Commit Graph

32652 Commits

Author SHA1 Message Date
Vladimir Ermakov b44065ec62 qemu: update version to 9.0.2
- Update version
- Refresh patchset

Signed-off-by: Vladimir Ermakov <vooon341@gmail.com>
2024-08-12 09:27:27 +08:00
Dirk Brenken 875fcf3f12
adblock: update to 4.2.1
* added full 1Hosts feed support (4 categories)
* changed the OISD list sources to alternate wildcard domains syntax
* used only the adguard source in default config
* fixed a needless reload delay plus a few cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2024-08-11 09:31:57 +02:00
Martin Kennedy df990b96da realtek-poe: update package to v1.1
v1.1 contains a minor fix to enable PoE devices with
up to 48 ports.

Signed-off-by: Martin Kennedy <hurricos@gmail.com>
2024-08-11 12:27:45 +08:00
Antonio Pastor be5ca7d40f netatalk: Update to 3.2.5
Compile tested/run: ipq806x

No changes to package other than using latest available codebase.

Signed-off-by: Antonio Pastor <apccv@outlook.com>
2024-08-10 16:01:28 -07:00
Michel Promonet 5a6e52d173 v4l2camera: update to v0.2.1
Signed-off-by: Michel Promonet <michel.promonet@free.fr>
2024-08-10 15:53:58 -07:00
Esaaprilia Salsabila 4b52905590 freeradius3: fixup
Signed-off-by: Esaaprilia Salsabila <esaapriliasalsabila@gmail.com>
2024-08-10 15:53:31 -07:00
Stan Grishin 94bc05ccfa
Merge pull request #24739 from stangri/master-adblock-fast
adblock-fast: update to 1.1.2-3
2024-08-10 13:25:19 -07:00
Moritz Warning 3934cfdbdc dhtd: udpate to 1.0.2
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2024-08-10 17:01:01 +08:00
Milinda Brantini 7b4fbfda5d golang: Update to 1.22.6
go1.22.6 (released 2024-08-06) includes fixes to the go command,
the compiler, the linker, the trace command, the covdata command,
and the bytes, go/types, and os/exec packages.

Signed-off-by: Milinda Brantini <C_A_T_T_E_R_Y@outlook.com>
2024-08-10 16:59:36 +08:00
Dirk Brenken 7b18f22e73
adblock: update to 4.2.0
* new gawk dependency
* full hagezi support (all 32 categories)
* refine Stevenblack support
* refine whitelist handling
* fixed tcpdump command line for ports other than 53 (see #24685)

Signed-off-by: Dirk Brenken <dev@brenken.org>
2024-08-09 17:16:46 +02:00
Florian Eckert 4df02492c2
Merge pull request #23798 from gentoo-root/mwan3-fix-awk
mwan3: Fix awk expression in mwan3_delete_iface_rules
2024-08-09 07:53:45 +02:00
Florian Eckert 04da2e2810
Merge pull request #24732 from bluecmd/pr-modemmanager-rpcd
modemmanager: make rpcd integration optional
2024-08-09 07:19:15 +02:00
Hirokazu MORIKAWA 4b426972f8 node: bump to v20.16.0
Notable Changes
	process: add process.getBuiltinModule(id)
	doc: doc-only deprecate OpenSSL engine-based APIs
	inspector: fix disable async hooks on Debugger.setAsyncCallStackDepth

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-08-08 21:40:32 +08:00
Michael Heimpold 8314b299c6
Merge pull request #24753 from mhei/php8-update-to-8.3.10
php8: update to 8.3.10
2024-08-08 07:20:48 +02:00
Christian Svensson f48f15a899 modemmanager: make rpcd integration optional
ModemManager does not depend on Lua by its own, so make it possible to
not have a requirement on Lua if the rpcd integration is not needed.

