103 Commits

Author SHA1 Message Date
espie
66077ac3fb missed bump 2018-09-05 09:39:04 +00:00
espie
93aef53599 and of course some would conflict... finish PKGSTEM changes manually 2018-09-04 12:53:16 +00:00
sthen
7e02a6b211 Add an end-of-life warning - security updates for icinga 1.x stop during
the lifetime of OpenBSD 6.4.

For more information about rewriting config to migrate to icinga 2.x, see
https://www.icinga.com/docs/icinga2/latest/doc/23-migrating-from-icinga-1x/
2018-08-28 21:08:23 +00:00
sthen
3168d3eb55 Adjust icinga1's DESCR-main, making it clear that it's the legacy version and
pointing new users in the direction of icinga2.
2018-03-11 12:32:32 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
bdbc58452d update to icinga-1.14.2
* Note: Icinga 1 is now EOL and only receives security updates.
2017-12-20 15:11:32 +00:00
sthen
6324dd7ae2 update to icinga 1.14.0
security fixes (also affecting nagios; icinga 1.x is the old nagios-derived
branch, whereas 2.x is all new) -

* Bug #13709: CVE-2016-9566: Root priviledge escalation during log file opening
* Bug #10453: Icinga Classic-UI 1.13.3 and older are vulnerable to XSS - CVE-2015-8010

notable changes -

* Classic UI: Remove attribute based authorization (cgiauth.cfg is not parsed
any more)
* IDO: Remove deprecated config options
2017-02-07 21:40:06 +00:00
sthen
8e1cce9642 Switch icinga/core to github-generated tarballs, the proper uploaded ones
have been removed. Based on a diff from kirby@.
2017-02-07 21:20:38 +00:00
sthen
7937a8fc9d adjust icinga-web notes following apache1 removal 2016-04-29 09:39:53 +00:00
sthen
6ec3f3a2dc tweak README 2015-10-06 21:53:05 +00:00
kirby
47db449307 fix rcctl syntax
ok sthen@, maintainer
2015-10-04 16:59:25 +00:00
sthen
0b825b856b update to icinga 1.13.3 2015-07-15 20:10:58 +00:00
sthen
ce974b46cc use su -m instead of -s /bin/sh, suggested by millert
add some missing -c
2015-07-07 14:44:58 +00:00
sthen
d5ffe85b7d Remove use of sudo from pkg READMEs in a few ports as packages and their
instructions are meant to work on a fresh install.

- easy cases: replace some '$ sudo somecommand' with '# somecommand'
(while there I've swapped some "${RCDIR}/foo start" with "rcctl foo start").

- replace some 'sudo -u user somecommand foo bar' with
'su -s /bin/sh user "/path/to/somecommand foo bar"' and similar.
Not pretty with the -s, but many of the uids that need to run
these commands have /sbin/nologin as their usual shell.
2015-07-06 11:25:36 +00:00
pascal
35957f111a Bumps for static PIE changes.
"just commit" naddy@
2015-04-03 15:12:28 +00:00
sthen
4b298c3efb update to icinga-1.13.0 2015-03-30 22:43:42 +00:00
rpe
249b5547a3 - Use rcctl(8) in commandline examples.
- Add a section how to setup icinga-cgi with httpd(8) and slowcgi(8).

OK sthen@
2015-02-07 22:39:04 +00:00
sthen
58dfc8201e fix the remaining 63 time_t problems in Icinga idomod.c, and a typo in patch-cgi_cgiutils_c 2015-02-04 21:19:23 +00:00
sthen
e7040b37c6 more printf format string fixes for icinga (time_t issues on 32-bit arches)
the remaining 61 are all in idomod.c

presumably most/all of these also apply to nagios
2015-01-19 16:59:42 +00:00
sthen
2afac01634 Patch some of the format problems in icinga 1 due to 64-bit time_t,
as reported by otto@. Build with -wformat to make the other two hundred
and ten of them more obvious.

(icinga2 doesn't have these problems, but we are stuck with an older
version of icinga2 as current versions fail at runtime on OpenBSD,
and a number of these problems affect the icinga1 cgis which are still
useful with 2).
2015-01-16 18:07:53 +00:00
sthen
cfed1c8a90 update to icinga 1.12.0 2014-11-21 14:06:26 +00:00
sthen
752b328c24 update to icinga 1.11.7 2014-09-03 11:55:55 +00:00
sthen
4c297064e5 normalize patches, now that trees are unlocked 2014-08-14 09:00:06 +00:00
sthen
4c8fa9518b use the correct format string for time_t on i386, unbreaking logging there.
patch bodged into patch-configure for now, to be split out after full unlock.
2014-08-11 18:34:59 +00:00
ajacoutot
9d087a11f1 Tweak documentation according to recent rc changes.
ok jasper@
2014-07-22 10:55:40 +00:00
ajacoutot
9ecb6ea3d9 /etc/rc.d -> ${RCDIR}
(as pedantic and useless as /usr/local vs LOCALBASE|PREFIX but well...)

