Skip to content

Patch release 2.3.1 #19931

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 21 commits into from
Mar 24, 2025
Merged

Patch release 2.3.1 #19931

merged 21 commits into from
Mar 24, 2025

Conversation

stelfrag
Copy link
Collaborator

@stelfrag stelfrag commented Mar 21, 2025

Summary

ktsaou and others added 10 commits March 21, 2025 10:32
* added new exit cause: shutdown timeout to daemon status and sentry

* added to exit cause

* increase status file version to 20

* tested; exit timeout now works independently of sentry

* added timezone to status file

* added agent_version_now when posting crash reports

* added cloud provider, cloud instance and cloud region to status file and sentry

(cherry picked from commit 6001d73)
* if the status has exited in it, the agent is successfully exited

* fix reliability calculation

* fix crash calculation

(cherry picked from commit d09924b)
* Use completion to make sure the aclk sync thread has finished initialization

* Validate inputs in aclk functions to prevent null pointer dereferences

(cherry picked from commit 448a081)
* remove ilove ednpoint

* leftovers

(cherry picked from commit f82554f)
do not return back the absolute filename of files requested via the web server

(cherry picked from commit 968bc5d)
On most UNIX systems, including Linux, macOS, and FreeBSD, the `chmod()`
function will follow symlinks if called on a symlink. This means that
any code that uses `chmod()` to apply permissions to a known filename
can be exploited to apply those same permissions to an arbitrary file on
the system that the user the code is running as could call `chmod()` on
by simply replacing the known file with a symlink pointing to the target
file after the known file is created but before its permissions are
modified.:

Because we are already opening the file in question in this case, we
should instead use `fchmod()` to modify the permissions via the file
descriptor before closing the file, which is not vulnerable to this
race condition.

(cherry picked from commit 3321195)
stelfrag and others added 11 commits March 21, 2025 11:10
* Fix compile without dbengine

* Fix compilation when using FSANITIZE_ADDRESS

* Fix compilation warning when compiling without ENABLE_SENTRY

(cherry picked from commit 2b3e1d6)
* initial implementation of libbacktrace

* in buildinfo show the parameters of libbacktrace

* do not disable libbacktrace if threading is not supported

* Don’t install libbacktrace, only build it.

* Disable libbacktrace for 32-bit ARM builds.

* Make libunwind and libbacktrace mutually exclusive at configure time.

Instead of relying on it being mutually exclusive at build time. This
ensures we don’t waste time on libunwind when using libbacktrace.

* Only use libbacktrace on Linux and Windows

* Work around broken logic in openSUSE rpmbuild.

* Fix handling of libbacktrace for 32-bit ARM static builds.

---------

Co-authored-by: Austin S. Hemmelgarn <austin@netdata.cloud>
(cherry picked from commit b75958a)
…#19939)

* Don't build libunwind in static builds when it's not needed.

* Fix job skip logic.

(cherry picked from commit b800a84)
)

* Disable generation of debuginfo packages for DEB distros.

actually need to the debuginfo to work correctly, so split debug symbols don’t
Our automatic stacktrace logging and crash reporting functionality
really make sense for our use case.

* Only disable split debuginfo for core, not plugins.

We don’t do crash reporting or stack trace logging for plugins, so they
can still use the split debug info packages.

* Work around bugs in Debian 11 and Ubuntu 20.04.

(cherry picked from commit 7b38ebd)
* do not report CI jobs

* make version 21

* make sure the machine guid filename is available on start

* fix crash

* remove machine guid maintenance from registry and make sure it never fails

* cleanup

* polishing and cleanup

* fix portability of struct stat timestamps

* increase stack traces provider buffer

(cherry picked from commit 7439280)
add netdata max rss and oom protection to status file; added killed hard low mem exit cause

(cherry picked from commit 52a60fb)
* detect low ram conditions more aggresively

* added free memory percent to posted status file

(cherry picked from commit eeb88c9)
@github-actions github-actions bot added area/packaging Packaging and operating systems support area/registry labels Mar 24, 2025
@Ferroin Ferroin marked this pull request as ready for review March 24, 2025 16:24
@Ferroin Ferroin merged commit 6ad172a into netdata:v2.3 Mar 24, 2025
96 of 97 checks passed
@stelfrag stelfrag deleted the patch_release branch March 25, 2025 13:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants