aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-15T03:43:59Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8622Busybox trigger fail in chroot environment2019-07-15T03:43:59ZalgitbotBusybox trigger fail in chroot environmentArchitecture :- aarch64
Environment :- chroot
I am facing error while installing any package.
Error :- Executing busybox-1.27.2-r6.trigger
ERROR: busybox-1.27.2-r6.trigger: script exited with error 127
*(from redmine: issue id 86...Architecture :- aarch64
Environment :- chroot
I am facing error while installing any package.
Error :- Executing busybox-1.27.2-r6.trigger
ERROR: busybox-1.27.2-r6.trigger: script exited with error 127
*(from redmine: issue id 8622, created on 2018-03-07)*3.7.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/8621GnuPG: Enable support for smartcards via internal CCID driver2019-07-23T11:34:47ZalgitbotGnuPG: Enable support for smartcards via internal CCID driverIt is useful for personal machines to enable the internal CCID driver as
part of GnuPG, as well as scdaemon, and libusb support. This will allow
GnuPG to use smartcards out-of-the-box (e.g. Yubikey devices, cards
corresponding to the Ope...It is useful for personal machines to enable the internal CCID driver as
part of GnuPG, as well as scdaemon, and libusb support. This will allow
GnuPG to use smartcards out-of-the-box (e.g. Yubikey devices, cards
corresponding to the OpenPGP card specification, etc), and typically
requires considerably less configuration than PCSC-lite and its external
CCID driver.
The build-time options should be as follows:
\- Build scdaemon: —enable-scdaemon
- Enable GnuPG’s internal CCID driver: —enable-ccid-driver
Additional dependencies: libusb. There will be a build-time dependency
on the libusb-dev package too. The libusb dependency is not small, but
in comparison to the entire GnuPG 2.x suite, it’s not a significant
increase, however. It may make sense to split the GnuPG package up as
Debian do, but this would probably incur additional workload and may not
make sense given that some of the components of GnuPG 2.x are not widely
used (other than a few libraries) outside of GnuPG 2.x itself.
Some caveats: In order to use this as a regular user, a given user must
have permissions to the USB device. A given user can do this via udev
rules (Debian provide a very comprehensive set of udev rules, which are
part of their separate scdaemon package: e.g.
https://packages.debian.org/stretch/amd64/scdaemon/filelist), or in the
case of Gentoo, just create a group called “usb” which provides any
given member access to USB devices. The latter solution will probably
work in all cases, but it is not clear how safe it is to do this; it may
depend on the use-case, so the former probably makes sense.
*(from redmine: issue id 8621, created on 2018-03-07, closed on 2018-06-01)*
* Changesets:
* Revision 25365ec0f1695bc87e17f6a192b347c0d4b3a510 on 2018-05-30T14:21:20Z:
```
main/gnupg: Enabled smartcard support as subpkg
- Added gnupg-scdaemon as subpackage
- Enabled internal CCID driver (support for Gnuk, NitroKey, YubiKey, ...)
- Added 60-scdaemon.rules udev rules to provide access to group gnupg
- Added pre-install for subpackage to create group gnupg
Fixes #8621
```3.8.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/8619Collision in ghostscript-fonts & libwmf2019-07-23T11:34:48ZAndy PostnikovCollision in ghostscript-fonts & libwmfSteps to reproduce
/ # apk add ghostscript-fonts
(1/1) Installing ghostscript-fonts (8.11-r1)
OK: 9 MiB in 12 packages
/ # apk add libwmf
(1/6) Installing expat (2.2.5-r0)
(2/6) Installing libbz2 (1.0.6-r6)
(...Steps to reproduce
/ # apk add ghostscript-fonts
(1/1) Installing ghostscript-fonts (8.11-r1)
OK: 9 MiB in 12 packages
/ # apk add libwmf
(1/6) Installing expat (2.2.5-r0)
(2/6) Installing libbz2 (1.0.6-r6)
(3/6) Installing libpng (1.6.34-r1)
(4/6) Installing freetype (2.9-r0)
(5/6) Installing libjpeg-turbo (1.5.3-r1)
(6/6) Installing libwmf (0.2.8.4-r3)
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021003l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/s050000l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019023l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019004l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022003l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019003l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021023l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022004l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022024l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021024l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022023l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019024l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021004l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022004l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019004l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022023l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021003l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019003l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021024l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022024l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n022003l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021004l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019024l.afm owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n019023l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/n021023l.pfb owned by ghostscript-fonts-8.11-r1.