Signed-off-by: Christian Svensson <blue@cmd.nu>
2024-08-07 15:27:33 +02:00
Milinda Brantini c22e7071ff cloudflared: Update to 2024.8.2
Signed-off-by: Milinda Brantini <C_A_T_T_E_R_Y@outlook.com>
2024-08-07 13:18:45 +08:00
Milinda Brantini 6ae47d20da dnsproxy: Update to 0.72.3
Signed-off-by: Milinda Brantini <C_A_T_T_E_R_Y@outlook.com>
2024-08-07 13:18:27 +08:00
Michael Heimpold e06c27d264 php8: update to 8.3.10
Upstream changelog:
https://www.php.net/ChangeLog-8.php#8.3.10

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2024-08-07 07:01:44 +02:00
Stan Grishin 920d64734a pbr: update to 1.1.6-20
This version is the final version supporting iptables and:

* it separates the old iptables/nft-capable init script from the new nft-only init script
* the new nft-script is a significant rewrite of the old recursive calls/policy parsing
  and tries to create inline nft sets which offers performance improvements

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-08-06 01:44:34 +00:00
Tianling Shen b806d77578 clamav: add missing dependency
clamav needs rust toolchain to build, add $(RUST_ARCH_DEPENDS) to
dependencies to avoid building on unsupported architectures.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-08-05 15:44:51 +08:00
Philip Prindeville 04dc151b3e bind: bump to 9.20.0
We no longer use "epoll()", but a new library dependency "liburcu"
(user-space RCU) has been added.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2024-08-05 07:00:50 +02:00
Tianling Shen ff5104e642 wgsd: add missing dependency
wgsd is written in Go, add $(GO_ARCH_DEPENDS) to dependencies to avoid
building on unsupported architectures.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-08-05 12:52:59 +08:00
Tianling Shen 8d29874c31 geoipupdate: take over the maintainership
Matthew Hagan has been absent for two years and this package lacks
proper maintenance. As I'm a user of this package, take over the
maintainership.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-08-04 13:13:37 +08:00
Tianling Shen 0b7ec4af65 geoipupdate: Update to 7.0.1
- do not touch default configuration
- put the binary into /usr/bin as it's not a "system" application
- update GO_PKG path
- remove useless init script[1]
- other minor clean up

1. The database directory will be automatically created by the program.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-08-04 13:13:37 +08:00
xiaobo tian c51679d498 adguardhome: add option config
Signed-off-by: xiaobo tian <peterwillcn@gmail.com>
2024-08-04 13:09:23 +08:00
Rosen Penev e238bfa798 rtpmidi: fix compilation with GCC14 and fmt10.2
Added two patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2024-08-04 02:08:51 +01:00
Aleksey Vasilenko 487f3b6374 minizip: update to 4.0.7
Signed-off-by: Aleksey Vasilenko <aleksey.vasilenko@gmail.com>
2024-08-03 16:42:01 -07:00
Stan Grishin 50e85ed27f adblock-fast: update to 1.1.2-3
This version brings two significant updates:
* support for text labels/names for the external lists
* better processing of the config update files, which cleans up
  entries with missing URLs

Also:
* new config file contains names for all lists
* it tries to match existing URLs with the names from the new config file
  and update user config as part of uci-defaults script
* contains minor updates to copyright/license/upstream URL/README
* updates the config update script to remove sysctl.org list as it's outdated
* adds two new remote lists: Hagezi and 1Hosts

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-08-03 23:26:26 +00:00
Philip Prindeville ee1df08108 kea: update to 2.6.0
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2024-08-03 14:26:46 -07:00
Christian Svensson 2664e85a64 gawk: set gawk as an alternative to awk
This makes it possible to build without busybox awk.

Signed-off-by: Christian Svensson <blue@cmd.nu>
2024-08-03 19:51:02 +01:00
Stijn Tintel 3cb95bb47e
Merge pull request #24651 from Chris1189/pr/hostname
net-snmp: set hostname as sysname
2024-08-03 16:02:41 +03:00
Aleksey Vasilenko 15c3f375af exfatprogs: update to 1.2.4
- Use proper tarball instead of codeload
- Remove autoreconf - provided configure works all right

