[0/6] Patchset for fixing errors surfaced in Core Update 157 (testing)
Message ID | 542b1005-b471-30bf-ead7-1c5dd93d457c@ipfire.org |
---|---|
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4FmnmV3qCCz3wbl for <patchwork@web04.haj.ipfire.org>; Fri, 21 May 2021 13:40:26 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4FmnmT3r6Yz1LK; Fri, 21 May 2021 13:40:25 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4FmnmT1xMlz2xfn; Fri, 21 May 2021 13:40:25 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4FmnmR3sC4z2xb4 for <development@lists.ipfire.org>; Fri, 21 May 2021 13:40:23 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4FmnmP40PGz1LK for <development@lists.ipfire.org>; Fri, 21 May 2021 13:40:21 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1621604422; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=N/jxIT1tB0siyBVrGZOCc7DotqHiJPyzaO0jy1H0Qqw=; b=yEtNUpG/r++ehxnlDHhLMow7yWq7jEN0mPbHe0VBHDtOTuGRy/Zx/w8sz6xdGVlShH5Ci/ LprkFQ8WnbxjnFCw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1621604422; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=N/jxIT1tB0siyBVrGZOCc7DotqHiJPyzaO0jy1H0Qqw=; b=qVLwH7R2l8yuHumQKU8fue/0PS7BDoj4hKuqQ9Q7phSE2IKWJOGm8CS+e4l03DnooOCmpz l/gjhJvFjxwXSEz3WchSsfcBnPC8f67MP9NnkSKzyiPbF+2FBkOtYwjdT8jFx+r2xRDSDQ YnDPOgHJFCsO4B0jYqYd7Zor+U/8N+lM2tkEV77Q6xTjElk+Uz17TQbz5oM3K6yGptEMiO Ch0D8BuF/344pY9/qAU4ZMhlK6vR6GXvUv+xRWJ+vqvSJuJYYiV+F4hH2gT1ka69jK4FNn DMkn5QF6BP8zDCCtOAWt2G0478XF2pPWWOV0kQognq/6g5+hDhBsELwQw8XmHQ== To: "IPFire: Development" <development@lists.ipfire.org> From: =?utf-8?q?Peter_M=C3=BCller?= <peter.mueller@ipfire.org> Subject: [PATCH 0/6] Patchset for fixing errors surfaced in Core Update 157 (testing) Message-ID: <542b1005-b471-30bf-ead7-1c5dd93d457c@ipfire.org> Date: Fri, 21 May 2021 15:40:17 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <https://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <https://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Message
Peter Müller
May 21, 2021, 1:40 p.m. UTC
This patchset fixes various errors in Core Update 157 (testing, see: https://blog.ipfire.org/post/ipfire-2-25-core-update-157-available-for-testing) which surfaced on my testing machine. While the forgotten application of the SSH configuration is tedious, the forgotten shipment of the backup CGI files are more serious, since this is necessary to fix #12619. This was my fault, and rebuilding the Core Update will be necessary to include this fix. Peter Müller (6): Core Update 157: Apply changed SSH configurations Core Update 157: Ship backup package to apply changed permissions pppd: Explicitly ship pppd shared object files Core Update 157: Delete shared object files leftover from pppd 2.4.8 nagios-plugins: Set SUID bit for plugins which need it to function properly Icinga: Do not ship event handlers for Nagios config/rootfiles/common/ppp | 24 +++++++++++----------- config/rootfiles/core/157/filelists/backup | 1 + config/rootfiles/core/157/update.sh | 7 +++++++ config/rootfiles/packages/icinga | 2 +- lfs/icinga | 2 +- lfs/nagios-plugins | 9 +++++++- 6 files changed, 30 insertions(+), 15 deletions(-) create mode 120000 config/rootfiles/core/157/filelists/backup