Thu Jul 21 18:13:18 UTC 2022

patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause
  an out-of-bounds memory access.
  A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL
  pointer dereference.
  Improper Input Validation when SETing malformed OIDs in master agent and
  subagent simultaneously.
  A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable
  can cause an out-of-bounds memory access.
  A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a
  NULL pointer dereference.
  A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer
  dereference.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810
  (* Security fix *)
This commit is contained in:
Patrick J Volkerding 2022-07-21 18:13:18 +00:00 committed by Eric Hameleers
parent 83e918a979
commit 7e93037632
17 changed files with 1106 additions and 66 deletions

View file

@ -11,9 +11,41 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
<pubDate>Wed, 13 Jul 2022 19:56:59 GMT</pubDate>
<lastBuildDate>Thu, 14 Jul 2022 11:30:23 GMT</lastBuildDate>
<pubDate>Thu, 21 Jul 2022 18:13:18 GMT</pubDate>
<lastBuildDate>Fri, 22 Jul 2022 11:30:16 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
<title>Thu, 21 Jul 2022 18:13:18 GMT</title>
<pubDate>Thu, 21 Jul 2022 18:13:18 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220721181318</link>
<guid isPermaLink="false">20220721181318</guid>
<description>
<![CDATA[<pre>
patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz: Upgraded.
This update fixes security issues:
A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause
an out-of-bounds memory access.
A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL
pointer dereference.
Improper Input Validation when SETing malformed OIDs in master agent and
subagent simultaneously.
A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable
can cause an out-of-bounds memory access.
A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a
NULL pointer dereference.
A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer
dereference.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810
(* Security fix *)
</pre>]]>
</description>
</item>
<item>
<title>Wed, 13 Jul 2022 19:56:59 GMT</title>
<pubDate>Wed, 13 Jul 2022 19:56:59 GMT</pubDate>

View file

@ -1,3 +1,27 @@
Thu Jul 21 18:13:18 UTC 2022
patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz: Upgraded.
This update fixes security issues:
A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause
an out-of-bounds memory access.
A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL
pointer dereference.
Improper Input Validation when SETing malformed OIDs in master agent and
subagent simultaneously.
A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable
can cause an out-of-bounds memory access.
A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a
NULL pointer dereference.
A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer
dereference.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810
(* Security fix *)
+--------------------------+
Wed Jul 13 19:56:59 UTC 2022
patches/packages/xorg-server-1.20.14-x86_64-3_slack15.0.txz: Rebuilt.
xkb: switch to array index loops to moving pointers.

