@@ -3761,12 +3761,12 @@ then - fi - if test "x$with_libxml2" = "xyes" - then -- with_libxml2_cflags="`pkg-config --cflags libxml-2.0`" -+ with_libxml2_cflags="`$PKG_CONFIG --cflags libxml-2.0`" - if test $? -ne 0 - then - with_libxml2="no" - fi -- with_libxml2_ldflags="`pkg-config --libs libxml-2.0`" -+ with_libxml2_ldflags="$PKG_CONFIG --libs libxml-2.0`" - if test $? -ne 0 - then - with_libxml2="no" -@@ -3806,12 +3806,12 @@ if test "x$with_libxml2" = "xyes"; then - fi - if test "x$with_libvirt" = "xyes" - then -- with_libvirt_cflags="`pkg-config --cflags libvirt`" -+ with_libvirt_cflags="$PKG_CONFIG --cflags libvirt`" - if test $? -ne 0 - then - with_libvirt="no" - fi -- with_libvirt_ldflags="`pkg-config --libs libvirt`" -+ with_libvirt_ldflags="$PKG_CONFIG --libs libvirt`" - if test $? -ne 0 - then - with_libvirt="no" --- -1.9.3 - diff --git a/src/patches/collectd/0013-add-missing-backticks-which-broke-the-build.patch b/src/patches/collectd/0013-add-missing-backticks-which-broke-the-build.patch deleted file mode 100644 index d7f2264cb..000000000 --- a/src/patches/collectd/0013-add-missing-backticks-which-broke-the-build.patch +++ /dev/null @@ -1,40 +0,0 @@ -From 497f5785e8b385f03b5fb5b15bdff8ba39e4699e Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Mon, 23 Jun 2014 18:00:01 +0200 -Subject: [PATCH 13/22] add missing backticks which broke the build - ---- - configure.in | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/configure.in b/configure.in -index 7086800..5dac543 100644 ---- a/configure.in -+++ b/configure.in -@@ -3766,7 +3766,7 @@ then - then - with_libxml2="no" - fi -- with_libxml2_ldflags="$PKG_CONFIG --libs libxml-2.0`" -+ with_libxml2_ldflags="`$PKG_CONFIG --libs libxml-2.0`" - if test $? -ne 0 - then - with_libxml2="no" -@@ -3806,12 +3806,12 @@ if test "x$with_libxml2" = "xyes"; then - fi - if test "x$with_libvirt" = "xyes" - then -- with_libvirt_cflags="$PKG_CONFIG --cflags libvirt`" -+ with_libvirt_cflags="`$PKG_CONFIG --cflags libvirt`" - if test $? -ne 0 - then - with_libvirt="no" - fi -- with_libvirt_ldflags="$PKG_CONFIG --libs libvirt`" -+ with_libvirt_ldflags="`$PKG_CONFIG --libs libvirt`" - if test $? -ne 0 - then - with_libvirt="no" --- -1.9.3 - diff --git a/src/patches/collectd/0014-snmp-free-snmp_pdu-struct-allocated-by-snmp_pdu_crea.patch b/src/patches/collectd/0014-snmp-free-snmp_pdu-struct-allocated-by-snmp_pdu_crea.patch deleted file mode 100644 index 945c28bbb..000000000 --- a/src/patches/collectd/0014-snmp-free-snmp_pdu-struct-allocated-by-snmp_pdu_crea.patch +++ /dev/null @@ -1,29 +0,0 @@ -From 0da910fb1bf2bd4982ca6541458c795ec296f398 Mon Sep 17 00:00:00 2001 -From: Marc Fournier -Date: Fri, 8 Aug 2014 15:55:10 +0200 -Subject: [PATCH 14/22] snmp: free snmp_pdu struct allocated by - snmp_pdu_create() - -This should fix the leak reported in issue #610. ---- - src/snmp.c | 4 ++++ - 1 file changed, 4 insertions(+) - -diff --git a/src/snmp.c b/src/snmp.c -index d440f7f..dacdede 100644 ---- a/src/snmp.c -+++ b/src/snmp.c -@@ -1503,6 +1503,10 @@ static int csnmp_read_table (host_definition_t *host, data_definition_t *data) - snmp_free_pdu (res); - res = NULL; - -+ if (req != NULL) -+ snmp_free_pdu (req); -+ req = NULL; -+ - if (status == 0) - csnmp_dispatch_table (host, data, instance_list_head, value_list_head); - --- -1.9.3 - diff --git a/src/patches/collectd/0015-curl_xml-plugin-Fixed-tautological-pointer-compariso.patch b/src/patches/collectd/0015-curl_xml-plugin-Fixed-tautological-pointer-compariso.patch deleted file mode 100644 index 30e1a08be..000000000 --- a/src/patches/collectd/0015-curl_xml-plugin-Fixed-tautological-pointer-compariso.