head 1.4; access; symbols pkgsrc-2024Q3:1.3.0.14 pkgsrc-2024Q3-base:1.3 pkgsrc-2024Q2:1.3.0.12 pkgsrc-2024Q2-base:1.3 pkgsrc-2024Q1:1.3.0.10 pkgsrc-2024Q1-base:1.3 pkgsrc-2023Q4:1.3.0.8 pkgsrc-2023Q4-base:1.3 pkgsrc-2023Q3:1.3.0.6 pkgsrc-2023Q3-base:1.3 pkgsrc-2023Q2:1.3.0.4 pkgsrc-2023Q2-base:1.3 pkgsrc-2023Q1:1.3.0.2 pkgsrc-2023Q1-base:1.3 pkgsrc-2022Q4:1.2.0.16 pkgsrc-2022Q4-base:1.2 pkgsrc-2022Q3:1.2.0.14 pkgsrc-2022Q3-base:1.2 pkgsrc-2022Q2:1.2.0.12 pkgsrc-2022Q2-base:1.2 pkgsrc-2022Q1:1.2.0.10 pkgsrc-2022Q1-base:1.2 pkgsrc-2021Q4:1.2.0.8 pkgsrc-2021Q4-base:1.2 pkgsrc-2021Q3:1.2.0.6 pkgsrc-2021Q3-base:1.2 pkgsrc-2021Q2:1.2.0.4 pkgsrc-2021Q2-base:1.2 pkgsrc-2021Q1:1.2.0.2 pkgsrc-2021Q1-base:1.2; locks; strict; comment @// @; 1.4 date 2024.11.22.15.31.29; author ryoon; state dead; branches; next 1.3; commitid U1iCBeeuP6ISHEyF; 1.3 date 2023.01.22.17.34.20; author ryoon; state Exp; branches; next 1.2; commitid VyjPTi9ewVPgVyaE; 1.2 date 2021.01.17.13.22.26; author wiz; state Exp; branches; next 1.1; commitid CxizHIYVwqUw95EC; 1.1 date 2021.01.15.00.37.17; author wiz; state Exp; branches; next ; commitid wH57GdvbJdc9ZKDC; desc @@ 1.4 log @net/icinga2: Update to 2.12.11 Changelog: 2.12.11: This security release fixes a TLS certificate validation bypass. Given the severity of that issue, users are advised to upgrade all nodes immediately. Security: fix TLS certificate validation bypass. CVE-2024-49369 Security: update OpenSSL shipped on Windows to v3.0.15. Windows: sign MSI packages with a certificate the OS trusts by default. 2.12.10: This security release updates Boost and OpenSSL libraries bundled on Windows and repairs broken SELinux policies. Security Windows: update bundled OpenSSL to v1.1.1t. #9686 Bugfixes SELinux: fix user and domain creation by explicitly setting the role. #9689 Enhancements Windows: update bundled Boost to v1.81. #9686 @ text @$NetBSD: patch-lib_remote_httpserverconnection.cpp,v 1.3 2023/01/22 17:34:20 ryoon Exp $ --- lib/remote/httpserverconnection.cpp.orig 2022-06-29 17:15:18.000000000 +0000 +++ lib/remote/httpserverconnection.cpp @@@@ -32,7 +32,7 @@@@ using namespace icinga; -auto const l_ServerHeader ("Icinga/" + Application::GetAppVersion()); +auto const l_ServerHeader (("Icinga/" + Application::GetAppVersion()).CStr()); HttpServerConnection::HttpServerConnection(const String& identity, bool authenticated, const Shared::Ptr& stream) : HttpServerConnection(identity, authenticated, stream, IoEngine::Get().GetIoContext()) @@@@ -246,7 +246,7 @@@@ bool HandleAccessControl( if (!allowedOrigins.empty()) { auto& origin (request[http::field::origin]); - if (allowedOrigins.find(origin.to_string()) != allowedOrigins.end()) { + if (allowedOrigins.find(std::string(origin)) != allowedOrigins.end()) { response.set(http::field::access_control_allow_origin, origin); } @@@@ -536,7 +536,7 @@@@ void HttpServerConnection::ProcessMessag if (!authenticatedUser) { CpuBoundWork fetchingAuthenticatedUser (yc); - authenticatedUser = ApiUser::GetByAuthHeader(request[http::field::authorization].to_string()); + authenticatedUser = ApiUser::GetByAuthHeader(std::string(request[http::field::authorization])); } Log logMsg (LogInformation, "HttpServerConnection"); @ 1.3 log @icinga2: Update to 2.12.9 * Remove some patches backported from upstream. * Fix build with Boost 1.81.0. Changelog: Not available for 2.12.9 @ text @d1 1 a1 1 $NetBSD$ @ 1.2 log @icinga2: fix build/package on macOS From MAINTAINER Edgar Fuß. @ text @d1 1 a1 1 $NetBSD: patch-lib_remote_httpserverconnection.cpp,v 1.1 2021/01/15 00:37:17 wiz Exp $ d3 27 a29 48 Support Boost 1.74 when setting HTTP headers Upstream Issue #8185, Pull Request #8575, commit 339b37a985b5f67ce5f0d2e02211d2c5b98a5d45 --- lib/remote/httpserverconnection.cpp.orig 2020-08-03 15:43:47.000000000 +0200 +++ lib/remote/httpserverconnection.cpp 2021-01-14 19:30:36.695215485 +0100 @@@@ -186,7 +186,7 @@@@ } else { response.set(http::field::content_type, "text/html"); response.body() = String("

Bad Request

") + errorMsg + "

"; - response.set(http::field::content_length, response.body().size()); + response.content_length(response.body().size()); } response.set(http::field::connection, "close"); @@@@ -259,7 +259,7 @@@@ response.set(http::field::access_control_allow_methods, "GET, POST, PUT, DELETE"); response.set(http::field::access_control_allow_headers, "Authorization, X-HTTP-Method-Override"); response.body() = "Preflight OK"; - response.set(http::field::content_length, response.body().size()); + response.content_length(response.body().size()); response.set(http::field::connection, "close"); boost::system::error_code ec; @@@@ -290,7 +290,7 @@@@ response.result(http::status::bad_request); response.set(http::field::content_type, "text/html"); response.body() = "

Accept header is missing or not set to 'application/json'.

"; - response.set(http::field::content_length, response.body().size()); + response.content_length(response.body().size()); response.set(http::field::connection, "close"); boost::system::error_code ec; @@@@ -331,7 +331,7 @@@@ } else { response.set(http::field::content_type, "text/html"); response.body() = "

Unauthorized. Please check your user credentials.

"; - response.set(http::field::content_length, response.body().size()); + response.content_length(response.body().size()); } boost::system::error_code ec; @@@@ -423,7 +423,7 @@@@ } else { response.set(http::field::content_type, "text/html"); response.body() = String("

Bad Request

") + ec.message() + "

"; - response.set(http::field::content_length, response.body().size()); + response.content_length(response.body().size()); } d31 1 a31 1 response.set(http::field::connection, "close"); @ 1.1 log @net/icinga2: import icinga2-2.12.3 Packaged by Edgar Fuß for pkgsrc-wip. Icinga 2 is an open source monitoring system which checks the availability of your network resources, notifies users of outages, and generates performance data for reporting. Scalable and extensible, Icinga 2 can monitor large, complex environments across multiple locations. @ text @d1 1 a1 1 $NetBSD: patch-lib_remote_httpserverconnection.cpp $ a3 1 @