View file

@ -1,20 +1,20 @@
Wed Jul 13 20:00:55 UTC 2022
Thu Jul 21 18:15:38 UTC 2022
Here is the file list for this directory. If you are using a
mirror site and find missing or extra files in the disk
subdirectories, please have the archive administrator refresh
the mirror.
drwxr-xr-x 12 root root 4096 2022-07-13 19:56 .
drwxr-xr-x 12 root root 4096 2022-07-21 18:13 .
-rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0
-rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT
-rw-r--r-- 1 root root 1138810 2022-07-11 19:26 ./CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-07-11 19:26 ./CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 1142794 2022-07-13 20:01 ./CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-07-13 20:01 ./CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING
-rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3
-rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT
-rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT
-rw-r--r-- 1 root root 1910578 2022-07-13 19:56 ./ChangeLog.txt
-rw-r--r-- 1 root root 1911823 2022-07-21 18:13 ./ChangeLog.txt
drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI
drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi
@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh
-rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg
-rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg
-rw-r--r-- 1 root root 1486494 2022-07-11 19:25 ./FILELIST.TXT
-rw-r--r-- 1 root root 1492106 2022-07-13 20:00 ./FILELIST.TXT
-rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY
-rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT
-rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT
@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear
-rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild
-rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz
-rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc
drwxr-xr-x 4 root root 4096 2022-07-13 20:00 ./patches
-rw-r--r-- 1 root root 39694 2022-07-13 20:00 ./patches/CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-07-13 20:00 ./patches/CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 53453 2022-07-13 20:00 ./patches/FILE_LIST
-rw-r--r-- 1 root root 11041080 2022-07-13 20:00 ./patches/MANIFEST.bz2
-rw-r--r-- 1 root root 30726 2022-07-13 20:00 ./patches/PACKAGES.TXT
drwxr-xr-x 3 root root 12288 2022-07-13 20:00 ./patches/packages
drwxr-xr-x 4 root root 4096 2022-07-21 18:15 ./patches
-rw-r--r-- 1 root root 40919 2022-07-21 18:15 ./patches/CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-07-21 18:15 ./patches/CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 55019 2022-07-21 18:15 ./patches/FILE_LIST
-rw-r--r-- 1 root root 11074370 2022-07-21 18:15 ./patches/MANIFEST.bz2
-rw-r--r-- 1 root root 31362 2022-07-21 18:15 ./patches/PACKAGES.TXT
drwxr-xr-x 3 root root 12288 2022-07-21 18:15 ./patches/packages
-rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt
-rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc
@ -829,6 +829,9 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15
-rw-r--r-- 1 root root 663 2022-06-29 20:23 ./patches/packages/mozilla-thunderbird-91.11.0-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 53161900 2022-06-29 20:23 ./patches/packages/mozilla-thunderbird-91.11.0-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-06-29 20:23 ./patches/packages/mozilla-thunderbird-91.11.0-x86_64-1_slack15.0.txz.asc
-rw-r--r-- 1 root root 451 2022-07-21 17:53 ./patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 1598024 2022-07-21 17:53 ./patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-07-21 17:53 ./patches/packages/net-snmp-5.9.3-x86_64-1_slack15.0.txz.asc
-rw-r--r-- 1 root root 559 2022-07-05 19:22 ./patches/packages/openssl-1.1.1q-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 4025744 2022-07-05 19:22 ./patches/packages/openssl-1.1.1q-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-07-05 19:22 ./patches/packages/openssl-1.1.1q-x86_64-1_slack15.0.txz.asc
@ -892,7 +895,7 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15
-rw-r--r-- 1 root root 388 2022-03-28 19:09 ./patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 105204 2022-03-28 19:09 ./patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-03-28 19:09 ./patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txz.asc
drwxr-xr-x 41 root root 4096 2022-07-13 04:02 ./patches/source
drwxr-xr-x 42 root root 4096 2022-07-21 18:13 ./patches/source
drwxr-xr-x 2 root root 4096 2022-01-16 05:07 ./patches/source/aaa_base
-rw-r--r-- 1 root root 11041 2022-02-15 04:49 ./patches/source/aaa_base/_aaa_base.tar.gz
-rwxr-xr-x 1 root root 3894 2022-02-15 05:07 ./patches/source/aaa_base/aaa_base.SlackBuild
@ -1114,6 +1117,20 @@ drwxr-xr-x 2 root root 4096 2022-06-29 19:14 ./patches/source/mozilla-thun
-rw-r--r-- 1 root root 330 2019-08-27 16:35 ./patches/source/mozilla-thunderbird/tb.ui.scrollToClick.diff.gz
-rw-r--r-- 1 root root 408098564 2022-06-28 18:45 ./patches/source/mozilla-thunderbird/thunderbird-91.11.0.source.tar.xz
-rw-r--r-- 1 root root 833 2022-06-28 18:45 ./patches/source/mozilla-thunderbird/thunderbird-91.11.0.source.tar.xz.asc
drwxr-xr-x 2 root root 4096 2022-07-21 17:44 ./patches/source/net-snmp
-rw-r--r-- 1 root root 356 2021-12-21 18:38 ./patches/source/net-snmp/doinst.sh.gz
-rw-r--r-- 1 root root 607 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch.gz
-rw-r--r-- 1 root root 390 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch.gz
-rw-r--r-- 1 root root 338 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch.gz
-rw-r--r-- 1 root root 1205 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch.gz
-rw-r--r-- 1 root root 876 2018-07-20 09:39 ./patches/source/net-snmp/net-snmp-5.8-multilib.patch.gz
-rw-r--r-- 1 root root 3870946 2022-07-13 21:40 ./patches/source/net-snmp/net-snmp-5.9.3.tar.lz
-rwxr-xr-x 1 root root 6743 2022-07-21 17:52 ./patches/source/net-snmp/net-snmp.SlackBuild
-rw-r--r-- 1 root root 43 2018-11-09 20:13 ./patches/source/net-snmp/net-snmp.url
-rw-r--r-- 1 root root 981 2021-12-21 18:35 ./patches/source/net-snmp/rc.snmpd
-rw-r--r-- 1 root root 907 2018-02-27 06:13 ./patches/source/net-snmp/slack-desc
-rw-r--r-- 1 root root 4909 2007-04-16 18:39 ./patches/source/net-snmp/snmpd.conf.gz
-rw-r--r-- 1 root root 77 2021-12-21 18:36 ./patches/source/net-snmp/snmpd.default
drwxr-xr-x 2 root root 4096 2022-07-05 19:18 ./patches/source/openssl
-rw-r--r-- 1 root root 1758 2012-08-08 22:46 ./patches/source/openssl/certwatch.gz
-rw-r--r-- 1 root root 281 2007-06-13 17:20 ./patches/source/openssl/doinst.sh-openssl-solibs.gz
@ -2718,23 +2735,23 @@ drwxr-xr-x 2 root root 69632 2022-02-01 08:29 ./slackware64/kde
-rw-r--r-- 1 root root 305 2022-01-06 21:46 ./slackware64/kde/kitinerary-21.12.1-x86_64-1.txt
-rw-r--r-- 1 root root 914440 2022-01-06 21:46 ./slackware64/kde/kitinerary-21.12.1-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-06 21:46 ./slackware64/kde/kitinerary-21.12.1-x86_64-1.txz.asc
-rw-r--r-- 1 root root 250 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 145720 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz.asc
-rw-r--r-- 1 root root 263 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txt
-rw-r--r-- 1 root root 212788 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz
-rw-r--r-- 1 root root 163 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz.asc
-rw-r--r-- 1 root root 257 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 380368 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz.asc
-rw-r--r-- 1 root root 258 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 381588 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz.asc
-rw-r--r-- 1 root root 385 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txt
-rw-r--r-- 1 root root 449000 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz.asc
-rw-r--r-- 1 root root 173 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txt
-rw-r--r-- 1 root root 208024 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txz
-rw-r--r-- 1 root root 250 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 145720 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-08 22:33 ./slackware64/kde/kjobwidgets-5.90.0-x86_64-1.txz.asc
-rw-r--r-- 1 root root 263 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txt
-rw-r--r-- 1 root root 212788 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz
-rw-r--r-- 1 root root 163 2021-10-10 21:33 ./slackware64/kde/kjots-20211003_4109f07-x86_64-1.txz.asc
-rw-r--r-- 1 root root 257 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 380368 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-08 22:44 ./slackware64/kde/kjs-5.90.0-x86_64-1.txz.asc
-rw-r--r-- 1 root root 258 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 381588 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-08 22:45 ./slackware64/kde/kjsembed-5.90.0-x86_64-1.txz.asc
-rw-r--r-- 1 root root 385 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txt
-rw-r--r-- 1 root root 449000 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-06 22:35 ./slackware64/kde/kjumpingcube-21.12.1-x86_64-1.txz.asc
-rw-r--r-- 1 root root 173 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txt
-rw-r--r-- 1 root root 208024 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-06 21:39 ./slackware64/kde/kldap-21.12.1-x86_64-1.txz.asc
-rw-r--r-- 1 root root 208 2022-01-06 21:46 ./slackware64/kde/kleopatra-21.12.1-x86_64-1.txt
-rw-r--r-- 1 root root 2908356 2022-01-06 21:46 ./slackware64/kde/kleopatra-21.12.1-x86_64-1.txz
@ -5475,22 +5492,22 @@ drwxr-xr-x 2 root root 65536 2022-02-01 04:47 ./slackware64/x
-rw-r--r-- 1 root root 425 2021-02-13 13:11 ./slackware64/x/transset-1.0.2-x86_64-4.txt
-rw-r--r-- 1 root root 19396 2021-02-13 13:11 ./slackware64/x/transset-1.0.2-x86_64-4.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/transset-1.0.2-x86_64-4.txz.asc
-rw-r--r-- 1 root root 620 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txt
-rw-r--r-- 1 root root 2969612 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz.asc
-rw-r--r-- 1 root root 428 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txt
-rw-r--r-- 1 root root 1946796 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz
-rw-r--r-- 1 root root 163 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz.asc
-rw-r--r-- 1 root root 276 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txt
-rw-r--r-- 1 root root 108700 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz.asc
-rw-r--r-- 1 root root 502 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txt
-rw-r--r-- 1 root root 1511732 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz.asc
-rw-r--r-- 1 root root 361 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txt
-rw-r--r-- 1 root root 31556 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz.asc
-rw-r--r-- 1 root root 338 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txt
-rw-r--r-- 1 root root 620 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txt
-rw-r--r-- 1 root root 2969612 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:01 ./slackware64/x/ttf-indic-fonts-0.5.14-noarch-5.txz.asc
-rw-r--r-- 1 root root 428 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txt
-rw-r--r-- 1 root root 1946796 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz
-rw-r--r-- 1 root root 163 2021-10-19 04:11 ./slackware64/x/ttf-tlwg-0.7.3-noarch-1.txz.asc
-rw-r--r-- 1 root root 276 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txt
-rw-r--r-- 1 root root 108700 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/twm-1.0.11-x86_64-3.txz.asc
-rw-r--r-- 1 root root 502 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txt
-rw-r--r-- 1 root root 1511732 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:02 ./slackware64/x/urw-core35-fonts-otf-20170801_91edd6e_git-noarch-4.txz.asc
-rw-r--r-- 1 root root 361 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txt
-rw-r--r-- 1 root root 31556 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:05 ./slackware64/x/util-macros-1.19.3-noarch-2.txz.asc
-rw-r--r-- 1 root root 338 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txt
-rw-r--r-- 1 root root 26104 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txz
-rw-r--r-- 1 root root 163 2021-02-13 13:11 ./slackware64/x/viewres-1.0.6-x86_64-3.txz.asc
-rw-r--r-- 1 root root 527 2021-08-08 18:46 ./slackware64/x/vulkan-sdk-1.2.176.1-x86_64-2.txt
@ -15101,23 +15118,23 @@ drwxr-xr-x 52 root root 4096 2022-01-17 21:57 ./source/xap
drwxr-xr-x 2 root root 4096 2021-04-18 18:11 ./source/xap/MPlayer
-rw-r--r-- 1 root root 222707 2017-10-10 01:18 ./source/xap/MPlayer/Blue-1.13.tar.bz2
-rw-r--r-- 1 root root 5277048 2021-04-18 18:11 ./source/xap/MPlayer/MPlayer-20210418.tar.xz
-rwxr-xr-- 1 root root 14378 2021-04-18 18:11 ./source/xap/MPlayer/MPlayer.SlackBuild
-rw-r--r-- 1 root root 219 2015-03-09 20:07 ./source/xap/MPlayer/include-samba-4.0.patch.gz
-rw-r--r-- 1 root root 1081 2018-08-20 04:29 ./source/xap/MPlayer/slack-desc
drwxr-xr-x 2 root root 4096 2021-09-29 17:02 ./source/xap/NetworkManager-openvpn
-rw-r--r-- 1 root root 613848 2021-09-28 19:36 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn-1.8.16.tar.xz
-rwxr-xr-x 1 root root 4493 2021-07-09 18:13 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn.SlackBuild
-rw-r--r-- 1 root root 328 2020-05-04 01:12 ./source/xap/NetworkManager-openvpn/openvpn.nobody.nogroup.diff.gz
-rw-r--r-- 1 root root 1027 2020-05-04 01:23 ./source/xap/NetworkManager-openvpn/slack-desc
drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious
drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious-plugins
-rw-r--r-- 1 root root 1409774 2021-02-01 23:54 ./source/xap/audacious-plugins/audacious-plugins-4.1.tar.lz
-rwxr-xr-x 1 root root 4492 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild
-rwxr-xr-x 1 root root 4666 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild.meson
-rw-r--r-- 1 root root 868 2018-10-24 20:29 ./source/xap/audacious-plugins/slack-desc
-rw-r--r-- 1 root root 526628 2021-02-01 23:54 ./source/xap/audacious/audacious-4.1.tar.lz
-rwxr-xr-x 1 root root 4551 2021-11-18 20:26 ./source/xap/audacious/audacious.SlackBuild
-rwxr-xr-x 1 root root 4636 2020-03-22 18:08 ./source/xap/audacious/audacious.SlackBuild.meson
-rwxr-xr-- 1 root root 14378 2021-04-18 18:11 ./source/xap/MPlayer/MPlayer.SlackBuild
-rw-r--r-- 1 root root 219 2015-03-09 20:07 ./source/xap/MPlayer/include-samba-4.0.patch.gz
-rw-r--r-- 1 root root 1081 2018-08-20 04:29 ./source/xap/MPlayer/slack-desc
drwxr-xr-x 2 root root 4096 2021-09-29 17:02 ./source/xap/NetworkManager-openvpn
-rw-r--r-- 1 root root 613848 2021-09-28 19:36 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn-1.8.16.tar.xz
-rwxr-xr-x 1 root root 4493 2021-07-09 18:13 ./source/xap/NetworkManager-openvpn/NetworkManager-openvpn.SlackBuild
-rw-r--r-- 1 root root 328 2020-05-04 01:12 ./source/xap/NetworkManager-openvpn/openvpn.nobody.nogroup.diff.gz
-rw-r--r-- 1 root root 1027 2020-05-04 01:23 ./source/xap/NetworkManager-openvpn/slack-desc
drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious
drwxr-xr-x 2 root root 4096 2021-02-13 05:32 ./source/xap/audacious-plugins
-rw-r--r-- 1 root root 1409774 2021-02-01 23:54 ./source/xap/audacious-plugins/audacious-plugins-4.1.tar.lz
-rwxr-xr-x 1 root root 4492 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild
-rwxr-xr-x 1 root root 4666 2021-07-13 19:09 ./source/xap/audacious-plugins/audacious-plugins.SlackBuild.meson
-rw-r--r-- 1 root root 868 2018-10-24 20:29 ./source/xap/audacious-plugins/slack-desc
-rw-r--r-- 1 root root 526628 2021-02-01 23:54 ./source/xap/audacious/audacious-4.1.tar.lz
-rwxr-xr-x 1 root root 4551 2021-11-18 20:26 ./source/xap/audacious/audacious.SlackBuild
-rwxr-xr-x 1 root root 4636 2020-03-22 18:08 ./source/xap/audacious/audacious.SlackBuild.meson
-rw-r--r-- 1 root root 121 2010-04-09 21:15 ./source/xap/audacious/doinst.sh.gz
-rw-r--r-- 1 root root 1048 2018-10-24 20:29 ./source/xap/audacious/slack-desc
drwxr-xr-x 2 root root 4096 2021-08-05 05:16 ./source/xap/blackbox

View file

@ -0,0 +1,11 @@
net-snmp: net-snmp (Simple Network Management Protocol tools)
net-snmp:
net-snmp: Various tools relating to the Simple Network Management Protocol:
net-snmp:
net-snmp: An extensible agent
net-snmp: An SNMP library
net-snmp: Tools to request or set information from SNMP agents
net-snmp: Tools to generate and handle SNMP traps
net-snmp: A version of the UNIX 'netstat' command using SNMP
net-snmp: A graphical Perl/Tk/SNMP based mib browser
net-snmp:

View file

@ -0,0 +1,24 @@
#!/bin/sh
config() {
NEW="$1"
OLD="`dirname $NEW`/`basename $NEW .new`"
# If there's no config file by that name, mv it over:
if [ ! -r $OLD ]; then
mv $NEW $OLD
elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy
rm $NEW
fi
# Otherwise, we leave the .new copy for the admin to consider...
}
# Keep same perms on rc.snmpd.new:
if [ -e etc/rc.d/rc.snmpd ]; then
cp -a etc/rc.d/rc.snmpd etc/rc.d/rc.snmpd.new.incoming
cat etc/rc.d/rc.snmpd.new > etc/rc.d/rc.snmpd.new.incoming
mv etc/rc.d/rc.snmpd.new.incoming etc/rc.d/rc.snmpd.new
fi
config etc/snmp/snmpd.conf.new
config etc/rc.d/rc.snmpd.new
config etc/default/snmpd.new

View file

@ -0,0 +1,30 @@
1134475 - dependency in perl package
Use hardcoded path to configuration directories instead of net-snmp-config.
net-snmp-config is in net-snmp-devel package and we do not want net-snmp-perl
depending on -devel.
diff -up net-snmp-5.7.2/local/net-snmp-cert.cert-path net-snmp-5.7.2/local/net-snmp-cert
--- net-snmp-5.7.2/local/net-snmp-cert.cert-path 2012-10-10 00:28:58.000000000 +0200
+++ net-snmp-5.7.2/local/net-snmp-cert 2014-09-01 12:05:10.582427036 +0200
@@ -819,8 +819,7 @@ sub set_default {
sub cfg_path {
my $path;
- $path = `$NetSNMP::Cert::CFGTOOL --snmpconfpath`;
- chomp $path;
+ $path = "/etc/snmp:/usr/share/snmp:/usr/lib64/snmp:/home/jsafrane/.snmp:/var/lib/net-snmp";
return (wantarray ? split(':', $path) : $path);
}
@@ -1414,8 +1413,8 @@ sub checkReqs {
die("$NetSNMP::Cert::OPENSSL (v$ossl_ver): must be $ossl_min_ver or later")
if ($ossl_ver cmp $ossl_min_ver) < 0;
- die("$NetSNMP::Cert::CFGTOOL not found: please install")
- if system("$NetSNMP::Cert::CFGTOOL > /dev/null 2>&1");
+# die("$NetSNMP::Cert::CFGTOOL not found: please install")
+# if system("$NetSNMP::Cert::CFGTOOL > /dev/null 2>&1");
}
sub initOpts {

View file

@ -0,0 +1,14 @@
diff -urNp old/agent/mibgroup/host/data_access/swrun.c new/agent/mibgroup/host/data_access/swrun.c
--- old/agent/mibgroup/host/data_access/swrun.c 2018-03-26 09:00:39.932335587 +0200
+++ new/agent/mibgroup/host/data_access/swrun.c 2018-03-26 09:03:00.845876681 +0200
@@ -102,7 +102,9 @@ swrun_count_processes_by_name( char *nam
return 0; /* or -1 */
it = CONTAINER_ITERATOR( swrun_container );
- while ((entry = (netsnmp_swrun_entry*)ITERATOR_NEXT( it )) != NULL) {
+ for (entry = (netsnmp_swrun_entry*)ITERATOR_FIRST( it );
+ entry;
+ entry = (netsnmp_swrun_entry*)ITERATOR_NEXT( it )) {
if (0 == strcmp( entry->hrSWRunName, name ))
i++;
}

View file

@ -0,0 +1,12 @@
diff -urNp a/include/net-snmp/library/int64.h b/include/net-snmp/library/int64.h
--- a/include/net-snmp/library/int64.h 2018-07-18 14:37:16.543348832 +0200
+++ b/include/net-snmp/library/int64.h 2018-07-18 15:31:31.516999288 +0200
@@ -10,7 +10,7 @@ extern "C" {
* Note: using the U64 typedef is deprecated because this typedef conflicts
* with a typedef with the same name defined in the Perl header files.
*/
- typedef struct counter64 U64;
+// typedef struct counter64 U64;
#endif
#define I64CHARSZ 21

View file

@ -0,0 +1,83 @@
diff -urNp a/agent/mibgroup/host/data_access/swinst_rpm.c b/agent/mibgroup/host/data_access/swinst_rpm.c
--- a/agent/mibgroup/host/data_access/swinst_rpm.c 2018-07-18 16:12:19.583503903 +0200
+++ b/agent/mibgroup/host/data_access/swinst_rpm.c 2018-07-18 16:50:38.599703588 +0200
@@ -102,7 +102,6 @@ netsnmp_swinst_arch_load( netsnmp_contai
rpmtd td_name, td_version, td_release, td_group, td_time;
#else
char *n, *v, *r, *g;
- int32_t *t;
#endif
time_t install_time;
size_t date_len;
@@ -146,14 +145,13 @@ netsnmp_swinst_arch_load( netsnmp_contai
install_time = rpmtdGetNumber(td_time);
g = rpmtdGetString(td_group);
#else
- headerGetEntry( h, RPMTAG_NAME, NULL, (void**)&n, NULL);
- headerGetEntry( h, RPMTAG_VERSION, NULL, (void**)&v, NULL);
- headerGetEntry( h, RPMTAG_RELEASE, NULL, (void**)&r, NULL);
- headerGetEntry( h, RPMTAG_GROUP, NULL, (void**)&g, NULL);
- headerGetEntry( h, RPMTAG_INSTALLTIME, NULL, (void**)&t, NULL);
+ n = headerGetString( h, RPMTAG_NAME);
+ v = headerGetString( h, RPMTAG_VERSION);
+ r = headerGetString( h, RPMTAG_RELEASE);
+ g = headerGetString( h, RPMTAG_GROUP);
+ install_time = headerGetNumber( h, RPMTAG_INSTALLTIME);
entry->swName_len = snprintf( entry->swName, sizeof(entry->swName),
"%s-%s-%s", n, v, r);
- install_time = *t;
#endif
entry->swType = (g && NULL != strstr( g, "System Environment"))
? 2 /* operatingSystem */
diff -urNp a/agent/mibgroup/host/hr_swinst.c b/agent/mibgroup/host/hr_swinst.c
--- a/agent/mibgroup/host/hr_swinst.c 2018-07-18 16:12:19.582503907 +0200
+++ b/agent/mibgroup/host/hr_swinst.c 2018-07-18 17:09:29.716564197 +0200
@@ -479,9 +479,9 @@ var_hrswinst(struct variable * vp,
}
#else
# ifdef HAVE_LIBRPM
- char *rpm_groups;
- if ( headerGetEntry(swi->swi_h, RPMTAG_GROUP, NULL, (void **) &rpm_groups, NULL) ) {
- if ( strstr(rpm_groups, "System Environment") != NULL )
+ const char *rpm_group = headerGetString(swi->swi_h, RPMTAG_GROUP);
+ if ( NULL != rpm_group ) {
+ if ( strstr(rpm_group, "System Environment") != NULL )
long_return = 2; /* operatingSystem */
else
long_return = 4; /* applcation */
@@ -498,9 +498,8 @@ var_hrswinst(struct variable * vp,
case HRSWINST_DATE:
{
#ifdef HAVE_LIBRPM
- int32_t *rpm_data;
- if ( headerGetEntry(swi->swi_h, RPMTAG_INSTALLTIME, NULL, (void **) &rpm_data, NULL) ) {
- time_t installTime = *rpm_data;
+ time_t installTime = headerGetNumber(swi->swi_h, RPMTAG_INSTALLTIME);
+ if ( 0 != installTime ) {
ret = date_n_time(&installTime, var_len);
} else {
ret = date_n_time(NULL, var_len);
@@ -660,7 +659,7 @@ Save_HR_SW_info(int ix)
if (1 <= ix && ix <= swi->swi_nrec && ix != swi->swi_prevx) {
int offset;
Header h;
- char *n, *v, *r;
+ const char *n, *v, *r;
offset = swi->swi_recs[ix - 1];
@@ -685,11 +684,9 @@ Save_HR_SW_info(int ix)
swi->swi_h = h;
swi->swi_prevx = ix;
- headerGetEntry(swi->swi_h, RPMTAG_NAME, NULL, (void **) &n, NULL);
- headerGetEntry(swi->swi_h, RPMTAG_VERSION, NULL, (void **) &v,
- NULL);
- headerGetEntry(swi->swi_h, RPMTAG_RELEASE, NULL, (void **) &r,
- NULL);
+ n = headerGetString(swi->swi_h, RPMTAG_NAME);
+ v = headerGetString(swi->swi_h, RPMTAG_VERSION);
+ r = headerGetString(swi->swi_h, RPMTAG_RELEASE);
snprintf(swi->swi_name, sizeof(swi->swi_name), "%s-%s-%s", n, v, r);
swi->swi_name[ sizeof(swi->swi_name)-1 ] = 0;
}