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 0afea60611f115a28b8ec331aba610e3038c1ef2 Mon Sep 17 00:00:00 2001 -From: Arthur Marble -Date: Sun, 17 Aug 2014 17:34:04 -0500 -Subject: [PATCH 15/22] curl_xml plugin: Fixed tautological pointer comparison - error. - -Fixes: http://bugs.debian.org/758481 -Signed-off-by: Florian Forster ---- - src/curl_xml.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/curl_xml.c b/src/curl_xml.c -index e31e73d..28b2ded 100644 ---- a/src/curl_xml.c -+++ b/src/curl_xml.c -@@ -344,7 +344,7 @@ static int cx_handle_instance_xpath (xmlXPathContextPtr xpath_ctx, /* {{{ */ - /* If the base xpath returns more than one block, the result is assumed to be - * a table. The `Instnce' option is not optional in this case. Check for the - * condition and inform the user. */ -- if (is_table && (vl->type_instance == NULL)) -+ if (is_table) - { - WARNING ("curl_xml plugin: " - "Base-XPath %s is a table (more than one result was returned), " --- -1.9.3 - diff --git a/src/patches/collectd/0016-Add-support-for-OpenVPN-2.3.0-status-files.patch b/src/patches/collectd/0016-Add-support-for-OpenVPN-2.3.0-status-files.patch deleted file mode 100644 index ca5b407ce..000000000 --- a/src/patches/collectd/0016-Add-support-for-OpenVPN-2.3.0-status-files.patch +++ /dev/null @@ -1,160 +0,0 @@ -From 9d065b401c2c393bef5a6e58b5deeda7d59d4f39 Mon Sep 17 00:00:00 2001 -From: Ed Okerson -Date: Mon, 11 Feb 2013 15:46:10 -0600 -Subject: [PATCH 16/22] Add support for OpenVPN 2.3.0 status files. - -Fix a bug that breaks this module if a server is running multiple instances of OpenVPN and one instance does not have any clients connected. ---- - src/openvpn.c | 90 +++++++++++++++++++++++++++++++++++++++++++++++++++++++---- - 1 file changed, 84 insertions(+), 6 deletions(-) - -diff --git a/src/openvpn.c b/src/openvpn.c -index 2aca414..d2b6f17 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -32,6 +32,7 @@ - #define V1STRING "Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since\n" - #define V2STRING "HEADER,CLIENT_LIST,Common Name,Real Address,Virtual Address,Bytes Received,Bytes Sent,Connected Since,Connected Since (time_t)\n" - #define V3STRING "HEADER CLIENT_LIST Common Name Real Address Virtual Address Bytes Received Bytes Sent Connected Since Connected Since (time_t)\n" -+#define V4STRING "HEADER,CLIENT_LIST,Common Name,Real Address,Virtual Address,Bytes Received,Bytes Sent,Connected Since,Connected Since (time_t),Username\n" - #define VSSTRING "OpenVPN STATISTICS\n" - - -@@ -43,6 +44,7 @@ struct vpn_status_s - MULTI1 = 1, /* status-version 1 */ - MULTI2, /* status-version 2 */ - MULTI3, /* status-version 3 */ -+ MULTI4, /* status-version 4 */ - SINGLE = 10 /* currently no versions for single mode, maybe in the future */ - } version; - char *name; -@@ -452,13 +454,77 @@ static int multi3_read (char *name, FILE *fh) - return (read); - } /* int multi3_read */ - -+/* for reading status version 4 */ -+static int multi4_read (char *name, FILE *fh) -+{ -+ char buffer[1024]; -+ char *fields[11]; -+ const int max_fields = STATIC_ARRAY_SIZE (fields); -+ int fields_num, read = 0; -+ long long sum_users = 0; -+ -+ while (fgets (buffer, sizeof (buffer), fh) != NULL) -+ { -+ fields_num = openvpn_strsplit (buffer, fields, max_fields); -+ -+ /* status file is generated by openvpn/multi.c:multi_print_status() -+ * http://svn.openvpn.net/projects/openvpn/trunk/openvpn/multi.c -+ * -+ * The line we're expecting has 9 