Signed-off-by: Aleksey Vasilenko <aleksey.vasilenko@gmail.com>
2024-08-03 11:54:40 +01:00
Aleksey Vasilenko 5a506f78df libcurl-gnutls: update to 8.9.1
Signed-off-by: Aleksey Vasilenko <aleksey.vasilenko@gmail.com>
2024-08-03 11:54:05 +01:00
Luiz Angelo Daros de Luca 20ea1d9812 mjpg-streamer: fix option enabled check in init.d
[ "$enabled" ] returns true whatever non-empty value enabled has,
including 0.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2024-08-03 00:19:48 -07:00
Wesley Gimenes 6fb32638e7 netbird: update to 0.28.7
Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2024-08-03 00:19:26 -07:00
Rosen Penev d146a16673 mariadb: fix compilation with fmt 10.2
Upstream backport.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2024-08-03 00:19:10 -07:00
Eric Fahlgren 54fbafe26f owut: update to 2024.07.31
Bug fixes:
  efahl/owut@e329cb9 owut: allow user to specify 'version_code' for build
  efahl/owut@fbafbf1 owut: improve image selection
  efahl/owut@6352b2c config: fix wrong directory in example

Signed-off-by: Eric Fahlgren <ericfahlgren@gmail.com>
2024-08-02 18:38:59 -07:00
Esaaprilia Salsabila 66f193181f freeradius3: update version 3.2.5
Signed-off-by: Esaaprilia Salsabila <esaapriliasalsabila@gmail.com>
2024-08-02 12:50:12 -07:00
Aleksey Vasilenko 302dbe731d curl: update to 8.9.1
- Remove upstreamed patch
- Remove stalled mirrors
- Fixes regression introduced in 8.9.0 update
    OpenWrt issue: https://github.com/openwrt/packages/issues/24693
    Upstream issue: https://github.com/curl/curl/issues/14280

Signed-off-by: Aleksey Vasilenko <aleksey.vasilenko@gmail.com>
2024-08-02 22:28:34 +08:00
Jianhui Zhao fe81e67fb5 lua-eco: update to 3.5.3
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2024-08-02 22:23:54 +08:00
Stan Grishin 9e600ac071 https-dns-proxy: update to 2023.12.26-1
Makefile:
* update to latest upstream version
* remove PKG_SOURCE_DATE/PKG_SOURCE_RELEASE as they are no longer needed
* set TARGET_CFLAGS/TARGET_LDFLAGS
* update CMAKE_OPTIONS
* add CONFIGURE_ARGS to prepare for building with HTTP/3
* update package URL to upstream repo instead of documentation
* update package/description
* add README.md with link to documentation

init-script:
* do not run within image builder
* add a line which can be uncommented to remove outdated doh_server entries

020-src-options.c-add-version.patch:
* remove it, as it's no longer needed with version set in CMAKE_OPTIONS

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-08-02 01:10:00 +00:00
Daniel Golle f3b9fc0d7a cryptsetup: update to version 2.7.4
Cryptsetup 2.7.4 Release Notes
==============================
Stable bug-fix release.

All users of cryptsetup 2.7 should upgrade to this version.

Changes since version 2.7.3
~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Detect device busy failure for device-mapper table-referenced devices.

  Some device-mapper ioctl failures can disappear in libdevmapper,
  causing the libcryptsetup wrapper to return an invalid error (EINVAL)
  instead of EEXIST or EBUSY. One such case is when there is a device
  creation race, and the device-mapper device name is created, but
  the following mapping table load fails. This can happen because some
  block devices used in table mapping have already been claimed by
  another process (the kernel needs exclusive access).

  The kernel ioctl properly returns EBUSY; this errno is lost in
  libdevmapper (dm_task_get_errno returns 0). It should be fixed by
  libdevmapper in the future.

  Such behavior was seen in the systemd way of handling dm-verity
  devices. With these changes, the code should react for EEXIST and
  EBUSY, as another process has already activated the device.

  Code calling libcryptsetup also must not check the underlying device
  with an exclusive open flag (O_EXCL). Otherwise, it could cause a race
  in the kernel device-mapper, resulting in no process succeeding device
  activation (see also CRYPT_ACTIVATE_SHARED flag below).

* Fix shared activation for dm-verity devices.

  The CRYPT_ACTIVATE_SHARED flag was silently ignored when activating
  dm-verity devices. Dm-verity shared activation is generally safe
  since all verity devices are read-only.

  The shared flag is a way to skip the exclusive access check for the
  device, allowing it to create multiple mappings with the same device or
  properly handle a racy concurrent activation of devices with the same
  name from different processes.

* Add --shared option for veritysetup open action.