View file

@ -0,0 +1,45 @@
diff -urNp a/man/netsnmp_config_api.3.def b/man/netsnmp_config_api.3.def
--- a/man/netsnmp_config_api.3.def 2018-07-18 11:18:06.196792766 +0200
+++ b/man/netsnmp_config_api.3.def 2018-07-18 11:20:04.631679886 +0200
@@ -295,7 +295,7 @@ for one particular machine.
.PP
The default list of directories to search is \fC SYSCONFDIR/snmp\fP,
followed by \fC DATADIR/snmp\fP,
-followed by \fC LIBDIR/snmp\fP,
+followed by \fC /usr/lib(64)/snmp\fP,
followed by \fC $HOME/.snmp\fP.
This list can be changed by setting the environmental variable
.I SNMPCONFPATH
@@ -367,7 +367,7 @@ A colon separated list of directories to
files in.
Default:
.br
-SYSCONFDIR/snmp:\:DATADIR/snmp:\:LIBDIR/snmp:\:$HOME/.snmp
+SYSCONFDIR/snmp:\:DATADIR/snmp:\:/usr/lib(64)/snmp:\:$HOME/.snmp
.SH "SEE ALSO"
netsnmp_mib_api(3), snmp_api(3)
.\" Local Variables:
diff -urNp a/man/snmp_config.5.def b/man/snmp_config.5.def
--- a/man/snmp_config.5.def 2018-07-18 11:18:06.194792767 +0200
+++ b/man/snmp_config.5.def 2018-07-18 11:20:56.423626117 +0200
@@ -10,7 +10,7 @@ First off, there are numerous places tha
found and read from. By default, the applications look for
configuration files in the following 4 directories, in order:
SYSCONFDIR/snmp,
-DATADIR/snmp, LIBDIR/snmp, and $HOME/.snmp. In each of these
+DATADIR/snmp, /usr/lib(64)/snmp, and $HOME/.snmp. In each of these
directories, it looks for files snmp.conf, snmpd.conf and/or
snmptrapd.conf, as well as snmp.local.conf, snmpd.local.conf
and/or snmptrapd.local.conf. *.local.conf are always
diff -urNp a/man/snmpd.conf.5.def b/man/snmpd.conf.5.def
--- a/man/snmpd.conf.5.def 2018-07-18 11:18:06.196792766 +0200
+++ b/man/snmpd.conf.5.def 2018-07-18 11:21:44.263574388 +0200
@@ -1559,7 +1559,7 @@ filename), and call the initialisation r
.RS
.IP "Note:"
If the specified PATH is not a fully qualified filename, it will
-be interpreted relative to LIBDIR/snmp/dlmod, and \fC.so\fR
+be interpreted relative to /usr/lib(64)/snmp/dlmod, and \fC.so\fR
will be appended to the filename.
.RE
.PP

View file

@ -0,0 +1,209 @@
#!/bin/bash
# Copyright 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2014, 2018, 2020, 2021 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=net-snmp
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
BUILD=${BUILD:-1_slack15.0}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) export ARCH=i586 ;;
arm*) export ARCH=arm ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) export ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
TMP=${TMP:-/tmp}
PKG=$TMP/package-${PKGNAM}
rm -rf $PKG
mkdir -p $TMP $PKG
if [ "$ARCH" = "i586" ]; then
SLKCFLAGS="-O2 -march=i586 -mtune=i686"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "s390" ]; then
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
SLKCFLAGS="-O2 -fPIC"
LIBDIRSUFFIX="64"
else
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
fi
NUMJOBS=${NUMJOBS:-" -j $(expr $(nproc) + 1) "}
cd $TMP
rm -rf ${PKGNAM}-${VERSION}
tar xvf $CWD/${PKGNAM}-$VERSION.tar.?z || exit 1
cd ${PKGNAM}-$VERSION || exit 1
# Make sure ownerships and permissions are sane:
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
zcat $CWD/net-snmp-5.8-multilib.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/net-snmp-5.7.2-cert-path.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/net-snmp-5.8-Remove-U64-typedef.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/net-snmp-5.7.3-iterator-fix.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/net-snmp-5.8-modern-rpm-api.patch.gz | patch -p1 --verbose || exit 1
# Fix destdir for python modules
#sed -i "s|\$(PYMAKE) install|\$(PYMAKE) install --root=$PKG|" \
# Makefile.in
# Configure:
CFLAGS="$SLKCFLAGS" \
./configure \
--prefix=/usr \
--libdir=/usr/lib${LIBDIRSUFFIX} \
--sysconfdir=/etc/snmp \
--mandir=/usr/man \
--enable-ipv6 \
--disable-debugging \
--enable-static=no \
--with-libwrap \
--with-mysql \
--with-perl-modules \
--with-default-snmp-version=3 \
--with-sys-contact="root@example.org" \
--with-sys-location="unknown" \
--with-logfile="/var/log/snmpd.log" \
--with-persistent-directory="/var/lib/net-snmp" \
--without-rpm \
--program-suffix= \
--program-prefix= \
--with-mib-modules="ucd-snmp/lmsensorsMib ucd-snmp/diskio" \
--with-python-modules \
--build=$ARCH-slackware-linux || exit 1
# Build and install:
make $NUMJOBS INSTALLDIRS=vendor || exit 1
make install INSTALLDIRS=vendor DESTDIR=$PKG || exit 1
# Don't ship .la files:
rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la
# Evidently --mandir=/usr/man doesn't catch everything...
if [ -d $PKG/usr/share/man/man3 ]; then
mkdir -p $PKG/usr/man/man3
mv $PKG/usr/share/man/man3/* $PKG/usr/man/man3
rmdir $PKG/usr/share/man/man3 $PKG/usr/share/man
fi
mkdir -p $PKG/usr
mkdir -p $PKG/var/lib/net-snmp/{cert,mib}_indexes
mkdir -p $PKG/etc/snmp
zcat $CWD/snmpd.conf.gz > $PKG/etc/snmp/snmpd.conf.new
mkdir -p $PKG/etc/rc.d
cat $CWD/rc.snmpd > $PKG/etc/rc.d/rc.snmpd.new
# Install default options file for snmpd:
mkdir -p $PKG/etc/default
cat $CWD/snmpd.default > $PKG/etc/default/snmpd.new
# Strip binaries:
find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \
| cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
# Compress and link manpages, if any:
if [ -d $PKG/usr/man ]; then
( cd $PKG/usr/man
for manpagedir in $(find . -type d -name "man*") ; do
( cd $manpagedir
for eachpage in $( find . -type l -maxdepth 1) ; do
ln -s $( readlink $eachpage ).gz $eachpage.gz
rm $eachpage
done
gzip -9 *.*
)
done
)
fi
# Compress info files, if any:
if [ -d $PKG/usr/info ]; then
( cd $PKG/usr/info
rm -f dir
gzip -9 *
)
fi
# Remove perllocal files:
( cd $PKG ; find . -name perllocal.pod -exec rm "{}" \+ )
# This removes our DESTDIR from the packlist filenames, to keep perl's
# internal inventories consistent and correct.
find $PKG -name .packlist | while read plist ; do
sed -e "s%$PKG%%g" \
-e "s%/share/man%/man%g" \
-re "s%\.([1-9]n?|3pm)$%&.gz%g # extend man filenames for .gz" \
${plist} > ${plist}.new
mv -f ${plist}.new ${plist}
done
# Add a documentation directory:
mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION
cp -a \
AGENT* CHANGES ChangeLog COPYING* CodingStyle EXAMPLE* FAQ \
INSTALL NEWS PORTING README* TODO \
$PKG/usr/doc/${PKGNAM}-$VERSION
# If there's a ChangeLog, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r ChangeLog ]; then
DOCSDIR=$(echo $PKG/usr/doc/*-$VERSION)
cat ChangeLog | head -n 1000 > $DOCSDIR/ChangeLog
touch -r ChangeLog $DOCSDIR/ChangeLog
fi
# If there's a CHANGES file, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r CHANGES ]; then
DOCSDIR=$(echo $PKG/usr/doc/*-$VERSION)
cat CHANGES | head -n 1000 > $DOCSDIR/CHANGES
touch -r CHANGES $DOCSDIR/CHANGES
fi
mkdir -p $PKG/install
zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/${PKGNAM}-$VERSION-$ARCH-$BUILD.txz