fields. We ignore all lines -+ * with more or less fields. -+ */ -+ if (fields_num != 9) -+ continue; -+ -+ -+ if (strcmp (fields[0], "CLIENT_LIST") != 0) -+ continue; -+ -+ -+ if (collect_user_count) -+ /* If so, sum all users, ignore the individuals*/ -+ { -+ sum_users += 1; -+ } -+ if (collect_individual_users) -+ { -+ if (new_naming_schema) -+ { -+ /* plugin inst = file name, type inst = fields[1] */ -+ iostats_submit (name, /* vpn instance */ -+ fields[1], /* "Common Name" */ -+ atoll (fields[4]), /* "Bytes Received" */ -+ atoll (fields[5])); /* "Bytes Sent" */ -+ } -+ else -+ { -+ /* plugin inst = fields[1], type inst = "" */ -+ iostats_submit (fields[1], /* "Common Name" */ -+ NULL, /* unused when in multimode */ -+ atoll (fields[4]), /* "Bytes Received" */ -+ atoll (fields[5])); /* "Bytes Sent" */ -+ } -+ } -+ -+ read = 1; -+ } -+ -+ if (collect_user_count) -+ { -+ numusers_submit(name, name, sum_users); -+ read = 1; -+ } -+ -+ return (read); -+} /* int multi4_read */ -+ - /* read callback */ - static int openvpn_read (void) - { - FILE *fh; -- int i, read; -+ int i, vpn_read, read; - -- read = 0; -+ vpn_read = read = 0; - - /* call the right read function for every status entry in the list */ - for (i = 0; i < vpn_num; i++) -@@ -476,23 +542,28 @@ static int openvpn_read (void) - switch (vpn_list[i]->version) - { - case SINGLE: -- read = single_read(vpn_list[i]->name, fh); -+ vpn_read = single_read(vpn_list[i]->name, fh); - break; - - case MULTI1: -- read = multi1_read(vpn_list[i]->name, fh); -+ vpn_read = multi1_read(vpn_list[i]->name, fh); - break; - - case MULTI2: -- read = multi2_read(vpn_list[i]->name, fh); -+ vpn_read = multi2_read(vpn_list[i]->name, fh); - break; - - case MULTI3: -- read = multi3_read(vpn_list[i]->name, fh); -+ vpn_read = multi3_read(vpn_list[i]->name, fh); -+ break; -+ -+ case MULTI4: -+ vpn_read = multi4_read(vpn_list[i]->name, fh); - break; - } - - fclose (fh); -+ read += vpn_read; - } - - return (read ? 0 : -1); -@@ -549,6 +620,13 @@ static int version_detect (const char *filename) - version = MULTI3; - break; - } -+ /* searching for multi version 4 */ -+ else if (strcmp (buffer, V4STRING) == 0) -+ { -+ DEBUG ("openvpn plugin: found status file version MULTI4"); -+ version = MULTI4; -+ break; -+ } - } - - if (version == 0) --- -1.9.3 - diff --git a/src/patches/collectd/0017-openvpn-plugin-Don-t-signal-an-error-when-no-clients.patch b/src/patches/collectd/0017-openvpn-plugin-Don-t-signal-an-error-when-no-clients.patch deleted file mode 100644 index 0d5b3191c..000000000 --- a/src/patches/collectd/0017-openvpn-plugin-Don-t-signal-an-error-when-no-clients.patch +++ /dev/null @@ -1,56 +0,0 @@ -From 8516f9abb625fa7b9321e62307305aa6499be4e8 Mon Sep 17 00:00:00 2001 -From: Florian Forster -Date: Sun, 14 Sep 2014 19:28:05 +0200 -Subject: [PATCH 17/22] openvpn plugin: Don't signal an error when no clients - are connected. - -In the multi1_read() function, an error (zero) was returned when no -clients were currently connected to the OpenVPN server, because the -"read" variable was initialized to zero and the while loop exited before -it was set to one. This is not the intended behavior. - -Thanks to @srix for reporting this issue! - -Fixes: #731 ---- - src/openvpn.c | 12 +++++------- - 1 file changed, 5 insertions(+), 7 deletions(-) - -diff --git a/src/openvpn.c b/src/openvpn.c -index d2b6f17..7d4e4a0 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -267,7 +267,7 @@ static int multi1_read (char *name, FILE *fh) - { - char buffer[1024]; - char *fields[10]; -- int