ok sthen@
2014-07-19 22:36:13 +00:00
sthen
19ca9bed1a don't use "echo 'pkg_scripts="${pkg_scripts} icinga' >> /etc/rc.conf.local"
examples

chase monitoring-plugins change (missed commit yesterday)
2014-07-12 11:22:10 +00:00
ajacoutot
5ecbbd0b5d rc.conf.local is always under /etc. 2014-07-10 12:58:31 +00:00
sthen
53ab17501c update to icinga 1.11.5
* classic-ui: fix status.cgi gets stuck in loop when sorting on "All Unhandled Problems" #5886 - RB
* classic ui: Only show command expander if backend is Icinga 1.x (incompatible with Icinga 2) #6408 - MF
* classic ui: Fix CSRF protection in cmd.cgi matches only compiled in URL #6459 - MF
* classic-ui: config.cgi missing new option #6502 - RB
* cgi.cfg: Add url_cgi_path allowing to override the default '$htmurl/cgi-bin' required for CSRF checks #6459
2014-06-20 13:13:54 +00:00
sthen
8a191f9fb6 reorder slightly, no pkg change 2014-06-19 23:33:31 +00:00
sthen
4d772373a2 really bump REVISION-cgi 2014-06-10 21:54:03 +00:00
sthen
183fdfbdef fix jquery-based options in the icinga-cgi package, found by florian@;
missing file from PLIST-cgi since they now ship a minified version
2014-06-10 21:24:26 +00:00
sthen
ba0c05aebd bump ports which may have been installed when /var/www/modules.sample didn't
exist, to force an update to make sure that their config samples get installed
2014-05-30 13:20:13 +00:00
sthen
c2170f3e1f handle /etc/localtime in chroot; pointed out by florian@ 2014-05-29 00:19:54 +00:00
sthen
54e8c45a04 tweak README to point out that icinga-cgi and -web are in separate packages
and that one or both should be installed.
2014-05-29 00:09:04 +00:00
sthen
80ba77ada7 update to icinga 1.11.4, and tweak README slightly relating to chroot for
icinga-web based on part of some comments from florian@ and benno@.
2014-05-29 00:05:48 +00:00
sthen
0bd227f49d better permissions for resource.cfg 2014-05-23 21:12:26 +00:00
sthen
c168c9a31d upstream packages were re-rolled (under the same filename :() to remove a
couple of bogus sql update files.
2014-05-21 23:37:55 +00:00
sthen
e86d8938dc fix another SYSCONFDIR/BASESYSCONFDIR problems in the README, reported by otto@ 2014-05-14 10:32:20 +00:00
sthen
1582b510f3 update to icinga-1.11.3 2014-05-10 22:15:38 +00:00
sthen
a9fca27852 update to icinga-core 1.11.2, minor fixes
while there, fix linking some tests which need -lpthread on OpenBSD
(some others fail when --enable-embedded-perl is used)
2014-04-25 11:52:09 +00:00
sthen
249777d02c bump; nagios-plugins -> monitoring-plugins 2014-04-07 12:32:23 +00:00
sthen
01cb949bce update to Icinga 1.11.1, fixing CVE-2014-2386 in icinga-cgi (small buffer
overflows when checking strlen against MAX_INPUT_BUFFER) and a couple of
other minor issues
2014-03-29 12:07:01 +00:00
sthen
e0440cae75 Add extra note in readme; new csrf protection needs disabling if using
external programs to access cmd.cgi (e.g. aNag - basic operation is still
OK but acknowledging alerts is blocked).
2014-03-26 12:09:28 +00:00
sthen
0536fb841f update to Icinga 1.11.0 2014-03-25 01:26:33 +00:00
sthen
102bf75628 nginx configuration instructions for icinga-cgi.
icinga-web is not yet covered.
2014-03-20 16:25:21 +00:00
sthen
fa7161e8b0 tweak previous: reorder REVISION, zap unnecessary comment.
this port has an active maintainer, how about sending diffs rather
than just committing?
2014-01-24 23:00:16 +00:00
zhuk
e604bbabbe Fix packaging with too paranoid sample config file mode.
Pro-actively fixes the port before espie@ commits his picky pkg_add patch.
2014-01-24 19:10:22 +00:00
sthen
d2b666fc99 SECURITY update to icinga 1.10.2; (note for -stable, 1.9.4 fixes same issues)
CVE-2013-7106, CVE-2013-7107  https://dev.icinga.org/issues/5250
The icinga web gui is susceptible to several buffer overflow flaws,
which can be triggered as a logged on user. A remote attacker may
utilize a CSRF (cross site request forgery) attack vector against a
logged in user to exploit this flaw remotely.

CVE-2013-7108  https://dev.icinga.org/issues/5251
The icinga web gui are susceptible to an "off-by-one read" error
resulting from an improper assumption in the handling of user submitted
CGI parameters. [..] by sending a specially crafted cgi parameter,
the check routine can be forced to skip the terminating null pointer
and read the heap address right after the end of the parameter list.
Depending on the memory layout, this may result in a memory corruption
condition/crash or reading of sensitive memory locations.
2013-12-17 08:46:45 +00:00
sthen
3d562f1482 update to icinga 1.10.1 2013-11-07 11:23:00 +00:00