View file

@ -0,0 +1 @@
https://sourceforge.net/projects/net-snmp/

View file

@ -0,0 +1,55 @@
#!/bin/sh
#
# rc.snmpd This shell script takes care of starting and stopping
# the net-snmp SNMP daemon
[ -r /etc/default/snmpd ] && . /etc/default/snmpd
SNMPD_OPTIONS=${SNMPD_OPTIONS:-"-A -p /var/run/snmpd -a"}
start() {
if [ -x /usr/sbin/snmpd -a -f /etc/snmp/snmpd.conf ]; then
echo -n "Starting snmpd: "
/usr/sbin/snmpd $SNMPD_OPTIONS -c /etc/snmp/snmpd.conf
echo " /usr/sbin/snmpd $SNMPD_OPTIONS -c /etc/snmp/snmpd.conf"
fi
}
stop() {
# Stop daemons.
COUNT=0
echo -n "Shutting down snmpd: "
while `killall snmpd 2>/dev/null`; do
echo -n "."
sleep 1
COUNT=$((COUNT+1))
if [ $COUNT -ge 30 ]; then
killall -9 snmpd
sleep 1
break
fi
done
echo " DONE"
}
# See how we were called.
case "$1" in
start)
start
;;
stop)
stop
;;
restart|reload)
stop
start
;;
condrestart)
if [ -f /var/run/snmpd ]; then
stop
start
fi
;;
*)
echo $"Usage: $0 {start|stop|restart|condrestart}"
;;
esac

View file

@ -0,0 +1,19 @@
# HOW TO EDIT THIS FILE:
# The "handy ruler" below makes it easier to edit a package description. Line
# up the first '|' above the ':' following the base package name, and the '|'
# on the right side marks the last column you can put a character in. You must
# make exactly 11 lines for the formatting to be correct. It's also
# customary to leave one space after the ':'.
|-----handy-ruler------------------------------------------------------|
net-snmp: net-snmp (Simple Network Management Protocol tools)
net-snmp:
net-snmp: Various tools relating to the Simple Network Management Protocol:
net-snmp:
net-snmp: An extensible agent
net-snmp: An SNMP library
net-snmp: Tools to request or set information from SNMP agents
net-snmp: Tools to generate and handle SNMP traps
net-snmp: A version of the UNIX 'netstat' command using SNMP
net-snmp: A graphical Perl/Tk/SNMP based mib browser
net-snmp:

View file

@ -0,0 +1,455 @@
###############################################################################
#
# snmpd.conf:
# An example configuration file for configuring the ucd-snmp snmpd agent.
#
###############################################################################
#
# This file is intended to only be as a starting point. Many more
# configuration directives exist than are mentioned in this file. For
# full details, see the snmpd.conf(5) manual page.
#
# All lines beginning with a '#' are comments and are intended for you
# to read. All other lines are configuration commands for the agent.
###############################################################################
# Access Control
###############################################################################
# As shipped, the snmpd demon will only respond to queries on the
# system mib group until this file is replaced or modified for
# security purposes. Examples are shown below about how to increase the
# level of access.
# By far, the most common question I get about the agent is "why won't
# it work?", when really it should be "how do I configure the agent to
# allow me to access it?"
#
# By default, the agent responds to the "public" community for read
# only access, if run out of the box without any configuration file in
# place. The following examples show you other ways of configuring
# the agent so that you can change the community names, and give
# yourself write access to the mib tree as well.
#
# For more information, read the FAQ as well as the snmpd.conf(5)
# manual page.
####
# First, map the community name "public" into a "security name"
# sec.name source community
com2sec notConfigUser default public
####
# Second, map the security name into a group name:
# groupName securityModel securityName
group notConfigGroup v1 notConfigUser
group notConfigGroup v2c notConfigUser
####
# Third, create a view for us to let the group have rights to:
# Make at least snmpwalk -v 1 localhost -c public system fast again.
# name incl/excl subtree mask(optional)
view systemview included .1.3.6.1.2.1.1
view systemview included .1.3.6.1.2.1.25.1.1
####
# Finally, grant the group read-only access to the systemview view.
# group context sec.model sec.level prefix read write notif
access notConfigGroup "" any noauth exact systemview none none
# -----------------------------------------------------------------------------
# Here is a commented out example configuration that allows less
# restrictive access.
# YOU SHOULD CHANGE THE "COMMUNITY" TOKEN BELOW TO A NEW KEYWORD ONLY
# KNOWN AT YOUR SITE. YOU *MUST* CHANGE THE NETWORK TOKEN BELOW TO
# SOMETHING REFLECTING YOUR LOCAL NETWORK ADDRESS SPACE.
## sec.name source community
#com2sec local localhost COMMUNITY
#com2sec mynetwork NETWORK/24 COMMUNITY
## group.name sec.model sec.name
#group MyRWGroup any local
#group MyROGroup any mynetwork
#
#group MyRWGroup any otherv3user
#...
## incl/excl subtree mask
#view all included .1 80
## -or just the mib2 tree-
#view mib2 included .iso.org.dod.internet.mgmt.mib-2 fc
## context sec.model sec.level prefix read write notif
#access MyROGroup "" any noauth 0 all none none
#access MyRWGroup "" any noauth 0 all all all
###############################################################################
# Sample configuration to make net-snmpd RFC 1213.
# Unfortunately v1 and v2c don't allow any user based authentification, so
# opening up the default config is not an option from a security point.
#
# WARNING: If you uncomment the following lines you allow write access to your
# snmpd daemon from any source! To avoid this use different names for your
# community or split out the write access to a different community and
# restrict it to your local network.
# Also remember to comment the syslocation and syscontact parameters later as
# otherwise they are still read only (see FAQ for net-snmp).
#
# First, map the community name "public" into a "security name"
# sec.name source community
#com2sec notConfigUser default public
# Second, map the security name into a group name:
# groupName securityModel securityName
#group notConfigGroup v1 notConfigUser
#group notConfigGroup v2c notConfigUser
# Third, create a view for us to let the group have rights to:
# Open up the whole tree for ro, make the RFC 1213 required ones rw.
# name incl/excl subtree mask(optional)
#view roview included .1
#view rwview included system.sysContact
#view rwview included system.sysName
#view rwview included system.sysLocation
#view rwview included interfaces.ifTable.ifEntry.ifAdminStatus
#view rwview included at.atTable.atEntry.atPhysAddress
#view rwview included at.atTable.atEntry.atNetAddress
#view rwview included ip.ipForwarding
#view rwview included ip.ipDefaultTTL
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteDest
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteIfIndex
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric1
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric2
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric3
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric4
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteType
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteAge
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMask
#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric5
#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaIfIndex
#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaPhysAddress
#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaNetAddress
#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaType
#view rwview included tcp.tcpConnTable.tcpConnEntry.tcpConnState
#view rwview included egp.egpNeighTable.egpNeighEntry.egpNeighEventTrigger
#view rwview included snmp.snmpEnableAuthenTraps
# Finally, grant the group read-only access to the systemview view.
# group context sec.model sec.level prefix read write notif
#access notConfigGroup "" any noauth exact roview rwview none
###############################################################################
# System contact information
#
# It is also possible to set the sysContact and sysLocation system
# variables through the snmpd.conf file:
syslocation Unknown (edit /etc/snmp/snmpd.conf)
syscontact Root <root@localhost> (configure /etc/snmp/snmp.local.conf)
# Example output of snmpwalk:
# % snmpwalk -v 1 localhost -c public system
# system.sysDescr.0 = "SunOS name sun4c"
# system.sysObjectID.0 = OID: enterprises.ucdavis.ucdSnmpAgent.sunos4
# system.sysUpTime.0 = Timeticks: (595637548) 68 days, 22:32:55
# system.sysContact.0 = "Me <me@somewhere.org>"
# system.sysName.0 = "name"
# system.sysLocation.0 = "Right here, right now."
# system.sysServices.0 = 72
# -----------------------------------------------------------------------------
###############################################################################
# Process checks.
#
# The following are examples of how to use the agent to check for
# processes running on the host. The syntax looks something like:
#
# proc NAME [MAX=0] [MIN=0]
#
# NAME: the name of the process to check for. It must match
# exactly (ie, http will not find httpd processes).
# MAX: the maximum number allowed to be running. Defaults to 0.
# MIN: the minimum number to be running. Defaults to 0.
#
# Examples (commented out by default):
#
# Make sure mountd is running
#proc mountd
# Make sure there are no more than 4 ntalkds running, but 0 is ok too.
#proc ntalkd 4
# Make sure at least one sendmail, but less than or equal to 10 are running.
#proc sendmail 10 1
# A snmpwalk of the process mib tree would look something like this:
#
# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.2
# enterprises.ucdavis.procTable.prEntry.prIndex.1 = 1
# enterprises.ucdavis.procTable.prEntry.prIndex.2 = 2
# enterprises.ucdavis.procTable.prEntry.prIndex.3 = 3
# enterprises.ucdavis.procTable.prEntry.prNames.1 = "mountd"
# enterprises.ucdavis.procTable.prEntry.prNames.2 = "ntalkd"
# enterprises.ucdavis.procTable.prEntry.prNames.3 = "sendmail"
# enterprises.ucdavis.procTable.prEntry.prMin.1 = 0
# enterprises.ucdavis.procTable.prEntry.prMin.2 = 0
# enterprises.ucdavis.procTable.prEntry.prMin.3 = 1
# enterprises.ucdavis.procTable.prEntry.prMax.1 = 0
# enterprises.ucdavis.procTable.prEntry.prMax.2 = 4
# enterprises.ucdavis.procTable.prEntry.prMax.3 = 10
# enterprises.ucdavis.procTable.prEntry.prCount.1 = 0
# enterprises.ucdavis.procTable.prEntry.prCount.2 = 0
# enterprises.ucdavis.procTable.prEntry.prCount.3 = 1
# enterprises.ucdavis.procTable.prEntry.prErrorFlag.1 = 1
# enterprises.ucdavis.procTable.prEntry.prErrorFlag.2 = 0
# enterprises.ucdavis.procTable.prEntry.prErrorFlag.3 = 0
# enterprises.ucdavis.procTable.prEntry.prErrMessage.1 = "No mountd process running."
# enterprises.ucdavis.procTable.prEntry.prErrMessage.2 = ""
# enterprises.ucdavis.procTable.prEntry.prErrMessage.3 = ""
# enterprises.ucdavis.procTable.prEntry.prErrFix.1 = 0
# enterprises.ucdavis.procTable.prEntry.prErrFix.2 = 0
# enterprises.ucdavis.procTable.prEntry.prErrFix.3 = 0
#
# Note that the errorFlag for mountd is set to 1 because one is not
# running (in this case an rpc.mountd is, but thats not good enough),
# and the ErrMessage tells you what's wrong. The configuration
# imposed in the snmpd.conf file is also shown.
#
# Special Case: When the min and max numbers are both 0, it assumes
# you want a max of infinity and a min of 1.
#
# -----------------------------------------------------------------------------
###############################################################################