fields_num, read = 0, found_header = 0; -+ int fields_num, found_header = 0; - long long sum_users = 0; - - /* read the file until the "ROUTING TABLE" line is found (no more info after) */ -@@ -314,17 +314,15 @@ static int multi1_read (char *name, FILE *fh) - atoll (fields[3])); /* "Bytes Sent" */ - } - } -- -- read = 1; - } - -+ if (ferror (fh)) -+ return (0); -+ - if (collect_user_count) -- { - numusers_submit(name, name, sum_users); -- read = 1; -- } - -- return (read); -+ return (1); - } /* int multi1_read */ - - /* for reading status version 2 */ --- -1.9.3 - diff --git a/src/patches/collectd/0018-openvpn-Remove-boguous-file-handler-check.patch b/src/patches/collectd/0018-openvpn-Remove-boguous-file-handler-check.patch deleted file mode 100644 index 850e4fb91..000000000 --- a/src/patches/collectd/0018-openvpn-Remove-boguous-file-handler-check.patch +++ /dev/null @@ -1,26 +0,0 @@ -From 5dbc1cfb4baff831f950b3c9de8c332bc9aa2b6e Mon Sep 17 00:00:00 2001 -From: Michael Tremer -Date: Wed, 17 Sep 2014 11:25:17 +0200 -Subject: [PATCH 18/22] openvpn: Remove boguous file handler check - ---- - src/openvpn.c | 3 --- - 1 file changed, 3 deletions(-) - -diff --git a/src/openvpn.c b/src/openvpn.c -index 7d4e4a0..9598abc 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -316,9 +316,6 @@ static int multi1_read (char *name, FILE *fh) - } - } - -- if (ferror (fh)) -- return (0); -- - if (collect_user_count) - numusers_submit(name, name, sum_users); - --- -1.9.3 - diff --git a/src/patches/collectd/0019-openvpn-Ignore-not-fully-established-connections.patch b/src/patches/collectd/0019-openvpn-Ignore-not-fully-established-connections.patch deleted file mode 100644 index 4dde610db..000000000 --- a/src/patches/collectd/0019-openvpn-Ignore-not-fully-established-connections.patch +++ /dev/null @@ -1,59 +0,0 @@ -From a45710a5a887d25ab0e04ce1553bb268013ef780 Mon Sep 17 00:00:00 2001 -From: Michael Tremer -Date: Tue, 16 Sep 2014 14:44:42 +0200 -Subject: [PATCH 19/22] openvpn: Ignore not fully established connections - ---- - src/openvpn.c | 15 +++++++++++++++ - 1 file changed, 15 insertions(+) - -diff --git a/src/openvpn.c b/src/openvpn.c -index 9598abc..6a0ffbd 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -292,6 +292,10 @@ static int multi1_read (char *name, FILE *fh) - if (fields_num < 4) - continue; - -+ // Ignore not yet fully established connections -+ if (strcmp(fields[1], "UNDEF") == 0) -+ continue; -+ - if (collect_user_count) - /* If so, sum all users, ignore the individuals*/ - { -@@ -347,6 +351,10 @@ static int multi2_read (char *name, FILE *fh) - if (strcmp (fields[0], "CLIENT_LIST") != 0) - continue; - -+ // Ignore not yet fully established connections -+ if (strcmp(fields[0], "UNDEF") == 0) -+ continue; -+ - if (collect_user_count) - /* If so, sum all users, ignore the individuals*/ - { -@@ -412,6 +420,10 @@ static int multi3_read (char *name, FILE *fh) - if (strcmp (fields[0], "CLIENT_LIST") != 0) - continue; - -+ // Ignore not yet fully established connections -+ if (strcmp(fields[0], "UNDEF") == 0) -+ continue; -+ - if (collect_user_count) - /* If so, sum all users, ignore the individuals*/ - { -@@ -475,6 +487,9 @@ static int multi4_read (char *name, FILE *fh) - if (strcmp (fields[0], "CLIENT_LIST") != 0) - continue; - -+ // Ignore not yet fully established connections -+ if (strcmp(fields[0], "UNDEF") == 0) -+ continue; - - if (collect_user_count) - /* If so, sum all users, ignore the individuals*/ --- -1.9.3 - diff --git a/src/patches/collectd/0020-openvpn-Make-read-functions-robust-like-in-8516f9abb.patch