- 09 Nov, 2016 1 commit
-
-
Scott Bronson authored
On every login we're notified: New release '16.04.1 LTS' available. Run 'do-release-upgrade' to upgrade to it. Disable this so that an eager yet inattentive admin doesn't accidentally follow these instructions.
-
- 24 Oct, 2016 1 commit
-
-
Michael Kroes authored
-
- 21 Oct, 2016 1 commit
-
-
Michael Kroes authored
-
- 18 Oct, 2016 2 commits
-
-
Tristan Hill authored
fixes #967
-
Michael Kroes authored
[this is a squashed merge from-] * Install owncoud 9.1 and provide an upgrade path from 8.2. This also disables memcached and goes with apc. The upgrade fails with memcached. * Remove php apc setting * Add dav migrations for each user * Add some comments to the code * When upgrading owncloud from 8.2.3 to 9.1.0 the backup of 8.2.3 was overwritten when going from 9.0 to 9.1 * Add upgrade path from 8.1.1. Only do an upgrade check if owncloud was previously installed. * Stop php5-fpm before owncloud upgrade to prevent database locks * Fix fail2ban tests for owncloud 9 * When upgrading owncloud copy the database to the user-data/owncloud-backup directory * Remove not need unzip directives during owncloud extraction. Directory is removed beforehand so a normal extraction is fine * Improve backup of owncloud installation and provide a post installation restore script. Update the owncloud version number to 9.1.1. Update the calendar and contacts apps to the latest versions * Separate the ownCloud upgrades visually in the console output.
-
- 15 Oct, 2016 2 commits
-
-
Michael Kroes authored
-
rxcomm authored
* sshfp records from nonstandard ports If port 22 is not open, dns_update.py will not create SSHFP records because it only scans port 22 for keys. This commit modifies dns_update.py to parse the sshd_config file for open ports, and then obtains keys from one of them (even if port 22 is not open). * modified test of s per JoshData request * edit CHANGELOG per JoshData * fix typo
-
- 08 Oct, 2016 2 commits
-
-
Michael Kroes authored
-
Joshua Tauberer authored
-
- 05 Oct, 2016 1 commit
-
-
Steve Gregg authored
-
- 28 Sep, 2016 2 commits
-
-
yodax authored
-
Michael Kroes authored
Remove Certificate Providers / Fix #950
-
- 27 Sep, 2016 1 commit
-
-
Marius Blüm authored
Signed-off-by: Marius Blüm <marius@lineone.io>
-
- 23 Sep, 2016 6 commits
-
-
Michael Kroes authored
fixes #534, again, hopefully
-
Marius Blüm authored
Signed-off-by: Marius Blüm <marius@lineone.io>
-
Joshua Tauberer authored
-
Joshua Tauberer authored
-
Joshua Tauberer authored
fixes #945, corrects prev commit (#947) in case of multiple AAAA records, adds changelog
-
Mathis Hoffmann authored
see #945, merges #947
-
- 19 Sep, 2016 1 commit
-
-
Corey Hinshaw authored
-
- 18 Sep, 2016 1 commit
-
-
Scott Bronson authored
-
- 16 Sep, 2016 1 commit
-
-
Joshua Tauberer authored
fix status_checks.py free disk space reporting, fixes #932
-
- 15 Sep, 2016 1 commit
-
-
cs@twoflower authored
-
- 24 Aug, 2016 1 commit
-
-
Joshua Tauberer authored
-
- 22 Aug, 2016 1 commit
-
-
Joshua Tauberer authored
-
- 20 Aug, 2016 3 commits
-
-
Joshua Tauberer authored
-
Joshua Tauberer authored
-
Joshua Tauberer authored
Seems like if REQUEST_METHOD is set to GET, then we can drop two redundant ways the query string is given. munin-cgi-graph itself reads the environment variables only, but its calls to Perl's CGI::param will look at the command line if REQUEST_METHOD is not used, otherwise it uses environment variables like CGI used to work. Since this is all behind admin auth anyway, there isn't a public vulnerability. #914 was opened without comment which lead me to notice the redundancy and worry about a vulnerability, before I realized this is admin-only anyway. The vulnerability was created by 6d6f3ea3. See #914. This is the v0.19b hotfix commit.
-
- 19 Aug, 2016 1 commit
-
-
Joshua Tauberer authored
Seems like if REQUEST_METHOD is set to GET, then we can drop two redundant ways the query string is given. munin-cgi-graph itself reads the environment variables only, but its calls to Perl's CGI::param will look at the command line if REQUEST_METHOD is not used, otherwise it uses environment variables like CGI used to work. Since this is all behind admin auth anyway, there isn't a public vulnerability. #914 was opened without comment which lead me to notice the redundancy and worry about a vulnerability, before I realized this is admin-only anyway.
-
- 18 Aug, 2016 3 commits
-
-
Joshua Tauberer authored
-
Joshua Tauberer authored
-
Joshua Tauberer authored
fixes #911
-
- 16 Aug, 2016 2 commits
-
-
Joshua Tauberer authored
Merge pull request #900 from mail-in-a-box/code_of_conduct
-
Joshua Tauberer authored
-
- 15 Aug, 2016 2 commits
-
-
Marius Blüm authored
Signed-off-by: Marius Blüm <marius@lineone.io>
-
ReadmeCritic authored
-
- 13 Aug, 2016 2 commits
-
-
Joshua Tauberer authored
Merge https://github.com/mar1u5/mailinabox fixes #901
-
Joshua Tauberer authored
closes #898
-
- 08 Aug, 2016 2 commits
-
-
Marius Blüm authored
Signed-off-by: Marius Blüm <marius@lineone.io>
-
Marius Blüm authored
Signed-off-by: Marius Blüm <marius@lineone.io>
-