ERROR: libwmf-0.2.8.4-r3: trying to overwrite usr/share/fonts/Type1/s050000l.pfb owned by ghostscript-fonts-8.11-r1.
Executing busybox-1.27.2-r7.trigger
1 error; 12 MiB in 18 packages
*(from redmine: issue id 8619, created on 2018-03-06, closed on 2019-05-03)*
* Changesets:
* Revision 7997a33e65edacf173886a84da67ab13bb3190dd by Andy Postnikov on 2018-03-24T12:39:06Z:
```
community/libwmf: resolve conflict with ghostscript-fonts
Modernize while being here.
Fixes #8619
```Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8618tcsh should add self in /etc/shells file2019-07-23T11:34:48ZMilan P. Stanićtcsh should add self in /etc/shells fileInstall script for tcsh package should add self in the /etc/shells file
so the chsh can change default shell for the (non root) user.
Here is what chsh says now:
——————————————————-
cl:~$ chsh
Password:
Changing the login shell...Install script for tcsh package should add self in the /etc/shells file
so the chsh can change default shell for the (non root) user.
Here is what chsh says now:
——————————————————-
cl:~$ chsh
Password:
Changing the login shell for lila
Enter the new value, or press ENTER for the default
Login Shell \[/bin/ash\]: /bin/tcsh
chsh: /bin/tcsh is an invalid shell
——————————————————-
And, maybe it should remove self from the /etc/shells after
deinstallation/removal, but I’m not sure about that
*(from redmine: issue id 8618, created on 2018-03-06, closed on 2019-03-16)*
* Changesets:
* Revision 2fd76197ae6e35e29552e7466bffeb513deba924 on 2018-03-07T10:18:07Z:
```
testing/tcsh: add /bin/tcsh to /etc/shells
Fixes #8618
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/8617[3.4] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541)2019-07-23T11:34:49ZAlicha CH[3.4] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541)**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may c...**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may crash
Xen
Xen versions 4.0 and newer are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-255.html
*(from redmine: issue id 8617, created on 2018-03-06, closed on 2018-03-19)*
* Relations:
* copied_to #8612
* parent #8612
* Changesets:
* Revision 0cfa2abffc5ad51933b5969c177bd1c441ea06f2 on 2018-03-12T13:58:06Z:
```
main/xen: security fixes
CVE-2018-7540, XSA-252
CVE-2018-7541, XSA-255
Fixes #8617
```3.4.7Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8616[3.5] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541)2019-07-23T11:34:50ZAlicha CH[3.5] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541)**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may c...**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may crash
Xen
Xen versions 4.0 and newer are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-255.html
*(from redmine: issue id 8616, created on 2018-03-06, closed on 2018-03-19)*
* Relations:
* copied_to #8612
* parent #8612
* Changesets:
* Revision a95df62881a771a994c4b38730c4c69b0bf07a0e on 2018-03-12T11:17:05Z:
```
main/xen: security fixes
CVE-2018-7540, XSA-252
CVE-2018-7541, XSA-255
Fixes #8616
```3.5.3Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8615[3.6] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)2019-07-23T11:34:51ZAlicha CH[3.6] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may c...**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may crash
Xen
Xen versions 4.0 and newer are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-255.html
**CVE-2018-7542, XSA-256**: x86 PVH guest without LAPIC may DoS the host
Xen version 4.8 and onwards are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-256.html
*(from redmine: issue id 8615, created on 2018-03-06, closed on 2018-03-19)*
* Relations:
* copied_to #8612
* parent #8612
* Changesets:
* Revision 7a017e10fd6de2f5477c69120b540b2cd74652a1 on 2018-03-12T10:56:07Z:
```
main/xen: security fixes
CVE-2018-7540, CVE-2018-7541, CVE-2018-7542
Fixes #8615
```3.6.3Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8614[3.7] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)2019-07-23T11:34:52ZAlicha CH[3.7] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may c...**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may crash
Xen
Xen versions 4.0 and newer are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-255.html
**CVE-2018-7542, XSA-256**: x86 PVH guest without LAPIC may DoS the host
Xen version 4.8 and onwards are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-256.html
*(from redmine: issue id 8614, created on 2018-03-06, closed on 2018-03-19)*
* Relations:
* copied_to #8612
* parent #8612
* Changesets:
* Revision 1fb3325abc8bc3f37fa93c0663908c29e9154087 on 2018-03-06T12:31:18Z:
```
main/xen: security fixes
CVE-2018-7540, XSA-252