  The option allows the data device to be used in multiple device-mapper
  table mappings (skip exclusive access check) or to allow concurrent
  dm-verity device activation of the same device (only one process
  succeeds in this case; the other will return EEXIST or EBUSY).

* Do not use exclusive flag for the allocated backing loop files.

  Using this flag is an undefined operation for opening an existing file.
  The flag should be used only for allocated loop (block) devices.

* Fixes for problems found by static analyzers and Valgrind.

  These include fixes for non-default libgcrypt, NSS, and Nettle
  cryptographic backends, buffer operations to avoid partial read/write,
  and several other workarounds for mostly false positive warnings.

* Fixes to tests and CI scripts.

Cryptsetup 2.7.3 Release Notes
==============================
Stable bug-fix release with security fixes.

All users of cryptsetup 2.7 must upgrade to this version.

Changes since version 2.7.2
~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Do not allow formatting LUKS2 with Opal SED (hardware encryption)
  if the reported logical sector size for the block device and Opal
  encryption logical block differs.

  Such a configuration can lead to a partially encrypted Opal locking
  range or data destruction following the expected locking range.

  Some NVMe drives support multiple LBAF profiles (typically supporting
  512-byte and 4096-byte sector size). Some broken Opal NVMe firmware can
  report bogus encryption size that disagrees with real used sector size.
  This usually happens after low-level NVMe reformatting (LBAF profile
  change with nvme utility) to different sector size.
  Moreover, some firmware versions do not properly reset this even after
  explicit PSID revert.

  Cryptsetup calculates the Opal locking range using the reported block
  size in Opal geometry ioctl.  Unfortunately, the broken firmware drive
  internally uses the logical block size of the block device, which can
  differ. This can lead to two possible situations:

  - Opal reports a smaller block size (512-byte) while the drive uses
  a 4096-byte sector. The configured locking range is then much larger,
  destroying data following the expected locking range setting.

  - Opal reports a larger block size (4096-byte) while the drive uses
  a 512-byte sector. The configured locking range is then much smaller,
  leaving the remaining space in the locking range unencrypted (violating
  the confidentiality of data).

  Cryptsetup now detects this discrepancy and disallows LUKS2 format with
  Opal hardware encryption in such a case.

  For already formatted devices, you will see this warning:
    "Bogus OPAL logical block size differs from device block size."

  If you also used software encryption (dm-crypt over Opal), data will
  still be fully encrypted with software dm-crypt.
  With hw-only encryption,  your configuration is probably already broken
  (insecure or accessing data beyond the assigned area).

  Note that this is caused by bad firmware (seen with multiple vendors),
  and the problem was reported, at least for drives we have access to.

* Fixes to wiping LUKS2 headers after Opal locking area erase.

  As the hardware locking range is destroyed (cryptsetup erase command),
  the LUKS2 header is no longer usable and was partially wiped.
  Now the code fully wipes also the secondary header, as the previous
  code wiped only the primary LUKS area.

  Note that this is an exception, as the normal erase command wipes only
  the keyslots, keeping the LUKS2 header in place.  With Opal encryption,
  the data segment is no longer valid, so the whole LUKS2 header is no
  longer usable.

* Mention the need for possible PSID revert before Opal format for some
  drives (man page).

* Fix Bitlocker-compatible code to ignore newly seen metadata entries.

  Recent Windows OS versions started to include new (undocumented)
  metadata entries in Bitlocker. These entries are now quietly ignored,
  allowing Bitlocker images to open with cryptsetup again.

* Fix interactive query retry if LUKS2 unbound keyslot is present.

  If an unbound keyslot is present, the password query retry count is
  now properly applied.

* Detect unsupported zoned devices for LUKS header devices.

  Zoned devices cannot be written with direct-io and used for LUKS header
  logic in general. Code now rejects placing the LUKS header on a zoned
  device, while you can still create a detached header and use a zoned
  device for encrypted data.

* Allow "capi" cipher format for benchmark command and fix parsing
  of plain IV in "capi" format.

  Some ciphers can be specified only in Linux kernel crypto notation
  (in short, "capi"). Code now allows this format also for benchmark,
  for example, "benchmark -c capi:xts\(aes\)-plain64"
  (that is equivalent to -c aes-xts-plain64).

