diff --git a/website/content/en/status/report-2023-07-2023-09/freebsd-foundation.adoc b/website/content/en/status/report-2023-07-2023-09/freebsd-foundation.adoc index 908e6c12c8..f437dab834 100644 --- a/website/content/en/status/report-2023-07-2023-09/freebsd-foundation.adoc +++ b/website/content/en/status/report-2023-07-2023-09/freebsd-foundation.adoc @@ -1,162 +1,164 @@ === FreeBSD Foundation Links: + link:https://freebsdfoundation.org/[FreeBSD Foundation] URL: link:https://freebsdfoundation.org/[] + link:https://freebsdfoundation.org/blog/technology-roadmap/[Technology Roadmap] URL: link:https://freebsdfoundation.org/blog/technology-roadmap/[] + link:https://freebsdfoundation.org/donate/[Donate] URL: link:https://freebsdfoundation.org/donate/[] + link:https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/[Foundation Partnership Program] URL: link:https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/[] + link:https://freebsdfoundation.org/journal/[FreeBSD Journal] URL: link:https://freebsdfoundation.org/journal/[] + link:https://freebsdfoundation.org/our-work/events/[Foundation Events] URL: link:https://freebsdfoundation.org/our-work/events/[] Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Donations from individuals and corporations fund and manage software development projects, conferences, and developer summits. We also provide travel grants to FreeBSD contributors, purchase and support hardware to improve and maintain FreeBSD infrastructure, and provide resources to improve security, quality assurance, and cluster administration efforts. We publish marketing material to promote, educate, and advocate for FreeBSD, facilitate collaboration between commercial vendors and FreeBSD developers, and finally, represent the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. This quarter we helped FreeBSD celebrate its 30th anniversary! This excitement has propelled us to accelerate our efforts to move FreeBSD forward in growth and innovation, which has focused us on identifying key areas we can invest our resources. At our board meeting in September, we refined our goals to focus on increasing FreeBSD adoption and visibility, diversifying our funding stream, and investing in the community health and long-term stability of the Project. We are in the process of identifying the key audiences and markets to target, while putting measurable outcomes to these goals. In this status report, you will read more about our work to help further FreeBSD's growth and innovation. We will highlight all the technical work we are doing to improve FreeBSD, both by our internal staff of software developers, as well as external project funding efforts. You will read about our advocacy work to promote FreeBSD to audiences outside of our community. Finally, you will see the great efforts made to connect with current and potential commercial users. ==== Fundraising We would like to express our sincere gratitude to all those who generously donated to support our work. In addition to numerous individual contributions, we are especially grateful for the significant donations from NetApp, Netflix, and ARM. In Q3 alone, we received $183,842, bringing our total for the year to $375,000. This year our budget is around $2,230,000, which includes increased spending toward FreeBSD advocacy and software development. More than half of our budget is allocated toward work directly related to improving FreeBSD and keeping it secure. By providing a dedicated individual focused on partnerships, we can effectively emphasize the significance of investing in our efforts and underscore the long-term viability of FreeBSD to companies. Your support is crucial to our mission, and we deeply appreciate your commitment to the FreeBSD community. Please consider making a donation toward our 2023 fundraising campaign! link:https://freebsdfoundation.org/donate/[] For our larger commercial donors, check out our updated link:https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/[FreeBSD Foundation Partnership Program]. ==== Partnerships and Research For Partnerships and Research this quarter, progress was made in three key areas: First, the link:https://wiki.freebsd.org/EnterpriseWorkingGroup[Enterprise Working Group] started to gather steam with growth up to 58 participants and active projects in four work streams. These are cloud native, Samba, bhyve manageability, and support for AI workloads. There is