CVE-2018-7541, XSA-255
CVE-2018-7542, XSA-256
Fixes #8614
```3.7.1Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8613[3.8] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)2019-07-23T11:34:53ZAlicha CH[3.8] xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may c...**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may crash
Xen
Xen versions 4.0 and newer are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-255.html
**CVE-2018-7542, XSA-256**: x86 PVH guest without LAPIC may DoS the host
Xen version 4.8 and onwards are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-256.html
*(from redmine: issue id 8613, created on 2018-03-06, closed on 2018-03-19)*
* Relations:
* copied_to #8612
* parent #8612
* Changesets:
* Revision 6f854a08591e446ab616d0aac83e843cddcff8a9 by Daniel Sabogal on 2018-03-19T08:17:54Z:
```
main/xen: security fixes for XSA-252, XSA-255, and XSA-256
CVE-2018-7540 XSA-252
CVE-2018-7541 XSA-255
CVE-2018-7542 XSA-256
fixes #8613
```3.8.0Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8612xen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)2019-07-23T11:34:55ZAlicha CHxen: Multiple vulnerabilitie (CVE-2018-7540, CVE-2018-7541, CVE-2018-7542)**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may c...**CVE-2018-7540, XSA-252**: DoS via non-preemptable L3/L4 pagetable
freeing
All Xen versions are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-252.html
**CVE-2018-7541, XSA-255**: grant table v2 ->v1 transition may crash
Xen
Xen versions 4.0 and newer are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-255.html
**CVE-2018-7542, XSA-256**: x86 PVH guest without LAPIC may DoS the host
Xen version 4.8 and onwards are vulnerable.
### Reference:
http://xenbits.xen.org/xsa/advisory-256.html
*(from redmine: issue id 8612, created on 2018-03-06, closed on 2018-03-19)*
* Relations:
* copied_to #8613
* copied_to #8614
* copied_to #8615
* copied_to #8616
* copied_to #8617
* child #8613
* child #8614
* child #8615
* child #8616
* child #8617Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8611dovecot: TLS logins not working with default configuration2019-07-23T11:34:56ZKaarle Ritvanendovecot: TLS logins not working with default configurationStarting from dovecot version 2.2.34, TLS logins are failing with the
following error message:
Fatal: Unknown ssl\_protocols setting: Unrecognized protocol ‘SSLv2’
Libressl does not support SSLv2, but dovecot assumes the contrary
becau...Starting from dovecot version 2.2.34, TLS logins are failing with the
following error message:
Fatal: Unknown ssl\_protocols setting: Unrecognized protocol ‘SSLv2’
Libressl does not support SSLv2, but dovecot assumes the contrary
because macro SSL\_TXT\_SSLv2 is defined. Manually setting the
ssl\_protocols option resolves the problem.
*(from redmine: issue id 8611, created on 2018-03-06, closed on 2018-03-24)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8609mkintifs: nlplug-findfs mount zfs filesystems on import2021-09-28T13:23:19ZAlexander Zubkovmkintifs: nlplug-findfs mount zfs filesystems on importHello. As I see nlplug-findgs calls zpool import without any additional
parameters during its work:
https://github.com/alpinelinux/mkinitfs/blob/master/nlplug-findfs.c\#L508
In that case imported pool’s filesystems are mounted by defa...Hello. As I see nlplug-findgs calls zpool import without any additional
parameters during its work:
https://github.com/alpinelinux/mkinitfs/blob/master/nlplug-findfs.c\#L508
In that case imported pool’s filesystems are mounted by default if they
have mounpoint properties.
When later initramfs pivots into new root, they are left there mounted
and can not be used because zfs thinks they are already mounted and
cannot unmount them at the same time.
I think it would be better to do zpool import with “-N” option to not
mount filesystems by default and then mount specified root filesystem
somehow.
Also, I think providing some means to specify “-f” option would be nice
too in cases when pool that was imported to other system needs to be
imported.
*(from redmine: issue id 8609, created on 2018-03-05)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8608Memcache 1.5.3 not working2019-12-05T06:15:40ZKévin GuignardMemcache 1.5.3 not workingHi, **memcached 1.5.3** of Alpine **3.7** is not working : the basic
test with ***telnet*** give nothing.
The connection is opened but the server doesn’t respond anything.
Also the version 1.4.36 from Alpine 3.6 works like a charm.
...Hi, **memcached 1.5.3** of Alpine **3.7** is not working : the basic
test with ***telnet*** give nothing.
The connection is opened but the server doesn’t respond anything.
Also the version 1.4.36 from Alpine 3.6 works like a charm.
