Breda
From Geert Stappers to ~stappers/dnsmasqmlpc
On Thu, Jan 09, 2025 at 03:22:50PM +0100, Paul Donald wrote: > Some writing was improved for clarity, especially regarding the use of > tags which can be confusing and difficult to grasp. Nice. Thanks. I'll raise it at dnsmasq mailinglist. (Already done ;-) Groeten Geert Stappers
From Geert Stappers to ~stappers/dnsmasqmlpc
From: Dominik Derigs <dl6er@dl6er.de> Signed-off-by: Dominik Derigs <dl6er@dl6er.de> --- src/rfc2131.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/rfc2131.c b/src/rfc2131.c index f494a55..f99b8d5 100644 --- a/src/rfc2131.c +++ b/src/rfc2131.c @@ -934,6 +934,7 @@ size_t dhcp_reply(struct dhcp_context *context, char *iface_name, int int_index, opt71.next = daemon->dhcp_opts; do_encap_opts(&opt71, OPTION_VENDOR_CLASS_OPT, DHOPT_VENDOR_MATCH, mess, end, 0); [message trimmed]
From Geert Stappers to ~stappers/dnsmasqmlpc
--- src/option.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/option.c b/src/option.c index 92f3582..730adf4 100644 --- a/src/option.c +++ b/src/option.c @@ -452,7 +452,7 @@ static struct { { 'o', OPT_ORDER, NULL, gettext_noop("Use nameservers strictly in the order given in %s."), RESOLVFILE }, { 'O', ARG_DUP, "<optspec>", gettext_noop("Specify options to be sent to DHCP clients."), NULL }, { LOPT_FORCE, ARG_DUP, "<optspec>", gettext_noop("DHCP option sent even if the client does not request it."), NULL}, { LOPT_PXE_OPT, ARG_DUP, "<optspec>", gettext_noop("DHCP option sent only to PCE clients."), NULL}, { LOPT_PXE_OPT, ARG_DUP, "<optspec>", gettext_noop("DHCP option sent only to PXE clients."), NULL},[message trimmed]
From Geert Stappers to ~sircmpwn/sr.ht-discuss
Previous-Subject: Re: Support Installing sourcehut Via Docker In-Reply-To: <D611ZJUGR746.CT53FJ3UH9JQ@cmpwn.com> On Mon, Dec 02, 2024 at 08:57:47AM +0100, Drew DeVault wrote: > We will eventually provide official containers > as part of our k8s work. That will be awesome. How to make it possible to reach that goal sooner? Groeten
From Geert Stappers to ~stappers/dnsmasqmlpc
Because there is no information in empty trailing lines. --- FAQ | 11 ----------- bld/get-version | 1 - bld/install-mo | 2 -- contrib/CPE-WAN/README | 2 -- contrib/Solaris10/README | 1 - contrib/conntrack/README | 1 - contrib/dbus-test/dbus-test.py | 1 - contrib/lease-access/README | 2 -- contrib/lease-tools/dhcp_lease_time.1 | 2 -- contrib/lease-tools/dhcp_release.1 | 2 -- contrib/lease-tools/dhcp_release6.1 | 2 -- contrib/port-forward/dnsmasq-portforward | 2 -- [message trimmed]
From Geert Stappers to ~stappers/dnsmasqmlpc
Reflect outcome of discussion on mailinglist. Removed reference to meanwhile removed KB, Knowledge Base, note. --- src/dhcp.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/dhcp.c b/src/dhcp.c index b65facd..e34b292 100644 --- a/src/dhcp.c +++ b/src/dhcp.c @@ -824,8 +824,10 @@ int address_allocate(struct dhcp_context *context, /* Addresses which end in .255 and .0 are broken in Windows even when using supernetting. ie dhcp-range=192.168.0.1,192.168.1.254,255,255,254.0 then 192.168.0.255 is a valid IP address, but not for Windows as it's [message trimmed]
From Geert Stappers to ~stappers/dnsmasqmlpc
Some minor changes in comment lines Reported-by: Gary R. Schmidt <grschmidt@acm.org> --- trust-anchors.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/trust-anchors.conf b/trust-anchors.conf index 1a7de74..e8bacf4 100644 --- a/trust-anchors.conf +++ b/trust-anchors.conf @@ -1,7 +1,7 @@ # The root DNSSEC trust anchor, valid as at 18/07/2024 [message trimmed]
From Geert Stappers to ~stappers/dnsmasqmlpc
From: Loganaden Velvindron <logan@cyberstorm.mu> Signed-off-by: Loganaden Velvindron <logan@cyberstorm.mu> Signed-off-by: Jaykishan Mutkawoa <jay@cyberstorm.mu> --- trust-anchors.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/trust-anchors.conf b/trust-anchors.conf index 2a1e2a0..1a7de74 100644 --- a/trust-anchors.conf +++ b/trust-anchors.conf @@ -1,9 +1,9 @@ # The root DNSSEC trust anchor, valid as at 11/01/2019[message trimmed]
From Geert Stappers to ~sircmpwn/sr.ht-dev
On Mon, Aug 26, 2024 at 05:46:04PM +0000, builds.sr.ht wrote: > todo.sr.ht/patches/alpine.yml: FAILED in 1m0s > [search.py: Fix `submitter:me` queries][0] v2 from [Johannes Maibaum][1] > ✗ #1312302 FAILED todo.sr.ht/patches/alpine.yml https://builds.sr.ht/~sircmpwn/job/1312302 Line https://builds.sr.ht/~sircmpwn/job/1312302#task-package-325 has setuptools.extern.packaging.version.InvalidVersion: Invalid version: '0.75.16_git20240826' Where to change that version number? Groeten Geert Stappers --
From Geert Stappers to ~stappers/dnsmasqmlpc
Another 17th of the month, another "picking up the patches" Previous-Subject: Re: [Dnsmasq-discuss] [PATCH] Ensure resize_packet() does not overflow header In-Reply-To: <20240513020401.841150-1-dominique.martinet@atmark-techno.com> ( https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q2/017572.html ) On Mon, May 13, 2024 at 11:04:01AM +0900, Dominique Martinet wrote: > This is a "fix" for OSV-2022-785 (oss-fuzz automated report that > apparently hasn't been looked into) > > It really is a redundant safety in case something goes wrong when > finding pheader: the only caller of resize_packet() with a pheader are