interest in several additional areas and I expect that by the end of this year and Q1 of next year, we will see meaningful feature updates in multiple areas of focus. Second, we made good progress working with other open source community members and organizations, notably the link:https://opensource.org/[Open Source Initiative], to advance proposals and technology from the FreeBSD community. Working with the Open Source Initiative’s link:https://opensource.org/programs/open-policy-alliance/[Open Policy Alliance], we are submitting a response to the US government's request for information on how the US government can support open source security and sustainability. As part of this, Greg Wallace participated on a panel organized by the Open Policy Alliance at the recent All Things Open conference in Raleigh, North Carolina. Greg Wallace has also been tracking how the US government incorporates CHERI into its policy recommendations for security by default, link:https://www.cisa.gov/sites/default/files/2023-10/Shifting-the-Balance-of-Cybersecurity-Risk-Principles-and-Approaches-for-Secure-by-Design-Software.pdf[such as this recent report from US and global government security agencies]. On Page 28, CHERI is listed right after Rust as a key 'Secure by Design' tactic. Finally, we continue to strengthen partnerships with a growing number of companies using FreeBSD. Several conferences aided these relationships, including EuroBSDCon, Open Source Summit, and All Things Open. We have also developed a new program to support vendor/cloud users that work with the US government. The program details will be announced at the FreeBSD Vendor Summit. ==== Advocacy Much of our effort is dedicated to the FreeBSD Project advocacy. This may involve highlighting interesting FreeBSD work, producing literature and video tutorials, attending events, or giving presentations. The goal of the literature we produce is to teach people FreeBSD basics and help make their path to adoption or contribution easier. Other than attending and presenting at events, we encourage and help community members run their own FreeBSD events, give presentations, or staff FreeBSD tables. The FreeBSD Foundation sponsors many conferences, events, and summits around the globe. These events can be BSD-related, open source, or technology events geared towards underrepresented groups. We support the FreeBSD-focused events to help provide a venue for sharing knowledge, working together on projects, and facilitating collaboration between developers and commercial users. -This all helps provide a healthy ecosystem. We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. -We continue to add new events to our yearly roster. This July, we held a workshop and staffed a table at FOSSY, a new open source conference in Portland, Oregon. +This all helps provide a healthy ecosystem. +We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. +We continue to add new events to our yearly roster. +This July, we held a workshop and staffed a table at FOSSY, a new open source conference in Portland, Oregon. In addition to attending and planning conferences, we are continually working on new training initiatives and updating our selection of link:https://freebsdfoundation.org/freebsd-project/resources/[how-to guides] to facilitate getting more folks to try out FreeBSD. Check out some of our advocacy work: * Held a workshop and hosted a table at link:https://sfconservancy.org/fossy/[FOSSY], July 13-16, 2023, in Portland, Oregon. * Friend-level sponsor of COSCUP, July 27-29, 2023, in New Taipei, Taiwan * Presented at the EuroBSDCon FreeBSD Developer Summit, and sponsored and staffed a table at link:https://2023.eurobsdcon.org/[EuroBSDCon 2023], September 14-17, 2023 in Coimbra, Portugal * Attended the link:https://events.linuxfoundation.org/open-source-summit-europe/[Open Source Summit, Europe], September 19-21, Bilbao, Spain * Continued planning the link:https://freebsdfoundation.org/news-and-events/event-calendar/november-2023-freebsd-vendor-summit/[November 2023 FreeBSD Vendor Summit], taking place November 2-3, 2023, in San Jose, California * Continued to administer our Google Summer of Code program * Published the link:https://freebsdfoundation.org/news-and-events/newsletter/freebsd-foundation-update-july-2023/[July Newsletter] * Additional Blog Posts ** link:https://freebsdfoundation.org/blog/advocating-at-events-may-2023-freebsd-dev-summit-and-bsdcan/[Advocating