*(from redmine: issue id 8608, created on 2018-03-05)*3.7.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/8607Could someone please create a package for php7-gearman?2019-07-23T11:34:57ZalgitbotCould someone please create a package for php7-gearman?Note:
The pecl repo (https://pecl.php.net/package/gearman) is abandoned, php7
support and v2.0.3 is available from wcgallego on github.
See these for context:
https://github.com/hjr3/pecl-gearman/issues/12
https://github.com/wcgal...Note:
The pecl repo (https://pecl.php.net/package/gearman) is abandoned, php7
support and v2.0.3 is available from wcgallego on github.
See these for context:
https://github.com/hjr3/pecl-gearman/issues/12
https://github.com/wcgallego/pecl-gearman/issues/33
I use the below to build currently and it seems to work ok. Would
someone be able to drop it into a package?
<code>
# Depends
apk add --update -X 'http://dl-cdn.alpinelinux.org/alpine/edge/testing' \
gearman-libs
# Build Depends
apk add --update -X 'http://dl-cdn.alpinelinux.org/alpine/edge/testing' \
gearman-dev \
php7-dev \
build-base
# Build
mkdir -p /tmp/install
cd /tmp/install
wget https://github.com/wcgallego/pecl-gearman/archive/gearman-2.0.3.zip
unzip gearman-*.zip
cd pecl-gearman-gearman-*
phpize
./configure
make install
echo "extension=gearman.so" > /etc/php7/conf.d/51_gearman.ini
rm -rf /tmp/install/
apk del --purge php7-dev build-base gearman-dev
</code>
*(from redmine: issue id 8607, created on 2018-03-05, closed on 2018-03-07)*3.8.0Valery KartelValery Kartelhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/8606Compile kernel with AppArmor and SELinux enabled2021-03-18T08:56:19ZVincent BentleyCompile kernel with AppArmor and SELinux enabledWith hardened Alpine Linux kernels likely to be a thing of the past
soon, can we have AppArmor and SELinux enabled in new kernels?
*(from redmine: issue id 8606, created on 2018-03-04)*With hardened Alpine Linux kernels likely to be a thing of the past
soon, can we have AppArmor and SELinux enabled in new kernels?
*(from redmine: issue id 8606, created on 2018-03-04)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8605Firefox won't start2019-07-14T19:06:01ZFredrik GustafssonFirefox won't startUsing the edge version, firefox won’t start with the following error
message:
XPCOMGlueLoad error for file /usr/lib/firefox-58.0.1/libxul.so:
Error relocating /usr/lib/firefox-58.0.1/libxul.so:
sqlite3\_unlock\_notify: symbol not fou...Using the edge version, firefox won’t start with the following error
message:
XPCOMGlueLoad error for file /usr/lib/firefox-58.0.1/libxul.so:
Error relocating /usr/lib/firefox-58.0.1/libxul.so:
sqlite3\_unlock\_notify: symbol not found
Couldn’t load XPCOM.
*(from redmine: issue id 8605, created on 2018-03-04)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8604Google maps not working2020-01-19T14:50:04ZFredrik GustafssonGoogle maps not workingusing chromium on edge, google maps hangs every time it’s loaded.
Reproduce:
1. goto maps.google.com
2. try to interact with the page, for example zoom
*(from redmine: issue id 8604, created on 2018-03-04)*using chromium on edge, google maps hangs every time it’s loaded.
Reproduce:
1. goto maps.google.com
2. try to interact with the page, for example zoom
*(from redmine: issue id 8604, created on 2018-03-04)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8603add dotnet core Runtime and SDK packages2022-02-26T15:59:42Zalgitbotadd dotnet core Runtime and SDK packages.NET team has provided the docker image for Alpine Linux and suggested
us to have community driven package:
https://github.com/dotnet/dotnet-docker/issues/22\#issuecomment-346215352.
.NET Core 2.1 is the upcoming version, currently in pr....NET team has provided the docker image for Alpine Linux and suggested
us to have community driven package:
https://github.com/dotnet/dotnet-docker/issues/22\#issuecomment-346215352.
.NET Core 2.1 is the upcoming version, currently in preview:
docker run -it microsoft/dotnet:2.1-sdk-alpine
this container has runtime dependencies, runtime and SDK. To test:
<code class="text">
dotnet new console -n mytest
cd mytest
dotnet run
</code>
Runtime Dependencies:
https://github.com/dotnet/dotnet-docker/blob/ccccaf7/2.1/runtime-deps/alpine/amd64/Dockerfile
Runtime:
https://github.com/dotnet/dotnet-docker/blob/ccccaf7/2.1/runtime/alpine/amd64/Dockerfile
SDK:
https://github.com/dotnet/dotnet-docker/blob/ccccaf7/2.1/sdk/alpine/amd64/Dockerfile
If anyone has knowledge how to build Alpine packages out of Docker,
please create separate packages for runtime and SDK (as we can switch
runtime / SDK in existing installation).