b/src/patches/collectd/0020-openvpn-Make-read-functions-robust-like-in-8516f9abb.patch deleted file mode 100644 index 79f6742f9..000000000 --- a/src/patches/collectd/0020-openvpn-Make-read-functions-robust-like-in-8516f9abb.patch +++ /dev/null @@ -1,102 +0,0 @@ -From 46e716ee8d4208924d10f57f9ed97c99674a6ef4 Mon Sep 17 00:00:00 2001 -From: Michael Tremer -Date: Wed, 17 Sep 2014 11:31:13 +0200 -Subject: [PATCH 20/22] openvpn: Make read functions robust like in - 8516f9abb625fa7b9321e62307305aa6499be4e8 - ---- - src/openvpn.c | 21 ++++++--------------- - 1 file changed, 6 insertions(+), 15 deletions(-) - -diff --git a/src/openvpn.c b/src/openvpn.c -index 6a0ffbd..f686721 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -332,7 +332,7 @@ static int multi2_read (char *name, FILE *fh) - char buffer[1024]; - char *fields[10]; - const int max_fields = STATIC_ARRAY_SIZE (fields); -- int fields_num, read = 0; -+ int fields_num; - long long sum_users = 0; - - while (fgets (buffer, sizeof (buffer), fh) != NULL) -@@ -379,17 +379,14 @@ static int multi2_read (char *name, FILE *fh) - atoll (fields[5])); /* "Bytes Sent" */ - } - } -- -- read = 1; - } - - if (collect_user_count) - { - numusers_submit(name, name, sum_users); -- read = 1; - } - -- return (read); -+ return (1); - } /* int multi2_read */ - - /* for reading status version 3 */ -@@ -398,7 +395,7 @@ static int multi3_read (char *name, FILE *fh) - char buffer[1024]; - char *fields[15]; - const int max_fields = STATIC_ARRAY_SIZE (fields); -- int fields_num, read = 0; -+ int fields_num; - long long sum_users = 0; - - while (fgets (buffer, sizeof (buffer), fh) != NULL) -@@ -447,18 +444,15 @@ static int multi3_read (char *name, FILE *fh) - atoll (fields[5])); /* "Bytes Sent" */ - } - } -- -- read = 1; - } - } - - if (collect_user_count) - { - numusers_submit(name, name, sum_users); -- read = 1; - } - -- return (read); -+ return (1); - } /* int multi3_read */ - - /* for reading status version 4 */ -@@ -467,7 +461,7 @@ static int multi4_read (char *name, FILE *fh) - char buffer[1024]; - char *fields[11]; - const int max_fields = STATIC_ARRAY_SIZE (fields); -- int fields_num, read = 0; -+ int fields_num; - long long sum_users = 0; - - while (fgets (buffer, sizeof (buffer), fh) != NULL) -@@ -515,17 +509,14 @@ static int multi4_read (char *name, FILE *fh) - atoll (fields[5])); /* "Bytes Sent" */ - } - } -- -- read = 1; - } - - if (collect_user_count) - { - numusers_submit(name, name, sum_users); -- read = 1; - } - -- return (read); -+ return (1); - } /* int multi4_read */ - - /* read callback */ --- -1.9.3 - diff --git a/src/patches/collectd/0021-openvpn-Fix-copy-and-paste-error.patch b/src/patches/collectd/0021-openvpn-Fix-copy-and-paste-error.patch deleted file mode 100644 index 65c293d70..000000000 --- a/src/patches/collectd/0021-openvpn-Fix-copy-and-paste-error.patch +++ /dev/null @@ -1,25 +0,0 @@ -From 41253b68808deade2a1866f0c24f4bbc029a92c2 Mon Sep 17 00:00:00 2001 -From: Michael Tremer -Date: Wed, 24 Sep 2014 14:38:04 +0200 -Subject: [PATCH 21/22] openvpn: Fix copy-and-paste error - ---- - src/openvpn.