at Events: May 2023 FreeBSD Dev Summit and BSDCan] ** link:https://freebsdfoundation.org/blog/top-ten-reasons-to-upgrade-to-freebsd-13-2/[Top Ten Reasons to Upgrade to FreeBSD 13.2] ** link:https://freebsdfoundation.org/blog/july-2023-software-development-projects-update/[July 2023 Software Development Projects Update] ** https://freebsdfoundation.org/blog/freebsd-for-research-cheri-morello/[FreeBSD for Research: CHERI/Morello] ** Meet the FreeBSD Google Summer of Code Students *** link:https://freebsdfoundation.org/blog/meet-the-2023-freebsd-google-summer-of-code-students-soobin-rho/[Soobin Rho] *** link:https://freebsdfoundation.org/blog/meet-the-2023-freebsd-google-summer-of-code-students-raghav-sharma/[Raghav Sharma] *** link:https://freebsdfoundation.org/blog/meet-the-2023-freebsd-google-summer-of-code-students-sudhanshu-mohan-kashyap/[Sudhanshu Mohan Kashyap] *** link:https://freebsdfoundation.org/blog/meet-the-2023-freebsd-google-summer-of-code-students-aymeric-wibo/[Aymeric Wibo] ** link:https://freebsdfoundation.org/blog/meet-the-summer-2023-university-of-waterloo-co-op-student-naman-sood/[Meet The Summer 2023 University of Waterloo Co-Op Student: Naman Sood] ** link:https://freebsdfoundation.org/blog/meet-freebsd-foundation-2023-summer-intern-jake-freeland/[Meet FreeBSD Foundation 2023 Summer Intern: Jake Freeland] * FreeBSD in the News ** link:https://freebsdfoundation.org/news-and-events/latest-news/freebsd-foundation-joins-osis-open-policy-alliance/[FreeBSD Foundation Joins OSI's Open Policy Alliance] ** link:https://freebsdfoundation.org/news-and-events/latest-news/hackernoon-5-reasons-we-use-open-source-freebsd-as-our-enterprise-os/[Hackernoon: 5 Reasons We Use Open Source FreeBSD as Our Enterprise OS] ** link:https://freebsdfoundation.org/news-and-events/latest-news/what-the-dev-podcast-the-evolution-of-the-freebsd-project/[What the Dev Podcast: The Evolution of the FreeBSD Project]. We help educate the world about FreeBSD by publishing the professionally produced FreeBSD Journal. As we mentioned previously, the FreeBSD Journal is now a free publication. Find out more and access the latest issues at link:https://www.freebsdfoundation.org/journal/[]. You can find out more about events we attended and upcoming events at link:https://freebsdfoundation.org/our-work/events/[]. ==== OS Improvements During the third quarter of 2023, 282 src, 652 ports, and 24 doc tree commits identified The FreeBSD Foundation as a sponsor. Some of this Foundation-sponsored work is described in separate report entries: * <<_enabling_snapshots_on_filesystems_using_journaled_soft_updates,Enabling Snapshots on Filesystems Using Journaled Soft Updates>> * <<_login_classes_fixes_and_improvements,Login Classes Fixes and Improvements>> * <<_openssl_3_in_base_-_improved,OpenSSL 3 in base - improved>> * <<_openstack_on_freebsd,OpenStack on FreeBSD>> * <<_process_visibility_security_policies,Process Visibility Security Policies>> * <<_simd enhancements for amd64,SIMD enhancements for amd64>>. Members of the Technology Team attended EuroBSDCon 2023 in Coimbra, Portugal. Li-Wen Hsu gave a tutorial to help newcomers contribute to FreeBSD. Before the conference, the FreeBSD Developer Summit took place, where the team presented a link:https://wiki.freebsd.org/DevSummit/202309?action=AttachFile&do=view&target=Foundation_Technology_Team_Devsummit_Fall_2023.pdf[short update on their recent work]. Six summer internships or projects wrapped up. * link:https://freebsdfoundation.org/blog/meet-freebsd-foundation-2023-summer-intern-jake-freeland/[Jake Freeland] spent the summer working on a link:https://freebsdfoundation.org/project/capsicum-internship/[a Capsicum project] to trace violations, adapt various daemons such as man:syslogd[8], and write documentation. * link:https://freebsdfoundation.org/blog/meet-the-summer-2023-university-of-waterloo-co-op-student-naman-sood/[Naman Sood] worked on link:https://freebsdfoundation.org/project/networking-summer-internship/[various tasks, mostly related to networking]. * En-Wei Wu completed link:https://freebsdfoundation.org/project/wireless-internship/[another wireless internship] to improve and extend wtap, the net80211(4) Wi-Fi simulator. * Yan-Hao Wang worked on a link:https://freebsdfoundation.org/project/documentation-and-testing-internship/[documentation and testing project] to, e.g., build an online man page editor and add test cases