Packages from other official distros (.NET Core 2.0 released version):
https://packages.microsoft.com/
*(from redmine: issue id 8603, created on 2018-03-04)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8602zipnote crashes when updating filename in a zip file2020-01-19T14:58:42Zalgitbotzipnote crashes when updating filename in a zip fileTrying to use zipnote to change a filename in a zip file results in a
segfault, for e.g.
$ touch a.txt
$ zip files.zip a.txt
adding: a.txt (stored 0%)
$ printf "@ a.txt\n@=b.txt\n" | zipnote -w files.zip
zipnote er...Trying to use zipnote to change a filename in a zip file results in a
segfault, for e.g.
$ touch a.txt
$ zip files.zip a.txt
adding: a.txt (stored 0%)
$ printf "@ a.txt\n@=b.txt\n" | zipnote -w files.zip
zipnote error: Bad file descriptor
zipnote error: Temporary file failure (ziPHFCbk)
zipnote error: Interrupted (aborting)
Segmentation fault (core dumped)
Apparently this is an old bug in zip 3.0 which was only fixed in an
unreleased 3.1b version (according to
https://www.linuxquestions.org/questions/slackware-14/request-slackware-info-zip-zipnote-be-patched-to-support-writing-back-comments-4175502665/).
However, the fix has been applied on other Linux distros (e.g.
https://bugs.archlinux.org/task/47713 and
https://bugzilla.redhat.com/show\_bug.cgi?id=1179420)
I tried the same patch on alpine 3.7 and fixed the issue.
<pre>
$ apk add build-base
$ wget ftp://ftp.info-zip.org/pub/infozip/src/zip30.zip
$ unzip zip30.zip
$ cd zip30
$ cat ../zipnote.patch
a/zipnote.c b/zipnote.c
index 5e02cb6..996f012 100644
—- a/zipnote.c
<span class="underline"></span>+ b/zipnote.c
@@ –661,7 +661,7 @@ char \***argv; /** command line tokens \*/
if ((r = zipcopy(z)) != ZE\_OK)
ziperr(r, “was copying an entry”);
}
- fclose(x);
+ fclose(in\_file);
/\* Write central directory and end of central directory with new
comments \*/
if ((c = zftello(y)) == (zoff\_t)–1) /\* get start of central \*/
$ patch -p1 < ../zipnote.patch
$ make -f unix/Makefile generic
$ printf “@ a.txt\\n@=b.txt\\n” | zip30/zipnote -w files.zip
$ unzip -l files.zip
Archive: files.zip
Length Date Time Name
————- ————— ——- ——
0 03-03-2018 04:17 b.txt
———— ———-
0 1 files
*(from redmine: issue id 8602, created on 2018-03-03)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8601if grub is used, why to load /etc/update-extlinux.conf2019-07-23T11:34:58Zjiri bif grub is used, why to load /etc/update-extlinux.confHi,
apk del syslinux
apk add grub
…so one wants to use grub. but why is grub patched to load a kind of
syslinux (extlinux) related script?
1. grep -nC3 /etc/update-extlinux.conf /etc/grub.d/10\_linux
21-exec\_prefix=“/usr”
...Hi,
apk del syslinux
apk add grub
…so one wants to use grub. but why is grub patched to load a kind of
syslinux (extlinux) related script?
1. grep -nC3 /etc/update-extlinux.conf /etc/grub.d/10\_linux
21-exec\_prefix=“/usr”
22-datarootdir=“/usr/share”
23-
24:. /etc/update-extlinux.conf
25-. “$pkgdatadir/grub-mkconfig\_lib”
26-
27-GRUB\_CMDLINE\_LINUX\_DEFAULT=“modules=${modules}
${default\_kernel\_opts} ${GRUB\_CMDLINE\_LINUX\_DEFAULT}”
imo there should be condition if possible.
*(from redmine: issue id 8601, created on 2018-03-02, closed on 2019-01-23)*
* Changesets:
* Revision cb6c7c4b66dc4640425f875c7d9545dad9e7823c by Natanael Copa on 2019-01-17T18:59:46Z:
```
main/grub: misc alpine fixes for /etc/grub.d/10_linux
- do not depend on /etc/update-extlinux.conf
- remove GNU when GRUB_DISTRIBUTOR="Alpine"
- clean up initramfs search
fixes #8601
```3.9.0Natanael CopaNatanael Copa