# Executables/scripts
#
#
# You can also have programs run by the agent that return a single
# line of output and an exit code. Here are two examples.
#
# exec NAME PROGRAM [ARGS ...]
#
# NAME: A generic name.
# PROGRAM: The program to run. Include the path!
# ARGS: optional arguments to be passed to the program
# a simple hello world
#exec echotest /bin/echo hello world
# Run a shell script containing:
#
# #!/bin/sh
# echo hello world
# echo hi there
# exit 35
#
# Note: this has been specifically commented out to prevent
# accidental security holes due to someone else on your system writing
# a /tmp/shtest before you do. Uncomment to use it.
#
#exec shelltest /bin/sh /tmp/shtest
# Then,
# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.8
# enterprises.ucdavis.extTable.extEntry.extIndex.1 = 1
# enterprises.ucdavis.extTable.extEntry.extIndex.2 = 2
# enterprises.ucdavis.extTable.extEntry.extNames.1 = "echotest"
# enterprises.ucdavis.extTable.extEntry.extNames.2 = "shelltest"
# enterprises.ucdavis.extTable.extEntry.extCommand.1 = "/bin/echo hello world"
# enterprises.ucdavis.extTable.extEntry.extCommand.2 = "/bin/sh /tmp/shtest"
# enterprises.ucdavis.extTable.extEntry.extResult.1 = 0
# enterprises.ucdavis.extTable.extEntry.extResult.2 = 35
# enterprises.ucdavis.extTable.extEntry.extOutput.1 = "hello world."
# enterprises.ucdavis.extTable.extEntry.extOutput.2 = "hello world."
# enterprises.ucdavis.extTable.extEntry.extErrFix.1 = 0
# enterprises.ucdavis.extTable.extEntry.extErrFix.2 = 0
# Note that the second line of the /tmp/shtest shell script is cut
# off. Also note that the exit status of 35 was returned.
# -----------------------------------------------------------------------------
###############################################################################
# disk checks
#
# The agent can check the amount of available disk space, and make
# sure it is above a set limit.
# disk PATH [MIN=100000]
#
# PATH: mount path to the disk in question.
# MIN: Disks with space below this value will have the Mib's errorFlag set.
# Default value = 100000.
# Check the / partition and make sure it contains at least 10 megs.
#disk / 10000
# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.9
# enterprises.ucdavis.diskTable.dskEntry.diskIndex.1 = 0
# enterprises.ucdavis.diskTable.dskEntry.diskPath.1 = "/" Hex: 2F
# enterprises.ucdavis.diskTable.dskEntry.diskDevice.1 = "/dev/dsk/c201d6s0"
# enterprises.ucdavis.diskTable.dskEntry.diskMinimum.1 = 10000
# enterprises.ucdavis.diskTable.dskEntry.diskTotal.1 = 837130
# enterprises.ucdavis.diskTable.dskEntry.diskAvail.1 = 316325
# enterprises.ucdavis.diskTable.dskEntry.diskUsed.1 = 437092
# enterprises.ucdavis.diskTable.dskEntry.diskPercent.1 = 58
# enterprises.ucdavis.diskTable.dskEntry.diskErrorFlag.1 = 0
# enterprises.ucdavis.diskTable.dskEntry.diskErrorMsg.1 = ""
# -----------------------------------------------------------------------------
###############################################################################
# load average checks
#
# load [1MAX=12.0] [5MAX=12.0] [15MAX=12.0]
#
# 1MAX: If the 1 minute load average is above this limit at query
# time, the errorFlag will be set.
# 5MAX: Similar, but for 5 min average.
# 15MAX: Similar, but for 15 min average.
# Check for loads:
#load 12 14 14
# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.10
# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.1 = 1
# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.2 = 2
# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.3 = 3
# enterprises.ucdavis.loadTable.laEntry.loadaveNames.1 = "Load-1"
# enterprises.ucdavis.loadTable.laEntry.loadaveNames.2 = "Load-5"
# enterprises.ucdavis.loadTable.laEntry.loadaveNames.3 = "Load-15"
# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.1 = "0.49" Hex: 30 2E 34 39
# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.2 = "0.31" Hex: 30 2E 33 31
# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.3 = "0.26" Hex: 30 2E 32 36
# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.1 = "12.00"
# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.2 = "14.00"
# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.3 = "14.00"
# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.1 = 0
# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.2 = 0
# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.3 = 0
# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.1 = ""
# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.2 = ""
# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.3 = ""
# -----------------------------------------------------------------------------
###############################################################################
# Extensible sections.
#
# This alleviates the multiple line output problem found in the
# previous executable mib by placing each mib in its own mib table:
# Run a shell script containing:
#
# #!/bin/sh
# echo hello world
# echo hi there
# exit 35
#
# Note: this has been specifically commented out to prevent
# accidental security holes due to someone else on your system writing
# a /tmp/shtest before you do. Uncomment to use it.
#
# exec .1.3.6.1.4.1.2021.50 shelltest /bin/sh /tmp/shtest
# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.50
# enterprises.ucdavis.50.1.1 = 1
# enterprises.ucdavis.50.2.1 = "shelltest"
# enterprises.ucdavis.50.3.1 = "/bin/sh /tmp/shtest"
# enterprises.ucdavis.50.100.1 = 35
# enterprises.ucdavis.50.101.1 = "hello world."
# enterprises.ucdavis.50.101.2 = "hi there."
# enterprises.ucdavis.50.102.1 = 0
# Now the Output has grown to two lines, and we can see the 'hi
# there.' output as the second line from our shell script.
#
# Note that you must alter the mib.txt file to be correct if you want
# the .50.* outputs above to change to reasonable text descriptions.
# Other ideas:
#
# exec .1.3.6.1.4.1.2021.51 ps /bin/ps
# exec .1.3.6.1.4.1.2021.52 top /usr/local/bin/top
# exec .1.3.6.1.4.1.2021.53 mailq /usr/bin/mailq
# -----------------------------------------------------------------------------
###############################################################################
# Pass through control.
#
# Usage:
# pass MIBOID EXEC-COMMAND
#
# This will pass total control of the mib underneath the MIBOID
# portion of the mib to the EXEC-COMMAND.
#
# Note: You'll have to change the path of the passtest script to your
# source directory or install it in the given location.
#
# Example: (see the script for details)
# (commented out here since it requires that you place the
# script in the right location. (its not installed by default))
# pass .1.3.6.1.4.1.2021.255 /bin/sh /usr/local/local/passtest
# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.255
# enterprises.ucdavis.255.1 = "life the universe and everything"
# enterprises.ucdavis.255.2.1 = 42
# enterprises.ucdavis.255.2.2 = OID: 42.42.42
# enterprises.ucdavis.255.3 = Timeticks: (363136200) 42 days, 0:42:42
# enterprises.ucdavis.255.4 = IpAddress: 127.0.0.1
# enterprises.ucdavis.255.5 = 42
# enterprises.ucdavis.255.6 = Gauge: 42
#
# % snmpget -v 1 localhost public .1.3.6.1.4.1.2021.255.5
# enterprises.ucdavis.255.5 = 42
#
# % snmpset -v 1 localhost public .1.3.6.1.4.1.2021.255.1 s "New string"
# enterprises.ucdavis.255.1 = "New string"
#
# For specific usage information, see the man/snmpd.conf.5 manual page
# as well as the local/passtest script used in the above example.
# Added for support of bcm5820 cards.
pass .1.3.6.1.4.1.4413.4.1 /usr/bin/ucd5820stat
###############################################################################
# Further Information
#
# See the snmpd.conf manual page, and the output of "snmpd -H".

View file

@ -0,0 +1,2 @@
# Options to use when running snmpd:
SNMPD_OPTIONS="-A -p /var/run/snmpd -a"

View file

@ -1184,6 +1184,13 @@ gzip ./patches/source/seamonkey/sm.ui.scrollToClick.diff
gzip ./patches/source/vim/ctags.use-conventional-unused-marker.patch
gzip ./patches/source/vim/vim.vimrc.diff
gzip ./patches/source/libxslt/libxslt.xsltMaxDepth.diff
gzip ./patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch
gzip ./patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch
gzip ./patches/source/net-snmp/net-snmp-5.8-multilib.patch
gzip ./patches/source/net-snmp/snmpd.conf
gzip ./patches/source/net-snmp/doinst.sh
gzip ./patches/source/net-snmp/net-snmp-5.7.3-iterator-fix.patch
gzip ./patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch
gzip ./patches/source/openssl/doinst.sh-openssl-solibs
gzip ./patches/source/openssl/doinst.sh-openssl
gzip ./patches/source/openssl/certwatch