for some userspace tools. * Christos Margiolis completed his link:https://freebsdfoundation.org/project/improving-the-kinst-dtrace-provider/[project to improve the kinst DTrace provider] by implementing inline function tracing and porting kinst to arm64 and riscv. * In preparation for FreeBSD 14.0, Muhammad Moinur (Moin) Rahman committed over 700 fixes or workarounds for ports affected by recent OpenSSL and LLVM updates. For more information about current and past Foundation-contracted work, visit the link:https://freebsdfoundation.org/our-work/projects/[Foundation Projects page]. Here is a sampling of other Foundation-sponsored work completed over the quarter: * Improved riscv64 CPU identity and feature detection * Rewrote man:intro[9] man page from scratch * Performed code maintenance and fixed bugs in the man:hwpmc[4] module and the man:pmc[3] library and tools * Committed various man:freebsd-update[8] fixes in preparation for FreeBSD 14.0 * Committed many (37) updates and fixes to the LinuxKPI, iwlwifi, and net802.11 code * Updated SSH first to OpenSSH 9.3p2, then 9.4p1 * Patched ssh-keygen to generate Ed25519 keys when invoked without arguments * Added a clean-room implementation of the Linux man:membarrier[2] system call * Increased MAXCPU to 1024 on amd64 and arm64 * Committed fixes for automatic Zenbleed misbehavior/data leaks prevention on affected machines (via chicken bit) * Reviewed the use of scheduling priorities throughout the kernel for work in progress to harden the rtprio() system call and make it more useful in some cases. ==== Supporting FreeBSD Infrastructure The Foundation provides hardware and two staff members to help support the FreeBSD cluster. With your donations, the Foundation, in coordination with the Cluster Administration Team, purchased five new package builders, three new web servers, a new firewall/router, two package mirrors, and two new servers for continuous integration. With the exception of one of the package mirrors, all the new hardware will be located on the east coast of the USA. ==== Continuous Integration and Quality Assurance The Foundation provides a full-time staff member and funds projects to improve continuous integration, automated testing, and overall quality assurance efforts for the FreeBSD project. You can read more about CI work in a dedicated report entry. ==== Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to link:https://freebsdfoundation.org[] to find more about how we support FreeBSD and how we can help you! diff --git a/website/content/en/status/report-2023-07-2023-09/kde.adoc b/website/content/en/status/report-2023-07-2023-09/kde.adoc index 4598995fd7..c5b242b096 100644 --- a/website/content/en/status/report-2023-07-2023-09/kde.adoc +++ b/website/content/en/status/report-2023-07-2023-09/kde.adoc @@ -1,60 +1,60 @@ === KDE on FreeBSD Links: + link:https://freebsd.kde.org/[KDE/FreeBSD initiative] URL: link:https://freebsd.kde.org/[] + link:https://community.kde.org/FreeBSD[FreeBSD -- KDE Community Wiki] URL: link:https://community.kde.org/FreeBSD[] Contact: Adriaan de Groot The KDE on FreeBSD project packages CMake, Qt, and software from the KDE Community, for the FreeBSD ports tree. The software includes a full desktop environment called KDE Plasma (for both X11 and Wayland) and hundreds of applications that can be used on any FreeBSD machine. The KDE team (kde@) is part of desktop@ and x11@, building the software stack to make FreeBSD beautiful and usable as a daily-driver graphical desktop workstation. The notes below describe *mostly* ports for KDE, but also include items that are important for the entire desktop stack. ==== Infrastructure Qt5 is now on long-term support and updates only rarely. There was an update to 5.15.10 in this quarter. Qt6 is now updated with the regular upstream releases, with the 6.5.2 release landing at the end of July and 6.5.3 following later. CMake saw no updates this quarter, so we are now lagging by at least one minor release. -The changelog for the latest releases does not have much for FreeBSD, so there is no special reason to upgrade. +The changelog for the latest releases does not have much for FreeBSD, so there is no special reason to upgrade. package:sysutils/polkit[] and package:sysutils/consolekit2[] were both updated, bringing improved security policy and console handling to the FreeBSD desktop. package:x11/sddm[] was updated to provide a better graphical login