From patchwork Thu Sep 7 17:30:08 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 7153 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4RhR924NLbz3wtP for ; Thu, 7 Sep 2023 17:30:46 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4RhR8p6rxSz3g9; Thu, 7 Sep 2023 17:30:34 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4RhR8p415rz306n; Thu, 7 Sep 2023 17:30:34 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4RhR8l3QxZz2ylN for ; Thu, 7 Sep 2023 17:30:31 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4RhR8l0tMWzM6; Thu, 7 Sep 2023 17:30:31 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1694107831; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JBHB7+zvgnPoBnlHHvW2NxHA9oVUq6F9Z/ynuRU6YgQ=; b=laBKUy9lQcbDCqfAnXU9lxdIQfR+57xf5K/mK2km05Lb1VGL5eRS6DUF3X0LiHJrBB5UZv xMpx/6sdVbzlVCAw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1694107831; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JBHB7+zvgnPoBnlHHvW2NxHA9oVUq6F9Z/ynuRU6YgQ=; b=OBWMQWyB90hCd7JPa9DdILEKb1T+AO6vnkFGtZceRczqw3xELax/ra0L124agk5GIUBZ4e jumwx/Hb+VsgUmr1OQq7RoF4Yi7YooK15I6JNJZxwQkPHrpvmkbaBcA1B7fu7c/H80A1gs VYB9ESRGi8sHYIdn81p7OKB3EnaSrdk8VkSPTHfZqbM1a9tDdH5sGrK+SCidFGEDqJ5S8S 1EhKB/eHBscr0dC+15KgQ0MqYNKRs0Kf5Aer5X3PRCkCVmqol7R374pM03Tk4LuVl8kKko lP5SUg1y6pe7vCMUnMkfXZ0KRM6vc7xSB50g5LgDpRY7I6eC7zMWFnPtYzN87w== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] gzip: Update to version 1.13 Date: Thu, 7 Sep 2023 19:30:08 +0200 Message-ID: <20230907173022.2692770-3-adolf.belka@ipfire.org> In-Reply-To: <20230907173022.2692770-1-adolf.belka@ipfire.org> References: <20230907173022.2692770-1-adolf.belka@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" - Update from version 1.12 to 1.13 - Update of rootfile not required - Changelog Noteworthy changes in release 1.13 (2023-08-19) [stable] Changes in behavior zless now diagnoses gzip failures, if using less 623 or later. When SIGPIPE is ignored, gzip now exits with status 2 (warning) instead of status 1 (error) when writing to a broken pipe. This is more useful with programs like 'less' that treat gzip exit status 2 as a non-failure. Bug fixes 'gzip -d' no longer fails to report invalid compressed data that uses a dictionary distance outside the input window. [bug present since the beginning] Port to C23, which does not allow K&R-style function definitions with parameters, and which does not define __alignas_is_defined. Signed-off-by: Adolf Belka --- lfs/gzip | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/gzip b/lfs/gzip index c669c235f..5101df71f 100644 --- a/lfs/gzip +++ b/lfs/gzip @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2022 IPFire Team # +# Copyright (C) 2007-2023 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -24,7 +24,7 @@ include Config -VER = 1.12 +VER = 1.13 THISAPP = gzip-$(VER) DL_FILE = $(THISAPP).tar.xz @@ -49,7 +49,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 7e2d482c08555f5fb0ff5408c0afe48c61034e9779eed6e3dd8046c847234c0a8a6bc34d49a934a54db0d73033e12c71a228d373551384a4cd663315071637e0 +$(DL_FILE)_BLAKE2 = f0e3b4c28bafcd3b59b65ac2d71218dc58d81b52c6921c1be038757c99e99184178c5d0e9674caa5099713b8b64e8c85cf061f4abfa20b73b478288f121fb05d install : $(TARGET)