* Add support for HCTR2 encryption mode.

  The HCTR2 encryption mode was added to the Linux kernel for fscrypt,
  but as it is a length-preserving mode (with sector tweak), it can be
  easily used for disk encryption, too.
  The mode has the same property as wide modes (any change is propagated
  to the whole sector instead of only one block as in XTS mode).

  As it needs a larger initialization vector (32 bytes), we need to add
  an exception in the userspace format code.
  You can now use --cipher aes-hctr2-plain64 for the format operation.

* Source code now uses SPDX license identifiers instead of full
  license preambles.

* Fix missing includes for cryptographic backend that could cause
  compilation errors for some systems.

* Fix tests to work correctly in FIPS mode with recent OpenSSL 3.2.

* Fix various (mostly false positive) issues detected by Coverity.

Cryptsetup 2.7.2 Release Notes
==============================
Stable bug-fix release.

All users of cryptsetup 2.7 should upgrade to this version.

Changes since version 2.7.1
~~~~~~~~~~~~~~~~~~~~~~~~~~~
* Fix activation of OPAL-only encrypted LUKS device with tokens.
  The issue was caused by an invalid volume key check (assert)
  that is impossible without software encryption.

* Fix formatting of OPAL devices with 4096-byte sector size.

* Fix incorrect OPAL locking range alignment calculation if used
  over an unaligned device partition.

* Add --hw-opal-factory-reset option description to the manual page.

* Do not check the passphrase quality for OPAL Admin PIN,
  as this passphrase already exists.

* Update license for FAQ document to CC BY-SA 4.0.

NOTE: Please note that with OPAL-only (--hw-opal-only) encryption,
the configured OPAL administrator PIN (passphrase) allows unlocking
all configured locking ranges without LUKS keyslot decryption
(without knowledge of LUKS passphrase).
Because of many observed problems with compatibility, cryptsetup
currently DOES NOT use OPAL single-user mode, which would allow such
decoupling of OPAL admin PIN access.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2024-08-02 01:38:45 +01:00
Daniel Golle c37c79fcbe lvm2: update to version 2.03.35 and libdm 1.02.199
Version 2.03.25 - 12nd July 2024
================================
  Utilize more radix_tree instead of dm_hash and btree.
  Refactor DM uuid caching from device_mapper directory.
  Enhance checking for DM uuid device.
  Fix lvm shell command completion on tab key (2.03.24).
  Avoid lockd_vg call to lvmlockd for local VGs.
  Allow forced change of locktype from none.
  Handle OPTIONS defined in /etc/sysconfig/lvmlockd.

Version 2.03.24 - 16th May 2024
===============================
  Lvconvert supports VDO options for thin-pool with vdo conversion.
  Improve placement to .data.rel.ro and .rodata sections.
  Fix support for -y and -W when creating thinpool with vdo.
  Bettter support for runtime valgrind detection.
  Allow command interruption when communicating with dmeventd.
  Fix resize of VDO volume used for thin pool data volume.
  Use -Wl,-z,now and -Wl,--as-needed for compilation by default.
  Require 3.7 as minimal version for sanlock.
  Share code for closing opened desriptors on program startup.
  Fix memleak in lvmcache.
  Add configure --with-default-event-activation=ON setting.
  Fix return value from reporter function when hitting internal error.
  Skip checking of pools for lvremove and vgremove commands.
  VDO modprobes dm-vdo for 6.9 kernel and kvdo for older kernel version.
  Fix lvs reporting for VDO volumes with new upstream kernel driver.
  Don't import DM_UDEV_DISABLE_OTHER_RULES_FLAG in LVM rules, DM rules cover it.
  Fix table line generation for cache snapshots using cachevol.
  Enhance lvconvert support for external origins stacking.
  When swapping LV names also swap properties like hostname, time and data.
  Fix removal of stacked external origins.
  Lock filesystem when converting volume to read-only external origin.
  Support external origin between different thin-pool.
  Improve validation of acceptable volumes for external origins.
  Reduce amount of preloaded devices for complex device trees.
  Avoid logging problems from monitoring snapshots with inactive origins.
  Check for cache policy module presence in kernel's builtin modules file.
  Add configure --with-modulesdir to select kernel modules directory.
  Support creation of thin-pool with VDO use for its data volume.

libdm:

Version 1.02.199 - 12nd July 2024
=================================

Version 1.02.198 - 16th May 2024
================================
  Fix static only compilation of libdevmapper.a and dmsetup tool.
  Use better code for closing opened descriptors when starting dmeventd.
  Correct dmeventd -R for systemd environment.
  Restart of dmeventd -R checks pid file to detect running dmeventd first.
  Query with dmeventd -i quickly ends when there is no running dmeventd.
  Enhance dm_get_status_raid to handle mismatching status or reported legs.
  Create /dev/disk/by-label symlinks for DM devs that have crypto as next layer.
  Persist udev db for DM devs on cleanup used in initrd to rootfs transition.
  Process synthetic udev events other than 'add/change' as 'change' events.
  Increase DM_UDEV_RULES_VSN to 3 to indicate changed udev rules.
  Rename DM_NOSCAN to .DM_NOSCAN so it's not stored in udev db.
  Rename DM_SUSPENDED to .DM_SUSPENDED so it's not stored in udev db.
  Do not import DM_UDEV_DISABLE_OTHER_RULES_FLAG from db in 10-dm-disk.rules.
  Test DISK_RO after importing properties from db in 10-dm.rules.
  Also import ID_FS_TYPE in 13-dm-disk.rules from db if needed.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2024-08-02 01:38:45 +01:00
Daniel Golle d58a808b5d opentracker: update to git HEAD
Most notably opentracker now supported simultanous listening on IPv4 and
IPv6. Hence we no longer need two build variants.

See project git history for details about changes:
https://erdgeist.org/gitweb/opentracker/log/?id=c854b3db9bf620e86481acfcc9fc31eba64bc8e6

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2024-08-02 01:38:05 +01:00
Aleksey Vasilenko 8950648ebc xz: add patch from upstream to fix mips64/octeon build
Fixes https://github.com/openwrt/packages/issues/24699

Signed-off-by: Aleksey Vasilenko <aleksey.vasilenko@gmail.com>
2024-08-01 21:30:32 +08:00
Aleksey Vasilenko dc418e1255 bottom: update to 0.9.7
Signed-off-by: Aleksey Vasilenko <aleksey.vasilenko@gmail.com>
2024-08-01 19:51:51 +08:00
Milinda Brantini 4444e01b3e dnsproxy: Update to 0.72.2
Signed-off-by: Milinda Brantini <C_A_T_T_E_R_Y@outlook.com>
2024-08-01 15:11:41 +08:00
Maxim Mikityanskiy 4ab7d8b28a mwan3: Fix awk expression in mwan3_delete_iface_rules
The awk expression in mwan3_delete_iface_rules splits the `ip rule list`
output by spaces, therefore $1 contains the trailing colon (e.g., "1:",
"1000:"). The < and > operators compare such values as strings instead
of numbers, producing unexpected results (for example, "1:" > "1000").

Change the field separator to ":" for correct number comparison, so that
the right rules are removed.

An example error message that may appear before the fix:

Error: argument "1:" is wrong: preference value is invalid

It happens because `substr($1,0,4)` selects short numbers along with
the colon. In other cases wrong rules may be removed, for example, if
there is rule 10051, then rule 1005 will be removed.

Signed-off-by: Maxim Mikityanskiy <maxtram95@gmail.com>
2024-07-31 20:27:28 +03:00
Jonas Jelonek 69db3d67bc croc: update to 10.0.11
Release notes:
10.0.10: https://github.com/schollz/croc/releases/tag/v10.0.10
10.0.11: https://github.com/schollz/croc/releases/tag/v10.0.11

Signed-off-by: Jonas Jelonek <jelonek.jonas@gmail.com>
2024-07-31 17:22:44 +03:00
Jonas Jelonek f50954e032 eza: update to 0.18.23
Release notes:
0.18.22: https://github.com/eza-community/eza/releases/tag/v0.18.22
0.18.23: https://github.com/eza-community/eza/releases/tag/v0.18.23

Signed-off-by: Jonas Jelonek <jelonek.jonas@gmail.com>
2024-07-31 13:21:43 +02:00