manager. package:multimedia/pipewire[] was updated to version 0.3.81. This provides multimedia support for desktops such as KDE and GNOME. ==== KDE Stack KDE Gear releases happen every quarter, KDE Plasma updates once a month, and KDE Frameworks have a new release every month as well. These (large) updates land shortly after their upstream release and are not listed separately. * KDE Frameworks reached version 5.110. The KDE Frameworks 5 series is winding down, although it will be six months or so before it enters long-term support upstream. * KDE Plasma Desktop was updated to version 5.27.8. Just like frameworks, work on KDE Plasma 5 is winding down upstream in favor of KDE Plasma 6. * KDE Gear updated to 23.08.1. ==== Related Ports The KDE ecosystem includes a wide range of ports -- most maintained by kde@, all building on a shared base of Qt and KDE Frameworks. The kde@ team updates them all as needed. This quarter, for instance, tcberner@ and arrowd@ updated or fixed (much more than) this selection of ports: * package:astro/merkaartor[] * package:devel/massif-visualizer[] * package:finance/alkimia[] * package:irc/quassel[] * package:net-im/kaidan[] * package:sysutils/bsdisks[] * package:sysutils/k3b[] Thanks to jhale@, package:devel/qtcreator[] was updated to 11.0.3, providing another featureful integrated development environment for creating Qt and KDE applications. ==== Deprecations Web browsers are huge, and have a considerable security surface. The venerable package:www/qt5-webkit[] WebKit port has been slated for removal and consumers have been moved to WebEngine. The fork of WebKit that we relied on is no longer actively maintained. diff --git a/website/content/en/status/report-2023-07-2023-09/office.adoc b/website/content/en/status/report-2023-07-2023-09/office.adoc index 7e2a307e10..b6019f48e1 100644 --- a/website/content/en/status/report-2023-07-2023-09/office.adoc +++ b/website/content/en/status/report-2023-07-2023-09/office.adoc @@ -1,26 +1,26 @@ === FreeBSD Office Team Links: + -link:https://wiki.freebsd.org/Office[The FreeBSD Office project] URL: link:https://wiki.freebsd.org/Office[https://wiki.freebsd.org/Office] + -link:https://lists.freebsd.org/subscription/freebsd-office[The FreeBSD Office mailing list] URL: link:https://lists.freebsd.org/subscription/freebsd-office[https://lists.freebsd.org/subscription/freebsd-office] +link:https://wiki.freebsd.org/Office[The FreeBSD Office project] URL: link:https://wiki.freebsd.org/Office[] + +link:https://lists.freebsd.org/subscription/freebsd-office[The FreeBSD Office mailing list] URL: link:https://lists.freebsd.org/subscription/freebsd-office[] Contact: FreeBSD Office team ML + Contact: Dima Panov + Contact: Li-Wen Hsu The FreeBSD Office team works on a number of office-related software suites and tools such as OpenOffice and LibreOffice. Work during this quarter was focused on providing the latest stable release of LibreOffice suite and companion apps to all FreeBSD users. During the 2023Q3 period we pushed maintenance patches for the LibreOffice port and brought the latest, 7.6.2, release and all companion libraries such as MDDS, libIxion and more to the ports tree. All prerelease development of LibreOffice ports is carried out in the in link:https://github.com/freebsd/freebsd-ports-libreoffice[LibreOffice WIP repo]. Together with LibreOffice, we also updated Boost to the latest, 1.83 release. Everyone interested in Boost porting can submit patches to the link:https://github.com/fluffykhv/freebsd-ports-boost[Boost WIP repository]. We are looking for people to help with the open tasks: * The link:https://bugs.freebsd.org/bugzilla/buglist.cgi?bug_status=__open__&email1=office%40FreeBSD.org&emailassigned_to1=1&emailcc1=1&emailtype1=substring&list_id=650685&order=Bug+Number&query_format=advanced[open bugs list] contains all filed issues which need some attention * Upstream link:https://cgit.freebsd.org/ports/tree/editors/libreoffice/files[local patches in ports] Patches, comments and objections are always welcome in the mailing list and Bugzilla. diff --git a/website/content/en/status/report-2023-07-2023-09/openssl3.adoc b/website/content/en/status/report-2023-07-2023-09/openssl3.adoc index f394ed2067..b5e8b44bee 100644 --- a/website/content/en/status/report-2023-07-2023-09/openssl3.adoc +++ b/website/content/en/status/report-2023-07-2023-09/openssl3.adoc @@ -1,18 +1,18 @@ === OpenSSL 3 in base -- Improved Links: + link:https://www.openssl.org/source/[OpenSSL Downloads] URL: link:https://www.openssl.org/source/[] Contact: Pierre Pronchery This is a follow-up to the link:https://www.freebsd.org/status/report-2023-04-2023-06/[previous quarterly report] on the link:https://www.freebsd.org/status/report-2023-04-2023-06/#_openssl_3_in_base[integration of OpenSSL 3 into the base system]. The most obvious updates since the previous report are certainly the 3.0.10 and then 3.0.11 releases, fixing CVE issues with low to medium severity (link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2975[CVE-2023-2975], link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446[CVE-2023-3446], link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817[CVE-2023-3817], link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4807[CVE-2023-4807]). However these are not the only changes, and this quarter some issues specific to the integration were fixed, most of which were found while building ports with OpenSSL 3 in the base system. Fixes included: * Linking the engines and the legacy provider with the libcrypto.so shared object, for proper visibility of symbols, and for which a link:https://cgit.freebsd.org/src/commit/Makefile.inc1?id=1a18383a52bc373e316d224cef1298debf6f7e25[hack was required in the build system]. * Correcting the list of source files for the FIPS provider. -* Ensuring backward compatibility for the deprecated 0.9.8 API, which was notably helpful for the PAM authentication module from package:security/pam_ssh_agent_auth[], based on OpenSSH's man:ssh-agent[1] authentication mechanism. +* Ensuring backward compatibility for the deprecated 0.9.8 API, which was notably helpful for the PAM authentication module from package:security/pam_ssh_agent_auth[], based on OpenSSH's man:ssh-agent[1] authentication mechanism. diff --git a/website/content/en/status/report-2023-07-2023-09/portoptscli.adoc b/website/content/en/status/report-2023-07-2023-09/portoptscli.adoc index cd66993a3d..9f5e28fd06 100644 --- a/website/content/en/status/report-2023-07-2023-09/portoptscli.adoc +++ b/website/content/en/status/report-2023-07-2023-09/portoptscli.adoc @@ -1,22 +1,22 @@ === PortOptsCLI -- Ports Collection Accessibility Link: + link:https://gitlab.com/alfix/portoptscli[Project repository] URL: link:https://gitlab.com/alfix/portoptscli[] Contact: Alfonso Sabato Siciliano + -Contact: FreeBSD Accessibility mailing list +Contact: FreeBSD Accessibility mailing list FreeBSD provides the Ports Collection to give users and administrators a simple way to install applications. It is possible to configure a port before the building and installation. The command `make config` uses package:ports-mgmt/dialog4ports[] and package:ports-mgmt/portconfig[] to set up a port interactively via a text user interface (TUI). Unfortunately, screen readers perform poorly with a TUI; it is a well-known accessibility problem. FreeBSD provides tens of thousands of ports; port configuration is a key feature, but it is inaccessible to users with vision impairment. PortOptsCLI (Port Options CLI) is a new utility for setting port options via a command line interface. Properly, PortOptsCLI provides commands to navigate configuration dialogues (checklists and/or radio buttons) and set up their items interactively. It is also suitable for a speech synthesizer; currently it is tested with package:accessibility/orca[]. PortOptsCLI can be installed via the package:ports-mgmt/portoptscli[] port or package. Tips and new ideas are welcome. If possible, send reports to the FreeBSD Accessibility mailing list, to share and to track discussions in a public place. diff --git a/website/content/en/status/report-2023-07-2023-09/pot.adoc b/website/content/en/status/report-2023-07-2023-09/pot.adoc index c0da5eb874..66bece95ab 100644 --- a/website/content/en/status/report-2023-07-2023-09/pot.adoc +++ b/website/content/en/status/report-2023-07-2023-09/pot.adoc @@ -1,27 +1,27 @@ === Containers and FreeBSD: Pot, Potluck and Potman Links: + link:https://github.com/bsdpot[Pot organization on GitHub] URL: link:https://github.com/bsdpot[] Contact: Luca Pizzamiglio (Pot) + Contact: Bretton Vine (Potluck) + Contact: Michael Gmelin (Potman) Pot is a jail management tool that link:https://www.freebsd.org/news/status/report-2020-01-2020-03/#pot-and-the-nomad-pot-driver[also supports orchestration through Nomad]. During this quarter, link:https://github.com/bsdpot/pot/pull/274[Pot 