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/openvpn.c b/src/openvpn.c -index f686721..2db3677 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -293,7 +293,7 @@ static int multi1_read (char *name, FILE *fh) - continue; - - // Ignore not yet fully established connections -- if (strcmp(fields[1], "UNDEF") == 0) -+ if (strcmp(fields[0], "UNDEF") == 0) - continue; - - if (collect_user_count) --- -1.9.3 - diff --git a/src/patches/collectd/0022-openvpn-Change-data-type-from-COUNTER-to-DERIVE.patch b/src/patches/collectd/0022-openvpn-Change-data-type-from-COUNTER-to-DERIVE.patch deleted file mode 100644 index 0704a6b7f..000000000 --- a/src/patches/collectd/0022-openvpn-Change-data-type-from-COUNTER-to-DERIVE.patch +++ /dev/null @@ -1,107 +0,0 @@ -From 3458d610e8b99eb88c2f06ad576b4f46e0169877 Mon Sep 17 00:00:00 2001 -From: Michael Tremer -Date: Fri, 26 Sep 2014 12:02:27 +0200 -Subject: [PATCH 22/22] openvpn: Change data type from COUNTER to DERIVE - -COUNTER is not what we want here, so we will use DERIVE. ---- - src/openvpn.c | 26 +++++++++++++------------- - src/types.db | 2 ++ - 2 files changed, 15 insertions(+), 13 deletions(-) - -diff --git a/src/openvpn.c b/src/openvpn.c -index 2db3677..d446e99 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -116,13 +116,13 @@ static void numusers_submit (char *pinst, char *tinst, gauge_t value) - } /* void numusers_submit */ - - /* dispatches stats about traffic (TCP or UDP) generated by the tunnel per single endpoint */ --static void iostats_submit (char *pinst, char *tinst, counter_t rx, counter_t tx) -+static void iostats_submit (char *pinst, char *tinst, derive_t rx, derive_t tx) - { - value_t values[2]; - value_list_t vl = VALUE_LIST_INIT; - -- values[0].counter = rx; -- values[1].counter = tx; -+ values[0].derive = rx; -+ values[1].derive = tx; - - /* NOTE ON THE NEW NAMING SCHEMA: - * using plugin_instance to identify each vpn config (and -@@ -137,7 +137,7 @@ static void iostats_submit (char *pinst, char *tinst, counter_t rx, counter_t tx - if (pinst != NULL) - sstrncpy (vl.plugin_instance, pinst, - sizeof (vl.plugin_instance)); -- sstrncpy (vl.type, "if_octets", sizeof (vl.type)); -+ sstrncpy (vl.type, "if_octets_derive", sizeof (vl.type)); - if (tinst != NULL) - sstrncpy (vl.type_instance, tinst, sizeof (vl.type_instance)); - -@@ -146,13 +146,13 @@ static void iostats_submit (char *pinst, char *tinst, counter_t rx, counter_t tx - - /* dispatches stats about data compression shown when in single mode */ - static void compression_submit (char *pinst, char *tinst, -- counter_t uncompressed, counter_t compressed) -+ derive_t uncompressed, derive_t compressed) - { - value_t values[2]; - value_list_t vl = VALUE_LIST_INIT; - -- values[0].counter = uncompressed; -- values[1].counter = compressed; -+ values[0].derive = uncompressed; -+ values[1].derive = compressed; - - vl.values = values; - vl.values_len = STATIC_ARRAY_SIZE (values); -@@ -161,7 +161,7 @@ static void compression_submit (char *pinst, char *tinst, - if (pinst != NULL) - sstrncpy (vl.plugin_instance, pinst, - sizeof (vl.plugin_instance)); -- sstrncpy (vl.type, "compression", sizeof (vl.type)); -+ sstrncpy (vl.type, "compression_derive", sizeof (vl.type)); - if (tinst != NULL) - sstrncpy (vl.type_instance, tinst, sizeof (vl.type_instance)); - -@@ -175,11 +175,11 @@ static int single_read (char *name, FILE *fh) - const int max_fields = STATIC_ARRAY_SIZE (fields); - int fields_num, read = 0; - -- counter_t link_rx, link_tx; -- counter_t tun_rx, tun_tx; -- counter_t pre_compress, post_compress; -- counter_t pre_decompress, post_decompress; -- counter_t overhead_rx, overhead_tx; -+ derive_t link_rx, link_tx; -+ derive_t tun_rx, tun_tx; -+ derive_t pre_compress, post_compress; -+ derive_t pre_decompress, post_decompress; -+ derive_t overhead_rx, overhead_tx; - - link_rx = 0; - link_tx = 0; -diff --git a/src/types.db b/src/types.db -index ad54240..03ec75b 100644 ---- a/src/types.db -+++ b/src/types.db -@@ -18,6 +18,7 @@ cache_result value:COUNTER:0:4294967295 - cache_size value:GAUGE:0:4294967295 - charge value:GAUGE:0:U - compression uncompressed:COUNTER:0:U, compressed:COUNTER:0:U -+compression_derive uncompressed:DERIVE:0:U, compressed:DERIVE:0:U - compression_ratio value:GAUGE:0:2 - connections value:COUNTER:0:U - conntrack entropy:GAUGE:0:4294967295 -@@ -74,6 +75,7 @@ if_dropped rx:COUNTER:0:4294967295, tx:COUNTER:0:4294967295 - if_errors rx:COUNTER:0:4294967295, tx:COUNTER:0:4294967295 - if_multicast value:COUNTER:0:4294967295 - if_octets rx:COUNTER:0:4294967295, tx:COUNTER:0:4294967295 -+if_octets_derive rx:DERIVE:0:U, tx:DERIVE:0:U - if_packets rx:COUNTER:0:4294967295, tx:COUNTER:0:4294967295 - if_rx_errors value:COUNTER:0:4294967295 - if_tx_errors value:COUNTER:0:4294967295 --- -1.9.3 - diff --git a/src/patches/collectd/collectd-4.10.9-cpufreq_skip_disabled_cores.patch b/src/patches/collectd/collectd-4.10.9-cpufreq_skip_disabled_cores.patch deleted file mode 100644 index e8851b6c7..000000000 --- a/src/patches/collectd/collectd-4.10.9-cpufreq_skip_disabled_cores.patch +++ /dev/null @@ -1,18 +0,0 @@ -diff -Naur collectd-4.10.9.org/src/cpufreq.c collectd-4.10.9/src/cpufreq.c ---- collectd-4.10.9.org/src/cpufreq.c 2013-04-08 08:26:17.000000000 +0200 -+++ collectd-4.10.9/src/cpufreq.c 2024-04-04 15:33:52.705372940 +0200 -@@ -104,12 +104,9 @@ - - if (fgets (buffer, 16, fp) == NULL) - { -- char errbuf[1024]; -- WARNING ("cpufreq: fgets: %s", -- sstrerror (errno, errbuf, -- sizeof (errbuf))); - fclose (fp); -- return (-1); -+ cpufreq_submit (i, NAN); -+ break; - } - - if (fclose (fp)) diff --git a/src/patches/collectd/silence-openvpn-errors.patch b/src/patches/collectd/silence-openvpn-errors.patch deleted file mode 100644 index c2584864a..000000000 --- a/src/patches/collectd/silence-openvpn-errors.patch +++ /dev/null @@ -1,64 +0,0 @@ -diff --git a/src/openvpn.c b/src/openvpn.c -index d446e9957b68..ef5bf1078285 100644 ---- a/src/openvpn.c -+++ b/src/openvpn.c -@@ -70,6 +70,7 @@ static const char *config_keys[] = - }; - static int config_keys_num = STATIC_ARRAY_SIZE (config_keys); - -+static int version_detect (const char *filename); - - /* Helper function - * copy-n-pasted from common.c - changed delim to "," */ -@@ -540,6 +541,11 @@ static int openvpn_read (void) - continue; - } - -+ // If the version was not detected yet, we try to guess again -+ if (vpn_list[i]->version == 0) { -+ vpn_list[i]->version = version_detect(vpn_list[i]->file); -+ } -+ - switch (vpn_list[i]->version) - { - case SINGLE: -@@ -567,7 +573,7 @@ static int openvpn_read (void) - read += vpn_read; - } - -- return (read ? 0 : -1); -+ return 0; - } /* int openvpn_read */ - - static int version_detect (const char *filename) -@@ -630,16 +636,6 @@ static int version_detect (const char *filename) - } - } - -- if (version == 0) -- { -- /* This is only reached during configuration, so complaining to -- * the user is in order. */ -- NOTICE ("openvpn plugin: %s: Unknown file format, please " -- "report this as bug. Make sure to include " -- "your status file, so the plugin can " -- "be adapted.", filename); -- } -- - fclose (fh); - - return version; -@@ -656,13 +652,6 @@ static int openvpn_config (const char *key, const char *value) - /* try to detect the status file format */ - status_version = version_detect (value); - -- if (status_version == 0) -- { -- WARNING ("openvpn plugin: unable to detect status version, \ -- discarding status file \"%s\".", value); -- return (1); -- } -- - status_file = sstrdup (value); - if (status_file == NULL) - {