0.15.6] was finished, adding custom man:pf[4] rule configuration hooks. Additionally, link:https://github.com/bsdpot/nomad-pot-driver/releases/tag/v0.9.1[Nomad Pot Driver 0.9.1] that allows setting Pot attributes in Nomad job descriptions was released. Potluck aims to be to FreeBSD and Pot what Dockerhub is to Linux and Docker: a repository of Pot flavours and complete container images for usage with Pot and in many cases Nomad. Quite a few new container images were made available, e.g. a link:https://github.com/bsdpot/potluck/tree/master/caddy-s3-nomad[Caddy S3 proxy], a link:https://github.com/bsdpot/potluck/tree/master/mastodon-s3[Mastodon instance], and a link:https://github.com/bsdpot/potluck/tree/master/redis-single[Redis container]. -In total there are now 50 containers available that can either be downloaded as ready-made images at link:https://potluck.honeyguide.net/[the Potluck image registry], if you trust our build process, or that you can build yourself from the Pot flavour files stored in the link:https://github.com/bsdpot/potluck[Potluck GitHub repository]. +In total there are now 50 containers available that can either be downloaded as ready-made images at link:https://potluck.honeyguide.net/[the Potluck image registry], if you trust our build process, or that you can build yourself from the Pot flavour files stored in the link:https://github.com/bsdpot/potluck[Potluck GitHub repository]. The July/August 2023 edition of the FreeBSD Journal contains Luca's link:https://freebsdfoundation.org/wp-content/uploads/2023/08/Pizzamiglio.pdf[Jail Orchestration with pot and nomad] article, explaining how to use Pot and Potluck together with Nomad to orchestrate containers on multiple hosts. Last but not least, a patch (gitref:90b1184d93c8[repository=ports]) added build cluster support to the package:devel/sccache[] port. As always, feedback and patches are welcome. Sponsors: Nikulipe UAB, Honeyguide Group diff --git a/website/content/en/status/report-2023-07-2023-09/releng.adoc b/website/content/en/status/report-2023-07-2023-09/releng.adoc index 0c907ed27d..c1c52d1bee 100644 --- a/website/content/en/status/report-2023-07-2023-09/releng.adoc +++ b/website/content/en/status/report-2023-07-2023-09/releng.adoc @@ -1,19 +1,19 @@ === FreeBSD Release Engineering Team Links: + -link:https://www.freebsd.org/releases/14.0R/schedule/[FreeBSD 14.0-RELEASE schedule] URL: link:https://www.freebsd.org/releases/14.0R/schedule/[https://www.freebsd.org/releases/14.0R/schedule/] + -link:https://download.freebsd.org/releases/ISO-IMAGES/[FreeBSD releases] URL: link:https://download.freebsd.org/releases/ISO-IMAGES/[https://download.freebsd.org/releases/ISO-IMAGES/] + -link:https://download.freebsd.org/snapshots/ISO-IMAGES/[FreeBSD development snapshots] URL: link:https://download.freebsd.org/snapshots/ISO-IMAGES/[https://download.freebsd.org/snapshots/ISO-IMAGES/] +link:https://www.freebsd.org/releases/14.0R/schedule/[FreeBSD 14.0-RELEASE schedule] URL: link:https://www.freebsd.org/releases/14.0R/schedule/[] + +link:https://download.freebsd.org/releases/ISO-IMAGES/[FreeBSD releases] URL: link:https://download.freebsd.org/releases/ISO-IMAGES/[] + +link:https://download.freebsd.org/snapshots/ISO-IMAGES/[FreeBSD development snapshots] URL: link:https://download.freebsd.org/snapshots/ISO-IMAGES/[] Contact: FreeBSD Release Engineering Team, The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the third quarter of the year, the FreeBSD Release Engineering Team started work on the upcoming 14.0-RELEASE cycle. As of this writing, BETA3 had been released, with BETA4 to follow shortly after. The Release Engineering Team continued providing weekly development snapshot builds for the *main* and *stable/13* branches. Sponsor: Tarsnap + Sponsor: https://www.gofundme.com/f/gjbbsd/ + Sponsor: The FreeBSD Foundation diff --git a/website/content/en/status/report-2023-07-2023-09/valgrind.adoc b/website/content/en/status/report-2023-07-2023-09/valgrind.adoc index 207dbc13cd..2433adc4de 100644 --- a/website/content/en/status/report-2023-07-2023-09/valgrind.adoc +++ b/website/content/en/status/report-2023-07-2023-09/valgrind.adoc @@ -1,24 +1,24 @@ === Valgrind: valgrind-devel updated for FreeBSD 15 - + Links: + link:https://www.valgrind.org/[Valgrind Home Page] URL: link:https://www.valgrind.org/[] + link:https://www.valgrind.org/docs/manual/dist.news.html[Valgrind News] URL: link:https://www.valgrind.org/docs/manual/dist.news.html[] Contact: Paul Floyd package:devel/valgrind-devel[] is in the process of being updated. This contains most of what will be in the official release of Valgrind 3.22 due out in October. `memcheck` has been enhanced with some more checks. It will now report usage of `realloc` with a size of zero. Such usage is not portable and is deprecated (C23 will make it Undefined Behaviour). `memcheck` now validates the values used for alignment and sized delete for `memalign`, `posix_memalign`, `aligned_alloc` and all aligned and sized overloads of `operator new` and `operator delete`. Reading `DWARF` debuginfo is now done in a lazy manner which can improve performance. As usual there are numerous small bugfixes. Specific to FreeBSD there is now support for FreeBSD 15. Two extra `_umtx_op` operations are now supported, `UMTX_OP_GET_MIN_TIMEOUT` and `UMTX_OP_SET_MIN_TIMEOUT`. There is a fix for the use of sysctl kern proc pathname with the guest pid or -1, which previously returned the path of the Valgrind host. The sysctl will now return the path of the guest. Support for the `close_range` system call has been added. diff --git a/website/content/en/status/report-2023-07-2023-09/wifibox.adoc b/website/content/en/status/report-2023-07-2023-09/wifibox.adoc index 82527d17ce..bba1507c68 100644 --- a/website/content/en/status/report-2023-07-2023-09/wifibox.adoc +++ b/website/content/en/status/report-2023-07-2023-09/wifibox.adoc @@ -1,30 +1,30 @@ === Wifibox: Use Linux to Drive your Wireless Card on FreeBSD Links: + link:https://github.com/pgj/freebsd-wifibox[Project GitHub Page] URL: link:https://github.com/pgj/freebsd-wifibox[] + link:https://cgit.freebsd.org/ports/tree/net/wifibox[net/wifibox port] URL: link:https://cgit.freebsd.org/ports/tree/net/wifibox[] Contact: PÁLI Gábor János Wifibox is an experimental project for exploring the ways of deploying a virtualized Linux guest to drive wireless networking cards on the FreeBSD host system. There have been guides to describe how to set this up manually, and Wifibox aims to implement those ideas as a single easy-to-use software package. * It uses man:bhyve[8] to run the embedded Linux system. This helps to achieve low resource footprint. It requires an x64 CPU with I/O MMU (AMD-Vi, Intel VT-d), ~150 MB physical memory, and some disk space available for the guest virtual disk image, which can be even ~30 MB only in certain cases. It works with FreeBSD 12 and later, some cards may require FreeBSD 13 though. * The guest is constructed using link:https://alpinelinux.org/[Alpine Linux], a security-oriented, lightweight distribution based on link:https://www.musl-libc.org/[musl libc] and link:https://busybox.net/[BusyBox], with some custom extensions and patches imported from link:https://archlinux.org/[Arch Linux] most notably. It is shipped with a number of diagnostic tools for better management of the hardware in use. The recent version features Linux 6.1, but Linux 6.5 is also available as an alternative. * Configuration files are shared with the host system. The guest uses man:wpa_supplicant[8] or man:hostapd[8] (depending on the configuration) so it is possible to import the host's man:wpa_supplicant.conf[5] or man:hostapd.conf[5] file without any changes. * When configured, man:wpa_supplicant[8] and man:hostapd[8] control sockets could be exposed by the guest, which enables use of related utilities directly from the host, such as man:wpa_cli[8] or man:wpa_gui[8] from the package:net/wpa_supplicant_gui[] package, or man:hostapd_cli[8]. * Everything is shipped in a single package that can be easily installed and removed. This comes with an man:rc[8] system service that automatically launches the guest on boot and stops it on shutdown. * It can be configured to forward IPv6 traffic, which is currently an experimental option but turned on by default. Wifibox has been mainly tested with Intel chipsets, and it has shown great performance and stability. Therefore, it might serve as an interim solution whilst FreeBSD matures its support for these chipsets. It was confirmed that Wifibox works with Atheros, Realtek, and Mediatek chipsets too, and feedback is more than welcome about others. -Broadcom chips (that are often found in MacBook Pros) can also work, but there are known stability issues. +Broadcom chips (that are often found in MacBook Pros) can also work, but there are known stability issues.